Catalytic Communication
Abstract
The study of space-bounded computation has drawn extensively from ideas and results in the field of communication complexity. Catalytic Computation (Buhrman, Cleve, Koucký, Loff and Speelman, STOC 2013) studies the power of bounded space augmented with a pre-filled hard drive that can be used non-destructively during the computation. Presently, many structural questions in this model remain open. Towards a better understanding of catalytic space, we define a model of catalytic communication complexity and prove new upper and lower bounds.
In our model, Alice and Bob share a blackboard with a tiny number of free bits, and a larger section with an arbitrary initial configuration. They must jointly compute a function of their inputs, communicating only via the blackboard, and must always reset the blackboard to its initial configuration. We prove several upper and lower bounds:
-
1.
We characterize the simplest nontrivial model, that of one bit of free space and three rounds, in terms of rank. In particular, we give natural problems that are solvable with a minimal-sized blackboard that require near-maximal (randomized) communication complexity, and vice versa.
-
2.
We show that allowing constantly many free bits, as opposed to one, allows an exponential improvement on the size of the blackboard for natural problems. To do so, we connect the problem to existence questions in extremal graph theory.
-
3.
We give tight connections between our model and standard notions of non-uniform catalytic computation. Using this connection, we show that with an arbitrary constant number of rounds and bits of free space, one can compute all functions in .
We view this model as a step toward understanding the value of filled space in computation.
Keywords and phrases:
Catalytic computation, Branching programs, Communication complexityCopyright and License:
2012 ACM Subject Classification:
Theory of computation Communication complexityAcknowledgements:
We thank Ryan Williams for guidance and suggesting the question of catalytic communication complexity, and Carl Schildkraut for helpful discussion about Ruzsa–Szemerédi graphs.Editors:
Raghu MekaSeries and Publisher:
Leibniz International Proceedings in Informatics, Schloss Dagstuhl – Leibniz-Zentrum für Informatik
1 Introduction
Communication complexity has proven an essential tool in analyzing the power of space in computation. For the well-studied problem of derandomizing space-bounded computation, i.e. proving , the frontier pseudorandom generators of [36, 31] are analyzed by considering the space-bounded algorithm as a communication protocol. There has been extensive work analyzing restricted classes of space-bounded algorithms, again relying on this connection [9, 40, 16]. Other works have tightly characterized the space required to solve fundamental problems such as estimating the bias of a coin [10, 7, 8], using sophisticated measures of information complexity.
Concurrently, a new model of bounded-space computation known as catalytic computation was introduced by Buhrman, Cleve, Koucký, Loff and Speelman [13], and used to solve fundamental computational problems more efficiently. In the Catalytic Logspace () model, an algorithm receives an -bit input, bits of standard working space, and an auxiliary bit catalytic tape . This tape has an arbitrary initial configuration, and must be reset to that starting configuration at the end of the computation. Despite a possible intuition that such a tape would not be useful, they showed that is likely to be strictly stronger than – in particular, it contains logspace-uniform , and thus nondeterministic logspace (). Recently, Cook and Mertz used catalytic algorithms to show that the tree-evaluation problem, a candidate problem for separating and , can in fact be solved by an algorithm running in space , contradicting long-standing prior beliefs [18, 19, 21]. Due to the striking power of this model, there have been many followup papers studying its structure [22, 15, 28, 39]. In the other direction, [17] used tools from the space-bounded literature (in particular, communication bottlenecks) to unconditionally derandomize . However, many basic questions remain open – it is consistent with current knowledge that , or that , and there is no conditional evidence in either direction.
We aim to understand the power of access to a full memory by developing and studying the phenomenon in the setting of communication complexity – to what extent can such un-erasable extra memory be useful in exchanging information between two (computationally unbounded) parties?
1.1 Our Contribution: Catalytic Communication Complexity
We develop a natural model of catalytic communication complexity and prove several results, including maximal separations from the standard model of (randomized) communication complexity, a characterization of efficient protocols for the equality function in terms of extremal graph theory, and a strong equivalence between certain settings of the model and (nonuniform) catalytic computation itself.
Our model is defined as follows. There are two parties, Alice and Bob (perhaps graduate students coming to work on alternating days), sharing a single blackboard. Each party is computationally unbounded, but has no persistent memory between days, except what is written on the blackboard. Unfortunately, all but a tiny corner of the blackboard is currently full of someone else’s important research, with instructions not to erase. Are Alice and Bob limited to sharing information through the tiny blank space, or can they do better by temporarily modifying the “Do Not Erase” section in such a way that still allows them to restore it when they’re done? If they want to compute some function together, how big does the blackboard need to be, and how many days will they need? Such a model naturally captures the flow of information in a catalytic algorithm. The formal definition is as follows:
Definition 1 (Catalytic Communication Protocol).
Fix a function .111We will typically be concerned with the case , but will also consider functions with asymmetric input lengths A catalytic protocol computing with rounds, bits of clean space, and bits of catalytic space consists of many transition functions and one output function,
(If is even, we will instead have and .) For the protocol to be valid, for any , , , letting and , these functions must satisfy
for some with
In words, Alice and Bob’s blackboard consists of bits of arbitrarily-initialized catalytic space and bits of initially-empty clean space. In a given round, the active party modifies the blackboard according to some arbitrary function of its current contents, the input visible to the active party, and the current timestep, then passes the blackboard to the other party. At the end of the protocol, the catalytic part of the blackboard must have been reset to its starting configuration, and the party with the blackboard must be able to announce the answer. Readers familiar with catalytic computing may observe that such a protocol could be described as an amortized bipartite branching program; this interpretation is the motivation for the particulars of our definition, and will be discussed in more detail in Section 6.
This model induces a corresponding measure of communication complexity:
Definition 2 (Catalytic Communication Complexity).
The -round -clean catalytic communication complexity of a function , denoted , is the minimum value of such that has an -round catalytic protocol with bits of clean space and bits of catalytic space.
The following three propositions represent simple observations about catalytic communication, demonstrating that this complexity measure is both well-defined and interesting. We give only the statements here; the associated proofs can be found in Appendix A. First note that with fewer than rounds, the catalytic space is provably useless – in particular, this means that and are not well-defined for every , since there may be no amount of catalytic space that suffices:
Proposition 3.
Any function computable by a catalytic protocol with 1 or 2 rounds is computable by such a protocol with no catalytic space (i.e. there exists a memoryless protocol with the same amount of clean space, so without loss of generality only the clean space is used).
For , , however, with enough catalytic space it is possible to compute any function, so is always well-defined:
Proposition 4.
Every function has a 3-round catalytic protocol with bit of clean space and bits of catalytic space.
Proposition 4 represents an upper bound on catalytic communication complexity in general, but it is far from tight for some functions. Recall the inner product function (over ) , defined as . We show that can be computed with one bit of clean space and bits of catalytic space:
Proposition 5.
We have , i.e. the inner product function has a 3-round catalytic protocol with bit of clean space and bits of catalytic space.
Note that this protocol is roughly as efficient as a catalytic protocol can possibly be: as long as is left-injective (i.e. no two values of result in the same function ), it is clear for information theoretic reasons that the catalytic space cannot be made much less than bits, and certainly the clean space required for any non-constant must be at least 1 bit – so inner product is essentially the easiest possible function for this model. This is in contrast to standard notions of communication complexity: inner product has, up to constant factors, maximal deterministic and randomized communication complexity [41]. Such a separation even for a single bit of clean space indicates that the “picture” of catalytic communication can diverge widely from that of standard models.
Furthermore, unlike deterministic and randomized communication complexity, there does not appear to be a direct counting argument showing that a random function requires any amount of catalytic space larger than the trivial bound of . Despite this barrier, we give a tight characterization of protocols with one bit of clean space and three rounds. As our first main result, we show that is characterized up to a constant factor by rank:
Theorem 6.
For any ,
where denotes the rank of the communication matrix over .
The proof of the upper bound of Theorem 6 is an explicit protocol, while the lower bound involves an application of Harper’s vertex-isoperimetric theorem on an appropriate subspace of the Boolean hypercube. We remark that several standard communication complexity measures are suspected to be closely controlled by appropriate notions of the rank of the communication matrix, but this case is unusual in that it is the rank over , as opposed to , that is relevant.
This establishes catalytic communication complexity as a very different measure from standard ones. In particular, if one compares catalytic communication complexity against standard randomized communication complexity222Comparing against deterministic standard communication complexity, we would instead find that catalytic communication is strictly stronger, in the sense that is always at most the deterministic communication complexity of ., there are maximal separations for natural functions in both directions. Inner product has a maximally efficient -round -clean catalytic communication protocol but no standard randomized communication protocol with communication less than the trivial . On the other hand, the equality function has but randomized communication complexity [41].
The lower bound approach we use for does not extend to , i.e. protocols with a single extra bit of clean space. This is not simply a consequence of technical limitations – we show that for equality, allowing a single additional bit of clean space enables an exponentially more efficient protocol:
Theorem 7.
We have that .
Our protocol for equality follows from a connection to a new variant we propose of the well-known Ruzsa–Szemerédi problem in extremal graph theory. We demonstrate that efficient 3-round catalytic protocols for equality can be obtained generically from constructions of “full Ruzsa–Szemerédi graphs”, a special case of Ruzsa–Szemerédi graphs. We show that the current frontier Ruzsa–Szemerédi construction can be modified to satisfy our stronger condition, and hence obtain an efficient protocol. We also show a reverse implication – that is, that efficient protocols imply dense Ruzsa–Szemerédi constructions – enabling us to obtain nontrivial lower bounds for the complexity of equality:
Theorem 8.
For any constant , we have .
In addition to this unconditional lower bound, the connection to Ruzsa–Szemerédi graphs also gives a barrier result: improving our upper bound to would yield (among other things) a polynomial query lower bound for testing monotonicity of Boolean functions over general posets.
Towards obtaining lower bounds stronger than , we propose considering protocols for the indexing problem , . Here, Alice’s input is a length- bitstring representing an index, and Bob’s input is a length- bitstring, with the output of the function being the bit of Bob’s input corresponding to Alice’s index. Another description of this problem is that Alice is given some -bit input, and Bob is given the truth table of some arbitrary boolean function on -bit inputs, and they must compute the evaluation of Bob’s function on Alice’s input. It is clear from this phrasing that proving a complexity lower bound on any function in terms of Alice’s input length would require proving at least as strong a lower bound on , as any other function is a special case. We find a graph theoretic characterization of protocols for this problem, which allows us to show a non-trivial lower bound via the Kővári-Sós-Turán theorem.
Theorem 9.
We have , for some constant depending on .
While we suspect Theorem 9 is far from tight, it remains open to show super-linear lower bounds even for clean bits.
Finally, we study protocols with more rounds. We note that our measure of catalytic communication complexity corresponds directly to the minimum amount of amortization required in an amortized bipartite branching program of bounded length. Since an ordinary branching program is in particular a bipartite branching program, this immediately lets us translate known results from nonuniform catalytic computing to show statements such as for all . By a more specialized analysis of Buhrman, Cleve, Koucký, Loff and Speelman’s algebraic proof of , we are also able to show the following:
Theorem 10.
Let be any function computable by a size , depth majority circuit with arbitrary input preprocessing – that is, there exists a depth- circuit composed of many majority gates, and arbitrary functions , such that . Then, .
This implies in particular that any function family has constant-round, 1-clean catalytic protocols with catalytic space.
We view these results as indicating that catalytic communication complexity is both an interesting model in its own right, and one that can shed light on reusing space more generally. We remark that our model addresses a question raised in prior work on variants of communication complexity, which we now discuss.
1.2 Related Work
Identifying an interesting communication analogue of catalytic computing was posed as an open problem by Arunachalam and Podder in a paper on space-bounded communication [2]. Space-bounded communication complexity was first studied by Brody, Chen, Papakonstantinou, Song and Sun, who proposed a model in which the two parties in a standard communication protocol are in addition required to compress each of their states into a small number of bits after each message is sent [11]. Subsequent work by Papakonstantinou, Scheder, and Song considered a one-way model, in which Alice (a party with unbounded memory) sends messages of length to Bob (a party with zero, or only constant, memory) – they showed that when Bob is memoryless, this model can be characterized in terms of a combinatorial notion of rectangle overlays, and when Bob has only 5 available memory states and this model computes exactly [37]. Arunachalam and Podder suggested instead letting both Alice and Bob be memoryless, and measuring complexity in terms of the size of a block of memory they pass back and forth [2]. They noted that this model aligns closely with bipartite branching program complexity, and that variants could capture the aforementioned models of Brody, Chen, Papakonstantinou, Song and Sun [11] and Papakonstantinou, Scheder and Song [37], as well as the “garden hose” model of Buhrman, Fehr, Schaffner and Speelman [14]. Our model can be thought of as a version of Arunachalam and Podder’s memoryless framework where the size of the block of memory passed back and forth is amortized, in a sense analogous to the way workspace usage is amortized across inputs in a catalytic algorithm.
2 Preliminaries
We will by convention denote a setting of the catalytic portion of the blackboard by (for “transparent registers”), a setting of the initially-clean portion by (for “work registers”), and a setting of the entire blackboard by (for no particular reason). We will let be the input given to Alice, and be the input given to Bob. We now define a few terms and notations which appear in the statements and proofs.
Definition 11.
For any , we denote by the inner product function over . That is,
Definition 12.
For any , we denote by the equality function on -bit inputs. That is,
Definition 13.
For any , we denote by the function taking an -bit index and a -bit bitstring to the value of that bitstring at that index. That is,
Definition 14.
For a function , let the communication matrix of be the matrix where , and let be the rank of over .
For a function on two inputs , we will use to denote the application . We say a function is left-injective if there do not exist such that and are identical functions. For integers , we will write to denote . To denote to a multiset with elements , we will use the “bag” notation .
3 Characterizing 3-Round 1-Clean Complexity
In this section, we prove Theorem 6.
See 6
We first give the upper bound, showing that any function with small rank has an efficient catalytic protocol.
Lemma 15.
For any , we have .
Proof.
By definition of rank, the rows of ’s communication matrix span a -dimensional subspace of . Both parties fix ahead of time a basis for this subspace, and define a protocol as follows:
-
1.
On the first round, Alice finds such that is the th row of the communication matrix (i.e., is equal to the truth table of the function ), and sets the catalytic portion of the blackboard to .
-
2.
