The space complexity of mirror games
نویسندگان
چکیده
We consider a simple streaming game between two players Alice and Bob, which we call the mirror game. In this game, Alice and Bob take turns saying numbers belonging to the set {1, 2, . . . , 2N}. A player loses if they repeat a number that has already been said. Bob, who goes second, has a very simple (and memoryless) strategy to avoid losing: whenever Alice says x, respond with 2N+1−x. The question is: does Alice have a similarly simple strategy to win that avoids remembering all the numbers said by Bob? The answer is no. We prove a linear lower bound on the space complexity of any deterministic winning strategy of Alice. Interestingly, this follows as a consequence of the Eventown-Oddtown theorem from extremal combinatorics. We additionally demonstrate a randomized strategy for Alice that wins with high probability that requires only Õ( √ N) space (provided that Alice has access to a random matching on K2N ). We also investigate lower bounds for a generalized mirror game where Alice and Bob alternate saying 1 number and b numbers each turn (respectively). When 1+b is a prime, our linear lower bounds continue to hold, but when 1+ b is composite, we show that the existence of a o(N) space strategy for Bob implies the existence of exponential-sized matching vector families over Z1+b.
منابع مشابه
Time and Space Complexity Reduction of a Cryptanalysis Algorithm
Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...
متن کاملTime and Space Complexity Reduction of a Cryptanalysis Algorithm
Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...
متن کاملDecision Algorithms for Multiplayer Non-Cooperative Games of Incomplete Information
Extending the complexity results of Reif 1, 2] for two player games of incomplete information, this paper (also see 3]) presents algorithms for deciding the outcome for various classes of multiplayer games of incomplete information, i.e. deciding whether or not a team has a winning strategy for a particular game. Our companion paper (Peter-son, Reif, and Azhar 4]) shows that these algorithms ar...
متن کاملConvex Games in Banach Spaces
We study the regret of an online learner playing a multi-round game in a Banach space B against an adversary that plays a convex function at each round. We characterize the minimax regret when the adversary plays linear functions in terms of the Rademacher type of the dual of B. The cases when the adversary plays bounded and uniformly convex functions respectively are also considered. Our resul...
متن کاملar X iv : 1 30 7 . 39 13 v 1 [ cs . C C ] 1 5 Ju l 2 01 3 PEBBLE GAMES , PROOF COMPLEXITY , AND TIME - SPACE TRADE - OFFS
Pebble games were extensively studied in the 1970s and 1980s in a number of different contexts. The last decade has seen a revival of interest in pebble games coming from the field of proof complexity. Pebbling has proven to be a useful tool for studying resolution-based proof systems when comparing the strength of different subsystems, showing bounds on proof space, and establishing size-space...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1710.02898 شماره
صفحات -
تاریخ انتشار 2017