Lecture Hardness of Set Cover

Similar documents
PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions. My T. Thai

A Threshold of ln(n) for approximating set cover

CS151 Complexity Theory. Lecture 13 May 15, 2017

PCP Theorem and Hardness of Approximation

Limits to Approximability: When Algorithms Won't Help You. Note: Contents of today s lecture won t be on the exam

CS151 Complexity Theory. Lecture 15 May 22, 2017

Approximation Resistance from Pairwise Independent Subgroups

Approximation Algorithms and Hardness of Approximation. IPM, Jan Mohammad R. Salavatipour Department of Computing Science University of Alberta

Lecture 10: Hardness of approximating clique, FGLSS graph

Lecture 12: Interactive Proofs

Lecture 8 (Notes) 1. The book Computational Complexity: A Modern Approach by Sanjeev Arora and Boaz Barak;

Advanced Algorithms (XIII) Yijia Chen Fudan University

Notes for Lecture 2. Statement of the PCP Theorem and Constraint Satisfaction

2 Completing the Hardness of approximation of Set Cover

CS151 Complexity Theory. Lecture 14 May 17, 2017

Chapter 2. Reductions and NP. 2.1 Reductions Continued The Satisfiability Problem (SAT) SAT 3SAT. CS 573: Algorithms, Fall 2013 August 29, 2013

1 Agenda. 2 History. 3 Probabilistically Checkable Proofs (PCPs). Lecture Notes Definitions. PCPs. Approximation Algorithms.

Complexity Classes V. More PCPs. Eric Rachlin

Lecture 23: Alternation vs. Counting

Definition 1. NP is a class of language L such that there exists a poly time verifier V with

Lecture 26. Daniel Apon

CS 151 Complexity Theory Spring Solution Set 5

Notes on Complexity Theory Last updated: November, Lecture 10

Probabilistically Checkable Proofs. 1 Introduction to Probabilistically Checkable Proofs

Lecture 16 November 6th, 2012 (Prasad Raghavendra)

Complexity Classes IV

Lecture 18: PCP Theorem and Hardness of Approximation I

Today. Few Comments. PCP Theorem, Simple proof due to Irit Dinur [ECCC, TR05-046]! Based on some ideas promoted in [Dinur- Reingold 04].

QMA(2) workshop Tutorial 1. Bill Fefferman (QuICS)

Lecture 15: A Brief Look at PCP

Lecture 19: Interactive Proofs and the PCP Theorem

Introduction Long transparent proofs The real PCP theorem. Real Number PCPs. Klaus Meer. Brandenburg University of Technology, Cottbus, Germany

B(w, z, v 1, v 2, v 3, A(v 1 ), A(v 2 ), A(v 3 )).

Lecture 11: Non-Interactive Zero-Knowledge II. 1 Non-Interactive Zero-Knowledge in the Hidden-Bits Model for the Graph Hamiltonian problem

Lecture Notes 17. Randomness: The verifier can toss coins and is allowed to err with some (small) probability if it is unlucky in its coin tosses.

Expander Graphs and Their Applications (X) Yijia Chen Shanghai Jiaotong University

Hardness of Embedding Metric Spaces of Equal Size

6.842 Randomness and Computation Lecture 5

1 Probabilistically checkable proofs

Great Theoretical Ideas in Computer Science

1 The Low-Degree Testing Assumption

Lecture 24: Approximate Counting

New Hardness Results for Undirected Edge Disjoint Paths

Interactive Proofs 1

Geometric Steiner Trees

Lecture 26: Arthur-Merlin Games

Lecture 18: Zero-Knowledge Proofs

Complexity Theory. Jörg Kreiker. Summer term Chair for Theoretical Computer Science Prof. Esparza TU München

Non-Approximability Results (2 nd part) 1/19

Lecture 5. 1 Review (Pairwise Independence and Derandomization)

Essential facts about NP-completeness:

BCCS: Computational methods for complex systems Wednesday, 16 June Lecture 3

2 Evidence that Graph Isomorphism is not NP-complete

CSC 5170: Theory of Computational Complexity Lecture 13 The Chinese University of Hong Kong 19 April 2010

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181.

