Portland, ME 04103, USA IL 60637, USA. Abstract. Buhrman and Torenvliet created an oracle relative to which

Size: px
Start display at page:

Download "Portland, ME 04103, USA IL 60637, USA. Abstract. Buhrman and Torenvliet created an oracle relative to which"

Transcription

1 Beyond P NP = NEXP Stephen A. Fenner 1? and Lance J. Fortnow 2?? 1 University of Southern Maine, Department of Computer Science 96 Falmouth St., Portland, ME 04103, USA fenner@usm.maine.edu, Fax: (207) University of Chicago, Department of Computer Science 1100 E. 58th St., Chicago, IL 60637, USA fortnow@cs.uchicago.edu, Fax: (312) Abstract. Buhrman and Torenvliet created an oracle relative to which P NP = NEXP and thus P NP = P NEXP. Their proof uses a delicate nite injury argument that leads to a nonrecursive oracle. We simplify their proof removing the injury to create a recursive oracle making P NP = NEXP. In addition, in our construction we can make P = UP = NP \ conp. This leads to the curious situation where LOW(NP) = P but LOW(P NP ) = NEXP, and the complete p m- degree for P NP collapses to a p-isomorphism type. 1 Introduction In 1978, Seiferas, Fischer and Meyer [SFM78] showed a very strong separation theorem for nondeterministic time: For time constructible t 1 (n) and t 2 (n), if t 1 (n + 1) = o(t 2 (n)) then NTIME(t 1 (n)) does not contain NTIME(t 2 (n)). Thus we have a huge gap between nondeterministic polynomial time (NP) and nondeterministic exponential time (NEXP). We would also expect then a separation between P NP and P NEXP. Indeed, we have some evidence for that direction: Mocas [Moc94] (improving upon work of Fu, Li an Zhong [FLZ94]) showed that for any xed c, NEXP is not contained in P NP if the polynomial-time machine can only ask n c queries to the NP oracle. Recently, Buhrman and Torenvliet [BT94] showed the existence of an oracle relative to which P NP = NEXP and thus P NP = P NEXP. This says that we can not prove a separation between P NP and P NEXP with relativizable techniques. They prove this result using a dicult nite injury argument where injuries may cascade through the oracle by more than any recursive bound. Their \construction" thus does not lead to a recursive oracle. In this paper, we simplify the Buhrman and Torenvliet proof. We use their proof as a starting block but remove the nite injury and replace it with an exponential (and thus recursive) search. Thus we end up with a recursive oracle relative to which P NP = NEXP.? Partially Supported by NSF Grant CCR ?? Partially Supported by NSF Grant CCR

2 We use a tree-based construction (see [Soa87, Chapter XIV]) where if we can get an injury from one leaf in a tree we can then throw away that leaf and start using the next one. We arrange our tree so that we have more leaves than injuries. Also, we can combine our construction with techniques developed by Racko [Rac82], Hartmanis and Hemachandra [HH91] and Blum and Impagliazzo [BI87] to also get P = UP = NP \ conp while also having P NP = NEXP relative to a recursive oracle. We eliminate machines that do not categorically accept on at most one path by forcing the acceptance on one of the leaves of our tree and then using a future leaf for encoding. The relativized world we create has two interesting properties. The rst is about low sets. The low sets of a class C consist of those oracles A such that C A = C. Essentially the low sets give no help to the class C. Relative to the oracle we construct, we get a surprising relationship between the low sets for NP and the low sets for P NP : The rst consists of exactly those languages in P while the second consists of those languages in NEXP. The second property of our relativized world is that the complete p m-degree for P NP collapses to a p-isomorphism type. That is, all P NP -complete sets under polynomial-time many-one reductions are polynomial-time isomorphic. This advances a program for getting complete degrees to collapse: if C NEXP is a class with complete sets, then one can make all C-complete sets p-isomorphic in a relativized world by setting P = UP and C = EXP. Homer and Selman [HS92] were able to do this for C = p 2, and our present oracle works for C = P NP. An oracle for C = NP would arm the Isomorphism Conjecture [BH77]. Even though oracles making the Conjecture true are known [FFK92], it is still an interesting open question whether there is an oracle relative to which P = UP and NP = EXP. 2 Notation and Denitions We let = f0; 1g and identify with the natural numbers 0; 1; 2; : : : in the usual way. We will sometimes use the divider symbol, \#", and in fact, our oracles will always be languages over the alphabet f0; 1; #g. Inputs to machines will always be taken as strings in, however. For any n 0, we let n (resp. f0; 1; #g n ) be the set of strings in (resp. f0; 1; #g ) of length n. We order strings in n or f0; 1; #g n lexicographically according to the order # < 0 < 1 on the symbols. We say \lex less than" for \lexicographically less than." We say a string w extends a string v if v is a prex of w. We will also deal with partial characteristic functions f0; 1; #g! f0; 1g with nite domain, which usually represent the portion of some oracle we are committed to so far. (We will build our oracles by nite extension at each stage.) We use lower-case Greek letters to denote these nite functions. We identify a language A over f0; 1; #g with its (total) characteristic function f0; 1; #g! f0; 1g. When dealing with partial functions, we use the relation \extends" in the usual functional sense.

3 Our notation for machines is standard. See, for example, [HU79]. The only peculiarity in the paper is when a nondeterministic oracle Turing machine M accesses a partial characteristic function as its oracle. We say that M (x) has an accepting path p if and only if p is an accepting path of M on input x where all queries along p are in domain() and are answered according to. M (x) accepts if it has some accepting path (even if other paths make queries outside domain()). 3 Main Results Theorem1. There is a recursive oracle A such that P NPA = NEXP A. Proof. Fix a nondeterministic oracle machine M that accepts some NEXP B - complete set for all oracles B. We may assume without loss of generality that M asks at most 2 n queries along any path, where n is the length of the input. We dene a relativized language L B as follows: consider any x 2 of length n. Let C x be the set of all strings of the form w 0 #w 1 # #w n #x#y; such that jw i j = i + 1 for all i n, and jyj = 2n + 3. (We identify each w i with a number in the range from 0 to 2 i+1? 1 in the usual way.) For any oracle B, we dene x 2 L B if and only if C x \ B 6= ; and the rightmost bit of the lexicographically maximum element of C x \ B is 1. We call C x the coding region of x. We can determine whether a given x is in L B by binary search, asking questions of the form, \Is there an element of C x \ B which is lex no less than z?" These questions are in NP B and we only need ask polynomially many of them, so it follows that L B 2 P NPB for all B. Our goal, then, is to construct a recursive A such that L A = L(M A ). We construct A in stages 0; 1; : : :. Currently, all the work will be done in the even stages; the odd stages will be used later in the proof of Theorem 2. First some notation: if and are nite characteristic functions and w is a string, then we say that is a w-extension of if extends and for all strings z 62 domain(), if (z) = 1 then z extends w. The nite function, below, represents the committed portion of the oracle so far. Initially, before stage 0, is the empty function, and grows by nite extension throughout the construction, so that, for any z, once (z) is dened it never changes. The numbers m i will always be identied with binary strings of length i + 1. From now on throughout the proof, w stands for the string m 0 #m 1 # #m 2n. Stage 2n / ; m 0 ; m 1 ; : : : ; m 2n?1 are given. / Phase 1: Forcing Accepting Computations Let m 2n = 0. Let S = n.

4 Do the following repeatedly until no such x exists: Find some x 2 S such that there is a w-extension of making M (x) accept. If x exists, then (i) x such a, (ii) let p be some accepting path of M (x), (iii) remove x from S, (iv) extend to include the query answers along p, and (v) increment m 2n. Phase 2: Coding For each x of length n (order is unimportant): Let y x be the lex least y 2 2n+2 such that neither w#x#y0 nor w#x#y1 is in domain(). [We show later that y x always exists.] If M (x) accepts, set (w#x#y x 1) = 1. Otherwise, set (w#x#y x 0) = 1. Phase 3: Cleanup Set (z) = 0 for all z 2 S x2 n C x? domain(). Set (z) = 0 for all z 2 f0; 1; #g n? domain(). End stage 2n. Stage 2n + 1 Let m 2n+1 = 0. End stage 2n + 1. Note that in the Forcing phase, m 2n is incremented at most 2 n times, so there is no possibility of overow. In the Coding phase, for each x, the unique string z for which (z) is set to 1 we will call x's coding string. Dene the oracle A f0; 1; #g such that w 2 A if and only if (w) is set to 1 at some stage. The three claims below nish the proof. Claim 1. A is recursive. Proof. The stage-by-stage construction is recursive, is nite at every stage, and every z 2 f0; 1; #g enters domain() at some stage. ut Claim 1 Claim 2. The string y x exists for all x 2. Proof. Fix x of length n. It suces to show that at the start of the Coding phase of Stage 2n, jdomain() \ C x j < 2 2n+2. Note that all strings in C x are strictly longer than n, and all the other coding regions are disjoint from C x. This means that we can ignore the elements entering domain() in the Coding and Cleanup phases of stages 0 through 2n? 1. That is, the strings contributing to jdomain() \ C x j must have entered domain() during Phase 1 of these stages. Taken together, these phases add at most 2 n queries to domain() for each x 0 with jx 0 j n. This makes at most 2 n (2 n+1? 1) < 2 2n+2 elements in all. (The overkill in the bound will be useful in the proof of Theorem 2.) ut Claim 2

5 Claim 3. For all x of length n, x 2 L A if and only if M A (x) accepts. Proof. Let ; m 0 ; : : : ; m 2n be as at the end of phase 1 of stage 2n. We need to show two things: (1) the coding string of x is the lex maximum element of C x \ A, and (2) the accept/reject behavior of M (x) at the Coding phase is not disturbed by any later changes to, i.e., M (x) = M A (x). No strings enter A in the Cleanup phases of any stage. The coding strings for all x 0 6= x are not in C x, and hence do not aect (1). Also, the Cleanup phase of stage 2n ensures that no strings enter C x \ A after stage 2n. What is left is the Forcing phases of stages 0; : : : ; 2n. If a string enters A during the Forcing phase of some stage n 0 2n, then it must be some query extending m 0 # m n0?1#m made along some accepting path of M, for some m < m n 0. This is because all queries not extending this prex were answered \no" and kept out of A (except if they were already in domain()), and m was incremented immediately afterwards. Thus any strings in C x that enter A are lex less than x's coding string. This shows (1). If M (x) accepts, then M A (x) accepts because A extends. Suppose M (x) rejects. Since the loop in phase 1 has ended, there is no w-extension of such that M (x) accepts. It is clear by the construction that all strings put into A beyond this point in the construction have w as a prex. Therefore, M A (x) must still reject. ut Claim 3 ut Theorem 1 We can now esh out the odd stages of the construction above to get P A = UP A and P A = NP A \ conp A as well. For simplicity, we only show how to get P A = UP A here. Also getting P A = NP A \ conp A is accomplished in an entirely similar way, which we describe briey afterwards. Theorem2. There is a recursive oracle A such that P NPA P A = UP A. = NEXP A and Proof. We build A in stages just as in the proof of Theorem 1. In fact, the even-numbered stages are exactly as they were before, but we now use the oddnumbered stages to force NP machines to be illegal as UP machines (i.e., to have more than one accepting path on some input). This is done very much like the forcing of acceptances of M in the even stages. Fix a standard enumeration N 1 ; N 2 ; : : : of all ptime nondeterministic oracle TMs, where N i runs in time n i. The set-up for the construction is identical with that of Theorem 1. In stage 2n + 1 we always use w to denote the string m 0 #m 1 # #m 2n+1. Stage 2n This is identical with stage 2n of Theorem 1. End stage 2n.

6 Stage 2n + 1 Let m 2n+1 = 0. For i = 1 to n: Find the least string y with jyj 2 n=i such that there is a w-extension of where N i (y) has at least two accepting paths p 1 and p 2. If y,, p 1, and p 2 exist, then: (i) extend to include the query answers along p 1 and p 2, (ii) increment m 2n+1. End stage 2n + 1. The oracle A is dened as before, and it is clearly recursive. The proof that P NPA = NEXP A requires little change from the previous proof: Since the odd stages closely resemble the Forcing phases of the even stages, the proof of Claim 3 still applies in the present case. We only need check that Claim 2 is still valid by bounding jdomain() \ C x j at the start of the Coding phase of stage 2n. At most 2 n (2 n+1?1) strings are contributed by the even stages, and each odd stage contributes at most n2jyj i n2 n+1 strings. There are n odd stages before stage 2n, so we have jdomain() \ C x j 2 n (2 n+1? 1) + n 2 2 n+1 < 2 2n+2 : Therefore, Claim 2 holds. It remains to show that P A = UP A. First, it is important to note that this entire proof, including the construction, can be recast relative to an oracle that makes P = PSPACE, e.g., some PSPACE-complete set H. This recasting clearly alters the denition of A, but not the facts we establish. We will therefore assume for the rest of the proof that P = PSPACE (unrelativized). We can discharge this assumption by recasting everything relative to H. Let i be such that Ni A is a UP A machine. We describe a P A procedure to compute L(Ni A ). For input x, let n = i dlog jxje and run the construction through stage 2n + 1, obtaining an and w = m 0 # m 2n+1 at the end of this stage. Note that and w can be computed and stored using polynomial space. 3 Hence and w can be computed in time polynomial in jxj. Moreover, by the construction and the fact that Ni A is a UP A machine, N i (x) has at most one accepting path for every which is a w-extension of. We can now adapt a standard technique developed and used by Racko [Rac82], Hartmanis & Hemachandra [HH91], and Blum & Impagliazzo [BI87] to compute Ni A(x). ALGORITHM FOR Ni A(x). Compute and w as above. Repeat the following jxj i times: If there is a w-extension of where N i (x) accepts, then: 3 Actually, jdomain()j is superpolynomial by virtue of the Cleanup phases. We can compress, however, by only retaining the single coding string, and omitting the other strings added in the Cleanup phase.

