Tight Pounds on Oblivious Chaining

نویسنده

  • Shiva Chaudhuri
چکیده

The chaining problem is deened as follows. = maxfj j a j = 1; j < ig. (Deene maxfg = 0) The chaining problem appears as a subproblem in many contexts. There are algorithms known that solve the chaining problem on CRCW PRAMs in O((n)) time, where (n) is the inverse of Ackerman's function, and is a very slowly growing function. We study a class of algorithms (called oblivious algorithms) for this problem. We present a simple oblivious chaining algorithm running in O((n)) time. More importantly, we demonstrate the optimality of the algorithm by showing a matching lower bound for oblivious algorithms using n processors. We also provide the rst steps towards a lower bound for all chaining algorithms by showing that any chaining algorithm that runs in two steps must use a superlinear number of processors. Our proofs use preex graphs and weak superconcentrators. We demonstrate an interesting connection between the two and use this idea to obtain improved bounds on the size of preex graphs.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Lower Bounds for Oblivious Transfer Reductions

We prove the rst general and non-trivial lower bound for the number of times a 1-out-of-n Oblivious Transfer of strings of length`should be invoked so as to obtain, by an information-theoretically secure reduction, a 1-out-of-N Oblivious Transfer of strings of length L. Our bound is tight in many signiicant cases. We also prove the rst non-trivial lower bound for the number of random bits neede...

متن کامل

A Lower Bound for Oblivious Dimensional Routing

In this work we consider deterministic oblivious dimensional routing algorithms on d-dimensional meshes. In oblivious dimensional routing algorithms the path of a packet depends only on the source and destination node of the packet. Furthermore packets use a shortest path with a minimal number of bends. We present an Ω(kn(d+1)/2) step lower bound for oblivious dimensional k-k routing algorithms...

متن کامل

How to Derive Lower Bound on Oblivious Transfer Reduction

Suppose that we are given an ideal oblivious transfer protocol (OT). We wish to construct a larger OT by using the above OT as a blackbox. Then how many instances of the given ideal OT should be invoked ? For this problem, some lower bounds were derived using entropy. In this paper, we show more tight lower bounds by using combinatorial techniques. Roughly speaking, our lower bounds are two tim...

متن کامل

Sequentially Composable Information Theoretically Secure Oblivious Polynomial Evaluation

Oblivious polynomial evaluation (OPE) consists of a twoparty protocol where a sender inputs a polynomial P , and a receiver inputs a single value i. At the end of the protocol, the sender learns nothing and the receiver learns P (i). This paper deals with the problem of oblivious polynomial evaluation under an information-theoretical perspective, which is based on recent definitions of Uncondit...

متن کامل

Packet Burst Switching and Multi-Wavelength Circuit Switching in the Binary de Bruijn Network

The oblivious edge-disjoint routing in the directed binary de Bruijn network is considered on the basis of the all-port model. Packet burst switching is used to establish tight permutation routing. Permutation circuit switching within the all-port model is demonstrated with the use of multi-wavelength routing. Tight multi-plane routing is established for physical paths of lengths limited to the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • SIAM J. Comput.

دوره 23  شماره 

صفحات  -

تاریخ انتشار 1994