The Mechanism Design Approach to Interactive Proofs a Dissertation

Total Page:16

File Type:pdf, Size:1020Kb

The Mechanism Design Approach to Interactive Proofs a Dissertation The Mechanism Design Approach to Interactive Proofs A Dissertation presented by Shikha Singh to The Graduate School in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in Computer Science Stony Brook University August 2018 Stony Brook University The Graduate School Shikha Singh We, the dissertation committee for the above candidate for the Doctor of Philosophy degree, hereby recommend acceptance of this dissertation Michael Bender - Dissertation Advisor Professor, Computer Science Jing Chen - Dissertation Advisor Assistant Professor, Computer Science Steven Skiena - Chairperson of Defense Professor, Computer Science Jie Gao Associate Professor, Computer Science Martin Farach-Colton Professor, Computer Science, Rutgers University This dissertation is accepted by the Graduate School Charles Taber Dean of the Graduate School ii Abstract of the Dissertation The Mechanism Design Approach to Interactive Proofs by Shikha Singh Doctor of Philosophy in Computer Science Stony Brook University 2018 Most computation today is not done locally by a client but rather outsourced to third- party service providers in exchange for money. Trading computation for money brings up two problems|(a) how can the client guarantee correctness of the outsourced computation efficiently, and (b) how to design an effective payment scheme. The two problems are closely related|ideally, we want the payment scheme to incentivize the service providers to perform the computation correctly. Interactive proofs (IP) are a fundamental theoretical framework used to study verifiable computation outsourcing. In an IP, the weak client (or verifier) interacts with powerful service providers (or provers) to determine the truthfulness of their claim. IPs give strong guarantees; however they do not admit a non-trivial payment scheme. This dissertation aims to answer the following question: if computation is being traded for money in financially-driven marketplaces, how do we use payments to leverage correctness? Rational proofs are payment-based interactive proofs for computation outsourcing which incentivize the service provider to do the computation correctly. In a rational proof, the prover is rational in the economic sense and acts to maximize its payment. In this dissertation, we introduce and analyze the model of rational proofs with multiple service providers. Multiple rational agents pose new game-theoretic challenges: how do iii we design and analyze their joint incentive structure? Provers may be cooperative (work together as a team to maximize their total payment) or non-cooperative (act to maximize their own individual payment). Using principles from game theory and mechanism design, we show how the incentives of multiple rational provers can used against each other to design simple, efficient and extremely powerful proof systems. Besides the main work on rational proofs, this work also addresses an important algorith- mic problem faced by memory-constrained devices that store most of their data on external storage (accessing which is expensive). In particular, we study the following problem: how do we efficiently test membership and perform updates on a set that is stored remotely? We present improved variants of a Bloom filter, a data structure that is widely used to speed up membership queries to a remote set. iv Dedicated to my parents, Nirupma and Subhash Singh, for teaching me to work hard and to dream big. v Table of Contents 1 Introduction 1 1.1 Motivation and Dissertation Overview . .1 1.2 Rational Interactive Proofs . .1 1.2.1 Results and Contributions . .4 1.3 Minimizing Remote Accesses: Adaptive Bloom Filters . .6 1.4 Dissertation Outline . .7 2 Rational Proofs: Background and Related Work 8 2.1 Interactive Proofs . .8 2.2 Review of Game Theoretic Concepts . 10 2.3 Previous Work on Game-theoretic Interactive Proofs . 12 2.3.1 Refereed Games . 12 2.3.2 Single-Prover Rational Proofs . 13 2.4 Review of Uniform Circuits and Complexity Classes . 16 3 Rational Proofs with Cooperative Provers 19 3.1 Introduction . 19 3.1.1 Overview of Results and Contributions . 21 3.2 Multi-Prover Rational Interactive Proofs (MRIP) . 23 3.2.1 MRIP with Utility Gap . 26 3.3 MRIP Protocols for NEXP ............................ 27 3.4 Constant and Noticeable Utility Gap . 32 3.5 Characterizing the Full Power of MRIP . 35 3.6 Optimal Number of Provers and Rounds . 45 4 Scaled-Down Cooperative Rational Proofs 50 4.1 Introduction . 50 4.1.1 Overview of Results and Contributions . 50 4.2 Preliminaries . 52 4.3 Verification in Logarithmic Time . 53 4.4 Verification in Logarithmic Space . 58 vi 5 Relationship Between Classical and Rational Proofs 61 5.1 Introduction . 61 5.2 Converting a Rational Proof to a Classical Proof . 62 6 Rational Proofs with Non-Cooperative Provers 67 6.1 Introduction . 67 6.2 Model and Preliminaries . 69 6.3 Strong Sequential Equilibrium and its Properties . 71 6.4 Recursive-Maximum SSE . 78 6.5 Utility Gap in ncRIP Protocols . 79 7 Tight Characterizations of ncRIP Classes 81 7.1 Introduction . 81 7.2 Lower Bounds on ncRIP Classes . 83 7.3 Upper Bounds on ncRIP Classes . 90 7.4 Optimal Number of Provers and Rounds . 100 8 Scaled-Down Non-Cooperative Rational Proofs 103 8.1 Introduction . 103 8.1.1 Overview of Results and Contributions . 104 8.2 Model and Preliminaries . 105 8.3 Warm up: O(log n)-time ncRIP Protocols for P and NP ............ 106 8.4 A Lower Bound on O(log n)-time ncRIP Protocols . 110 8.5 A Upper Bound on O(log n)-time ncRIP Protocols . 113 9 Adaptive Bloom Filters to Minimize Remote Accesses 115 9.1 Introduction . 115 9.2 Related Work . 118 9.3 Preliminaries . 119 9.4 A Lower Bound on Local AMQs . 122 9.4.1 Notation and Adversary Model . 123 9.4.2 Analysis . 124 9.5 Broom Filter: An Adaptive Bloom filter . 130 9.5.1 Extending Fingerprints Using Adaptivity Bits . 131 9.5.2 Broom Filter Design for the Small-Remainder Case . 140 9.5.3 Broom Filter Design for the Large-Remainder Case . 142 9.6 How to Turn any AMQ into an Adaptive AMQ . 144 vii List of Figures 1 Complexity classes with scaled-down rational proof protocols. .5 2 The computation power of MRIP vs. classical interactive proof systems. It is widely believed that PSPACE 6= EXP, EXP 6= NEXP, and NEXP 6= coNEXP.. 22 3 An MRIP protocol for L using MRIP protocol for L.............. 25 4 A simple MRIP protocol for NEXP........................ 28 5 A simple and efficient MRIP protocol for Oracle-3SAT............. 29 6 An MRIP protocol for PjjNEXP[γ(n)]......................... 33 7 An MRIP protocol for EXP............................ 36 poly−NEXP 8 An MRIP protocol for EXPjj ....................... 39 9 Simulating any MRIP protocol with 2 provers and 3 rounds. 47 10 Simulating an RIP protocol using 2 provers and reduced communication. 55 NP[γ(n)] 11 An RIP protocol for Ljj ........................... 59 12 Summary of the tight characterizations of ncRIP classes. 82 13 The computation power hierarchy of classical, rational cooperative and ratio- NEXP NEXP nal non-cooperative interactive proof systems, assuming Pjj 6= P ... 82 14 A O(1)-utility gap ncRIP protocol for NEXP................... 84 15 An O(γ(n))-utility gap ncRIP protocol for PNEXP[γ(n)].............. 86 16 Simulating any MRIP using an ncRIP protocol with exponential utility gap. 89 17 A constant-utility gap, O(log n)-time ncRIP protocol for P........... 107 18 A constant-utility gap O(log n)-time ncRIP protocol for 3-SAT......... 109 19 An O(γ(n))-utility gap ncRIP protocol for PNEXP[γ(n)].............. 111 20 Algorithms for Lookup and Adapt in an adaptive Bloom filter. 145 viii Acknowledgements I have been fortunate to have had amazing teachers and mentors in my life, and I am grateful to each one of them even if they are not explicitly mentioned here. I would like to start by acknowledging my fantastic advisors, Jing Chen and Michael Ben- der, for their unwavering support and guidance during the last five years. From Jing I learnt the value of patience and rigor when attacking challenging research problems. From Michael I learnt to appreciate the elegance in simple proofs and the importance of communicating research ideas well. It has been an immensely rewarding experience to observe Michael and Jing at work and it is to them that I owe my research aesthetics, my writing and teaching style and my love for collaboration. I am also grateful to Steven Skiena, Martin Farach-Colton and Rob Johnson for their mentorship and time; to Steve, for trusting me with his classes and helping me figure out what I wanted to do with my life; and to Martin and Rob, for making my ideas feel valued in meetings and for making research fun with their endless repertoire of puns and sarcasm. I was fortunate to have the opportunity to visit several research labs during my PhD. Working in these new environments with new people has helped me grow as a researcher. I would like to thank Manoj Gupta, Mayank Goswami and Nguyen Kim Thang for hosting me in their labs, introducing me to new research problems and advising me during my visit. I want to thank the Algorithms Reading Group, especially Estie Arkin, Joe Mitchell, Rezaul Chowdhury, Jie Gao, Rob Patro, Michael Bender, Jing Chen, and Steve Skiena, for sharing fun problems and creating a vibrant algorithms culture at Stony Brook. A special mention to our admin team, Kathy Germana, Betty Knitweiss and Cindy SantaCruz-Scalzo; thanks for all the paperwork, and making sure that I get paid and that I graduate. I want to thank everyone I have interacted with at workshops and conferences, as these discussions have enriched my grad school experience. Among them, I would especially like to mention Suresh Venkatasubramanian, Jeremy Fineman, Ben Moseley, Cindy Phillips, Andrew McGregor, Tsvi Kopelowitz, Nodari Sitchinava, and Don Sheehy.
Recommended publications
  • Interactive Proof Systems and Alternating Time-Space Complexity
    Theoretical Computer Science 113 (1993) 55-73 55 Elsevier Interactive proof systems and alternating time-space complexity Lance Fortnow” and Carsten Lund** Department of Computer Science, Unicersity of Chicago. 1100 E. 58th Street, Chicago, IL 40637, USA Abstract Fortnow, L. and C. Lund, Interactive proof systems and alternating time-space complexity, Theoretical Computer Science 113 (1993) 55-73. We show a rough equivalence between alternating time-space complexity and a public-coin interactive proof system with the verifier having a polynomial-related time-space complexity. Special cases include the following: . All of NC has interactive proofs, with a log-space polynomial-time public-coin verifier vastly improving the best previous lower bound of LOGCFL for this model (Fortnow and Sipser, 1988). All languages in P have interactive proofs with a polynomial-time public-coin verifier using o(log’ n) space. l All exponential-time languages have interactive proof systems with public-coin polynomial-space exponential-time verifiers. To achieve better bounds, we show how to reduce a k-tape alternating Turing machine to a l-tape alternating Turing machine with only a constant factor increase in time and space. 1. Introduction In 1981, Chandra et al. [4] introduced alternating Turing machines, an extension of nondeterministic computation where the Turing machine can make both existential and universal moves. In 1985, Goldwasser et al. [lo] and Babai [l] introduced interactive proof systems, an extension of nondeterministic computation consisting of two players, an infinitely powerful prover and a probabilistic polynomial-time verifier. The prover will try to convince the verifier of the validity of some statement.
    [Show full text]
  • On Physical Problems That Are Slightly More Difficult Than
    On physical problems that are slightly more difficult than QMA Andris Ambainis University of Latvia and IAS, Princeton Email: [email protected] Abstract We study the complexity of computational problems from quantum physics. Typi- cally, they are studied using the complexity class QMA (quantum counterpart of NP ) but some natural computational problems appear to be slightly harder than QMA. We introduce new complexity classes consisting of problems that are solvable with a small number of queries to a QMA oracle and use these complexity classes to quantify the complexity of several natural computational problems (for example, the complexity of estimating the spectral gap of a Hamiltonian). 1 Introduction Quantum Hamiltonian complexity [30] is a new field that combines quantum physics with computer science, by using the notions from computational complexity to study the com- plexity of problems that appear in quantum physics. One of central notions of Hamiltonian complexity is the complexity class QMA [25, 24, 40, 21, 3] which is the quantum counterpart of NP. QMA consists of all computational problems whose solutions can be verified in polynomial time on a quantum computer, given a quantum witness (a quantum state on a polynomial number of qubits). QMA captures the complexity of several interesting physical problems. For example, estimating the ground state energy of a physical system (described by a Hamiltonian) is arXiv:1312.4758v2 [quant-ph] 10 Apr 2014 a very important task in quantum physics. We can characterize the complexity of this problem by showing that it is QMA-complete, even if we restrict it to natural classes of Hamiltonians.
    [Show full text]
  • On Uniformity Within NC
    On Uniformity Within NC David A Mix Barrington Neil Immerman HowardStraubing University of Massachusetts University of Massachusetts Boston Col lege Journal of Computer and System Science Abstract In order to study circuit complexity classes within NC in a uniform setting we need a uniformity condition which is more restrictive than those in common use Twosuch conditions stricter than NC uniformity RuCo have app eared in recent research Immermans families of circuits dened by rstorder formulas ImaImb and a unifor mity corresp onding to Buss deterministic logtime reductions Bu We show that these two notions are equivalent leading to a natural notion of uniformity for lowlevel circuit complexity classes Weshow that recent results on the structure of NC Ba still hold true in this very uniform setting Finallyweinvestigate a parallel notion of uniformity still more restrictive based on the regular languages Here we givecharacterizations of sub classes of the regular languages based on their logical expressibility extending recentwork of Straubing Therien and Thomas STT A preliminary version of this work app eared as BIS Intro duction Circuit Complexity Computer scientists have long tried to classify problems dened as Bo olean predicates or functions by the size or depth of Bo olean circuits needed to solve them This eort has Former name David A Barrington Supp orted by NSF grant CCR Mailing address Dept of Computer and Information Science U of Mass Amherst MA USA Supp orted by NSF grants DCR and CCR Mailing address Dept of
    [Show full text]
  • The Complexity of Space Bounded Interactive Proof Systems
    The Complexity of Space Bounded Interactive Proof Systems ANNE CONDON Computer Science Department, University of Wisconsin-Madison 1 INTRODUCTION Some of the most exciting developments in complexity theory in recent years concern the complexity of interactive proof systems, defined by Goldwasser, Micali and Rackoff (1985) and independently by Babai (1985). In this paper, we survey results on the complexity of space bounded interactive proof systems and their applications. An early motivation for the study of interactive proof systems was to extend the notion of NP as the class of problems with efficient \proofs of membership". Informally, a prover can convince a verifier in polynomial time that a string is in an NP language, by presenting a witness of that fact to the verifier. Suppose that the power of the verifier is extended so that it can flip coins and can interact with the prover during the course of a proof. In this way, a verifier can gather statistical evidence that an input is in a language. As we will see, the interactive proof system model precisely captures this in- teraction between a prover P and a verifier V . In the model, the computation of V is probabilistic, but is typically restricted in time or space. A language is accepted by the interactive proof system if, for all inputs in the language, V accepts with high probability, based on the communication with the \honest" prover P . However, on inputs not in the language, V rejects with high prob- ability, even when communicating with a \dishonest" prover. In the general model, V can keep its coin flips secret from the prover.
    [Show full text]
  • Acm Names Fellows for Innovations in Computing
    CONTACT: Virginia Gold 212-626-0505 [email protected] ACM NAMES FELLOWS FOR INNOVATIONS IN COMPUTING 2014 Fellows Made Computing Contributions to Enterprise, Entertainment, and Education NEW YORK, January 8, 2015—ACM has recognized 47 of its members for their contributions to computing that are driving innovations across multiple domains and disciplines. The 2014 ACM Fellows, who hail from some of the world’s leading universities, corporations, and research labs, have achieved advances in computing research and development that are driving innovation and sustaining economic development around the world. ACM President Alexander L. Wolf acknowledged the advances made by this year’s ACM Fellows. “Our world has been immeasurably improved by the impact of their innovations. We recognize their contributions to the dynamic computing technologies that are making a difference to the study of computer science, the community of computing professionals, and the countless consumers and citizens who are benefiting from their creativity and commitment.” The 2014 ACM Fellows have been cited for contributions to key computing fields including database mining and design; artificial intelligence and machine learning; cryptography and verification; Internet security and privacy; computer vision and medical imaging; electronic design automation; and human-computer interaction. ACM will formally recognize the 2014 Fellows at its annual Awards Banquet in June in San Francisco. Additional information about the ACM 2014 Fellows, the awards event, as well as previous
    [Show full text]
  • Week 1: an Overview of Circuit Complexity 1 Welcome 2
    Topics in Circuit Complexity (CS354, Fall’11) Week 1: An Overview of Circuit Complexity Lecture Notes for 9/27 and 9/29 Ryan Williams 1 Welcome The area of circuit complexity has a long history, starting in the 1940’s. It is full of open problems and frontiers that seem insurmountable, yet the literature on circuit complexity is fairly large. There is much that we do know, although it is scattered across several textbooks and academic papers. I think now is a good time to look again at circuit complexity with fresh eyes, and try to see what can be done. 2 Preliminaries An n-bit Boolean function has domain f0; 1gn and co-domain f0; 1g. At a high level, the basic question asked in circuit complexity is: given a collection of “simple functions” and a target Boolean function f, how efficiently can f be computed (on all inputs) using the simple functions? Of course, efficiency can be measured in many ways. The most natural measure is that of the “size” of computation: how many copies of these simple functions are necessary to compute f? Let B be a set of Boolean functions, which we call a basis set. The fan-in of a function g 2 B is the number of inputs that g takes. (Typical choices are fan-in 2, or unbounded fan-in, meaning that g can take any number of inputs.) We define a circuit C with n inputs and size s over a basis B, as follows. C consists of a directed acyclic graph (DAG) of s + n + 2 nodes, with n sources and one sink (the sth node in some fixed topological order on the nodes).
    [Show full text]
  • The Complexity Zoo
    The Complexity Zoo Scott Aaronson www.ScottAaronson.com LATEX Translation by Chris Bourke [email protected] 417 classes and counting 1 Contents 1 About This Document 3 2 Introductory Essay 4 2.1 Recommended Further Reading ......................... 4 2.2 Other Theory Compendia ............................ 5 2.3 Errors? ....................................... 5 3 Pronunciation Guide 6 4 Complexity Classes 10 5 Special Zoo Exhibit: Classes of Quantum States and Probability Distribu- tions 110 6 Acknowledgements 116 7 Bibliography 117 2 1 About This Document What is this? Well its a PDF version of the website www.ComplexityZoo.com typeset in LATEX using the complexity package. Well, what’s that? The original Complexity Zoo is a website created by Scott Aaronson which contains a (more or less) comprehensive list of Complexity Classes studied in the area of theoretical computer science known as Computa- tional Complexity. I took on the (mostly painless, thank god for regular expressions) task of translating the Zoo’s HTML code to LATEX for two reasons. First, as a regular Zoo patron, I thought, “what better way to honor such an endeavor than to spruce up the cages a bit and typeset them all in beautiful LATEX.” Second, I thought it would be a perfect project to develop complexity, a LATEX pack- age I’ve created that defines commands to typeset (almost) all of the complexity classes you’ll find here (along with some handy options that allow you to conveniently change the fonts with a single option parameters). To get the package, visit my own home page at http://www.cse.unl.edu/~cbourke/.
    [Show full text]
  • CS 579: Computational Complexity. Lecture 2 Space Complexity
    CS 579: Computational Complexity. Lecture 2 Space complexity. Alexandra Kolla Today Space Complexity, L,NL Configuration Graphs Log- Space Reductions NL Completeness, STCONN Savitch’s theorem SL Turing machines, briefly (3-tape) Turing machine M described by tuple (Γ,Q,δ), where ◦ Γ is “alphabet” . Contains start and blank symbol, 0,1,among others (constant size). ◦ Q is set of states, including designated starting state and halt state (constant size). ◦ Transition function δ:푄 × Γ3 → 푄 × Γ2 × {퐿, 푆, 푅}3 describing the rules M uses to move. Turing machines, briefly (3-tape) NON-DETERMINISTIC Turing machine M described by tuple (Γ,Q,δ0,δ1), where ◦ Γ is “alphabet” . Contains start and blank symbol, 0,1,among others (constant size). ◦ Q is set of states, including designated starting state and halt state (constant size). ◦ Two transition functions δ0, δ1 :푄 × Γ3 → 푄 × Γ2 × {퐿, 푆, 푅}3. At every step, TM makes non- deterministic choice which one to Space bounded turing machines Space-bounded turing machines used to study memory requirements of computational tasks. Definition. Let 푠: ℕ → ℕ and 퐿 ⊆ {0,1}∗. We say that L∈ SPACE(s(n)) if there is a constant c and a TM M deciding L s.t. at most c∙s(n) locations on M’s work tapes (excluding the input tape) are ever visited by M’s head during its computation on every input of length n. We will assume a single work tape and no output tape for simplicity. Similarly for NSPACE(s(n)), TM can only use c∙s(n) nonblank tape locations, regardless of its nondeterministic choices Space bounded turing machines Read-only “input” tape.
    [Show full text]
  • Boolean Hierarchies
    Bo olean Hierarchies On Collapse Prop erties and Query Order Dissertation zur Erlangung des akademischen Grades do ctor rerum naturalium Dr rer nat vorgelegt dem Rat der Fakultat fur Mathematik und Informatik der FriedrichSchillerUniversitat Jena von DiplomMathematiker Harald Hemp el geb oren am August in Jena Gutachter Prof Dr Gerd Wechsung Prof Edith Hemaspaandra Prof Dr Klaus Wagner Tag des Rigorosums Tag der oentlichen Verteidigung To my family Acknowledgements Words can not express my deep gratitude to my advisor Professor Gerd Wechsung Gen erously he oered supp ort guidance and encouragement throughout the past four years Learning from him and working with him was and still is a pleasure and privilege I much ap preciate Through all the ups and downs of my research his optimism and humane warmth have made the downs less frustrating and the ups more encouraging I want to express my deep gratitude to Professor Lane Hemaspaandra and Professor Edith Hemaspaandra Allowing me to become part of so many joint pro jects has been a wonderful learning exp erience and I much b eneted from their scien tic exp ertise Their generous help and advice help ed me to gain insights into how research is done and made this thesis p ossible For serving as referees for this thesis I am grateful to Professor Edith Hemaspaandra and Professor Klaus Wagner Iwant to thank all my colleagues at Jena esp ecially HaikoMuller Dieter Kratsch Jorg Rothe Johannes Waldmann and Maren Hinrichs for generously oering help and supp ort A regarding the many little things
    [Show full text]
  • The Polynomial Hierarchy
    ij 'I '""T', :J[_ ';(" THE POLYNOMIAL HIERARCHY Although the complexity classes we shall study now are in one sense byproducts of our definition of NP, they have a remarkable life of their own. 17.1 OPTIMIZATION PROBLEMS Optimization problems have not been classified in a satisfactory way within the theory of P and NP; it is these problems that motivate the immediate extensions of this theory beyond NP. Let us take the traveling salesman problem as our working example. In the problem TSP we are given the distance matrix of a set of cities; we want to find the shortest tour of the cities. We have studied the complexity of the TSP within the framework of P and NP only indirectly: We defined the decision version TSP (D), and proved it NP-complete (corollary to Theorem 9.7). For the purpose of understanding better the complexity of the traveling salesman problem, we now introduce two more variants. EXACT TSP: Given a distance matrix and an integer B, is the length of the shortest tour equal to B? Also, TSP COST: Given a distance matrix, compute the length of the shortest tour. The four variants can be ordered in "increasing complexity" as follows: TSP (D); EXACTTSP; TSP COST; TSP. Each problem in this progression can be reduced to the next. For the last three problems this is trivial; for the first two one has to notice that the reduction in 411 j ;1 17.1 Optimization Problems 413 I 412 Chapter 17: THE POLYNOMIALHIERARCHY the corollary to Theorem 9.7 proving that TSP (D) is NP-complete can be used with DP.
