-bit integers are all in ThC. Th The following problems are complete for PSPACE NPSPACE ATIME QSAT, GEOGRAPHY, SUCCINCT REACH.

Similar documents
INAPPROX APPROX PTAS. FPTAS Knapsack P

Interactive Proofs. Merlin-Arthur games (MA) [Babai] Decision problem: D;

Definition: Alternating time and space Game Semantics: State of machine determines who

Definition: Alternating time and space Game Semantics: State of machine determines who

6.045: Automata, Computability, and Complexity (GITCS) Class 17 Nancy Lynch

Limits to Approximability: When Algorithms Won't Help You. Note: Contents of today s lecture won t be on the exam

Lecture 12: Interactive Proofs

PROBABILISTIC COMPUTATION. By Remanth Dabbati

Computational Complexity

Lecture 19: Interactive Proofs and the PCP Theorem

Notes on Complexity Theory Last updated: November, Lecture 10

Great Theoretical Ideas in Computer Science

Computer Sciences Department

Lecture 11: Proofs, Games, and Alternation

CS151 Complexity Theory. Lecture 13 May 15, 2017

Umans Complexity Theory Lectures

Time and space classes

CSC 373: Algorithm Design and Analysis Lecture 30

POLYNOMIAL SPACE QSAT. Games. Polynomial space cont d

Essential facts about NP-completeness:

Lecture 23: More PSPACE-Complete, Randomized Complexity

Randomized Complexity Classes; RP

Chapter 5 : Randomized computation

Lecture 5. 1 Review (Pairwise Independence and Derandomization)

20.1 2SAT. CS125 Lecture 20 Fall 2016

CS154, Lecture 15: Cook-Levin Theorem SAT, 3SAT

Lecture 18: PCP Theorem and Hardness of Approximation I

Chapter 6 Randomization Algorithm Theory WS 2012/13 Fabian Kuhn

1 PSPACE-Completeness

Complete problems for classes in PH, The Polynomial-Time Hierarchy (PH) oracle is like a subroutine, or function in

Lecture 15: A Brief Look at PCP

Lecture 22: Oct 29, Interactive proof for graph non-isomorphism

A Short History of Computational Complexity

The power and weakness of randomness (when you are short on time) Avi Wigderson Institute for Advanced Study

CSCI3390-Second Test with Solutions

Randomness and non-uniformity

Umans Complexity Theory Lectures

Lecture 26. Daniel Apon

Lecture Notes Each circuit agrees with M on inputs of length equal to its index, i.e. n, x {0, 1} n, C n (x) = M(x).

Lecture 3: Nondeterminism, NP, and NP-completeness

6.045J/18.400J: Automata, Computability and Complexity Final Exam. There are two sheets of scratch paper at the end of this exam.

Lecture 26: Arthur-Merlin Games

2 Evidence that Graph Isomorphism is not NP-complete

2 Natural Proofs: a barrier for proving circuit lower bounds

Umans Complexity Theory Lectures

Intro to Theory of Computation

Lecture 17: Interactive Proof Systems

6.045 Final Exam Solutions

Does randomness solve problems? Russell Impagliazzo UCSD

Exponential time vs probabilistic polynomial time

CS151 Complexity Theory. Lecture 14 May 17, 2017

NP and Computational Intractability

COP 4531 Complexity & Analysis of Data Structures & Algorithms

Algorithms Design & Analysis. Approximation Algorithm

1 Randomized Computation

Lecture 14: IP = PSPACE

CS151 Complexity Theory. Lecture 1 April 3, 2017

Lecture 23: Introduction to Quantum Complexity Theory 1 REVIEW: CLASSICAL COMPLEXITY THEORY

Quantum Computing Lecture 8. Quantum Automata and Complexity

CSC 5170: Theory of Computational Complexity Lecture 4 The Chinese University of Hong Kong 1 February 2010

Lecture 20: PSPACE. November 15, 2016 CS 1010 Theory of Computation

CSC 5170: Theory of Computational Complexity Lecture 5 The Chinese University of Hong Kong 8 February 2010

NP Complete Problems. COMP 215 Lecture 20

Lecture 19: Finish NP-Completeness, conp and Friends

SOLUTION: SOLUTION: SOLUTION:

Complexity Theory. Knowledge Representation and Reasoning. November 2, 2005

6.840 Language Membership

Beyond NP [HMU06,Chp.11a] Tautology Problem NP-Hardness and co-np Historical Comments Optimization Problems More Complexity Classes

(x 1 +x 2 )(x 1 x 2 )+(x 2 +x 3 )(x 2 x 3 )+(x 3 +x 1 )(x 3 x 1 ).

Computational Complexity: A Modern Approach

Automata Theory CS Complexity Theory I: Polynomial Time

Computational Complexity Theory

Chapter 7 Randomization Algorithm Theory WS 2017/18 Fabian Kuhn

Pr[X = s Y = t] = Pr[X = s] Pr[Y = t]

CSCI 1590 Intro to Computational Complexity

The running time of Euclid s algorithm

The P versus NP Problem. Ker-I Ko. Stony Brook, New York

Applied Cryptography and Computer Security CSE 664 Spring 2018

conp, Oracles, Space Complexity

Probabilistically Checkable Proofs. 1 Introduction to Probabilistically Checkable Proofs

6-1 Computational Complexity

CS21 Decidability and Tractability

A An Overview of Complexity Theory for the Algorithm Designer

Lecture 9: PSPACE. PSPACE = DSPACE[n O(1) ] = NSPACE[n O(1) ] = ATIME[n O(1) ]

Approximate Verification

Zero-Knowledge Proofs and Protocols

Lecture 17: Cook-Levin Theorem, NP-Complete Problems

Computability and Complexity Theory: An Introduction

CS 151 Complexity Theory Spring Solution Set 5

CSCI 1590 Intro to Computational Complexity

Introduction to Quantum Information Processing QIC 710 / CS 768 / PH 767 / CO 681 / AM 871

Notes on Complexity Theory Last updated: October, Lecture 6

COMPUTATIONAL COMPLEXITY

CS154, Lecture 18: 1

Theoretical Computer Science 2

fsat We next show that if sat P, then fsat has a polynomial-time algorithm. c 2010 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 425

Factorization & Primality Testing

Complexity Classes V. More PCPs. Eric Rachlin

Principles of Knowledge Representation and Reasoning

CPSC 467b: Cryptography and Computer Security

Transcription:

CMPSCI 601: Recall From Last Time Lecture 26 Theorem: All CFL s are in sac. Facts: ITADD, MULT, ITMULT and DIVISION on -bit integers are all in ThC. Th The following problems are complete for PSPACE NPSPACE ATIME : QSAT, GEOGRAPHY, SUCCINCT REACH. 1

CMPSCI 601: Barrington s Theorem Lecture 26 A permutation of a finite set is a one-to-one onto function from to itself, The composition of two permutations is the permutation we get by performing first one and then the next. Composition is not commutative the set of all permutations of five elements form the noncommutative group with composition as the operation. The iterated multiplication problem ( -MULT) is to input elements of (in order) and determine their composition. (As a language, it is the set of pairs such that,, and multiplies to.) Clearly a DFA can carry out the sequence of multiplications, so -MULT is a regular language. Theorem 26.1 -MULT is complete for NC. Specifically, if is an -input circuit of depth and fan-in two, we can take a string of length and construct a sequence of permutations that multiplies to a nonidentity permutation iff. 2

Notation: A five-cycle is the permutation that takes to, to, to, to, and to, where a,b,c,d,e = 1,2,3,4,5. Lemma: There exist five-cycles and such that is a five-cycle. (This permutation is called the commutator of and.) Proof:. Fact: (basic group theory) If and are both fivecycles, then for some permutation. 3

Proof: (of Barrington s Theorem) Use induction on the depth of the circuit. For each gate we ll construct a sequence such that evaluates to the five-cycle if evaluates to 1 and evaluates to the identity otherwise. By the Fact, if we can get one five-cycle we can get any other with a sequence of the same length. Base Case: and the gate is an input. Look up the literal and let consist of one permutation, if the literal is true and the identity if it is false. NOT Gates: If is the NOT of, compose with. This gives the identity if is true and if is false. Using the Fact, normalize to give if is true and the identity if is false. 4

AND Gates: Suppose is the AND of and and each of and have depth. Using and, we construct four sequences of length each: yields if is true and the identity otherwise, yields if is true and the identity otherwise, yields if is true and the identity otherwise, and yields if is true and the identity otherwise. Calculation: yields if and are both true, and the identity otherwise. Conclusion: If is a depth circuit, we get a sequence of length, which is polynomial. We have reduced the circuit evaluation problem to an - MULT instance that is only polynomial size. 5

An Application to PSPACE Fact: PSPACE is characterized by circuits of polynomial depth. Corollary: Any PSPACE problem can be reduced to an instance of -MULT of length. Corollary: (Cai-Furst) Any PSPACE problem can be solved by a log-space Turing machine that: has access to a read-only clock wipes its entire working memory every poly-many steps, except for three safe bits. 6

CMPSCI 601: Randomization Lecture 26 We see in an algorithms course that it is sometimes to our advantage to use randomness in solving a problem. For example, Quicksort has good average-case but bad worst-case behavior. Flipping our own coins can (with high probability) keep us out of the bad cases. In a competitive situation we may be worried about our opponent predicting our move. Flipping our own coins may make this impossible and guarantee us some minimum level of expected success. Random sampling of a large space may give us a good idea of the results of an impractically large exhaustive search. There is a large body of mathematics telling us what inferences we may reliably make from such sampling. 7

Is randomness a powerful tool in general? In complexity theory we attack this question by looking at problems where randomization seems practical, and comparing classes of such problems to deterministic and nondeterministic classes. In a moment, we ll look at primality testing, which until recently was the most famous example of a problem that could be solved in polynomial time with high probability by a randomized algorithm, but which was not known to be in. This example has been taken from us, however, by Agarwal, Saxena, and Kayal, who in 2002 gave a deterministic algorithm to test a number for primality in polynomial time. [P] gives two other interesting randomized algorithms: Testing whether a matrix of polynomials has determinant identically zero, and Using a random walk through the space of settings to find a satisfying instance of a 2-CNF formula 8

CMPSCI 601: The Primality Problem Lecture 26 PRIME N is prime Proposition 26.2 PRIME NP Proof: PRIME Question: Is PRIME NP? 9

Fact 26.3 (Fermat s Little Theorem): Let be prime and, then, Z GCD is the multiplicative group of integers mod that are relatively prime to. Euler s Phi: Z is the prime fac- Proposition 26.4 If torizaton of, then Theorem 26.5 (Euler s Theorem): For any and any Z, 10

Fact 26.6 Let be prime. Then Z of order. That is, Z is a cyclic group PRIME Z ord 11

Theorem 26.7 [Pratt] PRIME Proof: Given, NP. 1. Guess, 2. Check 3. Guess prime factorization, by repeated squaring. 4. Check for, mod 5. Recursively check that are prime. Corollary 26.8 PRIME and Factoring are in NP co-np. 12

CS601/CM730-A: More Primality Testing Lecture 26 Let Z is a quadratic residue mod iff, For prime let, if is a quadratic residue mod otherwise Generalize to when is not prime, 13

Fact 26.9 [Gauss](Quadratic Reciprocity) For odd, if if if if or and or or 14

This 200-year-old result gives us an efficient way to calculate, that uses time polynomial in the length of. Fact 26.10 [Gauss] For prime, Z, mod Fact 26.11 If Z is not prime then, mod Solovay-Strassen Primality Algorithm: 1. Input is odd number 2. For to do 3. choose at random 4. if GCD return( not prime ) 5. if 6. 7. return( probably prime ) mod return( not prime ) 15

Theorem 26.12 Suppose we run Solovay-Strassen on a number. Then: If is prime then the answer is always probably prime. If is not prime, then the probability of probably prime is less than. Corollary 26.13 PRIME Truly Feasible 16

The new Agarwal-Saxena-Kayal algorithm is a great theoretical achievement (solving an open problem dating back to at least 1970) but is not the best way in practice to test primality. Solovay-Strassen (or the related Miller- Rabin algorithm) runs faster and gives you numbers that are reasonably certain to be prime. If you want a prime of a given size, you generate random numbers until you get one that passes the test many times. There are enough primes so that you can expect this not to take too long. FACTORING is still believed to be hard for conventional computation. But there is a 1994 algorithm due to Shor that solves FACTORING in poly time on a quantum computer. Only very small quantum computers have so far been built, but one of them has successfully factored the number 15 using something like Shor s method. 17

CS601/CM730-A: Randomized Classes Lecture 26 What does it mean for a problem to be solvable in random polynomial time? We can define a probabilistic TM easily enough by having an NDTM flip a coin for each of its classes. There are then four different polytime complexity classes defined in the literature! We define Prob to be the probability that accepts. Remember that is in NP if there exists such that Prob iff. The new classes have similar definitions: is in RP if there exists such that Prob for all and Prob for all. is in ZPP if both and are in RP. is in BPP if there exists such that Prob for all and Prob for all. is in PP if there exists such that Prob iff. 18

CS601/CM730-A: Amplification Lecture 26 Which of these classes are practical? After all, you don t want to put up with a significant probability of a wrong answer. RP, the class generalizing the Solovay-Strassen primality algorithm, is pretty good. As we ve seen, repeated independent trials can reduce our error probability to exponentially small. ZPP is even better in one sense, because if we try both RP algorithms repeatedly, in a constant expected number of trials we will get a guaranteed answer. This is historically called a Las Vegas algorithm (provably correct, probably fast) as opposed to an RP or BPP Monte Carlo algorithm (probably correct, provably fast). PP, on the other hand, is completely useless in practice. If the probability of acceptance is very very close to, the number of trials needed to make a statistical prediction of whether it is over or under 1/2 could be exponential. 19