7 Let p be some accepting path of N i (x). Extend to include all queries along p answered according to A. Accept i Ni (x) accepts. END OF ALGORITHM. The algorithm can clearly be run using polynomial space, and hence polynomial time by our assumptions. Note that throughout the algorithm, agrees with A. Thus if Ni A (x) rejects, then the algorithm rejects. Suppose Ni A(x) accepts along the unique path p?. At the start of any given loop iteration, suppose that domain() does not include all the queries made along p?. Some and p must be found in the iteration, since A is itself a w-extension of by our construction. If p = p?, then the algorithm will clearly accept. If p 6= p?, then they must share a common query that is answered dierently along each path; otherwise, there is a single w- extension of yielding two distinct accepting paths for N i (x), which violates our construction. If q is such a common query, then q 62 domain() before the iteration but enters domain() during the iteration. Thus, the number of queries along p? not in domain() decreases by one on each iteration. Since there are at most jxj i queries along p?, by the end of the loop includes all such queries, and the algorithm accepts. ut To get P A = NP A \conp A, we can easily interleave P A = UP A stages with P A = NP A \ conp A stages. In the latter stages, which are handled similarly, we consider each Ni X as a proper NP X \ conp X machine if, for each input, it has at least one accepting path, and either all accepting paths start with a left branch or they all start with a right branch. Ni X accepts an input i it has an accepting path starting with a left branch. In the P A = NP A \ conp A stages of the construction we look for w-extensions that force both types of accepting path for the same input. In corresponding P A algorithm, the main dierence is that we now search for pairs of w-extensions that yield both types of accepting path. We thus have the following theorem: Theorem3. There is a recursive oracle A such that P NPA P A = UP A = NP A \ conp A. = NEXP A and 3.1 Lowness and Collapsing Degrees For any relativizable class C, we let LOW(C) denote the class of all C-low sets, i.e., the class of all B such that C B = C. This concept itself relativizes, i.e., we say a set B is low for C relative to an oracle A if C AB = C A. Since the classes NP and P NP are \close" to each other, one might expect that LOW(NP) should likewise be close to LOW(P NP ), but instead we get the following curious lowness property relative to the oracle A of Theorem 3: Corollary4. Relative to the set A of Theorem 3, LOW(NP) = P and LOW(P NP ) = NEXP:

8 Proof. It is well-known (see [Sel79]) that LOW(NP) = NP \ conp, and the proof relativizes; thus, LOW(NP) = P relative to A. Moreover, relative to A we have (P NP ) NEXP = (P NP ) PNP PH NEXP = P NP ; and thus NEXP LOW(P NP ) P NP = NEXP. Homer and Selman [HS92] produced an oracle relative to which P = UP and p = EXP, and thus the complete 2 p m -degree for p 2 collapses. The oracle A of Theorem 3 brings the collapse further down in the polynomial hierarchy. Corollary 5. Relative to the set A of Theorem 3, all p m-complete sets for PNP are polynomial-time isomorphic. Proof. Berman [Ber77] showed via a relativizable proof that the complete p m - degree for EXP collapses to a 1-li-degree (one-to-one, length-increasing m-reductions). By results in [GS88, KLD87], all 1-li-degrees collapse if and only if P = UP, again by a relativizable proof. Relative to A, we have P = UP and P NP = EXP. ut ut 4 Open Questions Of course we would like to see the P NP = NEXP question answered in the unrelativized world. We conjecture that the classes are in fact dierent but such a proof will require vastly new techniques. In the relativized setting, we would like to see an oracle relative to which P NP = NEXP but P = BPP. We think a proof similar to the proof of Theorem 2 may work but trying to force all BPP machines to be categorical may put too many strings in the oracle. Is there an oracle relative to which P = UP and NP = EXP? 5 Acknowledgment We would like to thank Harry Buhrman for Corollary 5. References [Ber77] [BH77] [BI87] L. Berman. Polynomial Reducibilities and Complete Sets. PhD thesis, Cornell University, L. Berman and J. Hartmanis. On isomorphism and density of NP and other complete sets. SIAM Journal on Computing, 1:305{322, M. Blum and R. Impagliazzo. Generic oracles and oracle classes. In Proceedings of the 28th IEEE Symposium on Foundations of Computer Science, pages 118{126, New York, IEEE.

9 [BT94] H. Buhrman and L. Torenvliet. On the cutting edge of relativization: The resource bounded injury method. In Proceedings of the 21st International Colloquium on Automata, Languages and Programming, Lecture Notes in Computer Science. Springer-Verlag, To appear. [FFK92] S. Fenner, L. Fortnow, and S. Kurtz. The isomorphism conjecture holds relative to an oracle. In Proceedings of the 33rd IEEE Symposium on Foundations of Computer Science, pages 30{39, To appear in SIAM J. Comp. [FLZ94] B. Fu, H. Li, and Y. Zhong. An application of the translational method. Mathematical Systems Theory, 27:183{186, [GS88] J. Grollmann and A. Selman. Complexity measures for public-key cryptosystems. SIAM Journal on Computing, 17:309{335, [HH91] J. Hartmanis and L. Hemachandra. One-way functions and the nonisomorphism of NP-complete sets. Theoretical Computer Science, 81(1):155{163, [HS92] S. Homer and A. Selman. Oracles for structural properties: The isomorphism problem and public-key cryptography. Journal of Computer and System Sciences, 44(2):287{301, [HU79] J. E. Hopcroft and J. D. Ullman. Introduction to Automata Theory, Languages, and Computation. Addison-Wesley, Reading, Mass., [KLD87] K. Ko, T. Long, and D. Du. A note on one-way functions and polynomialtime isomorphisms. Theoretical Computer Science, 47:263{276, [Moc94] S. Mocas. Using bounded query classes to separate classes in the exponential time hierarchy from classes in PH. In Proceedings of the 9th IEEE Structure in Complexity Theory Conference, pages 53{58. IEEE, New York, [Rac82] C. Racko. Relativized questions involving probabilistic algorithms. Journal of the ACM, 29(1):261{268, [Sel79] A. Selman. P-selective sets, tally languages, and the behavior of polynomialtime reducibilities on NP. Mathematical Systems Theory, 13:55{65, [SFM78] J. Seiferas, M. Fischer, and A. Meyer. Separating nondeterministic time complexity classes. Journal of the ACM, 25(1):146{167, [Soa87] R. I. Soare. Recursively Enumerable Sets and Degrees. Springer-Verlag, Berlin, This article was processed using the LaT E X macro package with LLNCS style

Relativized Worlds with an Innite Hierarchy. Lance Fortnow y. University of Chicago E. 58th. St. Chicago, IL Abstract

Relativized Worlds with an Innite Hierarchy. Lance Fortnow y. University of Chicago E. 58th. St. Chicago, IL Abstract Relativized Worlds with an Innite Hierarchy Lance Fortnow y University of Chicago Department of Computer Science 1100 E. 58th. St. Chicago, IL 60637 Abstract We introduce the \Book Trick" as a method for

More information

Separating NE from Some Nonuniform Nondeterministic Complexity Classes

Separating NE from Some Nonuniform Nondeterministic Complexity Classes Separating NE from Some Nonuniform Nondeterministic Complexity Classes Bin Fu 1, Angsheng Li 2, and Liyu Zhang 3 1 Dept. of Computer Science, University of Texas - Pan American TX 78539, USA. binfu@cs.panam.edu

