Gadgetless Lifting Beats Round Elimination: Improved Lower Bounds for Pointer Chasing
Abstract
We prove an communication lower bound on -round distributional complexity of the -step pointer chasing problem under uniform input distribution, improving the lower bound due to Yehudayoff (Combinatorics Probability and Computing, 2020). Our lower bound almost matches the upper bound of communication by Nisan and Wigderson (STOC 91).
As part of our approach, we put forth gadgetless lifting, a new framework that lifts lower bounds for a family of restricted protocols into lower bounds for general protocols. A key step in gadgetless lifting is choosing the appropriate definition of restricted protocols. In this paper, our definition of restricted protocols is inspired by the structure-vs-pseudorandomness decomposition by Göös, Pitassi, and Watson (FOCS 17) and Yang and Zhang (STOC 24).
Previously, round-communication trade-offs were mainly obtained by round elimination and information complexity. Both methods have some barriers in some situations, and we believe gadgetless lifting could potentially address these barriers.
Keywords and phrases:
communication complexity, lifting theorems, pointer chasingFunding:
Xinyu Mao: Supported by NSF CAREER award 2141536.Copyright and License:
![[Uncaptioned image]](x1.png)
2012 ACM Subject Classification:
Theory of computation Communication complexityAcknowledgements:
We thank Sepehr Assadi, Yuval Filmus and anonymous reviewers for their helpful comments.Editor:
Raghu MekaSeries and Publisher:

1 Introduction
Pointer chasing is a well-known problem [26] that demonstrates the power of interaction in communication and has broad applications in different areas. It was used for proving monotone constant-depth hierarchy theorem [23, 20], lower bounds on the time complexity of distributed computation [22], lower bounds on the space complexity of streaming algorithms [10, 15, 1], adaptivity hierarchy theorem for property testing [5], exponential separations in local differential privacy [16], memory bounds for continual learning [7] and limitations of the transformer architecture [24]. It is a two-party function defined below.
Definition 1 (-step pointer chasing function).
For , the -step pointer chasing function is defined as follows. Given input , for we recursively define pointers via
The output of is the parity of the last pointer, namely, .
Upper bounds
If Alice and Bob could communicate for rounds, a simple protocol is the following: Alice and Bob alternatively send or . The total communication cost for this simple protocol is . However, if Alice and Bob can only communicate rounds, the upper bound then becomes non-trivial. Nisan and Wigderson [23] proposed a randomized -round protocol with communication bits.
-
In the beginning, Alice and Bob use public randomness to pick a set of coordinates of size , and then send and to the other party.
-
On the other hand, Alice and Bob also simulate ( rounds) deterministic protocol but skip one round if one party finds that the pointer is located in .
-
If the skip round never happens, Alice and Bob simply abort at the last round. A simple calculation shows the probability of this event is low.
This randomized protocol is indeed very simple. Alice and Bob only share coordinate-wise information. In fact, this is a structured rectangle in our setting.
Lower Bounds
Consider round protocols where Alice speaks first. For deterministic protocols, Nisan and Wigderson [23] proved an communication lower bound. In the same paper, they also proved an communication lower bound for protocols that achieve accuracy under uniform input distribution.
1.1 Our results
We prove that any protocol that achieves constant advantage under uniform input distribution must communicate bits.
Theorem 2.
Let be a -round deterministic protocol for where Alice speaks first such that
Then the communication complexity of is .
By Yao’s minimax principle, it implies a lower bound for the round randomized communication complexity.
Corollary 3.
Every -round randomized protocol for with error at most (where Alice speaks first) has communication complexity .
We observe there is still a gap between our lower bound and the protocol by [23]. We conjecture that our lower bound is tight and there is a chance to remove the factor in the upper bound side. A simple deterministic protocol with rounds and communication bits could be the following: Alice and Bob send the parity of and for all in the beginning. Hence they can skip the last round as they already know the parity. This simple protocol shows that [23]’s protocol is not tight when We believe similar ideas could be extended for large .
Applications
Given the connections between and diverse applications [10, 22, 5, 16, 7, 24], our improved lower bounds automatically lead to several applications. We list two applications below.
Corollary 4 (Direct sum extension of pointer chasing).
