Next Article in Journal
Relative Orderings of Modified Proportional Hazard Rate and Modified Proportional Reversed Hazard Rate Models
Previous Article in Journal
Choquet-like Integrals with Multi-Neighborhood Approximation Numbers for Novel Covering Granular Reduction Methods
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Note on the LogRank Conjecture in Communication Complexity

Department of Computer Science, Eötvös Loránd University, H-1117 Budapest, Hungary
Mathematics 2023, 11(22), 4651; https://doi.org/10.3390/math11224651
Submission received: 4 October 2023 / Revised: 9 November 2023 / Accepted: 13 November 2023 / Published: 15 November 2023
(This article belongs to the Section Mathematics and Computer Science)

Abstract

:
The LogRank conjecture of Lovász and Saks (1988) is the most famous open problem in communication complexity theory. The statement is as follows: suppose that two players intend to compute a Boolean function f ( x , y ) when x is known for the first and y for the second player, and they may send and receive messages encoded with bits, then they can compute f ( x , y ) with exchanging ( log   rank ( M f ) ) c bits, where M f is a Boolean matrix, determined by function f. The problem is widely open and very popular, and it has resisted numerous attacks in the last 35 years. The best upper bound is still exponential in the bound of the conjecture. Unfortunately, we cannot prove the conjecture, but we present a communication protocol with ( log   rank ( M f ) ) c bits, which computes a (somewhat) related quantity to f ( x , y ) . The relation is characterized by the representation of low-degree, multi-linear polynomials modulo composite numbers. Our result may help to settle this long-open conjecture.

1. Introduction

Two-player communication games were first defined by Yao in 1979 [1]. There are two players, Alice and Bob, and a Boolean function
f : { 0 , 1 } N × { 0 , 1 } N { 0 , 1 } ,
and two Boolean sequences, x , y { 0 , 1 } N . Alice knows the value of x, Bob the value of y, and they want to compute collaboratively the value of f ( x , y ) . The local computational power of the players is unlimited, and the cost of the collaborative computation is the number of bits exchanged between the parties. Function f is computed by the players if one of them knows f ( x , y ) , and the other knows that the first player knows [2].
Clearly, any f can be computed by N bits of communication; Alice tells x to Bob at cost N, and Bob computes f ( x , y ) for free. This is the trivial protocol for computing f.
We say that the players follow a communication protocol for computing f, where the protocol prescribes, in each step, the message that a player should send to the other for a given message history and input. The cost of a protocol, computing f ( x , y ) , is the maximum number of bits communicated, taken for all x and y inputs.
The communication complexity of Boolean function f is the minimum cost of protocols, which compute f. The communication complexity of f is denoted by κ ( f ) [2]. For a more formal introduction and examples, we refer to references [2,3].
The communication games and communication complexity have become a central field of theoretical computer science, hundreds of publications (e.g., references [4,5,6,7,8] and numerous books [3,9,10]) have appeared on the topic. For example, difficult-to-handle areas, such as Boolean circuit complexity, were applied to communication games for gaining the upper and lower bounds [10,11,12,13,14,15,16,17,18].
One of the main problems is finding the general upper and lower bounds for the communication complexity of f. To describe the bounds, we need to define the communication matrix of the function f:
Definition 1.
The communication matrix of f : { 0 , 1 } N × { 0 , 1 } N { 0 , 1 } is a 2 N × 2 N 0-1 matrix M f , where its rows correspond to the different x { 0 , 1 } N values, the columns to the different y { 0 , 1 } N values, and in the position of row x and column y is the value of f ( x , y ) { 0 , 1 } . Let rank ( M f ) denote the matrix rank over the rational field. Let log denote the logarithm base 2, and ln the natural logarithm.
A general lower bound, which implies that, for most of the natural communication problems (e.g., the identity function or the set disjointness), the trivial protocol is optimal, which was proved by Mehlhorn and Schmidt in 1982:
Theorem 1
([19]). Suppose that f is not the identical 0 function. Then,
κ ( f ) log rank ( M f ) .
The most famous open problem in communication complexity is the LogRank conjecture of Lovász and Saks (1988):
Conjecture 1
([20]). There exists a polynomial P, such that for all f 0 :
κ ( f ) P ( log rank ( M f ) ) .
The 35-year-old conjecture is widely open today, inspiring numerous theorems and approaches even in the last few years [21,22,23,24,25,26,27].
The best published upper bound of Lovett [8] is still exponentially far from the conjectured upper bound, for large enough rank ( M f ) :
κ ( f ) = O rank ( M f ) log rank ( M f ) .
We note that the LogRank conjecture can be formulated with the terms of graph theory as a relation between the rank of the adjacency matrix and the chromatic number of a graph [8,20], without even mentioning communication games.

