1 Introduction
Modern cryptography has developed a remarkable suite of information-theoretic primitives, like secret-sharing and its many variants, secure multi-party computation (MPC) in a variety of information-theoretic settings, (multi-server) private information retrieval (PIR), randomness extractors, randomized encoding, private simultaneous messages (PSM) protocols, conditional disclosure of secrets (CDS), and non-malleable codes, to name a few. Even computationally secure primitives are often built using these powerful tools. Further, a rich web of connections tie these primitives together.
Even as these primitives are often simple to define, and even as a large body of literature has investigated them over the years, many open questions remain. For instance, the efficiency of secret-sharing, communication complexity in MPC, PIR, and CDS, characterization of functions that admit MPC (without honest majority or setups) all pose major open problems. Interestingly, recent progress in some of these questions have arisen from surprising new connections across primitives (e.g., MPC from PIR [BIKK14], CDS from PIR [LVW17], and secret-sharing from CDS [LVW18, AA18]).
In this work, we introduce a novel information-theoretic primitive called Zero-Communication Reductions () that fits right into this toolkit, and provides a bridge to information theoretic tools which were so far not brought to bear on cryptographic applications. The goal of a
scheme is to let two parties compute a function on their joint inputs, without communicating with each other! Instead, in a
from a function f to a predicate
, each party locally produces an output candidate along with an input to the predicate. The correctness requirement is that when the predicate outputs 1 (“accepts”), then the output candidates produced by the two parties should be correct; when the predicate outputs 0, correctness is not guaranteed. The non-triviality requirement places a (typically exponentially small) lower bound on the acceptance probability. We also define a natural security notion for
, resulting in a primitive that is challenging to realize, and requires predicates with cryptographic structure.
Thanks to its minimalistic nature, emerges as a fundamental primitive. In this work we develop a theory that connects it with other fundamental cryptographic and information-theoretic notions. We highlight two classes of important applications of
to central questions in information-theoretic cryptography – one for upper bounds and one for lower bounds. On the former front, we derive new upper bounds for communication in PSM and CDS protocols and for “OT-complexity” of a function – i.e., the number of OTs needed by an information-theoretically secure 2-Party Computation (2PC) protocol for the function – in terms of (internal) information complexity, a fundamental complexity measure of a 2-party function closely related to its communication complexity. On the other hand, we present a new potential route for strong lower bounds for OT-complexity, via Secure
(
), which has a much simpler combinatorial and linear algebraic structure compared to 2PC protocols.
Barriers: Avoiding and Confronting. One of the key questions that motivates our work is that of lower bounds for “cryptographic complexity” of 2-party functions – i.e., the number of accesses to oblivious transfer (or any other finite complete functionality) needed to securely evaluate the function (say, against honest-but-curious adversaries). Proving such lower bounds would imply lower bounds on representations that can be used to construct protocols. Specifically, small circuits and efficient private information retrieval (PIR) schemes imply low cryptographic complexity. As such, establishing strong lower bounds for cryptographic complexity will entail showing breakthrough results on circuit complexity and also on PIR lower bounds (which in turn has implications to Locally Decodable Codes).
Nevertheless, there is room to pursue cryptographic complexity lower bound questions without necessarily breaking these barriers. Firstly, there are existential questions of cryptographic complexity lower bounds that remain open, while the corresponding questions for circuit lower bounds are easy and pose no barrier by themselves. Secondly, when perfect correctness is required, the cryptographic lower bound questions are interesting and remain open for randomized functions with very fine-grained probability values. In these cases, since the input (or index) must be long enough to encode the random choice, the corresponding circuit lower bounds and PIR lower bounds are already implied.
Finally, cryptographic complexity provides a non-traditional route—though still difficult—to attack these barriers. In fact, this work could be seen as providing a step along this path. We formulate lower bounds as a linear algebraic question of lower bounding what we call the invertible rank, which in turn implies cryptographic complexity and hence circuit complexity and PIR lower bounds. We conjecture that there exist matrices (representing the truth table of functions) that have a high invertible rank. Attacking the circuit complexity lower bound question translates to finding such matrices explicitly.
1.1 Our Results
We summarize our main contributions, and elaborate on them below.
New Primitives. We define zero-communication reductions with different levels of security (
,
, and
). We kick-start a theory of zero-communication reductions with several basic feasibility and efficiency results.
New Upper Bounds via Information Complexity. Building on results of [BW16, KLL+15] which related information complexity of functions to communication complexity and “partition” complexity, we obtain constructions of
whose complexity is upper bounded by the information complexity of the function. This in turn lets us obtain new upper bounds for statistically secure PSM, CDS, and OT complexity, which are exponential in the information complexity of the functions. As a concrete illustration of our upper bounds based on information complexity, for the “bursting noise function” of Ganor, Kol and Raz [GKR15], we obtain an exponential improvement over all existing constructions.
A New Route to Lower Bounds. We show that an upper bound on OT-complexity of a function f implies an upper bound on the complexity of a
from f to a predicate corresponding to OT. Hence lower bounding the latter would provide a potential route to lower bounding OT-complexity.
- We motivate the feasibility of this new route in a couple of ways:
We recover the known (linear) lower bounds on OT-complexity [BM04] via this new route by providing lower bounds on
complexity.
We formulate the lower bound problem for
in purely linear-algebraic terms, by defining the invertible rank of a matrix. We present our Invertible Rank Conjecture, proving which will establish super-linear lower bounds for OT-complexity (and if accompanied by an explicit construction, will provide explicit functions with super-linear circuit lower bounds).













(In)Feasibility Results. We follow up on the definitions with several basic positive and negative results about , presented in Sect. 4. In particular, we show that every function f has a non-trivial
to some predicate
(using no correlation); also every function f has a
to the AND predicate, using some correlation
. Complementing these results, we show that for many natural choices of the predicate (AND, OR, or XOR), there are functions f which do not have a
to the predicate, if no correlation is used. In fact, we completely characterize all functions that have a
to these predicates.
On the other hand, there are predicates which are complete in the sense that any function f has a to it (possibly using a common random string). In a dual manner, a correlation
can be considered complete if any function f can be reduced to a constant-sized predicate like AND using
. Our results (discussed below) show that the predicate
– which checks if its inputs are in the support of one or more instances of the oblivious transfer (
) correlation – is a complete predicate (Theorem 3) and
is a complete correlation (Theorem 12). These results rely on
being complete for secure 2-party computation and having a “regularity” structure.
We also consider reducing randomized functionalities without inputs to randomized predicates; in this case, we characterize the optimal non-triviality achievable (Theorem 9).
Upper Bounds. Our upper bounds for CDS, PSM and 2PC for a function f are obtained by first constructing a (or
) from f to a simple predicate. We offer two sets of results – perfectly secure constructions with complexity exponential in the communication complexity of f, and statistically secure constructions with complexity exponential in the information complexity.
The first set of results presented in Sect. 6.1, may be informally stated as follows.
For a deterministic function , with communication complexity
, there exist perfectly secure protocols for CDS, PSM and 2PC using OTs, all with communication complexity
. Further, the 2PC protocol uses
invocations of OT.








Let be a deterministic function. For any constant
, the communication complexity of
-PSM of f, communication complexity of
-CDS for predicate f, and OT and communication complexity of
-secure 2PC of f are upperbounded by
.
This result is all the more interesting because it is known that information complexity can be exponentially smaller than communication complexity. In particular, Ganor, Kol and Raz described an explicit (partial) function in [GKR15], called the “bursting noise function,” which on inputs of size n, have a communication complexity lower bound of and an information complexity upper bound of
. Note that the existing general 2PC techniques do not achieve sub-linear OT-complexity. Theorem 1 would allow
OT-complexity, whereas Theorem 2 brings it down to
.
Our results can be seen as complementing [BIKK14] which offered improvements over the circuit size for “very high complexity” functions. We offer the best known protocols, improving over the input size, and even the communication complexity, for “very low complexity” functions.
We show that for a function f with OT-complexity m, there is a
-
from f to the constant-depth predicate
(which checks if its inputs are in the support of oblivious transfer (OT) correlations), where
is roughly m:
If a deterministic functionality f with domain and has OT-complexity m, then there exists an
-
from f to
, possibly using a common random string.
This result is proved more generally in Theorem 11, where it is also shown that the common random string can be avoided for a natural class of functions f (which are “common-information-free”). The results also extend to a “dual version” where the reduction is to a simple AND predicate, but uses a correlation that provides m copies of OT (Theorem 12).

where the first bound is shown using a simple support based argument (Lemma 2), and the second one follows from the upper bound on the domain size of the predicate in Theorem 3. This is formally stated and proved as Corollary 2.
Invertible Rank. Theorem 3 provides a new potential route for lower bounding OT-complexity of f, by lower bounding or k in a
-
from f to
. In turn, this problem can be formulated as a purely linear-algebraic question of what we term “invertible rank” (Sect. 5.1). Compared to previous paths for lower bounding OT-complexity [BM04, PP14], this new route is not known to be capped at linear bounds, and could even be seen as a stepping stone towards a fresh line of attack on circuit complexity lower bounds (as they are implied by OT-complexity lower bounds).
Invertible rank characterizes the best complexity – in terms of non-triviality and predicate-domain complexity – achievable by a from f to
(conjunction of one or more instances of
). Specifically, for a matrix
encoding a function f and a matrix
encoding a predicate, we have:
If a function f has a perfect -
to
then the invertible rank of
w.r.t.
is at most
.
This characterization, combined with Theorem 3 implies that if a deterministic n-bit input functionality f has OT-complexity m, then its invertible rank w.r.t. is
. Hence, a super-linear lower bound on invertible rank w.r.t.
would imply super-linear OT-complexity, and consequently, super-linear circuit complexity for f. We conjecture the existence of function families f with super-linear invertible rank, and leave it as an important open problem to resolve it.
1.2 Related Work
As mentioned above, zero-communication protocols have been used to study communication and information complexity, in classical and quantum settings. The model can be traced back to the work of Gisin and Gisin [GG99], who proposed it as a local-hidden variable model (i.e., no quantum effects) that could explain apparent violation of the Bell inequality, when there is a significant probability of abort (i.e., missed detection) built into the system. More recently, Kerenidis et al. [KLL+15], using a compression lemma by Braverman and Weinstein [BW16], presented a zero-communication protocol with non-abort probability of at least , given a protocol for computing f with information complexity IC.
OT-complexity was explicitly introduced as a fundamental measure of complexity of a function f by Beimel and Malkin [BM04], who also presented a lower bound for f’s OT-complexity in terms of the one-way communication complexity of f. In [PP14] an information-theoretic measure called tension was developed, and was shown to imply lower bounds for OT-complexity, among other things. Unfortunately, both these techniques can yield lower bounds on OT-complexity that are at most the length of the inputs. On the other hand, the best known feasibility result for OT-complexity, achieved via connections to PIR, by Beimel et al. [BIKK14], is sub-exponential (a.k.a. weakly exponential) in the input length. Closing this gap, even existentially, is an open problem.
In the PSM model, all functions are computable [FKN94] and efficient protocols are known when the function has small non-deterministic branching programs [FKN94, IK97]. Upper bounds on communication complexity were studied by Beimel et al. [BIKK14]. See [AHMS18] and references therein for lower bounds. In CDS, protocols have been constructed with communication complexity linear in the formula size [GIKM00]. Efficient protocols were later developed for branching programs [KN97] and arithmetic span programs [AR17]. Liu et al. [LVW17] obtained an upper bound of for arbitrary predicates with domain
. Applebaum et al. [AA18] showed that amortized complexity over very long secrets can be brought down to a constant.
1.3 Technical Overview
We discuss some of the technical aspects of a few of our contributions mentioned above.
A New Model of Secure Computation. and its secure variants present a fundamentally new cryptographic primitive, highlighting aspects of secure computation common to many seemingly disparate notions like PSM, CDS and secure 2PC using correlated randomness.
Recall that in a from a function f to a predicate
, each party locally produces an output candidate along with an input to the predicate. The output candidates produced by the two parties should be correct when the predicate outputs 1. Instances of zero-communication models have appeared in the communication complexity literature (see [KLL+15]), but they typically prescribed a specific predicate as part of the model (e.g.., the equality predicate). By allowing an arbitrary predicate rather than one that is fixed as part of the model, we view our protocols as reductions from 2-party functionalities to predicates. This generalization is key to obtaining the various connections we develop.
Secondly, we add security requirements to the model. One may expect that a zero-communication protocol is naturally secure, as neither party receives any information about the other party’s input or output. While that is the case for honest parties, we shall allow the adversary to learn the outcome of the predicate as well. This is the “right” definition, in that it allows interpreting a zero-communication protocol as a standard secure computation protocol when the predicate is implemented by a trusted party, who announces its result to the two parties. The secure version of – called
– admits stronger lower bounds (and even impossibility results), as discussed below.
We further generalize the notion of zero-communication reduction to allow the two parties access to a correlation , rather than just common randomness as in the original models in the literature.




