The Journey from NP to TFNP Hardness

Slides:



Advertisements
Similar presentations
Impagliazzos Worlds in Arithmetic Complexity: A Progress Report Scott Aaronson and Andrew Drucker MIT 100% QUANTUM-FREE TALK (FROM COWS NOT TREATED WITH.
Advertisements

Linear-Degree Extractors and the Inapproximability of Max Clique and Chromatic Number David Zuckerman University of Texas at Austin.
Models of Computation Prepared by John Reif, Ph.D. Distinguished Professor of Computer Science Duke University Analysis of Algorithms Week 1, Lecture 2.
Average-case Complexity Luca Trevisan UC Berkeley.
Approximate List- Decoding and Hardness Amplification Valentine Kabanets (SFU) joint work with Russell Impagliazzo and Ragesh Jaiswal (UCSD)
Talk for Topics course. Pseudo-Random Generators pseudo-random bits PRG seed Use a short “ seed ” of very few truly random bits to generate a long string.
6.896: Topics in Algorithmic Game Theory Lecture 8 Constantinos Daskalakis.
COMP 553: Algorithmic Game Theory Fall 2014 Yang Cai Lecture 21.
Computation of Nash Equilibrium Jugal Garg Georgios Piliouras.
Great Theoretical Ideas in Computer Science.
02/01/11CMPUT 671 Lecture 11 CMPUT 671 Hard Problems Winter 2002 Joseph Culberson Home Page.
Complexity 15-1 Complexity Andrei Bulatov Hierarchy Theorem.
Complexity and Cryptography
Analysis of Algorithms CS 477/677
CSE 421 Algorithms Richard Anderson Lecture 27 NP Completeness.
On Everlasting Security in the Hybrid Bounded Storage Model Danny Harnik Moni Naor.
In a World of BPP=P Oded Goldreich Weizmann Institute of Science.
Nathan Brunelle Department of Computer Science University of Virginia Theory of Computation CS3102 – Spring 2014 A tale.
Theory of Computing Lecture 17 MAS 714 Hartmut Klauck.
CSCI 3160 Design and Analysis of Algorithms Tutorial 10 Chengyu Lin.
1 Design and Analysis of Algorithms Yoram Moses Lecture 11 June 3, 2010
On the Complexity of Search Problems George Pierrakos Mostly based on: On the Complexity of the Parity Argument and Other Insufficient Proofs of Existence.
NP-Complete Problems. Running Time v.s. Input Size Concern with problems whose complexity may be described by exponential functions. Tractable problems.
Non-Approximability Results. Summary -Gap technique -Examples: MINIMUM GRAPH COLORING, MINIMUM TSP, MINIMUM BIN PACKING -The PCP theorem -Application:
My Favorite Ten Complexity Theorems of the Past Decade II Lance Fortnow University of Chicago.
Umans Complexity Theory Lectures Lecture 17: Natural Proofs.
NIR BITANSKY, OMER PANETH, ALON ROSEN ON THE CRYPTOGRAPHIC HARDNESS OF FINDING A NASH EQUILIBRIUM.
Pseudo-random generators Talk for Amnon ’ s seminar.
6.853: Topics in Algorithmic Game Theory Fall 2011 Constantinos Daskalakis Lecture 9.
1 Introduction to Quantum Information Processing QIC 710 / CS 667 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 Lectures
Complexity Theory and Explicit Constructions of Ramsey Graphs Rahul Santhanam University of Edinburgh.
P & NP.
Topic 36: Zero-Knowledge Proofs
Lower Bounds on Assumptions behind Indistinguishability Obfuscation
Information Complexity Lower Bounds
Derandomization & Cryptography
Introduction to Randomized Algorithms and the Probabilistic Method
Randomness and Computation
Richard Anderson Lecture 26 NP-Completeness
UNIT III DYNAMIC PROGRAMMING ALGORITHMS
Negation-Limited Formulas
Introduction to Discrete Mathematics
Some Great Theoretical Ideas in Computer Science for.
COMP/MATH 553: Algorithmic Game Theory
CS154, Lecture 18:.
Pseudorandomness when the odds are against you
NP-Completeness Yin Tat Lee
Intro to Theory of Computation
Intro to Theory of Computation
Computability and Complexity
My Favorite Ten Complexity Theorems of the Past Decade II
Umans Complexity Theory Lectures
Pseudo-derandomizing learning and approximation
Richard Anderson Lecture 25 NP-Completeness
Great Theoretical Ideas in Computer Science
Chapter 8 NP and Computational Intractability
NP-Complete Problems.
Chapter 34: NP-Completeness
On the Efficiency of 2 Generic Cryptographic Constructions
Indistinguishability by adaptive procedures with advice, and lower bounds on hardness amplification proofs Aryeh Grinberg, U. Haifa Ronen.
NP-Completeness Yin Tat Lee
CSE 6408 Advanced Algorithms.
Computing a Nash Equilibrium of a Congestion Game: PLS-completeness
Trevor Brown DC 2338, Office hour M3-4pm
The Polynomial Hierarchy Enumeration Problems 7.3.3
Impossibility of SNARGs
Instructor: Aaron Roth
Switching Lemmas and Proof Complexity
Lecture 23 NP-Hard Problems
Presentation transcript:

