Abstract 1 Introduction 2 Notation, Known Facts, and Technical Lemmas 3 Proof of the Main Result References

Toward Better Depth Lower Bounds: Strong Composition of XOR and a Random Function

Nikolai Chukhin Neapolis University Pafos, Cyprus
JetBrains Research, Paphos, Cyprus
Alexander S. Kulikov ORCID JetBrains Research, Paphos, Cyprus Ivan Mihajlin JetBrains Research, Paphos, Cyprus
Abstract

Proving formula depth lower bounds is a fundamental challenge in complexity theory, with the strongest known bound of (3o(1))logn established by Håstad over 25 years ago. The Karchmer–Raz–Wigderson (KRW) conjecture offers a promising approach to advance these bounds and separate 𝖯 from 𝖭𝖢1. It suggests that the depth complexity of a function composition fg approximates the sum of the depth complexities of f and g.

The Karchmer–Wigderson (KW) relation framework translates formula depth into communication complexity, restating the KRW conjecture as 𝖢𝖢(𝖪𝖶f𝖪𝖶g)𝖢𝖢(𝖪𝖶f)+𝖢𝖢(𝖪𝖶g). Prior work has confirmed the conjecture under various relaxations, often replacing one or both KW relations with the universal relation or constraining the communication game through strong composition.

In this paper, we examine the strong composition 𝖪𝖶𝖷𝖮𝖱𝖪𝖶f of the parity function and a random Boolean function f. We prove that with probability 1o(1), any protocol solving this composition requires at least n3o(1) leaves. This result establishes a depth lower bound of (3o(1))logn, matching Håstad’s bound, but is applicable to a broader class of inner functions, even when the outer function is simple. Though bounds for the strong composition do not translate directly to formula depth bounds, they usually help to analyze the standard composition (of the corresponding two functions) which is directly related to formula depth.

Our proof utilizes formal complexity measures. First, we apply Khrapchenko’s method to show that numerous instances of f remain unsolved after several communication steps. Subsequently, we transition to a different formal complexity measure to demonstrate that the remaining communication problem is at least as hard as 𝖪𝖶𝖮𝖱𝖪𝖶f. This hybrid approach not only achieves the desired lower bound, but also introduces a novel technique for analyzing formula depth, potentially informing future research in complexity theory.

Keywords and phrases:
complexity, formula complexity, lower bounds, Boolean functions, depth
Copyright and License:
[Uncaptioned image] © Nikolai Chukhin, Alexander S. Kulikov, and Ivan Mihajlin; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Circuit complexity
Editors:
Olaf Beyersdorff, Michał Pilipczuk, Elaine Pimentel, and Nguyễn Kim Thắng

1 Introduction

Proving formula depth lower bounds is an important and difficult challenge in complexity theory: the strongest known lower bound (3o(1))logn proved by Håstad [6] (following a line of works starting from Subbotovskaya [17, 9, 16]) remains unbeaten for more than 25 years already (in 2014, Tal [18] improved lower order terms in this lower bound). One of the most actively studied approaches to this problem is the one suggested by Karchmer, Raz, and Wigderson [11]. They conjectured that the naive approach of computing a composition of two functions is close to optimal. Namely, for two Boolean functions f:{0,1}m{0,1} and g:{0,1}n{0,1}, define their composition fg:{0,1}m×n{0,1} as a function that first applies g to every row of the input matrix and then applies f to the resulting column vector. The KRW conjecture then states that 𝖣(fg) is close to 𝖣(f)+𝖣(g), where 𝖣() denotes the minimum depth of a de Morgan formula computing the given function. Karchmer, Raz, and Wigderson [11] proved that if the conjecture is true, then 𝖯𝖭𝖢1, that is, there are functions in 𝖯 that cannot be computed in logarithmic parallel time.

A convenient way of studying the KRW conjecture is through the framework of Karchmer–Wigderson relation [12]. It not only allows one to apply the tools from communication complexity, but also suggests various important special cases of the conjecture. For a function f:{0,1}n{0,1}, the relation 𝖪𝖶f is defined as follows:

𝖪𝖶f={(a,b,i):af1(1),bf1(0),i[n],aibi}.

The communication complexity 𝖢𝖢(𝖪𝖶f) of this relation is the minimum number of bits that Alice and Bob need to exchange to solve the following communication problem: Alice is given af1(1), Bob is given bf1(0), and their goal is to find an index i[n] such that (a,b,i)𝖪𝖶f (i.e., aibi). Karchmer and Wigderson [12] proved that, for any function f, the communication complexity of 𝖪𝖶f is equal to the depth complexity of f: 𝖢𝖢(𝖪𝖶f)=𝖣(f). Within this framework, the KRW conjecture is restated as follows: 𝖢𝖢(𝖪𝖶f𝖪𝖶g) is close to 𝖢𝖢(𝖪𝖶f)+𝖢𝖢(𝖪𝖶g) (where 𝖪𝖶f𝖪𝖶g is another name for 𝖪𝖶fg).

One natural way of relaxing the conjecture is to replace one or both of the two relations 𝖪𝖶f and 𝖪𝖶g by the universal relation, defined as follows:

Un={(a,b,i):a,b{0,1}n,ab,i[n],aibi}.

Using a universal relation instead of the Karchmer–Wigderson relation makes the corresponding communication game only harder, hence proving lower bounds for it is potentially easier and could lead to the resolution of the original conjecture. For this reason, such relaxations have been studied intensively.

