1991
DOI: 10.1016/0020-0190(91)90157-d
|View full text |Cite
|
Sign up to set email alerts
|

Private vs. common random bits in communication complexity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
175
0

Year Published

1997
1997
2017
2017

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 283 publications
(180 citation statements)
references
References 3 publications
1
175
0
Order By: Relevance
“…One may wonder whether there exists a private-coin communication protocol with the same properties as the protocol of Theorem 3.1. Newman's theorem ( [6]) states that every public-coin protocol can be transformed into a private-coin protocol at the expense of increasing the error probability by δ and the worst case communication by O(log log |X × Y| + log 1/δ) (for any positive δ). Lemma 3.1 provides an upper bound for the error probability and communication of our protocol for each pair of inputs.…”
Section: Lemma 31 Let ε Be a Positive Real And H A Positive Integermentioning
confidence: 99%
“…One may wonder whether there exists a private-coin communication protocol with the same properties as the protocol of Theorem 3.1. Newman's theorem ( [6]) states that every public-coin protocol can be transformed into a private-coin protocol at the expense of increasing the error probability by δ and the worst case communication by O(log log |X × Y| + log 1/δ) (for any positive δ). Lemma 3.1 provides an upper bound for the error probability and communication of our protocol for each pair of inputs.…”
Section: Lemma 31 Let ε Be a Positive Real And H A Positive Integermentioning
confidence: 99%
“…For a public-coin randomized cell-probing scheme, the sequence of random bits r ∈ {0, 1} * is shared between the cell-probing algorithm A and the table structure T , where the table T r B is now determined by both the database B and the random bits r. This makes no change to the family of data structures of polynomial size: by Newman's theorem [18], a public-coin cell-probing scheme can be transformed to a standard randomized cell-probing scheme, where the randomness is private to the cell-probing algorithm.…”
Section: Preliminariesmentioning
confidence: 99%
“…The distinction between private and public random bits can be made, where in the public bit/coin model Alice and Bob see the same random bits and in the private they each have a different random source. Newman [45] has shown that up to an additive logarithmic term the models are the same. Rabin and Yao show for EQ that there exists a classical randomized protocol that only needs O(log(n)) bits: R 2 (EQ) = O(log(n)).…”
Section: Communication Complexitymentioning
confidence: 99%