Majority is incompressible by AC 0 [p] circuits

Similar documents
CS Communication Complexity: Applications and New Directions

Kernelization Lower Bounds: A Brief History

1 Randomized Computation

Conspiracies between Learning Algorithms, Lower Bounds, and Pseudorandomness

CS151 Complexity Theory. Lecture 14 May 17, 2017

Efficient Probabilistically Checkable Debates

Communication vs. Computation

Addition is exponentially harder than counting for shallow monotone circuits

Instance Compression for the Polynomial Hierarchy and Beyond

Evidence that the Diffie-Hellman Problem is as Hard as Computing Discrete Logs

Unprovability of circuit upper bounds in Cook s theory PV

Questions Pool. Amnon Ta-Shma and Dean Doron. January 2, Make sure you know how to solve. Do not submit.

Journal of Computer and System Sciences

Probabilistically Checkable Arguments

Incompressible Functions, Relative-Error Extractors, and the Power of Nondeterminsitic Reductions

Lecture 16: Communication Complexity

On the Average-case Complexity of MCSP and Its Variants. Shuichi Hirahara (The University of Tokyo) Rahul Santhanam (University of Oxford)

Notes on Complexity Theory Last updated: November, Lecture 10

Fourier analysis of boolean functions in quantum computation

Lecture 19: Interactive Proofs and the PCP Theorem

COMMUNICATION VS. COMPUTATION

Some Depth Two (and Three) Threshold Circuit Lower Bounds. Ryan Williams Stanford Joint work with Daniel Kane (UCSD)

Arthur-Merlin Streaming Complexity

On the Randomness Complexity of. Efficient Sampling. Bella Dubrov

Inaccessible Entropy and its Applications. 1 Review: Psedorandom Generators from One-Way Functions

Interactive Proofs. Merlin-Arthur games (MA) [Babai] Decision problem: D;

Asymmetric Communication Complexity and Data Structure Lower Bounds

Kernel-Size Lower Bounds. The Evidence from Complexity Theory

Competing Provers Protocols for Circuit Evaluation

Notes for Lecture 3... x 4

Lecture 19: Public-key Cryptography (Diffie-Hellman Key Exchange & ElGamal Encryption) Public-key Cryptography

Edinburgh Research Explorer

: On the P vs. BPP problem. 18/12/16 Lecture 10

Certifying polynomials for AC 0 [ ] circuits, with applications

CS151 Complexity Theory. Lecture 9 May 1, 2017

Satisfiability Allows No Nontrivial Sparsification Unless The Polynomial-Time Hierarchy Collapses

Introduction to Interactive Proofs & The Sumcheck Protocol

Finite fields, randomness and complexity. Swastik Kopparty Rutgers University

Introduction to Cryptography Lecture 13

Rational Proofs with Multiple Provers. Jing Chen, Samuel McCauley, Shikha Singh Department of Computer Science

Interactive PCP. Yael Tauman Kalai Georgia Institute of Technology Ran Raz Weizmann Institute of Science

Lecture 26. Daniel Apon

CS Foundations of Communication Complexity

Lecture Notes Each circuit agrees with M on inputs of length equal to its index, i.e. n, x {0, 1} n, C n (x) = M(x).

Local Reductions. September Emanuele Viola Northeastern University

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

CS 151 Complexity Theory Spring Solution Set 5

arxiv: v1 [cs.cc] 30 Apr 2015

2 Natural Proofs: a barrier for proving circuit lower bounds

Lecture 11: Proofs, Games, and Alternation

In Search of an Easy Witness: Exponential Time vs. Probabilistic Polynomial Time

Meta-Algorithms vs. Circuit Lower Bounds Valentine Kabanets

arxiv: v1 [cs.cc] 3 Nov 2016

Making Hard Problems Harder

Limits of Minimum Circuit Size Problem as Oracle

Lecture 29: Computational Learning Theory

Complete problems for classes in PH, The Polynomial-Time Hierarchy (PH) oracle is like a subroutine, or function in

On the Compressibility of N P Instances and Cryptographic Applications

Notes on Computer Theory Last updated: November, Circuits

CSC 5170: Theory of Computational Complexity Lecture 9 The Chinese University of Hong Kong 15 March 2010

Circuits. Lecture 11 Uniform Circuit Complexity

compare to comparison and pointer based sorting, binary trees

CSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds

Optimal Error Rates for Interactive Coding II: Efficiency and List Decoding

Lecture 15 - Zero Knowledge Proofs

Limits on the Efficiency of One-Way Permutation-Based Hash Functions

Lecture Notes 20: Zero-Knowledge Proofs

Exponential time vs probabilistic polynomial time

Limitations of Efficient Reducibility to the Kolmogorov Random Strings

Lecture 3: AC 0, the switching lemma

Two Query PCP with Sub-Constant Error

CS286.2 Lecture 8: A variant of QPCP for multiplayer entangled games

An exponential separation between quantum and classical one-way communication complexity

Non-Approximability Results (2 nd part) 1/19

Stochasticity in Algorithmic Statistics for Polynomial Time

Lecture 12: Interactive Proofs

Locating Linear Decision Lists within TC 0

Electronic Colloquium on Computational Complexity, Report No. 31 (2007) Interactive PCP

Lecture 28: Public-key Cryptography. Public-key Cryptography

1 Circuit Complexity. CS 6743 Lecture 15 1 Fall Definitions

Arthur and Merlin as Oracles

Advanced Cryptography Quantum Algorithms Christophe Petit

Notes for Lecture 3... x 4

Lecture 15: A Brief Look at PCP

A Framework for Non-Interactive Instance-Dependent Commitment Schemes (NIC)

Complexity of Finding a Duplicate in a Stream: Simple Open Problems

Shamir s Theorem. Johannes Mittmann. Technische Universität München (TUM)

Notes for Lecture 11

Lecture 18: PCP Theorem and Hardness of Approximation I

DD2446 Complexity Theory: Problem Set 4

Lecture 5, CPA Secure Encryption from PRFs

CS Introduction to Complexity Theory. Lecture #11: Dec 8th, 2015

1 Nisan-Wigderson pseudorandom generator

arxiv: v1 [cs.cc] 22 Aug 2018

A note on exponential circuit lower bounds from derandomizing Arthur-Merlin games

PRGs for space-bounded computation: INW, Nisan

On the Cryptographic Complexity of the Worst Functions

Lecture 5: Pseudo-Random Generators and Pseudo-Random Functions

On Quantum vs. Classical Communication Complexity

On the correlation of parity and small-depth circuits

Transcription:

Majority is incompressible by AC 0 [p] circuits Igor Carboni Oliveira Columbia University Joint work with Rahul Santhanam (Univ. Edinburgh) 1

Part 1 Background, Examples, and Motivation 2

Basic Definitions AC 0 d circuits: polynomial size circuits of depth d containing unbounded fan-in AND, OR, NOT gates. size = number of wires. AC 0 d[p] circuits: allow mod p gates in the previous model (p prime). We have mod p (z 1,..., z m ) = 1 if and only if p j z j. Majority = {Majority n } n N, where Majority n : {0, 1} n {0, 1}. Majority n (x 1,..., x n ) = 1 if and only if i x i n/2. 3

Basic Definitions AC 0 d circuits: polynomial size circuits of depth d containing unbounded fan-in AND, OR, NOT gates. size = number of wires. AC 0 d[p] circuits: allow mod p gates in the previous model (p prime). We have mod p (z 1,..., z m ) = 1 if and only if p j z j. Majority = {Majority n } n N, where Majority n : {0, 1} n {0, 1}. Majority n (x 1,..., x n ) = 1 if and only if i x i n/2. 3

Basic Definitions AC 0 d circuits: polynomial size circuits of depth d containing unbounded fan-in AND, OR, NOT gates. size = number of wires. AC 0 d[p] circuits: allow mod p gates in the previous model (p prime). We have mod p (z 1,..., z m ) = 1 if and only if p j z j. Majority = {Majority n } n N, where Majority n : {0, 1} n {0, 1}. Majority n (x 1,..., x n ) = 1 if and only if i x i n/2. 3

Basic Results Razborov/Smolensky (1987). If Majority is computed by AC 0 d[p] circuits then d = Ω(log n/ log log n). This lower bound is optimal. No explicit lower bounds for poly size circuits beyond depth log n/ log log n. Technique does not generalize to modulo m gates, where m = p q. As far as we know, it is possible that NP AC 0 3[6] (linear size). 4

Basic Results Razborov/Smolensky (1987). If Majority is computed by AC 0 d[p] circuits then d = Ω(log n/ log log n). This lower bound is optimal. No explicit lower bounds for poly size circuits beyond depth log n/ log log n. Technique does not generalize to modulo m gates, where m = p q. As far as we know, it is possible that NP AC 0 3[6] (linear size). 4

Basic Results Razborov/Smolensky (1987). If Majority is computed by AC 0 d[p] circuits then d = Ω(log n/ log log n). This lower bound is optimal. No explicit lower bounds for poly size circuits beyond depth log n/ log log n. Technique does not generalize to modulo m gates, where m = p q. As far as we know, it is possible that NP AC 0 3[6] (linear size). 4

This Talk Understand structure of polynomial-size circuits with mod p gates computing Majority. Follows from the investigation of more general framework: Interactive Compression Games. Hybridizes computational complexity and communication complexity. 5

This Talk Understand structure of polynomial-size circuits with mod p gates computing Majority. Follows from the investigation of more general framework: Interactive Compression Games. Hybridizes computational complexity and communication complexity. 5

Example: Boolean circuits for symmetric functions Idea. Boolean circuits can process log n bits very efficiently. Every f : {0, 1} log n {0, 1} computed by CNF/DNF of size n. Circuit for Majority n (x). Computes O(log n)-bit string counting #1 s in x. Partition input bits into (log n)-bit blocks, produce (log log n)-bit strings from each block. In each layer, reduces number of strings by a factor of roughly log n. 6

Example: Boolean circuits for symmetric functions Idea. Boolean circuits can process log n bits very efficiently. Every f : {0, 1} log n {0, 1} computed by CNF/DNF of size n. Circuit for Majority n (x). Computes O(log n)-bit string counting #1 s in x. Partition input bits into (log n)-bit blocks, produce (log log n)-bit strings from each block. In each layer, reduces number of strings by a factor of roughly log n. 6

Example: Boolean circuits for symmetric functions Idea. Boolean circuits can process log n bits very efficiently. Every f : {0, 1} log n {0, 1} computed by CNF/DNF of size n. Circuit for Majority n (x). Computes O(log n)-bit string counting #1 s in x. Partition input bits into (log n)-bit blocks, produce (log log n)-bit strings from each block. In each layer, reduces number of strings by a factor of roughly log n. 6

Example: Boolean circuits for symmetric functions Lemma. For every d 1, we obtain an AC 0 d circuit with n/(log n) (d 1) o(1) output wires encoding #1 s in x. n input bits processed in O(log log n n) = O(log n/ log log n) stages. We will revisit this construction later in the talk. 7