2. Preliminaries

We will need some definitions and theorems from references [28,29]:
Let g : { 0 , 1 } n { 0 , 1 } be a Boolean function and let m be a positive integer. Barrington, Beigel, and Rudich [30] gave the following definition:
Definition 2.
The polynomial P with integer coefficients weakly represents Boolean function g modulo m if there exists an S { 0 , 1 , 2 , , m 1 } , such that for all x { 0 , 1 } n ,
g ( x ) = 0 P ( x ) mod m S .
Here, ( a mod m ) denotes the smallest non-negative b a mod m .
We are interested in the smallest degree polynomials representing g. Since g is Boolean, we may assume that P is multilinear (since x i 2 = x i over { 0 , 1 } n ).
Let OR n : { 0 , 1 } n { 0 , 1 } denote the n–variable OR-function:
OR n ( x 1 , x 2 , , x n ) = 0 , if x 1 = x 2 = = x n = 0 1 otherwise .
If polynomial P weakly represents OR n modulo, a prime p, then we may assume that for x { 0 , 1 } n ,
P ( x ) = 0 mod p x = ( 0 , 0 , , 0 ) .
Then,
1 P p 1 ( 1 x 1 , 1 x 2 , , 1 x n )
is clearly the n-variable AND function with a unique multi-linear form
x 1 x 2 x 3 x n .
Therefore, the degree of P is at least n / ( p 1 ) .
Tardos and Barrington [31] showed that the same conclusion holds if p is a prime power.
However, Barrington, Beigel, and Rudich [30] proved that the conclusion fails for composite moduli with at least two prime divisors:
Theorem 2
([30]). There exists an explicitly constructible polynomial P of degree O ( n 1 / r ) which weakly represents O R n modulo m = p 1 α 1 p 2 α 2 p r α r , where the p i ’s are distinct primes.
An explicit example of such a low-degree, non-trivial polynomial modulo 6 is given in Section 4.
We have applied the polynomial of Theorem 2 in reference [32] for falsifying a long-standing conjecture for the size of set systems with restricted intersections and also for giving new explicit Ramsey graph constructions, among other applications for set systems and codes described in references [13,33,34,35,36,37].
In reference [32], we reproduced a short proof of Theorem 2 from reference [30], and we proved the following:
Corollary 1.
Let m = p 1 α 1 p 2 α 2 . . . p r α r . Then, there exists an explicitly constructible polynomial P with n variables and of degree O ( n 1 / r ) which is equal to 0 on x = ( 0 , 0 , , 0 ) { 0 , 1 } n , it is nonzero mod m for all other x { 0 , 1 } n , and for all x { 0 , 1 } n and for all i { 1 , , r } , P ( x ) 0 ( mod p i α i ) or P ( x ) 1 ( mod p i α i ) .
Using the results of reference [32], we have found a remarkable application for elementary symmetric polynomials in reference [28].
We will need the following definition from reference [29] with small changes to describe the result:
Definition 3.
Let m be a composite number with prime factorization m = p 1 e 1 p 2 e 2 p e . Let Z m denote the ring of integers modulo m and Z the integers. Let f be a multi-linear polynomial of n variables over the integers:
f ( x 1 , x 2 , , x n ) = α { 0 , 1 } n a α x α ,
where a α Z , x α = i = 1 n x i α i . Then, we say that
g ( x 1 , x 2 , , x n ) = α { 0 , 1 } n b α x α ,
is an
  • alternative representation of f modulo m, if
    α { 0 , 1 } n j { 1 , 2 , , } :
    a α b α ( mod p j e j ) ;
  • 0-a-strong representation of f modulo m, if it is an alternative representation, and furthermore, if for some i, a α b α ( mod p i e i ) , then b α 0 ( mod p i e i ) ;