Edmonds et al. [4] proved the KRW conjecture for the composition UmUn of two universal relations using communication complexity methods. Håstad and Wigderson [7] improved it for a higher degree of composition using a different approach. Karchmer et al. [11] extended this result to monotone functions. Håstad [6] demonstrated the conjecture for the composition f𝖷𝖮𝖱n of an arbitrary function f:{0,1}m{0,1} with the parity function 𝖷𝖮𝖱n. This was later reaffirmed by Dinur and Meir [3] through a communication complexity approach. Further advancements were made by Gavinsky et al. [5] who established the conjecture for the composition fUn of any non-constant function f:{0,1}m{0,1} with the universal relation Un. Mihajlin and Smal [15] proved the KRW conjecture for the composition of a universal relation with certain hard functions using 𝖷𝖮𝖱-composition. Subsequently, Wu [20] improved this result by extending it to the composition of a universal relation with a wider range of functions (though still not with the majority of them). de Rezende et al. [2] proved the conjecture in a semi-monotone setting for a wide range of functions g.

Another natural way of relaxing the initial conjecture is to constrain the communication game (instead of allowing for more inputs for the game). In the strong composition 𝖪𝖶f𝖪𝖶g, Alice receives X(fg)1(1) and Bob receives Y(fg)1(0), and their objective is to identify a pair of indices (i,j) such that Xi,jYi,j, similar to the regular composition. However, this time it must hold additionally that g(Xi)g(Yi).

This way of relaxing the conjecture was considered in a number of previous papers and was formalized recently by Meir [14]. Håstad and Wigderson, in their proof of the lower bound for two universal relations, initially establish the result for what they call the extended universal relation, a concept closely related to strong composition. Similarly, Karchmer et al. [11] demonstrate that, in the monotone setting, strong composition coincides with the standard composition. de Rezende et al. [2] utilized this notion, although without explicitly naming it. Meir [14] formalized the notion of strong composition in his proof of the relaxation of the KRW conjecture.

Theorem 1 (Meir, [14]).

There exists a constant γ>0.04 such that for every non-constant function f:{0,1}m{0,1} and for all n, there exists a function g:{0,1}n{0,1} such that

𝖢𝖢(𝖪𝖶f𝖪𝖶g)log𝖢𝖢(𝖪𝖶f)(1γ)m+nO(log(mn)).

1.1 Our Result

Håstad [6] proved the KRW conjecture for 𝖪𝖶f𝖪𝖶𝖷𝖮𝖱. However it is still an open question to prove the KRW conjecture for 𝖪𝖶𝖷𝖮𝖱𝖪𝖶f. In this paper, we study the strong composition 𝖪𝖶𝖷𝖮𝖱m𝖪𝖶f of the parity function 𝖷𝖮𝖱m with a random function f:{0,1}logm{0,1}. Since Alice and Bob receive an input of size mlogm, we estimate the size of 𝖪𝖶𝖷𝖮𝖱m𝖪𝖶f in terms of n=mlogm. It is not difficult to see that the communication complexity of the corresponding game is at most 3logn: 𝖪𝖶f can be solved in logm bits of communication, whereas 𝖪𝖶𝖷𝖮𝖱m can be solved in 2logm bits of communication, using the standard divide-and-conquer approach (Alice sends the parity of the first half, Bob then identifies the half in which the parity differs, thus, by utilizing 2 bits of communication, the input size is reduced by a factor of two). We prove that if the function f is well balanced and hard to approximate (which happens with probability 1o(1)), then the bound 3logn is essentially optimal. Below, we state the result in terms of the protocol size (i.e., the number of leaves), rather than depth, since this gives a more general lower bound. In particular, it immediately implies a (3o(1))logn depth lower bound.

Corollary 2.

With probability 1o(1), for a random function f:{0,1}logm{0,1}, any protocol solving 𝖪𝖶𝖷𝖮𝖱m𝖪𝖶f has at least n3o(1) leaves, where n=mlogm.

In turn, this result follows from the following general lower bound, given in terms of 𝖫34 that stands for the smallest size of a formula that agrees with f on a 34 fraction of inputs.

Theorem 3.

For any 0.49-balanced function f:{0,1}logm{0,1}, any protocol solving 𝖪𝖶𝖷𝖮𝖱m𝖪𝖶f has at least n2o(1)𝖫34(f) leaves, where n=mlogm.

In contrast to many results mentioned above and similarly to the bound by de Rezende at al. [2], our result works for a wide range of inner functions f, what brings us closer to resolving KRW, which makes a claim about the complexity of composing any pair of functions. Also, many of the previous techniques work well in the regime where the outer function is hard and give no strong lower bounds when the outer function is easy (as it is the case with the 𝖷𝖮𝖱 function). For example, random restrictions (as one of the most successful methods for proving lower bounds) does not seem to give meaningful lower bounds for 𝖪𝖶𝖷𝖮𝖱m𝖪𝖶f, as under a random restriction this composition turns into a 𝖷𝖮𝖱 of a small number of variables which is easy to compute. The lower bound by Meir (see Theorem 1) also gives strong lower bounds in the regime where the outer function is hard (and only gives a trivial lower bound of the form o(logn) for the function that we study).

To prove the lower bound, we exploit formal complexity measures. As in [4, 15], we consider two stages of a protocol solving 𝖪𝖶𝖷𝖮𝖱m𝖪𝖶f. During the first stage, we track the progress using the classical measure by Khrapchenko [13] and ensure that even after many steps of the protocol, there are still many instances of f that need to be solved. At the second stage, we switch to another formal complexity measure and show that the remaining communication problem is, roughly, not easier than 𝖪𝖶𝖮𝖱𝖪𝖶f. We believe that this proof technique is interesting on its own, since it is not only easy to show that Khrapchenko’s measure cannot give superquadratic size lower bounds, but it is also known that natural generalizations of this measure are also unable to give stronger than quadratic lower bounds [8]. For more details on Khrapchenko’s measure and its limitations, see Sections 2.1 and 2.5.