Example: Boolean circuits for symmetric functions Lemma. For every d 1, we obtain an AC 0 d circuit with n/(log n) (d 1) o(1) output wires encoding #1 s in x. n input bits processed in O(log log n n) = O(log n/ log log n) stages. We will revisit this construction later in the talk. 7

Interactive Compression Games (Chattopadhyay and Santhanam, 2012) Fix a circuit class C and a Boolean function f. We define a communication game between Alice and Bob. Alice knows the input x {0, 1} n, but her computations are limited to C. Bob is computationally unbounded, but has no access to x. Goal: Players must interact in order to compute f (x). Minimize total number of bits sent by Alice. f / C C-compression game for f is nontrivial. 8

Interactive Compression Games (Chattopadhyay and Santhanam, 2012) Fix a circuit class C and a Boolean function f. We define a communication game between Alice and Bob. Alice knows the input x {0, 1} n, but her computations are limited to C. Bob is computationally unbounded, but has no access to x. Goal: Players must interact in order to compute f (x). Minimize total number of bits sent by Alice. f / C C-compression game for f is nontrivial. 8

Interactive Compression Games (Chattopadhyay and Santhanam, 2012) Fix a circuit class C and a Boolean function f. We define a communication game between Alice and Bob. Alice knows the input x {0, 1} n, but her computations are limited to C. Bob is computationally unbounded, but has no access to x. Goal: Players must interact in order to compute f (x). Minimize total number of bits sent by Alice. f / C C-compression game for f is nontrivial. 8

Interactive Compression Games Formally: A C-bounded protocol Π n = C (1),..., C (r), f (1),..., f (r 1), E n with r = r(n) rounds consists of a sequence of C-circuits for Alice, a strategy for Bob, given by functions f (1),..., f (r 1), and a set of accepting transcripts E n. Every protocol Π n has its signature(π n ) = (n, s 1, t 1, s 2,..., t r 1, s r ), which is the sequence corresponding to the input size n = x and the length of the messages exchanged by Alice and Bob during the protocol. Π n solves the compression game of a function h n : {0, 1} n {0, 1} if h(x) = 1 transcript Πn (x) E n. Finally, we let cost(π n ) = s 1 +... + s r. 9

Interactive Compression Games Formally: A C-bounded protocol Π n = C (1),..., C (r), f (1),..., f (r 1), E n with r = r(n) rounds consists of a sequence of C-circuits for Alice, a strategy for Bob, given by functions f (1),..., f (r 1), and a set of accepting transcripts E n. Every protocol Π n has its signature(π n ) = (n, s 1, t 1, s 2,..., t r 1, s r ), which is the sequence corresponding to the input size n = x and the length of the messages exchanged by Alice and Bob during the protocol. Π n solves the compression game of a function h n : {0, 1} n {0, 1} if h(x) = 1 transcript Πn (x) E n. Finally, we let cost(π n ) = s 1 +... + s r. 9

Interactive Compression Games Formally: A C-bounded protocol Π n = C (1),..., C (r), f (1),..., f (r 1), E n with r = r(n) rounds consists of a sequence of C-circuits for Alice, a strategy for Bob, given by functions f (1),..., f (r 1), and a set of accepting transcripts E n. Every protocol Π n has its signature(π n ) = (n, s 1, t 1, s 2,..., t r 1, s r ), which is the sequence corresponding to the input size n = x and the length of the messages exchanged by Alice and Bob during the protocol. Π n solves the compression game of a function h n : {0, 1} n {0, 1} if h(x) = 1 transcript Πn (x) E n. Finally, we let cost(π n ) = s 1 +... + s r. 9

Interactive Compression Games Formally: A C-bounded protocol Π n = C (1),..., C (r), f (1),..., f (r 1), E n with r = r(n) rounds consists of a sequence of C-circuits for Alice, a strategy for Bob, given by functions f (1),..., f (r 1), and a set of accepting transcripts E n. Every protocol Π n has its signature(π n ) = (n, s 1, t 1, s 2,..., t r 1, s r ), which is the sequence corresponding to the input size n = x and the length of the messages exchanged by Alice and Bob during the protocol. Π n solves the compression game of a function h n : {0, 1} n {0, 1} if h(x) = 1 transcript Πn (x) E n. Finally, we let cost(π n ) = s 1 +... + s r. 9

Previous work Harnik and Naor, 2006. instance compression (1-round compression), cryptographic application. Dubrov and Ishai, 2006. Lower bound for C = AC 0, f = Parity, (1-round compression). Connection with non-boolean PRGs. Bodlaender et al., 2008. Investigates problems without polynomial kernels. Fortnow and Santhanam, 2008. conditional lower bound for instance compression. 10

Previous work Harnik and Naor, 2006. instance compression (1-round compression), cryptographic application. Dubrov and Ishai, 2006. Lower bound for C = AC 0, f = Parity, (1-round compression). Connection with non-boolean PRGs. Bodlaender et al., 2008. Investigates problems without polynomial kernels. Fortnow and Santhanam, 2008. conditional lower bound for instance compression. 10

Previous work Harnik and Naor, 2006. instance compression (1-round compression), cryptographic application. Dubrov and Ishai, 2006. Lower bound for C = AC 0, f = Parity, (1-round compression). Connection with non-boolean PRGs. Bodlaender et al., 2008. Investigates problems without polynomial kernels. Fortnow and Santhanam, 2008. conditional lower bound for instance compression. 10

Previous work Harnik and Naor, 2006. instance compression (1-round compression), cryptographic application. Dubrov and Ishai, 2006. Lower bound for C = AC 0, f = Parity, (1-round compression). Connection with non-boolean PRGs. Bodlaender et al., 2008. Investigates problems without polynomial kernels. Fortnow and Santhanam, 2008. conditional lower bound for instance compression. 10

