One of the most interesting questions posed in the last thirty years of computer science is to ask how much “information” must be communicated between two parties in order for them to jointly compute something. One can imagine these two parties living on distant planets, so that the cost of communicating any amount of information is very expensive, but each person has an integral component of the answer that the other does not.

Since this question was originally posed by Andrew Yao in 1979, it has led to a flurry of applications in many areas of mathematics and computer science. In particular it has become a standard tool for proving lower* *bounds in many settings such as circuit design and streaming algorithms. And if there’s anything theory folks love more than a problem that can be solved by an efficient algorithm, it’s a proof that a problem cannot be solved by *any* efficient algorithm (that’s what I mean by “lower bound”).

Despite its huge applicability, the basic results in this area are elementary. In this post we’ll cover those basics, but once you get past these basic ideas and their natural extensions you quickly approach the state of the art and open research problems. Attempts to tackle these problems in recent years have used sophisticated techniques in Fourier analysis, Ramsey theory, and geometry. This makes it a very fun and exciting field.

As a quick side note before we start, the question we’re asking is different from the one of determining the information *content* of a specific message. That is the domain of information theory, which was posed (and answered) decades earlier. Here we’re trying to determine the complexity of a problem, where more complex messages require more information about their inputs.

## The Basic Two-Player Model

The most basic protocol is simple enough to describe over a dinner table. Alice and Bob each have one piece of information , respectively, say they each have a number. And together they want to compute some operation that depends on both their inputs, for example whether . But in the beginning Alice has access only to her number , and knows nothing about . So Alice sends Bob a few bits. Depending on the message Bob computes something and replies, and this repeats until they have computed an answer. The question is: what is the minimum number of bits they need to exchange in order for both of them to be able to compute the right answer?

There are a few things to clarify here: we’re assuming that Alice and Bob have agreed on a protocol for sending information before they ever saw their individual numbers. So imagine ten years earlier Alice and Bob were on the same planet, and they agreed on the rules they’d follow for sending/replying information once they got their numbers. In other words, we’re making a worst-case assumption on Alice and Bob’s inputs, and as usual it will be measured as a function of , the lengths of their inputs. Then we take a minimum (asymptotically) over all possible protocols they could follow, and this value is the “communication complexity” of the problem. Computing the exact communication complexity of a given problem is no simple task, since there’s always the nagging question of whether there’s some cleverer protocol than the one you came up with. So most of the results are *bounds* on the communication complexity of a problem.

Indeed, we can give our first simple bound for the “ greater than ” problem we posed above. Say the strings both have bits. What Alice does is send her entire string to Bob, and Bob then computes the answer and sends the answer bit back to Alice. This requires bits of communication. This proves that the communication complexity of “” is bounded from above by . A much harder question is, can we do any better?

To make any progress on upper or lower bounds we need to be a bit more formal about the communication model. Basically, the useful analysis happens when the players alternate sending single bits, and this is only off by small constant factors from a more general model. This is the asymptotic analysis, that we only distinguish between things like linear complexity versus sublinear options like or or even constant complexity . Indeed, the protocol we described for is the stupidest possible protocol for the problem, and it’s actually valid for *any* problem. For this problem it happens to be optimal, but we’re just trying to emphasize that nontrivial bounds are all sub-linear in the size of the inputs.

On to the formal model.

**Definition: **A *player* is a computationally unbounded Turing machine.

And we really mean unbounded. Our players have no time or space constraints, and if they want they can solve undecidable problems like the halting problem or computing Kolmogorov complexity. This is to emphasize that the critical resource is the amount of communication between players. Moreover, it gives us a hint that lower bounds in this model won’t come form computational intractability, but instead will be “information-theoretic.”

**Definition: **Let be the set of all binary strings. A *communication protocol* is a pair of functions .

The input to these functions should be thought of as follows: is the player’s secret input and is the communication history so far. The output is the single bit that they will send in that round (which can be determined by the length of since only one bit is sent in each round). The protocol then runs by having Alice send to Bob, then Bob replies with , Alice continues with , and so on. We implicitly understand that the content of a communication protocol includes a termination condition, but we’ll omit this from the notation. We call the *length* of the protocol the number of rounds.