Overview. 1 Introduction. 2 Preliminary Background. 3 Unique Game. 4 Unique Games Conjecture. 5 Inapproximability Results. 6 Unique Game Algorithms

Lecture 2: November 9

Lecture Notes 20: Zero-Knowledge Proofs

6.841/18.405J: Advanced Complexity Wednesday, April 2, Lecture Lecture 14

1 Recap: Interactive Proofs

SAT, NP, NP-Completeness

Hardness of Directed Routing with Congestion

Lecture 59 : Instance Compression and Succinct PCP s for NP

Notes for Lecture 9. Last time, we introduced zero knowledge proofs and showed how interactive zero knowledge proofs could be constructed from OWFs.

Approximating MAX-E3LIN is NP-Hard

MTAT Complexity Theory December 8th, Lecture 12

Dinur s Proof of the PCP Theorem

Lecture 4: Two-point Sampling, Coupon Collector s problem

1 Distributional problems

Almost transparent short proofs for NP R

P versus NP over Various Structures

CS261: A Second Course in Algorithms Lecture #18: Five Essential Tools for the Analysis of Randomized Algorithms

Proving SAT does not have Small Circuits with an Application to the Two Queries Problem

Notes on Zero Knowledge

PCP Soundness amplification Meeting 2 ITCS, Tsinghua Univesity, Spring April 2009

Lecture 20: conp and Friends, Oracles in Complexity Theory

1 More finite deterministic automata

Lecture 5: Two-point Sampling

Lecture : PSPACE IP

1 Randomized Computation

Lecture 12 Scribe Notes

Arthur-Merlin Streaming Complexity

Class Note #20. In today s class, the following four concepts were introduced: decision

Solution of Exercise Sheet 12

NP Completeness. CS 374: Algorithms & Models of Computation, Spring Lecture 23. November 19, 2015

Lecture 5: Efficient PAC Learning. 1 Consistent Learning: a Bound on Sample Complexity

INAPPROX APPROX PTAS. FPTAS Knapsack P

Randomness and Computation March 13, Lecture 3

Umans Complexity Theory Lectures

Lecture 15 - Zero Knowledge Proofs

A Tutorial on Computational Learning Theory Presented at Genetic Programming 1997 Stanford University, July 1997

CS Communication Complexity: Applications and New Directions

6.896 Quantum Complexity Theory 30 October Lecture 17

CPSC 467: Cryptography and Computer Security

Lecture 15: Interactive Proofs

Towards a Proof of the 2-to-1 Games Conjecture?

Lecture 9 and 10: Malicious Security - GMW Compiler and Cut and Choose, OT Extension

Notes for Lecture 25

UC Berkeley CS 170: Efficient Algorithms and Intractable Problems Handout 22 Lecturer: David Wagner April 24, Notes 22 for CS 170

Transcription:

PCPs and Inapproxiability CIS 6930 October 5, 2009 Lecture Hardness of Set Cover Lecturer: Dr. My T. Thai Scribe: Ying Xuan 1 Preliminaries 1.1 Two-Prover-One-Round Proof System A new PCP model 2P1R Think of the proof system as a game between two provers and one verifier. Prover Model: each tries to cheat convince the verifier that a No instance is Yes ; each cannot communicate with the other on their answers; Verifier Model: tries not to be cheated ensures the probability to be cheated is upper bounded by some small constant; can cross-check the two provers answers; is only allowed to query one position in each of the two proofs. Definition 1 Given three parameters: completeness c, soundness s and the number of random bits provided to the verifier r(n), assume the two proofs are written in two alphabets Σ 1 and Σ 2 respectively, then a language L is in 2P1R c,s (r(n)) if there is a polynomial time bounded verifier V that receives O(r(n)) truly random bits and satisfies: for every input x L, there is a pair of proofs y 1 Σ 1 and y 2 Σ 2 that makes V accept with probability c; for every input x / L and every pair of proofs y 1 Σ 1 and y 2 Σ 2 makes V accept with probability < s; 2P1R is actually a mechanism to solve Label-Cover: L(G = (U, V ; E), Σ, Π) u U and v V, we have v: proof P 1 ; u: proof P 2 ; uv E: u,v have answers for the same bit; a labeling L is said to satisfy an edge uv iff Π uv (L(u)) = L(v): the two answers are consistent, otherwise they are cheating. Hardness of Set Cover-1

