Lower Bounds Emanuele Viola Columbia University February 2008.

Slides:



Advertisements
Similar presentations
Parikshit Gopalan Georgia Institute of Technology Atlanta, Georgia, USA.
Advertisements

Hardness Amplification within NP against Deterministic Algorithms Parikshit Gopalan U Washington & MSR-SVC Venkatesan Guruswami U Washington & IAS.
An Introduction to Randomness Extractors Ronen Shaltiel University of Haifa Daddy, how do computers get random bits?
Linear-Degree Extractors and the Inapproximability of Max Clique and Chromatic Number David Zuckerman University of Texas at Austin.
Average-case Complexity Luca Trevisan UC Berkeley.
Approximate List- Decoding and Hardness Amplification Valentine Kabanets (SFU) joint work with Russell Impagliazzo and Ragesh Jaiswal (UCSD)
INHERENT LIMITATIONS OF COMPUTER PROGRAMS CSci 4011.
Linear Systems With Composite Moduli Arkadev Chattopadhyay (University of Toronto) Joint with: Avi Wigderson TexPoint fonts used in EMF. Read the TexPoint.
Circuit Complexity and Derandomization Tokyo Institute of Technology Akinori Kawachi.
Hardness amplification proofs require majority Ronen Shaltiel University of Haifa Joint work with Emanuele Viola Columbia University June 2008.
Using Nondeterminism to Amplify Hardness Emanuele Viola Joint work with: Alex Healy and Salil Vadhan Harvard University.
Time Hierarchies with One Bit of Advice Konstantin Pervyshev Steklov Mathematics Institute, St. Petersburg, Russia joint work with Dieter van Melkebeek.
Time vs Randomness a GITCS presentation February 13, 2012.
Non-Uniform ACC Circuit Lower Bounds Ryan Williams IBM Almaden TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A A.
BPP Contained in PH By Michael Sipser; Clemens Lautemann Clemens Lautemann Presenter: Jie Meng.
CS151 Complexity Theory Lecture 7 April 20, 2004.
Derandomization: New Results and Applications Emanuele Viola Harvard University March 2006.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Arithmetic Hardness vs. Randomness Valentine Kabanets SFU.
CS151 Complexity Theory Lecture 7 April 20, 2015.
CS151 Complexity Theory Lecture 6 April 15, 2004.
Hardness amplification proofs require majority Emanuele Viola Columbia University Work done at Harvard, IAS, and Columbia Joint work with Ronen Shaltiel.
CS151 Complexity Theory Lecture 9 April 27, 2004.
INHERENT LIMITATIONS OF COMPUTER PROGRAMS CSci 4011.
Happy 60 th B’day Mike. Lower bounds, anyone? Avi Wigderson Institute for Advanced Study.
February 18, 2015CS21 Lecture 181 CS21 Decidability and Tractability Lecture 18 February 18, 2015.
Pseudorandomness Emanuele Viola Columbia University April 2008.
Why Extractors? … Extractors, and the closely related “Dispersers”, exhibit some of the most “random-like” properties of explicitly constructed combinatorial.
On Constructing Parallel Pseudorandom Generators from One-Way Functions Emanuele Viola Harvard University June 2005.
XOR lemmas & Direct Product thms - Many proofs Avi Wigderson IAS, Princeton ’82 Yao ’87 Levin ‘89 Goldreich-Levin ’95 Impagliazzo ‘95 Goldreich-Nisan-Wigderson.
One-way multi-party communication lower bound for pointer jumping with applications Emanuele Viola & Avi Wigderson Columbia University IAS work done while.
Umans Complexity Theory Lectures Lecture 1a: Problems and Languages.
On approximate majority and probabilistic time Emanuele Viola Institute for advanced study Work done during Ph.D. at Harvard University June 2007.
On Constructing Parallel Pseudorandom Generators from One-Way Functions Emanuele Viola Harvard University June 2005.
Fall 2013 CMU CS Computational Complexity Lectures 8-9 Randomness, communication, complexity of unique solutions These slides are mostly a resequencing.
Polynomials Emanuele Viola Columbia University work partially done at IAS and Harvard University December 2007.
My Favorite Ten Complexity Theorems of the Past Decade II Lance Fortnow University of Chicago.
Umans Complexity Theory Lectures Lecture 17: Natural Proofs.
Norms, XOR lemmas, and lower bounds for GF(2) polynomials and multiparty protocols Emanuele Viola, IAS (Work partially done during postdoc at Harvard)
Pseudorandom Bits for Constant-Depth Circuits with Few Arbitrary Symmetric Gates Emanuele Viola Harvard University June 2005.
Hardness amplification proofs require majority Emanuele Viola Columbia University Work also done at Harvard and IAS Joint work with Ronen Shaltiel University.
Pseudo-random generators Talk for Amnon ’ s seminar.
Comparing Notions of Full Derandomization Lance Fortnow NEC Research Institute With thanks to Dieter van Melkebeek.
The Message Passing Communication Model David Woodruff IBM Almaden.
The Power of Negations in Cryptography
The NP class. NP-completeness Lecture2. The NP-class The NP class is a class that contains all the problems that can be decided by a Non-Deterministic.
Pseudorandomness: New Results and Applications Emanuele Viola IAS April 2007.
Information Complexity Lower Bounds
New Characterizations in Turnstile Streams with Applications
Negation-Limited Formulas
Sublinear-Time Error-Correction and Error-Detection
Circuit Lower Bounds A combinatorial approach to P vs NP
On approximate majority and probabilistic time
Pseudorandomness when the odds are against you
Pseudorandom bits for polynomials
Effcient quantum protocols for XOR functions
Tight Fourier Tails for AC0 Circuits
CS 154, Lecture 6: Communication Complexity
My Favorite Ten Complexity Theorems of the Past Decade II
Linear sketching with parities
Linear sketching over
General Strong Polarization
Linear sketching with parities
The story of superconcentrators The missing link
Emanuele Viola Harvard University June 2005
Oracle Separation of BQP and PH
Oracle Separation of BQP and PH
On Probabilistic Time versus Alternating Time
Emanuele Viola Harvard University October 2005
Pseudorandomness: New Results and Applications
Presentation transcript:

