CS151 Complexity Theory Lecture 14 May 13, 2015. 2 Arthur-Merlin Games IP permits verifier to keep coin-flips private –necessary feature? –GNI protocol.

Slides:



Advertisements
Similar presentations
Complexity Theory Lecture 9 Lecturer: Moni Naor. Recap Last week: –Toda’s Theorem: PH  P #P. –Program checking and hardness on the average of the permanent.
Advertisements

An Introduction to Computational Complexity Edith Elkind IAM, ECS.
Theory of Computing Lecture 18 MAS 714 Hartmut Klauck.
CS151 Complexity Theory Lecture 17 May 27, CS151 Lecture 172 Outline elements of the proof of the PCP Theorem counting problems –#P and its relation.
CS151 Complexity Theory Lecture 8 April 22, 2004.
1 NP-Complete Problems. 2 We discuss some hard problems:  how hard? (computational complexity)  what makes them hard?  any solutions? Definitions 
Great Theoretical Ideas in Computer Science for Some.
Dana Moshkovitz. Back to NP L  NP iff members have short, efficiently checkable, certificates of membership. Is  satisfiable?  x 1 = truex 11 = true.
Introduction to PCP and Hardness of Approximation Dana Moshkovitz Princeton University and The Institute for Advanced Study 1.
Complexity ©D.Moshkovits 1 Hardness of Approximation.
Umans Complexity Theory Lectures Lecture 15: Approximation Algorithms and Probabilistically Checkable Proofs (PCPs)
PCPs and Inapproximability Introduction. My T. Thai 2 Why Approximation Algorithms  Problems that we cannot find an optimal solution.
Complexity 16-1 Complexity Andrei Bulatov Non-Approximability.
Complexity 15-1 Complexity Andrei Bulatov Hierarchy Theorem.
February 23, 2015CS21 Lecture 201 CS21 Decidability and Tractability Lecture 20 February 23, 2015.
CS151 Complexity Theory Lecture 7 April 20, 2004.
1 Adapted from Oded Goldreich’s course lecture notes.
1 Optimization problems such as MAXSAT, MIN NODE COVER, MAX INDEPENDENT SET, MAX CLIQUE, MIN SET COVER, TSP, KNAPSACK, BINPACKING do not have a polynomial.
CS151 Complexity Theory Lecture 12 May 6, CS151 Lecture 122 Outline The Polynomial-Time Hierarachy (PH) Complete problems for classes in PH, PSPACE.
CS151 Complexity Theory Lecture 7 April 20, 2015.
CS151 Complexity Theory Lecture 11 May 4, CS151 Lecture 112 Outline Extractors Trevisan’s extractor RL and undirected STCONN.
1 CSE 417: Algorithms and Computational Complexity Winter 2001 Lecture 23 Instructor: Paul Beame.
Analysis of Algorithms CS 477/677
CS151 Complexity Theory Lecture 8 April 22, 2015.
Computability and Complexity 24-1 Computability and Complexity Andrei Bulatov Approximation.
CSE 421 Algorithms Richard Anderson Lecture 27 NP Completeness.
CS151 Complexity Theory Lecture 10 April 29, 2004.
CS151 Complexity Theory Lecture 13 May 11, CS151 Lecture 132 Outline Natural complete problems for PH and PSPACE proof systems interactive proofs.
CS151 Complexity Theory Lecture 15 May 18, CS151 Lecture 152 Outline IP = PSPACE Arthur-Merlin games –classes MA, AM Optimization, Approximation,
CS151 Complexity Theory Lecture 6 April 15, 2004.
February 20, 2015CS21 Lecture 191 CS21 Decidability and Tractability Lecture 19 February 20, 2015.
CS151 Complexity Theory Lecture 16 May 25, CS151 Lecture 162 Outline approximation algorithms Probabilistically Checkable Proofs elements of the.
CS151 Complexity Theory Lecture 9 April 27, 2004.
The Theory of NP-Completeness 1. Nondeterministic algorithms A nondeterminstic algorithm consists of phase 1: guessing phase 2: checking If the checking.
CS151 Complexity Theory Lecture 9 April 27, 2015.
