Skip to main content

Fooling Pairs in Randomized Communication Complexity

  • Conference paper
  • First Online:
Structural Information and Communication Complexity (SIROCCO 2016)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9988))

  • 524 Accesses

Abstract

The fooling pairs method is one of the standard methods for proving lower bounds for deterministic two-player communication complexity. We study fooling pairs in the context of randomized communication complexity. We show that every fooling pair induces far away distributions on transcripts of private-coin protocols. We use the above to conclude that the private-coin randomized \(\varepsilon \)-error communication complexity of a function f with a fooling set \(\mathcal S\) is at least order \(\log \frac{\log |\mathcal S|}{\varepsilon }\). This relationship was earlier known to hold only for constant values of \(\varepsilon \). The bound we prove is tight, for example, for the equality and greater-than functions.

As an application, we exhibit the following dichotomy: for every boolean function f and integer n, the (1/3)-error public-coin randomized communication complexity of the function \(\bigvee _{i=1}^{n}f(x_i,y_i)\) is either at most c or at least n/c, where \(c>0\) is a universal constant.

M. Sinha—Partially supported by BSF.

A. Yehudayoff—Horev fellow – supported by the Taub foundation. Supported by ISF and BSF.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    \(R\subseteq \mathcal {X}\times \mathcal Y\) is an f-monochromatic rectangle if \(R=A\times B\) for some \(A\subseteq \mathcal {X}, B\subseteq \mathcal Y\) and f is constant over R.

  2. 2.

    In fact, the theorem in [5, 12] is more general than the one stated here. We state the theorem in this form since it fits well the focus of this text.

  3. 3.

    We may assume that say \(\varepsilon < 2^{-12}\) by repeating the given randomized protocol a constant number of times.

References

  1. Alon, N.: Perturbed identity matrices have high rank: proof and applications. Comb. Probab. Comput. 18(1–2), 3–15 (2009). http://dx.doi.org/10.1017/S0963548307008917

    Article  MathSciNet  MATH  Google Scholar 

  2. Bar-Yossef, Z., Jayram, T.S., Kumar, R., Sivakumar, D.: An information statistics approach to data stream and communication complexity. In: FOCS, pp. 209–218 (2002)

    Google Scholar 

  3. Barak, B., Braverman, M., Chen, X., Rao, A.: How to compress interactive communication. SIAM J. Comput. 42(3), 1327–1363 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  4. Chor, B., Kushilevitz, E.: A zero-one law for Boolean privacy. SIAM J. Discrete Math. 4(1), 36–47 (1991)

    Article  MathSciNet  MATH  Google Scholar 

  5. Hastad, J., Wigderson, A.: The randomized communication complexity of set disjointness. Theor. Comput. 3(1), 211–219 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  6. Kalyanasundaram, B., Schnitger, G.: The probabilistic communication complexity of set intersection. SIAM J. Discrete Math. 5(4), 545–557 (1992)

    Article  MathSciNet  MATH  Google Scholar 

  7. Krause, M.: Geometric arguments yield better bounds for threshold circuits and distributed computing. Theor. Comput. Sci. 156(1–2), 99–117 (1996)

    Article  MathSciNet  MATH  Google Scholar 

  8. Kushilevitz, E., Nisan, N.: Communication Complexity. Cambridge University Press, New York (1997)

    Book  MATH  Google Scholar 

  9. Lee, T., Shraibman, A.: Lower bounds in communication complexity. Founda. Trends Theoret. Comput. Sci. 3(4), 263–398 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  10. Newman, I.: Private vs. common random bits in communication complexity. Inf. Process. Lett. 39(2), 67–71 (1991)

    Article  MathSciNet  MATH  Google Scholar 

  11. Paturi, R., Simon, J.: Probabilistic communication complexity. J. Comput. Syst. Sci. 33(1), 106–123 (1986)

    Article  MathSciNet  MATH  Google Scholar 

  12. Yao, A.C.C.: Some complexity questions related to distributive computing (preliminary report). In: STOC, pp. 209–213 (1979)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shay Moran .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Moran, S., Sinha, M., Yehudayoff, A. (2016). Fooling Pairs in Randomized Communication Complexity. In: Suomela, J. (eds) Structural Information and Communication Complexity. SIROCCO 2016. Lecture Notes in Computer Science(), vol 9988. Springer, Cham. https://doi.org/10.1007/978-3-319-48314-6_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-48314-6_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-48313-9

  • Online ISBN: 978-3-319-48314-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics