My Favorite Ten Complexity Theorems of the Past Decade

Total Page:16

File Type:pdf, Size:1020Kb

My Favorite Ten Complexity Theorems of the Past Decade My Favorite Ten Complexity Theorems of the Past Decade Lance Fortnow Department of Computer Science The University of Chicago East th Street Chicago Illinois Abstract We review the past ten years in computational complexity theory by fo cusing on ten theorems that the author enjoyed the most We use each of the theorems as a springb oard to discuss work done in various areas of complexity theory Intro duction Just ab out ten years ago in the spring of I enrolled in a graduate compu tational complexity course taught by Juris Hartmanis at Cornell That course marked the b eginning of study and research in computational complexity that has b een a ma jor part of my life ever since As a decade has passed I nd it useful to review where complexity theory has come during those years I have found that complexity theory has ourished during that time No twenty page pap er could p ossibly do justice to the past ten years in complexity theory Instead I have taken a dierent approach I have isolated ten theorems that I have enjoyed the most during the past decade following a few selfimp osed guide lines See Section I have then used these theorems as a basis to describ e many other results in complexity theory using each theorem as a springb oard into a subarea of computational complexity Please note that each area could have a twenty page survey of its own I cannot p ossibly mention all the imp ortant results in any given area Nor am I able to bring in all the dierent subareas in complexity theory I have found the past ten years in complexity theory quite exciting Cir cuit complexity has come of age during the past ten years and has provided us with a rich source of combinatorial problems Interactive pro of systems have surprised us all with their ability to use randomness to simulate alternation and their imp ortant connections to program testing and hardness of approximation algorithms Algebraic techniques now seem to p ervade all areas of complexity esp ecially circuit complexity interactive pro of systems and counting complex ity We have also seen a lot of interest in probabilistic computation b oth in its ? Email fortnowcsuchicagoedu Partially supp orted by NSF grant CCR p ower in interactive pro of systems and the many successful attempts to reduce and eliminate randomness in various computation mo dels Computational complexity theory has had steady growth since its inception in the s I would guess that the numb er of active researchers in computational complexity theory has doubled over the past decade Complexity theory now has a ma jor conference The IEEE Structure in Complexity Theory Conference as well as many smaller conferences and workshops However complexity theory has had its disapp ointments We seem no closer to solving the famous P NP problem than we were ten years ago I have found that really only one theorem Theorem gives us such fundamental re sults ab out complexity classes that would make it into an undergraduate course Despite these shortcomings this pap er shows that complexity theory has pro vided us with great theorems throughout the past ten years Guidelines In cho osing the ten theorems I used the following guidelines Theorems chosen from the broad area of computational complex ity theory There are several go o d theorems in other areas of theory and computer science However I have my exp ertise in computational complexity theory I would not make a go o d judge in other areas Theorems chosen from the past ten years It would not b e fair to judge theorems b efore I was actively involved in complexity theory Theorems chosen for imp ortance of result originality and diculty of technique and relationships with other results in complexity theory No theorems proven at The University of Chicago I do not want to play favorites Theorems chosen for diversity I wanted to get a representation of many dierent areas of complexity theory Theorems chosen as results instead of for p eople I did not make any attempt to cho ose p eople instead I chose results that I enjoyed The Theorems We present the ten favorite theorems in rough chronological order Branching Programs In the last decade we have seen algebra play a much larger role in complexity theory than ever b efore Usually in these results algebra plays no role in the statement of the theorem but simple algebraic prop erties lead to very b eautiful results No theorem captures this algebraic b eauty more than our rst theorem a surprising characterization of b oundedwidth branching programs due to Bar rington Favorite Theorem Bar Boundedwidth polynomialsize branching pro grams recognize exactly those languages in NC A branching program is a ro oted directed acyclic graph where each internal vertex is lab elled by a variable name and for each input symb ol there is a single edge leaving that vertex lab elled by that symb ol The leaf vertices are lab elled by Accept or Reject The machine pro ceeds along a ro ot to leaf path by examining the input of the current vertexs lab el and then follows the edge corresp onding to the value of that input The machine accepts or rejects when it comes to the corresp onding leaf vertex A language L has b oundedwidth branching programs if for some k for all O n there is a width k branching program using n inputs and at most n no des that accepts exactly those strings of length n in L Recall that