  • 1-a-strong representation of f modulo m, if it is an alternative representation, and furthermore, if for some i, a α b α ( mod p i e i ) , then a α 0 ( mod m ) .
That is, for modulus 6 in the alternative representation, each coefficient is correct; either modulo 2 or modulo 3, but not necessarily both.
In the 0-a-strong representation, the 0 coefficients are always correct; both modulo 2 and 3. The non-zeros are allowed to be correct in either modulo 2 or 3, and if they are not correct, one of them, say 2, then they should be 0 mod 2. Consequently, the coefficient 1 can be represented by 1, 3, or 4, but nothing else.
In the 1-a-strong representation, the non-zero coefficients of f are correct for both moduli in g, but the zero coefficients of f can be non-zero either modulo 2 or modulo 3 in g, but not both.
Remark 1
([29]). The 1-a-strong representations of polynomial f can be written in the form modulo m:
f + p 1 e 1 g 1 + p 2 e 2 g 2 + + p e g ,
where the g i have no monomials in common with each other, nor with f.
Example 1
([29]). Let m = 6 , and let f ( x 1 , x 2 , x 3 ) = x 1 x 2 + x 2 x 3 + x 1 x 3 , then g ( x 1 , x 2 , x 3 ) = 3 x 1 x 2 + 4 x 2 x 3 + x 1 x 3 is a 0-a-strong representation of f modulo 6; g ( x 1 , x 2 , x 3 ) = x 1 x 2 + x 2 x 3 + x 1 x 3 + 3 x 1 2 + 4 x 2 is a 1-a-strong representation of f modulo 6; and g ( x 1 , x 2 , x 3 ) = 3 x 1 x 2 + 4 x 2 x 3 + x 1 x 3 + 3 x 1 2 + 4 x 2 is an alternative representation modulo 6.
Remark 2.
Clearly, the 1-a-strong representation of f is not unique. Suppose that
(i) 
all coefficients of f and f are either 1 or −1 mod m, and
(ii) 
g is a 1-a-strong representation of f and also of f , where f , f and g are multilinear, homogeneous degree-d polynomials, that is, every monomials of f , f and g are degree d,
then f = f modulo m. Clearly, one can set the monomials of f or f to 1 one by one, and the p i -multiplied monomials need to be 0 in g because of homogeneity.
We proved this in reference [28] and stated it in this form in reference [29] as follows:
Theorem 3
([28]). Let the prime factorization of a positive integer m be m = p 1 e 1 p 2 e 2 p e , where > 1 . Then, a degree-2 0-a-strong representation of the second elementary symmetric polynomial
S n 2 ( x , y ) = i , j { 1 , 2 , , n } i j x i y j
modulo m:
i , j { 1 , 2 , , n } i j a i j x i y j
can be computed as the following product with coefficients from Z m :
j = 1 t i = 1 n b i j x i i = 1 n c i j y i
where t = exp ( O ( log n ( log log n ) 1 ) ) . Moreover, this representation satisfies that i j : a i j = a j i .
Now, we need the main theorem from reference [29]:
Theorem 4
([29], Theorem 6). Let m = p 1 e 1 p 2 e 2 p e , where > 1 , and p 1 , p 2 , , p are primes. Then, a degree-2, 1-a-strong representation of the dot-product f ( x 1 , x 2 , , x n , y 1 , y 2 , , y n ) = i = 1 n x i y i can be computed with t = exp ( O ( log n ( log log n ) 1 ) ) multiplications of the form
j = 1 t i = 1 n b i j x i i = 1 n c i j y i ,
where all coefficients are integers.
The proof is immediate from Theorem 3 by subtracting the 0-a-strong representation of S n 2 ( x , y ) from ( x 1 + x 2 + + x n ) ( y 1 + y 2 + + y n ) [29], and t = t + 1 .
An explicit example for the b i j and c i j coefficients, with m = 6 , n = 16 , t = 13 , can be found in Section 4.