The -round randomized communication complexity of with pairs of functions is
This corollary improves the previous lower bound presented in [10], which has applications in BFS trees streaming lower bound.
Corollary 5 (Exponential separations in local differential privacy).
Let be a -round sequentially interactive -locally private protocol solving with error probability . Then the sample complexity of is and there is a round protocol with sample complexity .
This corollary improves the previous lower bound for given by [16].
1.2 Gadgetless Lifting: A New Framework to Prove Communication Lower Bounds
The following two-step approach for proving communication lower bounds often appears in previous works (e.g., [11, 27]):
-
1.
Identify a family of structured protocols.
-
2.
Simulate general protocols by structured protocols and prove communication lower bounds for structured protocols.
This approach culminates in query-to-communication lifting theorems [12, 13, 6, 21].
Query-to-communication lifting theorems
Let be a function, and let be a two-party gadget function. The goal is to prove communication lower bounds for the function . Indeed, all functions for which lower bounds are proven using the above approach can be written as for appropriate and . For such functions, a communication protocol can always simulate a decision tree that computes – such protocols consist of a natural family of structured protocols. Communication complexity for such protocols is essentially the query complexity of , for which lower bounds are often easy to prove. Hence, the primary job is to show how to simulate general protocols by structured ones.
Though query-to-communication lifting is a beautiful framework, it requires a gadget function since is a one-party function. As a consequence, this framework only applies to lifted functions, namely, functions that can be written as . Many important problems, such as pointer chasing, do not fall into this category; hence, lifting theorems do not apply in those cases.
To address this limitation, we propose a new framework called gadgetless lifting. We take a step back to the original approach, reconsidering the choice of structured protocols. In some cases, although the function is not a lifted function, there are simple and natural protocols. The crux of gadgetless lifting is how to decide the structured protocols. In this paper, we capture it as those protocols that “all shared useful information are local information”. For example, the protocol by [23] only share local information such as or for some . In lemma 11, we show that any protocol for can be simulated by such protocols. Our proof is inspired by the structure-vs-pseudorandomness decomposition by Göös, Pitassi, and Watson [13] and Yang and Zhang [28], which is a powerful tool that emerged in the study of query-to-communication lifting theorems. Therefore, we call our method “gadgetless lifting”.
In the study of lifted functions, it has been shown that query-to-communication lifting theorems bypassed some fundamental barriers from previous methods. Similarly, gadgetless lifting can also bypass obstacles from existing methods. We discuss two of them below.
Avoiding the loss in round elimination method
Previously, the only method to prove round-communication trade-offs is the round elimination method [23]. In [23] and [29], the authors studied the pointer chasing problem via the round elimination method. Denote by the messages sent in the first rounds, and let be the pointer in the -th round, i.e., , where are uniformly chosen from . As is standard the round elimination method, [23, 29] analyzed the random variables
They proved that . Together with the fact that , it implies that . The loss (or something similar) appears in many previous works that adopt round elimination-based [23, 18, 19, 14, 10, 29]. In this paper, we avoid the loss via the gadgetless lifting.
Breaking square-root loss barrier in information complexity
Another popular method in proving communication lower bounds is by way of information complexity. However, as mentioned by Yahudayoff [29], entropy-based analyses are likely to induce a square-root loss barrier. This barrier usually comes from applying Pinsker’s inequality (or its variant) to bound statistical distance from a small entropy gap. As a consequence, many results such as [23] can only prove an lower bound.
As mentioned in [29], the square-root loss also appears in many works when using the entropy-based method to prove lower bounds. For example, it appears in the parallel repetition theorem and is related to the “strong parallel repetition” conjecture which is motivated by Khot’s unique games conjecture [17]. This loss also appears in direct-sum theorems [2] and direct-product theorems [4] in communication complexity.
[29] overcomes this square-root loss barrier by using a non-standard measurement called triangular discrimination. By contrast, our approach overcomes the barrier more naturally without using entropy.
Potential applications
We noticed that our method can also be naturally extended to multiparty settings such as the numbers in hand model. Moreover, some important open problems, such as round-communication tradeoff of bipartite matching problem [3] and set pointer chasing problem [10, 15], are difficult to solve using the round elimination method due to its inherent limitations. Our method offers the potential to solve these challenging problems.