**Definition: **A communication protocol is said to be *valid* for a boolean function if for all strings , the protocol for terminates on some round with if and only if .

So to define the communication complexity, we let the function be the maximum length of the protocol when run on strings of length (the worst-case for a given input size). Then the *communication complexity* of a function is the minimum of over all valid protocols . In symbols,

We will often abuse the notation by writing the communication complexity of a function as , understanding that it’s measured asymptotically as a function of .

## Matrices and Lower Bounds

Let’s prove a lower bound, that to compute the equality function you need to send a linear number of bits in the worst case. In doing this we’ll develop a general algebraic tool.

So let’s write out the function as a binary matrix in the following way. Write all inputs of length in some fixed order along the rows and columns of the matrix, and let entry be the value of . For example, the 6-bit function which computes whether the majority of the two player’s bits are ones looks like this:

The key insight to remember is that if the matrix of a function has a nice structure, then one needs very little communication to compute it. Let’s see why.

Say in the first round the row player sends a bit . This splits the matrix into two submatrices by picking the rows of to be those inputs for which the row player sends a , and likewise for with . If you’re willing to rearrange the rows of the matrix so that and stack on top of each other, then this splits the matrix into two rectangles. Now we can switch to the column player and see which bit he sends in reply to each of the possible choices for (say he sends back ). This separately splits each of into two subrectangles corresponding to which inputs for the column player make him send the specific value of . Continuing in this fashion we recurse until we find a submatrix consisting entirely of ones or entirely of zeros, and then we can say with certainty what the value of the function is.

It’s difficult to visualize because every time we subdivide we move around the rows and columns within the submatrix corresponding to the inputs for each player. So the following would be a possible subdivision of an 8×8 matrix (with the values in the rectangles denoting which communicated bits got you there), but it’s sort of a strange one because we didn’t move the inputs around at all. It’s just a visual aid.

If we do this for steps we get subrectangles. A crucial fact is that any valid communication protocol for a function has to give a subdivision of the matrix where all the rectangles are constant. or else there would be two pairs of inputs , which are labeled identically by the communication protocol, but which have different values under .

So naturally one expects the communication complexity of would require as many steps as there are steps in the *best* decomposition, that is, the decomposition with the fewest levels of subdivision. Indeed, we’ll prove this and introduce some notation to make the discourse less clumsy.

**Definition: **For an matrix , a *rectangle* is a submatrix where . A rectangle is called monochromatic if all entires in the corresponding submatrix are the same. A *monochromatic tiling* of is a partition of into disjoint monochromatic rectangles. Define to be the minimum number of rectangles in any monochromatic tiling of .

As we said, if there are steps in a valid communication protocol for , then there are rectangles in the corresponding monochromatic tiling of . Here is an easy consequence of this.

**Proposition:** If has communication complexity , then there is a monochromatic tiling of with at most rectangles. In particular, .

*Proof.* Pick any protocol that achieves the communication complexity of , and apply the process we described above to subdivide . This will take exactly , and produce no more than rectangles.

This already gives us a bunch of theorems. Take the EQ function, for example. Its matrix is the identity matrix, and it’s not hard to see that every monochromatic tiling requires rectangles, one for each entry of the diagonal. I.e., . But we already know that one player can just send all his bits, so actually . Now it’s not always so easy to compute . The impressive thing to do is to use efficiently computable information about to give bounds on and hence on . So can we come up with a better lower bound that depends on something we can compute? The answer is yes.

**Theorem: **For every function , .

*Proof. *This just takes some basic linear algebra. One way to think of the rank of a matrix is as the smallest way to write as a linear combination of rank 1 matrices (smallest as in, the smallest number of terms needed to do this). The theorem is true no matter which field you use to compute the rank, although in this proof and in the rest of this post we’ll use the real numbers.

If you give me a monochromatic tiling by rectangles, I can view each rectangle as a matrix whose rank is at most one. If the entries are all zeros then the rank is zero, and if the entries are all ones then (using zero elsewhere) this is by itself a rank 1 matrix. So adding up these rectangles as separate components gives me an upper bound on the rank of . So the minimum way to do this is also an upper bound on the rank of .

Now computing something like is even easier, because the rank of is just .