You can see this from the next proof and the proof of NP-hard for Gap-Max-Label- CoverΣ 1,η in previous lecture. Theorem 2 (29.21) There is a constant ϵ p > 0 such that NP = 2P1R 1,1 ϵp (log(n)). Proof: 2P1R 1,1 ϵp (log(n)) NP (exercise); NP 2P1R 1,1 ϵp (log(n)) (shown here). Given a SAT formula ϕ, we employ a gap-producing reduction to obtain a MAX- E3SAT(E5) instance ψ, that is, given m is the number of clauses in ψ: if ϕ is satisfiable, OP T (ψ) = m; if ϕ is not satisfiable, OP T (ψ) < 1 ϵ p for some constant ϵ p Goal: Prove SAT 2P1R 1,1 ϵp (log(n)) Protocol: V selects an index of a clause, sends it to the first prover, selects a random variable in the clause, and sends it to the second prover. First prover returns 3 bits (the assignment of the selected clause), second returns 1 bit. V accepts if the following conditions hold: Reduction Clause check: the assignment sent by the first prover satisfies the clause. Consistency check: the assignment sent by the second prover is identical to the assignment for the same variable sent by the first prover. if ϕ is satisfiable, then there exists two proofs such that both give a satisfiable assignment, so they will surely be accepted. otherwise, The strategy of the second prover defines an assignment τ to the variables; If V selects a clause that is not satisfied by τ (with probability ϵ p ), the first prover must set one of the variables differently from τ, otherwise, its assignment does not satisfy this clause. The consistency check fails with probability = 1/3, since we have only 1/3 probability to catch the disagreed variable from the three in the clause. Hardness of Set Cover-2

Figure 1: 1.2 Parallel Repetition Theorem and Gap Amplification Motivation: To improve the soundness for SAT, i.e., to decrease the acceptance probability for false proofs. Definition 3 Parallel Repetition is: the verifier picks k clauses randomly and independently from the first prover P 1, then choose a random variable from each of these clauses and send the index of these variables to the second prover P 2. That is, it queries P 1 on the k variables and P 2 on the k clauses, and accepts iff all answers are accepting. Theorem 4 If the error probability of a 2P1R proof system is δ < 1, then the error probability on k parallel repetitions is at most δ dk, where d is a constant that depends only on the length of the answers of the original proof system. 1.3 Set System Definition 5 Given a universal set U and all its subsets C 1,, C m and their complement set C1,, Cm. A good cover is a collection of such subsets, which contains at least one subset C i and its complement set C i. Otherwise, it is a bad cover. Theorem 6 There is a randomized algorithm which generates a set system (U, C 1,, C m, C 1, Cm ) with elements U = 2 l for every m and l. With probability > 1/2 that every bad cover of such set system is of size > l. 2 Main Reduction Theorem 7 (Main) From SAT to the cardinality set cover problem, there exists a constant c > 0 for which we can find a randomized gap-producing reduction ζ of polynomial time n O(log log n), which transforms a SAT instance ϕ to a set cover instance (U, S) where U is a universal set of size n O(log log n) such that if ϕ is satisfiable, OP T (S) = 2n k ; if ϕ is not satisfiable, Pr[OP T (S) > kcn k log n] > 1/2; where n, polynomial in the size of ϕ, is the length of each proof for SAT in 2P1R, k is O(log log n). Sketch of Proof: Step 1 Equally long proof: For MAX-E3SAT(E5) with N variables, P 1 is an assignment for N variables, so P 1 = N and P 1 Σ 1 with Σ = {0, 1}; P 2 is the Hardness of Set Cover-3

Figure 2: assignment for 5N/3 clauses, so P 2 = 5N/3. Repeat P 1 5 times and P 2 3 times. P 1 = P 2 = 5N, so n = 5N. The verifier will query a random copy of each proof. Step 2 Gap Amplification: Execute k parallel repetitions to both proofs, so P 1 = P 2 = n k. (Every time query k positions independently from n positions). The result for each position in P 1 and P 2 is of k-bit and 3k-bit respectively. Step 3 Position Pick: choose one position (k clauses) from P 2 1 out of n k, then choose one position (k variables) each of which occurs in one chosen clause from P 1 k out of 3 k. We need n k 3 k random strings. Step 4 Acceptance Mapping: for any random string r, Q 1 (r) picked position in P 1, Q 2 (r) picked position in P 2. Let b be the answer for Q 2 (r), and π(r, b) be the answer in P 1 agrees with b. ( The same assignment for k-bit corresponding to the k-clauses). Step 5 Set System Construction: construct T = (U, C 1,, C 2 k, C 1,, C 2 k). 2 k all possible assignments to k bits each C a corresponds to one k-bit answer a in P 1. Remark: C a corresponds to an answer in P 1, C π(b) corresponds to another answer in P 1, if π(b) = a (agreement in 2P1R), then C a and C π(b) = C a is a cover of U. Step 6 Set System Copy: Copy the system (3n) k times to be T 1,, T r,, T 3nk so each copy corresponds to the results of a different random string r. Note that T r = (U r, C1, r, C r 2, C r k 1,, C r ) and universal set U r are pairwise disjoint. The 2 k union of U r for all r is the universal set U of the set system, where U = (3n) k U = n O(log log n). Step 7 Reduction Construction: The subsets of U = r U r are of two kinds: S i,a = r:q 1(r)=i Cr a : for ALL random strings, if position i is picked in P 1, union the sets corresponding to all answers for this position from P 1. S j,b = C r:q r 2(r)=j π(r,b) : for ALL random strings, if position j is picked in P 2, union the complement sets corresponding to the answer π(r, b), iff b is satisfiable to all k picked clauses. Hardness of Set Cover-4

Remark: For any cover C of a sub-universal set U r, if C contains a pair of such two set kinds: S i,a and S j,b with π(r, b) = a (called pair-set), i.e., it contains a good cover. Otherwise, it contains a bad cover, so every bad cover is of size > l, i.e. there are more than l subsets, but no pair-sets. Step 8 Yes Instance: Since for a satisfiable instance ϕ, the results a and b for respectively position i in P 1 and j in P 2 should agree, so for each such pair (a, b) choose pair-set S i,a and S j,b and put into S. Therefore, the size of S is 2n k.(the position i in P 1 and j in P 2 are one-to-one mapped.) Certainly S contains a good cover for each U r and hence U. Step 9 No Instance: Assume S is an optimal cover of U, try to prove S has a lower bound on its size with probability > 1/2; For each position i and j in P 1 and P 2 respectively, let A(i) = {a S i,a S} and A(j) = {b S j,b S}; Arbitrarily choose answers from A(i) and A(j) to the verifier queries for position i in P 1 and j in P 2, to construct proofs (y 1, y 2 ); Differentiate random strings. Let B 1 = {r A(Q 1 (r)) > l/2} and B 2 = {r A(Q 2 (r)) > l/2}, and G = B 1 B 2 = B 1 B 2 ; So if a random string r is from G, then at most l/2 sets of kind S i,a and l/2 sets of kind S j,b will be included in S, so the size of S is less than l, so it should be a good cover, with probability > 1/2; Assume the pair-set within S above is S i,a S j,b, but by randomly choosing, we can only pick up these pair (i, j) with probability 1/l 1/l, since A(Q 1 (r)) l/2 and A(Q 2 (r)) l/2 for r in G (choose 1 from l/2 independently). So with proof (y 1, y 2 ), the verifier accepts on random string r with probability (2/l) 2. According to the gap amplification, the error probability decreases from δ to δ dk for k-repetition. Take δ = 1/2, k = O(log log n). Denote the fraction of random strings in G is f G, then for any random strings, the error probability is (to have an error verification, the random string r should be within G with prob. f G, and the verifier should accept the proof with prob. (2/l) 2 ) f G (2/l) 2 δ dk, which will lead to f G < 1/2 (need confirmation). Therefore, B 1 B 2 contains at least half the random strings, so at least one of B 1 and B 2 contains a quarter of the random strings, say it is B i. Now we only consider the set cover for all U r where r B i. For r in B i, there are least l/2 subsets of kind S i,a or S j,b. Since each random string r is mapped to one position pair (i, j) with Q 1 (r) = i and Q 2 (r) = j, so there are at least a fraction 1/4 of such position pairs (i, j). Moreover, for each position pair, at least l/2 subsets (of either kind) are contained in S, so there are Hardness of Set Cover-5

in total at least l/2 n k 1/4 = ln k /8 = Σ(kn k log n). Corollary 8 There is a constant b such that if there exists a b log n-approx algorithm for the cardinality set cover problem, then NP ZTIME(n O (log log n)), i.e.,a class of problems for which there is a randomized algorithm running in expected time O(n O (log log n)). References [1] V.V. Vazirani, Approximation Algorithms, Springer, 2001. Hardness of Set Cover-6