2 Preliminaries
Notations
We use capital letters to denote a set and use bold symbols like to denote random variables. Particularly, for a set , we use to denote the random variable uniformly distributed over the set . We use to denote sampling from a distribution or choosing an element from a set uniformly at random.
2.1 Density-Restoring Partition
Min-entropy and dense distribution
For a random variable , we use to denote the support of .
Definition 6 (Min-entropy and deficiency).
The min-entropy of a random variable is defined by
Suppose that is supported on . We define the deficiency of as
For , , let be the projection of on coordinates in .
Definition 7 (Dense distribution).
Let . A random variable supported on is said to be -dense if for all nonempty , .
The following lemma is the crux of the structure-vs-pseudorandomness method by [13]. It essentially says that a flat random variable could be decomposed into a convex combination of flat random variables with disjoint support and dense properties.
Lemma 8 (Density-restoring partition).
Let . Let be a subset of and . Suppose that there exists an such that . Then, there exists a partition and every is associated with a set and a value that satisfy the following properties.
-
1.
;
-
2.
is -dense;
-
3.
, where .
The proof of this lemma, simple and elegant, is included in the appendix for completeness.
2.2 Communication Protocols
We recall basic definitions and facts about communication protocols.
Protocol Tree
Let and be the input space of Alice and Bob respectively. A deterministic communication protocol is specified by a rooted binary tree. For every internal vertex ,
-
it has 2 children, denoted by and ;
-
is owned by either Alice or Bob – we denote the owner by ;
-
every leaf node specifies an output.
Starting from the root, the owner of the current node partitions its input space into two parts and , and sets the current node to if its input belongs to .
Fact 9.
The set of all inputs that leads to an internal vertex is a rectangle, denoted by .
The communication complexity of , denoted by , is the depth of the tree. The round complexity of , is the minimum number such that in every path from the root to some leaf, the owner switches at most times. Clearly, if a protocol has round, then its communication complexity is at least . We can safely make the following assumptions for any protocol :
-
has rounds on every input; and
-
communicates bits on every input.
Indeed, for any protocol, we can add empty messages and rounds in the end, which boosts the communication complexity by a factor of 2.
3 Proof of Main Theorem
Theorem 10 (Main theorem, Theorem 2 restated).
Let be a -round deterministic protocol for where Alice speaks first such that
Then the communication complexity of is .
We use a decomposition and sampling process , as shown in Algorithm 1, in our analysis. takes as input a protocol , and samples a rectangle that is contained in for some leaf node . Our proof proceeds in three steps:
-
1.
First, Section 3.1 analyzes crucial invariants during the running of .
-
2.
Next, Section 3.2 shows that the accuracy of is captured by a quantity called average fixed size, which is a natural quantity that arises in the running of .
-
3.
Finally, Section 3.3 proves that the average fixed size can be bounded from above by . Consequently, if enjoys high accuracy, we get a lower bound of .
3.1 The Decomposition and Sampling Process
During the sampling process, we maintain a useful structure of mainly by a partitioning-then-sampling mechanism: At the beginning, is set to be the set of all inputs. Walking down the protocol tree, we decompose the rectangle into structured sub-rectangles; then we sample a decomposed rectangle with respect to its size. In the end, we arrive at a leaf node and a subrectangle of .
Lemma 11 (Loop invariant).
Set . Then in the running of , we have the following loop invariants: After each iteration,
- ()
-
;
- ()
-
are -dense;
- ()
-
there exists some such that for all ;
- ()
-
there exists some such that for all .
Proof.
Item () is true because every time is updated, is updated accordingly to a sub-rectangle of and updating into its sub-rectangles does not violate this condition.
Since we applied density restoring partition at the end of each iteration, Item () and is guaranteed by Lemma 8 and the way that are updated.
We prove the last item () by induction. Assume that the statement holds after the first iterations. WLOG, assume that at the beginning of the -th iteration, is owned by Alice. Consider the following two cases.
-
Case 1. Not a new round: Line 13 is not executed in the -th iteration. Since remains unchanged and we only update to be a sub-rectangle of itself, the statement still holds.