The Theory of NP-Completeness 1. What is NP-completeness? Consider the circuit satisfiability problem Difficult to answer the decision problem in polynomial.
Nattee Niparnan. Easy & Hard Problem What is “difficulty” of problem? Difficult for computer scientist to derive algorithm for the problem? Difficult.
1 The TSP : NP-Completeness Approximation and Hardness of Approximation All exact science is dominated by the idea of approximation. -- Bertrand Russell.
1 Introduction to Approximation Algorithms. 2 NP-completeness Do your best then.
Lecture 22 More NPC problems
CS151 Complexity Theory Lecture 13 May 11, Outline proof systems interactive proofs and their power Arthur-Merlin games.
1 Interactive Proofs proof systems interactive proofs and their power Arthur-Merlin games.
Week 10Complexity of Algorithms1 Hard Computational Problems Some computational problems are hard Despite a numerous attempts we do not know any efficient.
EMIS 8373: Integer Programming NP-Complete Problems updated 21 April 2009.
CS151 Complexity Theory Lecture 12 May 6, QSAT is PSPACE-complete Theorem: QSAT is PSPACE-complete. Proof: 8 x 1 9 x 2 8 x 3 … Qx n φ(x 1, x 2,
Unit 9: Coping with NP-Completeness
CS151 Complexity Theory Lecture 10 April 29, 2015.
Fall 2013 CMU CS Computational Complexity Lecture 7 Alternating Quantifiers, PH, PSPACE. These slides are mostly a resequencing of Chris Umans’
Non-Approximability Results. Summary -Gap technique -Examples: MINIMUM GRAPH COLORING, MINIMUM TSP, MINIMUM BIN PACKING -The PCP theorem -Application:
CS 3343: Analysis of Algorithms Lecture 25: P and NP Some slides courtesy of Carola Wenk.
Umans Complexity Theory Lectures Lecture 17: Natural Proofs.
CS151 Complexity Theory Lecture 16 May 20, The outer verifier Theorem: NP  PCP[log n, polylog n] Proof (first steps): –define: Polynomial Constraint.
NP Completeness Piyush Kumar. Today Reductions Proving Lower Bounds revisited Decision and Optimization Problems SAT and 3-SAT P Vs NP Dealing with NP-Complete.
Complexity 24-1 Complexity Andrei Bulatov Interactive Proofs.
The Theory of NP-Completeness 1. Nondeterministic algorithms A nondeterminstic algorithm consists of phase 1: guessing phase 2: checking If the checking.
1 Introduction to Quantum Information Processing QIC 710 / CS 667 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 Lectures
COSC 3101A - Design and Analysis of Algorithms 14 NP-Completeness.
The NP class. NP-completeness Lecture2. The NP-class The NP class is a class that contains all the problems that can be decided by a Non-Deterministic.
CS151 Complexity Theory Lecture 15 May 18, Gap producing reductions Main purpose: –r-approximation algorithm for L 2 distinguishes between f(yes)
Umans Complexity Theory Lectures Lecture 16: The PCP Theorem.
Umans Complexity Theory Lectures Lecture 9b: Pseudo-Random Generators (PRGs) for BPP: - Hardness vs. randomness - Nisan-Wigderson (NW) Pseudo- Random Generator.
Pseudo-randomness. Randomized complexity classes model: probabilistic Turing Machine –deterministic TM with additional read-only tape containing “coin.
Complexity Theory and Explicit Constructions of Ramsey Graphs Rahul Santhanam University of Edinburgh.
The Theory of NP-Completeness
CS21 Decidability and Tractability
Computability and Complexity
Interactive Proofs Adapted from Oded Goldreich’s course lecture notes.
Umans Complexity Theory Lectures
Umans Complexity Theory Lectures
Instructor: Aaron Roth
Presentation transcript:

