Bounded Arithmetic, Expanders, and Monotone Propositional Proofs

Similar documents
Expander Construction in VNC 1

Antonina Kolokolova Memorial University of Newfoundland

Expander Construction in VNC 1

Proofs with monotone cuts

Toda s theorem in bounded arithmetic with parity quantifiers and bounded depth proof systems with parity gates

Unprovability of circuit upper bounds in Cook s theory PV

Proof Complexity and Computational Complexity

Formalizing Randomized Matching Algorithms

The Complexity and Proof Complexity of the Comparator Circuit Value Problem

A sorting network in bounded arithmetic

RESOLUTION OVER LINEAR EQUATIONS AND MULTILINEAR PROOFS

Complexity of propositional proofs: Some theory and examples

On extracting computations from propositional proofs (a survey)

Quantified Propositional Calculus and a Second-Order Theory for NC 1

An Elementary Construction of Constant-Degree Expanders

COMPUTATIONAL COMPLEXITY

Computability and Complexity Theory: An Introduction

Foundations of Proof Complexity: Bounded Arithmetic and Propositional Translations. Stephen Cook and Phuong Nguyen c Copyright 2004, 2005, 2006

Lecture 13: Polynomial-Size Frege Proofs of the Pigeonhole Principle

An Introduction to Proof Complexity, Part II.

LIFTING LOWER BOUNDS FOR TREE-LIKE PROOFS

Proof Theory and Subsystems of Second-Order Arithmetic

Undirected ST-Connectivity in Log-Space. Omer Reingold. Presented by: Thang N. Dinh CISE, University of Florida, Fall, 2010

arxiv: v1 [cs.cc] 10 Aug 2007

Resolution and the Weak Pigeonhole Principle

Algebraic Proof Systems

A The NP Search Problems of Frege and Extended Frege Proofs

Bounded Arithmetic, Constant Depth Proofs, and st-connectivity. Sam Buss Department of Mathematics U.C. San Diego

How to lie without being (easily) convicted and the lengths of proofs in propositional calculus Pavel Pudlak?1 and Samuel R. Buss??2 1 Mathematics Ins

Semantic methods in proof theory. Jeremy Avigad. Department of Philosophy. Carnegie Mellon University.

Reverse mathematics of some topics from algorithmic graph theory

On Transformations of Constant Depth Propositional Proofs

On the Automatizability of Resolution and Related Propositional Proof Systems

Regular Resolution Lower Bounds for the Weak Pigeonhole Principle

How to lie without being (easily) convicted and the lengths of proofs in propositional calculus

Upper and Lower Bounds for Tree-like. Cutting Planes Proofs. Abstract. In this paper we study the complexity of Cutting Planes (CP) refutations, and

MATH 363: Discrete Mathematics

Model theory of bounded arithmetic with applications to independence results. Morteza Moniri

On Proofs About Threshold Circuits and Counting Hierarchies (Extended Abstract)

Research statement. Antonina Kolokolova

A polytime proof of correctness of the Rabin-Miller algorithm from Fermat s Little Theorem

Lecture 8: Complete Problems for Other Complexity Classes

Space complexity of cutting planes refutations

I. Introduction to NP Functions and Local Search

CSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds

Organization. Informal introduction and Overview Informal introductions to P,NP,co-NP and themes from and relationships with Proof complexity

Translating I 0 +exp proofs into weaker systems

Lecture 6: Random Walks versus Independent Sampling

Lower Bounds for Cutting Planes Proofs. with Small Coecients. Abstract. We consider small-weight Cutting Planes (CP ) proofs; that is,

REDUCTION OF HILBERT-TYPE PROOF SYSTEMS TO THE IF-THEN-ELSE EQUATIONAL LOGIC. 1. Introduction

Some open problems in bounded arithmetic and propositional proof complexity (research proposal paper)

Bounded Arithmetic vs. Propositional Proof Systems vs. Complexity Classes (depth oral survey)

1 Circuit Complexity. CS 6743 Lecture 15 1 Fall Definitions

Bounded Arithmetic and Propositional Proof Complexity

Lecture Notes Each circuit agrees with M on inputs of length equal to its index, i.e. n, x {0, 1} n, C n (x) = M(x).

