Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1374376.1374461acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
research-article

Hardness amplification proofs require majority

Published: 17 May 2008 Publication History

Abstract

Hardness amplification is the fundamental task of converting a δ-hard function f : (0, 1)n -> (0, 1) into a (1/2-ε)-hard function Amp(f), where f is γ-hard if small circuits fail to compute f on at least a γ fraction of the inputs. Typically, ε,δ are small (and δ=2-k captures the case where f is worst-case hard). Achieving ε = 1/nΩ(1) is a prerequisite for cryptography and most pseudorandom-generator constructions.
In this paper we study the complexity of black-box proofs of hardness amplification. A class of circuits cal D proves a hardness amplification result if for any function h that agrees with Amp(f) on a 1/2+e fraction of the inputs there exists an oracle circuit D ∈ D such that Dh agrees with f on a 1-δ fraction of the inputs. We focus on the case where every D ∈ D makes non-adaptive queries to h. This setting captures most hardness amplification techniques. We prove two main results: The circuits in D "can be used" to compute the majority function on 1e bits. In particular, these circuits have large depth when ε ≤ 1/ poly log n. The circuits in D must make Ω log(1/δ)/e2 oracle queries.
Both our bounds on the depth and on the number of queries are tight up to constant factors. Our results explain why hardness amplification techniques have failed to transform known lower bounds against constant-depth circuit classes into strong average-case lower bounds. When coupled with the celebrated "Natural Proofs" result by Razborov and Rudich (J. CSS '97) and the pseudorandom functions by Naor and Reingold (J. ACM '04), our results show that standard techniques for hardness amplification can only be applied to those circuit classes for which standard techniques cannot prove circuit lower bounds. Our results reveal a contrast between Yao's XOR Lemma (Amp(f) := f(x1) ⊕ ... ⊕ f(xt) ∈ zo) and the Direct-Product Lemma (Amp(f) := f(x1) O ... O f(xt) ∈ zot; here Amp(f) is non-Boolean). Our results (1) and (2) apply to Yao's XOR lemma, whereas known proofs of the direct-product lemma violate both (1) and (2). One of our contributions is a new technique to handle "non-uniform" reductions, i.e. the case when D contains many circuits.

References

[1]
M. Agrawal. Hard sets and pseudo-random generators for constant depth circuits. In Twenty First Foundations of Software Technology and Theoretical Computer Science, December 13-15, Bangalore, India, pages 58--69. Springer-Verlag, 2001.]]
[2]
M. Ajtai. Σ11-formulae on finite structures. Ann. Pure Appl. Logic, 24(1):1--48, 1983.]]
[3]
M. Ajtai. Approximate counting with uniform constant-depth circuits. In Advances in computational complexity theory (New Brunswick, NJ, 1990), pages 1--20. Amer. Math. Soc., Providence, RI, 1993.]]
[4]
N. Alon and R. Beigel. Lower bounds for approximations by low degree polynomials over $z_m$. In Proceedings of the Sixteenth Annual Conference on Computational Complexity, pages 184--187. IEEE, June 18--21 2001.]]
[5]
J. Aspnes, R. Beigel, M. Furst, and S. Rudich. The expressive power of voting polynomials. Combinatorica, 14(2):135--148, 1994.]]
[6]
L. Babai, L. Fortnow, and C. Lund. Nondeterministic exponential time has two-prover interactive protocols. Comput. Complexity, 1(1):3--40, 1991.]]
[7]
L. Babai, L. Fortnow, N. Nisan, and A. Wigderson. BPP has subexponential time simulations unless EXPTIME has publishable proofs. Computational Complexity, 3(4):307--318, 1993.]]
[8]
D. Beaver and J. Feigenbaum. Hiding instances in multioracle queries. In 7th Annual Symposium on Theoretical Aspects of Computer Science, volume 415 of Lecture Notes in Computer Science, pages 37--48, Rouen, France, 22--24 Feb. 1990. Springer.]]
[9]
A. Bogdanov and L. Trevisan. Average-case complexity. Foundations and Trends® in Theoretical Computer Science, 2(1), 2006.]]
[10]
A. Bogdanov and L. Trevisan. On worst-case to average-case reductions for np problems. SIAM J. Comput., 36(4):1119--1159, 2006.]]
[11]
J. Bourgain. Estimation of certain exponential sums arising in complexity theory. C. R. Math. Acad. Sci. Paris, 340(9):627--631, 2005.]]
[12]
J.-Y. Cai, A. Pavan, and D. Sivakumar. On the hardness of the permanent. In 16th International Symposium on Theoretical Aspects of Computer Science, Lecture Notes in Computer Science, Volume 1563, pages 90--99, Trier, Germany, 1999. Springer-Verlag.]]
[13]
R. Canetti, G. Even, and O. Goldreich. Lower bounds for sampling algorithms for estimating the average. Information Processing Letters, 53(1):17--25, 1995.]]
[14]
J. Edmonds, R. Impagliazzo, S. Rudich, and J. Sgall. Communication complexity towards lower bounds on circuit depth. Computational Complexity, 10(3):210--246, 2001.]]
[15]
U. Feige and C. Lund. On the hardness of computing the permanent of random matrices. Computational Complexity, 6(2):101--132, 1996.]]
[16]
M. L. Furst, J. B. Saxe, and M. Sipser. Parity, circuits, and the polynomial-time hierarchy. Mathematical Systems Theory, 17(1):13--27, April 1984.]]
[17]
O. Goldreich. Modern cryptography, probabilistic proofs and pseudorandomness, volume 17 of Algorithms and Combinatorics. Springer-Verlag, Berlin, 1999.]]
[18]
O. Goldreich. Foundations of Cryptography: Volume 1, Basic Tools. Cambridge University Press, Cambridge, 2001.]]
[19]
O. Goldreich and L. A. Levin. A hard-core predicate for all one-way functions. In Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing, pages 25--32, Seattle, Washington, 15--17 May 1989.]]
[20]
O. Goldreich, N. Nisan, and A. Wigderson. On Yao’s XOR lemma. Technical Report TR95--050, Electronic Colloquium on Computational Complexity, March 1995. http://www.eccc.uni-trier.de/.]]
[21]
S. Goldwasser, D. Gutfreund, A. Healy, T. Kaufman, andG. N. Rothblum. Verifying and decoding in constant depth. In STOC, pages 440--449, 2007.]]
[22]
P. Gopalan and V. Guruswami. Hardness amplification within np against deterministic algorithms. In Proceedings of the 23nd Annual Conference on Computational Complexity. IEEE, June 23--26 2008.]]
[23]
F. Green, A. Roy, and H. Straubing. Bounds on an exponential sum arising in Boolean circuit complexity. C. R. Math. Acad. Sci. Paris, 341(5):279--282, 2005.]]
[24]
V. Guruswami and V. Kabanets. Hardness amplification via space-efficient direct products. In J. R. Correa, A. Hevia, and M. A. Kiwi, editors, LATIN, volume 3887 of Lecture Notes in Computer Science, pages 556--568. Springer, 2006.]]
[25]
A. Hajnal, W. Maass, P. Pudlák, M. Szegedy, andG. Turán. Threshold circuits of bounded depth. J. Comput. System Sci., 46(2):129--154, 1993.]]
[26]
K. A. Hansen and P. B. Miltersen. Some meet-in-the-middle circuit lower bounds. In Proceedings of the 29th International Symposium on Mathematical Foundations of Computer Science (MFCS), Lecture Notes in Computer Science, Volume 3153, pages 334 -- 345, August 22--27 2004.]]
[27]
J. H\rastad. Computational limitations of small-depth circuits. MIT Press, 1987.]]
[28]
J. Håstad and M. Goldmann. On the power of small-depth threshold circuits. Comput. Complexity, 1(2):113--129, 1991.]]
[29]
A. Healy, S. P. Vadhan, and E. Viola. Using nondeterminism to amplify hardness. SIAM J. Comput., 35(4):903--931, 2006.]]
[30]
IEEE. Proceedings of the 20th Annual Conference on Computational Complexity, June 12--15 2005.]]
[31]
IEEE. Proceedings of the 22nd Annual Conference on Computational Complexity, June 13--16 2007.]]
[32]
R. Impagliazzo. Hard-core distributions for somewhat hard problems. In 36th Annual Symposium on Foundations of Computer Science, pages 538--545, Milwaukee, Wisconsin, 23--25 Oct. 1995. IEEE.]]
[33]
R. Impagliazzo, R. Jaiswal, and V. Kabanets. Approximately list-decoding direct product codes and uniform hardness amplification. In FOCS, pages 187--196. IEEE Computer Society, 2006.]]
[34]
R. Impagliazzo, R. Jaiswal, V. Kabanets, andA. Wigderson. Uniform direct-product theorems: Simplified, optimized, and derandomized. In Proceedings of the 40th Annual ACM Symposium on the Theory of Computing (STOC), Victoria, Canada, 17--20 May 2008.]]
[35]
R. Impagliazzo and A. Wigderson. $\mathitP = \mathitBPP$ if $E$ requires exponential circuits: Derandomizing the XOR lemma. In Proceedings of the 29th Annual ACM Symposium on Theory of Computing, pages 220--229, El Paso, Texas, 4--6 May 1997.]]
[36]
R. Impagliazzo and A. Wigderson. Randomness vs time: derandomization under a uniform assumption. J. Comput. System Sci., 63(4):672--688, 2001. Special issue on FOCS 98.]]
[37]
A. Klivans and R. A. Servedio. Boosting and hard-core sets. Machine Learning, 53(3):217--238, 2003.]]
[38]
A. R. Klivans. On the derandomization of constant depth circuits. In Proceedings of the Fifth International Workshop on Randomization and Approximation Techniques in Computer Science, August 18--20 2001.]]
[39]
H. Lin, L. Trevisan, and H. Wee. On hardness amplification of one-way functions. In J. Kilian, editor, TCC, volume 3378 of Lecture Notes in Computer Science, pages 34--49. Springer, 2005.]]
[40]
R. Lipton. New directions in testing. In Proceedings of DIMACS Workshop on Distributed Computing and Cryptography, volume 2, pages 191--202. ACM/AMS, 1991.]]
[41]
C.-J. Lu, S.-C. Tsai, and H.-L. Wu. On the complexity of hardness amplification. In Proceedings of the 20th Annual Conference on Computational Complexity \citeCCC05, pages 170--182.]]
[42]
C.-J. Lu, S.-C. Tsai, and H.-L. Wu. Impossibility results on weakly black-box hardness amplification. In E. Csuhaj-Varjú and Z. Ésik, editors, FCT, volume 4639 of Lecture Notes in Computer Science, pages 400--411. Springer, 2007.]]
[43]
C.-J. Lu, S.-C. Tsai, and H.-L. Wu. Improved hardness amplification in np. Theor. Comput. Sci., 370(1-3):293--298, 2007.]]
[44]
C.-J. Lu, S.-C. Tsai, and H.-L. Wu. On the complexity of hard-core set constructions. In L. Arge, C. Cachin, T. Jurdzinski, and A. Tarlecki, editors, ICALP, volume 4596 of Lecture Notes in Computer Science, pages 183--194. Springer, 2007.]]
[45]
M. Naor and O. Reingold. Number-theoretic constructions of efficient pseudo-random functions. J. ACM, 51(2):231--262, 2004.]]
[46]
N. Nisan and A. Wigderson. Hardness vs randomness. J. Computer & Systems Sciences, 49(2):149--167, Oct. 1994.]]
[47]
R. O’Donnell. Hardness amplification within $NP$. J. Comput. Syst. Sci., 69(1):68--94, Aug. 2004.]]
[48]
R. Raz. A parallel repetition theorem. SIAM J. Comput., 27(3):763--803 (electronic), 1998.]]
[49]
A. A. Razborov. Lower bounds on the dimension of schemes of bounded depth in a complete basis containing the logical addition function. Mat. Zametki, 41(4):598--607, 623, 1987.]]
[50]
A. A. Razborov and S. Rudich. Natural proofs. J. Comput. Syst. Sci., 55(1):24--35, Aug. 1997.]]
[51]
R. Shaltiel and C. Umans. Simple extractors for all min-entropies and a new pseudorandom generator. J. ACM, 52(2):172--216, 2005.]]
[52]
R. Shaltiel and C. Umans. Pseudorandomness for approximate counting and sampling. Computational Complexity, 15(4):298--341, 2006.]]
[53]
R. Shaltiel, E. Viola, and A. Wigderson. Unpublished manuscript, 2005.]]
[54]
R. Smolensky. Algebraic methods in the theory of lower bounds for boolean circuit complexity. In Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, pages 77--82, New York City, 25--27 May 1987.]]
[55]
M. Sudan, L. Trevisan, and S. Vadhan. Pseudorandom generators without the XOR lemma. J. Comput. System Sci., 62(2):236--266, 2001. Special issue on the Fourteenth Annual IEEE Conference on Computational Complexity (Atlanta, GA, 1999).]]
[56]
L. Trevisan. List decoding using the XOR lemma. In 44th Annual Symposium on Foundations of Computer Science, pages 126--135, Cambridge, Massachusetts, 11--14 Oct. 2003. IEEE.]]
[57]
L. Trevisan. Some applications of coding theory in computational complexity. In Complexity of computations and proofs, volume 13 of Quad. Mat., pages 347--424. Dept. Math., Seconda Univ. Napoli, Caserta, 2004.]]
[58]
L. Trevisan. On uniform amplification of hardness in np. In H. N. Gabow and R. Fagin, editors, STOC, pages 31--38. ACM, 2005.]]
[59]
L. Trevisan and S. Vadhan. Pseudorandomness and average-case complexity via uniform reductions. Comput. Complex., 16(4):331--364, 2007.]]
[60]
E. Viola. The complexity of constructing pseudorandom generators from hard functions. Comput. Complexity, 13(3-4):147--188, 2004.]]
[61]
E. Viola. On constructing parallel pseudorandom generators from one-way functions. In Proceedings of the 20th Annual Conference on Computational Complexity {30}, pages 183--197.]]
[62]
E. Viola. The Complexity of Hardness Amplification and Derandomization. PhD thesis, Harvard University, 2006. http://www.eccc.uni-trier.de/.]]
[63]
E. Viola. On approximate majority and probabilistic time. In Proceedings of the 22nd Annual Conference on Computational Complexity {31}, pages 155--168.]]
[64]
E. Viola and A. Wigderson. Norms, xor lemmas, and lower bounds for GF(2) polynomials and multiparty protocols. In Proceedings of the 22nd Annual Conference on Computational Complexity {31}.]]
[65]
A. C. Yao. Theory and applications of trapdoor functions (extended abstract). In 23rd Annual Symposium on Foundations of Computer Science, pages 80--91, Chicago, Illinois, 3--5 Nov. 1982. IEEE.]]
[66]
A. C.-C. Yao. Separating the polynomial-time hierarchy by oracles. In Proc. 26th annual symposium on Foundations of computer science, pages 1--10. IEEE Press, 1985.]]

Cited By

View all
  • (2024)An Efficient Quantum Parallel Repetition Theorem and ApplicationsProceedings of the 56th Annual ACM Symposium on Theory of Computing10.1145/3618260.3649603(1478-1487)Online publication date: 10-Jun-2024
  • (2023)Derandomization with Minimal Memory FootprintProceedings of the conference on Proceedings of the 38th Computational Complexity Conference10.4230/LIPIcs.CCC.2023.11(1-15)Online publication date: 17-Jul-2023
  • (2021)On Derandomizing Yao’s Weak-to-Strong OWF ConstructionTheory of Cryptography10.1007/978-3-030-90453-1_15(429-456)Online publication date: 4-Nov-2021
  • Show More Cited By

Index Terms

  1. Hardness amplification proofs require majority

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computing
    May 2008
    712 pages
    ISBN:9781605580470
    DOI:10.1145/1374376
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 17 May 2008

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. amplification
    2. average-case complexity
    3. black-box
    4. constant-depth circuits
    5. hardness
    6. majority
    7. natural proofs

    Qualifiers

    • Research-article

    Conference

    STOC '08
    Sponsor:
    STOC '08: Symposium on Theory of Computing
    May 17 - 20, 2008
    British Columbia, Victoria, Canada

    Acceptance Rates

    STOC '08 Paper Acceptance Rate 80 of 325 submissions, 25%;
    Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)9
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 26 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)An Efficient Quantum Parallel Repetition Theorem and ApplicationsProceedings of the 56th Annual ACM Symposium on Theory of Computing10.1145/3618260.3649603(1478-1487)Online publication date: 10-Jun-2024
    • (2023)Derandomization with Minimal Memory FootprintProceedings of the conference on Proceedings of the 38th Computational Complexity Conference10.4230/LIPIcs.CCC.2023.11(1-15)Online publication date: 17-Jul-2023
    • (2021)On Derandomizing Yao’s Weak-to-Strong OWF ConstructionTheory of Cryptography10.1007/978-3-030-90453-1_15(429-456)Online publication date: 4-Nov-2021
    • (2019)Pseudorandomness from ShrinkageJournal of the ACM10.1145/323063066:2(1-16)Online publication date: 5-Apr-2019
    • (2012)Pseudorandomness from ShrinkageProceedings of the 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science10.1109/FOCS.2012.78(111-119)Online publication date: 20-Oct-2012
    • (2011)Complexity of Hard-Core Set ProofsComputational Complexity10.1007/s00037-011-0003-720:1(145-171)Online publication date: 1-Mar-2011
    • (2009)Bit-probe lower bounds for succinct data structuresProceedings of the forty-first annual ACM symposium on Theory of computing10.1145/1536414.1536480(475-482)Online publication date: 31-May-2009
    • (2009)Guest ColumnACM SIGACT News10.1145/1515698.151570940:1(27-44)Online publication date: 28-Feb-2009
    • (2009)A Probabilistic Inequality with Applications to Threshold Direct-Product TheoremsProceedings of the 2009 50th Annual IEEE Symposium on Foundations of Computer Science10.1109/FOCS.2009.62(221-229)Online publication date: 25-Oct-2009
    • (2009)Computational Indistinguishability AmplificationProceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology10.1007/978-3-642-03356-8_21(355-373)Online publication date: 19-Aug-2009
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media