Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

White-Box vs. Black-Box Complexity of Search Problems: Ramsey and Graph Property Testing

Published: 23 July 2019 Publication History

Abstract

Ramsey theory assures us that in any graph there is a clique or independent set of a certain size, roughly logarithmic in the graph size. But how difficult is it to find the clique or independent set? If the graph is given explicitly, then it is possible to do so while examining a linear number of edges. If the graph is given by a black-box, where to figure out whether a certain edge exists the box should be queried, then a large number of queries must be issued. But what if one is given a program or circuit for computing the existence of an edge? This problem was raised by Buss and Goldberg and Papadimitriou in the context of TFNP, search problems with a guaranteed solution.
We examine the relationship between black-box complexity and white-box complexity for search problems with guaranteed solution such as the above Ramsey problem. We show that under the assumption that collision-resistant hash function exists (which follows from the hardness of problems such as factoring, discrete-log, and learning with errors) the white-box Ramsey problem is hard and this is true even if one is looking for a much smaller clique or independent set than the theorem guarantees. This is also true for the colorful Ramsey problem where one is looking, say, for a monochromatic triangle.
In general, one cannot hope to translate all black-box hardness for TFNP into white-box hardness: we show this by adapting results concerning the random oracle methodology and the impossibility of instantiating it.
Another model we consider is that of succinct black-box, where the complexity of an algorithm is measured as a function of the description size of the object in the box (and no limitation on the computation time). In this case, we show that for all TFNP problems there is an efficient algorithm with complexity proportional to the description size of the object in the box times the solution size. However, for promise problems this is not the case.
Finally, we consider the complexity of graph property testing in the white-box model. We show a property that is hard to test even when one is given the program for computing the graph (under the appropriate assumptions such as hardness of Decisional Diffie-Hellman). The hard property is whether the graph is a two-source extractor.

References

[1]
Noga Alon and Joel Spencer. 2008. The Probabilistic Method (3rd ed.). John Wiley.
[2]
Prabhanjan Ananth, Aayush Jain, Moni Naor, Amit Sahai, and Eylon Yogev. 2016. Universal constructions and robust combiners for indistinguishability obfuscation and witness encryption. In Proceedings of the International Cryptology Conference (CRYPTO’16). 491--520.
[3]
Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil P. Vadhan, and Ke Yang. 2012. On the (im)possibility of obfuscating programs. J. ACM 59, 2 (2012), 6.
[4]
Paul Beame, Stephen A. Cook, Jeff Edmonds, Russell Impagliazzo, and Toniann Pitassi. 1998. The relative complexity of NP search problems. J. Comput. Syst. Sci. 57, 1 (1998), 3--19.
[5]
Avraham Ben-Aroya, Dean Doron, and Amnon Ta-Shma. 2016. Explicit two-source extractors for near-logarithmic min-entropy. Electron. Colloq. Comput. Complex. 23 (2016), 88.
[6]
Itay Berman, Akshay Degwekar, Ron D. Rothblum, and Prashant Nalini Vasudevan. 2018. Multi-collision resistant hash functions and their applications. In Proceedings of the Conference on Advances in Cryptology (EUROCRYPT’18) (Lecture Notes in Computer Science), Vol. 10821. Springer, 133--161.
[7]
Nir Bitansky, Yael Tauman Kalai, and Omer Paneth. 2017. Multi-collision resistance: A paradigm for keyless hash functions. In Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, (STOC’18). 671--684.
[8]
Nir Bitansky, Omer Paneth, and Alon Rosen. 2015. On the cryptographic hardness of finding a Nash equilibrium. In Proceedings of the IEEE Annual Symposium on Foundations of Computer Science (FOCS’15). 1480--1498.
[9]
Sam Buss. 2009. Introduction to NP Functions and Local Search. Retrieved from: http://www.math.ucsd.edu/sbuss/ResearchWeb/Prague2009/talkslides1.pdf.
[10]
Ran Canetti, Oded Goldreich, and Shai Halevi. 2004. The random oracle methodology, revisited. J. ACM 51, 4 (2004), 557--594.
[11]
Eshan Chattopadhyay and David Zuckerman. 2016. Explicit two-source extractors and resilient functions. In Proceedings of the Symposium on the Theory of Computing (STOC’16). ACM, 670--683.
[12]
Benny Chor and Oded Goldreich. 1988. Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM J. Comput. 17, 2 (1988), 230--261.
[13]
Gil Cohen. 2016a. Two-source dispersers for polylogarithmic entropy and improved Ramsey graphs. In Proceedings of the Symposium on the Theory of Computing (STOC’16), Daniel Wichs and Yishay Mansour (Eds.). ACM, 278--284.
[14]
Gil Cohen. 2016b. Two-source extractors for quasi-logarithmic min-entropy and improved privacy amplification protocols. Electron. Colloq. Comput. Complex. 23 (2016), 114.
[15]
David Conlon. 2008. A new upper bound for the bipartite Ramsey problem. J. Graph Theor. 58, 4 (2008), 351--356.
[16]
Paul Erdös. 1947. Some remarks on the theory of graphs. Bull. Amer. Math. Soc. 53, 4 (1947), 292--294.
[17]
Paul Erdös and Richard Rado. 1960. Intersection theorems for systems of sets. J. London Math. Soc. 35 (1960), 85--90.
[18]
David Mandell Freeman, Oded Goldreich, Eike Kiltz, Alon Rosen, and Gil Segev. 2013. More constructions of lossy and correlation-secure trapdoor functions. J. Cryptology 26, 1 (2013), 39--74.
[19]
Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, and Brent Waters. 2013. Candidate indistinguishability obfuscation and functional encryption for all circuits. In Proceedings of the IEEE Annual Symposium on Foundations of Computer Science (FOCS’13).
[20]
Sanjam Garg, Omkant Pandey, and Akshayaram Srinivasan. 2016. Revisiting the cryptographic hardness of finding a Nash equilibrium. In Proceedings of the International Cryptology Conference (CRYPTO’16). 579--604.
[21]
Paul W. Goldberg and Christos H. Papadimitriou. 2018. Towards a unified complexity theory of total functions. J. Comput. Syst. Sci. 94 (2018), 167--192.
[22]
Paul W. Goldberg and Aaron Roth. 2016. Bounds for the query complexity of approximate equilibria. ACM Trans. Econ. Comput. 4, 4 (2016), 24:1--24:25.
[23]
Oded Goldreich. 2011. Introduction to testing graph properties. In Studies in Complexity and Cryptography. Vol. 6650. 470--506.
[24]
Shafi Goldwasser and Yael Tauman Kalai. 2003. On the (in)security of the Fiat-Shamir paradigm. In Proceedings of the IEEE Annual Symposium on Foundations of Computer Science (FOCS’03). 102--113.
[25]
Mika Göös, Toniann Pitassi, and Thomas Watson. 2015. Deterministic communication vs. partition number. In Proceedings of the IEEE Annual Symposium on Foundations of Computer Science (FOCS’15). 1077--1088.
[26]
Ronald L. Graham, Bruce L. Rothschild, and Joel H. Spencer. 1990. Ramsey Theory (2nd ed.). John Wiley.
[27]
Satoshi Hada. 2000. Zero-knowledge and code obfuscation. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT’00). 443--457.
[28]
Brett Hemenway and Rafail Ostrovsky. 2012. Extended-DDH and lossy trapdoor functions. In Proceedings of the International Conference on Theory and Practice of Public Key Cryptography (PKC’12). 627--643.
[29]