The random variables involved in a .
The reduction is specified as a pair of randomized algorithms executed by two parties, Alice and Bob. Alice, given input x and her part of the correlation R, samples
, where A is her proposed output for the functionality f, and U is her input to
. Similarly, Bob computes
. The non-triviality guarantee is that
with a positive probability
, and correctness guarantee is that conditioned on
, the outputs of Alice and Bob are (almost always) correct.
The security definitions we attach to and
could be seen as based on the standard simulation paradigm. However, when defining statistical (rather than perfect) security in the case of
, a novel aspect emerges for us. Note that a
-
needs to accept an execution with probability only
, which can be negligible. As such, allowing a negligible statistical error in security would allow one to have no security guarantees at all whenever the execution is not aborting, and would render
no different from
. The “right” security definition of
with statistical security is to require security to hold conditioned on acceptance (as well as over all).
Due to its minimalistic nature, a
can be used as a reduction in the context of PSM, CDS, and 2PC. At a high-level, a
from f to a predicated
could be thought of as involving a “trusted party” which implements
. Since the reduction itself involves no communication, it can easily be turned into a PSM, CDS or 2PC scheme for the function f, if we can “securely implement” a trusted party for
in the respective model. One complication however, is that a
can abort with a high probability. This is handled by repeating the execution several times (inversely proportional to the acceptance probability), and using the answer produced in an execution that is accepted.
While it may appear at first that with a security guarantee will be needed here, we can avoid it. This is done by designing the secure component (PSM, CDS, or 2PC) to not implement the predicate
directly, but to implement a selector function as described below. Recall that in an execution of the
protocol, Alice and Bob will generate candidate outputs (a, b) as well as inputs (u, v) for
. The parties will now carry out this protocol n times in parallel, to generate
and
, for
to n. The selector function accepts all
as inputs and outputs a pair
such that
, without revealing i itself (we choose n sufficiently large as to guarantee that there will be at least one such instance, except with negligible probability; if multiple such i exist, then, say, the largest index is selected).
The overall communication complexity of the resulting protocol is exactly determined by the PSM, CDS, or 2PC protocol for the selector function (as the itself adds no communication overhead). By instantiating our results for the predicate
, the selector function has a small formula complexity, and hence efficient PSM, CDS, and 2PC protocols.
and the notion of relaxed partition [JK10, KLL+15] are intimately connected to each other. A relaxed partition of a 2-input function f could be seen as a tiling of the function table with fractionally weighted tiles such that each cell in the table is covered by (almost) 1 unit worth of tiles, (almost) all of them having the same color (i.e., output value) as the cell itself. The goal of a partition is to use as few tiles as possible – or more precisely, to minimize the total weight of all the tiles used. In Lemma 4, we show that a relaxed partition can be turned into a
of f to the predicate
, with acceptance probability roughly equal to the reciprocal of the total weights of the tile. (In fact, if no error were to be allowed, a
with maximum acceptance probability exactly corresponds to a partition with minimum total weight.) A result of [KLL+15] can then be used to relate this acceptance probability to the information complexity of f.
Thus, via , we can upper bound PSM, CDS, and OT-complexity of functions by a quantity exponential in their information complexity. While this upper bound is rather loose in the worst case, in general, it appears incomparable to all other known upper bounds.
Any boolean function f has a
to a predicate
with acceptance probability of at least 1/4 (Theorem 5). However, the computational complexity (measured in size or depth) of
is as much as that of f. An important question is whether – and how well can – a function be reduced to a universal, constant-depth predicate.
We show that if the predicate is , and no correlations are used (except possibly common randomness), then only simple functions have a
to the predicate. (Simple functions are those that are not complete [MPR13].)
On the other hand, there is a universal constant-depth predicate , which simply checks if its inputs are in the support of several copies of oblivious transfer correlations, such that every function f has a
to it. In fact, we show that f has a
-
(i.e., a
with acceptance probability
) to
where
is at most the OT complexity of f. (Corollary 1). (In this result, OT can be replaced by a general class of correlations, called “regular correlations.”)

















