Subtopic Deep Dive

Communication Complexity of Graph Problems
Research Guide

What is Communication Complexity of Graph Problems?

Communication complexity of graph problems studies the minimum communication required between parties holding disjoint parts of a graph to compute properties like connectivity or bipartiteness.

Researchers develop two-party and multiparty protocols for graph functions and prove lower bounds using discrepancy and lifting techniques. Key results include randomized protocols for spanning tree computation (Gallager et al., 1983) and connectivity lower bounds via reduction from set disjointness. Over 50 papers explore connections to streaming and MapReduce models.

15
Curated Papers
3
Key Challenges

Why It Matters

Lower bounds from communication complexity limit distributed graph algorithms in MapReduce and streaming settings, guiding scalable implementations for massive graphs (Goldberg and Tarjan, 1988). Results inform parallel computing efficiency, such as minimum spanning tree protocols in networks (Gallager et al., 1983). Applications appear in privacy-preserving graph queries modeled after private information retrieval (Chor et al., 1998).

Key Research Challenges

Proving tight lower bounds

Establishing communication lower bounds for graph properties like bipartiteness requires lifting from simple functions like equality, but gaps persist for deterministic protocols. Discrepancy methods provide Ω(√n) bounds for some problems (Pointcheval and Stern, 2000). New techniques are needed for nonlinear separations.

Multiparty protocol design

Extending two-party results to k-party settings for graph problems like spanning trees faces exponential blowups in communication. Randomized protocols achieve polylogarithmic costs in some cases (Gallager et al., 1983). Blackboard models complicate analysis versus direct communication.

Connections to streaming

Translating communication bounds to one-pass streaming algorithms for graph density or cycles demands new equivalences. Existing reductions yield sublinear space but lack tightness (Arora et al., 1998). Handling adversarial partitions remains open.

Essential Papers

1.

Security Arguments for Digital Signatures and Blind Signatures

David Pointcheval, Jacques Stern · 2000 · Journal of Cryptology · 2.2K citations

2.

A new approach to the maximum-flow problem

Andrew V. Goldberg, Robert E. Tarjan · 1988 · Journal of the ACM · 1.9K citations

All previously known efficient maximum-flow algorithms work by finding augmenting paths, either one path at a time (as in the original Ford and Fulkerson algorithm) or all shortest-length augmentin...

3.

Private information retrieval

Benny Chor, Eyal Kushilevitz, Oded Goldreich et al. · 1998 · Journal of the ACM · 1.6K citations

Publicly accessible databases are an indispensable resource for retrieving up-to-date information. But they also pose a significant risk to the privacy of the user, since a curious database operato...

4.

Software protection and simulation on oblivious RAMs

Oded Goldreich, Rafail Ostrovsky · 1996 · Journal of the ACM · 1.6K citations

Software protection is one of the most important issues concerning computer practice. There exist many heuristics and ad-hoc methods for protection, but the problem as a whole has not received the ...

5.

Efficient Fully Homomorphic Encryption from (Standard) LWE

Zvika Brakerski, Vinod Vaikuntanathan · 2011 · 1.4K citations

We present a fully homomorphic encryption scheme that is based solely on the (standard) learning with errors (LWE) assumption. Applying known results on LWE, the security of our scheme is based on ...

6.

Proof verification and the hardness of approximation problems

Sanjeev Arora, Carsten Lund, Rajeev Motwani et al. · 1998 · Journal of the ACM · 1.4K citations

We show that every language in NP has a probablistic verifier that checks membership proofs for it using logarithmic number of random bits and by examining a constant number of bits in the proof. I...

7.

A Survey on Homomorphic Encryption Schemes

Abbas Acar, Hidayet Aksu, A. Selcuk Uluagac et al. · 2018 · ACM Computing Surveys · 1.2K citations

Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message. However, this approach poses privacy concerns. The users or servic...

Reading Guide

Foundational Papers

Start with Gallager et al. (1983) for distributed MST protocols as core communication model; Goldberg and Tarjan (1988) for flow reductions to graph problems; Chor et al. (1998) for privacy-inspired lower bound techniques.

Recent Advances

Brakerski and Vaikuntanathan (2011) for LWE links to secure multiparty computation; Acar et al. (2018) survey for homomorphic extensions to graph queries.

Core Methods

Discrepancy theory, lifting theorems, randomized protocols, blackboard multiparty models.

How PapersFlow Helps You Research Communication Complexity of Graph Problems

Discover & Search

Research Agent uses citationGraph on Gallager et al. (1983) to map distributed MST papers, then findSimilarPapers reveals 20+ works on graph communication like Goldberg and Tarjan (1988) flows. exaSearch queries 'communication complexity graph connectivity lower bounds' to uncover multiparty extensions from Chor et al. (1998) PIR techniques.

Analyze & Verify

Analysis Agent applies readPaperContent to extract protocol details from Gallager et al. (1983), then verifyResponse with CoVe checks lower bound claims against discrepancy math. runPythonAnalysis simulates communication matrices for bipartiteness using NumPy, with GRADE scoring evidence strength on randomized vs deterministic bounds.

Synthesize & Write

Synthesis Agent detects gaps in multiparty spanning tree protocols via contradiction flagging across 30 papers, then Writing Agent uses latexEditText and latexSyncCitations to draft proofs with exportMermaid for protocol flowcharts. latexCompile generates camera-ready surveys linking to MapReduce applications.

Use Cases

"Simulate communication cost for randomized MST protocols on 100-node graphs"

Research Agent → searchPapers 'Gallager MST communication' → Analysis Agent → runPythonAnalysis (NumPy matrix simulation, plot costs) → researcher gets runtime graphs and bound verifications.

"Write LaTeX survey on connectivity lower bounds with citations"

Synthesis Agent → gap detection on 50 papers → Writing Agent → latexEditText + latexSyncCitations (Chor et al. 1998) + latexCompile → researcher gets PDF with diagrams via exportMermaid.

"Find GitHub repos implementing graph communication protocols"

Research Agent → searchPapers 'communication complexity graph github' → Code Discovery → paperExtractUrls → paperFindGithubRepo → githubRepoInspect → researcher gets code, tests, and README summaries.

Automated Workflows

Deep Research workflow scans 50+ papers via searchPapers on 'graph communication complexity', structures report with sections on lower bounds (Chor et al., 1998) and protocols (Gallager et al., 1983). DeepScan applies 7-step CoVe to verify claims in Goldberg and Tarjan (1988), flagging unproven streaming links. Theorizer generates hypotheses on multiparty lifting from two-party bounds.

Frequently Asked Questions

What is communication complexity of graph problems?

It measures bits exchanged by parties with graph partitions to compute properties like spanning trees or connectivity.

What methods prove lower bounds?

Discrepancy and lifting from disjointness yield Ω(√n) bounds; see extensions in Pointcheval and Stern (2000).

What are key papers?

Gallager et al. (1983, 1137 citations) for MST protocols; Goldberg and Tarjan (1988, 1852 citations) for flow connections; Chor et al. (1998, 1596 citations) for privacy links.

What open problems exist?

Tight multiparty bounds for dense graphs and deterministic protocols for bipartiteness lack separations.

Research Complexity and Algorithms in Graphs with AI

PapersFlow provides specialized AI tools for Computer Science researchers. Here are the most relevant for this topic:

See how researchers in Computer Science & AI use PapersFlow

Field-specific workflows, example queries, and use cases.

Computer Science & AI Guide

Start Researching Communication Complexity of Graph Problems with AI

Search 474M+ papers, run AI-powered literature reviews, and write with integrated citations — all in one workspace.

See how PapersFlow works for Computer Science researchers