Strong XOR Lemma for Communication with Bounded Rounds

08/23/2022
โˆ™
by   Huacheng Yu, et al.
โˆ™
0
โˆ™

In this paper, we prove a strong XOR lemma for bounded-round two-player randomized communication. For a function f:๐’ณร—๐’ดโ†’{0,1}, the n-fold XOR function f^โŠ• n:๐’ณ^nร—๐’ด^nโ†’{0,1} maps n input pairs (X_1,โ€ฆ,X_n,Y_1,โ€ฆ,Y_n) to the XOR of the n output bits f(X_1,Y_1)โŠ•โ‹ฏโŠ• f(X_n, Y_n). We prove that if every r-round communication protocols that computes f with probability 2/3 uses at least C bits of communication, then any r-round protocol that computes f^โŠ• n with probability 1/2+exp(-O(n)) must use nยท(r^-O(r)ยท C-1) bits. When r is a constant and C is sufficiently large, this is ฮฉ(nยท C) bits. It matches the communication cost and the success probability of the trivial protocol that computes the n bits f(X_i,Y_i) independently and outputs their XOR, up to a constant factor in n. A similar XOR lemma has been proved for f whose communication lower bound can be obtained via bounding the discrepancy [Shaltiel'03]. By the equivalence between the discrepancy and the correlation with 2-bit communication protocols [Viola-Wigderson'08], our new XOR lemma implies the previous result.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
โˆ™ 07/25/2019

On the Round Complexity of Randomized Byzantine Agreement

We prove lower bounds on the round complexity of randomized Byzantine ag...
research
โˆ™ 08/30/2019

The Communication Complexity of Set Intersection and Multiple Equality Testing

In this paper we explore fundamental problems in randomized communicatio...
research
โˆ™ 07/03/2019

Estimating Gaps in Martingales and Applications to Coin-Tossing: Constructions and Hardness

Consider designing a distributed coin-tossing protocol for n processors ...
research
โˆ™ 05/08/2020

Communication memento: Memoryless communication complexity

We study the communication complexity of computing functions F:{0,1}^nร—{...
research
โˆ™ 05/17/2019

Separating k-Player from t-Player One-Way Communication, with Applications to Data Streams

In a k-party communication problem, the k players with inputs x_1, x_2, ...
research
โˆ™ 08/23/2023

Explicit separations between randomized and deterministic Number-on-Forehead communication

We study the power of randomness in the Number-on-Forehead (NOF) model i...
research
โˆ™ 08/04/2022

Computing Power of Hybrid Models in Synchronous Networks

During the last two decades, a small set of distributed computing models...

Please sign up or login with your details

Forgot password? Click here to reset