skip to main content
10.1145/2213977.2214023acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
research-article

Tight bounds on computing error-correcting codes by bounded-depth circuits with arbitrary gates

Authors Info & Claims
Published:19 May 2012Publication History

ABSTRACT

We bound the minimum number w of wires needed to compute any (asymptotically good) error-correcting code C:{0,1}Ω(n) -> {0,1}n with minimum distance Ω(n), using unbounded fan-in circuits of depth d with arbitrary gates. Our main results are: (1) If d=2 then w = Θ(n ({log n/ log log n})2). (2) If d=3 then w = Θ(n lg lg n). (3) If d=2k or d=2k+1 for some integer k ≥ 2 then w = Θ(n λk(n)), where λ1(n)=⌈ log n⌉, λi+1(n)= λi*(n), and the * operation gives how many times one has to iterate the function λi to reach a value at most 1 from the argument n. (4) If d=log* n then w=O(n).

For depth d=2, our Ω(n (log n/log log n)2) lower bound gives the largest known lower bound for computing any linear map.

Using a result by Ishai, Kushilevitz, Ostrovsky, and Sahai (2008), we also obtain similar bounds for computing pairwise-independent hash functions.

Our lower bounds are based on a superconcentrator-like condition that the graphs of circuits computing good codes must satisfy. This condition is provably intermediate between superconcentrators and their weakenings considered before.

