Results 1  10
of
85
On the complexity of the parity argument and other inefficient proofs of existence
 JCSS
, 1994
"... We define several new complexity classes of search problems, "between " the classes FP and FNP. These new classes are contained, along with factoring, and the class PLS, in the class TFNP of search problems in FNP that always have a witness. A problem in each of these new classes is defined in terms ..."
Abstract

Cited by 155 (8 self)
 Add to MetaCart
We define several new complexity classes of search problems, "between " the classes FP and FNP. These new classes are contained, along with factoring, and the class PLS, in the class TFNP of search problems in FNP that always have a witness. A problem in each of these new classes is defined in terms of an implicitly given, exponentially large graph. The existence of the solution sought is established via a simple graphtheoretic argument with an inefficiently constructive proof; for example, PLS can be thought of as corresponding to the lemma "every dag has a sink. " The new classes are based on lemmata such as "every graph has an even number of odddegree nodes. " They contain several important problems for which no polynomial time algorithm is presently known, including the computational versions of Sperner's lemma, Brouwer's fixpoint theorem, Chfvalley's theorem, and the BorsukUlam theorem, the linear complementarity problem for Pmatrices, finding a mixed equilibrium in a nonzero sum game, finding a second Hamilton circuit in a Hamiltonian cubic graph, a second Hamiltonian decomposition in a quartic graph, and others. Some of these problems are shown to be complete. © 1994 Academic Press, Inc. 1.
Some Consequences of Cryptographical Conjectures for . . .
, 1995
"... We show that there is a pair of disjoint NPsets, whose disjointness is provable in S 1 2 and which cannot be separated by a set in P=poly, if the cryptosystem RSA is secure. Further we show that factoring and the discrete logarithm are implicitly definable in any extension of S 1 2 admittin ..."
Abstract

Cited by 74 (8 self)
 Add to MetaCart
We show that there is a pair of disjoint NPsets, whose disjointness is provable in S 1 2 and which cannot be separated by a set in P=poly, if the cryptosystem RSA is secure. Further we show that factoring and the discrete logarithm are implicitly definable in any extension of S 1 2 admitting an NP definition of primes about which it can prove that no number satisfying the definition is composite. As a corollary we obtain that the Extended Frege (EF) proof system does not admit feasible interpolation theorem unless the RSA cryptosystem is not secure, and that an extension of EF by tautologies p (p primes), formalizing that p is not composite, as additional axioms does not admit feasible interpolation theorem unless factoring and the discrete logarithm are in P=poly . The NP 6= coNP conjecture is equivalent to the statement that no propositional proof system (as defined in [6]) admits polynomial size proofs of all tautologies. However, only for few proof systems occur...
On the Weak Pigeonhole Principle
, 2001
"... We investigate the proof complexity, in (extensions of) resolution and in bounded arithmetic, of the weak pigeonhole principle and of Ramsey theorem. In particular, we link the proof complexity of these two principles. Further we give lower bounds to the width of resolution proofs and to the size of ..."
Abstract

Cited by 69 (3 self)
 Add to MetaCart
We investigate the proof complexity, in (extensions of) resolution and in bounded arithmetic, of the weak pigeonhole principle and of Ramsey theorem. In particular, we link the proof complexity of these two principles. Further we give lower bounds to the width of resolution proofs and to the size of (extensions of) treelike resolution proofs of Ramsey theorem. We establish a connection between provability of WPHP in fragments of bounded arithmetic and cryptographic assumptions (the existence of oneway functions). In particular, we show that functions violating WPHP 2n n are oneway and, on the other hand, that oneway permutations give rise to functions violating PHP n+1 n , and that strongly collisionfree families of hash functions give rise to functions violating WPHP 2n n (all in suitable models of bounded arithmetic). Further we formulate few problems and conjectures; in particular, on the structured PHP (introduced here) and on the unrelativised WPHP. The symbol WPHP m n...
Notes on Polynomially Bounded Arithmetic
"... We characterize the collapse of Buss' bounded arithmetic in terms of the provable collapse of the polynomial time hierarchy. We include also some general modeltheoretical investigations on fragments of bounded arithmetic. Contents 0 Introduction and motivation. 1 1 Preliminaries. 3 1.1 The polyno ..."
Abstract

