The communication complexity of the two list problem

  • Alon Itai
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 579)


Let L and R be processors, each containing the n numbers x1,..., xn and y1,..., yn respectively, where each number consists of n bits. Their task is to determine whether there exists an i such that xi=yi. This problem requires Ω(n2) bits for deterministic algorithms [7]. Here a simple O(n) expected bit randomized (Las Vegas) algorithm is suggested. Its properties depend on the properties of universal hash functions, not on prime numbers or finite fields. Then the number of random bits is reduced by a general construction. Finally, practical algorithms using almost independent strings are presented.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    “A fast and simple randomized parallel algorithm for the maximal independent set problem”. Alon, N., L. Babai, A. Itai, J. Algorithms, 7, 567–583, (1986).Google Scholar
  2. [2]
    Alon, N., O. Goldreich, J. Hastead and R. Peralta, “Simple construction of almost k-wise independent random variables”. FOCS 90.Google Scholar
  3. [3]
    Carter, J. L., and M. N. Wegman, “Universal classes of hash functions,” JCSS 18, 143–154 (1979).Google Scholar
  4. [4]
    Duris, P., and Z. Galil. “Two lower bounds in asynchronous distributed computation,” 28 FOCS, 326–330, (1987).Google Scholar
  5. [5]
    Fleischer, R., H. Jung, and K. Melhorn, “A time-randomness tradeoff for communication complexity”, WDAG 4, Otranto, Italy, (1990). Lecture Notes in Computer Science 486, J. van Leewen and N. Santoro, (eds.), Springer-Verlag.Google Scholar
  6. [6]
    Fürer, M., “The power of randomness for communication complexity,” STOC 1987, 178–181.Google Scholar
  7. [7]
    Melhorn, K., and E.M. Schmidt, “Las Vegas is better than determinism in VLSI and distributed computing,” STOC 1982, 330–337.Google Scholar
  8. [8]
    Luby, M., “A simple parallel algorithm for the maximal independent set problem”, SIAM J. Computing, 15 (1986), 1036–1053.Google Scholar
  9. [9]
    Melhorn, K., Data structures and Algorithms 1: Sorting and Searching EATCS Monographs on Theoretical Computer Science, Springer-Verlag, 1984.Google Scholar
  10. [10]
    Naor, J., and M. Naor, “Small-bias probability spaces: Efficient construction and applications”, 22nd ACM Symposium on the Theory of Computing, 213–223, (1990).Google Scholar
  11. [11]
    Newman, I., “Communication complexity in the private random bits model is no harder than in the common bits model,” unpublished manuscript, 1990.Google Scholar
  12. [12]
    O'Reilly, U-M., and N. Santoro, “The expressiveness of silence”, unpublished communication, (1991).Google Scholar
  13. [13]
    Papadimitriou, C. H., and M. Sipser, “Communication complexity”, Fourteenth ACM Symposium on the Theory of Computing, 196–200, (1982).Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1992

Authors and Affiliations

  • Alon Itai
    • 1
  1. 1.Dept. of Computer ScienceTechnionHaifaIsrael

Personalised recommendations