3. The LogRank Protocol

Theorem 5.
Let n 3 be an integer, m = p 1 p 2 p be the product of the first = log log n primes. Then, with ( log n ) c 2 bits of communication, with a positive constant c 2 , Alice and Bob can compute the value for any integer substitutions for x = ( x 1 , x 2 , , x n ) and any rational substitutions for y = ( y 1 , y 2 , , y n ) of the 1-a-strong representation g modulo m of the dot-product polynomial i = 1 n x i y i :
g ( x , y ) = i = 1 n x i y i + p 1 g 1 ( x , y ) + p 2 g 2 ( x , y ) + + p g ( x , y ) ,
where for i = 1 , 2 , , , polynomials g i ( x , y ) are homogeneous quadratic polynomials without common monomials.
Proof. 
Since m = p 1 p 2 p is the product of the first primes, m = e ( 1 + o ( 1 ) ) ln , by the estimation of the first Chebyshev number [38]. Substituting = log log n we ascertain that any non-negative integers up to m can be given with less than ( log log n ) c bits, with a c > 0 .
For any integer substitutions for x = ( x 1 , x 2 , , x n ) , Alice can compute privately and communicate for j = 1 , 2 , t the mod m values of sums from (3):
i = 1 n b i j x i
for each j with ( log log n ) c bits.
Since
t exp ( O ( ( log n ) 1 / log log n ) ) exp ( c 1 log log n ) ( log n ) c 1 ,
with a positive c 1 , the total communication of Alice is polylogarithmic in n. Since Bob knows the values of y i , for i = 1 , 2 , , n ; he, privately, without any communication, computes the value of (3).
The following corollary is our main result here:
Corollary 2.
Suppose that we have a Boolean function F : { 0 , 1 } N × { 0 , 1 } N { 0 , 1 } , with a 2 N × 2 N 0-1 communication matrix M F with rank ( M F ) = n over the rationals, n 2 N . By the definition of the rank, one may choose n linearly independent 0-1 columns of M F , let the 2 N × n 0-1 matrix X contain these columns. Then, there exists an n × 2 N rational matrix Y, such that M F = X Y . Now, any element of communication matrix M F is the dot product of a length-n row of X and a length-n column of Y. From Theorem 5, the substitution of the 1-a-strong representation of this dot product can be computed modulo m as with polylogarithmic communication in the rank n, i.e., with ( log n ) c 2 bits of communication.
Here, we describe our protocol.
(i)
First, we may assume that both players know the rank decomposition of the communication matrix of F: M F = X Y .
(ii)
Alice substitutes the integer values of the x i numbers for i = 1 , 2 , , n into (5) for each j, and communicates the mod m values of the (5) sums for j = 1 , 2 , , t to Bob.
(iii)
Bob knows the values of y i , for i = 1 , 2 , , n . Consequently, he, privately, without any communication, computes the value of (3).
Communication occurs only in step (ii), when t ( log n ) c 1 mod m values are transmitted, each with ( log log n ) c bits.
Remark 3.
For a given M f , the players can agree that they will compute the k F ( x , y ) instead of F ( x , y ) , and then matrix Y can be changed for an integer matrix k Y . Note also that this convention will not increase the communication, since Bob does not communicate the linear combinations of his variables.