2 Notation, Known Facts, and Technical Lemmas

Throughout the paper, log denotes the binary logarithm whereas ln denotes the natural logarithm. By n we usually denote the size of the input. All asymptotic estimates are given under an implicit assumption that n goes to infinity. By [n], we denote the set {1,2,,n}. By 𝖱+ we denote the set {x𝖱:x>0}. We utilize the following asymptotic estimates for binomial coefficients. For any constant 0<α<1,

Ω(n1/2)2h(α)n(nαn)2h(α)n, (1)

where h(x)=xlogx(1x)log(1x) denotes the binary entropy function.

For a string x{0,1}n, its i-th bit of x is denoted by xi. For a matrix X{0,1}m×n, by Xi we denote the i-th row of X and by Xi,j we denote the bit of X in the intersection of the i-th row and the j-th column.

2.1 Graphs

For a rooted tree, the depth of its node is the number of edges on the path from the node to the root; the depth of the tree is the maximum depth of its nodes.

Let G(V,E) be a graph and AV be its nonempty subset of nodes. By G[A], we denote a subgraph of G induced by A. By avgdeg(G,A), we denote the average degree of A:

avgdeg(G,A)=1|A|vAdeg(v). (2)

For a biparite graph G(AB,E) with nonempty parts, let

ψ(G)=avgdeg(G,A)avgdeg(G,B). (3)

Clearly, ψ(G)|A||B|. The lemma below shows that this graph measure is subadditive.

Lemma 4.

Let G(AB,E) be a bipartite graph and A=ALAR be a partition of A into two parts. Let GL=G[ALB] and GR=G[ARB]. Then,

ψ(G)ψ(GL)+ψ(GR).

Proof.

Let EL and ER be the set of edges of GL and GR, respectively. Clearly, E=ELER. Then,

ψ(G)ψ(GL)+ψ(GR) |E|2(|AL|+|AR|)|B||EL|2|AL||B|+|ER|2|AR||B|
|EL|2+|ER|2+2|EL||ER||AL|+|AR||EL|2|AL|+|ER|2|AR|
2|EL||ER||AL||AR||ER|2|AL|2+|EL|2|AR|2
0(|ER||AL||EL||AR|)2.

The next lemma shows that if G contains a node of small enough degree, then deleting it not only does not drop ψ, but also does not drop too much the average degree of the parts.

Lemma 5.

Let a node aA of a bipartite graph G(AB,E) satisfy deg(G,a)avgdeg(G,A)/2 and let A=A{a} and G(AB,E)=G[A{a}B]. Then,

ψ(G) ψ(G), (4)
avgdeg(G,A) avgdeg(G,A), (5)

Proof.

The inequality avgdeg(G,A)avgdeg(G,A) holds since A results from A by removing a node of degree less than the average degree.

To prove the inequality (4), let d=deg(G,a). Then, |E|=|E|d and

ψ(G)ψ(G) (|E|d)2(|A|1)|B||E|2|A||B|
|E|22|E|d+d2(|A|1)|B||E|2|A||B|
|E|2d|A|1|E||A|
|E||A|2d|A||E|(|A|1)
d|E|2|A|=avgdeg(G,A)2.

2.2 Boolean Functions

By 𝔹n, we denote the set of all Boolean functions on n variables. For two disjoint sets A,B{0,1}n, the set A×B is called a combinatorial rectangle, and it is called full if A and B form a partition of {0,1}n. Clearly, there is a bijection between 𝔹n and full combinatorial rectangles. For f𝔹n, by Rf=f1(1)×f1(0), we denote the corresponding full rectangle. We say that a Boolean function f is balanced if |f1(0)|=|f1(1)|.

In this paper, it will prove convenient to apply a function g𝔹m not only to Boolean vectors x{0,1}m, but also to matrices X{0,1}n×m:

g(X)=(g(X1),,g(Xn)),

i.e., g(X){0,1}n results by applying g to every row of X. This allows to define a composition in a natural way. For f𝔹m and g𝔹n, their composition fg:{0,1}m×n{0,1} treats the input as an m×n matrix and first applies g to all its rows and then applies f to the resulting column-vector:

fg(X)=f(g(X))=f(g(X1),,g(Xm)).

For a set of matrices 𝒳{0,1}m×n, by i-th projection proji𝒳, we denote the set of all i-th rows among the matrices of 𝒳:

proji𝒳={Xi:X𝒳}={t{0,1}n:X𝒳:t=Xi}. (6)

In the proof of the main result, we will be dealing with Boolean matrices of dimension n×logn. Let 𝒳{0,1}n×logn be a set of such matrices. We say that 𝒳 is α-bounded if |proji𝒳|αn, for all i[n]. The i-th projection of 𝒳 is called sparse if |proji𝒳|<38n, and dense otherwise. The following lemma shows that if |𝒳| is large and 𝒳 is α-bounded, then the number of sparse projections of 𝒳 is low. Later on, we will be applying this lemma for 𝒳 which is almost 0.5-bounded and whose size gradually decreases to argue that the number of sparse projections cannot grow too fast.

Lemma 6.

Let k and α(38,12]. If 𝒳{0,1}n×logn is α-bounded and |𝒳|αnnn2k, then the number of sparse projections of 𝒳 does not exceed klog18α3.

Proof.

Let βi[0,1] be such that |proji𝒳|=βiαn. The i-th projection is sparse if and only if βi<38α. Let t be the number of sparse projections and assume, without loss of generality, that the first t projections are sparse. Then,

αnnn2k |𝒳|i=1n|proji𝒳|=(αn)ni=1nβi
12k i=1nβi=i=1tβii=t+1nβi<(38α)tklog18α3t.

2.3 Boolean Formulas

The computational model studied in this paper is de Morgan formulas: it is a binary tree whose leaves are labeled by variables x1,,xn and their negations whereas internal nodes (called gates) are labeled by  and  (binary disjunction and conjunction, respectively). Such a formula computes a Boolean function f(x1,,xn)𝔹n. We also say that a formula F separates a rectangle A×B, if f(a)=1 and f(b)=0, for all (a,b)A×B. This way, if a formula F computes a function f, then it separates Rf.

For a formula F, the size 𝖫(F) is defined as the number of leaves in F. This extends to Boolean functions: for f𝔹n, by 𝖫(f) we denote the smallest size of a formula computing f. Similarly, the depth 𝖣(F) is the depth of the tree whereas 𝖣(f) is the smallest depth of a formula computing f.

By 𝖫34(f), we denote the smallest size of a formula F that agrees with f on a 34 fraction of inputs, i.e.,

Prx{0,1}n[F(x)=f(x)]34.

We say that F approximates f.

It is known that formulas can be balanced: 𝖣(f)=Θ(log𝖫(f)) (see references in [10, Section 6.1]): this is proved by showing that, for any formula F, there exists an equivalent formula F with 𝖫(F)𝖫(F)O(1) and 𝖣(F)O(log𝖫(F)). The following theorem further refines this: by allowing a larger constant in the depth upper bound, one can control the size of the resulting balanced formula.

Theorem 7 ([1]).

For any k2 and any formula F, there exists an equivalent formula F satisfying 𝖣(F)3ln2klog𝖫(F) and 𝖫(F)𝖫(F)γ, where γ=1+11+log(k1).

Using a counting argument, one can show that, with probability 1o(1), for a random Boolean function f𝔹n, 𝖫(f)=Ω(2n/logn). To prove this, one compares the number of small size formulas with the number of Boolean functions |𝔹n|=22n, using the following estimate (see [10, Lemma 1.23]). It ensures that the number of formulas of size at most 2n100logn is o(|𝔹n|):

(17n)2n100logn=2log(17n)100logn2n.
Lemma 8.

For all large enough l, the number of Boolean formulas over n variables with at most l leaves is at most

(17n)l. (7)

Proof.

The number of binary trees with l leaves is at most 4l. For each such tree, there are at most (4n)l ways to convert it into a de Morgan formula: there are 2n input literals for the leaves and two operations for each internal gate. Consequently, the total number of formulas with at most l leaves is at most

l4l(4n)l=l16lnl(17n)l,

which is true for l71.

We say that f𝔹n is α-balanced if

α2n|f1(0)|,|f1(1)|(1α)2n

i.e., ||f1(0)||f1(1)||(12α)2n.

Lemma 9.

For all sufficiently large n and any constant 38<α<12, a random function f𝔹n is α-balanced and 𝖫34(f)=Ω(2nlogn), with probability 1o(1).

Proof.

For a formula over n variables, the number of Boolean functions it approximates is at most (by the estimate (1))

d=32n/42n(2nd)=d=02n/4(2nd)2n(2n2n/4)2n2h(1/4)2n.

Combining this with (7), we get that the number of functions approximated by formulas of size β2nlogn is at most

(17n)β2nlogn2n2h(1/4)2n=22n(βlog(17n)logn+h(1/4))+n.

For any constant 0<β<1h(1/4), this is a o(1) fraction of 𝔹n.

Now, the probability that a random f𝔹n is not α-balanced (i.e., ||f1(0)||f1(1)||>(12α)2n) is at most

122n2i=0α2n1(2ni)122n2α2n(2nα2n)22n(h(α)1)+n+1=o(1).

Thus, with probability 1o(1), a random f𝔹n is α-balanced and hard to approximate.

2.4 Karchmer–Wigderson Games

Karchmer and Wigderson [12] came up with the following characterization of Boolean formulas. For a Boolean function f𝔹n, the Karchmer–Wigderson game 𝖪𝖶f is the following communication problem. Alice is given af1(1), whereas Bob is given bf1(0), and their goal is to find an index i[n] such that aibi. A communication protocol for 𝖪𝖶f is a rooted binary tree whose leaves are labeled with indices from [n] and each internal node v is labeled either by a function Av:f1(1){0,1} or by a function Bv:f1(0){0,1}. For any pair (a,b)f1(1)×f1(0), one can reach a leaf of the protocol by traversing a path from the root to a leaf to determine to which of the two children to proceed from a node v, one computes either Av(a) or Bv(b). We say that a protocol solves 𝖪𝖶f, if for any (a,b)f1(1)×f1(0), one reaches a leaf i[n] such that aibi. Similarly to formulas, we say that a protocol separates a combinatorial rectangle A×B, if it works correctly for all pairs (a,b)A×B.

Karchmer and Wigderson showed that formulas computing f and protocols solving 𝖪𝖶f can be transformed (even mechanically) into one another. In particular, the smallest number of leaves in the protocol solving 𝖪𝖶f is equal to 𝖫(f), whereas the smallest depth of a protocol (also known as the communication complexity of 𝖪𝖶f, denoted by 𝖢𝖢(𝖪𝖶f)) is nothing else but 𝖣(f). By 𝖫(A×B) for a combinatorial rectangle A×B, we denote the minimum number of leaves in a protocol separating A and B.

With each node of a protocol solving 𝖪𝖶f, one can associate a combinatorial rectangle in a natural way. The root of the protocol corresponds to Rf. For the two children of Alice’s node v with a rectangle A×B, one associates two rectangles A0×B and A1×B, where Ai={aA:Av(a)=i}. This way, Alice splits the current rectangle horizontally. Similarly, when Bob speaks, he splits the current rectangle vertically. Each leaf of a protocol solving 𝖪𝖶f is associated with a monochromatic rectangle, i.e., a rectangle A×B such that there exists i[n] for which aibi for all (a,b)A×B.