Bob computes , and writes the th entry of the result to the clean portion.
-
3.
Alice XORs out the same string she XORed in, resetting the catalytic portion.
-
4.
Bob finds the new th entry of , and outputs its XOR with the clean bit.
The correctness of this protocol is straightforward. After the second round of the protocol, Bob sets the clean bit to
and so his final output will be
as desired. The resource consumption is immediate from the protocol definition.
We would like to show that it is impossible to do substantially better than the above protocol. Note that the protocol described in Lemma 15 follows a simple pattern: Alice modifies only the catalytic portion of the blackboard, performing some bijective map on all possible settings, Bob uses only the clean portion of the blackboard to “remember” one bit about the result, and then Alice undoes her bijection and Bob makes his output decision based on his remembered bit in addition to that initial catalytic configuration. For the purposes of showing lower bounds, it would be helpful first to claim that without loss of generality all 3-round protocol must be of that form. However, this is not quite true. For one, Alice could use the clean portion of the blackboard to send Bob an additional bit of information about her input on the first round, which is provably helpful sometimes. Another rather more substantial concern is that there’s room for “amortization” in the amount of information that Bob remembers: it could, for instance, be possible that, on some particular settings of Alice’s input and the initial catalytic setting , Alice can on her first round encode all of the catalytic information in a small prefix of the tape – in such cases, Bob could use the rest to send Alice a large amount of information about his input, which would then inform her in choosing a single bit send him back in the clean space of the final setting. However, we expect that this latter sort of behaviour should only happen rarely, since most initial catalytic settings can’t be compressed. In the full version, we address these concerns formally, guaranteeing that any 3-round 1-clean catalytic protocol can be converted into a protocol that almost follows the simple pattern we noted. Specifically, we show the following:
Lemma 16.
Every left-injective function with has a protocol of the following form, which we’ll call a mostly-one-way-catalytic protocol:
-
1.
For every , Alice has an injective function .
-
2.
For every , Bob has two functions, and .
-
3.
Call a pair bad if, for some , we have
Then, at most many pairs are bad.
Additionally, we may assume that, for every , we have .
This observation will allow us to associate a communication protocol with a structured collection of vectors in , whose size we can bound using standard combinatorial facts.
Proof of Theorem 6.
The upper bound was shown in Lemma 15; it remains to show the lower bound. Note that removing duplicate rows from the communication matrix of a function can change neither its rank, nor the catalytic communication complexity (since a protocol for the function on the larger domain could simply treat several of its inputs identically). So, it suffices to show the claim for left-injective functions. Also, note that, given the term in the statement, it suffices to only consider the case where . We fix an arbitrary left-injective with , and assume for contradiction that .
By Lemma 16, we have a mostly-one-way-catalytic protocol for with . We will use this protocol to define three multi-subsets . For every , let be the truth table of , and let . For every , let be the truth table of , and let . Finally, for every bad , let be the truth table of , and let .
Note that , , and . The idea of the proof will be to show that contains the neighbours in an appropriate Boolean hypercube of every element of (with appropriate multiplicity) – since small subsets of the hypercube have large vertex boundary compared to their volume, but we know that is only a constant factor larger than , this will allow us to give a lower bound on . This approach is formalized as follows.
Imagine placing red and blue pebbles on , such that each element of gets a number of red pebbles equal to the number of times it appears in , and a number of blue pebbles equal to the number of times it appears in . We claim that the following must hold:
Claim 17.
For any such pebbling constructed from a valid protocol, for any , if has at least blue pebbles and is a row of ’s communication matrix (i.e. is the truth table of for some ), then has at least red pebbles.
Proof of 17.
Because has at least blue pebbles, there are at least distinct initial catalytic configurations such that . Let be the input such that is the truth table of . For every bad , we have , so each of these will contribute a red pebble to . Then, since is injective, each of must be distinct. So, to obtain the remainder of the red pebbles, we’ll show that whenever is not bad, .
Note that is the truth table of , that is the truth table of , and that is the truth table of . So, to conclude that , we need to show that, for all , we have .
Since is not bad, we have . If , this gives , so the claim holds. If, on the other hand, , we have . But then, since we always have , we know that .
This will be sufficient to prove that there must be many blue pebbles, contradicting the assumption that is small. Consider the graph on where an edge exists whenever is a row of ’s communication matrix. This graph consists of many identical connected components. If we fix some subset such that the corresponding rows of the communication matrix form a basis for the row-space, and consider only the edges generated by those rows, each of these connected components will be isomorphic to the -dimensional hypercube. At least one of these connected components must contain a blue pebble; we will restrict our attention to one such connected component.
17 ensures that each vertex of this hypercube has at least as many red pebbles as the maximum number of blue pebbles among its neighbours. Consider the set of vertices with at least one blue pebble. All vertices adjacent to a vertex of must have at least one red pebble; we claim that there are many such vertices.
Claim 18.
For any subset with , we have , where denotes the set of all Hamming neighbours of elements of .
Proof of 18.
Take to be a set of the smallest possible size such that . Harper’s theorem states that, among all subsets of the Boolean hypercube of a given size, the vertex boundary is minimized by a Hamming ball. That is, for any , if , then [29, 6]. Let be the radius of the smallest Hamming sphere larger than our fixed set ; i.e., the smallest integer such that . Since is monotonically nonincreasing in for small 333As long as is small enough that a Hamming ball of that size can’t have vertex boundary less than twice the volume (which, as we show, is true here), one can observe that adding a new point at the boundary will always increase the surface-area-to-volume ratio., the surface-area-to-volume ratio of this Hamming sphere lower bounds that of :
By minimality of , we know that for all , since otherwise the Hamming ball of radius would be a smaller example. So, . Thus,
Since we assumed that , this gives . Now, we have
where is the binary entropy function. For all values of , we have , so this implies that .
We can’t immediately a derive contradiction from 17 and 18, because is a multiset (i.e. some vertices may have more than one red pebble). However, this is not a serious obstacle.
Claim 19.
Suppose a pebbling satisfies the conditions of 17 – i.e., that always has at least as many blue pebbles as has red pebbles for any row of the communication matrix. Then, if we remove one blue pebble from every vertex with at least one blue pebble, and one red pebble from any vertex with at least one red pebble, that condition still holds.
Proof.
Consider any and any . Before removal, had at least as many blue pebbles as had red pebbles. If had blue pebbles, then after removal this will remain the case, so will still be at least as pebbled. Otherwise, we will remove the same number of blue pebbles from as we remove red pebbles from .
If we remove a single blue pebble from every vertex with at least one blue pebble, and a single red pebble from every vertex with at least one red pebble, 18 ensures that we will remove strictly more than ten times as many red pebbles as blue pebbles. After removing those pebbles, there are still at most vertices with blue pebbles, and we’ve just shown that 17 still holds – so, we can repeatedly perform such removals until all pebbles are gone, always removing strictly more than ten times as many red pebbles as blue pebbles. This means that the graph overall has strictly more than ten times as many red pebbles as blue pebbles, contradicting the fact that .
One interesting consequence of Theorem 6 is that the equality function, which has constant randomized communication complexity, requires the maximal blackboard size in this catalytic model. On the other hand, as noted, the inner product function can be communicated with only bits of catalytic space, despite requiring (up to constant factors) maximal standard communication complexity even with randomness [41]. Catalytic communication complexity seems to be quantifying a very different notion from standard communication complexity measures.