4. Remarks and Examples

Note that the “surplus” terms in (4) are zero modulo for at least one of the prime divisors of m.
Remark 4.
We do not know how to eliminate the surplus terms with the g i polynomials from ( 4 ) with a log-rank bounded additional communication. One can imagine numerous possible approaches, for example, substituting a prime p i , 1 i for all or just a subset of 1s in the x i s, and repeating the protocol, repeating the protocol above for 0-1 rows instead of 0-1 columns, or repeating the protocol above for overlaying subsets of indices i = 1 , 2 , , n several times.
Remark 5.
As we described in reference [29], Theorem 4 has numerous applications in representing the matrix product with very few multiplications or the hyperdense coding of numbers, vectors or matrices. We also note that our definition and use of the term "hyperdense coding" [39] precedes the quantum-computational use of an unrelated but identically named term of [40,41] by more than 9 years.
Here, we give an example for a polynomial that we presented in reference [32]:
Example 2
([32]). Let m = 6 , and let
G 1 ( x ) = j = 1 2 3 1 ( 1 ) j + 1 s j ( x ) ,
and
G 2 ( x ) = j = 1 3 2 1 ( 1 ) j + 1 s j ( x ) .
Then,
P ( x ) = 3 G 1 ( x ) + 4 G 2 ( x )
weakly represents O R 71 modulo 6, and its degree is only 8.
Example 3.
Here, we give an explicit example for the coefficients in Theorem 4 (3).
Let m = 6 , n = 16 , t = 13 and let B be a 16 × 13 matrix, C be a 13 × 16 matrix mod 6, then A = B C mod 6 is a 16 × 16 matrix with 1’s in the main diagonal and 0s either mod 2 or mod 3 or both outside the main diagonal:
B = 1 0 1 1 4 1 4 4 3 1 4 4 4 1 1 0 4 1 4 1 3 4 4 1 3 3 1 1 4 0 1 4 3 1 4 4 3 1 3 1 4 1 1 0 3 4 4 1 3 4 4 4 1 1 4 4 3 0 1 1 4 4 3 3 1 1 4 1 3 4 1 0 4 1 3 4 4 4 1 4 3 1 4 1 4 0 1 3 4 4 4 1 3 4 4 1 4 1 1 0 4 3 3 3 1 1 4 4 3 4 3 3 4 0 1 1 1 1 4 1 3 4 3 4 4 3 1 0 4 4 1 4 3 1 4 3 4 4 3 1 4 0 4 1 3 4 4 1 4 3 3 4 4 1 1 3 1 4 3 3 4 1 4 4 3 1 4 4 0 1 3 4 4 3 4 1 3 4 4 1 3 1 1 3 4 4 3 4 3 1 4 4 3 1 1 1 4 3 3 4 3 4 4 1 3 4 4 4
C = 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 1 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 1 1 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 1 0 0 1 1 0 0 0 0 0 0 1 0 0 0 0 1 0 1 0 1 0 0 0 0 0 0 0 1 0 0 0 1 0 1 1 2 0 0 0 0 0 0 0 0 1 0 0 1 0 1 1 2 0 0 0 0 0 0 0 0 0 1 0 1 0 1 0 1 0 0 0 0 0 0 0 0 0 0 1 1 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1
A = B C = 1 0 0 3 0 3 3 2 0 3 3 2 3 2 2 3 0 1 3 0 3 0 2 3 3 0 2 3 2 3 3 2 0 3 1 0 3 2 0 3 3 2 0 3 2 3 3 2 3 0 0 1 2 3 3 0 2 3 3 0 3 2 2 3 0 3 3 2 1 0 0 3 3 2 2 3 0 3 3 2 3 0 2 3 0 1 3 0 2 3 3 2 3 0 2 3 3 2 0 3 0 3 1 0 2 3 3 2 3 2 0 3 2 3 3 0 3 0 0 1 3 2 2 3 2 3 3 0 0 3 3 2 3 2 2 3 1 0 0 3 0 3 3 2 3 0 2 3 2 3 3 2 0 1 3 0 3 0 2 3 3 2 0 3 2 3 3 2 0 3 1 0 3 2 0 3 2 3 3 0 3 2 2 3 3 0 0 1 2 3 3 0 3 2 2 3 0 3 3 2 0 3 3 2 1 0 0 3 2 3 3 2 3 0 2 3 3 0 2 3 0 1 3 0 2 3 3 2 3 2 0 3 3 2 0 3 0 3 1 0 3 2 2 3 2 3 3 0 2 3 3 0 3 0 0 1
If we take the dot product of column j of B each with ( x 1 , x 2 , , x n ) , then we will obtain the t left sums of (3):
i = 1 n b i j x i
If we take the dot product of row j of C each with ( x 1 , x 2 , , x n ) , then we will obtain the t right sums of (3):
i = 1 n c i j y i
Now, clearly, in (3) one can obtain the coefficient of x u y v by computing the dot product of row u of B with column v of C; that is, matrix A describes the coefficients of the mod 6 representation of the dot product f ( x 1 , x 2 , , x n , y 1 , y 2 , , y n ) = i = 1 n x i y i ; all the elements of the main diagonal are 1, and the others are 0 mod 2 or mod 3 or both.
For readers wishing to experiment with these matrices, a Maple worksheet can be accessed at https://grolmusz.pitgroup.org/?attachment_id=1840, accessed on 3 October 2023.