-
Case 2. A new round begins: Line 13 is executed and is increased by 1. Let denote the value of before Line 13, then after this iteration, we have . The induction hypothesis guarantees that there exists some such that
Due to the partition and the update in Line 11 and Line 12, . Hence, cannot be -dense as we set . Observe that after the update in Line 17, is -dense. Consequently, we must have , and by item , there exists some such that . By definition, for all ,
This is exactly the same statement after the -th iteration (as we have ).
The restricted rectangles in this loop invariant are inspired by the protocols of Nisan and Wigderson [23]. This lemma aims to capture the fact that Alice and Bob cannot get any additional useful information other than coordinate-wise information during their communication.
3.2 Relating Accuracy and Average Fixed Size
From Lemma 11 we know that the coordinates in and are fixed if we only look at the inputs in . Intuitively, the advantage of the protocol comes from such fixed coordinates, since the “alive” coordinates are dense in the sense that is -dense. This intuition is formalized in the following lemma.
Lemma 12 (Relating accuracy and avarage fixed size).
Let be a -round deterministic protocol where Alice speaks first. Then
The proof of the lemma is by the following two claims. The first claim readily says that conditioned on the flag is not raised, has little advantage in the rectangle output by . The second claim shows the probability that the flag is raised is bounded in terms of the average fixed size.
Claim 13.
If outputs and in the end, then
Claim 14.
.
Next, we first prove Lemma 12 using the above two claims, and the proof of the claims is followed.
Proof of Lemma 12.
Note that in the running of , we always update to a randomly chosen rectangle and the probability of each rectangle being chosen is proportional to its size. Consequently,
It remains to prove the two claims.
Proof of Claim 13.
WLOG, assume is odd and the protocol always has round. Let be the pointer guaranteed by the loop invariant (Lemma 11), i.e., for all . Since , we have . Again by the loop invariant, . Moreover, since is contained in some leaf node of , output the same answer in , say . Consequently,
Proof of Claim 14.
Let denote the event that the flag is raised when (i.e., when the -th round ends) for the first time. Clearly, It suffices to bound each .
Assume is odd, meaning that Alice speaks in the -th round. Let denote the randomness used for the first rounds. Let , be the sets when executing using until the -th round begins. Let be the pointer promised by the invariant. For to happen, we must have until the -th round begins, meaning that .
Note that the random variable exactly has the same distribution as . This is because, in the -th round (i.e., until steps to ), we decompose into finer sets and update to be one of them with probability proportional to their size. Therefore,
where we fix and the probability runs over , the randomness used afterward; the last inequality holds because and is -dense (by Item () in Lemma 11). Averaging over , we get
where the second inequality holds because becomes smaller and smaller during the execution.
For even ’s, we analogously have , and hence the claim follows from union bound.
3.3 Average Fixed Size is Bounded by Communication
Now that the accuracy of a protocol is bounded from above by the average fixed size (i.e., ), in what follows we show that the average fixed size is at most . Formally, we prove that
Lemma 15.
Let be a -round deterministic protocol where Alice speaks first. Then
Remark 16.
We shall set and hence the right-handed side equals .
Proof.
We shall prove this lemma by density increment argument. That is, we study the change of the density function
(1) |
in each iteration. Let be the value of at the end of the -th iteration. Assume without loss of generality Alice speaks (i.e., ) in the -th iteration.
We fix the random coins used for the first iterations and consider the updates in the current iteration.
-
1.
First, is partitioned into according to . Then, is updated to with probability . Consequently, will increase as shrinks, and in expectation (over the random choice of ) the increment is
(2) -
2.
Next, suppose that updating leads to the switch of the owner, i.e., Line 13 is triggered. Since we also partition into two parts and update with probability proportional to the size of each part, the same argument applies. That is, taking expectation over the random choice of , increases by at most 1 in expectation.
-
3.
Finally, we further partition according to Lemma 8. Say is partitioned into and let be the index sets promised by Lemma 8; and for all we have
where . With probability , we update and . Therefore, taking expectation over the random choice of , the density function will decrease by
(3) Note that and thus
(4)
Let be the -algebra generated by the random coins used for the first iterations. Let be the increment of and in the -th iteration. Observe that by definition. By Equation 3 and Equation 4, taking expectation over random choice of , decrease by at least due to the density restoring partition. Then
(5) |
where .