A natural question at this stage is whether our choice to restrict to only a single bit of clean space was roughly without loss of generality, or whether protocols with more clean space can look substantially different. Having more free space is definitely at least moderately helpful: for instance, equality can be computed with bits of free space and bits of catalytic space, by simply running two copies of the 1-bit protocol on the two halves of the inputs simultaneously, and having Bob output the AND of the answers. But one might suspect that, with only a little more clean space, there is not too much more that can be done – perhaps for any constant it’s possible to show that . As we will show in the next section, this intuition turns out to be false – even with two just bits of clean space, it’s possible to communicate equality very efficiently.
4 The 3-Round Complexity of Equality
In this section, we prove the following upper bound on 3-round 2-clean catalytic complexity of equality. See 7
The key to the proof of Theorem 7 comes from a long line of research on graphs representable as the union of many large induced matchings, known as Ruzsa–Szemerédi graphs. We will provide background on the Ruzsa–Szemerédi problem in Section 4.1, where we will also introduce a variant important for our application. In Section 4.2, we will demonstrate how any such construction can be generically converted into a catalytic protocol for equality, which will in particular prove Theorem 7.
In Section 4.3 we will demonstrate a reverse implication – that is, that efficient 3-round equality protocols give dense Ruzsa–Szemerédi protocols – which will allow us to state catalytic communication complexity lower bounds. We will show unconditionally that there exists no 3-round -clean protocol for equality using bits of catalytic space, and show that finding any stronger upper bound than would require improved graph theoretic constructions that would in turn prove new lower bounds in areas such as property testing and streaming algorithms.
4.1 Background on the Ruzsa–Szemerédi Problem
We give the following definition:
Definition 20.
A graph is an -Ruzsa–Szemerédi graph if there exists a partition of its edges into sets of size , such that each set constitutes an induced matching in .
In 1976, motivated by a problem of Brown, Erdős and Sós on 3-uniform hypergraphs containing no 6 vertices sharing 3 edges [12], Ruzsa and Szemerédi proposed studying such graphs, with the goal of finding examples where both and are large compared to number of vertices of . They showed that Behrend’s construction of sets without 3-term arithmetic progression [4] gives -Ruzsa–Szemerédi graphs, and used regularity methods to show that and cannot both be made [43]. The best known upper bounds still go through graph regularity: Fox’s improved bounds for triangle removal imply that if , then [24].
Ruzsa–Szemerédi graphs have since seen several applications in computational and communication complexity [30, 5, 35]. In particular, constructions where and is large have been used to obtain a number of lower bounds in streaming algorithms and property testing [23, 27, 33, 32, 3]. The best known lower bound on when is due to Fischer, Lehman, Newman, Raskhodnikova, Rubinfeld and Samorodnitsky, giving a construction where and – eliminating the gap between this bound and the upper bound is a major open problem in combinatorics [23].
For our application, we also give the following more restrictive definition:
Definition 21.
A graph is a -full Ruzsa–Szemerédi graph if there exists a partition of its edges into perfect matchings, and a partition of each of those matchings into partial matchings, such that each partial matching is induced in .
Note that a -full Ruzsa–Szemerédi graph is in particular a -Ruzsa–Szemerédi graph, but that here we are imposing an additional constraint by requiring that the induced matchings can be grouped together to form perfect matchings in . The construction presented by Fischer, Lehman, Newman, Raskhodnikova, Rubinfeld and Samorodnitsky is not a full Ruzsa–Szemerédi graph, but we show in the full version that it can easily be made so:
Lemma 22.
As long as for some integer , there exists a -full Ruzsa–Szemerédi graph.
4.2 Equality Protocols from Full Ruzsa–Szemerédi Graphs
We now show that full Ruzsa–Szemerédi graphs can be generically converted to catalytic protocols.
Lemma 23.
If there exists a -full Ruzsa–Szemerédi graph on vertices, then there exists a 3-round, -clean catalytic protocol for equality on -bit inputs with bits of catalytic space444Observe though, if one cares about such things, that unless that Ruzsa–Szemerédi graph can be constructed explicitly, the resulting protocol may not be computationally efficient. In order to get a computationally effective protocol from our construction, one would have to plug in an explicit code as opposed to just citing Gilbert-Varshanov..
We first note that this will immediately give us our desired upper bounds on .
Proof of Theorem 7 given Lemma 23..
For some constant , by Lemma 22, there exists a -full Ruzsa–Szemerédi graph on vertices. Plugging this in to Lemma 23, we obtain a -clean catalytic protocol for equality on bit inputs, requiring bits of catalytic space. Defining , this is a 3-round 2-clean protocol with bits of catalytic space555Note that this construction is only defined when both is a power of two, and for some integer . However, if we let be the smallest power of two such that , and let , then note that . So, for other values of , Alice and Bob can simply pad their inputs with zeroes and run the equality protocol for a value of where this is defined, losing only a constant factor in the amount of catalytic space required..
Proof of Lemma 23..
Let be such a graph, with vertices , composed of perfect matchings . The full-Ruzsa–Szemerédi property gives, for each , a vertex partition such that the edges of are the union over of the edges induced by . Fix an arbitrary bijection , and arbitrary injections , . The protocol is as follows.
-
1.
, where is the neighbour of in the matching .
-
2.
, where is the unique value such that .
-
3.
, where is the neighbour of in the matching .
-
4.
accepts if and only if , where is the unique value such that .
Correctness of this protocol follows from the definition of a full Ruzsa–Szemerédi graph. If , then the matchings and are the same. Since every edge of is induced by some part of the partition , this means that both endpoints of that edge belong to the same , and so Bob will accept. If, on the other hand, , then the two endpoints of an edge in cannot belong to the same , because induces only the edges belonging to .
4.3 Lower Bounds on Equality Protocols
In this section, we will show that, as long as we are content with a not-necessarily-full Ruzsa–Szemerédi graph, the conversion in Lemma 23 can be done in reverse. That is, the existence of dense Ruzsa–Szemerédi graphs is necessary for efficient equality protocols. This will allow us to deduce both conditional and unconditional communication lower bounds.
Lemma 24.
For any , if there exists a 3-round, -clean catalytic protocol for equality on -bit inputs with bits of catalytic space, there exists an -Ruzsa–Szemerédi graph on vertices.
For the purposes of proving this lemma, it would simplify matters to know that Alice only ever modifies the catalytic portion of the blackboard, and Bob only ever modifies the clean portion666In fact, in this case we note that an analysis similar to the one we present here would give a full-Ruzsa–Szemerédi graph, as opposed to just a Ruzsa–Szemerédi graph, demonstrating (up to some quantitative loss) an equivalence between full Ruzsa–Szemerédi graphs and this kind of “well-behaved” 3-round catalytic protocol for equality. We suspect that such an equivalence should also exist without the well-behavedness condition – perhaps even that full Ruzsa–Szemerédi graphs can be generically constructed from Ruzsa–Szemerédi graphs – however we do not know a proof.. As in Section 3, although we cannot claim such behaviour without loss of generality, we can at least claim that, a substantial fraction of the time, Bob only remembers bits.
Lemma 25.
For any , any function with has a protocol of the following form, which we’ll call a sometimes-one-way-catalytic protocol:
-
1.