More information

NP Might Not Be As Easy As Detecting Unique Solutions

NP Might Not Be As Easy As Detecting Unique Solutions NP Might Not Be As Easy As Detecting Unique Solutions Richard Beigel Lehigh University Harry Buhrman x CWI Lance Fortnow { University of Chicago Abstract We construct an oracle A such that P A = P A and

More information

A Note on Many-One and 1-Truth-Table Complete Languages

A Note on Many-One and 1-Truth-Table Complete Languages Syracuse University SURFACE Electrical Engineering and Computer Science Technical Reports College of Engineering and Computer Science 12-15-1991 A Note on Many-One and 1-Truth-Table Complete Languages

More information

Mitosis in Computational Complexity

Mitosis in Computational Complexity Mitosis in Computational Complexity Christian Glaßer 1, A. Pavan 2, Alan L. Selman 3, and Liyu Zhang 4 1 Universität Würzburg, glasser@informatik.uni-wuerzburg.de 2 Iowa State University, pavan@cs.iastate.edu

More information

Sparse Sets, Approximable Sets, and Parallel Queries to NP. Abstract

Sparse Sets, Approximable Sets, and Parallel Queries to NP. Abstract Sparse Sets, Approximable Sets, and Parallel Queries to NP V. Arvind Institute of Mathematical Sciences C. I. T. Campus Chennai 600 113, India Jacobo Toran Abteilung Theoretische Informatik, Universitat

More information

On the Power of Multi-Prover Interactive Protocols. Lance Fortnow. John Rompel y. Michael Sipser z. Massachusetts Institute of Technology

On the Power of Multi-Prover Interactive Protocols. Lance Fortnow. John Rompel y. Michael Sipser z. Massachusetts Institute of Technology On the Power of Multi-Prover Interactive Protocols Lance Fortnow John Rompel y Michael Sipser z { Laboratory for Computer Science Massachusetts Institute of Technology Cambridge, MA 02139 1 Introduction

More information

Inverting Onto Functions and Polynomial Hierarchy

Inverting Onto Functions and Polynomial Hierarchy Inverting Onto Functions and Polynomial Hierarchy Harry Buhrman 1, Lance Fortnow 2, Michal Koucký 3, John D. Rogers 4, and Nikolay Vereshchagin 5 1 CWI, Amsterdam, buhrman@cwi.nl 2 University of Chicago,

More information

Almost-Everywhere Complexity Hierarchies for. Nondeterministic Time 3. Eric Allender y. Department of Computer Science, Rutgers University

Almost-Everywhere Complexity Hierarchies for. Nondeterministic Time 3. Eric Allender y. Department of Computer Science, Rutgers University Almost-Everywhere Complexity Hierarchies for Nondeterministic Time 3 Eric Allender y Department of Computer Science, Rutgers University New Brunswick, NJ, USA 08903 Richard Beigel z Department of Computer

More information

The Isomorphism Conjecture Fails Relative to a Random Oracle

The Isomorphism Conjecture Fails Relative to a Random Oracle Syracuse University SURFACE Electrical Engineering and Computer Science College of Engineering and Computer Science 1996 The Isomorphism Conjecture Fails Relative to a Random Oracle Stuart A. Kurtz University

More information

Simultaneous Strong Separations of Probabilistic and Unambiguous Complexity Classes

Simultaneous Strong Separations of Probabilistic and Unambiguous Complexity Classes Simultaneous Strong Separations of Probabilistic and Unambiguous Complexity Classes David Eppstein Lane A. Hemachandra James Tisdall Bülent Yener Abstract We study the relationship between probabilistic

More information

The Random Oracle Hypothesis is False. Pankaj Rohatgi 1. July 6, Abstract

The Random Oracle Hypothesis is False. Pankaj Rohatgi 1. July 6, Abstract The Random Oracle Hypothesis is False Richard Chang 1;2 Benny Chor ;4 Oded Goldreich ;5 Juris Hartmanis 1 Johan Hastad 6 Desh Ranjan 1;7 Pankaj Rohatgi 1 July 6, 1992 Abstract The Random Oracle Hypothesis,

More information

Then RAND RAND(pspace), so (1.1) and (1.2) together immediately give the random oracle characterization BPP = fa j (8B 2 RAND) A 2 P(B)g: (1:3) Since

Then RAND RAND(pspace), so (1.1) and (1.2) together immediately give the random oracle characterization BPP = fa j (8B 2 RAND) A 2 P(B)g: (1:3) Since A Note on Independent Random Oracles Jack H. Lutz Department of Computer Science Iowa State University Ames, IA 50011 Abstract It is shown that P(A) \ P(B) = BPP holds for every A B. algorithmically random

More information

A Note on the Karp-Lipton Collapse for the Exponential Hierarchy

A Note on the Karp-Lipton Collapse for the Exponential Hierarchy A Note on the Karp-Lipton Collapse for the Exponential Hierarchy Chris Bourke Department of Computer Science & Engineering University of Nebraska Lincoln, NE 68503, USA Email: cbourke@cse.unl.edu January

More information

The Computational Complexity Column

The Computational Complexity Column The Computational Complexity Column by Jacobo Torán Dept. Theoretische Informatik, Universität Ulm Oberer Eselsberg, 89069 Ulm, Germany toran@informatik.uni-ulm.de http://theorie.informatik.uni-ulm.de/personen/jt.html

More information

Limitations of Efficient Reducibility to the Kolmogorov Random Strings

Limitations of Efficient Reducibility to the Kolmogorov Random Strings Limitations of Efficient Reducibility to the Kolmogorov Random Strings John M. HITCHCOCK 1 Department of Computer Science, University of Wyoming Abstract. We show the following results for polynomial-time

More information

Does the Polynomial Hierarchy Collapse if Onto Functions are Invertible?

Does the Polynomial Hierarchy Collapse if Onto Functions are Invertible? Does the Polynomial Hierarchy Collapse if Onto Functions are Invertible? Harry Buhrman Lance Fortnow Michal Koucký John D. Rogers Nikolay Vereshchagin December 23, 2008 Abstract The class TFNP, defined

More information

Does the Polynomial Hierarchy Collapse if Onto Functions are Invertible?

Does the Polynomial Hierarchy Collapse if Onto Functions are Invertible? Does the Polynomial Hierarchy Collapse if Onto Functions are Invertible? Harry Buhrman 1, Lance Fortnow 2, Michal Koucký 3, John D. Rogers 4, and Nikolay Vereshchagin 5 1 CWI, Amsterdam, buhrman@cwi.nl

More information

of membership contain the same amount of information? With respect to (1), Chen and Toda [CT93] showed many functions to be complete for FP NP (see al

of membership contain the same amount of information? With respect to (1), Chen and Toda [CT93] showed many functions to be complete for FP NP (see al On Functions Computable with Nonadaptive Queries to NP Harry Buhrman Jim Kadin y Thomas Thierauf z Abstract We study FP NP, the class of functions that can be computed with nonadaptive queries to an NP

More information

Comparing Reductions to NP-Complete Sets

Comparing Reductions to NP-Complete Sets Comparing Reductions to NP-Complete Sets John M. Hitchcock A. Pavan Abstract Under the assumption that NP does not have p-measure 0, we investigate reductions to NP-complete sets and prove the following:

More information

On the NP-Completeness of the Minimum Circuit Size Problem

On the NP-Completeness of the Minimum Circuit Size Problem On the NP-Completeness of the Minimum Circuit Size Problem John M. Hitchcock Department of Computer Science University of Wyoming A. Pavan Department of Computer Science Iowa State University Abstract

More information

One Bit of Advice.

