Abstract
The LogRank conjecture of Lovász and Saks (1988) is the most famous open problem in communication complexity theory. The statement is as follows: suppose that two players intend to compute a Boolean function when x is known for the first and y for the second player, and they may send and receive messages encoded with bits, then they can compute with exchanging bits, where is a Boolean matrix, determined by function f. The problem is widely open and very popular, and it has resisted numerous attacks in the last 35 years. The best upper bound is still exponential in the bound of the conjecture. Unfortunately, we cannot prove the conjecture, but we present a communication protocol with bits, which computes a (somewhat) related quantity to . The relation is characterized by the representation of low-degree, multi-linear polynomials modulo composite numbers. Our result may help to settle this long-open conjecture.
MSC:
03D15; 15B34; 15B36
1. Introduction
Two-player communication games were first defined by Yao in 1979 [1]. There are two players, Alice and Bob, and a Boolean function
and two Boolean sequences, . Alice knows the value of x, Bob the value of y, and they want to compute collaboratively the value of . The local computational power of the players is unlimited, and the cost of the collaborative computation is the number of bits exchanged between the parties. Function f is computed by the players if one of them knows , and the other knows that the first player knows [2].
Clearly, any f can be computed by N bits of communication; Alice tells x to Bob at cost N, and Bob computes for free. This is the trivial protocol for computing f.
We say that the players follow a communication protocol for computing f, where the protocol prescribes, in each step, the message that a player should send to the other for a given message history and input. The cost of a protocol, computing , is the maximum number of bits communicated, taken for all x and y inputs.
The communication complexity of Boolean function f is the minimum cost of protocols, which compute f. The communication complexity of f is denoted by [2]. For a more formal introduction and examples, we refer to references [2,3].
The communication games and communication complexity have become a central field of theoretical computer science, hundreds of publications (e.g., references [4,5,6,7,8] and numerous books [3,9,10]) have appeared on the topic. For example, difficult-to-handle areas, such as Boolean circuit complexity, were applied to communication games for gaining the upper and lower bounds [10,11,12,13,14,15,16,17,18].
One of the main problems is finding the general upper and lower bounds for the communication complexity of f. To describe the bounds, we need to define the communication matrix of the function f:
Definition 1.
The communication matrix of is a 0-1 matrix , where its rows correspond to the different values, the columns to the different values, and in the position of row x and column y is the value of . Let denote the matrix rank over the rational field. Let log denote the logarithm base 2, and ln the natural logarithm.
A general lower bound, which implies that, for most of the natural communication problems (e.g., the identity function or the set disjointness), the trivial protocol is optimal, which was proved by Mehlhorn and Schmidt in 1982:
Theorem 1
([19]). Suppose that f is not the identical 0 function. Then,
The most famous open problem in communication complexity is the LogRank conjecture of Lovász and Saks (1988):
Conjecture 1
([20]). There exists a polynomial P, such that for all :
The 35-year-old conjecture is widely open today, inspiring numerous theorems and approaches even in the last few years [21,22,23,24,25,26,27].
The best published upper bound of Lovett [8] is still exponentially far from the conjectured upper bound, for large enough :
We note that the LogRank conjecture can be formulated with the terms of graph theory as a relation between the rank of the adjacency matrix and the chromatic number of a graph [8,20], without even mentioning communication games.
2. Preliminaries
We will need some definitions and theorems from references [28,29]:
Let be a Boolean function and let m be a positive integer. Barrington, Beigel, and Rudich [30] gave the following definition:
Definition 2.
The polynomial P with integer coefficients weakly represents Boolean function g modulo m if there exists an , such that for all ,
Here, denotes the smallest non-negative .
We are interested in the smallest degree polynomials representing g. Since g is Boolean, we may assume that P is multilinear (since over ).
Let denote the n–variable OR-function:
If polynomial P weakly represents modulo, a prime p, then we may assume that for ,
Then,
is clearly the n-variable AND function with a unique multi-linear form
Therefore, the degree of P is at least .
Tardos and Barrington [31] showed that the same conclusion holds if p is a prime power.