For every , Alice has an injective function .
-
2.
For every , Bob has two functions, and .
-
3.
Call a pair bad if, for some , we have . Then, at most a fraction of all pairs are bad.
Proof of Lemma 24..
By Lemma 25, we have a sometimes-one-way catalytic protocol for with bits of catalytic space. From this protocol, we will construct a bipartite graph whose many left vertices are identified with , and whose many right vertices are identifed with . The edge set will consist of, for every non-bad , an edge from on the left to on the right.
Now, for every , , we’ll define a vertex subset . A left vertex will be included in if and only if both is non-bad, and . A right vertex will be included in if and only if .
We claim that every edge of is induced by one of these subsets, and that each subset induces a matching. The first part of this is immediate: both endpoints of the edge generated by a pair must belong to . To see the second part, consider some edge , generated by a non-bad , and suppose it belongs to some with . (Note that, by definition of , this edge it cannot belong to for any .) But now, suppose the protocol is run with Alice given input , Bob given input , and the catalytic tape initialized to . The output of the protocol will be . However, since both and are non-bad, we know and , so this is contradiction.
Now, oberve that since there are at least many non-bad pairs, has at least this many edges. Since we’ve partitioned these edges into many induced matchings, each of which has at most many edges, we must have at least many induced matchings each with at least many edges. Letting be the graph on only those edges, this is a -vertex -Ruzsa–Szemerédi graph.
This characterization immediately allows us to show that no 3-round -clean catalytic protocol for equality can use only bits of catalytic space – although we have found a surprisingly efficient protocol, equality is at least somewhat more difficult for this model than, for instance, inner product.
Corollary 26.
For any constant , we have .
Proof.
It is known by the triangle removal lemma that for any constant , a -Ruzsa–Szemerédi graph on vertices must satisfy [24]. Since, by Lemma 24, a 3-round -clean protocol on -bit inputs with bits of catalytic space gives a -Ruzsa–Szemerédi graph on vertices, this means that . Rearranging gives .
Of course, this doesn’t rule out a protocol with linear catalytic space – and in fact, the second author believes that such a protocol likely exists. However, it does provide evidence that constructing such a protocol may be difficult: doing so would improve known Ruzsa–Szemerédi constructions, yielding improvements to state-of-the-art bounds in property testing, streaming algorithms, and information theory. We mention a few such implications; the reader is referred to the cited works for definitions of terms.
Corollary 27.
If, for some constant , , then
-
1.
Any non-adaptive tester for monotonicity over general -element posets requires query complexity for some .
-
2.
Any randomized semi-streaming algorithm for -approximate maximum bipartite matching requires passes over the stream.
-
3.
There exist constant-rate centralized coding caching schemes, in which each file is divided into a number of pieces polynomial in the number of participants.
Proof.
By Lemma 24, if , then for some there exist -Ruzsa–Szemerédi graphs on vertices. The property testing lower bounds of Fischer, Lehman, Newman, Raskhodnikova, Rubinfeld and Samorodnitsky [23], the streaming lower bounds of Assadi and Sundaresan [3], and the centralized coding caching scheme construction of Shangguan, Zhang and Ge [44] all rely on constructions of Ruzsa–Szemerédi graphs where the partial matchings are of linear size. Plugging in a construction with to those arguments would immediately yield the strengthened bounds in the statement of the corollary.
A more optimistic interpretation of Corollary 27 is that designing catalytic protocols for equality could provide an approach towards improved Ruzsa-Semerédi constructions. There is some evidence that the language of communication complexity can be useful in this area: Linial, Pitassi, and Shraibman have shown a close relationship between Ruzsa–Szemerédi graphs and protocols for high-dimensional permutations in the Number On the Forehead model, which Alon and Shraibman used to give simple communication theoretic descriptions of a couple of known Ruzsa–Szemerédi constructions [35, 1]. 3-round catalytic protocols for equality offer another distinct communication-theoretic interpretation of the problem that may prove useful.
5 The 3-Round Complexity of Indexing
The fact that is exponentially smaller than raises the question of whether perhaps every function has an efficient -round -clean protocol for some constant . One might suspect that most functions should require exponential complexity, but there is no clear counting argument to this effect. In fact, even for functions of unbalanced input lengths – i.e. when – there’s no obvious way to rule out a protocol with catalytic space close to 777The other direction of asymmetry – that is, when – is less interesting for 3-round protocols, since Bob can without loss of generality communicate very little information to Alice, and so there are easily functions requiring at least bits of catalytic space for information theoretic reasons.. We propose considering the following function:
See 13 This indexing function is often considered in one-way communication complexity contexts, where the party holding the index cannot send messages, so all information must be sent by the party with the longer input. Note that in our case, however, we consider the reverse: we’re giving Alice the index, and by Lemma 25 our protocol can be largely thought of as one-way from Alice to Bob. The reason we’re particularly interested in this setting is that a protocol for can be thought of as a protocol for all functions simultaneously: Bob has to be able to determine any Boolean function on Alice’s input. So, for fixed value of Alice’s input length , is the hardest possible function, in the sense that a protocol for gives a protocol with the same parameters for every other function with the same .
By Proposition 4, we know . We suspect that this is close to the correct answer for any constant , but the results we’ve shown thus far haven’t ruled out the possibility that . In this section, we will prove a somewhat stronger lower bound – still far away from the upper bound, but enough to suggest for instance that it’s unlikely that some sort of Ruzsa–Szemerédi construction as in Section 4 will work directly. We show the following:
See 9
As in our lower bounds for equality, our proof comes from a graph theoretic interpretation. We will show that a protocol for corresponds to a graph composed of a union of matchings, with the property that any subset of the matchings are separable from the rest of the graph. We will then show that such a graph cannot have too high density, bounding the efficiency of the catalytic protocol. We make the following definitions:
Definition 28.
Let and be disjoint edge sets on a common set of vertices, and let . We say and are -separable if there exists a -edge colouring of such that
-
each colour appears in only one of or , and
-
for every 3-edge path, if the first and last edges share the same colour, so does the middle edge.
Definition 29.
We call an -vertex graph -divisive if its edges can be partitioned into matchings such that for all , the edge sets and are -separable.
Lemma 30.
For any constant , there is a family , with and for , and where each is -divisive.
Proof.
As in Section 4.3, we begin by invoking Lemma 25 to obtain a sometimes-one-way-catalytic protocol. In fact, we’ll define the same graph: let consist of many left vertices identified with , many right vertices identified with , and an edge for each whenever is non-bad. This graph has many vertices, and many edges.
For any , let , . Note that each is a matching, since is injective. We claim that, for any , the edge sets and are -separable. Fix any , and let denote the indicator vector of . Now, to separate and , we will “colour” each edge with the pair . If and have the same colour, it means that and are the same function, and and are the same bitstring – so, and will also share this colour.
We now just need to show that no edge can share a colour with an edge . Fix any , and any edges and with the same colour. In order for these edges to be present, both and must be good. So,
meaning that either both and belong to , or neither do.
We now demonstrate that any such graph cannot contain a large complete bipartite subgraph, which will allow us to bound its density by the KST theorem.
Lemma 31.
For any , if a graph is -divisive, then does not contain the complete bipartite graph as a subgraph.
Proof.