Funding

V.G. was partially funded by the Ministry of Innovation and Technology of Hungary from the National Research, Development and Innovation Fund, financed under the ELTE TKP 2021-NKTA-62 funding scheme.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Yao, A.C. Some Complexity Questions Related to Distributed Computing. In Proceedings of the 11th Annual ACM Symposium on Theory of Computing, Atlanta, GA, USA, 30 April–2 May 1979; pp. 209–213. [Google Scholar]
  2. Lovász, L. Communication complexity: A survey. In Paths, Flows, and VLSI-Layout; Korte, B., Lovász, L., Prömel, H., Schrijver, A., Eds.; Springer: Berlin/Heidelberg, Germany, 1989; pp. 235–265. [Google Scholar]
  3. Kushilevitz, E.; Nisan, N. Communication Complexity; Cambridge University Press: Cambridge, UK, 1997. [Google Scholar]
  4. Nisan, N. The communication complexity of threshold gates. In Combinatorics, Paul Erdős Is Eighty, Volume I; Sós, V.T., Miklós, D., Szőnyi, T., Eds.; János Bolyai Mathematical Society: Budapest, Hungary, 1993; pp. 301–315. [Google Scholar]
  5. Nisan, N.; Wigderson, A. On rank vs. communication complexity. In Proceedings of the 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, 20–22 November 1994; pp. 831–836. [Google Scholar]
  6. Babai, L.; Nisan, N.; Szegedy, M. Multiparty Protocols, Pseudorandom Generators for Logspace, and Time-Space Trade-Offs. J. Comput. Syst. Sci. 1992, 45, 204–232. [Google Scholar] [CrossRef]
  7. Grolmusz, V. The BNS lower bound for multi-party protocols is nearly optimal. Inform. Comput. 1994, 112, 51–54. [Google Scholar] [CrossRef]
  8. Lovett, S. Communication is Bounded by Root of Rank. J. ACM 2016, 63, 1–9. [Google Scholar] [CrossRef]
  9. Rao, A.; Yehudayoff, A. Communication Complexity; Cambridge University Press: Cambridge, UK, 2020. [Google Scholar] [CrossRef]
  10. Karchmer, M. Communication Complexity; ACM Doctoral Dissertation Award; MIT Press: Cambridge, MA, USA, 1989. [Google Scholar]
  11. Håstad, J.; Goldmann, M. On the Power of the Small-Depth Threshold Circuits. Comput. Complex. 1991, 1, 113–129. [Google Scholar] [CrossRef]
  12. Grolmusz, V. A lower bound for depth-3 circuits with mod m gates. Inform. Proc. Lett. 1998, 67, 87–90. [Google Scholar] [CrossRef]
  13. Grolmusz, V. A Degree-Decreasing Lemma for (MODqMODp) Circuits. Discret. Math. Theor. Comput. Sci. 2001, 4, 247–254. [Google Scholar]
  14. Grolmusz, V. Separating the communication complexities of MOD m and MOD p circuits. J. Comput. Syst. Sci. 1995, 51, 307–313. [Google Scholar] [CrossRef]
  15. Grolmusz, V. On the Weak mod m Representation of Boolean Functions. Chic. J. Theor. Comput. Sci. 1995, 1995, 2. [Google Scholar]
  16. Grolmusz, V.; Tardos, G. Lower Bounds for (MOD p-MOD m) Circuits. SIAM J. Comput. 2000, 29, 1209–1222. [Google Scholar] [CrossRef]
  17. Grolmusz, V. Harmonic Analysis, Real Approximation, and the Communication Complexity of Boolean Functions. Algorithmica 1999, 23, 341–353. [Google Scholar] [CrossRef]
  18. Karchmer, M.; Newman, I.; Saks, M.E.; Wigderson, A. Non-deterministic Communication Complexity with Few Witness. J. Comput. Syst. Sci. 1994, 49, 247–257. [Google Scholar] [CrossRef]
  19. Mehlhorn, K.; Schmidt, E. Las Vegas is better than determinism in VLSI and distributive computing. In Proceedings of the 14th Annual ACM Symposium on Theory of Computing, San Francisco, CA, USA, 5–7 May 1982; pp. 330–337. [Google Scholar]
  20. Lovász, L.; Saks, M. Lattices, Möbius functions, and communication complexity. In Proceedings of the 29th Annual Symposium on Foundations of Computer Science, White Plains, NY, USA, 24–26 October 1988; pp. 81–90. [Google Scholar]
  21. Singer, N.; Sudan, M. Point-hyperplane Incidence Geometry and the Log-rank Conjecture. Acm Trans. Comput. Theory 2022, 14, 1–16. [Google Scholar] [CrossRef]
  22. Wu, H.L. On the Communication Complexity of AND Functions. IEEE Trans. Inf. Theory 2021, 67, 4929–4935. [Google Scholar] [CrossRef]
