ETH Hardness for Densest-K-Subgraph with Perfect Completeness

Total Page:16

File Type:pdf, Size:1020Kb

ETH Hardness for Densest-K-Subgraph with Perfect Completeness ETH Hardness for Densest-k-Subgraph with Perfect Completeness Mark Braverman ∗ Young Kun Ko y Aviad Rubinstein z Omri Weinstein x November 1, 2016 Abstract Problem 1. (Approximate Max Clique, Informal) We show that, assuming the (deterministic) Exponential Given an n-vertex graph G, decide whether G con- Time Hypothesis, distinguishing between a graph with tains a clique of size k, or all induced cliques of G an induced k-clique and a graph in which all k-subgraphs are of size at most δk for some 1 > δ(n) > 0. have density at most 1−", requires nΩ(log~ n) time. Our re- sult essentially matches the quasi-polynomial algorithms of Feige and Seltser [FS97] and Barman [Bar15] for this The second natural relaxation is to relax the \Clique" problem, and is the first one to rule out an additive PTAS requirement, replacing it with the more modest goal for Densest k-Subgraph. We further strengthen this re- of finding a subgraph that is almost a clique: sult by showing that our lower bound continues to hold when, in the soundness case, even subgraphs smaller by ~ Problem 2. (Densest k-Subgraph with per- a near-polynomial factor (k0 = k · 2−Ω(log n)) are assumed to be at most (1 − ")-dense. fect completeness, Informal) Our reduction is inspired by recent applications of the Given an n-vertex graph G containing a clique of \birthday repetition" technique [AIM14, BKW15]. Our size k, find an induced subgraphs of G of size k with analysis relies on information theoretical machinery and is similar in spirit to analyzing a parallel repetition of two- (edge) density at least (1 − "), for some 1 > " > 0. prover games in which the provers may choose to answer (More modestly, given an n-vertex graph G, decide some challenges multiple times, while completely ignoring whether G contains a clique of size k, or all induced other challenges. k-subgraphs of G have density at most (1 − ")). 1 Introduction Today, after a long line of research [FGL+96, k-Clique is one of the most fundamental problems AS98, ALM+98, H˚as99,Kho01, Zuc07] we have a in computer science: given a graph, decide whether it solid understanding of the inapproximability of Prob- has a fully connected induced subgraph on k vertices. lem 1. In particular, we know that it is NP-hard to Since it was proven NP-complete by Karp [Kar72], distinguish between a graph that has a clique of size extensive research has investigated the complexity of k, and a graph whose largest induced clique is of size relaxed versions of this problem. at most k0 = δk for δ = 1=n1−" [Zuc07]. The compu- This work focuses on two natural relaxations of tational complexity of the second relaxation (Prob- k-Clique which have received significant attention lem 2) remained largely open. There are a couple from both algorithmic and complexity communities: of (very different) quasi-polynomial algorithms that The first one is to relax \k", i.e. looking for a smaller guarantee finding a (1 − ")-dense k subgraph in every subgraph: graph containing a k-clique [FS97, Bar15], suggest- ing that this problem is not NP-hard. Yet we know neither polynomial-time algorithms, nor general im- ∗Department of Computer Science, Princeton University, email: [email protected]. Research supported in possibility results for this problem. part by an NSF CAREER award (CCF-1149888), a Turing In this work we provide a strong evidence that the Centenary Fellowship, a Packard Fellowship in Science and aforementioned quasi-polynomial time algorithms for Engineering, and the Simons Collaboration on Algorithms and Problem 2 [FS97, Bar15] are essentially tight, assum- Geometry. ing the (deterministic) Exponential Time Hypothesis yDepartment of Computer Science, Princeton University, email: [email protected] (ETH), which postulates that any deterministic algo- Ω(n) zDepartment of Electrical Engineering and Computer rithm for 3SAT requires 2 time [IP01]. In fact, we Sciences, University of California at Berkeley, email: show that under ETH, both parameters of the above [email protected]. This work was supported in part by relaxations are simultaneously hard to approximate: NSF grant CCF1408635 and by Templeton Foundation grant 3966. This work was done in part at the Simons Institute for the Theory of Computing. Theorem 1.1. (Main Result) There exists a uni- xDepartment of Computer Science, Courant Institute versal constant " > 0 such that, assuming the (de- (NYU), email: [email protected] terministic) Exponential Time Hypothesis, distin- guishing between the following requires time nΩ(log~ n), even sparser. In contrast, our result has perfect com- where n is the number of vertices of G. pleteness and provides the first additive inapproxima- bility for Densest