Previous work Dell and van Melkebeek, 2010. C = polynomial time, f = d-cnf SAT (conditional lower bound). Faust et al., 2010. Application in leakage resilient cryptography. Drucker, 2012. limitations of instance compression in the classical and quantum setting (conditional). Chattopadhyay and Santhanam, 2012. Optimal lower bound for C = AC 0, f = Parity. Partial results for AC 0 [p]-compression. 11

Previous work Dell and van Melkebeek, 2010. C = polynomial time, f = d-cnf SAT (conditional lower bound). Faust et al., 2010. Application in leakage resilient cryptography. Drucker, 2012. limitations of instance compression in the classical and quantum setting (conditional). Chattopadhyay and Santhanam, 2012. Optimal lower bound for C = AC 0, f = Parity. Partial results for AC 0 [p]-compression. 11

Previous work Dell and van Melkebeek, 2010. C = polynomial time, f = d-cnf SAT (conditional lower bound). Faust et al., 2010. Application in leakage resilient cryptography. Drucker, 2012. limitations of instance compression in the classical and quantum setting (conditional). Chattopadhyay and Santhanam, 2012. Optimal lower bound for C = AC 0, f = Parity. Partial results for AC 0 [p]-compression. 11

Previous work Dell and van Melkebeek, 2010. C = polynomial time, f = d-cnf SAT (conditional lower bound). Faust et al., 2010. Application in leakage resilient cryptography. Drucker, 2012. limitations of instance compression in the classical and quantum setting (conditional). Chattopadhyay and Santhanam, 2012. Optimal lower bound for C = AC 0, f = Parity. Partial results for AC 0 [p]-compression. 11

Applications and Motivation Results have found applications in cryptography, parameterized complexity theory, PCPs, circuit lower bounds. Our main motivation: Understand information bottlenecks in circuit lower bounds. Understand structure of optimal circuits/algorithms. 12

Interactive Compression versus Computation InnerProduct n (x, y) def = i x i y i (mod 2). Threshold gate: j w iz i? t, w j, t R. Proposition [HMPSP 93]. InnerProduct / poly(n)-th poly(n)-th. On the other hand, Proposition. There exists a (poly(n)-th poly(n)-th)-compression game for InnerProduct with O(log n) rounds and communication cost O(log n). 13

Interactive Compression versus Computation InnerProduct n (x, y) def = i x i y i (mod 2). Threshold gate: j w iz i? t, w j, t R. Proposition [HMPSP 93]. InnerProduct / poly(n)-th poly(n)-th. On the other hand, Proposition. There exists a (poly(n)-th poly(n)-th)-compression game for InnerProduct with O(log n) rounds and communication cost O(log n). 13

Interactive Compression versus Computation Protocol. Alice s circuits are of the form C(x, y, v). (first layer) C computes z i def = x i y i, for every i [n]. (second layer) C outputs sign( i [n] z i i [n] v i). Idea. Bob does all the work, and simulates a binary search in order to compute i x i y i. Bob sends v = 0 n/2 1 n/2 : bit computed by Alice reveals if i [n] x i y i is at least n/2. Bob sends string corresponding to the next step of the binary search, and so on. 14

Interactive Compression versus Computation Protocol. Alice s circuits are of the form C(x, y, v). (first layer) C computes z i def = x i y i, for every i [n]. (second layer) C outputs sign( i [n] z i i [n] v i). Idea. Bob does all the work, and simulates a binary search in order to compute i x i y i. Bob sends v = 0 n/2 1 n/2 : bit computed by Alice reveals if i [n] x i y i is at least n/2. Bob sends string corresponding to the next step of the binary search, and so on. 14

Interactive Compression versus Computation Protocol. Alice s circuits are of the form C(x, y, v). (first layer) C computes z i def = x i y i, for every i [n]. (second layer) C outputs sign( i [n] z i i [n] v i). Idea. Bob does all the work, and simulates a binary search in order to compute i x i y i. Bob sends v = 0 n/2 1 n/2 : bit computed by Alice reveals if i [n] x i y i is at least n/2. Bob sends string corresponding to the next step of the binary search, and so on. 14

Part 2: Main Results 15

Main Result Razborov/Smolensky, 1987. Any AC 0 d[p]-compression game for Majority requires nontrivial communication. Chattophadyay and Santhanam, 2012. Any single-round AC 0 d[p]-compression game for Majority requires communication n/(log n) O(d). 16

Main Result Razborov/Smolensky, 1987. Any AC 0 d[p]-compression game for Majority requires nontrivial communication. Chattophadyay and Santhanam, 2012. Any single-round AC 0 d[p]-compression game for Majority requires communication n/(log n) O(d). 16

Main Result [Theorem 1]. There exists a fixed constant c N such that, for each d N, and every n N sufficiently large, the following holds. 1) Any AC 0 d[p]-compression game for Majority n (any number of rounds) has communication cost n/(log n) 2d+c. 2) There exists a single-round AC 0 d[p]-compression game for Majority n with communication cost n/(log n) d c. 17

Main Result [Theorem 1]. There exists a fixed constant c N such that, for each d N, and every n N sufficiently large, the following holds. 1) Any AC 0 d[p]-compression game for Majority n (any number of rounds) has communication cost n/(log n) 2d+c. 2) There exists a single-round AC 0 d[p]-compression game for Majority n with communication cost n/(log n) d c. 17

Lower bound against circuits with oracle gates Theorem 1 implies that structure of Boolean circuit for Majority is essentially optimal. Circuits with oracle gates: several applications in theoretical computer science. Example: [IW 97] f EXP that requires circuits of size 2 Ω(n) then P = BPP. [KvM 99] f NE cone that requires circuits with SAT-oracles of size 2 Ω(n) then AM = NP. 18