We proceed by contradiction: suppose we’ve found a copy of in . Let be the partition into matchings guaranteed by the divisiveness condition. We claim that we can find some set of and some smaller complete bipartite subgraph of whose intersection with the union of those is a perfect matching.
Claim 32.
There exists a set , and a subgraph , such that is isomorphic to , and is a matching with edges.
Proof of 32.
First, suppose some single contains at least edges of . Then, the claim follows immediately by taking , and letting be the subgraph induced by the edges of . So, we will assume each contains at most edges of .
We construct greedily, starting with and adding indices one-at-a-time. Suppose currently consists of a matching with many edges. The number of edges of that contain any endpoint of an edge in is therefore no more than . Since no contains more than edges of , and has edges, there must be at least distinct with at least one edge in . Thus, we can find some such that contains at least one edge, but contains no edge sharing an endpoint with an edge of – this implies that is a matching with at least many edges. The claim follows by repeating this procedure until , and then taking to be the subgraph induced by those edges.
Now, we use and to contradict the -separability assumption. By assumption on , the edge sets and are -separable – fix an edge colouring that -separates them. Since contains edges, by pigeonhole principle it must contain two edges and that are given the same colour. Since is a complete bipartite graph, the edge must also be present, and since is a matching it cannot belong to any , . Since and have the same colour, the definition of a -separation requires to share that colour – but does not belong to , so that colour cannot be used on . This is contradiction.
Proof of Theorem 9.
Lemma 30 gives a family of -divisive graphs, where each has many vertices and many edges. Then, Lemma 31 ensures that no in this family can contain a copy of , for . The Kővári–Sós–Turán theorem guarantees that an -vertex graph without as a subgraph must have at most many edges [34, 45], so we must have for sufficiently large . Rearranging, this gives that for all sufficiently large .
This is not an especially strong lower bound – it seems plausible that is exponential in for any constant , but do not even know that . However, the proof does at least give some evidence that the sort of direct application of Ruzsa–Szemerédi constructions we saw in Section 4 is unlikely to work here – Ruzsa–Szemerédi graphs can contain complete bipartite graphs of any constant size, and we expect that bounds of the form for on -Ruzsa–Szemerédi graphs, if true, will be difficult to prove [25]. We note also that the graph theoretic property of -divisiveness, in which any subset of matchings must be -separable from the rest of the graph, is a strictly stronger property than that of being a Ruzsa–Szemerédi graph, and may be interesting to study in its own right.
6 More Rounds and Connections to Catalytic Computing
We’ve restricted attention thus far to protocols of only 3 rounds, as the design and analysis of such protocols has proven to already be quite theoretically rich. In this section, we consider what can be said for protocols with more rounds. We observe a close relationship between standard models of nonuniform catalytic computation and our model of catalytic communication, and show that by a communication analogue of Buhrman, Cleve, Koucký, Loff and Speelman’s results on [13], there exist constant-round constant-clean protocols with polynomial catalytic space for all of .
6.1 Amortized Bipartite Branching Programs
The notion of catalytic space introduced by Buhrman, Cleve, Koucký, Loff and Speelman is a uniform model of computation: it consists of a space-bounded algorithm, with an additional resource of catalytic space that must be reset at the end of computation [13]. One can also define a natural nonuniform catalytic model:
Definition 33.
An amortized branching program 888We remark that our definition is slightly nonstandard, as the last layer is usually defined to have width with labels , where and . However, the definitions are easily seen to be equivalent (up to a unit change in length). of amortized width and length computing copies of a function is a directed acyclic multigraph consisting of layers, where
-
The first layer has vertices, the last layer has vertices, and all other layers have vertices.
-
Each layer except the last is labeled with an index .
-
Each vertex except in the last layer has exactly two outgoing edges, labeled and respectively.
-
The two vertices in the last layer are labeled “accept” and “reject”, and the vertices in the second-to-last layer are labeled with the names of vertices in the first layer, such that each name appears exactly times.
To compute the function on an input , the program starts at an arbitrary vertex in the first layer, and then for each layer reads the associated index of and follows the edge labeled with the resulting value. Correctness of the program entails that, for every input and every starting vertex, the program ends in the vertex with the correct acceptance behaviour, and the second-to-last vertex visited has the same label as the starting vertex.
Amortized branching programs were introduced by Girard, Koucký and McKenzie, who showed examples where direct sum theorems succeeded and failed for the model [26]. Since then, there has been interest in determining the minimum amount of amortization needed to compute a function with small amortized width and length. Potechin showed that every function has an amortized branching program of length and amortized width computing copies [38]. Robere and Zuiddam showed that this amount of amortization could be reduced for bounded-degree functions over [42]. Cook and Mertz showed a trade-off in both of these results between length and amortization, allowing them to show in the former case that any function has an amortized branching program of length and amortized width computing copies, where the constant in the program length depends on [20]. In a recent breakthrough work on the tree evaluation problem, Cook and Mertz showed that the ideas of this tradeoff could be strengthened to give length , amortized width branching programs computing copies of any function [21].
In their work on memoryless communication complexity, Arunachalam and Podder observed that the model was closely related to a notion of bipartite branching programs [2]. We define a similar notion in the amortized sense, which we note exactly describes our model of catalytic communication, and can be seen as an alternate definition.
Definition 34.
A bipartite amortized branching program of amortized width and length computing copies of a function is a directed acyclic multigraph consisting of layers, where
-
The first layer has vertices, the last layer has vertices, and all other layers have vertices.
-
Each layer except the last is labeled either or .
-
Each vertex except in the last layer has exactly outgoing edges, labeled with the values of .
-
The two vertices in the last layer are labeled “accept” and “reject”, and the vertices in the second-to-last layer are labeled with the names of vertices in the first layer, such that each name appears exactly times.
To compute the function on an input , the program starts at an arbitrary vertex in the first layer, and then for each layer follows the edge labeled with the value of the associated input. Correctness of the program entails that, for every input and every starting vertex, the program ends in the vertex with the correct acceptance behaviour, and the second-to-last vertex visited has the same label as the starting vertex.
The equivalence between such programs and catalytic communication protocols is immediate.
Proposition 35.
if and only if there exists a bipartite amortized branching program of amortized width and length computing copies of .
Proof.
Given such a branching program, we define a catalytic protocol by thinking of the initial catalytic setting as giving the index of a starting vertex of the program, and then on subsequent steps having the blackboard store the index of the current node within its layer. The fact that vertices in the second-to-last layer are labeled by vertices in the first layer means that, with an appropriate ordering of the indexing, the condition of second-to-last vertex having the same label as the starting vertex corresponds exactly to the catalytic portion of the blackboard being reset after rounds. The final layer corresponds to the output function.
Given a -round -clean catalytic protocol with catalytic space , we can perform the reverse transformation. Each layer except the first and last contains one vertex for each blackboard state, and the transition functions between pairs of layers are determined by how the active player would update the blackboard (with the transition function to the last layer determined by the output function).
Note that any amortized branching program is also a bipartite amortized branching program, so a consequence of this equivalence is that any result known for amortized branching programs trivially extends to catalytic communication. For instance, the results of [20] and [21] give the following, respectively:
Corollary 36.
for all , .
Corollary 37.
for all .