k-Subgraph | the best one can Completeness G has an induced k-clique; and hope for as per the upper bound of [Bar15]. Soundness Every induced subgraph of G size k0 = −Ω( log n ) Planted Clique The Planted Clique problem k · 2 log log n has density at most 1 − ", is a special case of our problem, where the inputs Our result has implications for two major open come from a specific distribution (G (n; p) versus problems whose computational complexity remained G (n; p) + \a planted clique of size k", where p is 1 elusive for more than two decades: The (general) some constant ). The Planted Clique Conjecture + Densest k-Subgraph problem, and the Planted ([AAK 07, AKS98, Jer92, Kuc95, FK00, DGGP10]) Clique problem. asserts that distinguishing betweenp the aforemen- tioned cases for p = 1=2; k = o( n) cannot be done Densest k-Subgraph The Densest k-Subgraph in polynomial time, and has served as the underly- problem, DkS (η; "), is the same as (the decision ver- ing hardness assumption in a variety of recent ap- sion of) Problem 2, except that in the \complete- plications including machine-learning and cryptog- + ness" case, G has a k-subgraph with density η, and raphy (e.g. [AAK 07, BR13]) that inherently use in the \soundness" case, every k-subgraph is of den- the average-case nature of the problem, as well as sity at most ", where η ". Since Problem 2 is in reductions to worst-case problems (e.g. [HK11, + + + a special case of this problem, our main theorem AAM 11, KZ11, BBB 13, CLLR15, BPR 16b]). can also be viewed as a new inapproximability re- The main drawback of average-case hardness sult for DkS (1; 1 − "). We remark that the aforemen- assumptions is that many average-case instances tioned quasi-polynomial algorithms for the \perfect (even those of worst-case-hard problems) are in fact completeness" regime completely break in the sparse tractable. While a significant line of research in re- regime, and indeed it is believed that DkS n−α; n−β cent years has focused on obtaining lower bounds in + (for k = n") in fact requires much more than quasi- restricted models of computation [FGR 13, MPW15, + + polynomial time [BCV+12]. The best to-date approx- DM15, HKP 16, BHK 16], a general lower bound for imation algorithm for Densest k-Subgraph due to the average-case planted clique problem appears out Bhaskara et. al, is guaranteed to find a k-subgraph of reach for existing techniques. Therefore, an impor- whose density is within an ∼ n1=4-multiplicative fac- tant potential application of our result is replacing tor of the densest subgraph of size k [BCC+10], and average-case assumptions such as the planted-clique thus DkS (η; ") can be solved efficiently whenever conjecture, in applications that do not inherently rely η n1=4 · " (this improved upon a previous n1=3−δ- on the distributional nature of the inputs (e.g., when approximation of Feige et. al [FKP01]). Making fur- the ultimate goal is to prove a worst-case hardness ther progress on either the lower or upper bound fron- result). In such applications, there is a good chance tier of the problem is a major open problem. that planted clique hardness assumptions can be re- Several inapproximability results for Densest k- placed with a more \conventional" hardness assump- Subgraph were known against specific classes of al- tion, such as the ETH, even when the problem has gorithms [BCV+12] or under incomparable assump- a quasi-polynomial algorithm. Recently, such a re- tions of Unique Games with expansion [RS10] and placement of the planted clique conjecture with ETH hardness of random k-CNF [Fei02, AAM+11]. The was obtained for the problem of finding an approx- most closely related result is by Khot [Kho06], who imate Nash equilibrium with approximately optimal shows that the Densest k-Subgraph problem has social welfare [BKW15]. " no PTAS unless SAT can be solved in time 2n , as We also remark that, while showing hardness 1=2+" opposed to 2n in our paper. While Khot's work for Planted Clique from worst-case assumptions uses a slightly weaker assumption, an important ad- seems beyond the reach of current techniques, our vantage of our work is simplicity: our construction is result can also be seen as circumstantial evidence very simple, especially in contrast to Khot's reduc- that this problem may indeed be hard. In particular, tion. any polynomial time algorithm (if exists) would have We stress that the result of [Kho06], as well as other aforementioned works, focus on the sub- 1Planted Clique typically refers to p = 1=2, while our constant density regime, i.e. they show hardness hardness result is analogous to p = 1 − δ, for a small constant for distinguishing between a graph where every k- δ > 0. Nevertheless, in almost all applications of Planted subgraph is sparse, and one where every k-subgraph is Clique, hardness for any constant p suffices.