Lower Bounds Emanuele Viola Columbia University February 2008

Efficient computation is fundamental to Science Increasingly important to many fields biologyphysics economics mathematics Goal: understand efficient computation Computation

Goal: Show that natural problems cannot be solved with limited resources (e.g., time, memory,…) E.g.: Cannot factor n-digit number in time n 2 Fundamental enterprise, basis of cryptography Widespread belief: very challenging area This talk: Lower bounds for various resources surprising connections Lower Bounds

Task: Compute function f :  {0,1} Input distributed among collaborating players Cost = how many bits players must broadcast E.g.: For 2 players computing “x = ? y” costs  (|x|) Communication complexity [Yao, Chandra Furst Lipton ‘83] input 0101

Task: Design CHIP for f : {0,1} n  {0,1} Side length measure: wire width Wires carry 1 bit per time step 2-players simulate CHIP sending |side| bits per step Theorem: |side| x time > 2-player cost of f Application: CHIP design […, Lipton Sedgewick ‘81] X1X1 X2X2 X3X3 X4X4 output |side|

Input: directed depth-k graph Output: node reached from source k players speak in turn; i-th knows all but depth-i edges Player 1: Player 2: High cost for log(|graph|) players  breakthrough Question[<1996]: 4 players? Pointer chasing ? ?

