Lecture 18: Graph Isomorphisms

Similar documents
New problems in universal algebraic geometry illustrated by boolean equations

Probablistically Checkable Proofs

Stanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012

1 Explicit Explore or Exploit (E 3 ) Algorithm

ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION. 1. Introduction. 1 r r. r k for every set E A, E \ {0},

Fall 2014 Randomized Algorithms Oct 8, Lecture 3

arxiv: v1 [math.co] 4 May 2017

Fractional Zero Forcing via Three-color Forcing Games

Deterministic vs Non-deterministic Graph Property Testing

A Bijective Approach to the Permutational Power of a Priority Queue

Chapter 3: Theory of Modular Arithmetic 38

On the ratio of maximum and minimum degree in maximal intersecting families

EQUI-PARTITIONING OF HIGHER-DIMENSIONAL HYPER-RECTANGULAR GRID GRAPHS

9.1 The multiplicative group of a finite field. Theorem 9.1. The multiplicative group F of a finite field is cyclic.

Lecture 28: Convergence of Random Variables and Related Theorems

On the ratio of maximum and minimum degree in maximal intersecting families

Symmetries of embedded complete bipartite graphs

CERFACS 42 av. Gaspard Coriolis, Toulouse, Cedex 1, France. Available at Date: April 2, 2008.

1) (A B) = A B ( ) 2) A B = A. i) A A = φ i j. ii) Additional Important Properties of Sets. De Morgan s Theorems :

10/04/18. P [P(x)] 1 negl(n).

Math 301: The Erdős-Stone-Simonovitz Theorem and Extremal Numbers for Bipartite Graphs

Goodness-of-fit for composite hypotheses.

Vanishing lines in generalized Adams spectral sequences are generic

Supplementary information Efficient Enumeration of Monocyclic Chemical Graphs with Given Path Frequencies

An intersection theorem for four sets

ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS. D.A. Mojdeh and B. Samadi

Quasi-Randomness and the Distribution of Copies of a Fixed Graph

On the Number of Rim Hook Tableaux. Sergey Fomin* and. Nathan Lulov. Department of Mathematics. Harvard University

SUFFICIENT CONDITIONS FOR MAXIMALLY EDGE-CONNECTED AND SUPER-EDGE-CONNECTED GRAPHS DEPENDING ON THE CLIQUE NUMBER

A Converse to Low-Rank Matrix Completion

Syntactical content of nite approximations of partial algebras 1 Wiktor Bartol Inst. Matematyki, Uniw. Warszawski, Warszawa (Poland)

Pushdown Automata (PDAs)

The Substring Search Problem

Secret Exponent Attacks on RSA-type Schemes with Moduli N = p r q

The Congestion of n-cube Layout on a Rectangular Grid S.L. Bezrukov J.D. Chavez y L.H. Harper z M. Rottger U.-P. Schroeder Abstract We consider the pr

New lower bounds for the independence number of sparse graphs and hypergraphs

A Short Combinatorial Proof of Derangement Identity arxiv: v1 [math.co] 13 Nov Introduction

On decompositions of complete multipartite graphs into the union of two even cycles

arxiv: v1 [math.co] 6 Mar 2008

Matrix Colorings of P 4 -sparse Graphs

Fixed Argument Pairing Inversion on Elliptic Curves

Approximation Algorithms and Hardness of the k-route Cut Problem

Approximation Algorithms and Hardness of the k-route Cut Problem

Auchmuty High School Mathematics Department Advanced Higher Notes Teacher Version

Approximation Algorithms and Hardness of the k-route Cut Problem

Lab #4: Newton s Second Law

Additive Approximation for Edge-Deletion Problems

Lecture 1.1: An introduction to groups

SPECTRAL SEQUENCES. im(er

C/CS/Phys C191 Shor s order (period) finding algorithm and factoring 11/12/14 Fall 2014 Lecture 22

Lecture 25: Pairing Based Cryptography

Compactly Supported Radial Basis Functions

ST 501 Course: Fundamentals of Statistical Inference I. Sujit K. Ghosh.

COLLAPSING WALLS THEOREM

Multiple Criteria Secretary Problem: A New Approach

MULTILAYER PERCEPTRONS

An upper bound on the number of high-dimensional permutations

THE NUMBER OF TWO CONSECUTIVE SUCCESSES IN A HOPPE-PÓLYA URN

The VC-dimension of Unions: Learning, Geometry and Combinatorics

Galois points on quartic surfaces

A NOTE ON ROTATIONS AND INTERVAL EXCHANGE TRANSFORMATIONS ON 3-INTERVALS KARMA DAJANI

16 Modeling a Language by a Markov Process

6 PROBABILITY GENERATING FUNCTIONS

Physics 211: Newton s Second Law

Solution to HW 3, Ma 1a Fall 2016

The Erdős-Hajnal conjecture for rainbow triangles

Math Notes on Kepler s first law 1. r(t) kp(t)

NOTE. Some New Bounds for Cover-Free Families

gr0 GRAPHS Hanan Samet

Construction Schemes for Fault-Tolerant Hamiltonian Graphs

Enumerating permutation polynomials

and the initial value R 0 = 0, 0 = fall equivalence classes ae singletons fig; i = 1; : : : ; ng: (3) Since the tansition pobability p := P (R = j R?1

Geometry of the homogeneous and isotropic spaces

Journal of Inequalities in Pure and Applied Mathematics

Constraint Satisfaction Problems

arxiv: v1 [math.co] 1 Apr 2011

On the Poisson Approximation to the Negative Hypergeometric Distribution

EM Boundary Value Problems

β β β β β B B B B o (i) (ii) (iii)

Query Complexity Lower Bounds for Reconstruction of Codes

A Relativistic Electron in a Coulomb Potential

Method for Approximating Irrational Numbers

Brief summary of functional analysis APPM 5440 Fall 2014 Applied Analysis

Math 124B February 02, 2012

Upper Bounds for Tura n Numbers. Alexander Sidorenko

JENSEN S INEQUALITY FOR DISTRIBUTIONS POSSESSING HIGHER MOMENTS, WITH APPLICATION TO SHARP BOUNDS FOR LAPLACE-STIELTJES TRANSFORMS

Duality between Statical and Kinematical Engineering Systems

Math 151. Rumbos Spring Solutions to Assignment #7

Suborbital graphs for the group Γ 2

Lifting Private Information Retrieval from Two to any Number of Messages

The r-bell Numbers. 1 Introduction

ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE

Randomized Complexity Classes

Measure Estimates of Nodal Sets of Polyharmonic Functions

2 S. Gao and M. A. Shokollahi opeations in Fq, and usually we will use the \Soft O" notation to ignoe logaithmic factos: g = O(n) ~ means that g = O(n

working pages for Paul Richards class notes; do not copy or circulate without permission from PGR 2004/11/3 10:50

RELIABILITY is an important concept in the design

Analytical Solutions for Confined Aquifers with non constant Pumping using Computer Algebra

THE CONE THEOREM JOEL A. TROPP. Abstract. We prove a fixed point theorem for functions which are positive with respect to a cone in a Banach space.

3.1 Random variables

Transcription:

INFR11102: Computational Complexity 22/11/2018 Lectue: Heng Guo Lectue 18: Gaph Isomophisms 1 An Athu-Melin potocol fo GNI Last time we gave a simple inteactive potocol fo GNI with pivate coins. We will show that it can also be achieved using only public coins. Theoem 1. GNI AM. We will take a moe quantitative appoach. Fo any gaph G with n vetices, let aut(g) = {π π(g) = G} be its automophism goup. Let iso(g) = {π(g) π S n } be the set of gaphs isomophic to G. Conside the set {(G, π) π S n }. Clealy π(g) iso(g), and each one appeas exactly aut(g) times. Namely, Now, fo G 1 and G 2, define n! = {(G, π) π S n } = aut(g) iso(g). S := {(G, σ) σ aut(g ), G = G1 o G = G2 }. Thus, if G 1 = G2, then S = n!, and othewise S = 2n!. To distinguish these two cases, once again we will use paiwise independent hash family. Let H be such a family fom S to T whee T is some abitay set of size 4n!. Fix a paticula element α T. Ou potocol is the following: 1. Athu picks a andom function H H and pesent it to Melin; 2. Melin etuns an element (G, σ) S and a pemutation τ; 3. Athu accepts if (1) τ(g ) = G 1 o G 2 ; (2) σ(g ) = G ; and (3) H(G, σ) = α. Note that the last veification step can be done easily in deteministic polynomial time. Conditions (1) and (2) veify that (G, σ) is indeed a element of S, and (3) assets a fact whose pobability to happen distinguishes the two scenaios of S. If S = n!, then by the definition of paiwise independent hash function, S P [ s S, H(s) = α] H H T = 1 4. 1

Othewise S = 2n!, then by inclusion-exclusion, P H H [ s S, H(s) = α] s S = S T P [H(s) = α] H H s,s S ) ( S 2 1 T 2 1 2 S 2 2 T 2 = 1 2 1 8 = 3 8. P [H(s) = H H H(s ) = α] Thus, we have ceated a constant gap in the accepting pobability between the two cases. We can employ the standad epeat and vote tick to amplify such a gap. Details of the amplification ae omitted. 2 Evidence against NP-completeness of gaph isomophisms Recall the gaph isomophism (GI) poblem. Since thee was no efficient algoithm, it is natual to wonde whethe the poblem is NP-complete. Howeve, this is also unlikely to be the case, unless the polynomial hieachy collapses. Theoem 2. If GI is NP-complete, then Σ p 2 = Π p 2. Poof. It is sufficient to show that if GI is NP-complete, then Σ p 2 Π p 2. Conside the QBF 2 poblem, which is complete fo Σ p 2 and whose input ae fomulas of the following fom: ψ = x y φ(x, y). Since by assumption, GI is NP-complete, GNI is conp-complete. Thus, thee is a eduction R( ) such that fixing x, ψ (x) := y φ(x, y) is valid if and only if R(ψ (x)) GNI. Last time, we showed that GNI AM and AM = AM 1 whee AM 1 is the one-sided eo vesion. Let P (x) := R(ψ (x)). Thus, by appopiate amplification, thee is a poly-time TM M such that P (x) GNI P [ z M(P (x),, z) = 1] = 1; P (x) GNI P [ z M(P (x),, z) = 1] 2 n 1, whee n = x and both and z all have length bounded by a polynomial in n. We claim that ψ is valid x z M(P (x),, z) = 1. (1) This implies the theoem. To veify (1), we have two cases: 2

1. If ψ is valid, then x such that P (x) GNI which implies that x z, M(P (x),, z) = 1. This implies that x z, M(R(ψ (x)),, z) = 1. 2. If ψ is not valid, then x, P (x) GNI. Thus, which implies, via the union bound, x P [ z M(P (x),, z) = 1] 2 n 1, P [ x z M(P (x),, z) = 1] x {0,1} n P [ z M(P (x),, z) = 1] 2 n 2 n 1 = 1/2 < 1. In othe wods, P [ x z M(P (x),, z) = 0] > 0. The pobabilistic method implies that x z M(P (x),, z) = 0 ( x z M(P (x),, z) = 1). If we look moe caefully at the poof of Theoem 2, the only cucial popety of GNI we used is that GNI AM. Coollay 3. If conp AM, then Σ p 2 = Π p 2. Recall that NP AM Π p 2. Coollay 3 implies that AM sits in an inteesting position at the complexity landscape. 3 Counting gaph isomophisms We have seen that some decision poblems in P have #P-complete counting countepats. One natual question is that whethe the counting vesion of GI is easy o had. Name: #GI Input: Two gaphs G 1 and G 2. Output: How many pemutations ae thee to make G 1 identical to G 2? Clealy #GI is no easie than GI. complexity. Next we show that they actually have the same Theoem 4. #GI t GI. To show Theoem 4, we need an intemediate poblem. Recall that aut(g) is the automophism goup of a gaph G. 3

Name: #Aut Input: A gaph G. Output: aut(g) Lemma 5. #Aut t GI. Poof. Let G = (V, E) be a gaph with V = n. Conside a paticula vetex v V. Let C v (G) := {π(v) π aut(g)} be the set of vetices that v can map to via an automophism, and let S v (G) := {π π aut(g) and π(v) = v} be the set of automophisms fixing v. Basic goup theoy implies that aut(g) = C v (G) S v (G). One way to undestand this fact is by choosing a π u fo each u C v (G) such that π u aut(g) and π u (v) = u. Evey π aut(g) can be uniquely decomposed into π u σ whee σ S v. The claim follows. Next we will compute C v (G) and S v (G) sepaately. We go though evey vetex u V using the GI oacle to detemine whethe an automophism exists mapping v to u. To do so, let H be a igid gaph with n + 1 vetices such that aut(h) contains only the identity. 1 Constuct G v by taking a copy of G and a copy of H, and then gluing v G to an abitay vetex w H. Similaly, constuct G u by gluing u to w. We ask the GI oacle whethe G v = Gu. Since vetices in H must map to vetices in H (H has one moe vetex than G), such an isomophism exists if and only if v is mapped to u. Namely G v = Gu if and only if u C v (G). We still need to count S v (G). The idea is to use self-educibility. Namely we want to tansfom it into a smalle instance of #Aut itself. In fact, we claim that S v (G) = aut(g v ). The eason is the same as above, namely that all vetices in the copy of H can only map to vetices in H, and H has only one automophism. Although G v contains 2n vetices, n + 1 of them can only map to themselves. Hence, the numbe of fee vetices in G v is n 1. Let v 1 := v, and to continue, we pick an abitay fee vetex. Call it v 2, and we poceed to compute C v2 (G v1 ). Namely, we attach a igid gaph H of size 2n + 1 to v 2 to get G v1,v 2 and go though all vetices in V \ {v 1, v 2 } to detemine thei membeship in C v2 (G v1 ) using the GI oacle. Then we ecusively compute S v2 (G v1 ). This ecusion can only go down n steps. In fact, we constuct a sequence of gaphs G v1, G v1,v 2,, G v1,...,v n 1, each one fixing one moe vetex and having polynomial size. It can be veified that This finishes the poof. aut(g) = C v1 (G) C v2 (G v1 ) Cvn (G v1,...,v n 1 ). Now we ae eady to pove Theoem 4. Poof of Theoem 4. We fist use the GI oacle to test whethe G 1 = G2. If not, then we etun 0. Othewise, we compute the numbe of automophisms of G 1 using Lemma 5. We claim that this is also the numbe of isomophisms fom G 1 to G 2. 1 Such gaphs do exist! 4

To be moe specific, let iso(g 1, G 2 ) := {π π(g 1 ) = G 2 }. Ou claim is that iso(g 1, G 2 ) = aut(g 1 ) if G 1 = G2. Fix an abitay pemutation π 0 iso(g 1, G 2 ). Fo any σ iso(g 1 ), it is easy to see that π 0 σ(g 1 ) = π(g 1 ) = G 2. Thus, π 0 σ iso(g 1, G 2 ). It implies that π 0 aut(g 1 ) iso(g 1, G 2 ). On the othe hand, fo each π iso(g 1, G 2 ), we have that π0 1 π (G 1 ) = π0 1 (G 2 ) = G 1. Thus, π0 1 π aut(g 1 ), namely π = π 0 σ fo some σ aut(g 1 ). It implies that iso(g 1, G 2 ) π 0 aut(g 1 ). To summaize, we have that iso(g 1, G 2 ) = π 0 aut(g 1 ). Taking the cadinality on the both sides yields the claim. Remak (Bibliogaphic). Theoem 2 was fist shown by Boppana, Håstad, and Zachos [BHZ87]. Relevant chaptes ae [AB09, Chapte 8.2]. Refeences [AB09] Sanjeev Aoa and Boaz Baak. Computational Complexity - A Moden Appoach. Cambidge Univesity Pess, 2009. [BHZ87] Ravi B. Boppana, Johan Håstad, and Stathis Zachos. Does co-np have shot inteactive poofs? Inf. Pocess. Lett., 25(2):127 132, 1987. 5