Recommended publications
  • The Strongish Planted Clique Hypothesis and Its Consequences
    The Strongish Planted Clique Hypothesis and Its Consequences Pasin Manurangsi Google Research, Mountain View, CA, USA [email protected] Aviad Rubinstein Stanford University, CA, USA [email protected] Tselil Schramm Stanford University, CA, USA [email protected] Abstract We formulate a new hardness assumption, the Strongish Planted Clique Hypothesis (SPCH), which postulates that any algorithm for planted clique must run in time nΩ(log n) (so that the state-of-the-art running time of nO(log n) is optimal up to a constant in the exponent). We provide two sets of applications of the new hypothesis. First, we show that SPCH implies (nearly) tight inapproximability results for the following well-studied problems in terms of the parameter k: Densest k-Subgraph, Smallest k-Edge Subgraph, Densest k-Subhypergraph, Steiner k-Forest, and Directed Steiner Network with k terminal pairs. For example, we show, under SPCH, that no polynomial time algorithm achieves o(k)-approximation for Densest k-Subgraph. This inapproximability ratio improves upon the previous best ko(1) factor from (Chalermsook et al., FOCS 2017). Furthermore, our lower bounds hold even against fixed-parameter tractable algorithms with parameter k. Our second application focuses on the complexity of graph pattern detection. For both induced and non-induced graph pattern detection, we prove hardness results under SPCH, improving the running time lower bounds obtained by (Dalirrooyfard et al., STOC 2019) under the Exponential Time Hypothesis. 2012 ACM Subject Classification Theory of computation → Problems, reductions and completeness; Theory of computation → Fixed parameter tractability Keywords and phrases Planted Clique, Densest k-Subgraph, Hardness of Approximation Digital Object Identifier 10.4230/LIPIcs.ITCS.2021.10 Related Version A full version of the paper is available at https://arxiv.org/abs/2011.05555.
    [Show full text]
  • Computational Lower Bounds for Community Detection on Random Graphs
    JMLR: Workshop and Conference Proceedings vol 40:1–30, 2015 Computational Lower Bounds for Community Detection on Random Graphs Bruce Hajek [email protected] Department of ECE, University of Illinois at Urbana-Champaign, Urbana, IL Yihong Wu [email protected] Department of ECE, University of Illinois at Urbana-Champaign, Urbana, IL Jiaming Xu [email protected] Department of Statistics, The Wharton School, University of Pennsylvania, Philadelphia, PA, Abstract This paper studies the problem of detecting the presence of a small dense community planted in a large Erdos-R˝ enyi´ random graph G(N; q), where the edge probability within the community exceeds q by a constant factor. Assuming the hardness of the planted clique detection problem, we show that the computational complexity of detecting the community exhibits the following phase transition phenomenon: As the graph size N grows and the graph becomes sparser according to −α 2 q = N , there exists a critical value of α = 3 , below which there exists a computationally intensive procedure that can detect far smaller communities than any computationally efficient procedure, and above which a linear-time procedure is statistically optimal. The results also lead to the average-case hardness results for recovering the dense community and approximating the densest K-subgraph. 1. Introduction Networks often exhibit community structure with many edges joining the vertices of the same com- munity and relatively few edges joining vertices of different communities. Detecting communities in networks has received a large amount of attention and has found numerous applications in social and biological sciences, etc (see, e.g., the exposition Fortunato(2010) and the references therein).