HARDNESS AMPLIFICATION VIA SPACE-EFFICIENT DIRECT PRODUCTS

Existence and Consistency in Bounded Arithmetic

Proof complexity of the cut-free calculus of structures

On the Complexity of the Reflected Logic of Proofs

Transformation of Equational Theories and the Separation Problem of Bounded Arithmetic

INSTITUTE OF MATHEMATICS THE CZECH ACADEMY OF SCIENCES. Incompleteness in the finite domain. Pavel Pudlák

Handbook of Logic and Proof Techniques for Computer Science

Algebra II. A2.1.1 Recognize and graph various types of functions, including polynomial, rational, and algebraic functions.

LOGICAL APPROACHES TO THE COMPLEXITY OF SEARCH PROBLEMS: PROOF COMPLEXITY, QUANTIFIED PROPOSITIONAL CALCULUS, Tsuyoshi Morioka

Math 10850, fall 2017, University of Notre Dame

The power and weakness of randomness (when you are short on time) Avi Wigderson Institute for Advanced Study

Notes for Lecture 14

Combinatorial Commutative Algebra, Graph Colorability, and Algorithms

Logical Closure Properties of Propositional Proof Systems

Introduction. 1 Partially supported by a grant from The John Templeton Foundation

Algorithms for Satisfiability beyond Resolution.

Graphic sequences, adjacency matrix

Packet #1: Logic & Proofs. Applied Discrete Mathematics

A Note on Bootstrapping Intuitionistic Bounded Arithmetic

On sequent calculi vs natural deductions in logic and computer science

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler

1 PSPACE-Completeness

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181.

Database Theory VU , SS Complexity of Query Evaluation. Reinhard Pichler

Propositional Logic. What is discrete math? Tautology, equivalence, and inference. Applications

Total NP Functions I: Complexity and Reducibility

ALGEBRAIC PROOFS OVER NONCOMMUTATIVE FORMULAS

Gentzen Sequent Calculus LK

A note on exponential circuit lower bounds from derandomizing Arthur-Merlin games

Proof Complexity of Quantified Boolean Formulas

Some Applications of Logic to Feasibility in Higher Types

2 BEAME AND PITASSI systems of increasing complexity. This program has several important side eects. First, standard proof systems are interesting in

Induction rules in bounded arithmetic

The provably total NP search problems of weak second order bounded arithmetic

Introduction to Complexity Theory. Bernhard Häupler. May 2, 2006

Reverse mathematics and uniformity in proofs without excluded middle

Provability of weak circuit lower bounds

Bounded Reverse Mathematics. Phuong Nguyen

There are infinitely many set variables, X 0, X 1,..., each of which is

On the computational content of intuitionistic propositional proofs

A Super Introduction to Reverse Mathematics

Ján Pich. Hard tautologies MASTER THESIS. Charles University in Prague Faculty of Mathematics and Physics. Department of Algebra

The Deduction Rule and Linear and Near-linear Proof Simulations

The Lovász Local Lemma: constructive aspects, stronger variants and the hard core model

Transcription:

Bounded Arithmetic, Expanders, and Monotone Propositional Proofs joint work with Valentine Kabanets, Antonina Kolokolova & Michal Koucký Takeuti Symposium on Advances in Logic Kobe, Japan September 20, 2018

Talk overview A. Bounded arithmetic theories are weak subtheories of Peano arithmetic with close connections to Feasible complexity classes, e.g. P and NC 1. Propositional proof complexity, via the Paris-Wilkie and the Cook translations. Moral: A proof in bounded arithmetic corresponds to a uniform family of propositional proofs. B. Monotone propositional logic (MLK) is the propositional sequent calculus with no use of negation ( ) permitted. LK is the usual propositional sequent calculus. Main theorem: MLK polynomially simulates LK. C. This talk describes how to formalize, in VNC 1 a theory of bounded arithmetic corresponding to NC 1, the construction of expander graphs. Using prior work [Arai; Cook-Morioka; Atserias-Galesi-Pudlák; Jeřábek], this proves the main theorem.

