On multiparty communication with large versus unbounded error
نویسنده
چکیده
The communication complexity of F with unbounded error is the limit of the ε-error randomized complexity of F as ε → 1/2. Communication complexity with weakly bounded error is defined similarly but with an additive penalty term that depends on 1/2− ε . Explicit functions are known whose two-party communication complexity with unbounded error is exponentially smaller than with weakly bounded error. Chattopadhyay and Mande (ECCC Report TR16-095) recently generalize this exponential separation to the number-on-the-forehead multiparty model, with a rather technical proof from first principles. We show how to derive such an exponential separation from known two-party work, achieving stronger parameters along the way. We present several proofs for this result, some as short as half a page. Our strongest separation is a k-party communication problem F : ({0,1}n)k → {0,1} that has complexity O(logn) with unbounded error and Ω(n/4k) with weakly bounded error. ∗The author was supported in part by NSF CAREER award CCF-1149018 and an Alfred P. Sloan Foundation Research Fellowship. ACM Classification: F.1.3, F.2.3 AMS Classification: 68Q17, 68Q15
منابع مشابه
Communication Complexity Theory: Thirty-Five Years of Set Disjointness
The set disjointness problem features k communicating parties and k subsets S1, S2, . . . , Sk ⊆ {1, 2, . . . , n}. No single party knows all k subsets, and the objective is to determine with minimal communication whether the k subsets have nonempty intersection. The important special case k = 2 corresponds to two parties trying to determine whether their respective sets intersect. The study of...
متن کاملUnconditionally Secure Asynchronous Multiparty Computation with Quadratic Communication Per Multiplication Gate
Secure multiparty computation (MPC) allows a set of n parties to securely compute an agreed function, even if up to t parties are under the control of an adversary. In this paper, we propose a new Asynchronous secure multiparty computation (AMPC) protocol that provides information theoretic security with n = 4t+ 1, where t out of n parties can be under the influence of a Byzantine (active) adve...
متن کاملEfficient Asynchronous Multiparty Computation with Optimal Resilience
We propose an efficient information theoretic secure asynchronous multiparty computation (AMPC)protocol with optimal fault tolerance; i.e., with n = 3t + 1, where n is the total number of parties andt is the number of parties that can be under the influence of a Byzantine (active) adversaryAt havingunbounded computing power. Our protocol communicates O(n5κ) bits per multiplicati...
متن کاملOn the Hardness of Information-Theoretic Multiparty Computation
We revisit the following open problem in information-theoretic cryptography: Does the communication complexity of unconditionally secure computation depend on the computational complexity of the function being computed? For instance, can computationally unbounded players compute an arbitrary function of their inputs with polynomial communication complexity and a linear threshold of unconditiona...
متن کاملStudies on Verifiable Secret Sharing, Byzantine Agreement and Multiparty Computation
This dissertation deals with three most important as well as fundamental problems in secure distributed computing, namely Verifiable Secret Sharing (VSS), Byzantine Agreement (BA) and Multiparty Computation (MPC). VSS is a two phase protocol (Sharing and Reconstruction) carried out among n parties in the presence of a centralized adversary who can corrupt up to t parties. Informally, the goal o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Electronic Colloquium on Computational Complexity (ECCC)
دوره 23 شماره
صفحات -
تاریخ انتشار 2016