However, Barrington, Beigel, and Rudich [30] proved that the conclusion fails for composite moduli with at least two prime divisors:
Theorem 2
([30]). There exists an explicitly constructible polynomial P of degree which weakly represents modulo , where the ’s are distinct primes.
An explicit example of such a low-degree, non-trivial polynomial modulo 6 is given in Section 4.
We have applied the polynomial of Theorem 2 in reference [32] for falsifying a long-standing conjecture for the size of set systems with restricted intersections and also for giving new explicit Ramsey graph constructions, among other applications for set systems and codes described in references [13,33,34,35,36,37].
In reference [32], we reproduced a short proof of Theorem 2 from reference [30], and we proved the following:
Corollary 1.
Let . Then, there exists an explicitly constructible polynomial with n variables and of degree which is equal to 0 on , it is nonzero mod m for all other , and for all and for all , or .
Using the results of reference [32], we have found a remarkable application for elementary symmetric polynomials in reference [28].
We will need the following definition from reference [29] with small changes to describe the result:
Definition 3.
Let m be a composite number with prime factorization . Let denote the ring of integers modulo m and the integers. Let f be a multi-linear polynomial of n variables over the integers:
where , . Then, we say that
is an
- alternative representation of f modulo m, if
- 0-a-strong representation of f modulo m, if it is an alternative representation, and furthermore, if for some i, then
- 1-a-strong representation of f modulo m, if it is an alternative representation, and furthermore, if for some i, then
That is, for modulus 6 in the alternative representation, each coefficient is correct; either modulo 2 or modulo 3, but not necessarily both.
In the 0-a-strong representation, the 0 coefficients are always correct; both modulo 2 and 3. The non-zeros are allowed to be correct in either modulo 2 or 3, and if they are not correct, one of them, say 2, then they should be 0 mod 2. Consequently, the coefficient 1 can be represented by 1, 3, or 4, but nothing else.
In the 1-a-strong representation, the non-zero coefficients of f are correct for both moduli in g, but the zero coefficients of f can be non-zero either modulo 2 or modulo 3 in g, but not both.
Remark 1
([29]). The 1-a-strong representations of polynomial f can be written in the form modulo m:
where the have no monomials in common with each other, nor with f.
Example 1
([29]). Let , and let , then is a 0-a-strong representation of f modulo 6; is a 1-a-strong representation of f modulo 6; and is an alternative representation modulo 6.
Remark 2.
Clearly, the 1-a-strong representation of f is not unique. Suppose that
- (i)
- all coefficients of f and are either 1 or −1 mod m, and
- (ii)
- g is a 1-a-strong representation of f and also of , where and g are multilinear, homogeneous degree-d polynomials, that is, every monomials of and g are degree d,then modulo m. Clearly, one can set the monomials of f or to 1 one by one, and the -multiplied monomials need to be 0 in g because of homogeneity.
We proved this in reference [28] and stated it in this form in reference [29] as follows:
Theorem 3
([28]). Let the prime factorization of a positive integer m be , where . Then, a degree-2 0-a-strong representation of the second elementary symmetric polynomial
modulo m:
can be computed as the following product with coefficients from :
where Moreover, this representation satisfies that .
Now, we need the main theorem from reference [29]:
Theorem 4
([29], Theorem 6). Let , where , and are primes. Then, a degree-2, 1-a-strong representation of the dot-product can be computed with multiplications of the form
where all coefficients are integers.
The proof is immediate from Theorem 3 by subtracting the 0-a-strong representation of from [29], and .
An explicit example for the and coefficients, with , can be found in Section 4.
3. The LogRank Protocol
Theorem 5.
Let be an integer, be the product of the first primes. Then, with bits of communication, with a positive constant , Alice and Bob can compute the value for any integer substitutions for and any rational substitutions for of the 1-a-strong representation g modulo m of the dot-product polynomial :
where for , polynomials are homogeneous quadratic polynomials without common monomials.
Proof.
Since is the product of the first ℓ primes, , by the estimation of the first Chebyshev number [38]. Substituting we ascertain that any non-negative integers up to m can be given with less than bits, with a .