Lower bound against circuits with oracle gates Theorem 1 implies that structure of Boolean circuit for Majority is essentially optimal. Circuits with oracle gates: several applications in theoretical computer science. Example: [IW 97] f EXP that requires circuits of size 2 Ω(n) then P = BPP. [KvM 99] f NE cone that requires circuits with SAT-oracles of size 2 Ω(n) then AM = NP. 18

Lower bound against circuits with oracle gates Theorem 1 implies that structure of Boolean circuit for Majority is essentially optimal. Circuits with oracle gates: several applications in theoretical computer science. Example: [IW 97] f EXP that requires circuits of size 2 Ω(n) then P = BPP. [KvM 99] f NE cone that requires circuits with SAT-oracles of size 2 Ω(n) then AM = NP. 18

Lower bound against circuits with oracle gates Lemma. Let C be a Boolean circuit over n variables from C d (poly(n)) augmented with oracle gates f i : {0, 1} s i {0, 1} t i, where i [r], for some r = r(n). Let s = s 1 +... + s r be the total fan-in of these oracle gates, and h : {0, 1} n {0, 1} be the Boolean function computed by C. Then h admits a C d (poly(n))-compression game with communication cost c(n) s consisting of at most r + 1 rounds. Main lower bound holds for protocols with unlimited number of rounds: Corollary. If Majority is computed by an AC 0 d[p] circuit with arbitrary oracle gates, then the total fan-in of the oracle gates is n/(log n) 2d+O(1). 19

Lower bound against circuits with oracle gates Lemma. Let C be a Boolean circuit over n variables from C d (poly(n)) augmented with oracle gates f i : {0, 1} s i {0, 1} t i, where i [r], for some r = r(n). Let s = s 1 +... + s r be the total fan-in of these oracle gates, and h : {0, 1} n {0, 1} be the Boolean function computed by C. Then h admits a C d (poly(n))-compression game with communication cost c(n) s consisting of at most r + 1 rounds. Main lower bound holds for protocols with unlimited number of rounds: Corollary. If Majority is computed by an AC 0 d[p] circuit with arbitrary oracle gates, then the total fan-in of the oracle gates is n/(log n) 2d+O(1). 19

Sketch of the lower bound (Theorem 1) Let C = AC 0 d[p], and consider a fixed prime q p. MOD q compression Majority Interactive Compression Exponentially large circuit New circuit lower bound for MOD q : Improved polynomial approximation Degree lower bound in low error regime 20

Compressing symmetric functions using Majority Lemma. Let h : {0, 1} n {0, 1} be an arbitrary symmetric function, C be a circuit class, and d 1. Assume that the C d (poly(n))-compression game for Majority n can be solved with cost c(n) in r(n) rounds. Then the C d+o(1) (poly(n))-compression game for h can be solved with cost c h (n) = O(c(2n) log n) in r h (n) = O(r(2n) log n) rounds. Proof sketch. 1) Compression for Majority implies compression for Th k. 2) Alice and Bob perform a binary search. 21

Compressing symmetric functions using Majority Lemma. Let h : {0, 1} n {0, 1} be an arbitrary symmetric function, C be a circuit class, and d 1. Assume that the C d (poly(n))-compression game for Majority n can be solved with cost c(n) in r(n) rounds. Then the C d+o(1) (poly(n))-compression game for h can be solved with cost c h (n) = O(c(2n) log n) in r h (n) = O(r(2n) log n) rounds. Proof sketch. 1) Compression for Majority implies compression for Th k. 2) Alice and Bob perform a binary search. 21

From interactive compression to very large circuits Proposition. If there exists a C d (poly(n))-compression game for f n with cost c(n), then there exist circuits C 1,..., C T from C d+o(1) (poly(n)), where T 2 c(n), such that x {0, 1} n, f n (x) = i [T ] C i (x). Proof sketch. Each circuit C i checks whether the interaction induced by x leads to the i-th accepting transcript. Depth blow-up is minimal: Parallel simulation of all rounds. 22

From interactive compression to very large circuits Proposition. If there exists a C d (poly(n))-compression game for f n with cost c(n), then there exist circuits C 1,..., C T from C d+o(1) (poly(n)), where T 2 c(n), such that x {0, 1} n, f n (x) = i [T ] C i (x). Proof sketch. Each circuit C i checks whether the interaction induced by x leads to the i-th accepting transcript. Depth blow-up is minimal: Parallel simulation of all rounds. 22

From interactive compression to very large circuits Proposition. If there exists a C d (poly(n))-compression game for f n with cost c(n), then there exist circuits C 1,..., C T from C d+o(1) (poly(n)), where T 2 c(n), such that x {0, 1} n, f n (x) = i [T ] C i (x). Proof sketch. Each circuit C i checks whether the interaction induced by x leads to the i-th accepting transcript. Depth blow-up is minimal: Parallel simulation of all rounds. 22

The difficulty of analyzing very large circuits Goal. Lower bound against circuits of depth d + O(1) and size 2 c(n). Want to set c(n) n/poly(log n). Problem. No explicit lower bounds for depth-d circuits of size 2 ω(n1/(d 1)). (Actually, MOD q admits depth-d circuits of size 2 n/poly(log n) ). Idea. f n (x) = C i (x). i [T ] Initial function is a disjoint union of (poly-size) circuits C i. If f (x) = 1 then exactly one circuit evaluates to 1. 23