Note that for x which maximizes the expression defining ,
does not set
, but in general, this costs the
in terms of non-triviality. This sacrifice in acceptance probability is needed for Alice to even out the acceptance probability across her different inputs, so that Bob’s view combined with the acceptance event, does not reveal information about x (beyond f(x, y)). Nevertheless, we can show that the probability of acceptance is lower bounded by
, where m is the number of OTs (so u, v are each 2m-bit strings) and the combined input of f is n bits long.
The construction is somewhat more delicate when f admits common-information. This means that there is some common information that Alice and Bob could agree on if they are given and
respectively. For such functions, the
construction above is modified so that a candidate value for the common information is given as a common random string; it is arranged that the execution is rejected by the predicate if the common information in the common random string is not correct. Also, in this case, we can no more choose an arbitrary transcript (even after fixing the common information); instead we argue that there is a “good” transcript for each value of common information, that would let us still obtain a similar non-triviality guarantee as in the case of common-information-free f.
We give an analogous result for to
, but using OT correlations. Here, each party locally checks if their input is consistent with a given transcript (determined by common randomness) and their share of OT correlations. Here also, for the sake of security, even if it is consistent, the party aborts with a carefully calibrated probability.
In both the above transformations from a secure 2PC protocol for f to a
, an important consideration is the probability of not aborting. To establish our connection with OT-complexity, we need a
-
where
is directly related to the number of OTs used in
, and not the length of the transcripts. One element in establishing such a
is an analysis of the given 2PC protocol when it is run with correlations drawn using a wrong distribution. We refer the reader to Theorem 11 and its proof for further details.
Invertible Rank. The conditions of a (from a possibly randomized function to a possible randomized predicate) without correlations can be captured purely in linear algebraic terms, leading to the definition of a new linear-algebraic complexity measure for functions.
The correctness condition for -
of f to
has the form
, where M and P are matrices that encode the function f and the predicate
in a natural way. If P were to be replaced with the identity matrix, and
by 0, the smallest possible size of P would correspond to the rank of M. In defining invertible rank with respect to a finite matrix
, we let
and ask for the smallest k possible, for a given
(thus the invertible rank is analogous to log-rank). Also, A, B are required to satisfy natural stochasticity properties so that they correspond to valid probabilistic actions.
In addition to the correctness guarantees, we also incorporate the security guarantees of into our complexity measure. This takes the form of the existence of simulators, which are again captured using linear transformations. The “invertibility” in the term invertible rank refers to the existence of such simulators.
We remark that linear-algebraic complexity measures have been prevalent in studying the computational or communication complexity of functions – matrix rigidity [Val77], sign rank [PS86], the “rank measure” of Razborov [Raz90], approximate rank [ALSV13] and probabilistic rank [AW17] have all led to important advances in our understanding of functions. In particular, Razborov’s rank measure was instrumental in establishing exponential lower bounds for linear secret-sharing schemes [RPRC16, PR17]. Invertible rank provides a new linear-algebraic complexity measure that is closely related to secure two-party computation, via our results on ; this is in contrast with the prior measures which were motivated by computational complexity, (insecure) two-party communication complexity, or secret-sharing (which does not address the issues of secure two-party computation),
Organization of the Rest of the Paper
We present the formal definitions of ,
and
in Sect. 2. Before continuing to our results, we summarize relevant background information in Sect. 3. The basic feasibility results in our model are presented in Sect. 4. The connections with lower bounds are given in Sect. 5, and the upper bounds on CDS, PSM and 2PC are given in Sect. 6. Several proof details are given in in the full version [NPP20].
2 Defining Zero-Communication Secure Reductions
We refer the reader to Fig. 1, which illustrates the random variables involved in a zero communication reduction from a functionality to a predicate
, using a correlation
. The reduction is specified as a pair of randomized algorithms
executed by two parties, Alice and Bob. Alice, given input x and her part of the correlation R, samples
, where A is her proposed output for the functionality f, and U is her input to
. Similarly, Bob computes
. The non-triviality guarantee is that
with a positive probability
, and correctness guarantee is that conditioned on
, the outputs of Alice and Bob are almost always correct.
We shall define three notions of such a reduction (,
and
) depending on the level of security implied (no security, weak security and standard security).
Notation: Below, denotes the distribution of a random variable R,
stands for
, where R, S are random variables, and
denotes the probability that a probabilistic process
outputs
on input
.
denotes the statistical difference between two distributions
. (Further notes on notation are given in Sect. 3.)
Let and
be randomized functions, and let
be a distribution over
. For any
, a
-zero-communication reduction (
) from f to the predicate
using
is a pair of probabilistic algorithms
and
such that the following holds.


Non-Triviality:
,
.
Correctness:
,
In other words, in a , Alice and Bob compute “candidate outputs” a and b, as well as two messages u and v, respectively, such that correctness (i.e.,
) is required only when
“accepts” (u, v). We allow Alice and Bob to coordinate their actions using the output of
. We also allow a small error probability of
. To be non-trivial, we require a lower bound
on the probability of
accepting. Note that as
increases from 0 to
, the non-triviality constraint gets relaxed.
Next, we add a weak security condition to as follows: Consider an “eavesdropper” who gets to observe whether the predicate
accepts or not. We require that this reveals (almost) no information about the inputs (x, y) to the eavesdropper. Technically, we require the probability of accepting to remain within a multiplicative factor of
as the inputs are changed.
For any ,
, a
-
from f to
using
is a
-weakly secure zero-communication reduction (
) if the following condition holds.
- Weak Security:
,
where D is the random variable corresponding to the output of, as defined in Definition 1.
Finally, we present our strongest notion of security, . The definition corresponds to security against passive corruption of one of Alice and Bob in a secure computation protocol (using
and
as trusted parties) that realizes the following functionality
(for some
): After computing
, with probability
the functionality sends the respective outputs to the two parties (“accepting” case); with the remaining probability, it sends the output only to the corrupt party. The definition of
involves a refinement not present in (statistical) security of secure computation: We require that even conditioned on the execution “accepting” – which could occur with a negligible probability – security holds. The formal definition of
includes the correctness and (weak) security properties of a
, and further requires the existence of two simulators
(for corrupt Alice) and
(for corrupt Bob), with separate conditions for the accepting and non-accepting cases. We formalize these conditions below.
For any ,
, a
-
from f to
using
is a
-secure zero-communication reduction (
) if the following conditions hold.
Security:
, and a, b s.t.






Above, (2) and (4) correspond to corrupting Alice, with the first one being the accepting case. (The other two equations correspond to corrupting Bob.) Note that in these cases the adversary’s view consists of (R, U), in addition to the input x and the boolean variable D (accepting or not), which are given to the environment as well. In the accepting case, the environment also observes the outputs (a, b). In either case, is given
as inputs; in the accepting case, we naturally require that the simulated view has the same output a as
given to
.
Special Cases. A few special cases of the above definitions will be of interest, and we use specialized notation for them. A perfect reduction guarantees perfect correctness and security, wherein . In this case instead of
-
(
,
), we simply say
-
(
,
).




We would consider perfect of a functionality f to a predicate
using no correlation. This notion of reduction still suffices for many of our connections (e.g., to lower bounds on OT complexity), while being simpler to analyze. A correlation
which only offers a common random string to the two parties is denoted as
. Indeed, for
and
,
is the only non-trivial correlation one may consider.
3 Preliminaries for the Remainder
Before proceeding further, we present background material and some notation needed for the remainder of the paper.
Probability Notation. The probability assigned by a distribution D (or a probabilistic process D) to a value x is denoted as , or simply
, when the distribution is understood. We write
to denote sampling a value according to the distribution D. Given two distributions
, we write
to denote the statistical difference (a.k.a. total variation distance) between the two.
For a random variable X, we write to denote the probability distribution associated with it. We write
(or simply
, letting the lower case y signify that it is the value of the random variable Y), to denote the distribution of a random variable X, conditioned on the value y for a random variable Y that is jointly distributed with X.
Functionalities. We denote a 2-party functionality as , to indicate that the functionality accepts an input
from Alice and
from Bob, computes
, and sends a to Alice and b to Bob. We allow f to be a randomized function too, in which case f(x, y) stands for a probability distribution over
, for each
; for readability, we write
instead of
to denote the probability of f(x, y) outputting (a, b). We write
, where
and
are such that (making the randomness
used by f explicit),
. If
is a constant function, we identify f with
and refer to it as a one-sided functionality. Similarly, if
, then we may use f to refer to either of these functions; in this case, we refer to f as a symmetric functionality.
Correlations. A correlation over a domain
is the same as a 2-party randomized functionality
(i.e., a functionality with no inputs).
is the support of
. We say that a correlation is regular if (1)
,
, (2)
,
, and (3)
,
. Common examples of regular correlations are those corresponding to Oblivious Transfer (OT) and Oblivious Linear Function Evaluation (OLE), and their n-fold repetitions. Another regular correlation of interest is the common randomness correlation
, in which
if only if
.
We denote t independent copies of a correlation by
. It will be convenient to denote
for an unspecified t by
.
Predicates. We shall also refer to predicates of the form . Again, as in the case of functionalities above, a predicate could be randomized. Given a correlation
over
, we define the predicate
so that
iff
. The predicate
is defined identically, except that we allow the domain of
to be
where
is a symbol not in
.
It will also be convenient to define .
Evaluation Graph . For a functionality f, it is useful to define a bipartite graph
[MPR13].
For a randomized functionality , the weighted graph
is defined as the bipartite graph on vertices
with weight on edge
.
Note that for deterministic f, the graph is unweighted (all edges have weight 1 or 0). If f is a correlation, with no inputs, the nodes in the graph
can be identified with
.
In an evaluation graph , a connected component is a set of edges that form a connected component in the unweighted graph consisting only of edges in
with positive weight. A function f is said to be common-information-free if all the edges in
belong to the same connected component.
For each connected component C in , we define
as the set
;
is defined analogously. Also, we define
.
For a correlation , we will denote by
the restriction of
to the connected component C. That is,
for
and 0 otherwise.
A simple functionality [MPR12, MPR13] is one whose graph consists of connected components that are all product graphs. For deterministic functionalities, it can be defined as follows:
A deterministic functionality with domain
is a simple functionality if there exist no
and
such that
and
but either
or
.
Simple functionalities satisfy the following (see [MPR12]).
If is a simple deterministic functionality, then there exists a partition
into k rectangles
for some number k such that the following properties are satisfied.
- 1.
For each
, for any
, whenever
,
. Similarly, for each
whenever
,
.
- 2.
For distinct
, if
(in this case
and
are disjoint), if
and
and
then
.
- 3.
For distinct
, if
, if
and
and
then
.
Secure Protocols and OT Complexity. A standard (interactive) 2-party protocol using a correlation , denoted as
, consists of a pair of computationally unbounded randomized parties Alice and Bob. We write
to denote the outcome of an execution of
on inputs (x, y), as follows: Sample
, and give r to Alice and s to Bob. Then they exchange messages to (probabilistically) generate a transcript q. Finally, Alice samples a based on her view (x, r, q) and outputs it; similarly, Bob outputs b based on (y, s, q).
We are interested in passive secure protocols for computing a 2-party function , possibly with a statistical error. See the full version [NPP20] for a formal definition of secure 2-party computation protocols that use correlations.
It is well-known that there are correlations – like randomized oblivious transfer (OT) correlation – that can be used to perfectly securely compute any function f using its circuit representation (see [Gol04]) or sometimes more efficiently using its truth table [BIKK14]. The OT-complexity of a functionality f is the smallest number of independent instances of OT-correlations needed by a perfectly secure 2-party protocol that securely realizes f against passive adversaries.