For any integer substitutions for , Alice can compute privately and communicate for the mod m values of sums from (3):
for each j with bits.
Since
with a positive , the total communication of Alice is polylogarithmic in n. Since Bob knows the values of , for ; he, privately, without any communication, computes the value of (3).
□
The following corollary is our main result here:
Corollary 2.
Suppose that we have a Boolean function , with a 0-1 communication matrix with over the rationals, . By the definition of the rank, one may choose n linearly independent 0-1 columns of , let the 0-1 matrix X contain these columns. Then, there exists an rational matrix Y, such that . Now, any element of communication matrix is the dot product of a length-n row of X and a length-n column of Y. From Theorem 5, the substitution of the 1-a-strong representation of this dot product can be computed modulo m as with polylogarithmic communication in the rank n, i.e., with bits of communication.
Here, we describe our protocol.
- (i)
- First, we may assume that both players know the rank decomposition of the communication matrix of F: .
- (ii)
- Alice substitutes the integer values of the numbers for into (5) for each j, and communicates the mod m values of the (5) sums for to Bob.
- (iii)
- Bob knows the values of , for . Consequently, he, privately, without any communication, computes the value of (3).
Communication occurs only in step (ii), when mod m values are transmitted, each with bits.
Remark 3.
For a given , the players can agree that they will compute the instead of , and then matrix Y can be changed for an integer matrix . Note also that this convention will not increase the communication, since Bob does not communicate the linear combinations of his variables.
4. Remarks and Examples
Note that the “surplus” terms in (4) are zero modulo for at least one of the prime divisors of m.
Remark 4.
We do not know how to eliminate the surplus terms with the polynomials from with a log-rank bounded additional communication. One can imagine numerous possible approaches, for example, substituting a prime for all or just a subset of 1s in the s, and repeating the protocol, repeating the protocol above for 0-1 rows instead of 0-1 columns, or repeating the protocol above for overlaying subsets of indices several times.
Remark 5.
As we described in reference [29], Theorem 4 has numerous applications in representing the matrix product with very few multiplications or the hyperdense coding of numbers, vectors or matrices. We also note that our definition and use of the term "hyperdense coding" [39] precedes the quantum-computational use of an unrelated but identically named term of [40,41] by more than 9 years.
Here, we give an example for a polynomial that we presented in reference [32]:
Example 2
([32]). Let , and let
and
Then,
weakly represents modulo 6, and its degree is only 8.
Example 3.
Here, we give an explicit example for the coefficients in Theorem 4 (3).
Let and let B be a matrix, C be a matrix mod 6, then mod 6 is a matrix with 1’s in the main diagonal and 0s either mod 2 or mod 3 or both outside the main diagonal:
If we take the dot product of column j of B each with , then we will obtain the t left sums of (3):
If we take the dot product of row j of C each with , then we will obtain the t right sums of (3):
Now, clearly, in (3) one can obtain the coefficient of by computing the dot product of row u of B with column v of C; that is, matrix A describes the coefficients of the mod 6 representation of the dot product ; all the elements of the main diagonal are 1, and the others are 0 mod 2 or mod 3 or both.
For readers wishing to experiment with these matrices, a Maple worksheet can be accessed at https://grolmusz.pitgroup.org/?attachment_id=1840, accessed on 3 October 2023.
Funding
V.G. was partially funded by the Ministry of Innovation and Technology of Hungary from the National Research, Development and Innovation Fund, financed under the ELTE TKP 2021-NKTA-62 funding scheme.
Data Availability Statement
Data are contained within the article.
Conflicts of Interest
The author declares no conflict of interest.