But for BPP we are in good shape! Proposition 26.14 If BPP then there is a probabilistic, polynomial-time algorithm such that for all and all inputs of length n, if then Prob if then Prob Proof: Iterate polynomially many times and answer with the majority. The probability the mean is off by decreases exponentially with the formal proof uses Chernoff bounds. 20

Is BPP equal to P??? Probably, because pseudo-random number generators are good. It s probably possible to build a poly-time deterministic generator that gives numbers that are indistinguishable from random to any poly-time procedure. Such a generator would allow us to derandomize BPP. It s not hard to show that if a language is in BPP, it has non-uniform poly-size circuits, i.e., it is in the nonuniform class PSIZE. This is because if we make the probability small enough that a random string causes the BPP algorithm to be wrong on a given input, we can ensure that some string exists that is right on all inputs. There exists a circuit that has this string hard-wired into it. 21

CMPSCI 601: Undirected Reachability Lecture 26 REACH undirected s T H HH TT b HT TH HH TT d TH HT H t T HH HT a TH TT H s TH HT T c HH TT H e T f H T Fact 26.15 Let be the expected number of steps in a random walk to visit all vertices in connected graph, starting from. Then, Corollary 26.16 REACH BPL 22

s a b c d e f t A look at this directed graph should convince you that a random walk on it is not likely to reach all vertices in polynomial time. To get to vertex from you would have to guess right about times in a row. It s very plausible that REACH is in L, and one might hope to prove it by derandomizing the random walk. (There must exist a single sequence of choices of size that visits every node of any undirected labelled -node graph.) But randomization doesn t seem to help much with the general REACH problem. 23

CMPSCI 601: Interactive Proofs Lecture 26 [Goldwasser, Micali, Rackoff], [Babai] Decision problem: ; input string: Two players: Prover Merlin is computationally all-powerful. Wants to convince Verifier that. Verifier Arthur: probabilistic polynomial-time TM. Wants to know the truth about whether. 24

Input = 0. has has 1. flip, compute 2. 3. flip, compute 4...... flip, accept or reject 25

Definition 26.17 IP iff there is such a polynomialtime interactive protocol 1. If, then there exists a strategy for Prob accepts 2. If, then for all strategies for Prob accepts Observation 26.18 Iterating makes probabilities of error exponentially small. Special Cases of IP: Deterministic Arthur = NP No Merlin = BPP 26

Graph Non-Isomorphism AM Input =, 0. has 1. flip flip 2. 3. accept iff has Proposition 26.19 Graph Non-Isomorphism AM Proof: If, then will accept with probability 1. If, then will accept with probability. Corollary 26.20 If Graph Isomorphism is NP-complete then PH collapses to. 27

Fact 26.21 Shamir s Theorem: IP PSPACE proof that IP PSPACE: Evaluate the game tree. For s moves choose the maximum value. For s moves choose the average value. A M M M A A A A A A M M M M M M M M A A A A A A A A A A A A A A A A Hard Direction: Construct an interactive proof that a string is in QSAT. There are proofs in [P] and in Sipser. 28

CMPSCI 601: Checkable Proofs Lecture 26 Any decision problem NP has a deterministic, polynomialtime verifier. By adding randomness to the verifier, we can greatly restrict its computational power and the number of bits of that it needs to look at, while still enabling it to accept all of NP. We say that a verifier is -restricted iff for all inputs of size, and all proofs, uses at most random bits and examines at most bits of its proof,. Let PCP accepted by be the set of boolean queries that are -restricted verifiers. Fact 26.22 (PCP Theorem) NP PCP The proof of this theorem is pretty messy, certainly more than we can deal with here. But we can look at the applications of the PCP Theorem to approximation problems. 29

MAX- -SAT: Given a 3CNF formula, find a truth assignment that maximizes the number of true clauses. Proposition 26.23 MAX- -SAT has a polynomial-time approximation algorithm. Proof: Be greedy, set each variable in turn to the better value. You can do better a random assignment gets 7/8 of the clauses. Open for Years: Assuming NP P is there some, s.t. MAX- -SAT has no PTIME -approximation algorithm? 30

Theorem 26.24 The PCP theorem (NP is equivalent to the fact that If P NP, then For some,, PCP MAX- -SAT has no polynomial-time, -approximation algorithm. ) Fact 26.25 MAX- -SAT has a PTIME approximation algorithm with and no better ratio can be achieved unless P NP. References: Approximation Algorithms for NP Hard Problems, Dorit Hochbaum, ed., PWS, 1997. Juraj Hromkovic, Algorithmics for Hard Problems, Springer, 2001. Sanjeev Arora, The Approximability of NP-hard Problems, STOC 98, www.cs.princeton.edu/ arora. 31