The first Bounded Arithmetic theories (I 0, [Parikh 71,...]) and (S2 i, T1 2, U1 2, V1 2 [B 85]) were for alternating linear time and for polynomial time (P), the polynomial hierarchy (PH), polynomial space and exponential time. Takeuti [90]: the RSUV isomorphism translates theories such as U2 1 into theories for feasible classes below P. Clote-Takeuti [1992] achieved this for such several theories, including for alternating logarithmic time (Alogtime, or uniform NC 1 ), log space (L) and nondeterministic log space (NL). Especially, they defined the bounded arithmetic theory TNC for Alogtime. Arai [2000] developed an improved theory AID similar to TNC: he showed in addition that the theory AID has the Cook correspondence with propositional LK proofs. Cook-Morioka [ 05], Cook-Nguyen[ 10] give newer versions, esp. VNC 1.

Def n: The propositional sequent calculus (LK) is a propositional proof system whose proofs consist of sequents, with a finite set of valid inference forms, for example :right Γ,A Γ,B Γ,A B Cut Γ,A A,Γ Γ Def n: The monotone sequent calculus (MLK) is LK restricted to allow only monotone formulas to appear in sequents. MLK proofs are allowed to be dag-like. Main Theorem: LK proofs of monotone sequents can be simulated by polynomial size MLK proofs.

Technical talk outline I. Combinatorial construction of expander graphs, avoiding algebraic concepts such as eigenvalues even in proofs of correctness. II. This construction can be carried out in NC 1 (logarithmic depth Boolean circuits). III. Combinatorial constructions are provably correct in the weak first-order theory VNC 1 corresponding to NC 1. IV. Application: Monotone propositional logic (MLK) polynomially simulates non-monotone propositional logic (LK)

I. Construction of Expanders Expander Graphs: Undirected graphs, allowing self-loops and multiple edges. Expander graphs are both sparse (usually constant degree) and well connected. A random walk on an expander graphs converges quickly Are used for pseudorandomness, e.g., for one-way functions, error-correcting codes, derandomization, etc. Are widely used in complexity theory, e.g., Reingold; Rozenman-Vadhan. USTCON in Logspace Dinur: Combinatorial proof of PCP theorem Ajtai-Komlós-Szemerédi: AKS sorting networks.

Definition of expander graph G = (V,E), of constant degree d For U,U a proper partition of the vertices V, let edge-exp G (U) := E(U,U) d min( U, U ). E(U,U) is the set edges between E and E. The edge expansion of G is min U (edge-exp G (U)). G is an expander graph if it has Ω(1) edge expansion. Edge expansion can be lower bounded in terms of the spectral gap (second largest eigenvalue λ 2 ) of the adjacency matrix. Our work requires instead combinatorial constructions and proofs.

Classical (non)construction: [Pinkser 73] A randomly chosen degree d graph is an expander. Iterative Constructions: Start with finite size expander graph(s). Then iteratively use: Powering (to increase expansion). Zig-zag product or replacement product (to reduce the degree). Tensoring (to increase the size of the graph). Adding self-loops (helps maintain edge expansion). Original construction [Reingold-Vadhan-Wigderson 02] Used Zig-zag product, proof based on spectral gap. [Alon, Schwartz, Shapira 08] used Replacement product with combinatorial argument. Our arguments for powering will use also Mihail s combinatorial proof of mixing times from edge expansion [1989].

The explicit construction: (Similar to the prior constructions) Starts with constants c, d and two small (fixed) graphs - a 2d-regular G 0 with edge expansion ǫ = 1/1296 - a d-regular H on (2(4d) 2 ) c vertices with edge expansion 1/3. Iterate: G i+1 = [ (( G i ) ( G i ))] c H. Add self-loops ( ) to double the degree Tensor ( ) with itself Add self-loops Power to constant c Replace each vertex with H (replacement product, ) Theorem: Each G i is degree 2d and has edge expansion ǫ. The size of G i+1 is greater than (size of G i ) 2, (size squares) G i = ( G 0 D 0 ) 2i /D 0 > 2 2i, where D 0 = (2(4d) 2 ) c.

Graph operations in more detail: G = (V,E) of degree D. Adding self-loops: G. Add D self-loops to every vertex. Vertex set remains the same. Degree doubles to 2D. Tensoring with itself: G G. Crossproduct of G with itself. Vertex set is V V. Degree squares to become D 2. Raise to power c: G c. Paths of length c in G are edges of G c. Vertex set is unchanged. Degree becomes D c.

Graph operations in more detail: G = (V,E) of degree D and H = (V,E ) of size V = D and degree d. Replacement product: G H. Replace each G-vertex v V with a copy H v of H. Thus vertex set is V V. An edge e = (v 1,v 2 ) in G becomes d parallel edges between vertices of H v1 and H v2. If v 2 is i-th-neighbor of v 1 in G, it uses i-th vertex of H v1. Degree becomes 2d. Rotation map: For the replacement product, it is necessary to order the edges reaching each vertex. The rotation map of a graph G computes from v V and i < D: the i-th neighbor w of v, and the index j such that v is the j-th neighbor of w.

II. Algorithmic Complexity of the Construction Main Theorem 1: The rotation map of G i is uniformly computable from i,j,v in Polynomial time. Alternating linear time. Proof (a) Straightforward unwinding of construction gives the polynomial time algorithm. (b) Alternating linear time: G i+1 s rotation map is computed from G i s rotation map in constant alternation linear time. Only a single recursive call to G i is needed. E.g. for powering, nondeterministically guess the path of length c. Then universally verify correctness of each step in the path. Since the size of G i+1 is > square of size G i, the linear time is decreasing by factor of two with each recursive call. So the overall running time is linear (but not constant alternation)..

Since the graph G i is exponentially bigger than the size of the inputs to the rotation map function, we get: Corollary As a function of G i, there is an alternating logarithmic time algorithm (an NC 1 algorithm) to compute the edge relation on G i.

Key constructive justification of edge-expansion: Lemma If U is a set of vertices of G i+1 with edge-exp Gi+1 (U) < ǫ, then there exists a set U of vertices of G i such that edge-exp Gi (U ) < ǫ. Proof idea: There is an NC 1 algorithm to compute membership in U in terms of U. The correctness is provable by purely combinatorial means without recourse to algebraic concepts such as eigenvalues. Technical tools needed: Representing graphs and rotation maps. Definition of the expansion of a set U (as a rational). Summing sequences of rationals (common denominator). Arithmetic manipulations of these sequences. Cauchy-Schwartz inequality. All of these can be done in the bounded arithmetic theory VNC 1...

III. Formalizability in bounded arithmetic VNC 1. Notation: VNC 1 is a second-order theory of bounded arithmetic [Cook-Morioka 05], [Cook-Nguyen 10]; the first versions were defined by [Clote-Takeuti 92], [Arai 00]. VNC 1 corresponds in proof-theoretic strength to NC 1. Its provably total functions are precisely the NC 1 -functions. VNC 1 First-order objects code (small) integers. Second-order objects code strings, graphs, sequences, etc. Σ B 0 is the set of formulas with no second order quantifiers. Axioms of VNC 1 include: BASIC axioms (purely universal). Σ B 0 -Comprehension (and hence ΣB 0 -induction). Σ B 0-Tree Recursion axiom: The value of a balanced Boolean formula (a tree) with Σ B 0 functions for gates is well-defined, and defines a function encoded by a second order object. The depth of the tree is given by a first-order object.

The proofs of edge expansion for G i are based on combinatorial constructions, counting, and summations of series. VNC 1 can formalize all these arguments and can also prove the correctness of the NC 1 algorithm for the graphs G i. Main Theorem 2: The theory VNC 1 can prove the existence of the expander graphs G i, as encoded by second-order objects, and can prove their expansion properties by using the constructions of Main Theorem 1, and the above Lemma.

More details on formalization in VNC 1. First-order objects (integers, pairs of integers, etc.) encode small numbers, e.g., indices of vertices or edges. Second-order objects encode sets, e.g., sets of vertices, or sets of edges (i.e., graphs). edge-exp G (U) is definable in VNC 1 using counting, which is known to be definable in VNC 1. Theorem: VNC 1 i G=(V,E), G =i & U V edge-exp G (U)>1/1296. Proof uses the parameter-free Π B 1-LLIND, a new logarithmic-length induction principle for Σ B 1 (NP) properties, which is justified by the squaring growth rate of the expander construction.

VNC 1 proves parameter-free Π B 1 -LLIND: Theorem: Suppose θ(x) is a Σ B 0-formula containing only X free. and let ψ(a) be ( X a)θ(x). Also suppose VNC 1 proves ( a)(ψ(a) ψ( a)). (1) Then VNC 1 proves ψ(a) ψ(1), and thus also proves θ(y) ( X 1)θ(X)). Application: The hypothesis ( a)(ψ(a) ψ( a)) will express a version of ( U G i )edge-exp U 1/1296 ( U G i 1 )edge-exp U 1/1296. The conclusion ψ(a) ψ(1) will express a version of ( U G i )edge-exp U > 1/1296.

IV. Monotone propositional logic (sequent calculus) Monotone Boolean Function: Let 0 < 1, i.e. False < True. A Boolean function f( x) is monotone provided that whenever x y, we have f( x) f( y). Monotone Boolean Formula: A propositional formula over the basis and. Sequent: A 1,...,A k B 1,...,B l means A 1 A 2 A k B 1 B 2 B l Example: Pigeonhole principle tautologies: PHP n n n 1 i=0 j=0 x i,j n 1 (x i1,j x i2,j). 0 i 1 <i 2 n j=0

Def n: The propositional sequent calculus (LK) is a propositional proof system whose proofs consist of sequents, with a finite set of valid inference forms, for example :right Γ,A Γ,B Γ,A B Cut Γ,A A,Γ Γ Def n: The monotone sequent calculus (MLK) is LK restricted to allow only monotone formulas to appear in sequents. MLK proofs are allowed to be dag-like.

Theorem: [Atserias-Galesi-Galvalda 01; Aterias-Galesi-Pudlák 02] For monotone sequent tautologies, MLK quasipolynomially simulates LK. Proof idea: Restrict to slices where a fixed number of inputs are true. Then simulate x using threshold formulas. The properties of the threshold formulas must be proved; and the natural recursively-defined threshold formulas that admit such proofs are quasipolynomial size. Theorem: [B 86] The PHP n tautologies have polynomial size LK proofs. Corollary: MLK has quasipolynomial size proofs of the pigeonhole tautologies PHP n.

Theorem: [Jeřábek 11] If VNC 1 can prove the existence of expander graphs, then MLK polynomially simulates LK. Proof idea: Working in a slightly stronger system VNC 1, the AKS sorting networks can be constructed from expander graphs, and their correctness proved. VNC 1 corresponds to logspace uniform NC 1 -computability, so the AKS sorting networks can serve as logspace uniform polynomial size threshold circuits. Thus, MLK polynomially simulates LK (logspace uniformly). As a corollary: Main Theorem 3: MLK polynomially simulates LK. Corollary. (Example) MLK has polynomial size proofs of the PHP n tautologies. Corollary. Propositional LJ (intuitionistic logic) polynomially simulates LK w.r.t. monotone sequents. ([Jeřábek 09])

Open Questions Can expanders be formalized also in VTC 0, the system of bounded arithmetic corresponding to TC 0? TC 0 = constant depth threshold circuits. Are there U E -uniform sorting networks? Can this be done with a modification of the AKS construction with our NC 1 -expanders?. Can tree-like MLK polynomially simulate MLK (equivalently, simulate LK on monotone sequents)? Can USTCON LogSpace [Reingold 08] be formalized in VL or VLV, systems of bounded arithmetic corresponding to LogSpace?

Thank You!