References
- Yao, A.C. Some Complexity Questions Related to Distributed Computing. In Proceedings of the 11th Annual ACM Symposium on Theory of Computing, Atlanta, GA, USA, 30 April–2 May 1979; pp. 209–213. [Google Scholar]
- Lovász, L. Communication complexity: A survey. In Paths, Flows, and VLSI-Layout; Korte, B., Lovász, L., Prömel, H., Schrijver, A., Eds.; Springer: Berlin/Heidelberg, Germany, 1989; pp. 235–265. [Google Scholar]
- Kushilevitz, E.; Nisan, N. Communication Complexity; Cambridge University Press: Cambridge, UK, 1997. [Google Scholar]
- Nisan, N. The communication complexity of threshold gates. In Combinatorics, Paul Erdős Is Eighty, Volume I; Sós, V.T., Miklós, D., Szőnyi, T., Eds.; János Bolyai Mathematical Society: Budapest, Hungary, 1993; pp. 301–315. [Google Scholar]
- Nisan, N.; Wigderson, A. On rank vs. communication complexity. In Proceedings of the 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, 20–22 November 1994; pp. 831–836. [Google Scholar]
- Babai, L.; Nisan, N.; Szegedy, M. Multiparty Protocols, Pseudorandom Generators for Logspace, and Time-Space Trade-Offs. J. Comput. Syst. Sci. 1992, 45, 204–232. [Google Scholar] [CrossRef]
- Grolmusz, V. The BNS lower bound for multi-party protocols is nearly optimal. Inform. Comput. 1994, 112, 51–54. [Google Scholar] [CrossRef][Green Version]
- Lovett, S. Communication is Bounded by Root of Rank. J. ACM 2016, 63, 1–9. [Google Scholar] [CrossRef]
- Rao, A.; Yehudayoff, A. Communication Complexity; Cambridge University Press: Cambridge, UK, 2020. [Google Scholar] [CrossRef]
- Karchmer, M. Communication Complexity; ACM Doctoral Dissertation Award; MIT Press: Cambridge, MA, USA, 1989. [Google Scholar]
- Håstad, J.; Goldmann, M. On the Power of the Small-Depth Threshold Circuits. Comput. Complex. 1991, 1, 113–129. [Google Scholar] [CrossRef]
- Grolmusz, V. A lower bound for depth-3 circuits with mod m gates. Inform. Proc. Lett. 1998, 67, 87–90. [Google Scholar] [CrossRef]
- Grolmusz, V. A Degree-Decreasing Lemma for (MODq − MODp) Circuits. Discret. Math. Theor. Comput. Sci. 2001, 4, 247–254. [Google Scholar]
- Grolmusz, V. Separating the communication complexities of MOD m and MOD p circuits. J. Comput. Syst. Sci. 1995, 51, 307–313. [Google Scholar] [CrossRef][Green Version]
- Grolmusz, V. On the Weak mod m Representation of Boolean Functions. Chic. J. Theor. Comput. Sci. 1995, 1995, 2. [Google Scholar]
- Grolmusz, V.; Tardos, G. Lower Bounds for (MOD p-MOD m) Circuits. SIAM J. Comput. 2000, 29, 1209–1222. [Google Scholar] [CrossRef]
- Grolmusz, V. Harmonic Analysis, Real Approximation, and the Communication Complexity of Boolean Functions. Algorithmica 1999, 23, 341–353. [Google Scholar] [CrossRef]
- Karchmer, M.; Newman, I.; Saks, M.E.; Wigderson, A. Non-deterministic Communication Complexity with Few Witness. J. Comput. Syst. Sci. 1994, 49, 247–257. [Google Scholar] [CrossRef]
- Mehlhorn, K.; Schmidt, E. Las Vegas is better than determinism in VLSI and distributive computing. In Proceedings of the 14th Annual ACM Symposium on Theory of Computing, San Francisco, CA, USA, 5–7 May 1982; pp. 330–337. [Google Scholar]
- Lovász, L.; Saks, M. Lattices, Möbius functions, and communication complexity. In Proceedings of the 29th Annual Symposium on Foundations of Computer Science, White Plains, NY, USA, 24–26 October 1988; pp. 81–90. [Google Scholar]
- Singer, N.; Sudan, M. Point-hyperplane Incidence Geometry and the Log-rank Conjecture. Acm Trans. Comput. Theory 2022, 14, 1–16. [Google Scholar] [CrossRef]