CS151 Complexity Theory Lecture 14 May 13, 2015

2 Arthur-Merlin Games IP permits verifier to keep coin-flips private –necessary feature? –GNI protocol breaks without it Arthur-Merlin game: interactive protocol in which coin-flips are public –Arthur (verifier) may as well just send results of coin-flips and ask Merlin (prover) to perform any computation Arthur would have done

May 13, Arthur-Merlin Games Clearly Arthur-Merlin  IP –“private coins are at least as powerful as public coins” Proof that IP = PSPACE actually shows PSPACE  Arthur-Merlin  IP  PSPACE –“public coins are at least as powerful as private coins” !

May 13, Arthur-Merlin Games Delimiting # of rounds: –AM[k] = Arthur-Merlin game with k rounds, Arthur (verifier) goes first –MA[k] = Arthur-Merlin game with k rounds, Merlin (prover) goes first Theorem: AM[k] (MA[k]) equals AM[k] (MA[k]) with perfect completeness. – i.e., x  L implies accept with probability 1 –proof on problem set

May 13, Arthur-Merlin Games Theorem: for all constant k  2 AM[k] = AM[2]. Proof: –we show MA[2]  AM[2] –implies can move all of Arthur’s messages to beginning of interaction: AMAMAM…AM = AAMMAM…AM … = AAA…AMMM…M

May 13, Arthur-Merlin Games Proof (continued): –given L  MA[2] x  L  9 m Pr r [(x, m, r)  R] = 1  Pr r [ 9 m (x, m, r)  R] = 1 x  L  8 m Pr r [(x, m, r)  R]  ε  Pr r [ 9 m (x, m, r)  R]  2 |m| ε –by repeating t times with independent random strings r, can make error ε < 2 -t –set t = m+1 to get 2 |m| ε < ½. order reversed

May 13, MA and AM Two important classes: –MA = MA[2] –AM = AM[2] definitions without reference to interaction: –L  MA iff 9 poly-time language R x  L  9 m Pr r [(x, m, r)  R] = 1 x  L  8 m Pr r [(x, m, r)  R]  ½ –L  AM iff 9 poly-time language R x  L  Pr r [ 9 m (x, m, r)  R] = 1 x  L  Pr r [ 9 m (x, m, r)  R]  ½

May 13, MA and AM L  AM iff 9 poly-time language R x  L  Pr r [ 9 m (x, m, r)  R] = 1 x  L  Pr r [ 9 m (x, m, r)  R]  ½ Relation to other complexity classes: –both contain NP (can elect to not use randomness) –both contained in ∏ 2. L  ∏ 2 iff 9 R  P for which: x  L  Pr r [ 9 m (x, m, r)  R] = 1 x  L  Pr r [ 9 m (x, m, r)  R] < 1 –so clear that AM  ∏ 2 –know that MA  AM

May 13, MA and AM P NP coNP Σ2Σ2 Π2Π2 AMcoAM MAcoMA

May 13, MA and AM Theorem: coNP  AM  PH = AM. Proof: –suffices to show Σ 2  AM (and use AM  Π 2 ) –L  Σ 2 iff 9 poly-time language R x  L  9 y 8 z (x, y, z)  R x  L  8 y 9 z (x, y, z)  R –Merlin sends y –1 AM exchange decides coNP query: 8 z (x, y, z)  R ? –3 rounds; in AM

May 13, MA and AM We know Arthur-Merlin = IP. –“public coins = private coins” Theorem (GS): IP[k]  AM[O(k)] –stronger result –implies for all constant k  2, IP[k] = AM[O(k)] = AM[2] So, GNI  IP[2] = AM

May 13, Back to Graph Isomorphism The payoff: –not known if GI is NP-complete. –previous Theorems: if GI is NP-complete then PH = AM –unlikely! –Proof: GI NP-complete  GNI coNP- complete  coNP  AM  PH = AM

Derandomization revisited L  MA iff 9 poly-time language R x  L  9 m Pr r [(x, m, r)  R] = 1 x  L  8 m Pr r [(x, m, r)  R]  ½ Recall PRGs: –for all circuits C of size at most s : |Pr y [C(y) = 1] – Pr z [C(G(z)) = 1]| ≤ ε May 13, NP AM MA seedoutput string G t bitsu bits

Using PRGs for MA L  MA iff 9 poly-time language R x  L  9 m Pr r [(x, m, r)  R] = 1 x  L  8 m Pr r [(x, m, r)  R]  ½ produce poly-size circuit C such that C(x, m, r) = 1, (x,m,r) 2 R for each x, m can hardwire to get C x,m 9 m Pr y [C x,m (y) = 1] = 1 (“yes”) 8 m Pr y [C x,m (y) = 1] ≤ 1/2 (“no”) May 13,

Using PRGs for MA can compute Pr z [C x,m (G(z)) = 1] exactly –evaluate C x (G(z)) on every seed z  {0,1} t –running time (O(|C x,m |)+(time for G))2 t x  L  9 m [ Pr z [C x,m (G(z)) = 1] = 1 ] x  L  8 m [ Pr z [C x,m (G(z)) = 1]  ½ + ² ] – L 2 NP if PRG with t = O(log n), ² < 1/4 Theorem: E requires exponential size circuits  MA = NP. May 13, poly(n) poly-time

May 13, MA and AM P NP coNP Σ2Σ2 Π2Π2 AMcoAM MAcoMA (under a hardness assumption)

May 13, MA and AM P NP coNP Σ2Σ2 Π2Π2 AMcoAM MA = = coMA (under a hardness assumption) What about AM, coAM?

May 13, Derandomization revisited Theorem (IW, STV): If E contains functions that require size 2 Ω(n) circuits, then E contains functions that are 2 Ω(n) - unapproximable by circuits. Theorem (NW): if E contains 2 Ω(n) -unapp- roximable functions there are poly-time PRGs fooling poly(n)-size circuits, with seed length t = O(log n), and error ² < 1/4.

May 13, Oracle circuits A-oracle circuit C –also allow “A-oracle gates” circuit C –directed acyclic graph –nodes: AND (  ); OR (  ); NOT (  ); variables x i   x1x1 x2x2   x3x3 …xnxn  A 1 iff x 2 A x

May 13, Relativized versions Theorem: If E contains functions that require size 2 Ω(n) A-oracle circuits, then E contains functions that are 2 Ω(n) - unapproximable by A-oracle circuits. Recall proof: –encode truth table to get hard function –if approximable by s(n)-size circuits, then use those circuits to compute original function by size s(n)  -size circuits. Contradiction.

May 13, Relativized versions m:m: Enc(m): R: D C f:{0,1} log k  {0,1} f ’:{0,1} log n  {0,1} small A-oracle circuit C approximating f’ decoding procedure i 2 {0,1} log k small A-oracle circuit computing f exactly f(i)

May 13, Relativized versions Theorem: if E contains 2 Ω(n) -unapp- roximable fns., there are poly-time PRGs fooling poly(n)-size A-oracle circuits, with seed length t = O(log n), and error ² < 1/4. Recall proof: –PRG from hard function on O(log n) bits –if doesn’t fool s-size circuits, then use those circuits to compute hard function by size s ¢ n ± - size circuits. Contradiction.

Relativized versions May 13, G n (y)=f log n (y |S 1 )◦f log n (y |S 2 )◦…◦f log n (y |S m ) f log n : –doesn’t fool A-oracle circuit of size s: |Pr x [C(x) = 1] – Pr y [C( G n (y) ) = 1]| > ε –implies A-oracle circuit P of size s’ = s + O(m): Pr y [P(G n (y) 1 … i-1 ) = G n (y) i ] > ½ + ε/m

Relativized versions May 13, 2015 G n (y)=f log n (y |S 1 )◦f log n (y |S 2 )◦…◦f log n (y |S m ) f log n : P output f log n (y ’) hardwired tables y’ A-oracle circuit approximating f 24

Using PRGs for AM L  AM iff 9 poly-time language R x  L  Pr r [ 9 m (x, m, r)  R] = 1 x  L  Pr r [ 9 m (x, m, r)  R]  ½ produce poly-size SAT-oracle circuit C such that C(x, r) = 1, 9 m (x,m,r) 2 R for each x, can hardwire to get C x Pr y [C x (y) = 1] = 1(“yes”) Pr y [C x (y) = 1] ≤ ½(“no”) May 13, SAT query, accepts iff answer is “yes”

Using PRGs for AM x  L  [ Pr z [C x (G(z)) = 1] = 1 ] x  L  [ Pr z [C x (G(z)) = 1]  ½ + ² ] C x makes a single SAT query, accepts iff answer is “yes” if G is a PRG with t = O(log n), ² < ¼, can check in NP: –does C x (G(z)) = 1 for all z? May 13,

May 13, Relativized versions Theorem: If E contains functions that require size 2 Ω(n) A-oracle circuits, then E contains functions that are 2 Ω(n) -unapproximable by A- oracle circuits. Theorem: if E contains 2 Ω(n) -unapproximable functions there are PRGs fooling poly(n)-size A- oracle circuits, with seed length t = O(log n), and error ² < ½. Theorem: E requires exponential size SAT- oracle circuits  AM = NP.

May 13, MA and AM P NP coNP Σ2Σ2 Π2Π2 MA = = coMA (under a hardness assumption) coAMAM

May 13, MA and AM P NP coNP Σ2Σ2 Π2Π2 MA = = coMA (under a hardness assumption) = coAMAM =

May 13, New topic(s) Optimization problems, Approximation Algorithms, and Probabilistically Checkable Proofs

May 13, Optimization Problems many hard problems (especially NP-hard) are optimization problems –e.g. find shortest TSP tour –e.g. find smallest vertex cover –e.g. find largest clique –may be minimization or maximization problem –“opt” = value of optimal solution

May 13, Approximation Algorithms often happy with approximately optimal solution –warning: lots of heuristics –we want approximation algorithm with guaranteed approximation ratio of r –meaning: on every input x, output is guaranteed to have value at most r*opt for minimization at least opt/r for maximization

May 13, Approximation Algorithms Example approximation algorithm: –Recall: Vertex Cover (VC): given a graph G, what is the smallest subset of vertices that touch every edge? –NP-complete

May 13, Approximation Algorithms Approximation algorithm for VC: –pick an edge (x, y), add vertices x and y to VC –discard edges incident to x or y; repeat. Claim: approximation ratio is 2. Proof: –an optimal VC must include at least one endpoint of each edge considered –therefore 2*opt  actual

May 13, Approximation Algorithms diverse array of ratios achievable some examples: –(min) Vertex Cover: 2 –MAX-3-SAT (find assignment satisfying largest # clauses): 8/7 –(min) Set Cover: ln n –(max) Clique: n/log 2 n –(max) Knapsack: (1 + ε) for any ε > 0

May 13, Approximation Algorithms (max) Knapsack: (1 + ε) for any ε > 0 called Polynomial Time Approximation Scheme (PTAS) –algorithm runs in poly time for every fixed ε>0 –poor dependence on ε allowed If all NP optimization problems had a PTAS, almost like P = NP (!)

