Abstract
Ordered binary decision diagrams (OBDDs) nowadays be- long to the most common representation types for Boolean functions. Although they allow important operations such as satisfiability test and equality test to be performed efficiently, their limitation lies in the fact that they may require exponential size for important functions. Bryant [8] has shown that any OBDD-representation of the function MULn-1;n, which computes the middle bit of the product of two n-bit numbers, requires at least 2n/8 nodes. In this paper a stronger bound of 2n/2/61 is proven by a new technique, using a recently found universal family of hash functions [23]. As a result, one cannot hope anymore to find reason- able small OBDDs even for the multiplication of relatively short integers, since for only a 64-bit multiplication millions of nodes are required. Fur- ther, a first non-trivial upper bound of 7/3. 24n/3 for the OBDD size of MULn-1;n is provided.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
S. B. Akers. Binary decision diagrams. IEEE Transactions on Computers, C-27:509–516, 1978.
M. Atici and D. R. Stinson. Universal hashing and multiple authentication. In Advances in Cryptology CRYPTO’ 96, pp. 16–30 1996.
P. Beame, M. Tompa, and P. Yan. Communication-space tradeoffs for unrestricted protocols. SIAM Journal on Computing, 23:652–661, 1994.
B. Bollig and I. Wegener. Improving the variable ordering of OBDDs is NP-complete. IEEE Transactions on Computers, 45:993–1002, 1996.
B. Bollig and I. Wegener. Asymptotically optimal bounds for OBDDs and the solution of some basic OBDD problems. In Proceedings of the 25th International Colloquium on Automata, Languages, and Programming, pp. 187–198. 2000.
Y. Breibart, H. B. Hunt III, and D. Rosenkrantz. On the size of binary decision diagrams representing Boolean functions. Theoretical Computer Science, 145:45–69, 1995.
R. E. Bryant. Graph-based algorithms for boolean function manipulation. IEEE Transactions on Computers, C-35:677–691, 1986.
R. E. Bryant. On the complexity of VLSI implementations and graph representations of boolean functions with applications to integer multiplication. IEEE Transactions on Computers, 40:205–213, 1991.
J. L. Carter and M. N. Wegman. Universal classes of hash functions. Journal of Computer and System Sciences, 18:143–154, 1979.
M. Dietzfelbinger. Universal hashing and k-wise independent random variables via integer arithmetic without primes. In Proceedings of the 13th Annual Symposium on Theoretical Aspects of Computer Science, pp. 569–580. 1996.
M. Dietzfelbinger, T. Hagerup, J. Katajainen, and M. Penttonen. A reliable randomized algorithm for the closest-pair problem. Journal of Algorithms, 25:19–51, 1997.
M. Dietzfelbinger, A. Karlin, K. Mehlhorn, F. Meyer auf der Heide, H. Rohnert, and R. E. Tarjan. Dynamic perfect hashing: Upper and lower bounds. SIAM Journal on Computing, 23:738–761, 1994.
M. L. Fredman, J. Komlós, and E. Szemerédi. Storing a sparse table with O(1) worst case access time. Journal of the Association for Computing Machinery, 31:538–544, 1984.
R. Impagliazzo and D. Zuckerman. How to recycle random bits. In Proceedings of the 30th Annual IEEE Symposium on Fountations of Computer Science, pp. 248–253. 1989.
C. Y. Lee. Representation of switching circuits by binary-decision programs. The Bell Systems Technical Journal, 38:985–999, 1959.
Y. Mansour, N. Nisan, and P. Tiwari. The computational complexity of universal hashing. Theoretical Computer Science, 107:121–133, 1993.
P. Rogaway. Bucket hashing and its application to fast message authentication. In Advances in Cryptology CRYPTO’ 95, pp. 29–42. 1995.
D. Sieling. On the existence of polynomial time approximation schemes for OBDD minimization. In Proceedings of the 15th Annual Symposium on Theoretical Aspects of Computer Science, pp. 205–215. 1998.
D. Sieling and I. Wegener. NC-algorithms for operations on binary decision diagrams. Parallel Processing Letters, 48:139–144, 1993.
M. Sipser. A complexity theoretic approach to randomness. In Proceedings of the 15th Annual ACM Symposium on Theory of Computing, pp. 330–335. 1983.
I. Wegener. Branching Programs and Binary Decision Diagrams-Theory and Applications. Siam, first edition, 2000.
M. N. Wegman and J. L. Carter. New classes and applications of hash functions. In Proceedings of the 20th Annual IEEE Symposium on Fountations of Computer Science, pp. 175–182. 1979.
P. Woelfel. Efficient strongly universal and optimally universal hashing. In Mathematical Foundations of Computer Science: 24th International Symposium, pp. 262–272. 1999.
P. Woelfel. Klassen universeller Hashfunktionen mit ganzzahliger Arithmetik. Diploma thesis, Univ. Dortmund, 2000.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Woelfel, P. (2001). New Bounds on the OBDD-Size of Integer Multiplication via Universal Hashing. In: Ferreira, A., Reichel, H. (eds) STACS 2001. STACS 2001. Lecture Notes in Computer Science, vol 2010. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44693-1_49
Download citation
DOI: https://doi.org/10.1007/3-540-44693-1_49
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-41695-1
Online ISBN: 978-3-540-44693-4
eBook Packages: Springer Book Archive