Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3357713.3384279acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
research-article
Open access

Strong average-case lower bounds from non-trivial derandomization

Published: 22 June 2020 Publication History

Abstract

We prove that for all constants a, NQP = NTIME[n polylog(n)] cannot be (1/2 + 2−log a n )-approximated by 2log a n -size ACC 0THR circuits ( ACC 0 circuits with a bottom layer of THR gates). Previously, it was even open whether E NP can be (1/2+1/√n)-approximated by AC 0[⊕] circuits. As a straightforward application, we obtain an infinitely often ( NEcoNE)/1-computable pseudorandom generator for poly-size ACC 0 circuits with seed length 2logє n , for all є > 0.
More generally, we establish a connection showing that, for a typical circuit class C, non-trivial nondeterministic algorithms estimating the acceptance probability of a given S-size C circuit with an additive error 1/S (we call it a CAPP algorithm) imply strong (1/2 + 1/n ω(1)) average-case lower bounds for nondeterministic time classes against C circuits. Note that the existence of such (deterministic) algorithms is much weaker than the widely believed conjecture PromiseBPP = PromiseP.
We also apply our results to several sub-classes of TC 0 circuits. First, we show that for all k, NP cannot be (1/2 + n k )-approximated by n k -size SumTHR circuits (exact ℝ-linear combination of threshold gates), improving the corresponding worst-case result in [Williams, CCC 2018]. Second, we establish strong average-case lower bounds and build ( NEcoNE)/1-computable PRGs for SumPTF circuits, for various regimes of degrees. Third, we show that non-trivial CAPP algorithms for MAJMAJ indeed already imply worst-case lower bounds for TC 3 0 ( MAJMAJMAJ). Since exponential lower bounds for MAJMAJ are already known, this suggests TC 3 0 lower bounds are probably within reach.
Our new results build on a line of recent works, including [Murray and Williams, STOC 2018], [Chen and Williams, CCC 2019], and [Chen, FOCS 2019]. In particular, it strengthens the corresponding (1/2 + 1/polylog(n))-inapproximability average-case lower bounds in [Chen, FOCS 2019].
The two important technical ingredients are techniques from Cryptography in NC 0 [Applebaum et al., SICOMP 2006], and Probabilistic Checkable Proofs of Proximity with NC 1-computable proofs.

References

[1]
Scott Aaronson and Avi Wigderson. 2009. Algebrization: A New Barrier in Complexity Theory. TOCT 1, 1 ( 2009 ), 2 : 1-2 : 54. https://doi.org/10.1145/1490270. 1490272
[2]
Miklós Ajtai. 1983. Σ11-Formulae on finite structures. Annals of Pure and Applied Logic 24, 1 ( 1983 ), 1-48. https://doi.org/10.1016/ 0168-0072 ( 83 ) 90038-6
[3]
Josh Alman and Lijie Chen. 2019. Eficient Construction of Rigid Matrices Using an NP Oracle. In 60th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2019, Baltimore, Maryland, USA, November 9-12, 2019, David Zuckerman (Ed.). IEEE Computer Society, 1034-1055. https://doi.org/10.1109/FOCS. 2019. 00067
[4]
Benny Applebaum. 2014. Cryptography in Constant Parallel Time. Springer. https://doi.org/10.1007/978-3-642-17367-7
[5]
Benny Applebaum, Yuval Ishai, and Eyal Kushilevitz. 2006. Cryptography in NC0. SIAM J. Comput. 36, 4 ( 2006 ), 845-888. https://doi.org/10.1137/S0097539705446950
[6]
Sanjeev Arora and Boaz Barak. 2009. Computational Complexity-A Modern Approach. Cambridge University Press. http://www.cambridge.org/catalogue/ catalogue.asp?isbn= 9780521424264
[7]
Sanjeev Arora, Carsten Lund, Rajeev Motwani, Madhu Sudan, and Mario Szegedy. 1998. Proof Verification and the Hardness of Approximation Problems. J. ACM 45, 3 ( 1998 ), 501-555. https://doi.org/10.1145/278298.278306
[8]
Sanjeev Arora and Shmuel Safra. 1998. Probabilistic Checking of Proofs: A New Characterization of NP. J. ACM 45, 1 ( 1998 ), 70-122. https://doi.org/10.1145/ 273865.273901
[9]
László Babai. 1987. Random Oracles Separate PSPACE from the Polynomial-Time Hierarchy. Inf. Process. Lett. 26, 1 ( 1987 ), 51-53. https://doi.org/10.1016/ 0020-0190 ( 87 ) 90036-6
[10]
Swapnam Bajpai, Vaibhav Krishan, Deepanshu Kush, Nutan Limaye, and Srikanth Srinivasan. 2019. A #SAT Algorithm for Small Constant-Depth Circuits with PTF Gates. In 10th Innovations in Theoretical Computer Science Conference, ITCS 2019, January 10-12, 2019, San Diego, California, USA. 8 : 1-8 : 20. https://doi.org/ 10.4230/LIPIcs.ITCS. 2019.8
[11]
Theodore P. Baker, John Gill, and Robert Solovay. 1975. Relativizations of the P =?NP Question. SIAM J. Comput. 4, 4 ( 1975 ), 431-442. https://doi.org/10.1137/ 0204037
[12]
David A. Mix Barrington. 1989. Bounded-Width Polynomial-Size Branching Programs Recognize Exactly Those Languages in NC1. J. Comput. Syst. Sci. 38, 1 ( 1989 ), 150-164. https://doi.org/10.1016/ 0022-0000 ( 89 ) 90037-8
[13]
Eli Ben-Sasson and Emanuele Viola. 2014. Short PCPs with Projection Queries. In Automata, Languages, and Programming-41st International Colloquium, ICALP 2014, Copenhagen, Denmark, July 8-11, 2014, Proceedings, Part I. 163-173. https: //doi.org/10.1007/978-3-662-43948-7_14
[14]
Abhishek Bhrushundi, Kaave Hosseini, Shachar Lovett, and Sankeerth Rao. 2019. Torus Polynomials: An Algebraic Approach to ACC Lower Bounds. In 10th Innovations in Theoretical Computer Science Conference, ITCS 2019, January 10-12, 2019, San Diego, California, USA. 13 : 1-13 : 16. https://doi.org/10.4230/LIPIcs.ITCS. 2019.13
[15]
Dan Boneh, Yuval Ishai, Alain Passelègue, Amit Sahai, and David J. Wu. 2018. Exploring Crypto Dark Matter:-New Simple PRF Candidates and Their Applications. In Theory of Cryptography-16th International Conference, TCC 2018, Panaji, India, November 11-14, 2018, Proceedings, Part II. 699-729. https://doi.org/10.1007/978-3-030-03810-6_25
[16]
Eshan Chattopadhyay, Pooya Hatami, Shachar Lovett, and Avishay Tal. 2019. Pseudorandom Generators from the Second Fourier Level and Applications to AC0 with Parity Gates. In 10th Innovations in Theoretical Computer Science Conference, ITCS 2019, January 10-12, 2019, San Diego, California, USA. 22 : 1-22 : 15. https://doi.org/10.4230/LIPIcs.ITCS. 2019.22
[17]
Lijie Chen. 2019. Non-deterministic Quasi-Polynomial Time is Average-Case Hard for ACC Circuits. In 60th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2019, Baltimore, Maryland, USA, November 9-12, 2019, David Zuckerman (Ed.). IEEE Computer Society, 1281-1304. https://doi.org/10.1109/ FOCS. 2019.00079
[18]
Lijie Chen and Hanlin Ren. 2020. Strong Average-Case Circuit Lower Bounds from Non-trivial Derandomization. Electronic Colloquium on Computational Complexity (ECCC) 27 ( 2020 ), 10. https://eccc.weizmann. ac.il/report/2020/010
[19]
Lijie Chen and R. Ryan Williams. 2019. Stronger Connections Between Circuit Analysis and Circuit Lower Bounds, via PCPs of Proximity. In 34th Computational Complexity Conference (CCC 2019 ) (Leibniz International Proceedings in Informatics (LIPIcs)), Amir Shpilka (Ed.), Vol. 137. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany, 19 : 1-19 : 43. https://doi.org/10.4230/LIPIcs.CCC. 2019.19
[20]
Ruiwen Chen, Igor Carboni Oliveira, and Rahul Santhanam. 2018. An AverageCase Lower Bound Against ACC0. In LATIN 2018: Theoretical Informatics-13th Latin American Symposium, Buenos Aires, Argentina, April 16-19, 2018, Proceedings. 317-330. https://doi.org/10.1007/978-3-319-77404-6_24
[21]
Bill Feferman, Ronen Shaltiel, Christopher Umans, and Emanuele Viola. 2013. On Beating the Hybrid Argument. Theory of Computing 9 ( 2013 ), 809-843. https://doi.org/10.4086/toc. 2013.v009a026
[22]
Merrick L. Furst, James B. Saxe, and Michael Sipser. 1984. Parity, Circuits, and the Polynomial-Time Hierarchy. Mathematical Systems Theory 17, 1 ( 1984 ), 13-27. https://doi.org/10.1007/BF01744431
[23]
Mikael Goldmann, Johan Håstad, and Alexander A. Razborov. 1992. Majority Gates VS. General Weighted Threshold Gates. Computational Complexity 2 ( 1992 ), 277-300. https://doi.org/10.1007/BF01200426
[24]
Oded Goldreich and Leonid A. Levin. 1989. A Hard-Core Predicate for all OneWay Functions. In Proceedings of the 21st Annual ACM Symposium on Theory of Computing, May 14-17, 1989, Seattle, Washigton, USA. 25-32. https://doi.org/10. 1145/73007.73010
[25]
Shafi Goldwasser, Dan Gutfreund, Alexander Healy, Tali Kaufman, and Guy N. Rothblum. 2007. Verifying and decoding in constant depth. In Proceedings of the 39th Annual ACM Symposium on Theory of Computing, San Diego, California, USA, June 11-13, 2007. 440-449. https://doi.org/10.1145/1250790.1250855
[26]
Aryeh Grinberg, Ronen Shaltiel, and Emanuele Viola. 2018. Indistinguishability by Adaptive Procedures with Advice, and Lower Bounds on Hardness Amplification Proofs. In 59th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2018, Paris, France, October 7-9, 2018. 956-966. https://doi.org/10.1109/FOCS. 2018. 00094
[27]
András Hajnal, Wolfgang Maass, Pavel Pudlák, Mario Szegedy, and György Turán. 1993. Threshold Circuits of Bounded Depth. J. Comput. Syst. Sci. 46, 2 ( 1993 ), 129-154. https://doi.org/10.1016/ 0022-0000 ( 93 ) 90001-D
[28]
Johan Håstad. 1989. Almost Optimal Lower Bounds for Small Depth Circuits. Advances in Computing Research 5 ( 1989 ), 143-170.
[29]
Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets, and Avi Wigderson. 2010. Uniform Direct Product Theorems: Simplified, Optimized, and Derandomized. SIAM J. Comput. 39, 4 ( 2010 ), 1637-1665. https://doi.org/10.1137/080734030
[30]
Yuval Ishai and Eyal Kushilevitz. 2002. Perfect Constant-Round Secure Computation via Perfect Randomizing Polynomials. In Automata, Languages and Programming, 29th International Colloquium, ICALP 2002, Malaga, Spain, July 8-13, 2002, Proceedings. 244-256. https://doi.org/10.1007/3-540-45465-9_22
[31]
Joe Kilian. 1988. Founding Cryptography on Oblivious Transfer. In Proceedings of the 20th Annual ACM Symposium on Theory of Computing, May 2-4, 1988, Chicago, Illinois, USA. 20-31. https://doi.org/10.1145/62212.62215
[32]
Carsten Lund, Lance Fortnow, Howard J. Karlof, and Noam Nisan. 1992. Algebraic Methods for Interactive Proof Systems. J. ACM 39, 4 ( 1992 ), 859-868. https: //doi.org/10.1145/146585.146605
[33]
Raghu Meka and David Zuckerman. 2013. Pseudorandom Generators for Polynomial Threshold Functions. SIAM J. Comput. 42, 3 ( 2013 ), 1275-1301. https://doi.org/10.1137/100811623
[34]
Cody Murray and R. Ryan Williams. 2018. Circuit lower bounds for nondeterministic quasi-polytime: an easy witness lemma for NP and NQP. In Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2018, Los Angeles, CA, USA, June 25-29, 2018. 890-901. https: //doi.org/10.1145/3188745.3188910