May 13, Approximation Algorithms A job for complexity: How to explain failure to do better than ratios on previous slide? –just like: how to explain failure to find poly- time algorithm for SAT... –first guess: probably NP-hard –what is needed to show this? “gap-producing” reduction from NP- complete problem L 1 to L 2

May 13, Approximation Algorithms “gap-producing” reduction from NP- complete problem L 1 to L 2 no yes L1L1 L 2 (min. problem) f opt k rk

May 13, Gap producing reductions r-gap-producing reduction: –f computable in poly time –x  L 1  opt(f(x))  k –x  L 1  opt(f(x)) > rk –for max. problems use “  k” and “< k/r” Note: target problem is not a language –promise problem (yes  no not all strings) –“promise”: instances always from (yes  no)

May 13, Gap producing reductions Main purpose: –r-approximation algorithm for L 2 distinguishes between f(yes) and f(no); can use to decide L 1 –“NP-hard to approximate to within r” no yes L1L1 f k rk yes no L1L1 f k/r k L 2 (min.)L 2 (max.) yes noyes no

May 13, Gap preserving reductions gap-producing reduction difficult (more later) but gap-preserving reductions easier f k rk k’ r’k’ Warning: many reductions not gap-preserving yes no yes no L 1 (min.) L 2 (min.)

May 13, Gap preserving reductions Example gap-preserving reduction: –reduce MAX-k-SAT with gap ε –to MAX-3-SAT with gap ε’ –“MAX-k-SAT is NP-hard to approx. within ε  MAX-3-SAT is NP-hard to approx. within ε’ ” MAXSNP (PY) – a class of problems reducible to each other in this way –PTAS for MAXSNP-complete problem iff PTAS for all problems in MAXSNP constants

May 13, MAX-k-SAT Missing link: first gap-producing reduction –history’s guide it should have something to do with SAT Definition: MAX-k-SAT with gap ε –instance: k-CNF φ –YES: some assignment satisfies all clauses –NO: no assignment satisfies more than (1 – ε) fraction of clauses

May 13, Proof systems viewpoint k-SAT NP-hard  for any language L  NP proof system of form: –given x, compute reduction to k-SAT:  x –expected proof is satisfying assignment for  x –verifier picks random clause (“local test”) and checks that it is satisfied by the assignment x  L  Pr[verifier accepts] = 1 x  L  Pr[verifier accepts] < 1

May 13, Proof systems viewpoint MAX-k-SAT with gap ε NP-hard  for any language L  NP proof system of form: –given x, compute reduction to MAX-k-SAT:  x –expected proof is satisfying assignment for  x –verifier picks random clause (“local test”) and checks that it is satisfied by the assignment x  L  Pr[verifier accepts] = 1 x  L  Pr[verifier accepts] ≤ (1 – ε) –can repeat O(1/ε) times for error < ½

May 13, Proof systems viewpoint can think of reduction showing k-SAT NP-hard as designing a proof system for NP in which: –verifier only performs local tests can think of reduction showing MAX-k-SAT with gap ε NP-hard as designing a proof system for NP in which: –verifier only performs local tests –invalidity of proof* evident all over: “holographic proof” and an  fraction of tests notice such invalidity

May 13, PCP Probabilistically Checkable Proof (PCP) permits novel way of verifying proof: –pick random local test –query proof in specified k locations –accept iff passes test fancy name for a NP-hardness reduction

May 13, PCP PCP[r(n),q(n)]: set of languages L with p.p.t. verifier V that has (r, q)-restricted access to a string “proof” –V tosses O(r(n)) coins –V accesses proof in O(q(n)) locations –(completeness) x  L   proof such that Pr[V(x, proof) accepts] = 1 –(soundness) x  L   proof* Pr[V(x, proof*) accepts]  ½

May 13, PCP Two observations: –PCP[1, poly n] = NP proof? –PCP[log n, 1]  NP proof? The PCP Theorem (AS, ALMSS): PCP[log n, 1] = NP.

May 13, PCP Corollary: MAX-k-SAT is NP-hard to approximate to within some constant . –using PCP[log n, 1] protocol for, say, VC –enumerate all 2 O(log n) = poly(n) sets of queries –construct a k-CNF φ i for verifier’s test on each note: k-CNF since function on only k bits –“YES” VC instance  all clauses satisfiable –“NO” VC instance  every assignment fails to satisfy at least ½ of the φ i  fails to satisfy an  = (½)2 -k fraction of clauses.