Michael D. Hirsch, Christos H. Papadimitriou, and Stephen A. Vavasis. 1989. Exponential lower bounds for finding Brouwer fixed points. J. Complexity 5, 4 (1989), 379--416.
[30]
Pavel Hubácek, Moni Naor, and Eylon Yogev. 2017. The journey from NP to TFNP hardness. In Proceedings of the 8th Innovations in Theoretical Computer Science Conference (ITCS’17) (LIPIcs), Vol. 67. Schloss Dagstuhl—Leibniz-Zentrum fuer Informatik, 60:1--60:21.
[31]
Pavel Hubácek and Eylon Yogev. 2017. Hardness of continuous local search: Query complexity and cryptographic lower bounds. In Proceedings of the ACM-SIAM Symposium on Discrete Algorithms (SODA’17). 1352--1371.
[32]
Russell Impagliazzo and Moni Naor. 1988. Decision trees and downward closures. In Proceedings of the 3rd Structure in Complexity Theory Conference. 29--38.
[33]
Emil Jerábek. 2009. Approximate counting by hashing in bounded arithmetic. J. Symb. Log. 74, 3 (2009), 829--860.
[34]
Emil Jerábek. 2016. Integer factoring and modular square roots. J. Comput. Syst. Sci. 82, 2 (2016), 380--394.
[35]
Antoine Joux. 2004. Multicollisions in iterated hash functions. Application to cascaded constructions. In Proceedings of the International Cryptology Conference (CRYPTO’04), Vol. 3152. 306--316.
[36]
Stasys Jukna. 2011. Extremal Combinatorics—With Applications in Computer Science (2nd ed.). Springer.
[37]
Joe Kilian. 1992. A note on efficient zero-knowledge proofs and arguments (extended abstract). In Proceedings of the Symposium on the Theory of Computing (STOC’92). ACM, 723--732.
[38]
Eike Kiltz, Adam O’Neill, and Adam D. Smith. 2010. Instantiability of RSA-OAEP under chosen-plaintext attack. In Proceedings of the International Cryptology Conference (CRYPTO’10). Springer, 295--313.
[39]
Ilan Komargodski, Moni Naor, and Eylon Yogev. 2017. White-box vs. black-box complexity of search problems: Ramsey and graph property testing. In Proceedings of the 58th IEEE Annual Symposium on Foundations of Computer Science (FOCS’17). IEEE Computer Society, 622--632.
[40]
Ilan Komargodski, Moni Naor, and Eylon Yogev. 2018. Collision resistant hashing for paranoids: Dealing with multiple collisions. In Proceedings of the Conference on Advances in Cryptology (EUROCRYPT’18) (Lecture Notes in Computer Science), Vol. 10821. Springer, 162--194.
[41]
Ilan Komargodski and Gil Segev. 2017. From minicrypt to obfustopia via private-key functional encryption. In Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT’17). 122--151.
[42]
Ilan Komargodski and Eylon Yogev. 2018. On distributional collision resistant hashing. In Proceedings of the 38th Annual International Cryptology Conference—Advances in Cryptology (CRYPTO’18). 303--327.
[43]
Jan Krajícek. 2001. On the weak pigeonhole principle. Fundam. Math. 170 (2001), 123--140.
[44]
Jan Krajícek. 2005. Structured pigeonhole principle, search problems and hard tautologies. J. Symb. Log. 70, 2 (2005), 619--630.
[45]
Xin Li. 2016. Improved non-malleable extractors, non-malleable codes and independent source extractors. Electron. Colloq. Comput. Complex. 23 (2016), 115.
[46]
László Lovász, Moni Naor, Ilan Newman, and Avi Wigderson. 1995. Search problems in the decision tree model. SIAM J. Discrete Math. 8, 1 (1995), 119--132.
[47]
Nimrod Megiddo and Christos H. Papadimitriou. 1991. On total functions, existence theorems and computational complexity. Theor. Comput. Sci. 81, 2 (1991), 317--324.
[48]
Joseph Naor and Moni Naor. 1993. Small-bias probability spaces: Efficient constructions and applications. SIAM J. Comput. 22, 4 (1993), 838--856.
[49]
Moni Naor. 1992. Constructing Ramsey Graphs from Small Probability Spaces. IBM Research Report RJ 8810 (1992). Retrieved from: http://www.wisdom.weizmann.ac.il/naor/PAPERS/ramsey.ps.
[50]
Christos H. Papadimitriou. 1994. On the complexity of the parity argument and other inefficient proofs of existence. J. Comput. Syst. Sci. 48, 3 (1994), 498--532.
[51]
Chris Peikert and Brent Waters. 2011. Lossy trapdoor functions and their applications. SIAM J. Comput. 40, 6 (2011), 1803--1844.
[52]
David Pointcheval and Jacques Stern. 1996. Security proofs for signature schemes. In Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT’96). 387--398.
[53]
Pavel Pudlák. 1990. Ramsey’s theorem in bounded arithmetic. In Proceedings of the 4th Workshop on Computer Science Logic (CSL’90). 308--317.
[54]
Ran Raz and Pierre McKenzie. 1999. Separation of the monotone NC hierarchy. Combinatorica 19, 3 (1999), 403--435.
[55]
Amit Sahai and Brent Waters. 2014. How to use indistinguishability obfuscation: Deniable encryption, and more. In Proceedings of the Symposium on the Theory of Computing (STOC’14).
[56]
Alexander A. Sherstov. 2011. The pattern matrix method. SIAM J. Comput. 40, 6 (2011), 1969--2000.
[57]
Daniel R. Simon. 1998. Finding collisions on a one-way street: Can secure hash functions be based on general assumptions? In Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT’98). 334--345.

Cited By

View all
  • (2024)THE BOX MODEL AND PRODUCT READINESS LEVEL: DETERMINING THE VIABILITY OF IDEASЕкономіка та суспільство10.32782/2524-0072/2024-68-60Online publication date: 28-Oct-2024
  • (2024)Black-Box PPP Is Not Turing-ClosedProceedings of the 56th Annual ACM Symposium on Theory of Computing10.1145/3618260.3649769(1405-1414)Online publication date: 10-Jun-2024
  • (2024)On Pigeonhole Principles and Ramsey in TFNP2024 IEEE 65th Annual Symposium on Foundations of Computer Science (FOCS)10.1109/FOCS61266.2024.00033(406-428)Online publication date: 27-Oct-2024
  • Show More Cited By

Index Terms

  1. White-Box vs. Black-Box Complexity of Search Problems: Ramsey and Graph Property Testing

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Journal of the ACM
      Journal of the ACM  Volume 66, Issue 5
      Distributed Computing, Algorithms and Data Structures, Algorithms, Scientific Computing, Derandomizing Algorithms, Online Algorithms and Algorithmic Information Theory
      October 2019
      266 pages
      ISSN:0004-5411
      EISSN:1557-735X
      DOI:10.1145/3350420
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 23 July 2019
      Accepted: 01 June 2019
      Revised: 01 November 2018
      Received: 01 May 2018
      Published in JACM Volume 66, Issue 5

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Ramsey theory
      2. black-box hardness
      3. white-box hardness

      Qualifiers

      • Research-article
      • Research
      • Refereed

      Funding Sources

      • ISF

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)44
      • Downloads (Last 6 weeks)13
      Reflects downloads up to 19 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)THE BOX MODEL AND PRODUCT READINESS LEVEL: DETERMINING THE VIABILITY OF IDEASЕкономіка та суспільство10.32782/2524-0072/2024-68-60Online publication date: 28-Oct-2024
      • (2024)Black-Box PPP Is Not Turing-ClosedProceedings of the 56th Annual ACM Symposium on Theory of Computing10.1145/3618260.3649769(1405-1414)Online publication date: 10-Jun-2024
      • (2024)On Pigeonhole Principles and Ramsey in TFNP2024 IEEE 65th Annual Symposium on Foundations of Computer Science (FOCS)10.1109/FOCS61266.2024.00033(406-428)Online publication date: 27-Oct-2024
      • (2023)Quality of education as the modeling object: "black", "white" or "gray" box for national economics developmentCTE Workshop Proceedings10.55056/cte.54710(85-95)Online publication date: 21-Mar-2023
      • (2023)Symbolic Execution of Hadamard-Toffoli Quantum CircuitsProceedings of the 2023 ACM SIGPLAN International Workshop on Partial Evaluation and Program Manipulation10.1145/3571786.3573018(14-26)Online publication date: 15-Jan-2023
      • (2023)Black Box Testing with Equivalence Partitions Techniques in Transcrop Applications2023 6th International Conference of Computer and Informatics Engineering (IC2IE)10.1109/IC2IE60547.2023.10331562(53-58)Online publication date: 14-Sep-2023
      • (2023)Development of Automatic Source Code Evaluation Tests Using Grey-Box Methods: A Programming Education Case StudyIEEE Access10.1109/ACCESS.2023.331769411(106772-106792)Online publication date: 2023
      • (2022)Two's company, three's a crowd: Consensus-halving for a constant number of agentsArtificial Intelligence10.1016/j.artint.2022.103784313(103784)Online publication date: Dec-2022
      • (2021)Choice of tools for analysis of the quality of education impact on the state socio-economic developmentSocio-Economic Problems and the State10.33108/sepd2021.01.00324:1(3-14)Online publication date: 2021
      • (2021)Two's Company, Three's a Crowd: Consensus-Halving for a Constant Number of AgentsProceedings of the 22nd ACM Conference on Economics and Computation10.1145/3465456.3467625(347-368)Online publication date: 18-Jul-2021
      • Show More Cited By

      View Options

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format.

      HTML Format

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media