CSCI 1590 Intro to Computational Complexity

Similar documents
Notes on Complexity Theory Last updated: November, Lecture 10

CSCI 1590 Intro to Computational Complexity

Complexity Theory. Jörg Kreiker. Summer term Chair for Theoretical Computer Science Prof. Esparza TU München

Lecture 12: Interactive Proofs

Lecture 15: Interactive Proofs

Cryptographic Protocols Notes 2

Lecture 17: Interactive Proof Systems

2 Evidence that Graph Isomorphism is not NP-complete

Lecture Notes 20: Zero-Knowledge Proofs

CS151 Complexity Theory. Lecture 13 May 15, 2017

2 Natural Proofs: a barrier for proving circuit lower bounds

CS151 Complexity Theory. Lecture 14 May 17, 2017

Lecture 22: Oct 29, Interactive proof for graph non-isomorphism

Complexity Theory Final Exam

Lecture Notes 17. Randomness: The verifier can toss coins and is allowed to err with some (small) probability if it is unlucky in its coin tosses.

Review of Complexity Theory

Lecture 24: Randomized Complexity, Course Summary

Technische Universität München Summer term 2010 Theoretische Informatik August 2, 2010 Dr. J. Kreiker / Dr. M. Luttenberger, J. Kretinsky SOLUTION

CSCI 1590 Intro to Computational Complexity

Zero-Knowledge Proofs and Protocols

NP Complete Problems. COMP 215 Lecture 20

Lecture 26: Arthur-Merlin Games

Introduction to Advanced Results

Non-Interactive ZK:The Feige-Lapidot-Shamir protocol

Limits to Approximability: When Algorithms Won't Help You. Note: Contents of today s lecture won t be on the exam

Quantum Computing Lecture 8. Quantum Automata and Complexity

CSCI 1590 Intro to Computational Complexity

Complexity Classes IV

Computational Complexity Theory

-bit integers are all in ThC. Th The following problems are complete for PSPACE NPSPACE ATIME QSAT, GEOGRAPHY, SUCCINCT REACH.

Randomized Computation

1 Recap: Interactive Proofs

Lecture 19: Interactive Proofs and the PCP Theorem

6.841/18.405J: Advanced Complexity Wednesday, April 2, Lecture Lecture 14

PROBABILISTIC COMPUTATION. By Remanth Dabbati

Beyond NP [HMU06,Chp.11a] Tautology Problem NP-Hardness and co-np Historical Comments Optimization Problems More Complexity Classes

Lecture 26. Daniel Apon

Lecture 18: Zero-Knowledge Proofs

Lecture 12: Randomness Continued

Randomized Complexity Classes; RP

HW11. Due: December 6, 2018

The Proof of IP = P SP ACE

Lecture 11: Proofs, Games, and Alternation


Lecture 8 (Notes) 1. The book Computational Complexity: A Modern Approach by Sanjeev Arora and Boaz Barak;

Zero-Knowledge Proofs 1

Great Theoretical Ideas in Computer Science

CS 282A/MATH 209A: Foundations of Cryptography Prof. Rafail Ostrovsky. Lecture 9

Interactive Proofs. Merlin-Arthur games (MA) [Babai] Decision problem: D;

Lecture 3: Interactive Proofs and Zero-Knowledge

Time and space classes

Lecture 22: Counting

Umans Complexity Theory Lectures

Lecture 59 : Instance Compression and Succinct PCP s for NP

Umans Complexity Theory Lectures

Interactive Proofs 1

Notes for Lecture 27

In this chapter we discuss zero-knowledge proof systems. Loosely speaking, such proof

CSCI 1590 Intro to Computational Complexity

Umans Complexity Theory Lectures

From Secure MPC to Efficient Zero-Knowledge

Pseudo-Deterministic Proofs

Introduction to Interactive Proofs & The Sumcheck Protocol

Lecture 14: IP = PSPACE

Interactive Proof System

Complexity Theory. Jörg Kreiker. Summer term Chair for Theoretical Computer Science Prof. Esparza TU München

Theory of Computation Chapter 12: Cryptography

Theory of Computer Science to Msc Students, Spring Lecture 2

Cryptographic Protocols FS2011 1

The Random Oracle Hypothesis is False. Pankaj Rohatgi 1. July 6, Abstract

Complexity Theory. Jörg Kreiker. Summer term Chair for Theoretical Computer Science Prof. Esparza TU München

Lecture 8: Complete Problems for Other Complexity Classes

CSCI 1590 Intro to Computational Complexity

Lecture 11: Non-Interactive Zero-Knowledge II. 1 Non-Interactive Zero-Knowledge in the Hidden-Bits Model for the Graph Hamiltonian problem

Complexity Theory Part II

U.C. Berkeley CS278: Computational Complexity Professor Luca Trevisan August 30, Notes for Lecture 1

Introduction to Quantum Computing

6.045 Final Exam Solutions

CS154, Lecture 18: 1

The Complexity of Optimization Problems

Computer Sciences Department

Interactive and probabilistic proof-checking

Oded Goldreich. Weizmann Institute of Science, Rehovot, Israel. Abstract

Complexity-Theoretic Aspects of Interactive Proof Systems. Lance Jeremy Fortnow. B.A., Mathematics and Computer Science. Cornell University (1985)

Advanced Algorithms (XIII) Yijia Chen Fudan University

Computational Complexity of Bayesian Networks

Lecture 4 : Quest for Structure in Counting Problems

Randomness and non-uniformity

Space Complexity. The space complexity of a program is how much memory it uses.

MTAT Complexity Theory December 8th, Lecture 12

1 Agenda. 2 History. 3 Probabilistically Checkable Proofs (PCPs). Lecture Notes Definitions. PCPs. Approximation Algorithms.

The Polynomial Hierarchy

198:538 Complexity of Computation Lecture 16 Rutgers University, Spring March 2007

1 PSPACE-Completeness

Graph Non-Isomorphism Has a Succinct Quantum Certificate

6.840 Language Membership

Approximate Verification

CS154, Lecture 17: conp, Oracles again, Space Complexity

Quantum Complexity Theory. Wim van Dam HP Labs MSRI UC Berkeley SQUINT 3 June 16, 2003

Uniform Derandomization

Transcription:

CSCI 1590 Intro to Computational Complexity Interactive Proofs John E. Savage Brown University April 20, 2009 John E. Savage (Brown University) CSCI 1590 Intro to Computational Complexity April 20, 2009 1 / 14

Summary 1 Randomized reductions 2 Two-Stage Proof Protocols 3 Interactive Proofs John E. Savage (Brown University) CSCI 1590 Intro to Computational Complexity April 20, 2009 2 / 14

Review of last lecture Denition Let BPTIME(T (n)) be the class of all languages, L, for which there is a PTM, M, that runs in time O(T (n)) and for all x M outputs 1 with probability at least 2/3 when x 2 L. M outputs 0 with probability at least 2/3 when x 62 L. Let BPP = Sc1 BPTIME(nc ). Instead of requiring that that the PTM halt in polynomial time, it suces to require that it halt in expected polynomial time. John E. Savage (Brown University) CSCI 1590 Intro to Computational Complexity April 20, 2009 3 / 14

Review of last lecture Denition Let RPTIME(T (n)) be the class of all languages, L, for which there is a PTM, M, that runs in time O(T (n)) and for all x M outputs 1 with probability at least 2/3 when x 2 L. M outputs 0 with probability 1 when x 62 L. Then, RP = Sc1 RPTIME(nc ). Denition corp = fl j L 2 RPg John E. Savage (Brown University) CSCI 1590 Intro to Computational Complexity April 20, 2009 4 / 14

Review of last lecture Denition Let ZPTIME(T (n)) be the class of all languages, L, for which there is a PTM, M that runs in expected time O(T (n)) and that outputs 1 when x 2 L and 0 otherwise. Let ZPP = Sc1 ZPTIME(nc ). Theorem ZPP = RP \ corp BPP John E. Savage (Brown University) CSCI 1590 Intro to Computational Complexity April 20, 2009 5 / 14

Review of last lecture In dening the classes ZPP, RP, corp, and BPP we distinguish between two directions of error: When x 2 L, there is a lower bound, p c > 1=2, on the probability that M outputs true. When x 62 L there is a lower bound, p s > 1=2, on the probability that M outputs false. The requirements associated with p c and p s are referred to as completeness and soundness, respectively. John E. Savage (Brown University) CSCI 1590 Intro to Computational Complexity April 20, 2009 6 / 14

Completeness and Soundness Languages in ZPP recognized with completeness 1 and soundness 1. Languages in RP recognized with completeness 2/3 and soundness 1. Languages in BPP recognized with completeness and soundness 2/3. For BPP and RP, error rate can be reduced by taking majority of a polynomial number of PTM outputs. Using a Cherno bound both completeness and soundness can be made exponentially close to 1 in n (the length of the input). Using Markov's inequality for classes with completeness or soundness (but not both) less than 1, it is unnecessary to distinguish between expected runtime and worst-case runtime. John E. Savage (Brown University) CSCI 1590 Intro to Computational Complexity April 20, 2009 7 / 14

Probabilistic Reductions We can apply the notion of completeness and soundness not just to language recognition, but to resource-bounded reductions. Previously, we considered deterministic reductions from one language to another. We dened NP-completeness, and PSPACE-completeness in terms of deterministic polynomial time reduction. We dened P-completeness in terms of deterministic logarithmic space reduction. What if we allow our polynomial time reduction to have a one-sided? A two-sided error? John E. Savage (Brown University) CSCI 1590 Intro to Computational Complexity April 20, 2009 8 / 14

Two-Step Proof Protocols Let BPP NP be the class of languages, L that can be recognized using the following two-step protocol (with completeness and soundness 2/3). For some L 0 2 NP, a PTM, V, performs a probabilistic polynomial time reduction, f, on its input x. V accepts x if and only if f (x) 2 L 0. If x 2 L, V accepts with probability 2/3, if x 62 L, V rejects with probability 2/3. V is referred to as the verier. The hypothetical entity providing V with proof that f (x) 2 L is called the prover. John E. Savage (Brown University) CSCI 1590 Intro to Computational Complexity April 20, 2009 9 / 14

Two-Step Proof Protocols Let RP NP be the class of languages dened by the above protocol using a soundness of 1. RP NP = NP. BPP NP contains GNI (see next slide), a language not known to be in NP. It has been shown that if BPP NP contains a conp-complete language such as SAT, PH collapses. John E. Savage (Brown University) CSCI 1590 Intro to Computational Complexity April 20, 2009 10 / 14

Graph-Isomorphism Two graphs, G 1 and G 2 are isomorphic if there is a permutation (i.e. relabeling),, of G 1 's vertices such that the two graphs are identical. A pair of graphs, (G 1 ; G 2 ), is in GI if and only if they are isomorphic. (G 1 ; G 2 ) is in GNI if and only if they are not isomorphic. GI 2 NP, but is not known to be NP-complete. GNI can be recognized with completeness 1 and soundness 1/2 using a simple three-step proof protocol. A PTM, V, randomly selects G 1 or G 2 and randomly permutes it to G 0 G 1, G 2 and G 0 are given to a prover, P, which is asked to return which graph V randomly selected. V rejects if the P's answer is incorrect No resource limitation has been placed on the prover, but V runs in polynomial time. If G 1 and G 2 are not isomorphic, P can determine which graph has been permuted. If they are isomorphic, P can't distinguish between them so returns a random guess. John E. Savage (Brown University) CSCI 1590 Intro to Computational Complexity April 20, 2009 11 / 14

Interactive Proofs The two- and three-step protocols we have described are all examples of Interactive Proof In an interactive proof, a verier with bounded resources asks a series of questions to an all-powerful prover. The verier must use the prover's answer to determine whether a string, x, is in a language, L. In an interactive proof, a completeness requirement of p c means that when x 2 L, it is always possible for the prover to cause the verier to accept with probability greater than p c. A soundness requirement of p s means that when x 62 L, it is impossible for any prover to cause the verier to accept with probability greater than 1 p s. Unless the soundness is less than 1, the languages recognized by an interactive proof are simply those in NP. If the verier is deterministic, the languages recognized by an interactive proof are once again those in NP. John E. Savage (Brown University) CSCI 1590 Intro to Computational Complexity April 20, 2009 12 / 14

IP[k] Denition Let IP[k] be the class of all languages, L, for which their exists a polynomial time PTM, V, that can decide whether or not x 2 L with soundness and completeness 2/3, after k rounds of the following protocol. Given x and all prior responses, V outputs a query y and sends it to a prover P. P, which has unbounded computational resources, and access to all prior queries, returns a response. Let IP = Sc1 IP(nc ). To show that a language is in IP[k], we can describe a verier V that executes k rounds of questions with a prover, P. We must then show that when x 2 L, a P exists that can get V to accept with probability 2=3, but when x 62 L, no P exists that can convince V to accept with probability > 1=3. V and P act as adversaries. John E. Savage (Brown University) CSCI 1590 Intro to Computational Complexity April 20, 2009 13 / 14

Some observations regarding IP In dening IP[k] and IP, we have allowed the prover, P, to be an arbitrary function. In fact, since the verier, V, is a polynomial time PTM, it suces to only consider provers that compute in polynomial space. We will use this fact when we show that IP = PSPACE. As we observed earlier, had we used a soundness requirement of 1 (instead of 2/3), IP = NP. In contrast, it is known that using a completeness requirement of 1 leaves IP unchanged. In dening IP[k], we have allowed the verier to use random strings that remain hidden from the prover. It turns out that this requirement is unnecessary. We discuss this in detail next class. John E. Savage (Brown University) CSCI 1590 Intro to Computational Complexity April 20, 2009 14 / 14