NC consists of the languages accepted by constant fanin and logarithmic depth circuits One can easily show that every language that accepts b oundedwidth p oly size branching programs must lie in NC by divide and conquer However it did not seem p ossible to count in a b oundedwidth program so many b elieved that ma jority an NC function did not have b oundedwidth branching programs In fact Yao Yao showed a sup erp olynomial lower b ound for widthtwo branch ing programs to compute ma jority Barrington used the fact that S the set of p ermutations on ve elements formed a nonsolvable group More precisely there are two ve cycles is a ve cycle Bar and in S such that rington uses this simple fact to capture the computation of a circuit by just rememb ering one of these cycles Barringtons result has some implications for the complexity class PSPACE By the Chandra Kozen and Sto ckmeyer CKS result relating PSPACE with alternating p olynomialtime one can view PSPACE computation as a uniform NC circuit of p olynomialdepth Cai and Furst CF showed that every PSPACE language L can b e ac cepted by a Turing machine that has a p olynomialsize clo ck makes logarith mic space computation then erases all but a few bits of its tap e b etween clo ck ticks They prove their result by simulating an exp onentially long but easily de scribable b ounded width branching program for the NC circuit that simulates the PSPACE machine Bovet Crescenzi and Silvestri BCS develop ed the concept of leaf lan guages Think of a nondeterministic p olynomialtime Turing machine M on in put x as generating an exp onentially long string M x read o of the end of the computation paths leaves of M on x Given a machine M and a set of strings A we dene the leaf language L as the set of x such that M x is in A Hertrampf Lautemann Schwentick Vollmer and Wagner HLS show that any language in PSPACE has a leaf language dened via a regular lan guage Their pro of uses Barringtons result by simulating the branching program with a nite automaton BoundedDepth Circuits In the mids theorems ab out circuits provided great excitement among complexity theorists The techniques used in complexity theory b efore then did not seem to help prove the big theorems such as P NP Many theorists b elieved that the new combinatorial and algebraic to ols used in circuits could prove some nontrivial separations in complexity classes Although this promise has remained unfullled we have seen several sepa ration results in lowlevel circuit classes as well as many new combinatorial and algebraic techniques Because of the vast amount of eort devoted to circuit com plexity in the last decade we devote Sections and to circuit complexity Circuit complexity also comes up in connection with many of the other theorems mentioned in this pap er The early work in circuit complexity came out of an attempt to create an oracle to separate the p olynomialtime hierarchy from PSPACE In order to create such an oracle an interesting combinatorial problem arose One would need to show that a simple problem like parity did not have small constant depth circuits Furst Saxe and Sipser FSS and Ajtai Ajt indep endently showed that parity do es not have constantdepth p olynomialsize circuits Yao Yao showed a strong enough b ound to get the desired oracle separation Hastad greatly simplied Yaos pro of and achieved near tight b ounds Favorite Theorem Has Parity does not have depth d circuits with 1d n less than gates Hastads pro of used random restrictions where some of the variables in a p o tential circuit for parity are randomly set to zero or one with some probability Hastads main switching lemma showed that a random restriction of an AND gate of small OR gates resulted in an OR gate of small AND gates Hastad then used an inductive argument by converting any depth d circuit claiming to solve parity into a depth d circuit for parity This switching lemma has also found several other applications subsequently Razb orov Raz and Smolensky Smo show that for primes p and q p q the MOD function requires an exp onential numb er of gates for b ounded q depth circuits with AND OR and MOD gates Their
Recommended publications
  • Notes for Lecture 2
    Notes on Complexity Theory Last updated: December, 2011 Lecture 2 Jonathan Katz 1 Review The running time of a Turing machine M on input x is the number of \steps" M takes before it halts. Machine M is said to run in time T (¢) if for every input x the running time of M(x) is at most T (jxj). (In particular, this means it halts on all inputs.) The space used by M on input x is the number of cells written to by M on all its work tapes1 (a cell that is written to multiple times is only counted once); M is said to use space T (¢) if for every input x the space used during the computation of M(x) is at most T (jxj). We remark that these time and space measures are worst-case notions; i.e., even if M runs in time T (n) for only a fraction of the inputs of length n (and uses less time for all other inputs of length n), the running time of M is still T . (Average-case notions of complexity have also been considered, but are somewhat more di±cult to reason about. We may cover this later in the semester; or see [1, Chap. 18].) Recall that a Turing machine M computes a function f : f0; 1g¤ ! f0; 1g¤ if M(x) = f(x) for all x. We will focus most of our attention on boolean functions, a context in which it is more convenient to phrase computation in terms of languages. A language is simply a subset of f0; 1g¤.
    [Show full text]
  • Interactive Proof Systems and Alternating Time-Space Complexity
    Theoretical Computer Science 113 (1993) 55-73 55 Elsevier Interactive proof systems and alternating time-space complexity Lance Fortnow” and Carsten Lund** Department of Computer Science, Unicersity of Chicago. 1100 E. 58th Street, Chicago, IL 40637, USA Abstract Fortnow, L. and C. Lund, Interactive proof systems and alternating time-space complexity, Theoretical Computer Science 113 (1993) 55-73. We show a rough equivalence between alternating time-space complexity and a public-coin interactive proof system with the verifier having a polynomial-related time-space complexity. Special cases include the following: . All of NC has interactive proofs, with a log-space polynomial-time public-coin verifier vastly improving the best previous lower bound of LOGCFL for this model (Fortnow and Sipser, 1988). All languages in P have interactive proofs with a polynomial-time public-coin verifier using o(log’ n) space. l All exponential-time languages have interactive proof systems with public-coin polynomial-space exponential-time verifiers. To achieve better bounds, we show how to reduce a k-tape alternating Turing machine to a l-tape alternating Turing machine with only a constant factor increase in time and space. 1. Introduction In 1981, Chandra et al. [4] introduced alternating Turing machines, an extension of nondeterministic computation where the Turing machine can make both existential and universal moves. In 1985, Goldwasser et al. [lo] and Babai [l] introduced interactive proof systems, an extension of nondeterministic computation consisting of two players, an infinitely powerful prover and a probabilistic polynomial-time verifier. The prover will try to convince the verifier of the validity of some statement.
    [Show full text]
  • On Uniformity Within NC
    On Uniformity Within NC David A Mix Barrington Neil Immerman HowardStraubing University of Massachusetts University of Massachusetts Boston Col lege Journal of Computer and System Science Abstract In order to study circuit complexity classes within NC in a uniform setting we need a uniformity condition which is more restrictive than those in common use Twosuch conditions stricter than NC uniformity RuCo have app eared in recent research Immermans families of circuits dened by rstorder formulas ImaImb and a unifor mity corresp onding to Buss deterministic logtime reductions Bu We show that these two notions are equivalent leading to a natural notion of uniformity for lowlevel circuit complexity classes Weshow that recent results on the structure of NC Ba still hold true in this very uniform setting Finallyweinvestigate a parallel notion of uniformity still more restrictive based on the regular languages Here we givecharacterizations of sub classes of the regular languages based on their logical expressibility extending recentwork of Straubing Therien and Thomas STT A preliminary version of this work app eared as BIS Intro duction Circuit Complexity Computer scientists have long tried to classify problems dened as Bo olean predicates or functions by the size or depth of Bo olean circuits needed to solve them This eort has Former name David A Barrington Supp orted by NSF grant CCR Mailing address Dept of Computer and Information Science U of Mass Amherst MA USA Supp orted by NSF grants DCR and CCR Mailing address Dept of
    [Show full text]
  • Valuative Characterization of Central Extensions of Algebraic Tori on Krull
    Valuative characterization of central extensions of algebraic tori on Krull domains ∗ Haruhisa Nakajima † Department of Mathematics, J. F. Oberlin University Tokiwa-machi, Machida, Tokyo 194-0294, JAPAN Abstract Let G be an affine algebraic group with an algebraic torus G0 over an alge- braically closed field K of an arbitrary characteristic p. We show a criterion for G to be a finite central extension of G0 in terms of invariant theory of all regular 0 actions of any closed subgroup H containing ZG(G ) on affine Krull K-schemes such that invariant rational functions are locally fractions of invariant regular func- tions. Consider an affine Krull H-scheme X = Spec(R) and a prime ideal P of R with ht(P) = ht(P ∩ RH ) = 1. Let I(P) denote the inertia group of P un- der the action of H. The group G is central over G0 if and only if the fraction e(P, P ∩ RH )/e(P, P ∩ RI(P)) of ramification indices is equal to 1 (p = 0) or to the p-part of the order of the group of weights of G0 on RI(P)) vanishing on RI(P))/P ∩ RI(P) (p> 0) for an arbitrary X and P. MSC: primary 13A50, 14R20, 20G05; secondary 14L30, 14M25 Keywords: Krull domain; ramification index; algebraic group; algebraic torus; char- acter group; invariant theory 1 Introduction 1.A. We consider affine algebraic groups and affine schemes over a fixed algebraically closed field K of an arbitrary characteristic p. For an affine group G, denote by G0 its identity component.
    [Show full text]
  • Probabilistically Checkable Proofs Over the Reals
    Electronic Notes in Theoretical Computer Science 123 (2005) 165–177 www.elsevier.com/locate/entcs Probabilistically Checkable Proofs Over the Reals Klaus Meer1 ,2 Department of Mathematics and Computer Science Syddansk Universitet, Campusvej 55, 5230 Odense M, Denmark Abstract Probabilistically checkable proofs (PCPs) have turned out to be of great importance in complexity theory. On the one hand side they provide a new characterization of the complexity class NP, on the other hand they show a deep connection to approximation results for combinatorial optimization problems. In this paper we study the notion of PCPs in the real number model of Blum, Shub, and Smale. The existence of transparent long proofs for the real number analogue NPR of NP is discussed. Keywords: PCP, real number model, self-testing over the reals. 1 Introduction One of the most important and influential results in theoretical computer science within the last decade is the PCP theorem proven by Arora et al. in 1992, [1,2]. Here, PCP stands for probabilistically checkable proofs, a notion that was further developed out of interactive proofs around the end of the 1980’s. The PCP theorem characterizes the class NP in terms of languages accepted by certain so-called verifiers, a particular version of probabilistic Turing machines. It allows to stabilize verification procedures for problems in NP in the following sense. Suppose for a problem L ∈ NP and a problem 1 partially supported by the EU Network of Excellence PASCAL Pattern Analysis, Statis- tical Modelling and Computational Learning and by the Danish Natural Science Research Council SNF. 2 Email: [email protected] 1571-0661/$ – see front matter © 2005 Elsevier B.V.
    [Show full text]
  • On the NP-Completeness of the Minimum Circuit Size Problem
    On the NP-Completeness of the Minimum Circuit Size Problem John M. Hitchcock∗ A. Pavany Department of Computer Science Department of Computer Science University of Wyoming Iowa State University Abstract We study the Minimum Circuit Size Problem (MCSP): given the truth-table of a Boolean function f and a number k, does there exist a Boolean circuit of size at most k computing f? This is a fundamental NP problem that is not known to be NP-complete. Previous work has studied consequences of the NP-completeness of MCSP. We extend this work and consider whether MCSP may be complete for NP under more powerful reductions. We also show that NP-completeness of MCSP allows for amplification of circuit complexity. We show the following results. • If MCSP is NP-complete via many-one reductions, the following circuit complexity amplifi- Ω(1) cation result holds: If NP\co-NP requires 2n -size circuits, then ENP requires 2Ω(n)-size circuits. • If MCSP is NP-complete under truth-table reductions, then EXP 6= NP \ SIZE(2n ) for some > 0 and EXP 6= ZPP. This result extends to polylog Turing reductions. 1 Introduction Many natural NP problems are known to be NP-complete. Ladner's theorem [14] tells us that if P is different from NP, then there are NP-intermediate problems: problems that are in NP, not in P, but also not NP-complete. The examples arising out of Ladner's theorem come from diagonalization and are not natural. A canonical candidate example of a natural NP-intermediate problem is the Graph Isomorphism (GI) problem.