Write and assume we always have iterations. 111Namely, communicates bits on all inputs. In the beginning, . Since the density function is always non-negative by definition, we have and thus On the other hand, by telescoping,
where the inequality follows from Equation 5. Observe that is at most and by definition. We conclude that
as desired.
Proving the main theorem
Now our main theorem easily follows from the two lemmas.
Proof of Theorem 2.
References
- [1] Sepehr Assadi, Yu Chen, and Sanjeev Khanna. Polynomial pass lower bounds for graph streaming algorithms. In Proceedings of the 51st Annual ACM SIGACT Symposium on theory of computing, pages 265–276, 2019. doi:10.1145/3313276.3316361.
- [2] Boaz Barak, Mark Braverman, Xi Chen, and Anup Rao. How to compress interactive communication. In Proceedings of the forty-second ACM symposium on Theory of computing, pages 67–76, 2010. doi:10.1145/1806689.1806701.
- [3] Joakim Blikstad, Jan Van Den Brand, Yuval Efron, Sagnik Mukhopadhyay, and Danupon Nanongkai. Nearly optimal communication and query complexity of bipartite matching. In 2022 IEEE 63rd Annual Symposium on Foundations of Computer Science (FOCS), pages 1174–1185. IEEE, 2022. doi:10.1109/FOCS54457.2022.00113.
- [4] Mark Braverman, Anup Rao, Omri Weinstein, and Amir Yehudayoff. Direct products in communication complexity. In 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, pages 746–755. IEEE, 2013. doi:10.1109/FOCS.2013.85.
- [5] Clément L Canonne and Tom Gur. An adaptivity hierarchy theorem for property testing. computational complexity, 27:671–716, 2018. doi:10.1007/S00037-018-0168-4.
- [6] Arkadev Chattopadhyay, Yuval Filmus, Sajin Koroth, Or Meir, and Toniann Pitassi. Query-to-communication lifting for bpp using inner product. In 46th International Colloquium on Automata, Languages, and Programming (ICALP 2019). Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2019. doi:10.4230/LIPIcs.ICALP.2019.35.
- [7] Xi Chen, Christos Papadimitriou, and Binghui Peng. Memory bounds for continual learning. In 2022 IEEE 63rd Annual Symposium on Foundations of Computer Science (FOCS), pages 519–530. IEEE, 2022. doi:10.1109/FOCS54457.2022.00056.
- [8] Carsten Damm, Stasys Jukna, and Jiří Sgall. Some bounds on multiparty communication complexity of pointer jumping. Computational Complexity, 7:109–127, 1998. doi:10.1007/PL00001595.
- [9] Pavol Duris, Zvi Galil, and Georg Schnitger. Lower bounds on communication complexity. In Proceedings of the sixteenth annual ACM symposium on Theory of computing, pages 81–91, 1984. doi:10.1145/800057.808668.
- [10] Joan Feigenbaum, Sampath Kannan, Andrew McGregor, Siddharth Suri, and Jian Zhang. Graph distances in the data-stream model. SIAM Journal on Computing, 38(5):1709–1727, 2009. doi:10.1137/070683155.
- [11] Mikael Goldmann and Johan Håstad. A simple lower bound for monotone clique using a communication game. Information Processing Letters, 41(4):221–226, 1992. doi:10.1016/0020-0190(92)90184-W.
- [12] Mika Göös, Toniann Pitassi, and Thomas Watson. Deterministic communication vs. partition number. In 2015 IEEE 56th Annual Symposium on Foundations of Computer Science, pages 1077–1088. IEEE, 2015. doi:10.1109/FOCS.2015.70.
- [13] Mika Göös, Toniann Pitassi, and Thomas Watson. Query-to-communication lifting for bpp. In 2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS), pages 132–143, 2017. doi:10.1109/FOCS.2017.21.
- [14] Sudipto Guha and Andrew McGregor. Lower bounds for quantile estimation in random-order and multi-pass streaming. In Automata, Languages and Programming: 34th International Colloquium, ICALP 2007, Wrocław, Poland, July 9-13, 2007. Proceedings 34, pages 704–715. Springer, 2007. doi:10.1007/978-3-540-73420-8_61.