[35]
Noam Nisan and Avi Wigderson. 1994. Hardness vs Randomness. J. Comput. Syst. Sci. 49, 2 ( 1994 ), 149-167. https://doi.org/10.1016/S0022-0000 ( 05 ) 80043-1
[36]
Alexander A Razborov. 1987. Lower bounds on the size of bounded depth circuits over a complete basis with logical addition. Mathematical Notes of the Academy of Sciences of the USSR 41, 4 ( 1987 ), 333-338.
[37]
Alexander A. Razborov and Steven Rudich. 1997. Natural Proofs. J. Comput. Syst. Sci. 55, 1 ( 1997 ), 24-35. https://doi.org/10.1006/jcss. 1997.1494
[38]
Joel I. Seiferas, Michael J. Fischer, and Albert R. Meyer. 1978. Separating Nondeterministic Time Complexity Classes. J. ACM 25, 1 ( 1978 ), 146-167. https://doi.org/10.1145/322047.322061
[39]
Ronen Shaltiel and Emanuele Viola. 2010. Hardness Amplification Proofs Require Majority. SIAM J. Comput. 39, 7 ( 2010 ), 3122-3154. https://doi.org/10.1137/ 080735096
[40]
Adi Shamir. 1992. IP = PSPACE. J. ACM 39, 4 ( 1992 ), 869-877. https://doi.org/ 10.1145/146585.146609
[41]
Roman Smolensky. 1987. Algebraic Methods in the Theory of Lower Bounds for Boolean Circuit Complexity. In Proceedings of the 19th Annual ACM Symposium on Theory of Computing, 1987, New York, New York, USA. 77-82. https://doi.org/ 10.1145/28395.28404
[42]
Roman Smolensky. 1993. On Representations by Low-Degree Polynomials. In 34th Annual Symposium on Foundations of Computer Science, Palo Alto, California, USA, 3-5 November 1993. 130-138. https://doi.org/10.1109/SFCS. 1993.366874
[43]
Salil P. Vadhan. 2012. Pseudorandomness. Foundations and Trends in Theoretical Computer Science 7, 1-3 ( 2012 ), 1-336. https://doi.org/10.1561/0400000010
[44]
Emanuele Viola. 2009. On Approximate Majority and Probabilistic Time. Computational Complexity 18, 3 ( 2009 ), 337-375. https://doi.org/10.1007/s00037-009-0267-3
[45]
Emanuele Viola. 2020. New lower bounds for probabilistic degree and AC0 with parity gates. Electronic Colloquium on Computational Complexity (ECCC) 27 ( 2020 ), 15. https://eccc.weizmann. ac.il/report/2020/015
[46]
Nikhil Vyas and R. Ryan Williams. 2020. Lower Bounds Against Sparse Symmetric Functions of ACC Circuits: Expanding the Reach of #SAT Algorithms. In 37th International Symposium on Theoretical Aspects of Computer Science (STACS 2020 ) (Leibniz International Proceedings in Informatics (LIPIcs)), Christophe Paul and Markus Bläser (Eds.), Vol. 154. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany, 59 : 1-59 : 17. https://doi.org/10.4230/LIPIcs.STACS. 2020.59
[47]
Ryan Williams. 2013. Improving Exhaustive Search Implies Superpolynomial Lower Bounds. SIAM J. Comput. 42, 3 ( 2013 ), 1218-1244. https://doi.org/10.1137/ 10080703X
[48]
Ryan Williams. 2014. New algorithms and lower bounds for circuits with linear threshold gates. In Symposium on Theory of Computing, STOC 2014, New York, NY, USA, May 31-June 03, 2014. 194-202. https://doi.org/10.1145/2591796.2591858
[49]
Ryan Williams. 2014. Nonuniform ACC Circuit Lower Bounds. Journal of the ACM (JACM) 61, 1 ( 2014 ), 2 : 1-2 : 32. https://doi.org/10.1145/2559903
[50]
R. Ryan Williams. 2016. Natural Proofs versus Derandomization. SIAM J. Comput. 45, 2 ( 2016 ), 497-529. https://doi.org/10.1137/130938219
[51]
Richard Ryan Williams. 2018. Limits on Representing Boolean Functions by Linear Combinations of Simple Functions: Thresholds, ReLUs, and Low-Degree Polynomials. In 33rd Computational Complexity Conference, CCC 2018, June 22-24, 2018, San Diego, CA, USA. 6 : 1-6 : 24. https://doi.org/10.4230/LIPIcs.CCC. 2018.6
[52]
Andrew C Yao. 1982. Theory and application of trapdoor functions. In 23rd Annual Symposium on Foundations of Computer Science (SFCS 1982 ). IEEE, 80-91.
[53]
Andrew Chi-Chih Yao. 1985. Separating the Polynomial-Time Hierarchy by Oracles (Preliminary Version). In 26th Annual Symposium on Foundations of Computer Science, Portland, Oregon, USA, 21-23 October 1985. 1-10. https://doi. org/10.1109/SFCS. 1985.49
[54]
Stanislav Žák. 1983. A Turing Machine Time Hierarchy. Theor. Comput. Sci. 26, 3 ( 1983 ), 327-333. https://doi.org/10.1016/ 0304-3975 ( 83 ) 90015-4

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
STOC 2020: Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing
June 2020
1429 pages
ISBN:9781450369794
DOI:10.1145/3357713
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 June 2020

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. average-case complexity
  2. circuit complexity
  3. derandomization

Qualifiers

  • Research-article

Funding Sources

Conference

STOC '20
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)72
  • Downloads (Last 6 weeks)7
Reflects downloads up to 10 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)An Algorithmic Approach to Uniform Lower BoundsProceedings of the conference on Proceedings of the 38th Computational Complexity Conference10.4230/LIPIcs.CCC.2023.35(1-26)Online publication date: 17-Jul-2023
  • (2023)Guest Column: New ways of studying the BPP = P conjectureACM SIGACT News10.1145/3604943.360495054:2(44-69)Online publication date: 14-Jun-2023
  • (2023)On Exponential-time Hypotheses, Derandomization, and Circuit Lower BoundsJournal of the ACM10.1145/359358170:4(1-62)Online publication date: 20-Apr-2023
  • (2023)Guest ColumnACM SIGACT News10.1145/3586165.358617554:1(63-81)Online publication date: 1-Mar-2023
  • (2022)On the Range Avoidance Problem for Circuits2022 IEEE 63rd Annual Symposium on Foundations of Computer Science (FOCS)10.1109/FOCS54457.2022.00067(640-650)Online publication date: Oct-2022
  • (2022)Quantum learning algorithms imply circuit lower bounds2021 IEEE 62nd Annual Symposium on Foundations of Computer Science (FOCS)10.1109/FOCS52979.2021.00062(562-573)Online publication date: Feb-2022
  • (2022)Hardness vs Randomness, Revised: Uniform, Non-Black-Box, and Instance-Wise2021 IEEE 62nd Annual Symposium on Foundations of Computer Science (FOCS)10.1109/FOCS52979.2021.00021(125-136)Online publication date: Feb-2022
  • (2022)Lower Bounds Against Sparse Symmetric Functions of ACC Circuits: Expanding the Reach of #SAT AlgorithmsTheory of Computing Systems10.1007/s00224-022-10106-867:1(149-177)Online publication date: 4-Nov-2022
  • (2021)Hardness of KT characterizes parallel cryptographyProceedings of the 36th Computational Complexity Conference10.4230/LIPIcs.CCC.2021.35Online publication date: 20-Jul-2021
  • (2021)Inverse-exponential correlation bounds and extremely rigid matrices from a new derandomized XOR lemmaProceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing10.1145/3406325.3451132(761-771)Online publication date: 15-Jun-2021
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media