Multiparty Protocols, Pseudorandom Generators for Logspace, and Time-Space Trade-Offs
نویسندگان
چکیده
Let f (xl, .. . xk) be a Boolean function that k parties wish to collaboratively evaluate, where each xi is a bit-string of length n. The ith party knows each input argument except x,; and each party has unlimited computational power. They share a blackboard, viewed by all parties, where they can exchange messages. The objective is to minimize the number of bits written on the board. We prove lower bounds of the form Q(n c?), for the number of bits that need to be exchanged in order to compute some (explicitly given) polynomial time computable functions. Our bounds hold even if the parties only wish to have a 1% advantage at guessing the value off on random inputs. The lower bound proofs are based on discrepancy upper bounds for specilic functions over “cylinder intersection” sets. These results may be of independent interest. We give several applications of the lower bounds. The tirst application is a pseudorandom generator for Logspace. We explicitly construct (in polynomial time) pseudorandom sequences of length n from a random seed of length exp(c &) that no Logspace Turing machine will be able to distinguish from truly random sequences. As a corollary we give an explicit construction of a universal traversal sequence of length
منابع مشابه
Complexity and its Application to Lower Bounds on Branching Program
Multiparty communication complexity was first defined by Chandra, Furst, and Lipton [6] and used to obtain lower bounds on branching programs. Since then it has been used to get additional lower bounds and tradeoffs for branching programs [1, 3], lower bounds on problems in data structures [3], time-space tradeoffs for restricted Turing machines [1], and unconditional pseudorandom generators fo...
متن کاملSpace Pseudorandom Generators by Communication Complexity Lower Bounds
In 1989, Babai, Nisan and Szegedy [BNS92] gave a construction of a pseudorandom generator for logspace, based on lower bounds for multiparty communication complexity. The seed length of their pseudorandom generator was 2 √ , because the best lower bounds for multiparty communication complexity are relatively weak. Subsequently, pseudorandom generators for logspace with seed length O(log n) were...
متن کاملEthical Perspective: Five Unacceptable Trade-offs on the Path to Universal Health Coverage
This article discusses what ethicists have called “unacceptable trade-offs” in health policy choices related to universal health coverage (UHC). Since the fiscal space is constrained, trade-offs need to be made. But some trade-offs are unacceptable on the path to universal coverage. Unacceptable choices include, among other examples from low-income countries, to expand coverage for services wit...
متن کاملTime Space Tradeoffs for Attacks against One-Way Functions and PRGs
We study time space tradeoffs in the complexity of attacks against one-way functions and pseudorandom generators. Fiat and Naor [7] show that for every function f : [N ]→ [N ], there is an algorithm that inverts f everywhere using (ignoring lower order factors) time, space and advice at most N. We show that an algorithm using time, space and advice at most max{ 5 4N 3 4 , √ N} exists that inver...
متن کاملNon-uniform attacks against one-way functions and PRGs
We study the power of non-uniform attacks against one-way functions and pseudorandom generators. Fiat and Naor [FN99] show that for every function f : [N ]→ [N ] there is an algorithm that inverts f everywhere using (ignoring lower order factors) time, space and advice at most N. We show that an algorithm using time, space and advice at most max{ 54N 3 4 , √ N} exists that inverts f on at least...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Comput. Syst. Sci.
دوره 45 شماره
صفحات -
تاریخ انتشار 1992