    [Show full text]
  • Week 1: an Overview of Circuit Complexity 1 Welcome 2
    Topics in Circuit Complexity (CS354, Fall’11) Week 1: An Overview of Circuit Complexity Lecture Notes for 9/27 and 9/29 Ryan Williams 1 Welcome The area of circuit complexity has a long history, starting in the 1940’s. It is full of open problems and frontiers that seem insurmountable, yet the literature on circuit complexity is fairly large. There is much that we do know, although it is scattered across several textbooks and academic papers. I think now is a good time to look again at circuit complexity with fresh eyes, and try to see what can be done. 2 Preliminaries An n-bit Boolean function has domain f0; 1gn and co-domain f0; 1g. At a high level, the basic question asked in circuit complexity is: given a collection of “simple functions” and a target Boolean function f, how efficiently can f be computed (on all inputs) using the simple functions? Of course, efficiency can be measured in many ways. The most natural measure is that of the “size” of computation: how many copies of these simple functions are necessary to compute f? Let B be a set of Boolean functions, which we call a basis set. The fan-in of a function g 2 B is the number of inputs that g takes. (Typical choices are fan-in 2, or unbounded fan-in, meaning that g can take any number of inputs.) We define a circuit C with n inputs and size s over a basis B, as follows. C consists of a directed acyclic graph (DAG) of s + n + 2 nodes, with n sources and one sink (the sth node in some fixed topological order on the nodes).
    [Show full text]
  • The Complexity Zoo
    The Complexity Zoo Scott Aaronson www.ScottAaronson.com LATEX Translation by Chris Bourke [email protected] 417 classes and counting 1 Contents 1 About This Document 3 2 Introductory Essay 4 2.1 Recommended Further Reading ......................... 4 2.2 Other Theory Compendia ............................ 5 2.3 Errors? ....................................... 5 3 Pronunciation Guide 6 4 Complexity Classes 10 5 Special Zoo Exhibit: Classes of Quantum States and Probability Distribu- tions 110 6 Acknowledgements 116 7 Bibliography 117 2 1 About This Document What is this? Well its a PDF version of the website www.ComplexityZoo.com typeset in LATEX using the complexity package. Well, what’s that? The original Complexity Zoo is a website created by Scott Aaronson which contains a (more or less) comprehensive list of Complexity Classes studied in the area of theoretical computer science known as Computa- tional Complexity. I took on the (mostly painless, thank god for regular expressions) task of translating the Zoo’s HTML code to LATEX for two reasons. First, as a regular Zoo patron, I thought, “what better way to honor such an endeavor than to spruce up the cages a bit and typeset them all in beautiful LATEX.” Second, I thought it would be a perfect project to develop complexity, a LATEX pack- age I’ve created that defines commands to typeset (almost) all of the complexity classes you’ll find here (along with some handy options that allow you to conveniently change the fonts with a single option parameters). To get the package, visit my own home page at http://www.cse.unl.edu/~cbourke/.
    [Show full text]
  • When Subgraph Isomorphism Is Really Hard, and Why This Matters for Graph Databases Ciaran Mccreesh, Patrick Prosser, Christine Solnon, James Trimble
    When Subgraph Isomorphism is Really Hard, and Why This Matters for Graph Databases Ciaran Mccreesh, Patrick Prosser, Christine Solnon, James Trimble To cite this version: Ciaran Mccreesh, Patrick Prosser, Christine Solnon, James Trimble. When Subgraph Isomorphism is Really Hard, and Why This Matters for Graph Databases. Journal of Artificial Intelligence Research, Association for the Advancement of Artificial Intelligence, 2018, 61, pp.723 - 759. 10.1613/jair.5768. hal-01741928 HAL Id: hal-01741928 https://hal.archives-ouvertes.fr/hal-01741928 Submitted on 26 Mar 2018 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Journal of Artificial Intelligence Research 61 (2018) 723-759 Submitted 11/17; published 03/18 When Subgraph Isomorphism is Really Hard, and Why This Matters for Graph Databases Ciaran McCreesh [email protected] Patrick Prosser [email protected] University of Glasgow, Glasgow, Scotland Christine Solnon [email protected] INSA-Lyon, LIRIS, UMR5205, F-69621, France James Trimble [email protected] University of Glasgow, Glasgow, Scotland Abstract The subgraph isomorphism problem involves deciding whether a copy of a pattern graph occurs inside a larger target graph.
    [Show full text]
  • Lecture 11 — October 16, 2012 1 Overview 2
    6.841: Advanced Complexity Theory Fall 2012 Lecture 11 | October 16, 2012 Prof. Dana Moshkovitz Scribe: Hyuk Jun Kweon 1 Overview In the previous lecture, there was a question about whether or not true randomness exists in the universe. This question is still seriously debated by many physicists and philosophers. However, even if true randomness does not exist, it is possible to use pseudorandomness for practical purposes. In any case, randomization is a powerful tool in algorithms design, sometimes leading to more elegant or faster ways of solving problems than known deterministic methods. This naturally leads one to wonder whether randomization can solve problems outside of P, de- terministic polynomial time. One way of viewing randomized algorithms is that for each possible setting of the random bits used, a different strategy is pursued by the algorithm. A property of randomized algorithms that succeed with bounded error is that the vast majority of strategies suc- ceed. With error reduction, all but exponentially many strategies will succeed. A major theme of theoretical computer science over the last 20 years has been to turn algorithms with this property into algorithms that deterministically find a winning strategy. From the outset, this seems like a daunting task { without randomness, how can one efficiently search for such strategies? As we'll see in later lectures, this is indeed possible, modulo some hardness assumptions. There are two main objectives in this lecture. The first objective is to introduce some probabilis- tic complexity classes, by bounding time or space. These classes are probabilistic analogues of deterministic complexity classes P and L.
    [Show full text]
  • R Z- /Li ,/Zo Rl Date Copyright 2012
    Hearing Moral Reform: Abolitionists and Slave Music, 1838-1870 by Karl Byrn A thesis submitted to Sonoma State University in partial fulfillment of the requirements for the degree of MASTER OF ARTS III History Dr. Steve Estes r Z- /Li ,/zO rL Date Copyright 2012 By Karl Bym ii AUTHORIZATION FOR REPRODUCTION OF MASTER'S THESIS/PROJECT I grant permission for the reproduction ofparts ofthis thesis without further authorization from me, on the condition that the person or agency requesting reproduction absorb the cost and provide proper acknowledgement of authorship. Permission to reproduce this thesis in its entirety must be obtained from me. iii Hearing Moral Reform: Abolitionists and Slave Music, 1838-1870 Thesis by Karl Byrn ABSTRACT Purpose ofthe Study: The purpose of this study is to analyze commentary on slave music written by certain abolitionists during the American antebellum and Civil War periods. The analysis is not intended to follow existing scholarship regarding the origins and meanings of African-American music, but rather to treat this music commentary as a new source for understanding the abolitionist movement. By treating abolitionists' reports of slave music as records of their own culture, this study will identify larger intellectual and cultural currents that determined their listening conditions and reactions. Procedure: The primary sources involved in this study included journals, diaries, letters, articles, and books written before, during, and after the American Civil War. I found, in these sources, that the responses by abolitionists to the music of slaves and freedmen revealed complex ideologies and motivations driven by religious and reform traditions, antebellum musical cultures, and contemporary racial and social thinking.
    [Show full text]
  • Delegating Computation: Interactive Proofs for Muggles∗
    Electronic Colloquium on Computational Complexity, Revision 1 of Report No. 108 (2017) Delegating Computation: Interactive Proofs for Muggles∗ Shafi Goldwasser Yael Tauman Kalai Guy N. Rothblum MIT and Weizmann Institute Microsoft Research Weizmann Institute [email protected] [email protected] [email protected] Abstract In this work we study interactive proofs for tractable languages. The (honest) prover should be efficient and run in polynomial time, or in other words a \muggle".1 The verifier should be super-efficient and run in nearly-linear time. These proof systems can be used for delegating computation: a server can run a computation for a client and interactively prove the correctness of the result. The client can verify the result's correctness in nearly-linear time (instead of running the entire computation itself). Previously, related questions were considered in the Holographic Proof setting by Babai, Fortnow, Levin and Szegedy, in the argument setting under computational assumptions by Kilian, and in the random oracle model by Micali. Our focus, however, is on the original inter- active proof model where no assumptions are made on the computational power or adaptiveness of dishonest provers. Our main technical theorem gives a public coin interactive proof for any language computable by a log-space uniform boolean circuit with depth d and input length n. The verifier runs in time n · poly(d; log(n)) and space O(log(n)), the communication complexity is poly(d; log(n)), and the prover runs in time poly(n). In particular, for languages computable by log-space uniform NC (circuits of polylog(n) depth), the prover is efficient, the verifier runs in time n · polylog(n) and space O(log(n)), and the communication complexity is polylog(n).
    [Show full text]