![$$\rho : \mathcal {X} \times \mathcal {R} \times \mathcal {Q} \rightarrow [0, 1]$$](../images/508076_1_En_10_Chapter/508076_1_En_10_Chapter_TeX_IEq434.png)
![$$\sigma : \mathcal {Y} \times \mathcal {S} \times \mathcal {Q} \rightarrow [0, 1]$$](../images/508076_1_En_10_Chapter/508076_1_En_10_Chapter_TeX_IEq435.png)










We remark that the only property regarding the nature of a protocol we shall need in our results is the transcript factorization property. As such, our results stated for protocols in Theorems 11 and 12 are applicable more broadly to “pseudo protocols” which are distributions over transcripts satisfying (8), without necessarily being realizable using protocols [PP16].
The following claim about protocols (which holds for pseudo protocols as well) would be useful in our proofs. The proof for the same is provided in the full version [NPP20].
Let be a perfectly secure protocol for computing a deterministic functionality f. For any two edges
and
in the same connected component of
, for all transcripts
, it holds that
.
Private Simultaneous Messages & Conditional Disclosure of Secrets.
We refer to the full version [NPP20] for a detailed description of private simultaneous messages (PSM) and conditional disclosure of secrets (CDS). In this paper, we use statistically secure variants of both these models of secure computation. An -secure PSM protocol (represented as
-PSM) guarantees that for every input (x, y), Carol recovers f(x, y) with at least
probability and that whenever f evaluates to the same value for two different inputs, Carol’s view for these inputs are at most
far in statistical distance. An
-secure CDS protocol (represented as
-CDS) is defined similarly.
4 Feasibility Results
In this section, we present several feasibility and infeasibility results for our various models. For want of space, we defer the proofs of these results to the full version [NPP20]. Note that all our feasibility results are backward compatible and all the impossibility results are forward compatible. That is, a implies a
which in turn implies a
, whereas, impossibility of a
implies impossibility of
which implies impossibility of
. We define a simple predicate of interest,
, which refers to the AND predicate. The following show that any functionality has a
with
, i.e., perfect correctness and security, to appropriate predicates using no correlation.
For every (possibly randomized) functionality , there exists a predicate
such that f has a perfect
-
to
using no correlation.
Following theorem establishes that any functionality has a perfect to
using an appropriate correlation.
For every deterministic functionality , there exists a correlation
such that f has a perfect
-
to
using
.
We next look at the computational power of the predicate in the context of reductions using common randomness (
). As we shall see in Lemma 3, every deterministic functionality has a perfect
to
. In contrast, the next theorem shows that only simple functionalities have perfect
to
using common randomness.
A deterministic functionality f has a perfect -
to
using
, for some
, if and only if it is simple.
An even simpler predicate refers to the XOR predicate. The following theorem shows that it has very limited power and even the AND function does not have a reduction to
.








- 1.
For all
,
if and only if
or
.
- 2.
For all
,
if and only if
or
.






For any correlation there exists a predicate
such that
has a perfect
-
to
using no correlation, where
. Further, if
has a perfect
-
to any predicate
using no correlation, then
.
5 Lower Bounds via 

First show that an upper bound on that complexity measure implies an upper bound on a complexity measure related to
.
Then showing a lower bound for
implies the desired lower bound.
The complexity measure related to that we use is what we call the invertible rank of a matrix associated with the function. In Sect. 5.2, we upper bound invertible rank by OT complexity. While invertible rank of a matrix (with respect to another matrix) is easy to define, establishing super-linear lower bounds for it is presumably difficult (circuit complexity lower bounds being a barrier). But currently, even showing the existence of functions whose matrices have super-linear invertible rank remains open. One may wonder if invertible rank would turn out to not have interesting lower bounds at all. In Sect. 5.3, we present some evidence that invertible rank has non-trivial lower bounds, as it is an upper bound on communication complexity, and use it to recover the best known lower bounds on OT complexity.
5.1 Linear Algebraic Characterization of 
Conditions for naturally yield a linear algebraic characterization. In this section, we focus on perfect
using no correlation (i.e.,
-
).





![$$[M]_{\rhd } $$](../images/508076_1_En_10_Chapter/508076_1_En_10_Chapter_TeX_IEq539.png)

![$$[M]_{\lhd } $$](../images/508076_1_En_10_Chapter/508076_1_En_10_Chapter_TeX_IEq541.png)



![$$\begin{aligned}{}[M]_{\rhd } (a, (b, a')) = [M]_{\lhd } (a, (a', b))&= {\left\{ \begin{array}{ll} M(a, b) &{}\text { if } a = a',\\ 0 &{}\text { otherwise.} \end{array}\right. } \end{aligned}$$](../images/508076_1_En_10_Chapter/508076_1_En_10_Chapter_TeX_Equ17.png)







Though we shall define invertible rank generally for a matrix (w.r.t. another matrix), our motivation is to use it as a complexity measure of a possibly randomized function (w.r.t. a predicate). Towards this, we represent a function f using a matrix , and also define a 0–1 matrix
for a predicate
.











Given a matrix P indexed by , the tensor-power
is a matrix indexed by
, where
. We note that for the k-fold conjunction
of a predicate
, we have
.

































![$$A^\intercal \cdot Q \cdot [B]_{\rhd } $$](../images/508076_1_En_10_Chapter/508076_1_En_10_Chapter_TeX_IEq603.png)
![$$[B]_{\rhd }$$](../images/508076_1_En_10_Chapter/508076_1_En_10_Chapter_TeX_IEq604.png)




![$$2^{-\mu } \, M_{f} \cdot [H]_{\lhd } $$](../images/508076_1_En_10_Chapter/508076_1_En_10_Chapter_TeX_IEq609.png)
![$$[H]_{\lhd }$$](../images/508076_1_En_10_Chapter/508076_1_En_10_Chapter_TeX_IEq610.png)

Thus the linear algebraic conditions in the definition below correspond to the existence of a -
from f to
. The invertible rank of
w.r.t.
corresponds to minimizing
and k simultaneously (or more concretely, their sum).






![$$\begin{aligned} _{\rhd } ^\intercal \cdot P^{\otimes {k}} \cdot B&= 2^{-\mu } \, [G]_{\lhd } ^\intercal \cdot M, \end{aligned}$$](../images/508076_1_En_10_Chapter/508076_1_En_10_Chapter_TeX_Equ11.png)
![$$\begin{aligned} A^\intercal \cdot P^{\otimes {k}} \cdot [B]_{\rhd }&= 2^{-\mu } \, M \cdot [H]_{\lhd }, \end{aligned}$$](../images/508076_1_En_10_Chapter/508076_1_En_10_Chapter_TeX_Equ12.png)







As discussed above, a -
from f to
(using no correlation) corresponds to the existence of matrices A, B, G, H that satisfy the conditions (10)–(12). Then the invertible rank of
w.r.t.
would be upper bounded by
. This is captured in the following theorem (proven in the full version [NPP20].
For a (possibly randomized) functionality and a predicate
, f has a perfect
-
to
using no correlation if and only if
. Further, if f has a perfect
-
to
using no correlation then
.


![$$\begin{aligned} P_{\mathsf {OT}} = \left[ \begin{matrix} 1&{}0&{}0&{}1 \\ 1&{}1&{}0&{}0 \\ 0&{}1&{}1&{}0 \\ 0&{}0&{}1&{}1 \end{matrix} \right] \end{aligned}$$](../images/508076_1_En_10_Chapter/508076_1_En_10_Chapter_TeX_Equ23.png)

(Invertible Rank Conjecture). There exists a family of functions such that
.
Proving this conjecture, for a family of common-information-free functions, would imply super-linear lower bounds for OT complexity, thanks to Corollary 1 in the sequel. Finding such an explicit family would be a major breakthrough, as it would give a function family with super-linear circuit complexity.
On the other hand, a weakly exponential upper bound of exists on invertible rank of n-bit input functions, as implied by an upper bound on OT-complexity [BIKK14], re-instantiated using the 2-server PIR protocols of [DG16].
The following corollary of Theorems 10 and 3 gives a purely linear algebraic problem – namely, lower bounding invertible rank – that can yield OT complexity lower bounds.
If a deterministic common-information-free functionality has OT-complexity m, then
.
5.2
vs. OT Complexity
In this section we prove Theorem 3 and its extensions, that show that lower bounds translate to lower bounds for OT-complexity, or more generally, 2PC complexity w.r.t. any regular correlation
(see Sect. 3). Our main result in this section is Theorem 11, where we transform a perfectly secure 2PC protocol for a general deterministic functionality f using a regular correlation
, into a
from f to the predicate
. (Recall from Sect. 3 that
is a predicate that evaluates to 1 on inputs
; it allows u or v to be the symbol
, in which case it evaluates to 0.) Theorem 3 follows from this result when
is taken as
.
If protocol using regular correlation
distributed over
computes a deterministic functionality
with perfect security, then f has a
-
to
using
, where
.
Additionally, if f is common-information-free, then f has a -
to
using no correlation, where
.
A proof of this theorem is provided in the full version [NPP20]. Theorem 3 is obtained by specializing the above result to the correlation of .
[Proof of Theorem 3] A single instance of is a regular correlation with its support being a 1/2 fraction of its entire domain (see the matrix
). Hence m independent OTs form a regular correlation
distributed over
such that
. Invoking Theorem 11 for
, we get a
-
from f to
using
, where
. (If f is common-information-free, i.e., it has a single connected component in
, then
is not needed and
.)
Recall that the domain of contains a special symbol
, in addition to 2m bit long strings that are in the support of
. It is not hard to see that we can implement the functionality of this symbol
using an additional instance of
. That is, every (u, v) in the domain of
can be encoded as
in the domain of
so that
. Hence, f has a
-
to
using a
(or, if f is common-information-free, using no correlation).
We also prove Theorem 12, which is a “dual version” of Theorem 11: Here, when the protocol is transformed into a
, instead of
transforming into the predicate, it remains a correlation that is used by the reduction; this reduction is to the constant-sized predicate
.
Suppose is a perfectly secure protocol for a deterministic functionality
, that uses a regular correlation
over
. Then f has a
-
to
using
, where
.
The reduction and its analysis is similar to that in Theorem 11. A detailed proof is provided in the full version [NPP20].
5.3 Communication Complexity vs. 
In this section, we lower bound the domain size of a predicate to which a functionality has a non-trivial
. In combination with Theorem 11, which provides an upper bound on the domain size of the predicate in terms of OT complexity, we obtain a lower bound on OT complexity in terms of (one-way) communication complexity, reproducing a result of [BM04].
More precisely, the connection between the domain size of and the communication complexity of f is captured below. To be able to base the lower bound on the one-way communication complexity of f, we consider a one-sided functionality f.
Let be a deterministic one-sided functionality such that for all
there exists some x such that
. For any predicate
, and
, f has a perfect
-
to
using no correlation only if
.
We will show that if f has a perfect -
to
using no correlation, then there exists a one-way communication protocol for computing
, where the message is an element of the set
. By our assumption, no two inputs of Bob are equivalent w.r.t.
. Hence in a one-way communication protocol for
, Bob must communicate his exact input to Alice. This implies that
.
Suppose is a
-
from f to the predicate
using no correlation. Consider the jointly distributed random variables (U, A, V, D) (as described in Fig. 1), conditioned on input (x, y). Since
for all (x, y), the security condition (3) (for
) guarantees that
, for all x, y, v.













If f is a deterministic functionality with one-sided output, such that for all there exists some x such that
, then its OT complexity is lower bounded by its one-way computation complexity.
6 Upper Bounds
In this section, we show that provides a new path to protocols in different secure computation models. In Sect. 6.1, we obtain upper bounds on CDS, PSM and 2PC, in terms of the communication complexity of the functions being computed, followed by improved upper bounds in Sect. 6.2 which leverage
and its connections to information complexity.
6.1 Upper Bounds Using Communication Complexity

For a deterministic function , a k-tiling is the partition of
into k monochromatic rectangles – i.e., sets
such that
and
s.t.,
,
. (Then, abusing the notation, we write
to denote
.) We refer to the smallest number k such that f has a k-tiling, as the tiling number of f. The first step above is standard: Communication complexity of
implies a protocol with at most
transcripts, and the inputs consistent with each transcript corresponds to a monochromatic tile.
The last step requires a (non-trivial) perfect deterministic from f to (say)
using
. If
is the length of the common random string supplied by
, the resulting CDS, PSM or 2PC (in the OT-hybrid model) protocols for f, will have
communication complexity (as well as OT complexity, in the case of 2PC). Further, we show that such a
can be readily constructed from a tiling for f, with
tiles. Lemma 3 summarizes the upperbounds we obtain using such constructions under different secure computation models. The detailed construction of all the protocols are relegated to the full version [NPP20].
For a deterministic function , if f admits a k-tiling, then the following exist.
- 1.
A perfectly secure CDS for predicate f (when
) with O(k) communication.
- 2.
A perfectly secure PSM for f with
communication.
- 3.
A perfectly secure 2-party symmetric secure function evaluation protocol for f, against passive corruption, with
communication and OT invocations.
In our proof of the above lemma, we show a -
for any deterministic functionality
to
(with
where
and
are the tiling numbers of
and
, respectively). This is in contrast with Theorem 7 where we showed that only simple functions have a
-
to
for any
.
Lemma 3, combined with the fact that a communication complexity of implies a tiling with at most
tiles, proves Theorem 1.
6.2 Upper Bounds Using Information Complexity




6.2.1 Information Complexity and Relaxed Partition
First, we define information complexity and relaxed partition bound.







![$$\mathsf {error}_{X,Y}^{f} ({\Uppi }) = \mathsf {Pr} [A \ne f(X, Y) \text { or } B \ne f(X, Y)]$$](../images/508076_1_En_10_Chapter/508076_1_En_10_Chapter_TeX_IEq827.png)






![$$w(R, z) \in [0, 1]$$](../images/508076_1_En_10_Chapter/508076_1_En_10_Chapter_TeX_IEq833.png)





The following proposition restates a theorem due to Kerenidis et al. [KLL+15] that gives a connection between relaxed partition bound and information complexity. The statement has been modified for our purposes.
See the full version [NPP20] for details on the modification of [KLL+15, Theorem 1.1] which gives the above form. Interestingly, this result is established in [KLL+15] via a notion of zero communication protocols, which is similar to (albeit more restricted than) our notion of . This is not surprising given the close connection between relaxed partition bound and
that we establish below. The following lemma is proved in the full version [NPP20].
For any , functionality (f, f) has a
-
to
using
, where
.
6.2.2 From
to Secure Computation
In this section we use to construct protocols for statistically secure PSM, CDS and secure 2PC. To accomplish this, the parties carry out the
protocol n times, for n sufficiently large as to guarantee (except with negligible probability) that there will be at least one instance which would accept. Amongst these n executions, a selector function selects the candidate outputs corresponding to a reduction in which the predicate is accepted, without revealing the execution itself. For this we use the notion of selector functions, which we next define. We conclude this section with Theorem 13, which formally states and proves the claim in Theorem 2.
For a predicate , finite set
and
, we define selector function
as follows.







Selector function for the predicate is of special interest. The following lemma shows that for
and finite set
, there is an efficient PSM protocol and a secure 2-party protocol that compute
, when Alice and Bob get inputs
and
, respectively. When
, there is an efficient protocol for CDS with predicate
. We use this to show upper bounds for communication complexity of statistically secure PSM and CDS protocols, and for OT complexity and communication complexity of statistically secure 2PC.
The following statements hold for the predicate ,
and a finite set
.
- (i).
has perfect PSM with communication complexity
.
- (ii).
CDS for the predicate
and domain
has communication complexity O(t).
- (iii).
The functionality
has a perfectly secure 2PC protocol with communication complexity and OT complexity
.
Since there are efficient PSM protocols for branching programs, the first statement is shown by providing a small branching program for . Statements (ii) and (iii) are proved by showing that
and
, respectively, have small formulas [FKN94], [IK97]. The detailed proof is provided in the full version [NPP20].
We now proceed to give constructions for statistically secure PSM, CDS and 2PC using . All the three constructions follow the same framework. We start with
of a functionality f to predicate
. The
is executed (independently) sufficiently many times to guarantee that at least one of the executions satisfy the predicate but with negligible probability. The output of a reduction in which the predicate was accepted is securely chosen using the selector function for the predicate. Following lemma summarizes the upper bounds we obtain for statistically secure PSM, CDS and 2PC via. constructions using
. Detailed proof of the lemma is provided in the full version [NPP20].
Let be a deterministic function and
be a constant function with the same domain If
has a
-
to
using
, then for
, we obtain the following upper bound.
- 1.
The
-PSM complexity of f is at most the PSM complexity of the selector function
.
- 2.
The communication complexity of
-CDS for predicate f (when
) is at most that of CDS for predicate
.
- 3.
The communication complexity (respectively, OT complexity) of
-secure computation of the functionality (f, f) is at most the communication complexity (respectively, OT complexity) of perfectly secure computation of the symmetric functionality
.



- 1.
The communication complexity of
-PSM of f is
.
- 2.
The communication complexity of
-CDS for predicate f (when
) and domain
is O(K).
- 3.
The OT complexity and communication complexity of
-secure computation of f is
.














This research was supported by Ministry of Science and Technology, Israel and Department of Science and Technology, Government of India, under Joint Indo-Israel Project DST/INT/ISR/P-16/2017. V. Narayanan and V. Prabhakaran were supported by the Department of Atomic Energy, Government of India, under project no. RTI4001; M. Prabhakaran was supported by the Dept. of Science and Technology, India via the Ramanujan Fellowship; V. Narayanan acknowledges the discussions with Tulasi Mohan Molli on various topics in communication complexity.