{"@context":"https:\/\/schema.org\/","@type":"ScholarlyArticle","@id":"#article11950","name":"Classical Algorithms from Quantum and Arthur-Merlin Communication Protocols","abstract":"In recent years, the polynomial method from circuit complexity has been applied to several fundamental problems and obtains the state-of-the-art running times (e.g., R. Williams's n^3 \/ 2^{Omega(sqrt{log n})} time algorithm for APSP). As observed in [Alman and Williams, STOC 2017], almost all applications of the polynomial method in algorithm design ultimately rely on certain (probabilistic) low-rank decompositions of the computation matrices corresponding to key subroutines. They suggest that making use of low-rank decompositions directly could lead to more powerful algorithms, as the polynomial method is just one way to derive such a decomposition.\nInspired by their observation, in this paper, we study another way of systematically constructing low-rank decompositions of matrices which could be used by algorithms - communication protocols. Since their introduction, it is known that various types of communication protocols lead to certain low-rank decompositions (e.g., P protocols\/rank, BQP protocols\/approximate rank). These are usually interpreted as approaches for proving communication lower bounds, while in this work we explore the other direction.\nWe have the following two generic algorithmic applications of communication protocols: \n- Quantum Communication Protocols and Deterministic Approximate Counting. Our first connection is that a fast BQP communication protocol for a function f implies a fast deterministic additive approximate counting algorithm for a related pair counting problem. Applying known BQP communication protocols, we get fast deterministic additive approximate counting algorithms for Count-OV (#OV), Sparse Count-OV and Formula of SYM circuits. In particular, our approximate counting algorithm for #OV runs in near-linear time for all dimensions d = o(log^2 n). Previously, even no truly-subquadratic time algorithm was known for d = omega(log n). \n- Arthur-Merlin Communication Protocols and Faster Satisfying-Pair Algorithms. Our second connection is that a fast AM^{cc} protocol for a function f implies a faster-than-bruteforce algorithm for f-Satisfying-Pair. Using the classical Goldwasser-Sisper AM protocols for approximating set size, we obtain a new algorithm for approximate Max-IP_{n,c log n} in time n^{2 - 1\/O(log c)}, matching the state-of-the-art algorithms in [Chen, CCC 2018].\nWe also apply our second connection to shed some light on long-standing open problems in communication complexity. We show that if the Longest Common Subsequence (LCS) problem admits a fast (computationally efficient) AM^{cc} protocol (polylog(n) complexity), then polynomial-size Formula-SAT admits a 2^{n - n^{1-delta}} time algorithm for any constant delta > 0, which is conjectured to be unlikely by a recent work [Abboud and Bringmann, ICALP 2018]. The same holds even for a fast (computationally efficient) PH^{cc} protocol.","keywords":["Quantum communication protocols","Arthur-Merlin communication protocols","approximate counting","approximate rank"],"author":[{"@type":"Person","name":"Chen, Lijie","givenName":"Lijie","familyName":"Chen","affiliation":"Massachusetts Institute of Technology, Cambridge, MA, USA"},{"@type":"Person","name":"Wang, Ruosong","givenName":"Ruosong","familyName":"Wang","affiliation":"Carnegie Mellon University, Pittsburgh, PA, USA"}],"position":23,"pageStart":"23:1","pageEnd":"23:20","dateCreated":"2019-01-08","datePublished":"2019-01-08","isAccessibleForFree":true,"license":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/legalcode","copyrightHolder":[{"@type":"Person","name":"Chen, Lijie","givenName":"Lijie","familyName":"Chen","affiliation":"Massachusetts Institute of Technology, Cambridge, MA, USA"},{"@type":"Person","name":"Wang, Ruosong","givenName":"Ruosong","familyName":"Wang","affiliation":"Carnegie Mellon University, Pittsburgh, PA, USA"}],"copyrightYear":"2019","accessMode":"textual","accessModeSufficient":"textual","creativeWorkStatus":"Published","inLanguage":"en-US","sameAs":"https:\/\/doi.org\/10.4230\/LIPIcs.ITCS.2019.23","publisher":"Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik","citation":"http:\/\/arxiv.org\/abs\/1811.02078","isPartOf":{"@type":"PublicationVolume","@id":"#volume6327","volumeNumber":124,"name":"10th Innovations in Theoretical Computer Science Conference (ITCS 2019)","dateCreated":"2019-01-08","datePublished":"2019-01-08","editor":{"@type":"Person","name":"Blum, Avrim","givenName":"Avrim","familyName":"Blum"},"isAccessibleForFree":true,"publisher":"Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik","hasPart":"#article11950","isPartOf":{"@type":"Periodical","@id":"#series116","name":"Leibniz International Proceedings in Informatics","issn":"1868-8969","isAccessibleForFree":true,"publisher":"Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik","hasPart":"#volume6327"}}}