    [Show full text]
  • Collapsing Exact Arithmetic Hierarchies
    Electronic Colloquium on Computational Complexity, Report No. 131 (2013) Collapsing Exact Arithmetic Hierarchies Nikhil Balaji and Samir Datta Chennai Mathematical Institute fnikhil,[email protected] Abstract. We provide a uniform framework for proving the collapse of the hierarchy, NC1(C) for an exact arith- metic class C of polynomial degree. These hierarchies collapses all the way down to the third level of the AC0- 0 hierarchy, AC3(C). Our main collapsing exhibits are the classes 1 1 C 2 fC=NC ; C=L; C=SAC ; C=Pg: 1 1 NC (C=L) and NC (C=P) are already known to collapse [1,18,19]. We reiterate that our contribution is a framework that works for all these hierarchies. Our proof generalizes a proof 0 1 from [8] where it is used to prove the collapse of the AC (C=NC ) hierarchy. It is essentially based on a polynomial degree characterization of each of the base classes. 1 Introduction Collapsing hierarchies has been an important activity for structural complexity theorists through the years [12,21,14,23,18,17,4,11]. We provide a uniform framework for proving the collapse of the NC1 hierarchy over an exact arithmetic class. Using 0 our method, such a hierarchy collapses all the way down to the AC3 closure of the class. 1 1 1 Our main collapsing exhibits are the NC hierarchies over the classes C=NC , C=L, C=SAC , C=P. Two of these 1 1 hierarchies, viz. NC (C=L); NC (C=P), are already known to collapse ([1,19,18]) while a weaker collapse is known 0 1 for a third one viz.
    [Show full text]
  • Two-Way Automata Characterizations of L/Poly Versus NL
    Two-way automata characterizations of L/poly versus NL Christos A. Kapoutsis1;? and Giovanni Pighizzini2 1 LIAFA, Universit´eParis VII, France 2 DICo, Universit`adegli Studi di Milano, Italia Abstract. Let L/poly and NL be the standard complexity classes, of languages recognizable in logarithmic space by Turing machines which are deterministic with polynomially-long advice and nondeterministic without advice, respectively. We recast the question whether L/poly ⊇ NL in terms of deterministic and nondeterministic two-way finite automata (2dfas and 2nfas). We prove it equivalent to the question whether every s-state unary 2nfa has an equivalent poly(s)-state 2dfa, or whether a poly(h)-state 2dfa can check accessibility in h-vertex graphs (even under unary encoding) or check two-way liveness in h-tall, h-column graphs. This complements two recent improvements of an old theorem of Berman and Lingas. On the way, we introduce new types of reductions between regular languages (even unary ones), use them to prove the completeness of specific languages for two-way nondeterministic polynomial size, and propose a purely combinatorial conjecture that implies L/poly + NL. 1 Introduction A prominent open question in complexity theory asks whether nondeterminism is essential in logarithmic-space Turing machines. Formally, this is the question whether L = NL, for L and NL the standard classes of languages recognizable by logarithmic-space deterministic and nondeterministic Turing machines. In the late 70's, Berman and Lingas [1] connected this question to the comparison between deterministic and nondeterministic two-way finite automata (2dfas and 2nfas), proving that if L = NL, then for every s-state σ-symbol 2nfa there is a poly(sσ)-state 2dfa which agrees with it on all inputs of length ≤ s.
    [Show full text]