One Bit of Advice. One Bit of Advice Harry Buhrman 1, Richard Chang 2, and Lance Fortnow 3 1 CWI & University of Amsterdam. Address: CWI, INS4, P.O. Box 94709, Amsterdam, The Netherlands. buhrman@cwi.nl. 2 Department of

More information

i ) and L(NM O 2 i ), L(NM O 2 L(NM Z i ) L(NM Z j ) =. j )) to (A, B) requires

i ) and L(NM O 2 i ), L(NM O 2 L(NM Z i ) L(NM Z j ) =. j )) to (A, B) requires Disjoint NP-Pairs Christian Glaßer 1 Alan L. Selman Samik Sengupta Liyu Zhang Department of Computer Science and Engineering, University at Buffalo, Buffalo, NY 14260 Email: {cglasser,selman,samik,lzhang7}@cse.buffalo.edu

More information

LCNS, Vol 665, pp , Springer 1993

LCNS, Vol 665, pp , Springer 1993 Extended Locally Denable Acceptance Types (Extend Abstract, Draft Version) Rolf Niedermeier and Peter Rossmanith Institut fur Informatik, Technische Universitat Munchen Arcisstr. 21, D-000 Munchen 2, Fed.

More information

Determining Acceptance Possibility for a Quantum Computation is Hard for PH

Determining Acceptance Possibility for a Quantum Computation is Hard for PH Boston University OpenBU Computer Science http://open.bu.edu CAS: Computer Science: Technical Reports 1998-04-0 Determining Acceptance Possibility for a Quantum Computation is Hard for PH Fenner, Stephen

More information

A Relationship between Difference Hierarchies and Relativized Polynomial Hierarchies

A Relationship between Difference Hierarchies and Relativized Polynomial Hierarchies A Relationship between Difference Hierarchies and Relativized Polynomial Hierarchies Richard Beigel Yale University Richard Chang Cornell University Mitsunori Ogiwara University of Electro-Communications

More information

Properties of NP-Complete Sets

Properties of NP-Complete Sets Properties of NP-Complete Sets Christian Glaßer, A. Pavan, Alan L. Selman, Samik Sengupta Abstract We study several properties of sets that are complete for NP. We prove that if L is an NP-complete set

More information

CS154, Lecture 17: conp, Oracles again, Space Complexity

CS154, Lecture 17: conp, Oracles again, Space Complexity CS154, Lecture 17: conp, Oracles again, Space Complexity Definition: conp = { L L NP } What does a conp computation look like? In NP algorithms, we can use a guess instruction in pseudocode: Guess string

More information

Autoreducibility, Mitoticity, and Immunity

Autoreducibility, Mitoticity, and Immunity Autoreducibility, Mitoticity, and Immunity Christian Glaßer, Mitsunori Ogihara, A. Pavan, Alan L. Selman, Liyu Zhang December 21, 2004 Abstract We show the following results regarding complete sets. NP-complete

More information

Length-Increasing Reductions for PSPACE-Completeness

Length-Increasing Reductions for PSPACE-Completeness Length-Increasing Reductions for PSPACE-Completeness John M. Hitchcock 1 and A. Pavan 2 1 Department of Computer Science, University of Wyoming. jhitchco@cs.uwyo.edu 2 Department of Computer Science, Iowa

More information

Does the Polynomial Hierarchy Collapse if Onto Functions are Invertible?

Does the Polynomial Hierarchy Collapse if Onto Functions are Invertible? Theory Comput Syst (2010) 46: 143 156 DOI 10.1007/s00224-008-9160-8 Does the Polynomial Hierarchy Collapse if Onto Functions are Invertible? Harry Buhrman Lance Fortnow Michal Koucký John D. Rogers Nikolay

More information

Uniformly Hard Languages

Uniformly Hard Languages Uniformly Hard Languages Rod Downey Victoria University Lance Fortnow University of Chicago February 17, 2014 Abstract Ladner [18] showed that there are no minimal recursive sets under polynomial-time

More information

only the path M B (x), which is the path where a \yes" branch from a node is taken i the label of the node is in B, and we also consider preorder and

only the path M B (x), which is the path where a \yes branch from a node is taken i the label of the node is in B, and we also consider preorder and Monotonic oracle machines and binary search reductions Martin Mundhenk y May 7, 1996 Abstract Polynomial-time oracle machines being restricted to perform a certain search technique in the oracle are considered

More information

Polynomial-Time Random Oracles and Separating Complexity Classes

Polynomial-Time Random Oracles and Separating Complexity Classes Polynomial-Time Random Oracles and Separating Complexity Classes John M. Hitchcock Department of Computer Science University of Wyoming jhitchco@cs.uwyo.edu Adewale Sekoni Department of Computer Science

More information

Graph Isomorphism is in SPP

Graph Isomorphism is in SPP Graph Isomorphism is in SPP V. Arvind and Piyush P Kurur 1 Institute of Mathematical Sciences, Chennai 600113, India Abstract We show that Graph Isomorphism is in the complexity class SPP, and hence it

More information

On P-selective Sets and EXP Hard Sets. Bin Fu. Yale University, New Haven, CT and. UMIACS, University of Maryland at College Park, MD 20742

On P-selective Sets and EXP Hard Sets. Bin Fu. Yale University, New Haven, CT and. UMIACS, University of Maryland at College Park, MD 20742 On P-selective Sets and EXP Hard Sets Bin Fu Department of Computer Science, Yale University, New Haven, CT 06520 and UMIACS, University of Maryland at College Park, MD 20742 May 1997 Email: binfu@umiacs.umd.edu

More information

NP, polynomial-time mapping reductions, and NP-completeness

NP, polynomial-time mapping reductions, and NP-completeness NP, polynomial-time mapping reductions, and NP-completeness In the previous lecture we discussed deterministic time complexity, along with the time-hierarchy theorem, and introduced two complexity classes:

More information

15.1 Proof of the Cook-Levin Theorem: SAT is NP-complete

15.1 Proof of the Cook-Levin Theorem: SAT is NP-complete CS125 Lecture 15 Fall 2016 15.1 Proof of the Cook-Levin Theorem: SAT is NP-complete Already know SAT NP, so only need to show SAT is NP-hard. Let L be any language in NP. Let M be a NTM that decides L

More information

: On the P vs. BPP problem. 30/12/2016 Lecture 12

: On the P vs. BPP problem. 30/12/2016 Lecture 12 03684155: On the P vs. BPP problem. 30/12/2016 Lecture 12 Time Hierarchy Theorems Amnon Ta-Shma and Dean Doron 1 Diagonalization arguments Throughout this lecture, for a TM M, we denote M t to be the machine

More information

Preface These notes were prepared on the occasion of giving a guest lecture in David Harel's class on Advanced Topics in Computability. David's reques

Preface These notes were prepared on the occasion of giving a guest lecture in David Harel's class on Advanced Topics in Computability. David's reques Two Lectures on Advanced Topics in Computability Oded Goldreich Department of Computer Science Weizmann Institute of Science Rehovot, Israel. oded@wisdom.weizmann.ac.il Spring 2002 Abstract This text consists

More information

Inverting onto functions

Inverting onto functions Information and Computation 186 (2003) 90 103 www.elsevier.com/locate/ic Inverting onto functions Stephen A. Fenner, a,1 Lance Fortnow, b,2 Ashish V. Naik, b,3 and John D. Rogers c,,4 a University of Southern

More information

On Resource-Bounded Instance Complexity. Martin Kummer z. Universitat Karlsruhe. Abstract

On Resource-Bounded Instance Complexity. Martin Kummer z. Universitat Karlsruhe. Abstract On Resource-Bounded Instance Complexity Lance Fortnow y University of Chicago Martin Kummer z Universitat Karlsruhe Abstract The instance complexity of a string x with respect to a set A and time bound

More information

Probabilistic Autoreductions

Probabilistic Autoreductions Probabilistic Autoreductions Liyu Zhang 1, Chen Yuan 3, and Haibin Kan 2 1 Departmente of Computer Science, University of Texas Rio Grande Valley, Brownsville, Texas, 78520, USA. liyu.zhang@utrgv.edu 2

More information

Proving SAT does not have Small Circuits with an Application to the Two Queries Problem

Proving SAT does not have Small Circuits with an Application to the Two Queries Problem Proving SAT does not have Small Circuits with an Application to the Two Queries Problem Lance Fortnow A. Pavan Samik Sengupta Abstract We show that if SAT does not have small circuits, then there must

More information

The Complexity of Unions of Disjoint Sets

The Complexity of Unions of Disjoint Sets Electronic Colloquium on Computational Complexity, Report No. 69 (2006) The Complexity of Unions of Disjoint Sets Christian Glaßer, Alan L. Selman, Stephen Travers, and Klaus W. Wagner Abstract This paper

More information

in both cases, being 1? 2=k(n) and 1? O(1=k(n)) respectively; the number of repetition has no eect on this ratio. There is great simplication and conv

in both cases, being 1? 2=k(n) and 1? O(1=k(n)) respectively; the number of repetition has no eect on this ratio. There is great simplication and conv A Classication of the Probabilistic Polynomial Time Hierarchy under Fault Tolerant Access to Oracle Classes Jin-Yi Cai Abstract We show a simple application of Zuckerman's amplication technique to the

More information

Lecture 20: conp and Friends, Oracles in Complexity Theory

Lecture 20: conp and Friends, Oracles in Complexity Theory 6.045 Lecture 20: conp and Friends, Oracles in Complexity Theory 1 Definition: conp = { L L NP } What does a conp computation look like? In NP algorithms, we can use a guess instruction in pseudocode:

More information

Generalized Lowness and Highness and Probabilistic Complexity Classes

Generalized Lowness and Highness and Probabilistic Complexity Classes Generalized Lowness and Highness and Probabilistic Complexity Classes Andrew Klapper University of Manitoba Abstract We introduce generalized notions of low and high complexity classes and study their

More information

c 1998 Society for Industrial and Applied Mathematics

c 1998 Society for Industrial and Applied Mathematics SIAM J. COMPUT. Vol. 28, No. 1, pp. 137 151 c 1998 Society for Industrial and Applied Mathematics L-PRINTABLE SETS LANCE FORTNOW, JUDY GOLDSMITH, MATTHEW A. LEVY, AND STEPHEN MAHANEY Abstract. A language

More information

On the Power of Parity Polynomial Time Jin-yi Cai 1 Lane A. Hemachandra 2. December. 1987

On the Power of Parity Polynomial Time Jin-yi Cai 1 Lane A. Hemachandra 2. December. 1987 On the Power of Parity Polynomial Time Jin-yi Cai 1 Lane A. Hemachandra 2 December. 1987 CUCS-274-87 I Department of Computer Science. Yale University, New Haven. CT 06520 1Department of Computer Science.

More information

in [8]. A class F is closed under f if the composition of f with any function in F is again a function in F. Of highest importance are (non-constructi

in [8]. A class F is closed under f if the composition of f with any function in F is again a function in F. Of highest importance are (non-constructi A Note on Unambiguous Function Classes Sven Kosub Theoretische Informatik, Julius-Maximilians-Universitat Wurzburg, Am Hubland, D-97074 Wurzburg, Germany Key words: Computational complexity, unambiguous

More information

Polynomial-Time Semi-Rankable Sets. University of Rochester. Rochester, NY Abstract

Polynomial-Time Semi-Rankable Sets. University of Rochester. Rochester, NY Abstract Polynomial-Time Semi-Rankable Sets Lane A. Hemaspaandra Mohammed J. Zaki y Marius Zimand Department of Computer Science University of Rochester Rochester, NY 14627 Abstract We study the polynomial-time

More information

On the P versus NP intersected with co-np question in communication complexity

On the P versus NP intersected with co-np question in communication complexity On the P versus NP intersected with co-np question in communication complexity Stasys Jukna Abstract We consider the analog of the P versus NP co-np question for the classical two-party communication protocols

More information

Separating Complexity Classes using Autoreducibility. Lance Fortnow y. Leen Torenvliet x. University of Amsterdam. Abstract

Separating Complexity Classes using Autoreducibility. Lance Fortnow y. Leen Torenvliet x. University of Amsterdam. Abstract Separating Complexity Classes using Autoreducibility Harry Buhrman CWI Lance Fortnow y The University of Chicago Leen Torenvliet x University of Amsterdam Dieter van Melkebeek z The University of Chicago

More information

Low-Depth Witnesses are Easy to Find

Low-Depth Witnesses are Easy to Find Low-Depth Witnesses are Easy to Find Luis Antunes U. Porto Lance Fortnow U. Chicago Alexandre Pinto U. Porto André Souto U. Porto Abstract Antunes, Fortnow, van Melkebeek and Vinodchandran captured the

More information

ON THE STRUCTURE OF BOUNDED QUERIES TO ARBITRARY NP SETS

ON THE STRUCTURE OF BOUNDED QUERIES TO ARBITRARY NP SETS ON THE STRUCTURE OF BOUNDED QUERIES TO ARBITRARY NP SETS RICHARD CHANG Abstract. Kadin [6] showed that if the Polynomial Hierarchy (PH) has infinitely many levels, then for all k, P SAT[k] P SAT[k+1].

More information

Hard Sets Are Hard to Find. H. Buhrman D. van Melkebeek y GB Amsterdam The University of Chicago

Hard Sets Are Hard to Find. H. Buhrman D. van Melkebeek y GB Amsterdam The University of Chicago Hard Sets Are Hard to Find H. Buhrman D. van Melkebeek y CWI Fields Institute & PO Box 94079 Department of Computer Science 1090 GB Amsterdam The University of Chicago The Netherlands Chicago, IL 60637,

More information

Unconditional Lower Bounds Against Advice

Unconditional Lower Bounds Against Advice Unconditional Lower Bounds Against Advice Harry Buhrman Lance Fortnow Rahul Santhanam Abstract We show several unconditional lower bounds for exponential time classes against polynomial time classes with

More information

1 Introduction An old folklore rooted in Brassard's paper [7] states that \cryptography" cannot be based on NPhard problems. However, what Brassard ha

1 Introduction An old folklore rooted in Brassard's paper [7] states that \cryptography cannot be based on NPhard problems. However, what Brassard ha On the possibility of basing Cryptography on the assumption that P 6= N P Oded Goldreich Department of Computer Science Weizmann Institute of Science Rehovot, Israel. oded@wisdom.weizmann.ac.il Sha Goldwasser

More information

Turing Machines With Few Accepting Computations And Low Sets For PP

Turing Machines With Few Accepting Computations And Low Sets For PP Turing Machines With Few Accepting Computations And Low Sets For PP Johannes Köbler a, Uwe Schöning a, Seinosuke Toda b, Jacobo Torán c a Abteilung Theoretische Informatik, Universität Ulm, 89069 Ulm,

More information

Lecture 24: Randomized Complexity, Course Summary

Lecture 24: Randomized Complexity, Course Summary 6.045 Lecture 24: Randomized Complexity, Course Summary 1 1/4 1/16 1/4 1/4 1/32 1/16 1/32 Probabilistic TMs 1/16 A probabilistic TM M is a nondeterministic TM where: Each nondeterministic step is called

More information

Identifying an Honest EXP NP Oracle Among Many

Identifying an Honest EXP NP Oracle Among Many Identifying an Honest EXP NP Oracle Among Many Shuichi Hirahara The University of Tokyo CCC 18/6/2015 Overview Dishonest oracle Honest oracle Queries Which is honest? Our Contributions Selector 1. We formulate

More information

, Department of Computer and Communication Sciences, University of Michigan, Ann Arbor, Michigan

, Department of Computer and Communication Sciences, University of Michigan, Ann Arbor, Michigan SIAM J. COMPUT. Vol. 13, No. 4, November 1984 (C) 1984 Society for Industrial and Applied Mathematics 002 EQUIVALENCE RELATIONS, INVARIANTS, AND NORMAL FORMS* ANDREAS BLASS" AND YURI GUREVICH* Abstract.

More information

A Short History of Computational Complexity

A Short History of Computational Complexity A Short History of Computational Complexity Lance Fortnow, Steve Homer Georgia Kaouri NTUAthens Overview 1936: Turing machine early 60 s: birth of computational complexity early 70 s: NP-completeness,

More information

Reductions between Disjoint NP-Pairs

Reductions between Disjoint NP-Pairs Reductions between Disjoint NP-Pairs Christian Glaßer Lehrstuhl für Informatik IV Universität Würzburg, 97074 Würzburg, Germany Alan L. Selman Department of Computer Science and Engineering University

More information

Graph Isomorphism is in SPP

Graph Isomorphism is in SPP Graph Isomorphism is in SPP V. Arvind and Piyush P Kurur Institute of Mathematical Sciences, C.I.T Campus Chennai 600113, India email: {arvind,ppk}@imsc.ernet.in Abstract We show that Graph Isomorphism

More information

On the Power of Unambiguity in Alternating Machines

On the Power of Unambiguity in Alternating Machines On the Power of Unambiguity in Alternating Machines Holger Spaowsi 1 and Rahul Tripathi 2 1 Institut für Informati, Heinrich-Heine-Universität, 40225 Düsseldorf, Germany. spaows@cs.uni-duesseldorf.de.

More information

Much Ado about Functions

Much Ado about Functions Much Ado about Functions Alan L. Selman Department of Computer Science State University of New York at Buffalo Buffalo, NY 14260 Abstract This paper surveys basic results on complexity classes of partial

More information

The Random Oracle Hypothesis is False

The Random Oracle Hypothesis is False The Random Oracle Hypothesis is False Richard Chang 1,2 Benny Chor,4 Oded Goldreich,5 Juris Hartmanis 1 Johan Håstad 6 Desh Ranjan 1,7 Pankaj Rohatgi 1 July 7, 1992 Abstract The Random Oracle Hypothesis,

More information

Robustness of PSPACE-complete sets

Robustness of PSPACE-complete sets Robustness of PSPACE-complete sets A. Pavan a,1 and Fengming Wang b,1 a Department of Computer Science, Iowa State University. pavan@cs.iastate.edu b Department of Computer Science, Rutgers University.

More information

There Is No Polynomial Deterministic Space Simulation of Probabilistic Space with a Two-Way Random-Tape Generator

There Is No Polynomial Deterministic Space Simulation of Probabilistic Space with a Two-Way Random-Tape Generator INFORMATION AND CONTROL 67, 158-162 (1985) There Is No Polynomial Deterministic Space Simulation of Probabilistic Space with a Two-Way Random-Tape Generator MAREK KARPINSKI* Department of Computer Science,

More information

Pseudo-Random Generators and Structure of Complete Degrees

Pseudo-Random Generators and Structure of Complete Degrees Pseudo-Random Generators and Structure of Complete Degrees Manindra Agrawal Dept of CSE, IIT Kanpur 208016, India email: manindra@iitk.ac.in Abstract It is shown that if there exist sets in E that require

More information

Notes for Lecture Notes 2

Notes for Lecture Notes 2 Stanford University CS254: Computational Complexity Notes 2 Luca Trevisan January 11, 2012 Notes for Lecture Notes 2 In this lecture we define NP, we state the P versus NP problem, we prove that its formulation

More information

This is an author produced version of Characterizing the Existence of Optimal Proof Systems and Complete Sets for Promise Classes..

This is an author produced version of Characterizing the Existence of Optimal Proof Systems and Complete Sets for Promise Classes.. This is an author produced version of Characterizing the Existence of Optimal Proof Systems and Complete Sets for Promise Classes.. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/74777/

More information

Some Results on Derandomization

Some Results on Derandomization Some Results on Derandomization Harry Buhrman CWI and University of Amsterdam Lance Fortnow University of Chicago A. Pavan Iowa State University Abstract We show several results about derandomization including

More information

MTAT Complexity Theory October 20th-21st, Lecture 7

MTAT Complexity Theory October 20th-21st, Lecture 7 MTAT.07.004 Complexity Theory October 20th-21st, 2011 Lecturer: Peeter Laud Lecture 7 Scribe(s): Riivo Talviste Polynomial hierarchy 1 Turing reducibility From the algorithmics course, we know the notion

More information

A note on parallel and alternating time

A note on parallel and alternating time Journal of Complexity 23 (2007) 594 602 www.elsevier.com/locate/jco A note on parallel and alternating time Felipe Cucker a,,1, Irénée Briquel b a Department of Mathematics, City University of Hong Kong,

More information

Derandomizing from Random Strings

Derandomizing from Random Strings Derandomizing from Random Strings Harry Buhrman CWI and University of Amsterdam buhrman@cwi.nl Lance Fortnow Northwestern University fortnow@northwestern.edu Michal Koucký Institute of Mathematics, AS

More information

Bi-Immunity Separates Strong NP-Completeness Notions

Bi-Immunity Separates Strong NP-Completeness Notions Bi-Immunity Separates Strong NP-Completeness Notions A. Pavan 1 and Alan L Selman 2 1 NEC Research Institute, 4 Independence way, Princeton, NJ 08540. apavan@research.nj.nec.com 2 Department of Computer

More information

Counting the number of solutions. A survey of recent inclusion results in the area of counting classes. Jacobo Toran* Departament L.S.I.

Counting the number of solutions. A survey of recent inclusion results in the area of counting classes. Jacobo Toran* Departament L.S.I. Counting the number of solutions A survey of recent inclusion results in the area of counting classes 1. Introduction Jacobo Toran* Departament L.S.I. U. Politecnica de Catalunya Pau Gargallo 5 08028 Barcelona,

More information

Complete problems for classes in PH, The Polynomial-Time Hierarchy (PH) oracle is like a subroutine, or function in

Complete problems for classes in PH, The Polynomial-Time Hierarchy (PH) oracle is like a subroutine, or function in Oracle Turing Machines Nondeterministic OTM defined in the same way (transition relation, rather than function) oracle is like a subroutine, or function in your favorite PL but each call counts as single

More information

On Computing Boolean Connectives of Characteristic Functions

On Computing Boolean Connectives of Characteristic Functions On Computing Boolean Connectives of Characteristic Functions Richard Chang Computer Science Department Cornell University Ithaca, NY 14853 Jim Kadin Computer Science Department University of Maine Orono,

More information

A Note on P-selective sets and on Adaptive versus Nonadaptive Queries to NP

A Note on P-selective sets and on Adaptive versus Nonadaptive Queries to NP A Note on P-selective sets and on Adaptive versus Nonadaptive Queries to NP Ashish V. Naik Alan L. Selman Abstract We study two properties of a complexity class whether there exists a truthtable hard p-selective

More information

Theory of Computation

Theory of Computation Theory of Computation Lecture #6 Sarmad Abbasi Virtual University Sarmad Abbasi (Virtual University) Theory of Computation 1 / 39 Lecture 6: Overview Prove the equivalence of enumerators and TMs. Dovetailing

More information

arxiv:cs/ v2 [cs.cc] 7 Dec 2005

arxiv:cs/ v2 [cs.cc] 7 Dec 2005 P-Selectivity, Immunity, and the Power of One Bit arxiv:cs/0504096v2 [cs.cc] 7 Dec 2005 Lane A. Hemaspaandra Department of Computer Science University of Rochester Rochester, NY 14627 USA Leen Torenvliet

More information

Canonical Disjoint NP-Pairs of Propositional Proof Systems

Canonical Disjoint NP-Pairs of Propositional Proof Systems Canonical Disjoint NP-Pairs of Propositional Proof Systems Christian Glaßer Alan L. Selman Liyu Zhang November 19, 2004 Abstract We prove that every disjoint NP-pair is polynomial-time, many-one equivalent

More information

A.Antonopoulos 18/1/2010

A.Antonopoulos 18/1/2010 Class DP Basic orems 18/1/2010 Class DP Basic orems 1 Class DP 2 Basic orems Class DP Basic orems TSP Versions 1 TSP (D) 2 EXACT TSP 3 TSP COST 4 TSP (1) P (2) P (3) P (4) DP Class Class DP Basic orems

More information

Circuit depth relative to a random oracle. Peter Bro Miltersen. Aarhus University, Computer Science Department

Circuit depth relative to a random oracle. Peter Bro Miltersen. Aarhus University, Computer Science Department Circuit depth relative to a random oracle Peter Bro Miltersen Aarhus University, Computer Science Department Ny Munkegade, DK 8000 Aarhus C, Denmark. pbmiltersen@daimi.aau.dk Keywords: Computational complexity,

More information

: On the P vs. BPP problem. 18/12/16 Lecture 10

: On the P vs. BPP problem. 18/12/16 Lecture 10 03684155: On the P vs. BPP problem. 18/12/16 Lecture 10 Natural proofs Amnon Ta-Shma and Dean Doron 1 Natural proofs The ultimate goal we have is separating classes (or proving they are equal if they are).

More information

Peter Wood. Department of Computer Science and Information Systems Birkbeck, University of London Automata and Formal Languages

Peter Wood. Department of Computer Science and Information Systems Birkbeck, University of London Automata and Formal Languages and and Department of Computer Science and Information Systems Birkbeck, University of London ptw@dcs.bbk.ac.uk Outline and Doing and analysing problems/languages computability/solvability/decidability

More information

Lecture 6: Oracle TMs, Diagonalization Limits, Space Complexity

Lecture 6: Oracle TMs, Diagonalization Limits, Space Complexity CSE 531: Computational Complexity I Winter 2016 Lecture 6: Oracle TMs, Diagonalization Limits, Space Complexity January 22, 2016 Lecturer: Paul Beame Scribe: Paul Beame Diagonalization enabled us to separate

More information

Ma/CS 117c Handout # 5 P vs. NP

Ma/CS 117c Handout # 5 P vs. NP Ma/CS 117c Handout # 5 P vs. NP We consider the possible relationships among the classes P, NP, and co-np. First we consider properties of the class of NP-complete problems, as opposed to those which are

More information

1 Computational Problems

1 Computational Problems Stanford University CS254: Computational Complexity Handout 2 Luca Trevisan March 31, 2010 Last revised 4/29/2010 In this lecture we define NP, we state the P versus NP problem, we prove that its formulation

More information

Probabilistic Autoreductions

Probabilistic Autoreductions Probabilistic Autoreductions Liyu Zhang University of Texas Rio Grande Valley Joint Work with Chen Yuan and Haibin Kan SOFSEM 2016 1 Overview Introduction to Autoreducibility Previous Results Main Result

More information

1 On Proofs and Interactive Proofs

1 On Proofs and Interactive Proofs On IP = PSPACE and Theorems with Narrow Proofs Juris Hartmanis Richard Chang Desh Ranjan Pankaj Rohatgi Department of Computer Science, Cornell University Ithaca, New York 14853, USA Abstract It has been

More information

2-LOCAL RANDOM REDUCTIONS TO 3-VALUED FUNCTIONS

2-LOCAL RANDOM REDUCTIONS TO 3-VALUED FUNCTIONS 2-LOCAL RANDOM REDUCTIONS TO 3-VALUED FUNCTIONS A. Pavan and N. V. Vinodchandran Abstract. Yao (in a lecture at DIMACS Workshop on structural complexity and cryptography, 1990) showed that if a language

More information

Umans Complexity Theory Lectures

Umans Complexity Theory Lectures Umans Complexity Theory Lectures Lecture 12: The Polynomial-Time Hierarchy Oracle Turing Machines Oracle Turing Machine (OTM): Deterministic multitape TM M with special query tape special states q?, q

More information

A Hierarchy Based on Output Multiplicity

A Hierarchy Based on Output Multiplicity A Hierarchy Based on Output Multiplicity Ashish V. Naik Chronologic Simulation John D. Rogers DePaul University Alan L. Selman University at Buffalo October 21, 1997 James S. Royer Syracuse University

More information

Final exam study sheet for CS3719 Turing machines and decidability.

Final exam study sheet for CS3719 Turing machines and decidability. Final exam study sheet for CS3719 Turing machines and decidability. A Turing machine is a finite automaton with an infinite memory (tape). Formally, a Turing machine is a 6-tuple M = (Q, Σ, Γ, δ, q 0,

More information