Cited by 58 (1 self)
 Add to MetaCart
We characterize the collapse of Buss' bounded arithmetic in terms of the provable collapse of the polynomial time hierarchy. We include also some general modeltheoretical investigations on fragments of bounded arithmetic. Contents 0 Introduction and motivation. 1 1 Preliminaries. 3 1.1 The polynomially bounded hierarchy. : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 4 1.2 The axioms of secondorder bounded arithmetic. : : : : : : : : : : : : : : : : : : : : : : : : : : : 5 1.3 Rudimentary functions. : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 5 1.4 Other fragments. : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 6 1.5 Polynomial time computable functions. : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 7 1.6 Relations among fragments. : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 8 1.7 Relations with Buss' bounded arithmetic. : : : :...
Unprovability of Lower Bounds on the Circuit Size in Certain Fragments of Bounded Arithmetic
 in Izvestiya of the Russian Academy of Science, mathematics
, 1995
"... To appear in Izvestiya of the RAN We show that if strong pseudorandom generators exist then the statement “α encodes a circuit of size n (log ∗ n) for SATISFIABILITY ” is not refutable in S2 2 (α). For refutation in S1 2 (α), this is proven under the weaker assumption of the existence of generators ..."
Abstract

Cited by 54 (6 self)
 Add to MetaCart
To appear in Izvestiya of the RAN We show that if strong pseudorandom generators exist then the statement “α encodes a circuit of size n (log ∗ n) for SATISFIABILITY ” is not refutable in S2 2 (α). For refutation in S1 2 (α), this is proven under the weaker assumption of the existence of generators secure against the attack by small depth circuits, and for another system which is strong enough to prove exponential lower bounds for constantdepth circuits, this is shown without using any unproven hardness assumptions. These results can be also viewed as direct corollaries of interpolationlike theorems for certain “split versions ” of classical systems of Bounded Arithmetic introduced in this paper.
An application of boolean complexity to separation problems in bounded arithmetic
 Proc. London Math. Society
, 1994
"... We develop a method for establishing the independence of some Zf(a)formulas from S'2(a). In particular, we show that T'2(a) is not VZ*(a)conservative over S'2(a). We characterize the Z^definable functions of T2 as being precisely the functions definable as projections of polynomial local search ( ..."
Abstract

Cited by 54 (15 self)
 Add to MetaCart
We develop a method for establishing the independence of some Zf(a)formulas from S'2(a). In particular, we show that T'2(a) is not VZ*(a)conservative over S'2(a). We characterize the Z^definable functions of T2 as being precisely the functions definable as projections of polynomial local search (PLS) problems. Although it is still an open problem whether bounded arithmetic S2 is finitely axiomatizable, considerable progress on this question has been made: S2 +1 is V2f+1conservative over T'2 [3], but it is not V2!f+2conservative unless £f+2 = Ylf+2 [10], and in addition, T2 is not VZf+1conservative over S'2 unless LogSpace s? = Af+1 [8]. In particular, S2 is not finitely axiomatizable provided that the polynomialtime hierarchy does not collapse [10]. For the theory S2(a) these results imply (with some additional arguments) absolute results: S'2 + (a) is V2f+,(a)conservative but not VZf+2(a)conservative over T'2(a), and T'2(a) is not VZf+i(c*)conservative over S'2(a). Here a represents a new uninterpreted predicate symbol adjoined to the language of arithmetic which may be used in induction formulas; from a computer science perspective, a represents an oracle. In this paper we pursue this line of investigation further by showing that T'2(a) is also not V2f(a)conservative over S'2(a). This was known for / = 1, 2 by [9,17] (see also [2]), and our present proof uses a version of the pigeonhole principle similar to the arguments in [2,9]. Perhaps more importantly, we formulate a general method (Theorem 2.6) which can be used to show the unprovability of other 2f(a)formulas from S'2(a). Our methods are analogous in spirit to the proof strategy of [8]: prove a witnessing theorem to show that provability of a Zf+1(a)formula A in S'2(a) implies that it is witnessed by a function of certain complexity and then employ techniques of boolean complexity to construct an oracle a such that the formula A cannot be witnessed by a function of the prescribed complexity. Our formula A shall be 2f(a) and thus we can use the original witnessing theorem of [2]. The boolean complexity used is the same as in [8], namely Hastad's switching lemmas [6].
On TruthTable Reducibility to SAT
, 2002
"... We show that polynomial time truthtable reducibility via Boolean circuits to SAT is the same as logspace truthtable reducibility via Boolean formulas to SAT and the same as logspace Turing reducibility to SAT . In addition, we prove that a constant number of rounds of parallel queries to SAT i ..."
Abstract

Cited by 51 (2 self)
 Add to MetaCart
We show that polynomial time truthtable reducibility via Boolean circuits to SAT is the same as logspace truthtable reducibility via Boolean formulas to SAT and the same as logspace Turing reducibility to SAT . In addition, we prove that a constant number of rounds of parallel queries to SAT is equivalent to one round of parallel queries.
Bounded Arithmetic and Lower Bounds in Boolean Complexity
 Feasible Mathematics II
, 1993
"... We study the question of provability of lower bounds on the complexity of explicitly given Boolean functions in weak fragments of Peano Arithmetic. To that end, we analyze what is the right fragment capturing the kind of techniques existing in Boolean complexity at present. We give both formal and i ..."
Abstract

Cited by 46 (5 self)
 Add to MetaCart
We study the question of provability of lower bounds on the complexity of explicitly given Boolean functions in weak fragments of Peano Arithmetic. To that end, we analyze what is the right fragment capturing the kind of techniques existing in Boolean complexity at present. We give both formal and informal arguments supporting the claim that a conceivable answer is V 1 (which, in view of RSUV isomorphism, is equivalent to S 2 ), although some major results about the complexity of Boolean functions can be proved in (presumably) weaker subsystems like U 1 . As a byproduct of this analysis, we give a more constructive version of the proof of Hastad Switching Lemma which probably is interesting in its own right.
On provably disjoint NPpairs
 ELECTRONIC COLLOQUIUM ON COMPUTATIONAL COMPLEXITY
, 1994
"... In this paper we study the pairs (U; V ) of disjoint NPsets representable in a theory T of Bounded Arithmetic in the sense that T proves U " V = ;. For a large variety of theories T we exhibit a natural disjoint NPpair which is complete for the class of disjoint NPpairs representable in T . Th ..."
Abstract

Cited by 42 (2 self)
 Add to MetaCart
In this paper we study the pairs (U; V ) of disjoint NPsets representable in a theory T of Bounded Arithmetic in the sense that T proves U " V = ;. For a large variety of theories T we exhibit a natural disjoint NPpair which is complete for the class of disjoint NPpairs representable in T . This allows us to clarify the approach to showing independence of central open questions in Boolean complexity from theories of Bounded Arithmetic initiated in [11]. Namely, in order to prove the independence result from a theory T , it is sufficient to separate the corresponding complete NPpair by a (quasi)polytime computable set. We remark that such a separation is obvious for the theory S(S 2 ) + S \Sigma 2 \Gamma PIND considered in [11], and this gives an alternative proof of the main result from that paper.
Interpretability logic
 Mathematical Logic, Proceedings of the 1988 Heyting Conference
, 1990
"... Interpretations are much used in metamathematics. The first application that comes to mind is their use in reductive Hilbertstyle programs. Think of the kind of program proposed by Simpson, Feferman or Nelson (see Simpson[1988], Feferman[1988], Nelson[1986]). Here they serve to compare the strength ..."
Abstract

Cited by 32 (9 self)
 Add to MetaCart
Interpretations are much used in metamathematics. The first application that comes to mind is their use in reductive Hilbertstyle programs. Think of the kind of program proposed by Simpson, Feferman or Nelson (see Simpson[1988], Feferman[1988], Nelson[1986]). Here they serve to compare the strength of theories, or better to prove