Skip to main content
Log in

Towards optimal simulations of formulas by bounded-width programs

  • Published:
computational complexity Aims and scope Submit manuscript

Abstract

We show that, over an arbitrary ring, for any fixed ∈>0, all balanced algebraic formulas of sizes are computed by algebraic straight-line programs that employ a constant number of registers and have lengthO (s 1+∈). In particular, in the special case where the ring isGF(2), we obtain a technique for simulating balanced Boolean formulas of sizes by bounded-width branching programs of lengthO(s 1+∈), for any fixed ∈>0. This is an asymptotic improvement in efficiency over previous simulations in both the Boolean and algebraic settings.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  • M. Ajtai, L. Babai, P. Hajnal, J. Komlós, P. Púdlak, V. Rödl, E. Szemerédi, and G. Turán, Two lower bounds for branching programs,Proc. 18th Ann. ACM Symp. Theory of Computing, 1986, 30–38.

  • J. Bar-Ilan and D. Beaver, Non-cryptographic fault-tolerant computing in constant number of rounds of interaction,Proc. 8th Ann. ACM Symp. Principles of Distributed Computing, 1989, 201–209.

  • D. A. Barrington, Bounded-width polynomial-size branching programs recognize exactly those languages inNC 1,J. Computer System Sci.,38 (1989), 150–164.

    Google Scholar 

  • M. Ben-Or and R. Cleve, Computing algebraic formulas using a constant number of registers,Proc. 20th Ann. ACM Symp. Theory of Computing, 1988, 254–257.

  • A. Borodin, D. Dolev, F. Fich, and W. Paul, Bounds for width two branching programs,Proc. 15th Ann. ACM Symp. Theory of Computing, 1983, 87–93.

  • R. P. Brent, The parallel evaluation of general arithmetic expressions,J. ACM,21 (1974), 201–206.

    Google Scholar 

  • J. Cai and R. J. Lipton, Subquadratic simulations of circuits by branching programs,Proc. 30th Ann. IEEE Symp. Foundations of Computer Sci., 1989, 568–573.

  • A. Chandra, M. Furst, and R. J. Lipton, Multiparty protocols,Proc. 15th Ann. ACM Symp. Theory of Computing, 1983, 94–99.

  • R. Cleve, Towards optimal simulations of formulas by bounded-width programs,Proc. 22nd Ann. ACM Symp. Theory of Computing, 1990, 271–277.

  • J. Kilian, Founding cryptography on oblivious transfer,Proc. 20th Ann. ACM Symp. Theory of Computing, 1988, 20–31.

  • P. Púdlak, A lower bound on the complexity of branching programs,Proc. Conf. on Math. Foundations of Computer Sci., 1984, 480–489.

  • L. G. Valiant, Completeness classes in algebra,Proc. 11th Ann. ACM Symp. Theory of Computing, 1979, 249–261.

  • A. C. Yao, Lower bounds by probabilistic arguments,Proc. 24th Ann. IEEE Symp. Foundations of Computer Sci., 1983, 420–428.

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Cleve, R. Towards optimal simulations of formulas by bounded-width programs. Comput Complexity 1, 91–105 (1991). https://doi.org/10.1007/BF01200059

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF01200059

Subject classifications

Navigation