## Upper Bounds

There are other techniques to show lower bounds that are stronger than the rank and tiling method (because they imply the rank and tiling method). See this survey for a ton of details. But I want to discuss upper bounds a bit, because the central open conjecture in communication complexity is an upper bound.

**The Log-Rank Conjecture: **There is a universal constant , such that for all , the communication complexity .

All known examples satisfy the conjecture, but unfortunately the farthest progress toward the conjecture is still exponentially worse than the conjecture’s statement. In 1997 the record was due to Andrei Kotlov who proved that . It was not until 2013 that any (unconditional) improvements were made to this, when Shachar Lovett proved that .

The interested reader can check out this survey of Shachar Lovett from earlier this year (2014) for detailed proofs of these theorems and a discussion of the methods. I will just discuss one idea from this area that ties in nicely with our discussion: which is that finding an efficient communication protocol for a low-rank function reduces to finding a large monochromatic rectangle in .

**Theorem [Nisan-Wigderson 94]:** Let be a function. Suppose that for any function , we can find a monochromatic rectangle of size where . Then any such is computable by a deterministic protocol with communication complexity.

Just to be concrete, this says that if is polylogarithmic, then finding these big rectangles implies a protocol also with polylogarithmic complexity. Since the complexity of the protocol is a function of alone, the log-rank conjecture follows as a consequence. The best known results use the theorem for larger for some , which gives communication complexity also .

The proof of the theorem is detailed, but mostly what you’d expect. You take your function, split it up into the big monochromatic rectangle and the other three parts. Then you argue that when you recurse to one of the other three parts, either the rank is cut in half, or the size of the matrix is much smaller. In either case, you can apply the theorem once again. Then you bound the number of leaves in the resulting protocol tree by looking at each level where the rank has dropped to . For the full details, see page 4 of the Shachar survey.

## Multiple Players and More

In the future we’ll cover some applications of communication complexity, many of which are related to computing in restricted models such as parallel computation and streaming computation. For example, in parallel computing you often have processors which get arbitrary chunks of data as input and need to jointly compute something. Lower bounds on the communication complexity can help you prove they require a certain amount of communication in order to do that.

But in these models there are *many* players. And the type of communication matters: it can be point-to-point or broadcast, or something more exotic like MapReduce. So before we can get to these applications we need to define and study the appropriate generalizations of communication complexity to multiple interacting parties.

Until then!

Dear Jeremy

You may be interested to know that the notion of communication complexity was developed independently by Mount & Reiter in the context of Mechanism Design. See:

Click to access Segal042606.pdf

LikeLike

That is very interesting. Thanks for the reference.

LikeLike

Doesn’t the smallest monochromatic tiling of the unit matrix have more than 2^n entries? E.g., the 2×2 unit matrix has the monochromatic rectangles {1}×{1}, {2}×{2}, {1}×{2} and {2}×{1}.

LikeLike

Before the explanation, just FYI your example is not a good counterexample because 2^2 = 2*2.

But of course, there are entries in , but even if every entry was its own rectangle, this would only give many rectangles, and (likewise for lower bounds, so actually it’s a Theta). So asymptotically they’re the same.

LikeLike

I am somewhat picky about notation. When defining the communication complexity of f at length n, the min should be over “A,B valid for f”. Otherwise, I get confused because I see f on the left but not in the right and wonder why the right does not depend on f (which is not the case, it does depends on f).

LikeLike

Good point.

LikeLike

The statement of Theorem [Nisan-Wigderson 94] doesn’t make sense. I think there should be some restriction placed on the function c. As stated, the hypothesis only depends on c at r = M(f) but the conclusion depends on c at many other values. We might as well pick c to be a delta function so that it satisfies the condition in the hypothesis and then adds almost nothing to the communication complexity in the conclusion.

LikeLike

I think what’s not clear is that in the statement of the hypothesis r and f are not fixed. The proof works by induction, and the smaller submatrices will have smaller rank.

LikeLike

Ah, yes. Now it makes sense. Thanks.

LikeLike

Good post. My favorite application of communication complexity is in proving lower bounds for data structures.

Also, two typos: (1) “All known examples satisfy the theorem” -> “All known examples satisfy the conjecture” and (2) end Theorem [Nisan-Wigderson 94] with a period.

LikeLike