The difficulty of analyzing very large circuits Goal. Lower bound against circuits of depth d + O(1) and size 2 c(n). Want to set c(n) n/poly(log n). Problem. No explicit lower bounds for depth-d circuits of size 2 ω(n1/(d 1)). (Actually, MOD q admits depth-d circuits of size 2 n/poly(log n) ). Idea. f n (x) = C i (x). i [T ] Initial function is a disjoint union of (poly-size) circuits C i. If f (x) = 1 then exactly one circuit evaluates to 1. 23

The difficulty of analyzing very large circuits Goal. Lower bound against circuits of depth d + O(1) and size 2 c(n). Want to set c(n) n/poly(log n). Problem. No explicit lower bounds for depth-d circuits of size 2 ω(n1/(d 1)). (Actually, MOD q admits depth-d circuits of size 2 n/poly(log n) ). Idea. f n (x) = C i (x). i [T ] Initial function is a disjoint union of (poly-size) circuits C i. If f (x) = 1 then exactly one circuit evaluates to 1. 23

The difficulty of analyzing very large circuits Goal. Lower bound against circuits of depth d + O(1) and size 2 c(n). Want to set c(n) n/poly(log n). Problem. No explicit lower bounds for depth-d circuits of size 2 ω(n1/(d 1)). (Actually, MOD q admits depth-d circuits of size 2 n/poly(log n) ). Idea. f n (x) = C i (x). i [T ] Initial function is a disjoint union of (poly-size) circuits C i. If f (x) = 1 then exactly one circuit evaluates to 1. 23

From interactive compression to very large circuits Proposition (updated) If there exists a C d (poly(n))-compression game for f n with cost c(n), then there exist circuits C 1,..., C T from C d+o(1) (poly(n)), where T 2 c(n), such that x {0, 1} n, f n (x) = C i (x) i [T ] ( uniqueness property ) 24

New circuit lower bound for MOD q Proposition. For every d 1, if we have MOD q (x 1,..., x n ) = i [T ] C i(x 1,..., x n ), where each C i is an AC 0 d[p] circuit, then T 2 n/(log n)2d+o(1). Proof sketch. Polynomial approximation method in the very low error regime. (Razborov/Smolensky s lower bound: optimized when ε = Ω(1).) 25

New circuit lower bound for MOD q Proposition. For every d 1, if we have MOD q (x 1,..., x n ) = i [T ] C i(x 1,..., x n ), where each C i is an AC 0 d[p] circuit, then T 2 n/(log n)2d+o(1). Proof sketch. Polynomial approximation method in the very low error regime. (Razborov/Smolensky s lower bound: optimized when ε = Ω(1).) 25

New circuit lower bound for MOD q Proposition. For every d 1, if we have MOD q (x 1,..., x n ) = i [T ] C i(x 1,..., x n ), where each C i is an AC 0 d[p] circuit, then T 2 n/(log n)2d+o(1). Proof sketch. Polynomial approximation method in the very low error regime. (Razborov/Smolensky s lower bound: optimized when ε = Ω(1).) 25

Improved approximation by F p polynomials Polynomial approximation method + Uniqueness: Claim. If each C i can be δ-approximated by an F p polynomial P i, then Q(x) def = i [T ] is an ε = T δ approximator for f. P i (x) (Recall: f = i [T ] C i) Reason. In general, several P i s correct on x can cause to be wrong (F p ). Uniqueness = can take union bound over bad inputs only. Important. Degree of Q at most degree of P i s. Problem: how to control error and degree simultaneously? 26

Improved approximation by F p polynomials Polynomial approximation method + Uniqueness: Claim. If each C i can be δ-approximated by an F p polynomial P i, then Q(x) def = i [T ] is an ε = T δ approximator for f. P i (x) (Recall: f = i [T ] C i) Reason. In general, several P i s correct on x can cause to be wrong (F p ). Uniqueness = can take union bound over bad inputs only. Important. Degree of Q at most degree of P i s. Problem: how to control error and degree simultaneously? 26

Improved approximation by F p polynomials Polynomial approximation method + Uniqueness: Claim. If each C i can be δ-approximated by an F p polynomial P i, then Q(x) def = i [T ] is an ε = T δ approximator for f. P i (x) (Recall: f = i [T ] C i) Reason. In general, several P i s correct on x can cause to be wrong (F p ). Uniqueness = can take union bound over bad inputs only. Important. Degree of Q at most degree of P i s. Problem: how to control error and degree simultaneously? 26

Improved approximation by F p polynomials Polynomial approximation method + Uniqueness: Claim. If each C i can be δ-approximated by an F p polynomial P i, then Q(x) def = i [T ] is an ε = T δ approximator for f. P i (x) (Recall: f = i [T ] C i) Reason. In general, several P i s correct on x can cause to be wrong (F p ). Uniqueness = can take union bound over bad inputs only. Important. Degree of Q at most degree of P i s. Problem: how to control error and degree simultaneously? 26

The low error regime in the approximation method Razborov/Smolensky, 1987 (polynomial approximation) For every δ(n) > 0, any AC 0 d[p] admits a δ-error probabilistic polynomial P(x 1,..., x n ) F p [x 1,..., x n ] of degree (O(log n + log(1/δ))) d. Kopparty and Srinivasan, 2012 (extension) (O(log n)) d log(1/δ) instead of (O(log n + log(1/δ))) d. Razborov/Smolensky + folklore, 1987 (lower bound for all ε) For every ε(n) [2.001n, 1/100q], any Q(x 1,..., x n ) F p [x 1,..., x n ] that ε-approximates MOD q (uniform distribution) has degree ( ) Ω n log(1/ε). 27