For functions f𝔹m and g𝔹n, the strong composition of 𝖪𝖶f and 𝖪𝖶g, denoted as 𝖪𝖶f𝖪𝖶g, is the following communication problem: Alice and Bob receive inputs X(fg)1(1) and Y(fg)1(0), respectively, and need to find indices (i,j) such that Xi,jYi,j and g(Xi)g(Yi). We say that a protocol strongly separates sets 𝒳(fg)1(1) and 𝒴(fg)1(0), if it solves the strong composition 𝖪𝖶f𝖪𝖶g on inputs 𝒳×𝒴.

2.5 Formal Complexity Measures

For f𝔹n, define a bipartite graph Gf(f1(1)f1(0),Ef) as follows:

Ef={{u,v}:uf1(1),vf1(0),dH(u,v)=1},

where dH is the Hamming distance. Khrapchenko [13] proved that, for any f𝔹n, ψ(Gf)𝖫(f) (recall (3) for the definition of ψ(G)). This immediately gives a lower bound 𝖫(𝖷𝖮𝖱n)n2. Note the two useful properties of ψ(Gf): on the one hand, it is a lower bound to 𝖫(f), on the other hand, it is much easier to estimate than 𝖫(f).

Paterson [19, Section 8.8] noted that Khrapchenko’s approach can be cast as follows. A function μ:𝔹n𝖱+ is called a formal complexity measure if it satisfies the following two properties:

  1. 1.

    normalization: μ(xi),μ(xi¯)1, for all i[n],

  2. 2.

    subadditivity: μ(fg)μ(f)+μ(g) and μ(fg)μ(f)+μ(g), for all f,g𝔹n.

Note that Khrapchenko’s measure can be defined in this notation as ϕ(f)=ψ(Gf). Its subadditivity is shown in Lemma 4, whereas the normalization property can be easily seen.

It is not difficult to see that 𝖫 itself is a formal complexity measure. Moreover, it turns out that it is the largest formal complexity measure.

Lemma 10 (Lemma 8.1 in [19]).

For any formal complexity measure μ:𝔹n𝖱 and any fBn, μ(f)𝖫(f).

3 Proof of the Main Result

In this section, we prove the main result of the paper.

See 3

See 2

Proof.

Lemma 9 guarantees that for a random function f:{0,1}logm{0,1}, f is 0.49-balanced and 𝖫34(f)=Ω(m/loglogm) with probability 1o(1). Plugging this into Theorem 3 gives the required lower bound.

3.1 Proof Overview

We start by proving a lower bound on the size of any protocol solving 𝖪𝖶𝖷𝖮𝖱m𝖪𝖶f and having a logarithmic depth. Then, using balancing techniques (see Theorem 7), we generalize the size lower bound to all protocols.

Fix a set 𝒵{0,1}logm such that |𝒵|=0.98m and f is balanced on 𝒵: |𝒳0|=|𝒴0|=0.49m, where 𝒳0=f1(1)𝒵 and 𝒴0=f1(0)𝒵.

We prove a lower bound for any protocol that strongly separates 𝖪𝖶𝖷𝖮𝖱m𝖪𝖶f on inputs 𝒳T×𝒴T (which are defined later). To this end, we associate, with nodes of the protocol, a graph similar to G𝖷𝖮𝖱m and use Khrapchenko’s measure to track the progress of the protocol. A node of the graph is associated with all inputs X having the same vector f(X). The reasoning is that, in a natural scenario, the protocol will first solve 𝖷𝖮𝖱m, followed by solving f, implying that the protocol does not need to distinguish between X and X in the initial rounds, if f(X)=f(X). We connect two graph nodes by an edge if their vectors differ in exactly one coordinate.

We aim to ensure that each edge in the graph has a large projection: for any two nodes connected by an edge, the elements of blocks associated with them cover a substantial number of inputs for the function f. There will be no small protocol capable of solving the problem within these two blocks since f is hard to approximate. This is the rationale behind ensuring that all edges in the graph have large projections on both sides. To achieve this, we enforce that each block that is associated with a node shrinks by at most a factor of two at each step of the protocol. This process ensures that a significant number of edges in the graph will maintain large projections on both sides.

Once the Khrapchenko measure becomes sufficiently small, we can assert that 𝖷𝖮𝖱m is nearly solved, and the protocol, in a sense, must now solve an instance of 𝖮𝖱df. Using the fact that solving each edge independently is hard, we conclude that solving an 𝖮𝖱df over these edges should be as difficult as approximately d𝖫34(f).

3.2 Proof

Throughout this section, we assume that m is large enough and f𝔹logm is a fixed function that is 0.49-balanced. Fix sets 𝒳0f1(1),𝒴0f1(0) of size 0.49m and let

𝒳T ={X{0,1}m×logm:(𝖷𝖮𝖱mf)(X)=1Xi𝒳0𝒴0,i[m]}, (8)
𝒴T ={Y{0,1}m×logm:(𝖷𝖮𝖱mf)(Y)=0Yi𝒳0𝒴0,i[m]}. (9)

Let α>0 be a constant and P be a protocol that strongly separates 𝒳T×𝒴T and has depth at most αlogm. Recall that each node S of P is associated with a rectangle 𝒳S×𝒴S. We build a subtree D of P having the same root and associate a graph GN to every node N of D. The graphs GN are built inductively from the graphs associated with the parents of N as explained below, but all these graphs are subsets of the m-dimensional hypercube: the set of nodes of each such graph is a subset of {0,1}m and for each edge {u,v} it holds that dH(u,v)=1.

For the root T of the protocol P, the graph GT is simply G𝖷𝖮𝖱m (which is nothing else but the m-dimensional hypercube): its set of nodes is {0,1}m, two nodes are joined by an edge with label i if they differ in the i-th coordinate.

For any node v of the graph GS, we associate the following set of inputs called block:

S(v)={X{0,1}m×logm:X𝒳S𝒴S and f(X)=v}.

We say that an edge {u,v} with label i of GS is heavy if the projection of both S(u) and S(v) onto the ith coordinate is dense, i.e.,

|projiS(u)|,|projiS(v)|38m,

and light otherwise.

Since the nodes of the graph GS form a subset of {0,1}m, we can naturally divide them into two parts, as their blocks correspond to subsets of either 𝒳S or 𝒴S.

AS ={vV(GS)𝖷𝖮𝖱m(v)=1}
BS ={vV(GS)𝖷𝖮𝖱m(v)=0}

For a graph GS, we define dA(GS) as the average degree of the part AS and dB(GS) as the average degree of the part BS. We say that a graph GS is special if

min{dA(GS),dB(GS)}12αlog2m.

We will construct the tree D inductively. For a node S in the tree D, we either stop the process if GS is special, or construct the two children of S from the protocol P and their graphs. We continue building D on these two children inductively. Hence, all graphs corresponding to internal nodes of the tree D are not special, while all graphs associated with leaves of D are special.

Definition 11.

A graph GS, associated with a node S in the tree D, is adjusted if all its edges are heavy and

deg(v)>dA(GS)2,vASanddeg(v)>dB(GS)2,vBS. (10)

We will ensure that all graphs GS for any node S in the tree D are adjusted.

Lemma 12.

For each node v of the graph GT (associated with the root T of the protocol P),

  1. 1.

    the degree of v is m;

  2. 2.

    |projiT(v)|=0.49m, for all i[m];

  3. 3.

    |T(v)|=(0.98m)m2m.

Proof.

Nodes of GT are m-dimensional binary vectors, hence deg(v)=m.

To prove the second property, recall that f is balanced on 𝒳0𝒴0. If vi=1 (or vi=0), for some i[m], the i-th projection can take any value from 𝒳0 (𝒴0, respectively). Hence, |projiT(v)|=0.49m.

Finally, to prove the third property, note the GT has 2m nodes and for each vertex v the size of the block T(v) is at most (0.49m)m. Therefore, since each input from 𝒳T𝒴T belongs to exactly one block that is associated with a node from GT and |𝒳T𝒴T|=|𝒳0𝒴0|m=(0.98m)m, |T(v)|=(0.98m)m2m.

Lemma 12 ensures that the graph GT is adjusted and not special, thus the root T has two children. Using the function , we show how to construct an intermediate graph HN for some child of a node S in the tree D and then we apply some cleanup procedures for the graph HN to construct a graph GN. Recall that each step of P partitions the set of either Alice’s or Bob’s inputs into two parts. Let GS be a graph for some node S of the protocol P that is associated with a rectangle 𝒳S×𝒴S and assume, without loss of generality, that it is Alice’s turn. Therefore, graph GS is not special, otherwise we will stop the building process of the subtree of S. Let SL be the left child of S in the protocol P and SR be the right child. We add the same children of the node S in the tree D. Then, we put v from BS into both HSL and HSR (since the block S(v) has not changed). For each node vAS we decide in which of the two graphs we will put it. The block S(v) is also split into two: SL(v) and SR(v), corresponding to the two ways of the protocol. We assign v to the left graph HSL if 2|SL(v)||S(v)|, and to the right graph HSR if 2|SR(v)|>|S(v)|. An edge {u,v} from the edges of GS goes to HSL if and only if both u and v are assigned to HSL. The same rule applies for edges in HSR. This approach ensures that the size of each block S(v) shrinks by at most a factor of two when transitioning from a parent to a child in the tree D. Then, the graphs GSL and GSR will be built using graphs HSL and HSR, respectively.

The idea of the structure of the graph GS arises from Khrapchenko’s graph, so we will use the same measure:

ψ(GS)=dA(GS)dB(GS).

Lemma 4 states that ψ is subadditive.

After obtaining the graph HC for a node C of the tree D, we make our first cleanup by deleting all light edges: let HC be a graph resulting from HC by removing all its light edges. The next lemma shows that this does not drop the measure ψ too much.

Lemma 13.
ψ(HC)ψ(HC)(11logm).

Proof.

Let S be the parent of C in D. Since S is not a leaf, we have that min{dA(GS),dB(GS)}>12αlog2m and the degree of every node in GS is at least half of the average degree of its part. Without loss of generality, assume that inputs were deleted from 𝒳S, and therefore dA(HC)dA(GS)2>6αlog2m.

An edge {u,v} can become light because of only one of its endpoints, because the blocks on the other side remain unchanged. From Lemma 12, we know that the initial size of each block is (0.49m)m, and after each step of the protocol, the size of a block shrinks by at most a factor of two. Hence, for any node v, the size of its block S(v) is at least (0.49m)m2αlogm, because the protocol depth is bounded by αlogm. Hence, we can bound the number of light edges incident to v by 3αlogm using Lemma 6 (since log1(80.49/3)<3). Therefore,

dA(HC)dA(HC)3αlogm.

Now, consider dB(HC). Let EC be the set of edges in HC, whereas AC and BC be its parts of nodes. Then,

dB(HC)EC|AC|3αlogm|BC|=dB(HC)3αlogm|AC||BC|.

Hence,

ψ(HC)=dA(HC)dB(HC) (dA(HC)3αlogm)(dB(HC)3αlogm|AC||BC|)
ψ(HC)3αdB(HC)logm3α|AC|dA(HC)logm|BC|
=ψ(HC)(13αlogmdA(HC)3α|AC|logm|EC|)
=ψ(HC)(16αlogmdA(HC))
>ψ(HC)(16αlogm6αlog2m)=ψ(HC)(11logm).

The next lemma shows how to construct an adjusted graph GC, from the intermediate graph HC.

Lemma 14.

There exists a subgraph GC of the graph HC such that GC is adjusted and ψ(GC)ψ(HC)(11logm).

Proof.

To get GC, we keep removing nodes from HC until it satisfies (10). If (10) is violated, there exists, without loss of generality, a node vAC such that deg(v)dA(GC)2. Let GC=GC{v}. Lemma 5 guarantees that this does not decrease the measure. This process is clearly finite.

This way, we construct the graph GC for the node C. If C is not special, we continue expanding the subtree rooted at C. Recall also that, for each internal node S of the tree D, whose children are SL and SR, the following holds:

ψ(GS)ψ(HSL)+ψ(HSL).

Hence, combining it with Lemma 14 we have:

ψ(GS)(11logm)ψ(GSL)+ψ(GSR). (11)

On the other hand, if S is special, we will use the following two lemmas to argue that strongly separating 𝒳S×𝒴S is still difficult.

Lemma 15.

Let S be a node of the tree D such that it has a node vGS having d adjacent edges. Then, any protocol that strongly separates 𝒳S and 𝒴S has at least Ω(d𝖫34(f)) leaves.

Proof.

Consider the subgraph of GS induced by v and its neighbors u1,,ud connected to v. Denote by li the label of the edge {v,ui}. Define a measure ξ on subrectangles of 𝒳S×𝒴S:

ξ(𝒳×𝒴)=i=1d𝖫(projli×projlii),

where 𝒳𝒳S,𝒴𝒴S, =𝒳S(v) and i=𝒴S(ui), for all i[d]. By 𝖪𝖶(A×B), for any AB=, we denote a Karchmer-Wigderson communication game where Alice gets aA, Bob gets bB, and they need to find i:aibi. We prove that any protocol strongly separating 𝒳S×𝒴S requires at least ξ(𝒳S×𝒴S) leaves.

It is easy to see that ξ is subadditive, being a sum of subadditive measures: if 𝒳=𝒳𝒳′′, then ξ(𝒳×𝒴)ξ(𝒳×𝒴)+ξ(𝒳′′×𝒴) and the same applies when we split 𝒴. Namely, let 𝒴=𝒴𝒴′′, i=𝒴S(ui), and i′′=𝒴′′S(ui). Then,

ξ(𝒳×𝒴𝒴′′) =i=1d𝖫(projli×projliii′′)
i=1d𝖫(projli×projlii)+i=1d𝖫(projli×projlii′′)
=ξ(𝒳×𝒴)+ξ(𝒳×𝒴′′).

Consider a protocol P strongly separating 𝒳S×𝒴S and its leaf L associated with a rectangle of inputs 𝒳L×𝒴L. We show that ξ(𝒳L×𝒴L)1. Since L is a leaf, there exists i,j such that for each X𝒳L and Y𝒴L:

Xi,jYi,jandf(Xi)f(Yi).

Let k be such that k (if all t are empty, then ξ=0). Then, (ut)=, for all tk, as otherwise there would be no i such that f(Xi)f(Yi) for all (X,Y)𝒳L×𝒴L, since uk differs from v in the position lk, and ut differs from v in the position lt and lklt. Thus, if ξ(𝒳L×𝒴L)>1, then 𝖫(projlk×projlkk)>1, which contradicts to the existence of a pair (i,j).

Thus, ξ is normal (has the value at most 1 for any leaf of any protocol that strongly separates 𝒳S×𝒴S) and subadditive. Hence, its value for the whole protocol P is a lower bound on the size of P. Thus, it remains to estimate ξ for P.

Since all d edges are heavy, we have:

|projliS(v)|+|projliS(ui)|34m,i[d].

Hence,

𝖫(projliS(v)×projliS(ui))=Ω(𝖫34(f)),

for all i[d]. Summing over all i[d], gives the desired lower bound.

Lemma 16.

For a special node S of the tree D, the number of leaves in any protocol strongly separating 𝒳S×𝒴S is

Ω(ψ(GS)𝖫34(f)log2m).

Proof.

Assume, without loss of generality, that

dA(GS)dB(GS)anddB(GS)12αlog2m.

Applying Lemma 15 to a node of degree at least dA(GS), we get that the number of leaves is at least

Ω(dA(GS)𝖫34(f))=Ω(ψ(GS)dB(GS)𝖫34(f))=Ω(ψ(GS)𝖫34(f)log2m).

At this point, everything is ready to lower bound the size of any protocol of logarithmic depth.

Theorem 17.

The size of the protocol P (strongly separating 𝒳T×𝒴T) is

Ω(m2𝖫34(f)log2m(11logm)αlogm).

Proof.

Lemma 16 states that the number of leaves needed to resolve any leaf S of the tree D is Ω(ψ(GS)𝖫34(f)/log2m). Let 𝒮 be the set of all leaves of the tree D. Using estimate (11), we have:

ψ(GT)(11logm)αlogmS𝒮ψ(GS).

Since ψ(GT)=m2 (by Lemma 12), Then, the number of leaves in P is

Ω(S𝒮ψ(GS)𝖫34(f)log2m)Ω(m2𝖫34(f)log2m(11logm)αlogm).

Recall that α is a constant. Assuming m4, we have logm2, and thus 11logme2logm. Then,

m2𝖫34(f)log2m(11logm)αlogmm2𝖫34(f)log2me2logmαlogmm2ε𝖫34(f),

for any constant ε>0 when m is sufficiently large. Hence, the number of leaves needed for a protocol P is m2o(1)𝖫34(f).

Finally, we get rid of the assumption that the depth of P is logarithmic and prove the main result.

Proof of Theorem 3.

Let P be a protocol with m2ε𝖫34(f) leaves, for some ε>0, solving 𝖪𝖶𝖷𝖮𝖱m𝖪𝖶f. We transform it into a protocol P with (m(2ε)𝖫34)γ leaves and depth bounded by 3(3ε)kln2logm, by applying Theorem 7, where γ=1+11+log(k1). (Theorem 7 is stated in terms of formulas, but it is not difficult to see that it works also for protocols for strong composition.)

Since ε>0 and limkγ=1, there exist k and ε>0 such that

(m2ε𝖫34(f))γm2ε𝖫34(f),

since 𝖫34(m)m. Hence, protocol P has logarithmic depth and at most m2ε𝖫34(f) leaves, which contradicts Theorem 17. Therefore, P has Ω(m2o(1)𝖫34(f))=Ω(n2o(1)𝖫34(f)) leaves.

References

  • [1] Maria Luisa Bonet and Samuel R. Buss. Size-depth tradeoffs for boolean fomulae. Inf. Process. Lett., 49(3):151–155, 1994. doi:10.1016/0020-0190(94)90093-0.
  • [2] Susanna F. de Rezende, Or Meir, Jakob Nordström, Toniann Pitassi, and Robert Robere. KRW composition theorems via lifting. Comput. Complex., 33(1):4, 2024. doi:10.1007/s00037-024-00250-7.
  • [3] Irit Dinur and Or Meir. Toward the KRW composition conjecture: Cubic formula lower bounds via communication complexity. Comput. Complex., 27(3):375–462, 2018. doi:10.1007/s00037-017-0159-x.
  • [4] Jeff Edmonds, Russell Impagliazzo, Steven Rudich, and Jirí Sgall. Communication complexity towards lower bounds on circuit depth. Comput. Complex., 10(3):210–246, 2001. doi:10.1007/s00037-001-8195-x.
  • [5] Dmitry Gavinsky, Or Meir, Omri Weinstein, and Avi Wigderson. Toward better formula lower bounds: The composition of a function and a universal relation. SIAM J. Comput., 46(1):114–131, 2017. doi:10.1137/15M1018319.
  • [6] Johan Håstad. The shrinkage exponent of de morgan formulas is 2. SIAM J. Comput., 27(1):48–64, 1998. doi:10.1137/S0097539794261556.
  • [7] Johan Håstad and Avi Wigderson. Composition of the universal relation. In Jin-Yi Cai, editor, Advances In Computational Complexity Theory, Proceedings of a DIMACS Workshop, New Jersey, USA, December 3-7, 1990, volume 13 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science, pages 119–134. DIMACS/AMS, 1990. doi:10.1090/dimacs/013/07.
  • [8] Pavel Hrubes, Stasys Jukna, Alexander S. Kulikov, and Pavel Pudlák. On convex complexity measures. Theor. Comput. Sci., 411(16-18):1842–1854, 2010. doi:10.1016/j.tcs.2010.02.004.
  • [9] Russell Impagliazzo and Noam Nisan. The effect of random restrictions on formula size. Random Struct. Algorithms, 4(2):121–134, 1993. doi:10.1002/rsa.3240040202.
  • [10] Stasys Jukna. Boolean Function Complexity - Advances and Frontiers, volume 27 of Algorithms and combinatorics. Springer, 2012. doi:10.1007/978-3-642-24508-4.
  • [11] Mauricio Karchmer, Ran Raz, and Avi Wigderson. Super-logarithmic depth lower bounds via the direct sum in communication complexity. Comput. Complex., 5(3/4):191–204, 1995. doi:10.1007/BF01206317.
  • [12] Mauricio Karchmer and Avi Wigderson. Monotone circuits for connectivity require super-logarithmic depth. SIAM J. Discret. Math., 3(2):255–265, 1990. doi:10.1137/0403021.
  • [13] V. M. Khrapchenko. Method of determining lower bounds for the complexity of p-schemes. Mathematical notes of the Academy of Sciences of the USSR, 10(1):474–479, 1971. doi:10.1007/BF01747074.
  • [14] Or Meir. Toward better depth lower bounds: A krw-like theorem for strong composition. In 64th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2023, Santa Cruz, CA, USA, November 6-9, 2023, pages 1056–1081. IEEE, 2023. doi:10.1109/FOCS57990.2023.00064.
  • [15] Ivan Mihajlin and Alexander Smal. Toward better depth lower bounds: The XOR-KRW conjecture. In Valentine Kabanets, editor, 36th Computational Complexity Conference, CCC 2021, July 20-23, 2021, Toronto, Ontario, Canada (Virtual Conference), volume 200 of LIPIcs, pages 38:1–38:24. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2021. doi:10.4230/LIPIcs.CCC.2021.38.
  • [16] Mike Paterson and Uri Zwick. Shrinkage of de morgan formulae under restriction. Random Struct. Algorithms, 4(2):135–150, 1993. doi:10.1002/rsa.3240040203.
  • [17] B. A. Subbotovskaya. Realization of linear functions by formulas using , &, -. Dokl. Akad. Nauk SSSR, 136(3):553–555, 1961. URL: http://mi.mathnet.ru/dan24539.
  • [18] Avishay Tal. Shrinkage of de morgan formulae by spectral techniques. In 55th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2014, Philadelphia, PA, USA, October 18-21, 2014, pages 551–560. IEEE Computer Society, 2014. doi:10.1109/FOCS.2014.65.
  • [19] Ingo Wegener. The complexity of Boolean functions. Wiley-Teubner, 1987. URL: http://ls2-www.cs.uni-dortmund.de/monographs/bluebook/.
  • [20] Hao Wu. An improved composition theorem of a universal relation and most functions via effective restriction. CoRR, abs/2310.07422, 2023. doi:10.48550/arXiv.2310.07422.