    [Show full text]
  • Spectral Algorithms (Draft)
    Spectral Algorithms (draft) Ravindran Kannan and Santosh Vempala March 3, 2013 ii Summary. Spectral methods refer to the use of eigenvalues, eigenvectors, sin- gular values and singular vectors. They are widely used in Engineering, Ap- plied Mathematics and Statistics. More recently, spectral methods have found numerous applications in Computer Science to \discrete" as well \continuous" problems. This book describes modern applications of spectral methods, and novel algorithms for estimating spectral parameters. In the first part of the book, we present applications of spectral methods to problems from a variety of topics including combinatorial optimization, learning and clustering. The second part of the book is motivated by efficiency considerations. A fea- ture of many modern applications is the massive amount of input data. While sophisticated algorithms for matrix computations have been developed over a century, a more recent development is algorithms based on \sampling on the fly” from massive matrices. Good estimates of singular values and low rank ap- proximations of the whole matrix can be provably derived from a sample. Our main emphasis in the second part of the book is to present these sampling meth- ods with rigorous error bounds. We also present recent extensions of spectral methods from matrices to tensors and their applications to some combinatorial optimization problems. Contents I Applications 1 1 The Best-Fit Subspace 3 1.1 Singular Value Decomposition . .3 1.2 Algorithms for computing the SVD . .7 1.3 The k-means clustering problem . .8 1.4 Discussion . 11 2 Clustering Discrete Random Models 13 2.1 Planted cliques in random graphs .
    [Show full text]
  • Chicago Journal of Theoretical Computer Science the MIT Press
    Chicago Journal of Theoretical Computer Science The MIT Press Volume 1997, Article 1 12 March 1997 ISSN 1073–0486. MIT Press Journals, 55 Hayward St., Cambridge, MA 02142 USA; (617)253-2889; [email protected], [email protected]. Published one article at a time in LATEX source form on the Internet. Pag- ination varies from copy to copy. For more information and other articles see: http://www-mitpress.mit.edu/jrnls-catalog/chicago.html • http://www.cs.uchicago.edu/publications/cjtcs/ • ftp://mitpress.mit.edu/pub/CJTCS • ftp://cs.uchicago.edu/pub/publications/cjtcs • Feige and Kilian Limited vs. Polynomial Nondeterminism (Info) The Chicago Journal of Theoretical Computer Science is abstracted or in- R R R dexed in Research Alert, SciSearch, Current Contents /Engineering Com- R puting & Technology, and CompuMath Citation Index. c 1997 The Massachusetts Institute of Technology. Subscribers are licensed to use journal articles in a variety of ways, limited only as required to insure fair attribution to authors and the journal, and to prohibit use in a competing commercial product. See the journal’s World Wide Web site for further details. Address inquiries to the Subsidiary Rights Manager, MIT Press Journals; (617)253-2864; [email protected]. The Chicago Journal of Theoretical Computer Science is a peer-reviewed scholarly journal in theoretical computer science. The journal is committed to providing a forum for significant results on theoretical aspects of all topics in computer science. Editor in chief: Janos Simon Consulting
    [Show full text]
  • (L ,J SEP 3 0 2009 LIBRARIES
    Nearest Neighbor Search: the Old, the New, and the Impossible by Alexandr Andoni Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree of Doctor of Philosophy at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY September 2009 © Massachusetts Institute of Technology 2009. All rights reserved. Author .............. .. .. ......... .... ..... ... ......... ....... Department of Electrical Engineering and Computer Science September 4, 2009 (l ,J Certified by................ Piotr I/ yk Associate Professor Thesis Supervisor Accepted by ................................ /''~~ Terry P. Orlando Chairman, Department Committee on Graduate Students MASSACHUSETTS PaY OF TECHNOLOGY SEP 3 0 2009 ARCHIVES LIBRARIES Nearest Neighbor Search: the Old, the New, and the Impossible by Alexandr Andoni Submitted to the Department of Electrical Engineering and Computer Science on September 4, 2009, in partial fulfillment of the requirements for the degree of Doctor of Philosophy Abstract Over the last decade, an immense amount of data has become available. From collections of photos, to genetic data, and to network traffic statistics, modern technologies and cheap storage have made it possible to accumulate huge datasets. But how can we effectively use all this data? The ever growing sizes of the datasets make it imperative to design new algorithms capable of sifting through this data with extreme efficiency. A fundamental computational primitive for dealing with massive dataset is the Nearest Neighbor (NN) problem. In the NN problem, the goal is to preprocess a set of objects, so that later, given a query object, one can find efficiently the data object most similar to the query. This problem has a broad set of applications in data processing and analysis.
    [Show full text]
  • Approximation, Randomization, and Combinatorial Optimization
    Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques 17th International Workshop, APPROX 2014, and 18th International Workshop, RANDOM 2014 September 4–6, 2014, Barcelona, Spain Edited by Klaus Jansen José D. P. Rolim Nikhil R. Devanur Cristopher Moore LIPIcs – Vol. 28 – APPROX/RANDOM’14 www.dagstuhl.de/lipics Editors Klaus Jansen José D. P. Rolim University of Kiel University of Geneva Kiel Geneva [email protected] [email protected] Nikhil R. Devanur Cristopher Moore Microsoft Research Santa Fe Institute Redmond New Mexico [email protected] [email protected] ACM Classification 1998 C.2.1 Network Architecture and Design, C.2.2 Computer-communication, E.4 Coding and Information Theory, F. Theory of Computation, F.1.0 Computation by Abstract Devices, F.1.1 Models of Computation – relations between models, F.1.2 Modes of Computation, F.1.3 Complexity Measures and Classes, F.2.0 Analysis of Algorithms and Problem Complexity, F.2.1 Numerical Algorithms and Problems, F.2.2 Nonnumerical Algorithms and Problems G.1.2 Approximation, G.1.6 Optimization, G.2 Discrete Mathematics, G.2.1 Combinatorics, G.2.2 Graph Theory, G.3 Probability and Statistics, I.1.2 Algorithms, J.4 Computer Applications – Social and Behavioral Sciences ISBN 978-3-939897-74-3 Published online and open access by Schloss Dagstuhl – Leibniz-Zentrum für Informatik GmbH, Dagstuhl Publishing, Saarbrücken/Wadern, Germany. Online available at http://www.dagstuhl.de/dagpub/978-3-939897-74-3. Publication date September, 2014 Bibliographic information published by the Deutsche Nationalbibliothek The Deutsche Nationalbibliothek lists this publication in the Deutsche Nationalbibliografie; detailed bibliographic data are available in the Internet at http://dnb.d-nb.de.
    [Show full text]
  • Public-Key Cryptography in the Fine-Grained Setting
    Public-Key Cryptography in the Fine-Grained Setting B B Rio LaVigne( ), Andrea Lincoln( ), and Virginia Vassilevska Williams MIT CSAIL and EECS, Cambridge, USA {rio,andreali,virgi}@mit.edu Abstract. Cryptography is largely based on unproven assumptions, which, while believable, might fail. Notably if P = NP, or if we live in Pessiland, then all current cryptographic assumptions will be broken. A compelling question is if any interesting cryptography might exist in Pessiland. A natural approach to tackle this question is to base cryptography on an assumption from fine-grained complexity. Ball, Rosen, Sabin, and Vasudevan [BRSV’17] attempted this, starting from popular hardness assumptions, such as the Orthogonal Vectors (OV) Conjecture. They obtained problems that are hard on average, assuming that OV and other problems are hard in the worst case. They obtained proofs of work, and hoped to use their average-case hard problems to build a fine-grained one-way function. Unfortunately, they proved that constructing one using their approach would violate a popular hardness hypothesis. This moti- vates the search for other fine-grained average-case hard problems. The main goal of this paper is to identify sufficient properties for a fine-grained average-case assumption that imply cryptographic prim- itives such as fine-grained public key cryptography (PKC). Our main contribution is a novel construction of a cryptographic key exchange, together with the definition of a small number of relatively weak struc- tural properties, such that if a computational problem satisfies them, our key exchange has provable fine-grained security guarantees, based on the hardness of this problem.