The low error regime in the approximation method Razborov/Smolensky, 1987 (polynomial approximation) For every δ(n) > 0, any AC 0 d[p] admits a δ-error probabilistic polynomial P(x 1,..., x n ) F p [x 1,..., x n ] of degree (O(log n + log(1/δ))) d. Kopparty and Srinivasan, 2012 (extension) (O(log n)) d log(1/δ) instead of (O(log n + log(1/δ))) d. Razborov/Smolensky + folklore, 1987 (lower bound for all ε) For every ε(n) [2.001n, 1/100q], any Q(x 1,..., x n ) F p [x 1,..., x n ] that ε-approximates MOD q (uniform distribution) has degree ( ) Ω n log(1/ε). 27

The low error regime in the approximation method Razborov/Smolensky, 1987 (polynomial approximation) For every δ(n) > 0, any AC 0 d[p] admits a δ-error probabilistic polynomial P(x 1,..., x n ) F p [x 1,..., x n ] of degree (O(log n + log(1/δ))) d. Kopparty and Srinivasan, 2012 (extension) (O(log n)) d log(1/δ) instead of (O(log n + log(1/δ))) d. Razborov/Smolensky + folklore, 1987 (lower bound for all ε) For every ε(n) [2.001n, 1/100q], any Q(x 1,..., x n ) F p [x 1,..., x n ] that ε-approximates MOD q (uniform distribution) has degree ( ) Ω n log(1/ε). 27

Finishing the proof Suppose MOD q (x 1,..., x n ) = i [T ] C i(x 1,..., x n ). We δ def = ε/t approximate each C i, getting a T δ = ε approximator: degree (log n) d log(1/δ) = (log n) d (log T + log(1/ε)). Using the degree lower bound, for any ε [2.001n, 1/100q], n log(1/ε) degree. Therefore, log T n log(1/ε) (log n)d log(1/ε) (log n) d, which is maximized when ε = exp ( n/(4(log n) 2d ) ). 28

Finishing the proof Suppose MOD q (x 1,..., x n ) = i [T ] C i(x 1,..., x n ). We δ def = ε/t approximate each C i, getting a T δ = ε approximator: degree (log n) d log(1/δ) = (log n) d (log T + log(1/ε)). Using the degree lower bound, for any ε [2.001n, 1/100q], n log(1/ε) degree. Therefore, log T n log(1/ε) (log n)d log(1/ε) (log n) d, which is maximized when ε = exp ( n/(4(log n) 2d ) ). 28

Finishing the proof Suppose MOD q (x 1,..., x n ) = i [T ] C i(x 1,..., x n ). We δ def = ε/t approximate each C i, getting a T δ = ε approximator: degree (log n) d log(1/δ) = (log n) d (log T + log(1/ε)). Using the degree lower bound, for any ε [2.001n, 1/100q], n log(1/ε) degree. Therefore, log T n log(1/ε) (log n)d log(1/ε) (log n) d, which is maximized when ε = exp ( n/(4(log n) 2d ) ). 28

Finishing the proof Suppose MOD q (x 1,..., x n ) = i [T ] C i(x 1,..., x n ). We δ def = ε/t approximate each C i, getting a T δ = ε approximator: degree (log n) d log(1/δ) = (log n) d (log T + log(1/ε)). Using the degree lower bound, for any ε [2.001n, 1/100q], n log(1/ε) degree. Therefore, log T n log(1/ε) (log n)d log(1/ε) (log n) d, which is maximized when ε = exp ( n/(4(log n) 2d ) ). 28

Finishing the proof Suppose MOD q (x 1,..., x n ) = i [T ] C i(x 1,..., x n ). We δ def = ε/t approximate each C i, getting a T δ = ε approximator: degree (log n) d log(1/δ) = (log n) d (log T + log(1/ε)). Using the degree lower bound, for any ε [2.001n, 1/100q], n log(1/ε) degree. Therefore, log T n log(1/ε) (log n)d log(1/ε) (log n) d, which is maximized when ε = exp ( n/(4(log n) 2d ) ). 28

Observation To obtain AC 0 d[p] circuit size lower bounds for MOD q : Polynomial approximation method with ε as large as possible. To understand structure of optimal polynomial size circuits up to depth log n/ log log n: Polynomial approximation method in the very low error regime. 29

Observation To obtain AC 0 d[p] circuit size lower bounds for MOD q : Polynomial approximation method with ε as large as possible. To understand structure of optimal polynomial size circuits up to depth log n/ log log n: Polynomial approximation method in the very low error regime. 29

Round complexity in C-compression games AC 0 [p] lower bound: holds for any number of rounds. AC 0 [p] upper bound: single-round compression. Power of interaction in compression games? Chattopadhyay and Santhanam, 2012: For every fixed r, there is a Boolean function on n variables that admits AC 0 -bounded protocols with r rounds and cost O(n 1/r ), but for which any correct AC 0 -bounded (r 1)-round protocol has cost Ω(n 2/r o(1) ). = Quadratic gap, dependence on r not very satisfactory. 30

Round complexity in C-compression games AC 0 [p] lower bound: holds for any number of rounds. AC 0 [p] upper bound: single-round compression. Power of interaction in compression games? Chattopadhyay and Santhanam, 2012: For every fixed r, there is a Boolean function on n variables that admits AC 0 -bounded protocols with r rounds and cost O(n 1/r ), but for which any correct AC 0 -bounded (r 1)-round protocol has cost Ω(n 2/r o(1) ). = Quadratic gap, dependence on r not very satisfactory. 30