Skip Supplemental Material Section

Supplemental Material

stoc_6b_1.mp4

mp4

123.8 MB

References

  1. M. Ajtai, J. Komlós, and E. Szemerédi. Deterministic simulation in LOGSPACE. In 19th Annual ACM Symposium on Theory of Computing (STOC'87), pages 132--140. ACM Press, 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. N. Alon, J. Bruck, J. Naor, M. Naor, and R. M. Roth. Construction of asymptotically good low-rate error-correcting codes through pseudo-random graphs. IEEE Transactions on Information Theory, 38(2):509--516, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. N. Alon and P. Pudlák. Superconcentrators of depth 2 and 3; odd levels help (rarely). Journal of Computer and System Sciences, 48(1):194--202, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. L. Bazzi, M. Mahdian, and D. A. Spielman. The minimum distance of turbo-like codes. IEEE Transactions on Information Theory, 55(1):6--15, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. L. Bazzi and S. K. Mitter. Encoding complexity versus minimum distance. IEEE Transactions on Information Theory, 51(6):2103--2112, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. R. Boppana. The average sensitivity of bounded-depth circuits. Information Processing Letters, 63(5):257--261, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. H. Buhrman, P. B. Miltersen, J. Radhakrishnan, and S. Venkatesh. Are bitvectors optimal? SIAM Journal on Computing, 31(6):1723--1744, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. K. Chandra, S. Fortune, and R. J. Lipton. Lower bounds for constant depth circuits for prefix problems. In 10th Colloquium on Automata, Languages and Programming (ICALP'83), volume 154 of LNCS, pages 109--117. Springer, 1983. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. K. Chandra, S. Fortune, and R. J. Lipton. Unbounded fan-in circuits and associative functions. Journal of Computer and System Sciences, 30(2):222--234, 1985.Google ScholarGoogle ScholarCross RefCross Ref
  10. B. Chor, O. Goldreich, J. Håstad, J. Friedman, S. Rudich, and R. Smolensky. The bit extraction problem or t-resilient functions. In 26th Annual IEEE Symposium on Foundations of Computer Science (FOCS'85), pages 396--407. IEEE Computer Society Press, 1985. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. Dolev, C. Dwork, N. Pippenger, and A. Wigderson. Superconcentrators, generalizers and generalized connectors with limited depth. In 15th Annual ACM Symposium on Theory of Computing (STOC'83), pages 42--51. ACM Press, 1983. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. C. Dutta and J. Radhakrishnan. Tradeoffs in depth-two superconcentrators. In 23rd Annual Symposium on Theoretical Aspects of Computer Science (STACS'06), volume 3884 of LNCS, pages 372--383. Springer, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. L. R. Ford and D. R. Fulkerson. Flows in networks. Princeton University Press, 1962.Google ScholarGoogle Scholar
  14. S. Gelfand, R. Dobrushin, and M. Pinsker. On the complexity of coding. In 2nd International Symposium on Information Theory, pages 177--184. Akademiai Kiado, 1973.Google ScholarGoogle Scholar
  15. V. Guruswami and P. Indyk. Expander-based constructions of efficiently decodable codes. In 42nd Annual IEEE Symposium on Foundations of Computer Science (FOCS'01), pages 658--667. IEEE Computer Society Press, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. G. Hansel. Nombre minimal de contacts de fermature nécessaires pour réaliser une fonction booléenne symétrique de n variables. C. R. Acad. Sci. Paris, 258:6037--6040, 1964.Google ScholarGoogle Scholar
  17. Y. Ishai, E. Kushilevitz, R. Ostrovsky, and A. Sahai. Cryptography with constant computational overhead. In 14th Annual ACM Symposium on Theory of Computing (STOC'08), pages 433--442. ACM Press, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. S. Jukna. Boolean Function Complexity: Advances and Frontiers, volume 27 of Algorithms and Combinatorics. Springer, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. N. Kahale. Eigenvalues and expansion of regular graphs. Journal of the ACM, 42(5):1091--1106, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. N. Linial, Y. Mansour, and N. Nisan. Constant depth circuits, Fourier transform, and learnability. Journal of the ACM, 40(3):607--620, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. S. Lovett and E. Viola. Bounded-depth circuits cannot sample good codes. In 25th Annual IEEE Conference on Computational Complexity (CCC'10), pages 243--251. IEEE Computer Society Press, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Y. Mansour, N. Nisan, and P. Tiwari. The computational complexity of universal hashing. Theoretical Computer Science, 107(1):121--133, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. P. B. Miltersen. Error correcting codes, perfect hashing circuits, and deterministic dynamic dictionaries. In 9th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA'98), pages 556--563. ACM Press, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. J. G. Oxley. Matroid theory. Oxford University Press, 1992.Google ScholarGoogle Scholar
  25. H. Perfect. Applications of Menger's graph theorem. Journal of Mathematical Analysis and Applications, 22:96--111, 1968.Google ScholarGoogle ScholarCross RefCross Ref
  26. P. Pudlák. Communication in bounded depth circuits. Combinatorica, 14(2):203--216, 1994.Google ScholarGoogle ScholarCross RefCross Ref
  27. P. Pudlák and V. Rödl. Some combinatorial-algebraic problems from complexity theory. Discrete Mathematics, 136(1--3):253--279, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. J. Radhakrishnan and A. Ta-Shma. Bounds for dispersers, extractors, and depth-two superconcentrators. SIAM Journal on Discrete Mathematics, 13(1):2--24, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. D. Spielman. Computationally Efficient Error-Correcting Codes and Holographic Proofs. PhD thesis, Massachusetts Institute of Technology, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. D. A. Spielman. Linear-time encodable and decodable error-correcting codes. IEEE Transactions on Information Theory, 42(6):1723--1731, 1996. Google ScholarGoogle ScholarCross RefCross Ref
  31. L. Valiant. On non-linear lower bounds in computational complexity. In 7th Annual ACM Symposium on Theory of Computing (STOC'75), pages 45--53. ACM Press, 1975. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. E. Viola. The complexity of constructing pseudorandom generators from hard functions. Computational Complexity, 13(3--4):147--188, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. D. J. Welsh. Matroid theory. Academic Press, London, 1976.Google ScholarGoogle Scholar

Index Terms

  1. Tight bounds on computing error-correcting codes by bounded-depth circuits with arbitrary gates

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            STOC '12: Proceedings of the forty-fourth annual ACM symposium on Theory of computing
            May 2012
            1310 pages
            ISBN:9781450312455
            DOI:10.1145/2213977

            Copyright © 2012 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 19 May 2012

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate1,469of4,586submissions,32%

            Upcoming Conference

            STOC '24
            56th Annual ACM Symposium on Theory of Computing (STOC 2024)
            June 24 - 28, 2024
            Vancouver , BC , Canada

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader