Larger Corner-Free Sets from Better NOF Exactly- Protocols
- School of Computer Science and Engineering, The Hebrew University of Jerusalem
- More about Nati Linial
- Department of Computer Science, The Academic College of Tel-Aviv-Yaffo
- More about Adi Shraibman
Editorial introduction
Larger corner-free sets from better NOF exactly- protocols, Discrete Analysis 2021:19, 9 pp.
If is an Abelian group, then a corner in is a subset of the form with . The corners theorem of Ajtai and Szemerédi states that for every there exists such that every subset of density at least contains a corner with . This result occupies a central place in additive combinatorics, because it belongs to a hierarchy of density statements (or statements that can be reformulated as density statements) of increasing generality, about which our knowledge is still incomplete.
At one end of this hierarchy is Roth’s theorem, which states that for every there exists such that every subset of density at least contains an arithmetic progression of length 3. To deduce this from the corners theorem one defines a subset
to be .
At the other end of the hierarchy is the triangle removal lemma, which is equivalent to the statement that for every there exists such that if is a tripartite linear 3-uniform hypergraph with vertices in each vertex class and at least edges, then it contains a subset of the form , where and . (A 3-uniform hypergraph is called linear if no two edges share more than one vertex, which implies that it has at most edges.) To see that this implies the corners theorem, one can take a dense subset and define to be the set of all such that . Then is linear, and a triple in would come from a triple in such that , which is therefore a corner (with ).
While these results are known qualitatively, for each of them there are huge gaps between the best known upper and lower bounds. For Roth’s theorem, the best known upper bound on how large must be is of the form for a small positive constant : this is a recent breakthrough of Thomas Bloom and Olof Sisask. For the corners theorem Ilya Shkredov has shown that there is an upper bound of for some constant . And for the triangle removal lemma the bound is a tower of height proportional to : this was shown by Jacob Fox.
In the opposite direction, the best known lower bound for Roth’s theorem, which comes from a 1947 construction of Behrend, is . One might think that because the corners theorem is more general and the triangle removal lemma considerably more general, that there would be better constructions for these problems, but embarrassingly that is not the case: we do not know how to do much better than simply translating the Behrend construction into counterexamples for those two problems in the manner described above.
This paper makes a small dent in this general problem, by giving a construction for the corners theorem that improves on the constant above: if logarithms are taken to base 2, then previously it was , but now it is brought down to , which is an improvement from roughly to .
While this is only a small improvement, it is the first example of a lower bound construction that works for corners but not for Roth’s theorem. Perhaps more interestingly, the authors arrived at it from the theory of communication complexity, which is of central importance in theoretical computer science and itself a source of fascinating open problems.
Shortly after the preprint appeared, Ben Green found a purely combinatorial version of the argument that achieved a slightly better bound still. The construction can be thought of as Behrend’s construction with some extra efficiencies. However, it is quite possible that those efficiencies would have remained unnoticed for a long time without the communication complexity perspective that led to their discovery, and there are reasons to hope that communication complexity will lead to more insights in future.
Let us briefly see what communication complexity is and how it relates to the corners problem. In general, the idea behind communication complexity is that players each have some partial information about a bit string and they wish to compute some function of while exchanging as little information as possible. An example that is relevant here is where there are three positive integers , each at most , and if and 0 otherwise. There are three players, and each player gets to see a different pair of the numbers and . (This type of set-up is sometimes called the “number on the forehead model”: one can imagine each player having a number written on their forehead so that the other players can see it but they can’t.) A protocol can be defined more formally as follows. The first player writes down a bit, which is allowed to depend on the two numbers they can see. Then at each subsequent stage the player whose turn it is writes down a bit, which can depend on the numbers that player sees, together with the bits that have been written down. The game ends when all three players know whether , and the object is to achieve this in as few rounds as possible.
A special case of a lemma of Chandra, Furst and Lipton (Lemma 3.1 of this paper) states that if , then any protocol that behaves identically for the triples and also behaves in the same way for . Indeed, if it is the turn of the player with on their forehead, they see and and a certain sequence of bits, but by induction they would see and and the same sequence of bits if they had the number on their forehead. It follows that if a protocol is to distinguish between triples that add up to and triples that do not, it must not behave in the same way for three triples and that all add up to . Since the number of possible behaviours of a protocol is exponential in the number of rounds, the minimum length of a protocol that always works is at least logarithmic in the number of colours needed to colour if no colour class is allowed to contain a subset of the form . But as we have seen, such subsets are easily transformed into corners, so an upper bound on the maximum density of a corner-free set translates into a lower bound for the communication complexity of the sums-to- problem. The implication can also be shown to go the other way, so this link between communication complexity and additive combinatorics is a close one that is beginning to bear fruit in interesting ways.
The work of this paper is presented by one of the authors in the following talk.