However, there are cases where bipartite amortized branching programs can be much more efficient than amortized branching programs. Note that an amortized branching program of length less than is uninteresting (it is effectively solving a problem on a smaller input length), whereas we’ve seen that bipartite amortized branching programs of length can be quite powerful. In the full version, we give a result making use of this power: Buhrman, Cleve, Koucký, Loff and Speelman’s algorithm for threshold circuit evaluation gives an amortized branching program of length even when the circuit has constant depth, but we note that by appropriate rearranging it can be converted to a bipartite amortized branching program of only constant length, yielding the following: See 10
References
- [1] Noga Alon and Adi Shraibman. Number on the forehead protocols yielding dense ruzsa–szemerédi graphs and hypergraphs. Acta Mathematica Hungarica, 161(2):488–506, 2020.
- [2] Srinivasan Arunachalam and Supartha Podder. Communication Memento: Memoryless Communication Complexity. In James R. Lee, editor, 12th Innovations in Theoretical Computer Science Conference (ITCS 2021), volume 185 of Leibniz International Proceedings in Informatics (LIPIcs), pages 61:1–61:20, Dagstuhl, Germany, 2021. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.ITCS.2021.61.
- [3] Sepehr Assadi and Janani Sundaresan. Hidden permutations to the rescue: Multi-pass streaming lower bounds for approximate matchings. In 2023 IEEE 64th Annual Symposium on Foundations of Computer Science (FOCS), pages 909–932, 2023. doi:10.1109/FOCS57990.2023.00058.
- [4] Felix A Behrend. On sets of integers which contain no three terms in arithmetical progression. Proceedings of the National Academy of Sciences, 32(12):331–332, 1946.
- [5] Y. Birk, N. Linial, and R. Meshulam. On the uniform-traffic capacity of single-hop interconnections employing shared directional multichannels. IEEE Trans. Inf. Theor., 39(1):186–191, 2006. doi:10.1109/18.179355.
- [6] Béla Bollobás. Combinatorics: set systems, hypergraphs, families of vectors, and combinatorial probability. Cambridge University Press, 1986.
- [7] Mark Braverman, Sumegha Garg, and David P. Woodruff. The coin problem with applications to data streams. In Sandy Irani, editor, 61st IEEE Annual Symposium on Foundations of Computer Science, FOCS 2020, Durham, NC, USA, November 16-19, 2020, pages 318–329. IEEE, 2020. doi:10.1109/FOCS46700.2020.00038.
- [8] Mark Braverman, Sumegha Garg, and Or Zamir. Tight space complexity of the coin problem. In 62nd IEEE Annual Symposium on Foundations of Computer Science, FOCS 2021, Denver, CO, USA, February 7-10, 2022, pages 1068–1079. IEEE, 2021. doi:10.1109/FOCS52979.2021.00106.
- [9] Mark Braverman, Anup Rao, Ran Raz, and Amir Yehudayoff. Pseudorandom generators for regular branching programs. SIAM J. Comput., 43(3):973–986, 2014. doi:10.1137/120875673.
- [10] Joshua Brody and Elad Verbin. The coin problem and pseudorandomness for branching programs. In 51th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2010, October 23-26, 2010, Las Vegas, Nevada, USA, pages 30–39. IEEE Computer Society, 2010. doi:10.1109/FOCS.2010.10.
- [11] Joshua E. Brody, Shiteng Chen, Periklis A. Papakonstantinou, Hao Song, and Xiaoming Sun. Space-bounded communication complexity. In Proceedings of the 4th Conference on Innovations in Theoretical Computer Science, ITCS ’13, pages 159–172, New York, NY, USA, 2013. Association for Computing Machinery. doi:10.1145/2422436.2422456.
- [12] William G Brown, Pál Erdős, and Vera T Sós. On the existence of triangulated spheres in 3-graphs and related problems. Periodica Mathematica Hungarica, 3:221–229, 1973.
- [13] Harry Buhrman, Richard Cleve, Michal Koucký, Bruno Loff, and Florian Speelman. Computing with a full memory: catalytic space. In David B. Shmoys, editor, Symposium on Theory of Computing, STOC 2014, New York, NY, USA, May 31 - June 03, 2014, pages 857–866. ACM, 2014. doi:10.1145/2591796.2591874.
- [14] Harry Buhrman, Serge Fehr, Christian Schaffner, and Florian Speelman. The garden-hose model. In Proceedings of the 4th Conference on Innovations in Theoretical Computer Science, ITCS ’13, pages 145–158, New York, NY, USA, 2013. Association for Computing Machinery. doi:10.1145/2422436.2422455.
- [15] Harry Buhrman, Michal Koucký, Bruno Loff, and Florian Speelman. Catalytic space: Non-determinism and hierarchy. Theory Comput. Syst., 2018. doi:10.1007/S00224-017-9784-7.
- [16] Gil Cohen, Dean Doron, Oren Renard, Ori Sberlo, and Amnon Ta-Shma. Error reduction for weighted prgs against read once branching programs. In Valentine Kabanets, editor, 36th Computational Complexity Conference, CCC 2021, July 20-23, 2021, Toronto, Ontario, Canada (Virtual Conference), volume 200 of LIPIcs, pages 22:1–22:17. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2021. doi:10.4230/LIPICS.CCC.2021.22.
- [17] James Cook, Jiatu Li, Ian Mertz, and Edward Pyne. The structure of catalytic space: Capturing randomness and time via compression. Electron. Colloquium Comput. Complex., TR24-106, 2024. URL: https://eccc.weizmann.ac.il/report/2024/106, arXiv:TR24-106.
- [18] James Cook and Ian Mertz. Catalytic approaches to the tree evaluation problem. In Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, STOC 2020, pages 752–760, New York, NY, USA, 2020. Association for Computing Machinery. doi:10.1145/3357713.3384316.
- [19] James Cook and Ian Mertz. Encodings and the tree evaluation problem. In Electron. Colloquium Comput. Complex, page 54, 2021.
- [20] James Cook and Ian Mertz. Trading time and space in catalytic branching programs. In Proceedings of the 37th Computational Complexity Conference, CCC ’22, Dagstuhl, DEU, 2022. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.CCC.2022.8.
- [21] James Cook and Ian Mertz. Tree evaluation is in space o(log n · log log n). Electronic Coloquium Comput. Complex., TR23, 2023. URL: https://eccc.weizmann.ac.il/report/2023/174/.
- [22] Yfke Dulek. Catalytic space: on reversibility and multiple-access randomness, 2015.
- [23] Eldar Fischer, Eric Lehman, Ilan Newman, Sofya Raskhodnikova, Ronitt Rubinfeld, and Alex Samorodnitsky. Monotonicity testing over general poset domains. In Proceedings of the Thiry-Fourth Annual ACM Symposium on Theory of Computing, STOC ’02, pages 474–483, New York, NY, USA, 2002. Association for Computing Machinery. doi:10.1145/509907.509977.
- [24] Jacob Fox. A new proof of the graph removal lemma. Annals of Mathematics, pages 561–579, 2011.
- [25] Jacob Fox, Hao Huang, and Benny Sudakov. On graphs decomposable into induced matchings of linear sizes. Bulletin of the London Mathematical Society, 49(1):45–57, 2017.
