Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

BPP has subexponential time simulations unlessEXPTIME has publishable proofs

  • Published:
computational complexity Aims and scope Submit manuscript

Abstract

We show thatBPP can be simulated in subexponential time for infinitely many input lengths unless exponential time

  • ℴ collapses to the second level of the polynomial-time hierarchy.

  • ℴ has polynomial-size circuits and

  • ℴ has publishable proofs (EXPTIME=MA).

We also show thatBPP is contained in subexponential time unless exponential time has publishable proofs for infinitely many input lengths. In addition, we showBPP can be simulated in subexponential time for infinitely many input lengths unless there exist unary languages inMA-P.

The proofs are based on the recent characterization of the power of multiprover interactive protocols and on random self-reducibility via low-degree polynomials. They exhibit an interplay between Boolean circuit simulation, interactive proofs and classical complexity classes. An important feature of this proof is that it does not relativize.

One of the ingredients of our proof is a lemma that states that ifEXPTIME has polynomial size circuits thenEXPTIME=MA. This extends previous work by Albert Meyer.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • L. Adleman, Two theorems on random polynomial time, inProceedings of the 19th IEEE Symposium on Foundations of Computer Science, IEEE, New York, 1978, 75–83.

  • L. Babai, Trading group theory for randomness, inProceedings of the 17th ACM Symposium on the Theory of Computing, ACM, New York, 1985, 421–429.

  • L. Babai andL. Fortnow, Arithmetization: A new method in structural complexity theory,Computational Complexity,1:1 (1991), 41–66.

    Google Scholar 

  • L. Babai, L. Fortnow, andC. Lund, Non-deterministic exponential time has two-prover interactive protocols,Computational Complexity,1:1 (1991), 3–40.

    Google Scholar 

  • L. Babai andS. Moran, Arthur-Merlin games: a randomized proof system, and a hierarchy of complexity classes,Journal of Computer and System Sciences,36:2 (1988), 254–276.

    Google Scholar 

  • D. Beaver andJ. Feigenbaum, Hiding instances in multioracle queries, inProceedings of the 7th Symposium on Theoretical Aspects of Computer Science, volume 415 ofLecture Notes in Computer Science, Springer, Berlin, 1990, 37–48.

    Google Scholar 

  • M. Ben-Or, S. Goldwasser, J. Kilian, and A. Wigderson, Multiprover interactive proofs: How to remove intractability assumptions, inProceedings of the 20th ACM Symposium on the Theory of Computing, ACM, New York, 1988, 113–131.

  • C. Bennet andJ. Gill, Relative to a random oracle,P A ≠ NPA ≠ co-NPA with probability one,SIAM Journal on Computing,10 (1981), 96–113.

    Google Scholar 

  • M. Blum and S. Kannan, Designing programs that check their work, inProceedings of the 21st ACM Symposium on the Theory of Computing, ACM, New York, 1989, 86–97.

  • M. Blum, M. Luby, and R. Rubinfeld, Self-testing and self-correcting programs, with applications to numerical programs, inProceedings of the 22nd ACM Symposium on the Theory of Computing, ACM, New York, 1990, 73–83.

  • M. Blum andS. Micali, How to generate cryptographically strong sequences of pseudo-random bits,SIAM Journal on Computing,13 (1984), 850–864.

    Google Scholar 

  • R. Boppana andR. Hirschfeld, Pseudorandom generators and complexity classes, inRandomness and Computation, volume 5 ofAdvances in Computing Research, S. Micali, ed., JAI Press, Greenwich, 1989, 1–26.

    Google Scholar 

  • O. Goldreich, H. Krawczyk, and M. Luby, On the existence of pseudorandom generators, inProceedings of the 29th IEEE Symposium on Foundations of Computer Science, IEEE, New York, 1988, 12–24.

  • O. Goldreich and L. Levin, A hard-core predicate for all one-way functions, inProceedings of the 21st ACM Symposium on the Theory of Computing, ACM, New York, 1989, 25–32.

  • S. Goldwasser, S. Micali, andC. Rackoff, The knowledge complexity of interactive proof-systems,SIAM Journal on Computing,18:1 (1989), 186–208.

    Google Scholar 

  • J. Håstad, Pseudo-random generators under uniform assumptions, inProceedings of the 22nd ACM Symposium on the Theory of Computing, ACM, New York, 1990, 395–404.

  • J. Hartmanis, N. Immerman, andV. Sewelson, Sparse sets inNP-P: EXPTIME versusNEXPTIME, Information and Control,65 (1985), 158–181.

    Google Scholar 

  • H. Heller, On relativized exponential and probabilistic complexity classes,Information and Computation,71 (1986), 231–243.

    Google Scholar 

  • R. Impagliazzo, L. Levin, and M. Luby, Pseudo-random number generation from one-way functions, inProceedings of the 21st ACM Symposium on the Theory of Computing, ACM, New York, 1989, 12–24.

  • R. Karp and R. Lipton, Some connections between nonuniform and uniform complexity classes, inProceedings of the 12th ACM Symposium on the Theory of Computing, ACM, New York, 1980, 302–309.

  • L. Levin, One-way functions and pseudo-random generators,Combinatorica,7 (1987), 357–363.

    Google Scholar 

  • R. Lipton, New directions in testing, inDistributed Computing and Cryptography, volume 2 ofDIMACS Series in Discrete Mathematics and Theoretical Computer Science, J. Feigenbaum and M. Merritt, eds., American Mathematical Society, Providence, 1991, 191–202.

    Google Scholar 

  • C. Lund, L. Fortnow, H. Karloff, andN. Nisan, Algebraic methods for interactive proof systems,Journal of the ACM,39:4 (1992), 859–868.

    Google Scholar 

  • N. Nisan and A. Wigderson, Hardness vs. randomness, inProceedings of the 29th IEEE Symposium on Foundations of Computer Science, IEEE, New York, 1988, 2–11.

  • A. Shamir, IP=PSPACE,Journal of the ACM,39:4 (1992), 869–877.

    Google Scholar 

  • A. Yao, Theory and applications of trapdoor functions, inProceedings of the 23rd IEEE Symposium on Foundations of Computer Science, IEEE, New York, 1982, 80–91.

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Babai, L., Fortnow, L., Nisan, N. et al. BPP has subexponential time simulations unlessEXPTIME has publishable proofs. Comput Complexity 3, 307–318 (1993). https://doi.org/10.1007/BF01275486

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF01275486

Key words

Subject classifications

Navigation