- [15] Venkatesan Guruswami and Krzysztof Onak. Superlinear lower bounds for multipass graph processing. Algorithmica, 76:654–683, 2016. doi:10.1007/S00453-016-0138-7.
- [16] Matthew Joseph, Jieming Mao, and Aaron Roth. Exponential separations in local differential privacy. In Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms, pages 515–527. SIAM, 2020. doi:10.1137/1.9781611975994.31.
- [17] Subhash Khot. On the power of unique 2-prover 1-round games. In Proceedings of the thiry-fourth annual ACM symposium on Theory of computing, pages 767–775, 2002. doi:10.1145/509907.510017.
- [18] Hartmut Klauck. On quantum and probabilistic communication: Las vegas and one-way protocols. In Proceedings of the thirty-second annual ACM symposium on Theory of computing, pages 644–651, 2000. doi:10.1145/335305.335396.
- [19] Hartmut Klauck, Ashwin Nayak, Amnon Ta-Shma, and David Zuckerman. Interaction in quantum communication. IEEE Transactions on Information Theory, 53(6):1970–1982, 2007. doi:10.1109/TIT.2007.896888.
- [20] Maria Klawe, Wolfgang J Paul, Nicholas Pippenger, and Mihalis Yannakakis. On monotone formulae with restricted depth. In Proceedings of the sixteenth annual ACM symposium on Theory of computing, pages 480–487, 1984.
- [21] Shachar Lovett, Raghu Meka, Ian Mertz, Toniann Pitassi, and Jiapeng Zhang. Lifting with sunflowers. Leibniz international proceedings in informatics, 215, 2022. doi:10.4230/LIPICS.ITCS.2022.104.
- [22] Danupon Nanongkai, Atish Das Sarma, and Gopal Pandurangan. A tight unconditional lower bound on distributed randomwalk computation. In Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing, pages 257–266, 2011. doi:10.1145/1993806.1993853.
- [23] Noam Nisan and Avi Widgerson. Rounds in communication complexity revisited. In Proceedings of the twenty-third annual ACM symposium on Theory of computing, pages 419–429, 1991. doi:10.1145/103418.103463.
- [24] Binghui Peng, Srini Narayanan, and Christos Papadimitriou. On limitations of the transformer architecture. arXiv preprint, 2024. doi:10.48550/arXiv.2402.08164.
- [25] Stephen J Ponzio, Jaikumar Radhakrishnan, and Srinivasan Venkatesh. The communication complexity of pointer chasing. Journal of Computer and System Sciences, 62(2):323–355, 2001. doi:10.1006/JCSS.2000.1731.
- [26] Anup Rao and Amir Yehudayoff. Communication Complexity: and Applications. Cambridge University Press, 2020.
- [27] Ran Raz and Pierre McKenzie. Separation of the monotone nc hierarchy. In Proceedings 38th Annual Symposium on Foundations of Computer Science, pages 234–243. IEEE, 1997. doi:10.1109/SFCS.1997.646112.
- [28] Guangxu Yang and Jiapeng Zhang. Communication lower bounds for collision problems via density increment arguments. In Proceedings of the 56th Annual ACM Symposium on Theory of Computing, pages 630–639, 2024. doi:10.1145/3618260.3649607.
- [29] Amir Yehudayoff. Pointer chasing via triangular discrimination. Combinatorics, Probability and Computing, 29(4):485–494, 2020. doi:10.1017/S0963548320000085.
Appendix A Appendix
The following lemma and proof are from Lemma 5 in [13].
Lemma 17 (Lemma 8 restated).
Let . Let be a subset of and . Suppose that there exists an such that . Then, there exists a partition and every is associated with a set and a value that satisfy the following properties.
-
1.
;
-
2.
is -dense;
-
3.
, where .
Proof.
We prove it by a greedy algorithm as follows.
Item 1 is guaranteed by the construction of and .
We prove Item 2 by contradiction. Assume towards contradiction that is not -dense for some . By definition, there is a nonempty set and violating the min-entropy condition, namely, Write . Then
where the first equality holds as . However, this means at moment that is chosen, the set also violates the min-entropy condition (witnessed by ), contradicting the maximality of .
Finally, Item 3 is proved by straightforward calculation: