This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Simultaneous Multiparty Communication Complexity of Composed Functions

Yassine Hamoudi
IRIF, Université Paris Diderot, France.
hamoudi@irif.fr
Abstract

The Number On the Forehead (NOF) model is a multiparty communication game between kk players that collaboratively want to evaluate a given function F:𝒳1××𝒳k𝒴F:\mathcal{X}_{1}\times\cdots\times\mathcal{X}_{k}\rightarrow\mathcal{Y} on some input (x1,,xk)(x_{1},\dots,x_{k}) by broadcasting bits according to a predetermined protocol. The input is distributed in such a way that each player ii sees all of it except xix_{i} (as if xix_{i} is written on the forehead of player ii). In the Simultaneous Message Passing (SMP) model, the players have the extra condition that they cannot speak to each other, but instead send information to a referee. The referee does not know the players’ inputs, and cannot give any information back. At the end, the referee must be able to recover F(x1,,xk)F(x_{1},\dots,x_{k}) from what she obtained from the players.

A central open question in the simultaneous NOF model, called the logn\log n barrier, is to find a function which is hard to compute when the number of players is polylog(n)\operatorname{polylog}(n) or more (where the xix_{i}’s have size poly(n)\operatorname{poly}(n)). This has an important application in circuit complexity, as it could help to separate 𝖠𝖢𝖢0\mathsf{ACC}^{0} from other complexity classes [HG91, BGKL04]. One of the candidates for breaking the logn\log n barrier belongs to the family of composed functions. The input to these functions in the kk-party NOF model is represented by a k×(tn)k\times(t\cdot n) boolean matrix MM, whose row ii is the number xix_{i} on the forehead of player ii and tt is a block-width parameter. A symmetric composed function acting on MM is specified by two symmetric nn- and ktkt-variate functions ff and gg (respectively), that output fg(M)=f(g(B1),,g(Bn))f\circ g(M)=f(g(B_{1}),\dots,g(B_{n})) where BjB_{j} is the jj-th block of width tt of MM. As the majority function Maj is conjectured to be outside of 𝖠𝖢𝖢0\mathsf{ACC}^{0}, Babai et. al. [BKL95, BGKL04] suggested to study the composed function MajMajt\textsc{Maj}\circ\textsc{Maj}_{t}, with tt large enough, for breaking the logn\log n barrier (where Majt\textsc{Maj}_{t} outputs 1 if at least kt/2kt/2 bits of the input block are set to 1).

So far, it was only known that block-width t=1t=1 is not enough for MajMajt\textsc{Maj}\circ\textsc{Maj}_{t} to break the logn\log n barrier in the simultaneous NOF model [BGKL04] (Chattopadhyay and Saks [CS14] found an efficient protocol for tpolyloglog(n)t\leq\operatorname{polyloglog}(n), but it requires randomness to be simultaneous). In this paper, we extend this result to any constant block-width t>1t>1 by giving a deterministic simultaneous protocol of cost 2𝒪(2t)log2t+1(n)2^{\mathcal{O}\left(2^{t}\right)}\log^{2^{t+1}}(n) for any symmetric composed function fgf\circ g (which includes MajMajt\textsc{Maj}\circ\textsc{Maj}_{t}) when there are more than 2Ω(2t)logn2^{\Omega(2^{t})}\log n players.

Keywords: Communication complexity, Number On the Forehead model, Simultaneous Message Passing, Log n barrier, Symmetric Composed functions.

1 Introduction

1.1 Number On the Forehead and Simultaneous models

The Number On the Forehead (NOF) model is a multiparty communication model introduced by Chandra, Furst and Lipton [CFL83] that generalizes the two player communication game of Yao [Yao79]. In this model, kk players are given kk inputs x1𝒳1,,xk𝒳kx_{1}\in\mathcal{X}_{1},\dots,x_{k}\in\mathcal{X}_{k} on which they want to compute some function F:𝒳1××𝒳k𝒴F:\mathcal{X}_{1}\times\cdots\times\mathcal{X}_{k}\rightarrow\mathcal{Y}. Each player ii sees all of the input (x1,,xk)(x_{1},\dots,x_{k}), except xix_{i}. The situation is as if input xix_{i} is written on the forehead of player ii.

In order to collaboratively evaluate F(x1,,xk)F(x_{1},\dots,x_{k}), the players communicate by broadcasting bits according to a predetermined protocol. This protocol specifies whose turn it is to speak, and which bit is to be sent given the information exchanged so far and the input seen by the speaking player. It also determines when communication stops. At the end, all the players must be able to recover F(x1,,xk)F(x_{1},\dots,x_{k}) from the input they see and the transcript of the exchange. The cost of the protocol on input (x1,,xk)(x_{1},\dots,x_{k}) is the number of exchanged bits, and the total cost is the worst case cost on all inputs. The kk-party deterministic communication complexity of FF, denoted 𝖣k(F)\mathsf{D}_{k}(F), is the cost of the most efficient protocol computing FF.

In most of the settings, the xix_{i}’s are polyn\operatorname{poly}n-bits long (for some parameter nn) and 𝒴={0,1}\mathcal{Y}=\{0,1\}. In this case, the naive protocol is to broadcast first the entire input x1x_{1} (this can be done by player 2), and then player 1 computes F(x1,,xk)F(x_{1},\dots,x_{k}) and sends the result to the other players. This protocol has cost m+1m+1 (where m=poly(n)m=\operatorname{poly}(n) is the number of bits required for sending x1x_{1}), which proves 𝖣k(F)=𝒪(polyn)\mathsf{D}_{k}(F)=\mathcal{O}\left(\operatorname{poly}n\right). Consequently, a protocol will be said to be efficient if it has cost 𝒪(polylogn)\mathcal{O}\left(\operatorname{polylog}n\right) (i.e. we seek for exponential speed-up over the naive protocol).

Among the many variants of the previous framework (randomized, quantum, etc.), we will be interested in the simultaneous (or Simultaneous Message Passing - SMP) model [Yao79, NW93, BKL95, PRS97] in which the players cannot speak to each other but instead send information to a referee. The referee does not know the players’ inputs, and cannot give any information back. At the end, the referee must be able to recover F(x1,,xk)F(x_{1},\dots,x_{k}) from what she obtained from the players. The simultaneous deterministic communication complexity is denoted 𝖣k||(F)\mathsf{D}_{k}^{||}(F), and it always satisfies 𝖣k(F)𝖣k||(F)\mathsf{D}_{k}(F)\leq\mathsf{D}_{k}^{||}(F). It has often been easier to reason first in this weaker model for proving lower bounds [BGKL04, PRS97, BPSW05, BYJKS02]. It is also more suitable and fruitful for studying certain functions, such as Equality in the two party setting [Yao79, Amb96, NS96, BK97, BCWdW01, GRd08, BGK15]. We will show in the next section that the simultaneous deterministic communication model is also closely connected to lower bound results in the complexity class 𝖠𝖢𝖢0\mathsf{ACC}^{0}.

1.2 The log n barrier problem and 𝖠𝖢𝖢0\mathsf{ACC}^{0} lower bounds

The NOF model has proved to be of value in the study of many areas of computer science, such as branching programs [CFL83], Ramsey theory [CFL83], circuit complexity [HG91, BT94], quasirandom graphs [CT93], proof complexity [BPS07], etc. One of the most interesting connections, pointed out by Håstad and Goldmann [HG91] and refined in [BGKL04], is a way to derive lower bounds for the complexity class111𝖠𝖢𝖢0\mathsf{ACC}_{0} refers to the functions computable by constant-depth poly-size circuits with unbounded fan-in And, OR, Not and Modm\textsc{Mod}_{m} gates (where Modm\textsc{Mod}_{m} outputs 0 iff the sum of its inputs is divisible by mm). 𝖠𝖢𝖢0\mathsf{ACC}^{0} from lower bounds in the simultaneous NOF model. More precisely, according to a result from Yao, Beigel and Tarui [Yao90, BT94], any function f𝖠𝖢𝖢0f\in\mathsf{ACC}^{0} can be expressed as a depth-2 circuit whose top gate is a symmetric gate of fan-in 2logcn2^{\log^{c}n}, and each bottom gate is an And gate of fan-in logdn\log^{d}n (for some constants c,dc,d). Consequently, for any partition of the input of ff between k=logdn1k=\log^{d}n-1 players in the simultaneous NOF model, there exists a partition of the And gates between the players such that each of them sees all the input bits she needs to evaluate the gates she received. The players can then send to the referee the number of gates that evaluate to 1, which enables the referee to compute ff. The total cost of this protocol is 𝒪(klog(2logcn))=𝒪(logc+dn)\mathcal{O}\left(k\log\left(2^{\log^{c}n}\right)\right)=\mathcal{O}\left(\log^{c+d}n\right). Conversely, any super-polylogarithmic lower bound in the simultaneous NOF model for a function ff and a partition of its input between polylog(n)\operatorname{polylog}(n) players would imply f𝖠𝖢𝖢0f\notin\mathsf{ACC}^{0}.

Separating 𝖠𝖢𝖢0\mathsf{ACC}^{0} from other complexity classes is a central question in complexity theory. It is conjectured that 𝖠𝖢𝖢0\mathsf{ACC}^{0} does not contain the majority function Maj, but the only result known so far is 𝖭𝖤𝖷𝖯𝖠𝖢𝖢0\mathsf{NEXP}\not\subset\mathsf{ACC}^{0} [Wil14]. The aforementioned connection with communication complexity has motivated the search for a function which is hard to compute for klognk\geq\log n players in the simultaneous NOF model. This problem is called the logn\log n barrier.

Obtaining lower bounds in the NOF model is a challenging task, as the current methods become very weak when klognk\geq\log n. The only general lower bound technique known so far is the discrepancy method and its variants [BNS92, CT93, Raz00, She11]. One of the early application of it was an Ω(n/4k)\Omega(n/4^{k}) lower bound on the randomized complexity of the Generalized Inner Product (Gip) function [BNS92]. A long series of generalizations and improvements of the discrepancy method subsequently led to an Ω(nk2k)\Omega\left(\frac{\sqrt{n}}{k2^{k}}\right) (resp. Ω(n/4k)\Omega(n/4^{k})) lower bound on the randomized (resp. deterministic) complexity of the Disjointness (Disj) function [Tes03, BPSW06, CA08, LS09, BH12, She16, She14, RY15]. It might seem like other lower bound arguments could prove that Gip and Disj remain hard for klognk\geq\log n players. However, surprising non-simultaneous [Gro94, ACFN15] and simultaneous [BGKL04, ACFN15] protocols proved that the aforementioned lower bounds are nearly optimal, and that these two functions cannot break the logn\log n barrier. Very recently, Podolskii and Sherstov [PS17] showed that the randomized complexity of Gip and Disj is exactly Θ(logn1+k/logn+1)\Theta\left(\frac{\log n}{\left\lceil 1+k/\log n\right\rceil}+1\right) when klognk\geq\log n, and built a function having complexity Ω(logn)\Omega(\log n) independently of kk. Although these last results do not break the logn\log n barrier, they are the first superconstant lower bounds proved for explicit functions when klognk\geq\log n.

1.3 Composed Functions

An input x1,,xk{0,1}nx_{1},\dots,x_{k}\in\{0,1\}^{n} to kk players in the NOF model can be visualized as a k×nk\times n boolean matrix MM where row ii is the number xix_{i} on the forehead of player ii. The protocols known so far for Gip and Disj strongly rely on the particular way these functions act on matrix MM. They both consist in applying the g=Andg=\textsc{And} function on each of the nn columns of MM, followed by the f=Mod2f=\textsc{Mod}_{2} (for Gip) or f=Norf=\textsc{Nor} (for Disj) function on the nn resulting bits. Since Gip and Disj do not break the logn\log n barrier, a natural move has been to try other ff and gg functions, and to increase the number tt of columns on which each gg function applies. These are called the composed functions, formally defined below and depicted in Figure 1.

Definition 1 (Boolean input version).

Fix a block-width parameter t1t\geq 1, and consider functions f:{0,1}n{0,1}f:\{0,1\}^{n}\rightarrow\{0,1\} and g=(g1,,gn)\vec{g}=(g_{1},\dots,g_{n}) where gj:({0,1}t)k{0,1}g_{j}:(\{0,1\}^{t})^{k}\rightarrow\{0,1\}. Given x1,,xk{0,1}tnx_{1},\dots,x_{k}\in\{0,1\}^{t\cdot n}, the composed function fgf\circ\vec{g} for kk players outputs fg(x1,,xk)=f(g1(B1),,gn(Bn))f\circ\vec{g}(x_{1},\dots,x_{k})=f(g_{1}(B_{1}),\dots,g_{n}(B_{n})) where Bj({0,1}t)kB_{j}\in(\{0,1\}^{t})^{k} is the jthj^{th} block of width tt in the matrix representation MM of the input. When g=g1==gng=g_{1}=\dots=g_{n}, we denote fgf\circ\vec{g} by fgf\circ g.

\cdots\cdots\vdotsx1,1x_{1,1}x1,tx_{1,t}x2,1x_{2,1}x2,tx_{2,t}xk,1x_{k,1}xk,tx_{k,t}x1,tnx_{1,tn}x2,tnx_{2,tn}xk,tnx_{k,tn}Player 1 (x1x_{1})Player 2 (x2x_{2})Player kk (xkx_{k})tnt\cdot nkkg1g_{1}gng_{n}ff
Figure 1: Matrix structure of a composed function fgf\circ\vec{g} of block-width tt.

Both Gip=Mod2And\textsc{Gip}=\textsc{Mod}_{2}\circ\textsc{And} and Disj=NorAnd\textsc{Disj}=\textsc{Nor}\circ\textsc{And} are composed functions for t=1t=1, with the additional property that Mod2\textsc{Mod}_{2}, Nor and And are symmetric functions (i.e. invariant under any permutation of their input). Since the majority function Maj is conjectured to be outside of 𝖠𝖢𝖢0\mathsf{ACC}^{0}, Babai et. al. [BKL95, BGKL04] suggested to look at MajMajt\textsc{Maj}\circ\textsc{Maj}_{t} and MajThrts\textsc{Maj}\circ\textsc{Thr}^{s}_{t} for breaking the logn\log n barrier (where Majt\textsc{Maj}_{t} outputs 1 if at least kt/2kt/2 bits of the input block are set to 1, and Thrts(r1,,rk)=1\textsc{Thr}^{s}_{t}(r_{1},\dots,r_{k})=1 if r1++rksr_{1}+\dots+r_{k}\geq s for r1,,rkr_{1},\dots,r_{k} seen as tt-bits numbers).

Another way to look at composed functions of block-width tt is to interpret each sub-row r{0,1}tr\in\{0,1\}^{t} of each block as a number in d\mathbb{Z}_{d}, where d=2td=2^{t}. This representation of the input as a k×nk\times n matrix MM over some set d\mathbb{Z}_{d} is sometimes more convenient to use. Below, we reformulate Definition 1 using this point of view.

Definition 2 (Integer input version).

Fix an integer d2d\geq 2 and consider functions f:{0,1}n{0,1}f:\{0,1\}^{n}\rightarrow\{0,1\} and g=(g1,,gn)\vec{g}=(g_{1},\dots,g_{n}) where gj:dk{0,1}g_{j}:\mathbb{Z}_{d}^{k}\rightarrow\{0,1\}. Given x1,,xkdnx_{1},\dots,x_{k}\in\mathbb{Z}_{d}^{n}, the composed function fgf\circ\vec{g} for kk players outputs fg(x1,,xk)=f(g1(C1),,gn(Cn))f\circ\vec{g}(x_{1},\dots,x_{k})=f(g_{1}(C_{1}),\dots,g_{n}(C_{n})) where CjdkC_{j}\in\mathbb{Z}_{d}^{k} is the jthj^{th} column in the matrix representation MM of the input. When g=g1==gng=g_{1}=\dots=g_{n}, we denote fgf\circ\vec{g} by fgf\circ g.

The set of all composed functions fgf\circ\vec{g} (resp. fgf\circ g) over d\mathbb{Z}_{d} is denoted 𝖠𝖭𝖸𝖠𝖭𝖸d\mathsf{ANY}\circ\overrightarrow{\mathsf{ANY}}_{\mathbb{Z}_{d}} (resp. 𝖠𝖭𝖸𝖠𝖭𝖸d\mathsf{ANY}\circ\mathsf{ANY}_{\mathbb{Z}_{d}}). Similarly, 𝖲𝖸𝖬𝖲𝖸𝖬d\mathsf{SYM}\circ\mathsf{SYM}_{\mathbb{Z}_{d}} is the set of fgf\circ g for symmetric ff and symmetric gg functions, 𝖲𝖸𝖬𝖠𝖭𝖸d\mathsf{SYM}\circ\overrightarrow{\mathsf{ANY}}_{\mathbb{Z}_{d}} is the set of fgf\circ\vec{g} for symmetric ff and any g\vec{g}, etc. If d=2d=2 (which corresponds to block-width t=1t=1), we will drop the subscript and write 𝖠𝖭𝖸𝖠𝖭𝖸\mathsf{ANY}\circ\overrightarrow{\mathsf{ANY}}, 𝖲𝖸𝖬𝖲𝖸𝖬\mathsf{SYM}\circ\mathsf{SYM}, etc. We have for instance Gip,Disj𝖲𝖸𝖬𝖲𝖸𝖬\textsc{Gip},\textsc{Disj}\in\mathsf{SYM}\circ\mathsf{SYM} and MajMajt,MajThrts𝖲𝖸𝖬𝖲𝖸𝖬2t\textsc{Maj}\circ\textsc{Maj}_{t},\textsc{Maj}\circ\textsc{Thr}^{s}_{t}\in\mathsf{SYM}\circ\mathsf{SYM}_{\mathbb{Z}_{2^{t}}}.

The first efficient protocol for composed functions with polylog(n)\operatorname{polylog}(n) or more players was given by Grolmusz [Gro94]. It is a non-simultaneous protocol of cost 𝒪(log2n)\mathcal{O}\left(\log^{2}n\right) for any composed function in 𝖲𝖸𝖬And\mathsf{SYM}\circ\textsc{And} (the inner function is fixed to be And) when klognk\geq\log n. The study of composed functions with symmetric outer function ff was subsequently continued, as it captures many other interesting cases in communication complexity. Babai et. al. [BKL95] proposed first MajMaj1\textsc{Maj}\circ\textsc{Maj}_{1} as a candidate to break the logn\log n barrier. However, in a subsequent work [BGKL04], they found a simultaneous protocol that applies to 𝖲𝖸𝖬𝖢𝖮𝖬𝖯c\mathsf{SYM}\circ\mathsf{COMP}^{c} (where 𝖢𝖮𝖬𝖯c\mathsf{COMP}^{c} holds for cc-compressible symmetric functions222A class 𝒢\mathscr{G} (parameterized by kk) of symmetric functions g:{0,1}k{0,1}g:\{0,1\}^{k}\rightarrow\{0,1\} is cc-compressible if for any function g𝒢g\in\mathscr{G}, set S{1,,k}S\subsetneq\{1,\dots,k\} and input (xi)iS{0,1}|S|(x_{i})_{i\in S}\in\{0,1\}^{|S|} there is a message mSm_{S} of size 𝒪(1)+clog(k|S|)\mathcal{O}\left(1\right)+c\log(k-|S|) such that g(x1,,xk)g(x_{1},\dots,x_{k}) can be computed for any (xi)i{1,,k}\S{0,1}k|S|(x_{i})_{i\in\{1,\dots,k\}\backslash S}\in\{0,1\}^{k-|S|} from knowledge of mSm_{S} and (xi)i{1,,k}\S(x_{i})_{i\in\{1,\dots,k\}\backslash S}. The Maj1\textsc{Maj}_{1} and Thr1s\textsc{Thr}^{s}_{1} functions are 11-compressible [BGKL04]., a subset of 𝖲𝖸𝖬\mathsf{SYM} that contains Maj and And). It has cost 𝒪(log2+cn)\mathcal{O}\left(\log^{2+c}n\right) when k>1+lognk>1+\log n. Later, Ada et. al. [ACFN15] generalized this result to 𝖲𝖸𝖬𝖠𝖭𝖸\mathsf{SYM}\circ\overrightarrow{\mathsf{ANY}}, with a simultaneous protocol of cost 𝒪(log3n)\mathcal{O}\left(\log^{3}n\right) for k>1+2lognk>1+2\log n players. The only protocol known so far for block-width t>1t>1 has been discovered by Chattopadhyay and Saks [CS14]. It has cost 𝒪(dlognlog(dn))\mathcal{O}\left(d\log n\log(dn)\right) for 𝖲𝖸𝖬𝖠𝖭𝖸d\mathsf{SYM}\circ\overrightarrow{\mathsf{ANY}}_{\mathbb{Z}_{d}} when k>1+dlog(3n)k>1+d\log(3n) (which is efficient for dpolylognd\leq\operatorname{polylog}n). However, it is not simultaneous in the deterministic setting (the authors showed how to make it simultaneous using shared randomness between the players). Thus, none of these previous results prevents from breaking the logn\log n barrier in the SMP model with composed functions of block-width as small as t=2t=2. The goal of this paper is to rule out this possibility for all symmetric composed functions of constant block-width t>1t>1.

1.4 Summary of Results and Comparison to Previous Protocols

Below, we describe our main results, and summarize in Table 2 the complexity of all the known protocols for composed functions. Then, we review the main ideas used in the previous literature, and we explain how we differ from them.

Our results

In this paper, we describe the first deterministic simultaneous protocol for symmetric composed functions of block-width t>1t>1. Our result is divided into two parts. We first give (Section 3.1) a protocol of cost 𝒪(k(k+d)d1logn)\mathcal{O}\left(k(k+d)^{d-1}\log n\right) for 𝖲𝖸𝖬𝖲𝖸𝖬d\mathsf{SYM}\circ\mathsf{SYM}_{\mathbb{Z}_{d}} when the number of players is k4d1lognk\geq 4^{d-1}\log n. In a second time (Section 3.2), we build upon this result to give a simultaneous protocol of cost 2𝒪(d)log22logd(n)2^{\mathcal{O}\left(d\right)}\log^{2\cdot 2^{\lceil\log d\rceil}}(n) for 𝖲𝖸𝖬𝖲𝖸𝖬d\mathsf{SYM}\circ\overrightarrow{\mathsf{SYM}}_{\mathbb{Z}_{d}} when k42dlognk\geq 4^{2d}\log n. Unlike the first protocol, this last result also works with different inner functions g1,,gng_{1},\dots,g_{n} and it is efficient even if kk is super-polylogarithmic.

Supported
functions
Complexity of
the protocol
Simultaneous
Number of players
required
Grolmusz [Gro94] 𝖲𝖸𝖬And\mathsf{SYM}\circ\textsc{And} 𝒪(log2n)\mathcal{O}\left(\log^{2}n\right) No klognk\geq\log n
Babai et. al. [BGKL04] 𝖲𝖸𝖬𝖢𝖮𝖬𝖯c\mathsf{SYM}\circ\mathsf{COMP}^{c} 𝒪(log2+cn)\mathcal{O}\left(\log^{2+c}n\right) Yes k>1+lognk>1+\log n
Ada et. al. [ACFN15] 𝖲𝖸𝖬𝖠𝖭𝖸\mathsf{SYM}\circ\overrightarrow{\mathsf{ANY}} 𝒪(log3n)\mathcal{O}\left(\log^{3}n\right) Yes k>1+2lognk>1+2\log n
C. and Saks [CS14] 𝖲𝖸𝖬𝖠𝖭𝖸d\mathsf{SYM}\circ\overrightarrow{\mathsf{ANY}}_{\mathbb{Z}_{d}} 𝒪(dlognlog(dn))\mathcal{O}\left(d\log n\log(dn)\right) No k>1+dlog(3n)k>1+d\log(3n)
This work 𝖲𝖸𝖬𝖲𝖸𝖬d\mathsf{SYM}\circ\overrightarrow{\mathsf{SYM}}_{\mathbb{Z}_{d}} 2𝒪(d)log4d(n)2^{\mathcal{O}\left(d\right)}\log^{4d}(n) Yes k42dlognk\geq 4^{2d}\log n
Figure 2: Deterministic protocols for different families of composed functions. The top three results apply only to block-width 1 (i.e. d=2d=2), whereas the last two results work for any dd. Note that the protocol of [CS14] can be made simultaneous using shared randomness between the players.

Adjacent vertices of the {0,1}n\{0,1\}^{n} hypercube. For block-width t=1t=1 and an input matrix M{0,1}k×nM\in\{0,1\}^{k\times n}, denote ncn_{c} the number of times column c{0,1}kc\in\{0,1\}^{k} occurs in MM. Grolsmusz [Gro94] noticed that if c1,,cmc_{1},\dots,c_{m} is a sequence of adjacent vertices of the {0,1}k\{0,1\}^{k} hypercube (i.e. cl+1c_{l+1} differs from clc_{l} by exactly one coordinate) then nc1=(l=1m1(1)l+1(ncl+ncl+1))+(1)m+1ncmn_{c_{1}}=\left(\sum_{l=1}^{m-1}(-1)^{l+1}(n_{c_{l}}+n_{c_{l+1}})\right)+(-1)^{m+1}n_{c_{m}}. Moreover, if position ii is the coordinate at which clc_{l} and cl+1c_{l+1} differ, then the quantity ncl+ncl+1n_{c_{l}}+n_{c_{l+1}} is known by player ii. This leads to a straightforward simultaneous protocol of cost 𝒪(klogn)\mathcal{O}\left(k\log n\right) for computing nc1n_{c_{1}}, provided that ncmn_{c_{m}} is known by the referee. In his initial work, Grolsmusz [Gro94] gave a non-simultaneous way to find some initial ncmn_{c_{m}}. Ada et. al. [ACFN15] noticed later that this step can be made simultaneous using the protocol of Babai et. al. [BGKL04], and that the idea of Grolsmusz (initially designed for 𝖲𝖸𝖬And\mathsf{SYM}\circ\textsc{And}) easily adapts to 𝖲𝖸𝖬𝖠𝖭𝖸\mathsf{SYM}\circ\overrightarrow{\mathsf{ANY}}. Unfortunately, this "hypercube view" does not generalize to block-width t>1t>1: for each ii and c({0,1}t)kc\in(\{0,1\}^{t})^{k}, the number of vertices that differ from cc only at position ii is now 2t1>12^{t}-1>1. It is easy to see that writing a similar telescoping sum as above, in which each term would be known by a player, is no longer possible.

Counting up to symmetry. Given a k×nk\times n matrix MM over d\mathbb{Z}_{d}, for all 0e1++ed1k0\leq e_{1}+\dots+e_{d-1}\leq k denote ye1,,ed1y_{e_{1},\dots,e_{d-1}} the number of columns of MM with exactly ese_{s} occurrences of each sd\{0}s\in\mathbb{Z}_{d}\backslash\{0\} (we do not put e0e_{0} since it is always equal to k(e1++ed1)k-(e_{1}+\dots+e_{d-1})). These numbers provide less information than the ncn_{c}’s defined above, but they still unable us to compute fg(M)f\circ g(M) for all fg𝖲𝖸𝖬𝖲𝖸𝖬df\circ g\in\mathsf{SYM}\circ\mathsf{SYM}_{\mathbb{Z}_{d}}. If MM is distributed between kk players in the NOF model (player ii does not see row ii), a naive simultaneous protocol is to have each player i send the number of columns ae1,,ed1ia^{i}_{e_{1},\dots,e_{d-1}} which contain, from her point of view, exactly ese_{s} occurrences of each element s{1,,d1}s\in\{1,\dots,d-1\} (for all e1++ed1k1e_{1}+\dots+e_{d-1}\leq k-1). Babai et. al. [BGKL04] analyzed this protocol in the case d=2d=2, and showed that it gives the referee enough information to recover the ye1,,ed1y_{e_{1},\dots,e_{d-1}}’s, provided that k>1+lognk>1+\log n. In Section 3.1, we extend this analysis to any d>2d>2. The core of the proof, as in [BGKL04], is to define a specific equation (using the ae1,,ed1ia^{i}_{e_{1},\dots,e_{d-1}}’s) whose only integral solution is the ye1,,ed1y_{e_{1},\dots,e_{d-1}}’s.

The shifted basis technique. The only protocol [CS14] known prior to this work for block-width t>1t>1 is based on the following observation: given polynomial representations of the inner functions gjg_{j} (over variables x1,j,,xk,jx_{1,j},\dots,x_{k,j}), each term involving strictly less than kk variables can be evaluated on input matrix MM by at least one player (in fact, by all the players that have one of the missing variables on their foreheads). The key idea of [CS14] is to get rid of the remaining terms by expressing the gjg_{j} in a cc-shifted basis where all terms of degree kk will evaluate to 0 on MM (shifting for instance monomial x1,jxk,jx_{1,j}\cdots x_{k,j} by c=(s1,,sk)c=(s_{1},\dots,s_{k}) means to replace it with (x1,js1)(xk,jsk)(x_{1,j}-s_{1})\cdots(x_{k,j}-s_{k})). To this end, it would suffice to find some cc that shares at least one coordinate in common with each column of MM. Provided that kk is large enough, [CS14] showed that a randomly picked cc has this property with high probability. This gives rise to a simultaneous protocol for 𝖲𝖸𝖬𝖠𝖭𝖸d\mathsf{SYM}\circ\overrightarrow{\mathsf{ANY}}_{\mathbb{Z}_{d}} if the players have access to a shared random string. In the deterministic setting (no shared randomness), it is not known how to make this protocol simultaneous.

Different inner functions, and reducing the number of players. The communication complexity is expected to decrease as kk grows up (since the overlap of information among the players increases). However, this fact is not reflected in the cost of our first protocol (Section 3.1). This issue is closely related to that of having different inner functions g1,,gng_{1},\dots,g_{n}. Indeed, the problem of computing fg𝖲𝖸𝖬𝖲𝖸𝖬df\circ g\in\mathsf{SYM}\circ\mathsf{SYM}_{\mathbb{Z}_{d}} with kk players on a matrix Mdk×nM\in\mathbb{Z}_{d}^{k\times n} can be changed into computing f(g1~,,gn~)𝖲𝖸𝖬𝖲𝖸𝖬df\circ(\widetilde{g_{1}},\dots,\widetilde{g_{n}})\in\mathsf{SYM}\circ\overrightarrow{\mathsf{SYM}}_{\mathbb{Z}_{d}} with the first <k\ell<k players on the submatrix M~d×n\widetilde{M}\in\mathbb{Z}_{d}^{\ell\times n} (first \ell rows of MM), where gj~:d{0,1}\widetilde{g_{j}}:\mathbb{Z}_{d}^{\ell}\rightarrow\{0,1\} is defined as gj~(u)=g(uvj)\widetilde{g_{j}}(u)=g(u\cdot v_{j}) and vjv_{j} is the values occurring from row +1\ell+1 to kk in the jj-th column of MM (note that the new gj~\widetilde{g_{j}} functions are still symmetric, but unknown to the referee). Our first protocol cannot handle different inner functions, but this issue will be solved in Section 3.2 where we describe a protocol for 𝖲𝖸𝖬𝖲𝖸𝖬d\mathsf{SYM}\circ\overrightarrow{\mathsf{SYM}}_{\mathbb{Z}_{d}} based on a new use of the polynomial representations (different than [CS14]). We will show that each inner function gj~\widetilde{g_{j}} can be represented into a (small) basis of symmetric functions {ma}a\{m_{a}\}_{a} (Section 2), which will allow us to split the problem of computing f(g1~,,gn~)f\circ(\widetilde{g_{1}},\dots,\widetilde{g_{n}}) on M~\widetilde{M} into computing each fma𝖲𝖸𝖬𝖲𝖸𝖬df\circ m_{a}\in\mathsf{SYM}\circ\mathsf{SYM}_{\mathbb{Z}_{d}} on a well-chosen matrix Ma~\widetilde{M_{a}}. This last step can be done with the initial protocol of Section 3.1.

2 Polynomial Representations for Symmetric Functions

Throughout this paper, d\mathbb{Z}_{d} will denote the set of integers {0,,d1}\{0,\dots,d-1\} and 𝔽p\mathbb{F}_{p} is the finite field with pp elements. Furthermore, a function f:𝒳m𝒴f:\mathcal{X}^{m}\rightarrow\mathcal{Y} is said to be mm-symmetric (or symmetric) if it is invariant under any permutation of the input variables (i.e. for any input (x1,,xm)(x_{1},\dots,x_{m}) and permutation σSm\sigma\in S_{m}, we have f(x1,,xm)=f(xσ(1),,xσ(m))f(x_{1},\dots,x_{m})=f(x_{\sigma(1)},\dots,x_{\sigma(m)})).

The protocol designed in Section 3.2 for composed functions fgf\circ\vec{g} requires a concise polynomial representation of the inner functions g1,,gn:({0,1}t)k{0,1}g_{1},\dots,g_{n}:(\{0,1\}^{t})^{k}\rightarrow\{0,1\}. Informally, we look for a field KK and polynomials GjK[X]G_{j}\in K[X] with variables X=(xu,v)1uk,1vtX=(x_{u,v})_{1\leq u\leq k,1\leq v\leq t}, such that:

  1. (a)

    for all x({0,1}t)kx\in(\{0,1\}^{t})^{k}, gj(x)=Gj(x)g_{j}(x)=G_{j}(x)

  2. (b)

    the order of KK is at least n+1n+1 (so that the set {0,,n}\{0,\dots,n\} of values taken by jgj(x(j))\sum_{j}g_{j}(x^{(j)}) for x(1),,x(n)({0,1}t)kx^{(1)},\dots,x^{(n)}\in(\{0,1\}^{t})^{k} can be embedded into KK)

  3. (c)

    the GjG_{j} polynomials can be represented in a basis of size 𝒪(polyk)\mathcal{O}\left(\operatorname{poly}k\right) when tt is constant

  4. (d)

    the values of the coefficients of the GjG_{j} polynomials in this basis are less than ncn^{c}, for some absolute constant cc independent of kk and tt.

The first step towards this end is to look at the usual \mathbb{R}-multilinear representation (also called Fourier expansion [O’D14]) of a function g:({0,1}t)k{0,1}g:(\{0,1\}^{t})^{k}\rightarrow\{0,1\}. For each a=(au,v)1uk,1vt({0,1}t)ka=(a_{u,v})_{1\leq u\leq k,1\leq v\leq t}\in(\{0,1\}^{t})^{k} we define the indicator polynomial 1{a}(x)1_{\{a\}}(x) to be 1{a}(x)=1uk,1vt(1au,v+(2au,v1)xu,v)1_{\{a\}}(x)=\prod_{1\leq u\leq k,1\leq v\leq t}(1-a_{u,v}+(2a_{u,v}-1)x_{u,v}). It is easy to see that it takes value 11 when x=ax=a and value 0 when x({0,1}t)k{a}x\in(\{0,1\}^{t})^{k}\setminus\{a\}. Consequently, we have g(x)=a({0,1}t)kg(a)1{a}(x)g(x)=\sum_{a\in(\{0,1\}^{t})^{k}}g(a)1_{\{a\}}(x) for all x({0,1}t)kx\in(\{0,1\}^{t})^{k}. If we let xax^{a} be the monomial (u,v):au,v=1xu,v\prod_{(u,v):a_{u,v}=1}x_{u,v}, then there exist real coefficients g^(a)\widehat{g}(a) such that it can be rewritten as the following multilinear polynomial

g(x)=a({0,1}t)kg^(a)xag(x)=\sum_{a\in(\{0,1\}^{t})^{k}}\widehat{g}(a)x^{a} (1)

Moreover, the g^(a)\widehat{g}(a) coefficients are given by the Möbius inversion formula

g^(a)=aa(1)|a||a|g(a)\widehat{g}(a)=\sum_{a^{\prime}\subseteq a}(-1)^{\left|{a}\right|-\left|{a^{\prime}}\right|}g(a^{\prime}) (2)

where |a|\left|{a}\right| is the number of 11 in a({0,1}t)ka\in(\{0,1\}^{t})^{k}, and aaa^{\prime}\subseteq a means au,v=0a^{\prime}_{u,v}=0 whenever au,v=0a_{u,v}=0.

Polynomial (1) is called the \mathbb{R}-multilinear representation of function gg. It satisfies requirements (a) and (b) above, but not requirement (c). Indeed, these polynomials are expressed in the basis of monomials {xa}a({0,1}t)k\{x^{a}\}_{a\in(\{0,1\}^{t})^{k}} which has size 2tk2^{t\cdot k}.

In order to reduce the size of the basis, we restrict ourselves to the kk-symmetric functions g:({0,1}t)k{0,1}g:(\{0,1\}^{t})^{k}\rightarrow\{0,1\} (as will be the case in Section 3.2). This condition leads to the following equalities between coefficients.

Lemma 1.

For any a=(a1,,ak)({0,1}t)ka=(a_{1},\dots,a_{k})\in(\{0,1\}^{t})^{k} and any permutation σSk\sigma\in S_{k}, if g:({0,1}t)k{0,1}g:(\{0,1\}^{t})^{k}\rightarrow\{0,1\} is a kk-symmetric function then the coefficients g^(a)\widehat{g}(a) and g^(σ(a))\widehat{g}(\sigma(a)) in the \mathbb{R}-multilinear representation of gg are equal (where σ(a)=(aσ(1),,aσ(k))\sigma(a)=(a_{\sigma(1)},\dots,a_{\sigma(k)})).

Proof.

The proof is direct from Equation (2). ∎

This lemma motivates the definition of the following polynomials, that will be used to obtain a basis for the kk-symmetric functions over ({0,1}t)k(\{0,1\}^{t})^{k}.

Definition 3.

Given a({0,1}t)ka\in(\{0,1\}^{t})^{k}, the monomial kk-symmetric polynomial ma(x)m_{a}(x) over variables (xu,v)1uk,1vt(x_{u,v})_{1\leq u\leq k,1\leq v\leq t} is defined to be the sum of all the distinct monomials xσ(a)x^{\sigma(a)} where σSk\sigma\in S_{k} ranges over all the permutations.

Example 1.

If (t,k)=(2,3)(t,k)=(2,3) and a=((1,1),(0,1),(0,1))a=((1,1),(0,1),(0,1)) then ma(x)=x1,1x1,2x2,2x3,2+x1,2x2,1x2,2x3,2+x1,2x2,2x3,1x3,2m_{a}(x)=x_{1,1}x_{1,2}x_{2,2}x_{3,2}+x_{1,2}x_{2,1}x_{2,2}x_{3,2}+x_{1,2}x_{2,2}x_{3,1}x_{3,2}.

According to Lemma 1, any kk-symmetric function g:({0,1}t)k{0,1}g:(\{0,1\}^{t})^{k}\rightarrow\{0,1\} can be expressed as a linear combination of monomial kk-symmetric polynomials. From this observation, we can derive a basis for the kk-symmetric functions by taking all the distinct monomial kk-symmetric polynomials. We specify a subset of elements a({0,1}t)ka\in(\{0,1\}^{t})^{k} that corresponds to this basis.

Definition 4.

We define a tuple a=(a1,,ak)({0,1}t)ka=(a_{1},\dots,a_{k})\in(\{0,1\}^{t})^{k} to be sorted, if |au||au|\left|{a_{u}}\right|\leq\left|{a_{u^{\prime}}}\right| for all 1uuk1\leq u\leq u^{\prime}\leq k, and aulexaua_{u}\leq_{lex}a_{u^{\prime}} whenever |au|=|au|\left|{a_{u}}\right|=\left|{a_{u^{\prime}}}\right| (where |au|\left|{a_{u}}\right| is the Hamming weight of aua_{u}, and lex\leq_{lex} is the lexicographic order over {0,1}t\{0,1\}^{t}). The set of all the sorted tuples over ({0,1}t)k(\{0,1\}^{t})^{k} is denoted 𝒮(t,k)\mathscr{S}{(}t,k).

Lemma 2.

The set {ma(x):a𝒮(t,k)}\left\{m_{a}(x):a\in\mathscr{S}{(}t,k)\right\} is a basis for the kk-symmetric functions g:({0,1}t)k{0,1}g:(\{0,1\}^{t})^{k}\rightarrow\{0,1\}. Moreover, it has size (k+2t12t1)\binom{k+2^{t}-1}{2^{t}-1}.

Proof.

It is straightforward to see that all the possible monomial kk-symmetric polynomials belong to {ma(x):a𝒮(t,k)}\left\{m_{a}(x):a\in\mathscr{S}{(}t,k)\right\}, and that no two elements in this set have a monomial in common. Thus, it is a basis for the kk-symmetric functions.

Consider the total order \prec over {0,1}t\{0,1\}^{t} defined as auaua_{u}\prec a_{u^{\prime}} if and only if |au||au|\left|{a_{u}}\right|\leq\left|{a_{u^{\prime}}}\right|, or |au|=|au|\left|{a_{u}}\right|=\left|{a_{u^{\prime}}}\right| and aulexaua_{u}\leq_{lex}a_{u^{\prime}}. Each a𝒮(t,k)a\in\mathscr{S}{(}t,k) can be seen as a (distinct) non-decreasing sequence of length kk from the totally ordered set ({0,1}t,)(\{0,1\}^{t},\prec) of size 2t2^{t}. The total number of such sequences is known to be (k+2t12t1)\binom{k+2^{t}-1}{2^{t}-1}. ∎

Finally, given a parameter nn, we want the coefficients of the kk-symmetric functions in the chosen basis to be less than ncn^{c} for some constant cc independent of kk and tt (requirement (d)). To this end, it suffices to reformulate the previous results over a field 𝔽p\mathbb{F}_{p}, for some prime p(n,2n)p\in(n,2n). We obtain the following polynomial representation for kk-symmetric functions:

Proposition 3.

Any kk-symmetric function g:({0,1}t)k{0,1}g:(\{0,1\}^{t})^{k}\rightarrow\{0,1\} can be written as

g(x)=a𝒮(t,k)ca(g)ma(x)modpg(x)=\sum\limits_{a\in\mathscr{S}{(}t,k)}c_{a}(g)\cdot m_{a}(x)\mod p

where p(n,2n)p\in(n,2n) is prime, ca(g)𝔽pc_{a}(g)\in\mathbb{F}_{p} and mam_{a} is the monomial kk-symmetric polynomial corresponding to the sorted tuple aa. Moreover, 𝒮(t,k)\mathscr{S}{(}t,k) has size (k+2t12t1)\binom{k+2^{t}-1}{2^{t}-1}.

3 Simultaneous Protocol for 𝖲𝖸𝖬𝖲𝖸𝖬d\mathsf{SYM}\circ\overrightarrow{\mathsf{SYM}}_{\mathbb{Z}_{d}}

We now describe in detail our simultaneous protocol for symmetric composed functions. The result is divided into two parts. We first give in Section 3.1 a protocol of cost 𝒪(k(k+d)d1logn)\mathcal{O}\left(k(k+d)^{d-1}\log n\right) for 𝖲𝖸𝖬𝖲𝖸𝖬d\mathsf{SYM}\circ\mathsf{SYM}_{\mathbb{Z}_{d}} when k4d1lognk\geq 4^{d-1}\log n. This is a generalization of the idea of [BGKL04], which was based on solving a particular equation. We build upon this result in Section 3.2 to give an efficient protocol of cost 𝒪(log4d(n))\mathcal{O}\left(\log^{4d}(n)\right) for 𝖲𝖸𝖬𝖲𝖸𝖬d\mathsf{SYM}\circ\overrightarrow{\mathsf{SYM}}_{\mathbb{Z}_{d}} when k42dlognk\geq 4^{2d}\log n and dd is constant. This last result uses the protocol of Theorem 4 as a subroutine, and the polynomial representations described in Section 2.

3.1 The Equation Solving part

We extend the protocol for 𝖲𝖸𝖬𝖲𝖸𝖬2\mathsf{SYM}\circ\mathsf{SYM}_{\mathbb{Z}_{2}} from [BGKL04] to any d>1d>1. It applies to all functions in 𝖲𝖸𝖬𝖲𝖸𝖬d\mathsf{SYM}\circ\mathsf{SYM}_{\mathbb{Z}_{d}} as long as k4d1lognk\geq 4^{d-1}\log n, but it is not efficient if dd is nonconstant or if the number kk of players is super-polylogarithmic (we will remove this last condition in the next section). For convenience in the proof, we state the result over d+1\mathbb{Z}_{d+1} instead of d\mathbb{Z}_{d}:

Theorem 4.

Let MM be a k×nk\times n matrix over d+1\mathbb{Z}_{d+1}, where n2n\geq 2 and d1d\geq 1. For 0e1++edk0\leq e_{1}+\dots+e_{d}\leq k, denote ye1,,edy_{e_{1},\dots,e_{d}} the number of columns of MM with exactly ese_{s} occurrences of each sd+1\{0}s\in\mathbb{Z}_{d+1}\backslash\{0\}. For each i=1,,ki=1,\dots,k, let player ii see all of MM except row ii. If k4dlognk\geq 4^{d}\log n then there exists a deterministic simultaneous NOF protocol of cost k(k+dd)lognk\binom{k+d}{d}\lceil\log n\rceil, at the end of which the referee knows all the ye1,,edy_{e_{1},\dots,e_{d}}’s.

Proof.

The communication part of the protocol is pretty simple: each player ii sends to the referee the number of columns ae1,,edia^{i}_{e_{1},\dots,e_{d}} which contain, from her point of view (i.e. without taking row ii into account), exactly ese_{s} occurrences of each element s{1,,d}s\in\{1,\dots,d\} (for all e1++edk1e_{1}+\dots+e_{d}\leq k-1).

The referee computes then be1,,ed=i=1kae1,,edib_{e_{1},\dots,e_{d}}=\sum_{i=1}^{k}a^{i}_{e_{1},\dots,e_{d}} (for all e1++edk1e_{1}+\dots+e_{d}\leq k-1). The important thing to note is that these numbers must verify the following equalities:

{(k(e1++ed))ye1,,ed+s=1d(es+1)ye1,,es1,es+1,es+1,,ed=be1,,ed0e1++edk1\left\{\begin{array}[]{l l}(k-(e_{1}+\dots+e_{d}))y_{e_{1},\dots,e_{d}}+\sum\limits_{s=1}^{d}(e_{s}+1)y_{e_{1},\dots,e_{s-1},e_{s}+1,e_{s+1},\dots,e_{d}}=b_{e_{1},\dots,e_{d}}\\ 0\leq e_{1}+\dots+e_{d}\leq k-1\end{array}\right. (3)

To see why it is true, consider a column CC of MM that contributes to a given be1,,edb_{e_{1},\dots,e_{d}}. Either CC contains exactly ese_{s} occurrences of each element s{1,,d}s\in\{1,\dots,d\}, or there is one s{1,,d}s^{\prime}\in\{1,\dots,d\} that occurs es+1e_{s^{\prime}}+1 times in CC (the other ss having exactly ese_{s} occurrences in CC). In the first case, CC contributes to ye1,,edy_{e_{1},\dots,e_{d}} and to the quantity ai(e1,,ed)a_{i}(e_{1},\dots,e_{d}) of each player ii having a 0 entry of CC on her forehead (there are k(e1++ed)k-(e_{1}+\dots+e_{d}) such players). In the second case, CC contributes to ye1,,es1,es+1,es+1,,edy_{e_{1},\dots,e_{s^{\prime}-1},e_{s^{\prime}}+1,e_{s^{\prime}+1},\dots,e_{d}} and to the quantity ai(e1,,ed)a_{i}(e_{1},\dots,e_{d}) of each player ii having a ss^{\prime} entry of CC on her forehead (there are es+1e_{s^{\prime}}+1 such players). Thus, the total contribution for be1,,edb_{e_{1},\dots,e_{d}} is (k(e1++ed))ye1,,ed+s=1d(es+1)ye1,,es1,es+1,es+1,,ed(k-(e_{1}+\dots+e_{d}))y_{e_{1},\dots,e_{d}}+\sum_{s^{\prime}=1}^{d}(e_{s^{\prime}}+1)y_{e_{1},\dots,e_{s^{\prime}-1},e_{s^{\prime}}+1,e_{s^{\prime}+1},\dots,e_{d}}.

Equalities (3) can be seen as a system of equations whose unknowns are the ye1,,edy_{e_{1},\dots,e_{d}}’s. Since the referee is not computationally restricted she can enumerate all the integral solutions, but she does not know which one corresponds to matrix MM. The key lemma is to show that Equations (3), under mild constraints

ye1,,ed0, 0e1++edkande1++edkye1,,edny_{e_{1},\dots,e_{d}}\geq 0,\ 0\leq e_{1}+\dots+e_{d}\leq k\quad\textit{and}\quad\sum\limits_{e_{1}+\dots+e_{d}\leq k}y_{e_{1},\dots,e_{d}}\leq n (4)

have at most one integral solution when k4dlognk\geq 4^{d}\log n. We prove it by induction on dd (the base case d=1d=1 corresponds to the work of [BGKL04], the induction step is more involved and is given in Appendix A). Consequently, the referee is able to know unambiguously the correct ye1,,edy_{e_{1},\dots,e_{d}}’s that correspond to MM.

This protocol is clearly simultaneous since the players do not need to talk to each other. Each of the kk players sends (k+dd)\binom{k+d}{d} numbers ai(e1,,ed)na_{i}(e_{1},\dots,e_{d})\leq n. Thus the total communication cost is at most k(k+dd)lognk\binom{k+d}{d}\lceil\log n\rceil. ∎

Corollary 5.

Let n2n\geq 2, d2d\geq 2 and suppose k4d1lognk\geq 4^{d-1}\log n. There is a deterministic simultaneous NOF protocol of cost k(k+d1d1)lognk\binom{k+d-1}{d-1}\lceil\log n\rceil, at the end of which the referee can compute all composed functions fg𝖲𝖸𝖬𝖲𝖸𝖬df\circ g\in\mathsf{SYM}\circ\mathsf{SYM}_{\mathbb{Z}_{d}} of her choice.

This result can also be adapted to the case of k<4dlognk<4^{d}\log n players by splitting the initial matrix into sufficiently many parts. Previously, Ada et. al. [ACFN15] also generalized their work to any number kk of players, by giving a protocol of cost 𝒪(n/2klogn+klogn)\mathcal{O}\left(n/2^{k}\cdot\log n+k\log n\right) for 𝖲𝖸𝖬𝖠𝖭𝖸\mathsf{SYM}\circ\overrightarrow{\mathsf{ANY}}. However, it was not simultaneous and it does not apply to t>1t>1.

Proposition 6.

Let MM be a k×nk\times n matrix over d+1\mathbb{Z}_{d+1}, where n2n\geq 2 and d1d\geq 1. For 0e1++edk0\leq e_{1}+\dots+e_{d}\leq k, denote ye1,,edy_{e_{1},\dots,e_{d}} the number of columns of MM with exactly ese_{s} occurrences of each sd+1\{0}s\in\mathbb{Z}_{d+1}\backslash\{0\}. For each i=1,,ki=1,\dots,k, let player ii see all of MM except row ii. If 4dk<4dlogn4^{d}\leq k<4^{d}\log n then there exists a deterministic simultaneous NOF protocol of cost at most 𝒪(n2k/4d(k+d)d+2)\mathcal{O}\left(\frac{n}{2^{k/4^{d}}}\cdot(k+d)^{d+2}\right), at the end of which the referee knows all the ye1,,edy_{e_{1},\dots,e_{d}}’s.

Proof.

We split MM into n2k/4d\left\lceil\frac{n}{\left\lfloor 2^{k/4^{d}}\right\rfloor}\right\rceil matrices, each of size k×2k/4dk\times\left\lfloor 2^{k/4^{d}}\right\rfloor (except one matrix that can have less columns). These matrices have few enough columns to apply (separately) the protocol of Theorem 4 on them. The ye1,,edy_{e_{1},\dots,e_{d}}’s for the original matrix MM are computed by recombining all the obtained results. The total cost is 𝒪(n2k/4dk(k+dd)log(2k/4d))\mathcal{O}\left(\frac{n}{2^{k/4^{d}}}\cdot k\binom{k+d}{d}\log\left(2^{k/4^{d}}\right)\right). ∎

3.2 The Polynomial Representation part

Using the polynomial representation of Proposition 3, we give a protocol that improves upon Corollary 5 in two ways: it is still efficient when kk is super-polylogarithmic, and the inner functions g1,,gng_{1},\dots,g_{n} can be different (i.e. it applies to 𝖲𝖸𝖬𝖲𝖸𝖬d\mathsf{SYM}\circ\overrightarrow{\mathsf{SYM}}_{\mathbb{Z}_{d}} instead of 𝖲𝖸𝖬𝖲𝖸𝖬d\mathsf{SYM}\circ\mathsf{SYM}_{\mathbb{Z}_{d}}).

Theorem 7.

Let n2n\geq 2, d2d\geq 2 and suppose k42logdlognk\geq 4^{2^{\lceil\log d\rceil}}\log n. For any composed function fg𝖲𝖸𝖬𝖲𝖸𝖬df\circ\vec{g}\in\mathsf{SYM}\circ\overrightarrow{\mathsf{SYM}}_{\mathbb{Z}_{d}} there exists a deterministic simultaneous NOF protocol that computes it with cost 42logd+2log22logd(n)4^{2^{\lceil\log d\rceil+2}}\log^{2\cdot 2^{\lceil\log d\rceil}}(n).

Proof.

Let g=(g1,,gn)\vec{g}=(g_{1},\dots,g_{n}). In order to use the polynomial representation of Section 2, we change the range of the gjg_{j} functions as gj:({0,1}t)k{0,1}g_{j}:(\{0,1\}^{t})^{k}\rightarrow\{0,1\}, where t=logdt=\lceil\log d\rceil. This requires to encode each number xdx\in\mathbb{Z}_{d} as an element x¯{0,1}t\bar{x}\in\{0,1\}^{t}. If dd is not a power of two then some y{0,1}ty\in\{0,1\}^{t} will not correspond to any xdx\in\mathbb{Z}_{d}. We extend each gjg_{j} as the zero function on inputs that contain such numbers (note that the functions are still kk-symmetric).

The input is now a k×(tn)k\times(t\cdot n) boolean matrix MM. Each function gjg_{j} acts on the jthj^{th} block of MM, which will be denoted Bj({0,1}t)kB_{j}\in(\{0,1\}^{t})^{k}. Let =42tlogn\ell=4^{2^{t}}\log n, so that only the first \ell players are going to speak. For each block BjB_{j}, if we let vj({0,1}t)(k)v_{j}\in(\{0,1\}^{t})^{(k-\ell)} be the sub-block occurring from row +1\ell+1 to kk, then gj:({0,1}t)k{0,1}g_{j}:(\{0,1\}^{t})^{k}\rightarrow\{0,1\} induces a new function gj~:({0,1}t){0,1}\widetilde{g_{j}}:(\{0,1\}^{t})^{\ell}\rightarrow\{0,1\} such that gj~(u)=gj(uvj)\widetilde{g_{j}}(u)=g_{j}(u\cdot v_{j}). Moreover, gj~\widetilde{g_{j}} is still a symmetric function. Thus, our task reduces to find an efficient simultaneous protocol for f(g1~,,gn~)f\circ(\widetilde{g_{1}},\dots,\widetilde{g_{n}}) with =42tlogn\ell=4^{2^{t}}\log n players. We denote M~\widetilde{M} the ×(tn)\ell\times(t\cdot n) submatrix of MM on which we now work, and Bj~({0,1}t)\widetilde{B_{j}}\in(\{0,1\}^{t})^{\ell} is the sub-block of BjB_{j} corresponding to M~\widetilde{M}.

We cannot apply directly the protocol of Theorem 4, since it only works for equal inner functions g1~==gn~\widetilde{g_{1}}=\dots=\widetilde{g_{n}}. Instead, we use first Proposition 3 on the gj~\widetilde{g_{j}} functions: for each j{1,,n}j\in\{1,\dots,n\} there exist coefficients (ca(gj~))a𝒮(t,)(c_{a}(\widetilde{g_{j}}))_{a\in\mathscr{S}{(}t,\ell)} over 𝔽p\mathbb{F}_{p} such that gj~(x)=a𝒮(t,)ca(gj~)ma(x)modp\widetilde{g_{j}}(x)=\sum_{a\in\mathscr{S}{(}t,\ell)}c_{a}(\widetilde{g_{j}})\cdot m_{a}(x)\mod p where p(n,2n)p\in(n,2n), mam_{a} is the monomial kk-symmetric polynomial corresponding to the sorted tuple aa and |𝒮(t,)|=(+2t12t1)\left|{\mathscr{S}{(}t,\ell)}\right|=\binom{\ell+2^{t}-1}{2^{t}-1}. The coefficients ca(gj~)c_{a}(\widetilde{g_{j}}) are known by the first \ell players, but not by the referee (since they depend on rows +1\ell+1 to kk of MM).

For each a𝒮(t,)a\in\mathscr{S}{(}t,\ell), the players build a new matrix Ma~\widetilde{M_{a}} of size ×(ca(g1~)++ca(gn~))\ell\times(c_{a}(\widetilde{g_{1}})+\dots+c_{a}(\widetilde{g_{n}})) where block Bj~\widetilde{B_{j}} from M~\widetilde{M} is copied ca(gj~)[0,2n)c_{a}(\widetilde{g_{j}})\in[0,2n) times. Note that Ma~\widetilde{M_{a}} has at most 2n22n^{2} blocks, and there are enough players =42tlogn\ell=4^{2^{t}}\log n for applying (the boolean input version of) the simultaneous protocol of Theorem 4. It allows the referee to know the number of blocks of Ma~\widetilde{M_{a}} which are equal —up to row permutation— to any B~({0,1}t)\widetilde{B}\in(\{0,1\}^{t})^{\ell} . This information is sufficient to compute j=1nca(gj~)ma(Bj~)\sum_{j=1}^{n}c_{a}(\widetilde{g_{j}})\cdot m_{a}(\widetilde{B_{j}}) since the mam_{a} functions are kk-symmetric.

Finally, the referee sums these quantities modulo pp over all aa. It gives her a𝒮(t,)j=1nca(gj~)ma(Bj~)modp=j=1ngj~(Bj~)modp\sum_{a\in\mathscr{S}{(}t,\ell)}\\ \sum_{j=1}^{n}c_{a}(\widetilde{g_{j}})\cdot m_{a}(\widetilde{B_{j}})\mod p=\sum_{j=1}^{n}\widetilde{g_{j}}(\widetilde{B_{j}})\mod p. Since j=1ngj~(Bj~)n\sum_{j=1}^{n}\widetilde{g_{j}}(\widetilde{B_{j}})\leq n and p>np>n, it equals j=1ngj~(Bj~)=j=1ngj(Bj)\sum_{j=1}^{n}\widetilde{g_{j}}(\widetilde{B_{j}})=\sum_{j=1}^{n}g_{j}(B_{j}). Knowing this, the referee can compute f(g1,,gn)(M)f\circ(g_{1},\dots,g_{n})(M) since ff is symmetric.

Regarding the cost of the protocol, we applied |𝒮(t,)|=(+2t12t1)\left|{\mathscr{S}{(}t,\ell)}\right|=\binom{\ell+2^{t}-1}{2^{t}-1} times the protocol of Theorem 4, with \ell players and inputs of size at most 2n22n^{2}. Thus the total cost is at most (+2t12t1)(+2t12t1)log2n2(+2t)2t+12logn\binom{\ell+2^{t}-1}{2^{t}-1}\cdot\ell\binom{\ell+2^{t}-1}{2^{t}-1}\lceil\log 2n^{2}\rceil\leq\ell(\ell+2^{t})^{2^{t+1}-2}\log n. Since =42tlogn\ell=4^{2^{t}}\log n and t=logdt=\left\lceil\log d\right\rceil, this is less than 42t+(2t+1)(2t+12)log2t+1(n)42logd+2log22logd(n)4^{2^{t}+(2^{t}+1)(2^{t+1}-2)}\log^{2^{t+1}}(n)\leq 4^{2^{\lceil\log d\rceil+2}}\log^{2\cdot 2^{\lceil\log d\rceil}}(n). ∎

4 Conclusion and Open Problems

One of the main open problems in communication complexity remains to find a function which is hard to compute for klognk\geq\log n players in the simultaneous Number On the Forehead model. We discarded this possibility for the composed functions in 𝖲𝖸𝖬𝖲𝖸𝖬d\mathsf{SYM}\circ\overrightarrow{\mathsf{SYM}}_{\mathbb{Z}_{d}} (for constant dd) by giving the first efficient deterministic simultaneous protocol for composed functions of block-width t>1t>1. In the non-simultaneous setting, the best result so far applies to 𝖲𝖸𝖬𝖠𝖭𝖸d\mathsf{SYM}\circ\overrightarrow{\mathsf{ANY}}_{\mathbb{Z}_{d}} and d=𝒪(polylogn)d=\mathcal{O}\left(\operatorname{polylog}n\right) [CS14]. Extending these protocols to larger dd, bigger families of composed functions or to the simultaneous setting (for [CS14]) would give a better insight on composed functions. Indeed, it is conjectured that the logn\log n barrier can be broken by such functions for large dd, two of the candidates being MajMajt\textsc{Maj}\circ\textsc{Maj}_{t} and MajThrts\textsc{Maj}\circ\textsc{Thr}^{s}_{t}.

Note that both the Equation Solving and the Polynomial Representation parts of our protocol are bottleneck for handling non-constant dd in our result. It could be interesting to restrict to smaller families than symmetric functions (or to choose specific inner or outer functions, such as threshold functions), or to find other relevant equations that could be solved by the referee with fewer information than in our protocol.

Apart from composed functions, there are a few other candidates for breaking the logn\log n barrier. Some of them are matrix related problems, such as deciding the top-left entry of the multiplication of kk matrices in 𝔽2n×n\mathbb{F}^{n\times n}_{2} (an Ω(n/2k)\Omega(n/2^{k}) lower bound has been obtained by Raz [Raz00]). More recently, Gowers and Viola [GV15] studied the interleaved group products, where each player receives a tuple (xi,1,,xi,n)(x_{i,1},\dots,x_{i,n}) in G=SL(2,q)G=SL(2,q), with the promise that i=1nx1,ixk,i=g or h\prod_{i=1}^{n}x_{1,i}\cdots x_{k,i}=g\textit{ or }h. Finding which is the case has cost Ω(nlog|G|)\Omega(n\log\left|{G}\right|) when k=2k=2, and it is conjectured to remain hard for larger kk.

Acknowledgements

This work was initiated during a visit to Carnegie Mellon University. The author is very grateful to Anil Ada, who introduced him to the logn\log n barrier problem and the MajMajt\textsc{Maj}\circ\textsc{Maj}_{t} conjecture for composed functions. He also thanks him for helpful discussions on this subject, as well as the anonymous referees for their valuable comments and suggestions which helped to improve this paper.

References

  • [ACFN15] A. Ada, A. Chattopadhyay, O. Fawzi, and P. Nguyen. The NOF multiparty communication complexity of composed functions. Computational Complexity, 24(3):645–694, 2015.
  • [Amb96] A. Ambainis. Communication complexity in a 3-computer model. Algorithmica, 16(3):298–301, 1996.
  • [BCWdW01] H. Buhrman, R. Cleve, J. Watrous, and R. de Wolf. Quantum fingerprinting. Phys. Rev. Lett., 87:167902, 2001.
  • [BGK15] R. C. Bottesch, D. Gavinsky, and H. Klauck. Equality, revisited. CoRR, abs/1511.01211, 2015.
  • [BGKL04] L. Babai, A. Gál, P. G. Kimmel, and S. V. Lokam. Communication complexity of simultaneous messages. SIAM J. Comput., 33(1):137–166, 2004.
  • [BH12] P. Beame and T. Huynh. Multiparty communication complexity and threshold circuit size of AC0. SIAM Journal on Computing, 41(3):484–518, 2012.
  • [BK97] L. Babai and P. G. Kimmel. Randomized simultaneous messages: solution of a problem of Yao in communication complexity. In Proceedings of Computational Complexity. Twelfth Annual IEEE Conference, pages 239–246, 1997.
  • [BKL95] L. Babai, P. G. Kimmel, and S. V. Lokam. Simultaneous messages vs. communication. In 12th Annual Symposium on Theoretical Aspects of Computer Science (STACS), pages 361–372. Springer, 1995.
  • [BNS92] L. Babai, N. Nisan, and M. Szegedy. Multiparty protocols, pseudorandom generators for logspace, and time-space trade-offs. J. Comput. Syst. Sci., 45(2):204–232, 1992.
  • [BPS07] P. Beame, T. Pitassi, and N. Segerlind. Lower bounds for Lovász–Schrijver systems and beyond follow from multiparty communication complexity. SIAM J. Comput., 37(3):845–869, 2007.
  • [BPSW05] P. Beame, T. Pitassi, N. Segerlind, and A. Wigderson. A direct sum theorem for corruption and the multiparty NOF communication complexity of set disjointness. In Proceedings of the 20th Annual IEEE Conference on Computational Complexity, CCC ’05, pages 52–66. IEEE Computer Society, 2005.
  • [BPSW06] P. Beame, T. Pitassi, N. Segerlind, and A. Wigderson. A strong direct product theorem for corruption and the multiparty communication complexity of disjointness. Comput. Complex., 15(4):391–432, 2006.
  • [BT94] R. Beigel and J. Tarui. On ACC. Computational Complexity, 4(4):350–366, 1994.
  • [BYJKS02] Z. Bar-Yossef, T. S. Jayram, R. Kumar, and D. Sivakumar. Information theory methods in communication complexity. In Proceedings 17th IEEE Annual Conference on Computational Complexity, pages 72–81, 2002.
  • [CA08] A. Chattopadhyay and A. Ada. Multiparty communication complexity of disjointness. arXiv preprint arXiv:0801.3624, 2008.
  • [CFL83] A. K. Chandra, M. L. Furst, and R. J. Lipton. Multi-party protocols. In Proceedings of the Fifteenth Annual ACM Symposium on Theory of Computing, STOC ’83, pages 94–99. ACM, 1983.
  • [CS14] A. Chattopadhyay and M. E. Saks. The power of super-logarithmic number of players. In Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (APPROX/RANDOM), 2014.
  • [CT93] F. R. K. Chung and P. Tetali. Communication complexity and quasi randomness. SIAMJDiscreteMath, 6(1):110–123, 1993.
  • [GRd08] D. Gavinsky, O. Regev, and R. de Wolf. Simultaneous communication protocols with quantum and classical messages. Chicago Journal of Theoretical Computer Science, 7, 2008.
  • [Gro94] V. Grolmusz. The BNS lower bound for multi-party protocols is nearly optimal. Information and Computation, 112:51–54, 1994.
  • [GV15] T. Gowers and E. Viola. The communication complexity of interleaved group products. In Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, STOC ’15, pages 351–360. ACM, 2015.
  • [HG91] J. Håstad and M. Goldmann. On the power of small-depth threshold circuits. Computational Complexity, 1(2):113–129, 1991.
  • [LS09] T. Lee and A. Shraibman. Disjointness is hard in the multiparty number-on-the-forehead model. Computational Complexity, 18(2):309–336, 2009.
  • [NS96] I. Newman and M. Szegedy. Public vs. private coin flips in one round communication games (extended abstract). In Proceedings of the Twenty-eighth Annual ACM Symposium on Theory of Computing, STOC ’96, pages 561–570. ACM, 1996.
  • [NW93] N. Nisan and A. Wigderson. Rounds in communication complexity revisited. SIAM J. Comput., 22(1):211–219, 1993.
  • [O’D14] R. O’Donnell. Analysis of Boolean Functions. Cambridge University Press, 2014.
  • [PRS97] P. Pudlák, V. Rödl, and J. Sgall. Boolean circuits, tensor ranks, and communication complexity. SIAM J. Comput., 26(3):605–633, 1997.
  • [PS17] V. V. Podolskii and A. A. Sherstov. Inner product and set disjointness: Beyond logarithmically many parties. CoRR, abs/1711.10661, 2017.
  • [Raz00] R. Raz. The BNS-Chung criterion for multi-party communication complexity. Computational Complexity, 9:2000, 2000.
  • [RY15] A. Rao and A. Yehudayoff. Simplified lower bounds on the multiparty communication complexity of disjointness. In Proceedings of the 30th Conference on Computational Complexity, CCC ’15, pages 88–101, Germany, 2015. Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik.
  • [She11] A. A. Sherstov. The pattern matrix method. SIAM Journal on Computing, 40(6):1969–2000, 2011.
  • [She14] A. A. Sherstov. Communication lower bounds using directional derivatives. J. ACM, 61(6):34:1–34:71, 2014.
  • [She16] A. A. Sherstov. The multiparty communication complexity of set disjointness. SIAM Journal on Computing, 45(4):1450–1489, 2016.
  • [Tes03] P. Tesson. Computational Complexity Questions Related to Finite Monoids and Semigroups. PhD thesis, Montreal, Canada, 2003.
  • [Wil14] R. Williams. Nonuniform ACC circuit lower bounds. J. ACM, 61(1):2:1–2:32, 2014.
  • [Yao79] A. Yao. Some complexity questions related to distributive computing. In Proceedings of the Eleventh Annual ACM Symposium on Theory of Computing, STOC ’79, pages 209–213. ACM, 1979.
  • [Yao90] A. Yao. On ACC and threshold circuits. In Proceedings 31st Annual Symposium on Foundations of Computer Science, pages 619–627 vol.2, 1990.

Appendix A Lemma for the Equation Solving part

In this section, we prove the following lemma:

Lemma 8.

Let n2n\geq 2, d1d\geq 1 and k4dlognk\geq 4^{d}\log n. Let (be1,,ed)0e1++edk1(b_{e_{1},\dots,e_{d}})_{0\leq e_{1}+\dots+e_{d}\leq k-1} be integers. Consider the following system of equations:

{(k(e1++ed))ye1,,ed+s=1d(es+1)ye1,,es1,es+1,es+1,,ed=be1,,ed0e1++edk1\left\{\begin{array}[]{l l}(k-(e_{1}+\dots+e_{d}))y_{e_{1},\dots,e_{d}}+\sum\limits_{s=1}^{d}(e_{s}+1)y_{e_{1},\dots,e_{s-1},e_{s}+1,e_{s+1},\dots,e_{d}}=b_{e_{1},\dots,e_{d}}\\ 0\leq e_{1}+\dots+e_{d}\leq k-1\end{array}\right. (5)

Assume further that

ye1,,ed0, 0e1++edkande1++edkye1,,edny_{e_{1},\dots,e_{d}}\geq 0,\ 0\leq e_{1}+\dots+e_{d}\leq k\quad\textit{and}\quad\sum\limits_{e_{1}+\dots+e_{d}\leq k}y_{e_{1},\dots,e_{d}}\leq n (6)

Then, under constraints (6), the system of equations (5) has at most one integral solution.

In fact, we are going to show a stronger result:

Lemma 9.

Let n2n\geq 2, d1d\geq 1 and k>4dlogndk>4^{d}\log n-d. Let (be1,,ed)0e1++edk1(b_{e_{1},\dots,e_{d}})_{0\leq e_{1}+\dots+e_{d}\leq k-1} be integers. Consider the following system of equations:

{(k(e1++ed))ze1,,ed+s=1d(es+1)ze1,,es1,es+1,es+1,,ed=00e1++edk1\left\{\begin{array}[]{l l}(k-(e_{1}+\dots+e_{d}))z_{e_{1},\dots,e_{d}}+\sum\limits_{s=1}^{d}(e_{s}+1)z_{e_{1},\dots,e_{s-1},e_{s}+1,e_{s+1},\dots,e_{d}}=0\\ 0\leq e_{1}+\dots+e_{d}\leq k-1\end{array}\right. (7)

Assume further that

e1++edk|ze1,,ed|2n\sum\limits_{e_{1}+\dots+e_{d}\leq k}|z_{e_{1},\dots,e_{d}}|\leq 2n (8)

Then, under constraints (8), the system of equations (7) cannot have a non-zero integral solution.

Proof that Lemma 9 implies Lemma 8.

Assume by contradiction that Equations (5) under Constraints (6) have two different integral solutions y=(ye1,,ed)0e1++edky=(y_{e_{1},\dots,e_{d}})_{0\leq e_{1}+\dots+e_{d}\leq k} and y=(ye1,,ed)0e1++edky^{\prime}=(y^{\prime}_{e_{1},\dots,e_{d}})_{0\leq e_{1}+\dots+e_{d}\leq k} for k4dlognk\geq 4^{d}\log n. Define ze1,,ed=ye1,,edye1,,edz_{e_{1},\dots,e_{d}}=y_{e_{1},\dots,e_{d}}-y^{\prime}_{e_{1},\dots,e_{d}}. It is easy to see that it must verify (7), and since yyy\neq y^{\prime} there is at least one ze1,,ed0z_{e_{1},\dots,e_{d}}\neq 0. Finally, since ze1,,ed=|ye1,,edye1,,ed|ye1,,ed+ye1,,edz_{e_{1},\dots,e_{d}}=|y_{e_{1},\dots,e_{d}}-y^{\prime}_{e_{1},\dots,e_{d}}|\leq y_{e_{1},\dots,e_{d}}+y^{\prime}_{e_{1},\dots,e_{d}}, we have

e1++edk|ze1,,ed|e1++edk(ye1,,ed+ye1,,ed)2n\sum\limits_{e_{1}+\dots+e_{d}\leq k}|z_{e_{1},\dots,e_{d}}|\leq\sum\limits_{e_{1}+\dots+e_{d}\leq k}(y_{e_{1},\dots,e_{d}}+y^{\prime}_{e_{1},\dots,e_{d}})\leq 2n

Proof of Lemma 9.

We prove the result by induction on dd. The base case has already been established in [BGKL04], we recall it for completeness.

Base case (d = 1). We denote (zi)0ik(z_{i})_{0\leq i\leq k} the variables. Equations (7) under Constraints (8) become

{(ki)zi+(i+1)zi+1=0,i=0,1,,k1i=0k|zi|2n\left\{\begin{array}[]{l l}(k-i)z_{i}+(i+1)z_{i+1}=0,\ i=0,1,\dots,k-1\\ \sum_{i=0}^{k}|z_{i}|\leq 2n\end{array}\right.

Thus, z1=kz0=(k1)z0z_{1}=-kz_{0}=-\binom{k}{1}z_{0}, z2=k12z1=(k2)z0z_{2}=-\frac{k-1}{2}z_{1}=\binom{k}{2}z_{0}, and more generally zi=(1)i(ki)z0z_{i}=(-1)^{i}\binom{k}{i}z_{0}. Consequently, if (zi)0ik(z_{i})_{0\leq i\leq k} is a nonzero integral solution, then z00z_{0}\neq 0 and |zi|=(ki)|z0|(ki)\left|{z_{i}}\right|=\binom{k}{i}\left|{z_{0}}\right|\geq\binom{k}{i} for all ii. We obtain a contradiction: 2ni=0k|zi|i=0k(ki)=2k>24logn1>2n2n\geq\sum_{i=0}^{k}\left|{z_{i}}\right|\geq\sum_{i=0}^{k}\binom{k}{i}=2^{k}>2^{4\log n-1}>2n. Thus, Lemma 9 is true for d=1d=1.

Induction step. Assuming that Lemma 9 is true for d1d-1, we prove that it is also the case for d2d\geq 2. Suppose by contradiction that Equations (7) under Constraints (8) have a non-zero integral solution z=(ze1,,ed)0e1++edkz=(z_{e_{1},\dots,e_{d}})_{0\leq e_{1}+\dots+e_{d}\leq k} for k>4dlogndk>4^{d}\log n-d. As in the proof of the base case, we want to show e1++edk|ze1,,ed|>2n\sum_{e_{1}+\dots+e_{d}\leq k}|z_{e_{1},\dots,e_{d}}|>2n, which would be a contradiction.

To this end, we are going to focus for each 0ik0\leq i\leq k on the largest element of {|ze1,,ed|:e1++ed=i}\{|z_{e_{1},\dots,e_{d}}|:e_{1}+\dots+e_{d}=i\}. We define

Zi=maxe1++ed=i|ze1,,ed| and k+=min{i:Zi0}\qquad\qquad Z_{i}=\max\limits_{e_{1}+\dots+e_{d}=i}|z_{e_{1},\dots,e_{d}}|\quad\text{ and }\quad k^{+}=\min\{i:Z_{i}\neq 0\}

Since zz is a nonzero solution, k+k^{+} is well defined. We conduct the proof as follows:

  1. (a)

    Using the induction hypothesis, we show that the first nonzero ZiZ_{i} must occur for i=k+4d1logn(d1)i=k^{+}\leq 4^{d-1}\log n-(d-1).

  2. (b)

    The sequence (Zi)i(Z_{i})_{i} verifies kii+dZiZi+1\frac{k-i}{i+d}Z_{i}\leq Z_{i+1}.

  3. (c)

    Using the two previous results, we prove i=0kZi>2n\sum_{i=0}^{k}Z_{i}>2n.

The contradiction comes then from i=0kZie1++edk|ze1,,ed|2n\sum_{i=0}^{k}Z_{i}\leq\sum_{e_{1}+\dots+e_{d}\leq k}|z_{e_{1},\dots,e_{d}}|\leq 2n

Proof of (a). Assume k+>0k^{+}>0 (otherwise the result is trivial). According to Equations (7), and knowing that ze1,,ed=0z_{e_{1},\dots,e_{d}}=0 whenever e1++ed<k+e_{1}+\dots+e_{d}<k^{+}, we have

s=1d(es+1)ze1,,es1,es+1,es+1,,ed=0\sum_{s=1}^{d}(e_{s}+1)z_{e_{1},\dots,e_{s-1},e_{s}+1,e_{s+1},\dots,e_{d}}=0

for all e1++ed=k+1e_{1}+\dots+e_{d}=k^{+}-1. If we set apart the last term ze1,,ed1,ed+1z_{e_{1},\dots,e_{d-1},e_{d}+1}, we obtain

(k+(e1++ed1))ze1,,ed1,ed+1+s=1d1(es+1)ze1,,es1,es+1,es+1,,ed=0(k^{+}-(e_{1}+\dots+e_{d-1}))z_{e_{1},\dots,e_{d-1},e_{d}+1}+\sum\limits_{s=1}^{d-1}(e_{s}+1)z_{e_{1},\dots,e_{s-1},e_{s}+1,e_{s+1},\dots,e_{d}}=0

Let ze1,,ed1=ze1,,ed1,k+(e1++ed1)z^{\prime}_{e_{1},\dots,e_{d-1}}=z_{e_{1},\dots,e_{d-1},k^{+}-(e_{1}+\dots+e_{d-1})} for all 0e1++ed1k+0\leq e_{1}+\dots+e_{d-1}\leq k^{+}. We can change the variables in the previous equation as follows

{(k+(e1++ed1))ze1,,ed1+s=1d1(es+1)ze1,,es1,es+1,es+1,,ed1=00e1++ed1k+1\left\{\begin{array}[]{l l}(k^{+}-(e_{1}+\dots+e_{d-1}))z^{\prime}_{e_{1},\dots,e_{d-1}}+\sum\limits_{s=1}^{d-1}(e_{s}+1)z^{\prime}_{e_{1},\dots,e_{s-1},e_{s}+1,e_{s+1},\dots,e_{d-1}}=0\\ 0\leq e_{1}+\dots+e_{d-1}\leq k^{+}-1\end{array}\right.

This is equivalent to Equations (7) at rank d1d-1. Moreover, e1++ed1k+|ze1,,ed1|2n\sum\limits_{e_{1}+\dots+e_{d-1}\leq k^{+}}|z^{\prime}_{e_{1},\dots,e_{d-1}}|\leq 2n, and there exists e1++ed=k+e_{1}+\dots+e_{d}=k^{+} such that ze1,,ed0z_{e_{1},\dots,e_{d}}\neq 0 (by definition of k+k^{+}), i.e. ze1,,ed10z^{\prime}_{e_{1},\dots,e_{d-1}}\neq 0. Consequently, it corresponds to a nonzero integral solution to Equations (7) under Constraints (8) at rank d1d-1 with parameter k+k^{+}. According to our induction hypothesis it implies k+4d1logn(d1)k^{+}\leq 4^{d-1}\log n-(d-1).

Proof of (b). Setting apart ze1,,edz_{e_{1},\dots,e_{d}} in Equations (7), and using the triangle inequality, we obtain

(k(e1++ed))|ze1,,ed|s=1d(es+1)|ze1,,es1,es+1,es+1,,ed|(k-(e_{1}+\dots+e_{d}))|z_{e_{1},\dots,e_{d}}|\leq\sum\limits_{s=1}^{d}(e_{s}+1)|z_{e_{1},\dots,e_{s-1},e_{s}+1,e_{s+1},\dots,e_{d}}|

for all e1++edke_{1}+\dots+e_{d}\leq k. In particular, if we choose e1++ede_{1}+\dots+e_{d} such that Ze1++ed=|ze1,,ed|Z_{e_{1}+\dots+e_{d}}=|z_{e_{1},\dots,e_{d}}| then

(k(e1++ed))Ze1++eds=1d(es+1)|ze1,,es1,es+1,es+1,,ed|s=1d(es+1)Ze1++ed+1(e1++ed+d)Ze1++ed+1\begin{split}(k-(e_{1}+\dots+e_{d}))Z_{e_{1}+\dots+e_{d}}&\leq\sum_{s=1}^{d}(e_{s}+1)|z_{e_{1},\dots,e_{s-1},e_{s}+1,e_{s+1},\dots,e_{d}}|\\ &\leq\sum_{s=1}^{d}(e_{s}+1)Z_{e_{1}+\dots+e_{d}+1}\\ &\leq(e_{1}+\dots+e_{d}+d)Z_{e_{1}+\dots+e_{d}+1}\end{split}

Thus (ki)Zi(i+d)Zi+1(k-i)Z_{i}\leq(i+d)Z_{i+1}, where i=e1++edi=e_{1}+\dots+e_{d}.

Proof of (c). Using (b), first note for i>k+i>k^{+} that

Zik(i1)(i1)+dk(i2)(i2)+dkk+k++dZk+=(kk+)!(ki)!(k++d1)!(i+d1)!Zk+=(k+d1)!(ki)!(i+d1)!(kk+)!(k++d1)!(k+d1)!Zk+=(k+d1i+d1)(k+d1k++d1)1Zk+(k+d1i+d1)(k+d1k++d1)1since Zk+1\begin{split}Z_{i}&\geq\frac{k-(i-1)}{(i-1)+d}\cdot\frac{k-(i-2)}{(i-2)+d}\cdots\frac{k-k^{+}}{k^{+}+d}\cdot Z_{k^{+}}\\ &=\frac{(k-k^{+})!}{(k-i)!}\cdot\frac{(k^{+}+d-1)!}{(i+d-1)!}\cdot Z_{k^{+}}\\ &=\frac{(k+d-1)!}{(k-i)!(i+d-1)!}\cdot\frac{(k-k^{+})!(k^{+}+d-1)!}{(k+d-1)!}\cdot Z_{k^{+}}\\ &=\binom{k+d-1}{i+d-1}\binom{k+d-1}{k^{+}+d-1}^{-1}\cdot Z_{k^{+}}\\ &\geq\binom{k+d-1}{i+d-1}\binom{k+d-1}{k^{+}+d-1}^{-1}\qquad\text{since $Z_{k^{+}}\geq 1$}\\ \end{split}

According to (a) and our initial hypothesis on kk, we have k++d14d1logn(k+d1)/4k^{+}+d-1\leq 4^{d-1}\log n\leq(k+d-1)/4. Thus i=k+k(k+d1i+d1)12i=0k+d1(k+d1i)=2k+d2\sum_{i=k^{+}}^{k}\binom{k+d-1}{i+d-1}\geq\frac{1}{2}\cdot\sum_{i=0}^{k+d-1}\binom{k+d-1}{i}=2^{k+d-2} and (k+d1k++d1)12(k+d1)H(1/4)\binom{k+d-1}{k^{+}+d-1}^{-1}\geq 2^{-(k+d-1)H(1/4)} (using the well-known bound (mαm)2mH(α)\binom{m}{\alpha m}\leq 2^{mH(\alpha)} where H(α)=log(αα(1α)1α)H(\alpha)=-\log(\alpha^{\alpha}(1-\alpha)^{1-\alpha})). Consequently, since d2d\geq 2 and n2n\geq 2, we obtain i=k+kZi2(1H(1/4))(k+d1)12(1H(1/4))4dlogn1>2n\sum_{i=k^{+}}^{k}Z_{i}\geq 2^{(1-H(1/4))(k+d-1)-1}\geq 2^{(1-H(1/4))4^{d}\log n-1}>2n. ∎