- Wu, H.L. On the Communication Complexity of AND Functions. IEEE Trans. Inf. Theory 2021, 67, 4929–4935. [Google Scholar] [CrossRef]
- Gál, A.; Syed, R. Upper Bounds on Communication in Terms of Approximate Rank. In Computer Science—Theory and Applications; Springer International Publishing: Berlin/Heidelberg, Germany, 2021; pp. 116–130. [Google Scholar] [CrossRef]
- Knop, A.; Lovett, S.; McGuire, S.; Yuan, W. Log-rank and lifting for AND-functions. In Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing, Virtual, 21–25 June 2021. [Google Scholar] [CrossRef]
- Chattopadhyay, A.; Mande, N.S.; Sherif, S. The Log-Approximate-Rank Conjecture Is False. J. ACM 2020, 67, 23. [Google Scholar] [CrossRef]
- Kol, G.; Moran, S.; Shpilka, A.; Yehudayoff, A. Approximate Nonnegative Rank is Equivalent to the Smooth Rectangle Bound. Comput. Complex. 2019, 28, 1–25. [Google Scholar] [CrossRef]
- Sinha, M.; de Wolf, R. Exponential Separation between Quantum Communication and Logarithm of Approximate Rank. In Proceedings of the 2019 IEEE 60th Annual Symposium on Foundations of Computer Science (FOCS), Baltimore, MD, USA, 9–12 November 2019. [Google Scholar] [CrossRef]
- Grolmusz, V. Computing Elementary Symmetric Polynomials with a Sub-Polynomial Number of Multiplications. SIAM J. Comput. 2003, 32, 1475–1487. [Google Scholar] [CrossRef]
- Grolmusz, V. Modular Representations of Polynomials: Hyperdense Coding and Fast Matrix Multiplication. IEEE Trans. Inf. Theory 2008, 54, 3687–3692. [Google Scholar] [CrossRef]
- Barrington, D.A.M.; Beigel, R.; Rudich, S. Representing Boolean functions as polynomials modulo composite numbers. Comput. Complex. 1994, 4, 367–382. [Google Scholar] [CrossRef]
- Tardos, G.; Barrington, D.A.M. A Lower Bound on the MOD 6 Degree of the OR Function. Comput. Complex. 1998, 7, 99–108. [Google Scholar] [CrossRef]
- Grolmusz, V. Superpolynomial size set systems with restricted intersections mod 6 and explicit Ramsey graphs. Combinatorica 2000, 20, 1–14. [Google Scholar] [CrossRef]
- Grolmusz, V. Set-Systems with Restricted Multiple Intersections. Electron. J. Comb. 2002, 9, e1625. [Google Scholar] [CrossRef] [PubMed]
- Grolmusz, V. Constructing set-systems with prescribed intersection sizes. J. Algorithms 2002, 44, 321–337. [Google Scholar] [CrossRef]
- Grolmusz, V. A Note on Explicit Ramsey Graphs and Modular Sieves. Combinatorics, Probability and Computing 2003, 12, 565–569. [Google Scholar] [CrossRef]
- Grolmusz, V. Co-Orthogonal Codes. Des. Codes Cryptogr. 2006, 38, 363–372. [Google Scholar] [CrossRef]
- Grolmusz, V. Pairs of codes with prescribed Hamming distances and coincidences. Des. Codes Cryptogr. 2006, 41, 87–99. [Google Scholar] [CrossRef]
- Hardy, G.H.; Wright, E.M. An Introduction to the Theory of Numbers, 5th ed.; Clarendon Press: Oxford, UK, 1995. [Google Scholar]
- Grolmusz, V. Hyperdense Coding Modulo 6 with Filter-Machines. arXiv 2003, arXiv:cs/0306049. [Google Scholar]
- Imre, S. Quantum Hyperdense Coding for Distributed Communications. arXiv 2012, arXiv:1210.2856. [Google Scholar]
- Bebrov, G. On the Hyperdense Coding and Proposal of Hyperdense Coding Quantum Secure Communication Protocol. In Proceedings of the Quantum Information and Measurement (QIM) V: Quantum Technologies, Rome, Italy, 4–6 April 2019; Optica Publishing Group: Washington, DC, USA, 2019; p. T5A.49. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).