The Journey from NP to TFNP Hardness Pavel Hubáček Moni Naor Eylon Yogev Now at IDC en route to Charles U. Weizmann Institute of Science SurpriseBonus

I rarely end up where I was intending to go, but often I end up somewhere I needed to be. Douglas Adams

TFNP – Total Function NP [MP91] Megiddo and Papadimitriou NP: easy to verify decision problems FNP: easy to verify search problems Given an instance x, find a valid witness for x TFNP: a subclass of FNP with guaranteed solution Try to prune the text, be more succinct e.g., NP: easy to verify decision problems FNP: easy to verify search problems TFNP: search problems in FNP with guaranteed solution FNP coNP NP TFNP P FP

Complexity Zoo Polynomial Pigeonhole Principle Local Optimum [Pap94] 𝑻𝑭𝑵𝑷 Local Optimum [JPY88] 𝑷𝑷𝑷 𝑷𝑳𝑺 𝑷𝑷𝑨𝑫 Nash Equilibrium Brouwer Fixed Points [Pap94,DGP09, CDT09] Do you need PPA?? If you cut it the slide would be simpler. Also, CLS is aligned a bit weird. Continuous Local Optimum [DP11] 𝑪𝑳𝑺 Oracle separations

Collision resistant hash / one-way permutation Hardness Collision resistant hash / one-way permutation [Pap94] 𝑻𝑭𝑵𝑷 P ≠ NP ? 𝑷𝑷𝑷 𝑷𝑳𝑺 𝑷𝑷𝑨𝑫 Obfuscation [BPR15, GPS16] End-of-line 𝑪𝑳𝑺 Obfuscation [HY17]

WHAT IS THE WEAKEST ASSUMPTION UNDER WHICH WE CAN SHOW HARDNESS OF TFNP?

Barriers for Proving TFNP Hardness TFNP hardness from worst-case NP hardness ⇒ NP = coNP [JPY88,MP91]. A randomized reduction from TFNP to NP ⇒ SAT is “checkable” [MX10]. There exists an oracle relative to TFNP is easy and PH is infinite [BFK+10]. TFNP hardness from one-way functions ⇒ exponentially many solutions [RSS16]. Mahmoody and Xiao Buhrman, Fortnow, Koucky, Rogers and Vereshchagin Maybe decrease the font size a bit and try to make the each item fit a single line. Rosen, Segev, Shahaf

The Five Worlds of Impagliazzo Algorithmica: P = NP Heuristica: P ≠ NP but NP is easy-on-average Pessiland: NP is hard-on-average but ∄ one-way functions Minicrypt: ∃ one-way functions but ∄ public-key crypto Cryptomania: ∃ public-key cryptography The Five Worlds of Impagliazzo This is a nice slide Obfustopia: ∃ indistinguishability obfuscation

The Five Worlds of Impagliazzo Algorithmica: P = NP Heuristica: P ≠ NP but NP is easy-on-average Pessiland: NP is hard-on-average but ∄ one-way functions Minicrypt: ∃ one-way functions but ∄ public-key crypto Cryptomania: ∃ public-key cryptography The Five Worlds of Impagliazzo Obfustopia: ∃ indistinguishability obfuscation

The Five Worlds of Impagliazzo Algorithmica: P = NP Heuristica: P ≠ NP but NP is easy-on-average Pessiland: NP is hard-on-average but ∄ one-way functions Minicrypt: ∃ one-way functions but ∄ public-key crypto Cryptomania: ∃ public-key cryptography The Five Worlds of Impagliazzo Obfustopia: ∃ indistinguishability obfuscation

TFNP hardness can be based on any hard-on-average language in NP Our Results TFNP hardness can be based on any hard-on-average language in NP For example: planted clique, random SAT, etc. In particular, any one-way function Our results show: hard-on-average TFNP problems exist in Pessiland (and beyond) No need for case: planted clique, random SAT

The Five Worlds of Impagliazzo Algorithmica: P = NP Heuristica: P ≠ NP but NP is easy-on-average Pessiland: NP is hard-on-average but ∄ one-way functions Minicrypt: ∃ one-way functions but ∄ public-key crypto Cryptomania: ∃ public-key cryptography The Five Worlds of Impagliazzo Obfustopia: ∃ indistinguishability obfuscation

The Five Worlds of Impagliazzo Algorithmica: P = NP Heuristica: P ≠ NP but NP is easy-on-average Pessiland: NP is hard-on-average but ∄ one-way functions Minicrypt: ∃ one-way functions but ∄ public-key crypto Cryptomania: ∃ public-key cryptography The Five Worlds of Impagliazzo TFNP Hardness Obfustopia: ∃ indistinguishability obfuscation

Proof Let 𝐿∈𝑁𝑃 be a hard-on-average language with distribution D {0,1}n D L Not in TFNP x Search Problem: given x ← D find w such that (x,w) ∈ L

Reverse Randomization Let 𝐿∈𝑁𝑃 be a hard-on-average language with distribution D Ls: 𝑥∈ 𝐿 𝑠 ⇔ 𝑥⊕𝑠∈𝐿 {0,1}n Ls D L x Search Problem: given x ← D find w such that (x,w) ∈ L OR (x,w) ∈ Ls

Reverse Randomization Let 𝐿∈𝑁𝑃 be a hard-on-average language with distribution D Ls: 𝑥∈ 𝐿 𝑠 ⇔ 𝑥⊕𝑠∈𝐿 {0,1}n Ls D Not hard distribution L Distributed according to D x Random shift of D Search Problem: given x ← D find w such that (x,w) ∈ L OR (x⊕s,w) ∈ L

Proof L’: r ∈ L’ ⇔ D(r) ∈ L {0,1}m D {0,1}n L’ L r x

U Proof {0,1}m r L’ r L’: r ∈ L’ ⇔ D(r) ∈ L Search Problem: given r ← U find w such that (D(r),w) ∈ L L’ r The same as for curly D and normal D goes also for curly U and normal U.

U Proof {0,1}m r L’ r L 𝑠 ′ L’: r ∈ L’ ⇔ D(r) ∈ L For random 𝑠 define 𝑟∈ 𝐿 𝑠 ′ ⇔𝐷 𝑟⊕𝑠 ∈𝐿 {0,1}m U r Search Problem: given r ← U find w such that (D (r),w) ∈ L OR (D (r ⊕ s),w) ∈ L L’ r L 𝑠 ′ Typo: L’_i in the bullet point

U Proof {0,1}m r L’ r L s 1 ′ L’: r ∈ L’ ⇔ D(r) ∈ L For random 𝑠 𝑖 define 𝑟∈ 𝐿 𝑠 𝑖 ′ ⇔D (r⊕si)∈𝐿 {0,1}m U r Search Problem: given r ← U find w such that (D (r ⊕ si),w) ∈ L for some i L’ r L s 1 ′ Typos: L’_i in the bullet point and L’_{s_1} in the picture

U Proof {0,1}m r L’ r L s 1 ′ L’: r ∈ L’ ⇔ D(r) ∈ L For random 𝑠 𝑖 define 𝑟∈ 𝐿 𝑠 𝑖 ′ ⇔𝐷 𝑟⊕ 𝑠 𝑖 ∈𝐿 {0,1}m U r Search Problem: given r ← U find w such that (D (r ⊕ si),w) ∈ L for some i L’ r L s 1 ′ Hard distribution?

Is this a Hard Distribution? The instance is the random coins of the distribution Can we learn anything from the random coins about the solution? Think of the planted clique vs. random SAT We need the distribution to be a “public-coin” distribution Do such distributions necessarily exist? Theorem: There exists a reduction from private-coin to public-coin Proof goes through universal one-way hash function Impagliazzo-Levin 90: No better ways to generate hard NP instance…

Finding a Good Shift We have shown that: A random set s1,…,sk satisfies that 𝐿′ 𝑠 1 ,…, 𝑠 𝑘 is hard for U Can we find s1,…,sk deterministically? Solution #1: hard-wire them non-uniformly ⇒ A hard problem in (non-uniform) TFNP Solution #2: use derandomization (Nisan-Wigderson PRG) ⇒ A hard problem in TFNP assuming NW-PRG

Nisan-Wigderson Pseudorandom Generator Assume a hard function exists ∃ f ∈ E that has Π 2 -circuit complexity 2 𝑂(𝑛) Exists pseudorandom generator Against Π 2 -circuits We can derandomize Combine all shifts to one good shift

Additional Results TFNP hardness can be based on one-way functions + zero knowledge proofs* Another technique for pushing problems into TFNP Get a more structural problem No need for case: planted clique, random SAT

Summary NP is hard-on-average 𝑻𝑭𝑵𝑷 𝑷𝑷𝑷 𝑷𝑳𝑺 𝑷𝑷𝑨𝑫 𝑪𝑳𝑺

On the White-Box Complexity of Search Problems: Ramsey and Graph Property Testing Ilan Komargodski Moni Naor Eylon Yogev Weizmann Institute of Science

Ramsey Theory Guarantees the existence of a local pattern in a large object For every n there is a finite R(n) such that: every graph on n nodes has a clique or independent set on n nodes. 2 𝑛/2 ≤𝑅(𝑛) ≤ 2 2𝑛 How hard is it to find the clique/independent set? Proof is constructive, but examines a linear number of edges If the graph is given in a black-box manner: need 2 𝑛/2 steps [IN88] A random graph has no clique or IS of size n/2 [Erdos47]

How hard is Ramsey in the white-box model? Suppose we are given a program or circuit C for computing the graph 𝐶:{ 0,1} 𝑛 ×{ 0,1} 𝑛 →{0,1} For nodes x and y: the circuit 𝐶(𝑥,𝑦) determines if there is an edge between x and y How hard is to find the guaranteed clique or IS of size n/2? Problem is in TFNP! But where? Buss 2014 Goldberg Papadimitriou 2016

Ramsey in TFNP 𝑻𝑭𝑵𝑷 𝑷𝑷𝑷 𝑷𝑳𝑺 𝑹𝒂𝒎𝒔𝒆𝒚 𝑷𝑷𝑨𝑫 𝑪𝑳𝑺 Do you need PPA?? If you cut it the slide would be simpler. Also, CLS is aligned a bit weird. 𝑪𝑳𝑺

White-box Hardness of Ramsey Theorem: Suppose we have collision resistant hash functions A function that compresses ℎ:{ 0,1} 𝑛 →{ 0,1} 𝑛−1 but hard to find collisions Then the Ramsey problem is hard. Hardness is for finding clique or IS of size 𝑛 𝛿 Given circuit of size poly in n encoding a graph on nodes Find a clique/IS of size n/2

White-box Hardness of Ramsey Idea: given a small graph G which is Ramsey no clique or IS of size n/2 want to generate a large graph H which is Ramsey with same parameters Impossible Should be hard to distinguish large graph from small Approach: combine G with a CRH h to obtain H=𝐺⊗ℎ Graph G on 2 𝑚 nodes Graph H on 2 𝑚+∆ nodes ℎ:{ 0,1} 𝑚+∆ →{ 0,1} 𝑚 Edge connecting x to y exists iff h(x) is connected to h(y) in G A clique (or IS) in H corresponds to either A clique (IS) in G or Collision under h Nodes mapped to h(x) Nodes mapped to h(y)

White-box Hardness of Ramsey Approach: combine G with a CRH h to obtain H=𝐺⊗ℎ Graph G on 2 𝑚 nodes Graph H on 2 𝑚+∆ nodes ℎ:{ 0,1} 𝑚+∆ →{ 0,1} 𝑚 Edge connecting (i,x) to (j,y) exists iff h(i,x) is connected to h(j,y) in G A clique (or IS) in H corresponds to either A clique (IS) in G or A collision under h Where does G come from? Observation: a graph defined by an 𝑛 2 -wise independent function is Ramsey [Nao92] Can use it for a succinct description of a circuit for a Ramsey graph Plus the CRH function h Remarkable progress on explicit constructions Coh16a, CZ16, BDT16, Coh16b, Li16 Not good enough for us!

Ramsey in TFNP 𝑻𝑭𝑵𝑷 𝑷𝑷𝑷 𝑷𝑳𝑺 𝑹𝒂𝒎𝒔𝒆𝒚 𝑷𝑾𝑷𝑷 𝑷𝑷𝑨𝑫 𝑪𝑳𝑺 PWPP = Polynomial Weak Pigeonhole Principle Every function :{ 0,1} 𝑚 →{ 0,1} 𝑚−1 𝑻𝑭𝑵𝑷 𝑷𝑷𝑷 𝑷𝑳𝑺 𝑹𝒂𝒎𝒔𝒆𝒚 𝑷𝑾𝑷𝑷 𝑷𝑷𝑨𝑫 Do you need PPA?? If you cut it the slide would be simpler. Also, CLS is aligned a bit weird. 𝑪𝑳𝑺

White-box from Black-box lower bounds Impossible to translate all query lower bounds for TFNP to white-box lower bounds Proof a la CGH04 Property Testing: lots of black-box lower bounds Theorem: there is a graph property that is hard to test for a white-box graph Based on Lossy Functions We don’t need no obfuscation! being an extractor

Research Directions Ramsey style: Lower bounds without obfuscation Schur: in every finite coloring of the integers there is a monochromatic (X, Y, X+Y) Lower bounds without obfuscation PPAD PLS Hardness of PPP from one-way functions Meaning of result for constructing a one-way function from an NP-hard problem Better constructions of Ramsey Graphs yield deterministic reductions.