- [26] Vincent Girard, Michal Kouckỳ, and Pierre McKenzie. Nonuniform catalytic space and the direct sum for space. In Electronic Colloquium on Computational Complexity (ECCC), volume 138, 2015.
- [27] Ashish Goel, Michael Kapralov, and Sanjeev Khanna. On the communication and streaming complexity of maximum bipartite matching. In Yuval Rabani, editor, Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2012, Kyoto, Japan, January 17-19, 2012, pages 468–485. SIAM, 2012. doi:10.1137/1.9781611973099.41.
- [28] Chetan Gupta, Rahul Jain, Vimal Raj Sharma, and Raghunath Tewari. Unambiguous catalytic computation. In 39th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, FSTTCS 2019, volume 150 of LIPIcs, pages 16:1–16:13, 2019. doi:10.4230/LIPICS.FSTTCS.2019.16.
- [29] L.H. Harper. Optimal numberings and isoperimetric problems on graphs. Journal of Combinatorial Theory, 1(3):385–393, 1966. doi:10.1016/S0021-9800(66)80059-5.
- [30] Johan Håstad and Avi Wigderson. Simple analysis of graph tests for linearity and pcp. Random Structures & Algorithms, 22(2):139–160, 2003. doi:10.1002/RSA.10068.
- [31] Russell Impagliazzo, Noam Nisan, and Avi Wigderson. Pseudorandomness for network algorithms. In Frank Thomson Leighton and Michael T. Goodrich, editors, Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, 23-25 May 1994, Montréal, Québec, Canada, pages 356–364. ACM, 1994. doi:10.1145/195058.195190.
- [32] Michael Kapralov. Space lower bounds for approximating maximum matching in the edge arrival model. In Proceedings of the 2021 ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 1874–1893. SIAM, 2021. doi:10.1137/1.9781611976465.112.
- [33] Christian Konrad and Kheeran K Naidu. On two-pass streaming algorithms for maximum bipartite matching. arXiv preprint, 2021. arXiv:2107.07841.
- [34] P Kővári, Vera Sós, and Pál Turán. On a problem of zarankiewicz. In Colloquium Mathematicum, volume 3, pages 50–57. Polska Akademia Nauk, 1954.
- [35] Nati Linial, Toniann Pitassi, and Adi Shraibman. On the Communication Complexity of High-Dimensional Permutations. In Avrim Blum, editor, 10th Innovations in Theoretical Computer Science Conference (ITCS 2019), volume 124 of Leibniz International Proceedings in Informatics (LIPIcs), pages 54:1–54:20, Dagstuhl, Germany, 2019. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.ITCS.2019.54.
- [36] Noam Nisan. Pseudorandom generators for space-bounded computation. Comb., 12(4):449–461, 1992. doi:10.1007/BF01305237.
- [37] Periklis Papakonstantinou, Dominik Scheder, and Hao Song. Overlays and limited memory communication. In 2014 IEEE 29th Conference on Computational Complexity (CCC), pages 298–308, 2014. doi:10.1109/CCC.2014.37.
- [38] Aaron Potechin. A note on amortized branching program complexity. In Proceedings of the 32nd Computational Complexity Conference, pages 1–12, 2017. doi:10.4230/LIPICS.CCC.2017.4.
- [39] Edward Pyne. Derandomizing logspace with a small shared hard drive. In Rahul Santhanam, editor, 39th Computational Complexity Conference, CCC 2024, July 22-25, 2024, Ann Arbor, MI, USA, volume 300 of LIPIcs, pages 4:1–4:20. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2024. doi:10.4230/LIPICS.CCC.2024.4.
- [40] Edward Pyne and Salil P. Vadhan. Pseudodistributions that beat all pseudorandom generators (extended abstract). In Valentine Kabanets, editor, 36th Computational Complexity Conference, CCC 2021, July 20-23, 2021, Toronto, Ontario, Canada (Virtual Conference), volume 200 of LIPIcs, pages 33:1–33:15. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2021. doi:10.4230/LIPICS.CCC.2021.33.
- [41] Anup Rao and Amir Yehudayoff. Communication Complexity: and Applications. Cambridge University Press, 2020.
- [42] Robert Robere and Jeroen Zuiddam. Amortized circuit complexity, formal complexity measures, and catalytic algorithms. In 2021 IEEE 62nd Annual Symposium on Foundations of Computer Science (FOCS), pages 759–769. IEEE, 2022. doi:10.1109/FOCS52979.2021.00079.
- [43] I. Ruzsa and E. Szemer’edi. Triple systems with no six points carrying three triangles. Combinatorica, 18, January 1976.
- [44] Chong Shangguan, Yiwei Zhang, and Gennian Ge. Centralized coded caching schemes: A hypergraph theoretical approach. IEEE Transactions on Information Theory, 64(8):5755–5766, 2018. doi:10.1109/TIT.2018.2847679.
- [45] Yufei Zhao. Graph Theory and Additive Combinatorics: Exploring Structure and Randomness. Cambridge University Press, 2023.
Appendix A Proof of Results In Introduction
First, catalytic protocols with two or fewer rounds cannot meaningfully make use of the catalytic space.
Proof of Proposition 3.
In a one-round protocol, the blackboard is only modified once, so if the catalytic portion is ever changed it will end up in a different state from how it started. Since the catalytic state is an arbitrary string that can’t be changed, Alice and Bob could just as well do without it.
In a two-round protocol, Alice and Bob each only get to modify the blackboard once. So, Bob must have a function (independent of ) that lets him recover the original state of the catalytic portion for every message Alice can send. There are many possible messages for Alice to send, each of which Bob returns to a single fixed catalytic state – so, by pigeonhole principle, the protocol has some catalytic state that’s associated with at most many Alice messages. This gives a new protocol with no catalytic space: the two parties pretend the catalytic portion started in that state, Alice gives Bob the index of which of the associated messages she would have wanted to send in the original protocol, and Bob determines what bits he would have sent back in the clean space. Next, we show that every function has a three-round protocol:
Proof of Proposition 4.
First, suppose . In this case, the protocol is as follows:
-
1.
Alice flips the th bit of the catalytic portion.
-
2.
Based on his own input, Bob computes the truth table of , which he thinks of as a -entry bitvector. He takes the inner product of this truth table and the current catalytic space, and writes the result to the clean space.
-
3.
Alice flips the th bit of the catalytic portion again, resetting it.
-
4.
Bob once again takes the inner product of his truth table and the catalytic space, and outputs the XOR of the result and the clean bit.
If, on the other hand, , the roles are reversed: Alice XORs in the truth table of , and Bob reads off the th bit. In either case, this can be seen as an application of the inner product protocol of Proposition 5 to compute the inner product of a truth table and the indicator vector of the index on which it’s being evaluated.
Finally, we present our protocol for inner product.
Proof of Proposition 5.
We will describe a protocol. Let be Alice’s input, be Bob’s input, and be the initial state of the catalytic space.
-
1.
For the first round of the protocol, Alice replaces the catalytic portion of the blackboard with , where denotes bitwise XOR.
-
2.
For the second round, Bob computes the inner product of the catalytic portion and his input, writing the resulting bit to the clean space.
-
3.
For the third round, Alice once again bitwise XORs her input into the catalytic portion, resetting it to .
-
4.
To output the answer, Bob computes the inner product of the new catalytic portion and his input, and adds this to the bit stored in the clean space, resulting in .
