Tight Pounds on Oblivious Chaining
نویسنده
چکیده
The chaining problem is deened as follows. = maxfj j a j = 1; j < ig. (Deene maxfg = 0) The chaining problem appears as a subproblem in many contexts. There are algorithms known that solve the chaining problem on CRCW PRAMs in O((n)) time, where (n) is the inverse of Ackerman's function, and is a very slowly growing function. We study a class of algorithms (called oblivious algorithms) for this problem. We present a simple oblivious chaining algorithm running in O((n)) time. More importantly, we demonstrate the optimality of the algorithm by showing a matching lower bound for oblivious algorithms using n processors. We also provide the rst steps towards a lower bound for all chaining algorithms by showing that any chaining algorithm that runs in two steps must use a superlinear number of processors. Our proofs use preex graphs and weak superconcentrators. We demonstrate an interesting connection between the two and use this idea to obtain improved bounds on the size of preex graphs.
منابع مشابه
Lower Bounds for Oblivious Transfer Reductions
We prove the rst general and non-trivial lower bound for the number of times a 1-out-of-n Oblivious Transfer of strings of length`should be invoked so as to obtain, by an information-theoretically secure reduction, a 1-out-of-N Oblivious Transfer of strings of length L. Our bound is tight in many signiicant cases. We also prove the rst non-trivial lower bound for the number of random bits neede...
متن کاملA Lower Bound for Oblivious Dimensional Routing
In this work we consider deterministic oblivious dimensional routing algorithms on d-dimensional meshes. In oblivious dimensional routing algorithms the path of a packet depends only on the source and destination node of the packet. Furthermore packets use a shortest path with a minimal number of bends. We present an Ω(kn(d+1)/2) step lower bound for oblivious dimensional k-k routing algorithms...
متن کاملHow to Derive Lower Bound on Oblivious Transfer Reduction
Suppose that we are given an ideal oblivious transfer protocol (OT). We wish to construct a larger OT by using the above OT as a blackbox. Then how many instances of the given ideal OT should be invoked ? For this problem, some lower bounds were derived using entropy. In this paper, we show more tight lower bounds by using combinatorial techniques. Roughly speaking, our lower bounds are two tim...
متن کاملSequentially Composable Information Theoretically Secure Oblivious Polynomial Evaluation
Oblivious polynomial evaluation (OPE) consists of a twoparty protocol where a sender inputs a polynomial P , and a receiver inputs a single value i. At the end of the protocol, the sender learns nothing and the receiver learns P (i). This paper deals with the problem of oblivious polynomial evaluation under an information-theoretical perspective, which is based on recent definitions of Uncondit...
متن کاملPacket Burst Switching and Multi-Wavelength Circuit Switching in the Binary de Bruijn Network
The oblivious edge-disjoint routing in the directed binary de Bruijn network is considered on the basis of the all-port model. Packet burst switching is used to establish tight permutation routing. Permutation circuit switching within the all-port model is demonstrated with the use of multi-wavelength routing. Tight multi-plane routing is established for physical paths of lengths limited to the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- SIAM J. Comput.
دوره 23 شماره
صفحات -
تاریخ انتشار 1994