Our results [V. Wigderson; FOCS ’07 special issue] Theorem[VW] To chase a pointer in graph of depth k k players must communicate  |graph| 1/k bits –Handle up to k = log(|graph|) 1/3 Applications: round hierarchy for communication multiple-pass streaming algorithms

Induction on depth = number of players Assume 1 chasing high cost for k players  100 chasings  1 chasing Q.e.d. Proof Idea … high cost for k players for most graphs … high cost for k+1 players New player’s message won’t help

Outline Communication complexity Circuit complexity Randomness vs. time

Circuits Gates:  = AND V = OR  = NOT Resource: size = number of gates Poly-size constant-depth = constant parallel time Theorem [Yao, Beigel Tarui, Hastad Goldman] Communication lower bound (polylog players)  circuit lower bound (small-depth, Mod gates) Input Depth V  VVVV  V V /\  arbitrary fan-in

Error correcting codes Encoder List Decoder Noise at rate 49% MessageCodeword Received word List contains message Question: Complexity of encoder, decoder? Motivation: average-case complexity

Our results: Encoding needs parity [V.; J. Comp. Complexity] Encoder MessageCodeword Parity  (x 1,…,x n ) := 1   i x i odd sufficient for encoding (e.g., linear codes) Theorem[V]: Cannot encode with small size, small depth, , ,  gates. Parity is necessary Message V  VVVVV  /\

Our results: Decoding needs majority [Shaltiel V.; STOC ‘08] Often more involved than encoding Theorem[SV]: Cannot decode with small size, small depth , , ,  gates. Majority is necessary Received word List Decoder Received word V  VVV  /\   

Proof idea: Decoding needs majority Repetition code: Decoder: Majority( ) = Theorem[SV]: This happens in every code –Acknowledgment: Madhu Sudan Main difficulty: Large lists. Use information theory. Encoder Encoder

Outline Communication complexity Circuit complexity Randomness vs. time

Probabilistic Time: for every x, Pr [ M(x) errs ] < 1% Deterministic simulation? Brute force: probabilistic time t  deterministic time 2 t Belief: probabilistic time t  deterministic time t O(1) Surprise: Belief  circuit lower bounds by Babai Fortnow Kabanets Impagliazzo Nisan Wigderson… Randomness vs. Time

Theorem[V]: Poly(n)-size probabilistic constant-depth circuits with , , , log(n) parity gates  Deterministic Time(2 n  ) (  trivial Time(2 n  )) Richest probabilistic circuit class in Time(2 n  ) Proof: Lower bound  pseudorandom generator Our Results [V.; SIAM J. Comp., SIAM student paper prize 2006] InputRandom Bits V  VV  V /\ V   

Output “looks random” to polynomials, e.g. x 1 ¢ x 2 + x 3 Theorem [Bogdanov V.] Optimal stretch generator (I)Unconditionally: for degree 2,3 (II)Under conjecture: for any degree Theorem [Green Tao, Lovett Meshulam Samorodnitsky] : Conjecture false Our Results [Bogdanov V.; FOCS ’07 special issue] Generator stretch

Our latest result [V.; CCC ‘08] Theorem[V.]: Optimal stretch generator for any degree d. (Despite the conjecture being false) Improves on [Bogdanov V.] and [Lovett] Also simpler proof

Probabilistic Polynomial Time (BPP): for every x, Pr [ M(x) errs ] < 1% Recall belief: BPP = P Still open: BPP  NP ? Theorem [Sipser Gács, Lautemann ‘83] : BPP   2 P RecallNP =   P   y M(x,y)  2 P   y  z M(x,y,z) BPP vs. Poly-time Hierarchy

More precisely [Sipser Gács, Lautemann] give BPTime(t)  2 Time( t 2 ) Question: Is quadratic slow-down necessary? Motivation: Lower bounds Know  1 Time(n) ≠ Time(n) on some models [Paul Pippenger Szemeredi Trotter, Fortnow, …] Technique: speed-up computation with quantifiers For  1 Time(n) ≠ BPTime(n) can’t afford  2 Time( t 2 ) The Problem We Study

R = Input: R = Task: Tell Pr i [ R i = 1] > 99% from Pr i [ R i = 1] < 1% Do not care if Pr i [ R i = 1] ~ 50% (approximate) Model: Depth-3 circuit Approximate Majority VVV  VV  V /\ V Depth

M(x;r)  BPTime(t) R = Compute M(x): Tell Pr r [M(x;r) = 1] > 99% Compute Appr-Maj from Pr r [M(x;r) = 1] < 1% BPTime(t)  2 Time(t’) =   Time(t’) Running time t’ Bottom fan-in f = t’ / t –run M at most t’/t times The connection [Furst Saxe Sipser ‘83] VVVVVVVV /\ V  f  |R| = 2 t R i = M(x;i)

Theorem[V] : Small depth-3 circuits for Approximate Majority on N bits have bottom fan-in  (log N) –Tight [Ajtai] Corollary: Quadratic slow-down necessary for black-box techniques: BPTime A (t)   2 Time A (t 1.99 ) Theorem[Diehl van Melkebeek, V]: BPTime (t)  3 Time (t  log 5 t) For time, the level is the third Our Results [V.; CCC ’07]

Theorem[V]: 2 N  -size depth-3 circuits for Approximate Majority on N bits have bottom fan-in f > (log N)/10 Note: 2  (N) bound  bound for log-depth circuits [Valiant] Recall: tells R  YES := { R : Pr i [ R i = 1] > 99% } from R  NO := { R : Pr i [ R i = 1] < 1% } Our Negative Result VVVVVVVV /\ V  f  R = |R| = N

Circuit: OR of s=2 N  CNF By definition of OR : R  YES  some C i (R) = 1 R  NO  all C i (R) = 0 By averaging, fix C = C i s.t. Pr R  YES [C (x) = 1 ]  1/s = 1/2 N   R  NO  C (R) = 0 Claim: Impossible if C has clause size < ( log N)/10 Proof V C 1 C 2  C s C i = (x 1 Vx 2 V  x 3 )  (  x 4 )  (x 5 Vx 3 ) clause size = fan-in

Definition: S  {x 1,x 2,…,x N } is a covering if every clause has a variable in S E.g.: S = {x 3,x 4 } C = (x 1 Vx 2 V  x 3 )  (  x 4 )  (x 5 Vx 3 ) Proof idea: Consider smallest covering S Case |S| BIG : Pr R  YES [C (x) = 1 ] < 1 / 2 N  Case |S| tiny : Fix few variables and repeat Proof Outline Either Pr R  YES [C(x)=1] <1/2 N   or  R  NO : C(x) = 1

|S|  N   have N  / log N disjoint clauses  i –Can find  i greedily Pr R  YES [ C(R) = 1 ]  Pr [  i,  i (R) = 1 ] =  i Pr[  i (R) = 1] (independence)   i (1 – 1/100 (log N)/10 )   i ( 1 – 1/N 1/2 ) = (1 – 1/N 1/2 ) (N  /log N)  1/2 N  Case |S| BIG Either Pr R  YES [C(x)=1] <1/2 N   or  R  NO : C(x) = 1

|S| < N   Fix variables in S –Maximize Pr R  YES [C(x)=1] Note: S covering ) clauses shrink Example (x 1 Vx 2 Vx 3 )  (  x 3 )  (x 5 V  x 4 ) (x 1 Vx 2 )  (x 5 ) Repeat Consider smallest covering S’, etc. Case |S| tiny x 3  0 x 4  1 Either Pr R  YES [C(x)=1] <1/2 N   or  R  NO : C(x) = 1

Recall: Repeat  shrink clauses So repeat at most (log N)/10 times When you stop: Either smallest covering size > N  Or C = 1 Fixed  N  (log N) /10 << N vars. Set rest to 0  R  NO : C(R) = 1 Q.e.d. Finish up Either Pr R  YES [C(x)=1] <1/2 N   or  R  NO : C(x) = 1

Lower bounds: rich area, surprising connections Communication complexity, pointer chasing [VW] Circuit complexity, encoding vs. decoding [V,SV] Time vs. Randomness Constant-depth circuits, polynomials [V,BV,V] BPP vs. poly-time hierarchy [V] Circuit lower bound for approximate majority Conclusion