    [Show full text]
  • A New Approach to the Planted Clique Problem
    A new approach to the planted clique problem Alan Frieze∗ Ravi Kannan† Department of Mathematical Sciences, Department of Computer Science, Carnegie-Mellon University. Yale University. [email protected]. [email protected]. 20, October, 2003 1 Introduction It is well known that finding the largest clique in a graph is NP-hard, [11]. Indeed, Hastad [8] has shown that it is NP-hard to approximate the size of the largest clique in an n vertex graph to within 1 ǫ a factor n − for any ǫ > 0. Not surprisingly, this has directed some researchers attention to finding the largest clique in a random graph. Let Gn,1/2 be the random graph with vertex set [n] in which each possible edge is included/excluded independently with probability 1/2. It is known that whp the size of the largest clique is (2+ o(1)) log2 n, but no known polymomial time algorithm has been proven to find a clique of size more than (1+ o(1)) log2 n. Karp [12] has even suggested that finding a clique of size (1+ ǫ)log2 n is computationally difficult for any constant ǫ > 0. Significant attention has also been directed to the problem of finding a hidden clique, but with only limited success. Thus let G be the union of Gn,1/2 and an unknown clique on vertex set P , where p = P is given. The problem is to recover P . If p c(n log n)1/2 then, as observed by Kucera [13], | | ≥ with high probability, it is easy to recover P as the p vertices of largest degree.
    [Show full text]
  • Uriel Feige, Publications, July 2017. Papers Are Sorted by Categories. for Papers That Have More Than One Version (Typically, Jo
    Uriel Feige, Publications, July 2017. Papers are sorted by categories. For papers that have more than one version (typically, journal version and conference proceedings), the different versions are combined into one entry in the list. STOC is shorthand for \Annual ACM Symposium on the Theory of Computing". FOCS is shorthand for \Symposium on Foundations of Computer Science". Journal publications 1. Uriel Feige, Amos Fiat, and Adi Shamir. \Zero Knowledge Proofs of Identity". Jour- nal of Cryptology, 1988, Vol. 1, pp. 77-94. Preliminary version appeared in Proc. of the 19th STOC, 1987, pp. 210-217. 2. Uriel Feige, David Peleg, Prabhakar Raghavan and Eli Upfal. \Randomized Broadcast in Networks". Random Structures and algorithms, 1(4), 1990, pp. 447-460. Preliminary version appeared in proceedings of SIGAL International Symposium on Algorithms, Tokyo, Japan, August 1990. 3. Uriel Feige and Adi Shamir. \Multi-Oracle Interactive Protocols with Constant Space Verifiers”. Journal of Computer and System Sciences, Vol. 44, pp. 259-271, April 1992. Preliminary version appeared in Proceedings of Fourth Annual Conference on Struc- ture in Complexity Theory, June 1989. 4. Uriel Feige. "On the Complexity of Finite Random Functions". Information Process- ing Letters 44 (1992) 295-296. 5. Uriel Feige, David Peleg, Prabhakar Raghavan and Eli Upfal. \Computing With Noisy Information". SIAM Journal on Computing, 23(5), 1001{1018, 1994. Preliminary version appeared in Proceedings of 22nd STOC, 1990, pp. 128-137. 6. Noga Alon, Uriel Feige, Avi Wigderson, and David Zuckerman. "Derandomized Graph Products". Computational Complexity 5 (1995) 60{75. 7. Uriel Feige. \A Tight Upper Bound on the Cover Time for Random Walks on Graphs".
    [Show full text]
  • Lipics-CCC-2021-35.Pdf (1
    Hardness of KT Characterizes Parallel Cryptography Hanlin Ren # Ñ Institute for Interdisciplinary Information Sciences, Tsinghua University, Beijing, China Rahul Santhanam # University of Oxford, UK Abstract A recent breakthrough of Liu and Pass (FOCS’20) shows that one-way functions exist if and only if the (polynomial-)time-bounded Kolmogorov complexity, Kt, is bounded-error hard on average to compute. In this paper, we strengthen this result and extend it to other complexity measures: We show, perhaps surprisingly, that the KT complexity is bounded-error average-case hard if and only if there exist one-way functions in constant parallel time (i.e. NC0). This result crucially relies on the idea of randomized encodings. Previously, a seminal work of Applebaum, Ishai, and Kushilevitz (FOCS’04; SICOMP’06) used the same idea to show that NC0-computable one-way functions exist if and only if logspace-computable one-way functions exist. Inspired by the above result, we present randomized average-case reductions among the NC1- versions and logspace-versions of Kt complexity, and the KT complexity. Our reductions preserve both bounded-error average-case hardness and zero-error average-case hardness. To the best of our knowledge, this is the first reduction between the KT complexity and a variant of Kt complexity. We prove tight connections between the hardness of Kt complexity and the hardness of (the hardest) one-way functions. In analogy with the Exponential-Time Hypothesis and its variants, we define and motivate the Perebor Hypotheses for complexity measures such as Kt and KT. We show that a Strong Perebor Hypothesis for Kt implies the existence of (weak) one-way functions of near-optimal hardness 2n−o(n).
    [Show full text]
  • Spectral Barriers in Certification Problems
    Spectral Barriers in Certification Problems by Dmitriy Kunisky A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy Department of Mathematics New York University May, 2021 Professor Afonso S. Bandeira Professor Gérard Ben Arous © Dmitriy Kunisky all rights reserved, 2021 Dedication To my grandparents. iii Acknowledgements First and foremost, I am immensely grateful to Afonso Bandeira for his generosity with his time, his broad mathematical insight, his resourceful creativity, and of course his famous reservoir of open problems. Afonso’s wonderful knack for keeping up the momentum— for always finding some new angle or somebody new to talk to when we were stuck, for mentioning “you know, just yesterday I heard a very nice problem...” right when I could use something else to work on—made five years fly by. I have Afonso to thank for my sense of taste in research, for learning to collaborate, for remembering to enjoy myself, and above all for coming to be ever on the lookout for something new to think about. I am also indebted to Gérard Ben Arous, who, though I wound up working on topics far from his main interests, was always willing to hear out what I’d been doing, to encourage and give suggestions, and to share his truly encyclopedic knowledge of mathematics and its culture and history. On many occasions I’ve learned more tracking down what Gérard meant with the smallest aside in the classroom or in our meetings than I could manage to get out of a week on my own in the library.
    [Show full text]
  • Parameterized AC0 – Some Upper and Lower Bounds
    Parameterized AC0 { Some upper and lower bounds Yijia Chen Fudan University September 19th, 2017 @ Shonan AC0 0 A family of Boolean circuits Cn are AC -circuits if for every n 2 n2N N n (i)C n computes a Boolean function from f0; 1g to f0; 1g; (ii) the depth of Cn is bounded by a fixed constant; (iii) the size of Cn is polynomially bounded in n. Remark 1. Without (ii), we get a family of polynomial-size circuits Cn , which n2N decides a language in P/ poly. 2. If Cn is computable by a TM in time O(log n), then Cn is n2N dlogtime-uniform, which corresponds to FO(<; +; ×) [Barrington, Immerman, and Straubing, 1990]. The k-clique problem Definition Let G be a graph and k 2 N. Then a subset C ⊆ V (G) is a k-clique if (i) for every two vertices u; v 2 V (G) either u = v or fu; vg 2 E(G), (ii) and jCj = k. 296 CHAPTER 7 / TIME COMPLEXITY FIGURE 7.23 A graph with a 5-cliqueA graph with a 5-clique. The clique problem is to determine whether a graph contains a clique of a specified size. Let CLIQUE = G, k G is an undirected graph with a k-clique . {h i| } THEOREM 7.24 CLIQUE is in NP. PROOF IDEA The clique is the certificate. PROOF The following is a verifier V for CLIQUE. V = “On input G, k , c : hh i i 1. Test whether c is a subgraph with k nodes in G. 2.
    [Show full text]