Round complexity in C-compression games AC 0 [p] lower bound: holds for any number of rounds. AC 0 [p] upper bound: single-round compression. Power of interaction in compression games? Chattopadhyay and Santhanam, 2012: For every fixed r, there is a Boolean function on n variables that admits AC 0 -bounded protocols with r rounds and cost O(n 1/r ), but for which any correct AC 0 -bounded (r 1)-round protocol has cost Ω(n 2/r o(1) ). = Quadratic gap, dependence on r not very satisfactory. 30

The power of interaction in AC 0 -compression games [Theorem 2]. Let r 2 and ε > 0 be fixed parameters. There is an explicit family of functions f = {f n } n N with the following properties: There exists an AC 0 2(n)-bounded protocol Π n for f n with r rounds and cost c(n) n ε, for every n n f, where n f is a fixed constant that depends on f. Any AC 0 (poly(n))-bounded protocol Π for f with r 1 rounds has cost c(n) n 1 ε, for every n n Π, where n Π is a fixed constant that depends on Π. 31

The power of interaction in AC 0 -compression games [Theorem 2]. Let r 2 and ε > 0 be fixed parameters. There is an explicit family of functions f = {f n } n N with the following properties: There exists an AC 0 2(n)-bounded protocol Π n for f n with r rounds and cost c(n) n ε, for every n n f, where n f is a fixed constant that depends on f. Any AC 0 (poly(n))-bounded protocol Π for f with r 1 rounds has cost c(n) n 1 ε, for every n n Π, where n Π is a fixed constant that depends on Π. 31

Hard function for round-limited protocols Function f n : {0, 1} n {0, 1}, where n def = m + l r m. Pointer Jumping Problem. Uses a function h = {h t } t N that is hard for AC 0. Intuition: Upper bound: r + 1 rounds with communication (1 + r) m. Lower bound: r rounds require communication at least l m 1 o(1). Appropriate setting of parameters induces gap: n ε versus n 1 ε. Proof relies on a round elimination argument via random restrictions, together with an appropriate induction hypothesis. 32

Hard function for round-limited protocols Function f n : {0, 1} n {0, 1}, where n def = m + l r m. Pointer Jumping Problem. Uses a function h = {h t } t N that is hard for AC 0. Intuition: Upper bound: r + 1 rounds with communication (1 + r) m. Lower bound: r rounds require communication at least l m 1 o(1). Appropriate setting of parameters induces gap: n ε versus n 1 ε. Proof relies on a round elimination argument via random restrictions, together with an appropriate induction hypothesis. 32

Hard function for round-limited protocols Function f n : {0, 1} n {0, 1}, where n def = m + l r m. Pointer Jumping Problem. Uses a function h = {h t } t N that is hard for AC 0. Intuition: Upper bound: r + 1 rounds with communication (1 + r) m. Lower bound: r rounds require communication at least l m 1 o(1). Appropriate setting of parameters induces gap: n ε versus n 1 ε. Proof relies on a round elimination argument via random restrictions, together with an appropriate induction hypothesis. 32

Part 3: Open Problems 33

Open Problem 1: Round separation for AC 0 [p]-compression games? As far as we know, single-round AC 0 [p] protocols are as powerful as k-round protocols. (Our technique for AC 0 [p] is insensitive to the # of rounds.) Problem. Prove a round separation theorem for AC 0 [p]-compression games. 34

Open Problem 2: Lower bounds for randomized AC 0 [p]-compression games? The randomized AC 0 [p]-compression complexity of Majority remains open. Reason: proof explores very low error regime in the polynomial approximation method (initial error probability is not tolerated). Problem. Settle the randomized AC 0 [p]-compression complexity of Majority. Remark. Communication cost is n/(log n) Θ(d) for randomized AC 0 d-compression games (Chattopadhyay and Santhanam, 2012). 35

Open Problem 2: Lower bounds for randomized AC 0 [p]-compression games? The randomized AC 0 [p]-compression complexity of Majority remains open. Reason: proof explores very low error regime in the polynomial approximation method (initial error probability is not tolerated). Problem. Settle the randomized AC 0 [p]-compression complexity of Majority. Remark. Communication cost is n/(log n) Θ(d) for randomized AC 0 d-compression games (Chattopadhyay and Santhanam, 2012). 35

Open Problem 2: Lower bounds for randomized AC 0 [p]-compression games? The randomized AC 0 [p]-compression complexity of Majority remains open. Reason: proof explores very low error regime in the polynomial approximation method (initial error probability is not tolerated). Problem. Settle the randomized AC 0 [p]-compression complexity of Majority. Remark. Communication cost is n/(log n) Θ(d) for randomized AC 0 d-compression games (Chattopadhyay and Santhanam, 2012). 35

Open Problem 3: Power of modulo m gates in interactive compression? Unconditional lower bounds: Circuit class Hard function Incompressibility (depth d) AC 0 Parity CC(Parity n ) n/ log O(d) n AC 0 [p] Majority CC(Majority n ) n/ log O(d) n AC 0 [m] NEXP, Majority (?) CC(Majority n ) =? Question. Are there randomized AC 0 [m]-compression games for Majority with communication cost n 1 ε? This result would shed more light on the hardness of proving lower bounds against circuits with modulo m gates. 36

Open Problem 3: Power of modulo m gates in interactive compression? Unconditional lower bounds: Circuit class Hard function Incompressibility (depth d) AC 0 Parity CC(Parity n ) n/ log O(d) n AC 0 [p] Majority CC(Majority n ) n/ log O(d) n AC 0 [m] NEXP, Majority (?) CC(Majority n ) =? Question. Are there randomized AC 0 [m]-compression games for Majority with communication cost n 1 ε? This result would shed more light on the hardness of proving lower bounds against circuits with modulo m gates. 36

Thank you! 37