  23. Gál, A.; Syed, R. Upper Bounds on Communication in Terms of Approximate Rank. In Computer Science—Theory and Applications; Springer International Publishing: Berlin/Heidelberg, Germany, 2021; pp. 116–130. [Google Scholar] [CrossRef]
  24. Knop, A.; Lovett, S.; McGuire, S.; Yuan, W. Log-rank and lifting for AND-functions. In Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing, Virtual, 21–25 June 2021. [Google Scholar] [CrossRef]
  25. Chattopadhyay, A.; Mande, N.S.; Sherif, S. The Log-Approximate-Rank Conjecture Is False. J. ACM 2020, 67, 23. [Google Scholar] [CrossRef]
  26. Kol, G.; Moran, S.; Shpilka, A.; Yehudayoff, A. Approximate Nonnegative Rank is Equivalent to the Smooth Rectangle Bound. Comput. Complex. 2019, 28, 1–25. [Google Scholar] [CrossRef]
  27. Sinha, M.; de Wolf, R. Exponential Separation between Quantum Communication and Logarithm of Approximate Rank. In Proceedings of the 2019 IEEE 60th Annual Symposium on Foundations of Computer Science (FOCS), Baltimore, MD, USA, 9–12 November 2019. [Google Scholar] [CrossRef]
  28. Grolmusz, V. Computing Elementary Symmetric Polynomials with a Sub-Polynomial Number of Multiplications. SIAM J. Comput. 2003, 32, 1475–1487. [Google Scholar] [CrossRef]
  29. Grolmusz, V. Modular Representations of Polynomials: Hyperdense Coding and Fast Matrix Multiplication. IEEE Trans. Inf. Theory 2008, 54, 3687–3692. [Google Scholar] [CrossRef]
  30. Barrington, D.A.M.; Beigel, R.; Rudich, S. Representing Boolean functions as polynomials modulo composite numbers. Comput. Complex. 1994, 4, 367–382. [Google Scholar] [CrossRef]
  31. Tardos, G.; Barrington, D.A.M. A Lower Bound on the MOD 6 Degree of the OR Function. Comput. Complex. 1998, 7, 99–108. [Google Scholar] [CrossRef]
  32. Grolmusz, V. Superpolynomial size set systems with restricted intersections mod 6 and explicit Ramsey graphs. Combinatorica 2000, 20, 1–14. [Google Scholar] [CrossRef]
  33. Grolmusz, V. Set-Systems with Restricted Multiple Intersections. Electron. J. Comb. 2002, 9, e1625. [Google Scholar] [CrossRef] [PubMed]
  34. Grolmusz, V. Constructing set-systems with prescribed intersection sizes. J. Algorithms 2002, 44, 321–337. [Google Scholar] [CrossRef]
  35. Grolmusz, V. A Note on Explicit Ramsey Graphs and Modular Sieves. Combinatorics, Probability and Computing 2003, 12, 565–569. [Google Scholar] [CrossRef]
  36. Grolmusz, V. Co-Orthogonal Codes. Des. Codes Cryptogr. 2006, 38, 363–372. [Google Scholar] [CrossRef]
  37. Grolmusz, V. Pairs of codes with prescribed Hamming distances and coincidences. Des. Codes Cryptogr. 2006, 41, 87–99. [Google Scholar] [CrossRef]
  38. Hardy, G.H.; Wright, E.M. An Introduction to the Theory of Numbers, 5th ed.; Clarendon Press: Oxford, UK, 1995. [Google Scholar]
  39. Grolmusz, V. Hyperdense Coding Modulo 6 with Filter-Machines. arXiv 2003, arXiv:cs/0306049. [Google Scholar]
  40. Imre, S. Quantum Hyperdense Coding for Distributed Communications. arXiv 2012, arXiv:1210.2856. [Google Scholar]
  41. Bebrov, G. On the Hyperdense Coding and Proposal of Hyperdense Coding Quantum Secure Communication Protocol. In Proceedings of the Quantum Information and Measurement (QIM) V: Quantum Technologies, Rome, Italy, 4–6 April 2019; Optica Publishing Group: Washington, DC, USA, 2019; p. T5A.49. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Grolmusz, V. A Note on the LogRank Conjecture in Communication Complexity. Mathematics 2023, 11, 4651. https://doi.org/10.3390/math11224651

AMA Style

Grolmusz V. A Note on the LogRank Conjecture in Communication Complexity. Mathematics. 2023; 11(22):4651. https://doi.org/10.3390/math11224651

Chicago/Turabian Style

Grolmusz, Vince. 2023. "A Note on the LogRank Conjecture in Communication Complexity" Mathematics 11, no. 22: 4651. https://doi.org/10.3390/math11224651

APA Style

Grolmusz, V. (2023). A Note on the LogRank Conjecture in Communication Complexity. Mathematics, 11(22), 4651. https://doi.org/10.3390/math11224651

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop