Pseudo-deterministic Proofs

Slides:



Advertisements
Similar presentations
Low-End Uniform Hardness vs. Randomness Tradeoffs for Arthur-Merlin Games. Ronen Shaltiel, University of Haifa Chris Umans, Caltech.
Advertisements

Lower Bounds for Non-Black-Box Zero Knowledge Boaz Barak (IAS*) Yehuda Lindell (IBM) Salil Vadhan (Harvard) *Work done while in Weizmann Institute. Short.
Complexity Theory Lecture 6
Complexity Theory Lecture 8
Isolation Technique April 16, 2001 Jason Ku Tao Li.
Uniform Hardness vs. Randomness Tradeoffs for Arthur-Merlin Games. Danny Gutfreund, Hebrew U. Ronen Shaltiel, Weizmann Inst. Amnon Ta-Shma, Tel-Aviv U.
Complexity Theory Lecture 9 Lecturer: Moni Naor. Recap Last week: –Toda’s Theorem: PH  P #P. –Program checking and hardness on the average of the permanent.
Dana Moshkovitz. Back to NP L  NP iff members have short, efficiently checkable, certificates of membership. Is  satisfiable?  x 1 = truex 11 = true.
A survey on derandomizing BPP and AM Danny Gutfreund, Hebrew U. Ronen Shaltiel, Weizmann Inst. Amnon Ta-Shma, Tel-Aviv U.
PCPs and Inapproximability Introduction. My T. Thai 2 Why Approximation Algorithms  Problems that we cannot find an optimal solution.
Complexity 26-1 Complexity Andrei Bulatov Interactive Proofs.
Complexity 18-1 Complexity Andrei Bulatov Probabilistic Algorithms.
1 Adapted from Oded Goldreich’s course lecture notes.
Complexity and Cryptography
Submitted by : Estrella Eisenberg Yair Kaufman Ohad Lipsky Riva Gonen Shalom.
CS151 Complexity Theory Lecture 13 May 11, CS151 Lecture 132 Outline Natural complete problems for PH and PSPACE proof systems interactive proofs.
Zero Knowledge Proofs. Interactive proof An Interactive Proof System for a language L is a two-party game between a verifier and a prover that interact.
CS151 Complexity Theory Lecture 15 May 18, CS151 Lecture 152 Outline IP = PSPACE Arthur-Merlin games –classes MA, AM Optimization, Approximation,
Complexity ©D. Moshkovitz 1 And Randomized Computations The Polynomial Hierarchy.
Lecture 20: April 12 Introduction to Randomized Algorithms and the Probabilistic Method.
The Polynomial Hierarchy By Moti Meir And Yitzhak Sapir Based on notes from lectures by Oded Goldreich taken by Ronen Mizrahi, and lectures by Ely Porat.
Ragesh Jaiswal Indian Institute of Technology Delhi Threshold Direct Product Theorems: a survey.
CS151 Complexity Theory Lecture 13 May 11, Outline proof systems interactive proofs and their power Arthur-Merlin games.
1 Interactive Proofs proof systems interactive proofs and their power Arthur-Merlin games.
PROBABILISTIC COMPUTATION By Remanth Dabbati. INDEX  Probabilistic Turing Machine  Probabilistic Complexity Classes  Probabilistic Algorithms.
CRYPTOGRAPHY AND NP-HARDNESS Andrej Bogdanov Chinese University of Hong Kong Bertinoro Summer School | July 2014.
Interactive proof systems Section 10.4 Giorgi Japaridze Theory of Computability.
Zero-knowledge proof protocols 1 CHAPTER 12: Zero-knowledge proof protocols One of the most important, and at the same time very counterintuitive, primitives.
Umans Complexity Theory Lectures Lecture 1a: Problems and Languages.
1. 2 Lecture outline Basic definitions: Basic definitions: P, NP complexity classes P, NP complexity classes the notion of a certificate. the notion of.
CS151 Complexity Theory Lecture 16 May 20, The outer verifier Theorem: NP  PCP[log n, polylog n] Proof (first steps): –define: Polynomial Constraint.
Probabilistic verification Mario Szegedy, Rutgers www/cs.rutgers.edu/~szegedy/07540 Lecture 1.
CRYPTOGRAPHY AND NP-HARDNESS Andrej Bogdanov Chinese University of Hong Kong MACS Foundations of Cryptography| January 2016.
CRYPTOGRAPHIC HARDNESS OTHER FUNCTIONALITIES Andrej Bogdanov Chinese University of Hong Kong MACS Foundations of Cryptography| January 2016.
Pseudo-random generators Talk for Amnon ’ s seminar.
Complexity 24-1 Complexity Andrei Bulatov Interactive Proofs.
Comparing Notions of Full Derandomization Lance Fortnow NEC Research Institute With thanks to Dieter van Melkebeek.
NP ⊆ PCP(n 3, 1) Theory of Computation. NP ⊆ PCP(n 3,1) What is that? NP ⊆ PCP(n 3,1) What is that?
The NP class. NP-completeness Lecture2. The NP-class The NP class is a class that contains all the problems that can be decided by a Non-Deterministic.
Complexity 27-1 Complexity Andrei Bulatov Interactive Proofs (continued)
PROBABILITY AND COMPUTING RANDOMIZED ALGORITHMS AND PROBABILISTIC ANALYSIS CHAPTER 1 IWAMA and ITO Lab. M1 Sakaidani Hikaru 1.
The NP class. NP-completeness
P & NP.
Topic 36: Zero-Knowledge Proofs
Probabilistic Algorithms
Derandomization & Cryptography
Introduction to Randomized Algorithms and the Probabilistic Method
Randomness and Computation
On the Size of Pairing-based Non-interactive Arguments
Zero Knowledge Anupam Datta CMU Fall 2017
Pseudodeterministic Constructions in Subexponential Time
Lecture 22 Complexity and Reductions
NP-Completeness Yin Tat Lee
NP-Completeness NP-Completeness Graphs 11/16/2018 2:32 AM x x x x x x
CS151 Complexity Theory Lecture 13 May 15, 2017.
Pseudo-derandomizing learning and approximation
NP-Completeness NP-Completeness Graphs 12/3/2018 2:46 AM x x x x x x x
Interactive Proofs Adapted from Oded Goldreich’s course lecture notes.
CS154, Lecture 13: P vs NP.
NP-Completeness Yin Tat Lee
Interactive Proofs Adapted from Oded Goldreich’s course lecture notes.
Interactive Proofs Adapted from Oded Goldreich’s course lecture notes.
CS21 Decidability and Tractability
The Polynomial Hierarchy
CS151 Complexity Theory Lecture 7 April 23, 2019.
Impossibility of SNARGs
Lecture 22 Complexity and Reductions
Jens Groth and Mary Maller University College London
Lecture 23 NP-Hard Problems
Interactive Proofs Adapted from Oded Goldreich’s course lecture notes.
Presentation transcript:

Pseudo-deterministic Proofs Dhiraj Holden, MIT Joint work with Shafi Goldwasser and Ofer Grossman, MIT

Pseudo-determinism[GG11] A pseudo-deterministic (psd) algorithm is a randomized algorithm for a search problem that on the same input outputs the same output (we will call it the canonical answer) with high probability Different than guaranteeing a unique answer [LD08] Reproducibility Correctness Amplification In comparison with standard randomized, it assures reprodacbility, and amilification Notice this is different than guartaneeing a unique answer

Search problems Search problem: “Given a relation R and an x, find a y such that (x,y) ∈ R or say that no such y exists” Search-BPP is the class of search problems such that given x can find y such that (x,y) in R can be found in BPP.

Examples in Prior Work [GGR12] Sublinear pseudo-deterministic algorithms [GG15] pseudo-deterministic NC algorithms for bipartite matching [OS16] a sub-exponential time psd algorithm for finding a prime of length n on input n, that works for infinitely many input lengths

Subsequent Work [H17] gives an average-case result about pseudo- deterministic algorithms for search-BPP [GL18] proves that logarithmic space has repeatable randomized algorithms given a logarithmic number of bits

Today: Pseudo-deterministic Interactive Proofs In this talk, we will consider what happens when there is a powerful prover to help a polynomial time verifier to find a canonical answer y per input x so that: An honest prover can enable the verifier to output the canonical answer y with high probability over verifier’s coins No cheating prover will be able to make the verifier output a different answer than the canonical one with high probability in addition to the standard notion of soundness

Pseudo Deterministic Interactive Proofs Prover P Verifier V Let R be a relation and LR : x s.t. ∃y s.t. R(x,y)=1 Completeness : x in LR ∃P s.t. Pr[V output y s.t. R(x,y)=1] >2/3 Soundness: x not in LR for all P‘, Pr[V rejects x]>2/3 CANONICAL: x in LR ∃y ⇒ for all P’ : Pr[Verifier outputs y’≠y] <1/3 Input: x Prover P Verifier V Output Solution y or rejects Say: not just any example, but a canonical one. Lets talk about proofs: We are interested them from a computational Point of view. Those proofs which can be verified efficiently. More formally. Let the verifier be a probabilistic polynomial time Algorithm which takes as input a statement and a proof P and accepts When correct , rejects when incorrect.ect. The class NP defined by Levin-Cook is exactly those sets for which there exist efficiently Verifiable membership proofs.

Application: Generating parameters for cryptographic systems Central authority (NIST) wants to choose a common cryptographic parameter on size n, but is untrusted Use pseudo-deterministic interactive proofs to verify that NIST generated a canonical cryptographic parameter Example: NIST picks prime p, generator g Such settings come up in the context of cryptography when a group of users may distrust other u sers randomness sources and yet they wish to generate common cryptographic system-wide keys (or public parameters in the case of IBE),

This is different than Unique-SAT: In Valiant-Vazirani [VV], a number of instances are generated, one of which has a unique solution with high probability Single Valued NP functions: Examined by Hemaspaandra, Naik, Ogihara, and Selman [HNOS] is a deterministic version of pseudo-deterministic interactive proofs Valiant-Vazirani differs from this setting in that in their setting, they produce an instance with a unique solution whereas we are looking at canonical solutions which are not necessarily unique

Easy: The Unbounded-round Case For any search problem in PSPACE where the answers are polynomially bounded, finding the lexicographically first answer is in PSPACE Since IP = PSPACE, an unbounded-round interactive proof can give the lexicographically first answer to the verifier and convince the verifier with high probability

Pseudo-deterministic AM A relation R is in pseudo-deterministic AM (psdAM) if there is a function f(x) such that either f(x) = ┴ or (x,f(x)) ∈ R, and there exists a verifier V such that Pr[ ∃z V(x,z) = f(x) ] ≥ 2/3 Pr[ ∀z V(x,z) = f(x) or ┴ ] ≥ 2/3 Note that everything that is true for AM is also true for psdAM; constant rounds = 2 rounds public-coin = private-coin

PsdMA (bounded rounds) We say that a relation R is in pseudo-deterministic MA (psdMA) if there is some f(x) such that either f(x) = ┴ or (x,f(x)) ∈ R, and some V such that There exists z such that Pr[ V(x,z) = f(x) ] ≥ 2/3 For all z, Pr[ V(x,z) = f(x) or ┴ ] ≥ 2/3

Our Main Results: the bounded case A constant-round psdAM protocol for finding an isomorphism between two graphs More generally, Search-PAM ∩ coAM is in psdAM Vice versa, psdAM is in search-Ppromise-AM ∩ coAM (similarly for MA) No NP-complete problem can be in psdAM unless the polynomial hierarchy collapses Give a psdMA algorithm with subexponential-time verifier for all of search-BPP Say in words same is true for AM

Pseudo-deterministic graph isomorphism Show a protocol where on input (G0,G1) the verifier guarantees that it receives the lexicographically first isomorphism f between G0 and G1, assuming that one exists (if an isomorphism does not exist the algorithm easily checks that and returns ┴) Idea: The protocol computes the lexicographically first isomorphism vertex-by-vertex (in parallel) For illustration, verifier uses private coins

On input G0=(V,E), G1=(U,E’) Perform all stages in parallel Say the correct f(vi) already established for 1≤i≤k-1 Stage k: Prover claim f(vk)=ur For every vertex s<r: Prove graph non-isomorphism of (D1,D2) where D1:Label v1…vk in G0 D2:Label f(v1)…f(vk-1) us as 1…k in G1 Non-isomorphism proof Graph non-isomorphism [GMW, GS] is in AM

The Main Theorem Search-PAM ∩ coAM is in psdAM psdAM is in search-Ppromise-AM ∩ coAM This is also true for AM replaced with MA Very bad restate Define define define

The Main Theorem: part 1 search-PAM ∩ coAM is contained in psdAM q1,a1,q2,a2,…,qk,ak Interactive proof to show a1, a2, …, ak are correct for q1,…,qk Verified by running search-P algorithm with answers a1, a2, …, ak

Proof of the Main Theorem: Part 2 Claim: psdAM is contained in search-Ppromise-AM ∩ coAM To simulate psdAM on input x: ask the oracle “Is the ith bit of the canonical answer to the psdAM interactive proof a 1?” and use the answers to obtain y such that R(x,y) holds This problem is a promise problem in AM ∩ coAM since: there is only an answer when a canonical answer exists when no such answer exists it is undefined

Subexponential psdMA for search-BPP Subexponetial-time psdMA allows the verifier subexponential time We show that search-BPP is in subexponential-time psdMA To do this we observe there exists a hard function f in subexponential-time MA ∩ coMA that does not have poly- size circuits

Subexponential psdMA for search-BPP Truth-table tt(1,…,k) of hard function f and Witnesses w1, w2, …, wk for f Check tt is accurate using w’s Use tt to construct PRG G [NW94] Run search-BPP machine with randomness G(s1), G(s2),…,G(sj) on all seeds Output the first answer found

Open Problems Does there exist a psdAM protocol for every problem in TFNP? Can we find approximate short vectors in lattices in psdAM Can we find a prime p for a given length in psdAM? (The main issue here is how can the prover prove that the prime is canonical in some way?)