View This Volume's Front and Back Matter

Total Page:16

File Type:pdf, Size:1020Kb

View This Volume's Front and Back Matter Computational Complexity Theory This page intentionally left blank https://doi.org/10.1090//pcms/010 IAS/PARK CIT Y MATHEMATICS SERIES Volume 1 0 Computational Complexity Theory Steven Rudic h Avi Wigderson Editors American Mathematical Societ y Institute for Advanced Stud y IAS/Park Cit y Mathematics Institute runs mathematics educatio n programs that brin g together hig h schoo l mathematic s teachers , researcher s i n mathematic s an d mathematic s education, undergraduat e mathematic s faculty , graduat e students , an d undergraduate s t o participate i n distinc t bu t overlappin g program s o f researc h an d education . Thi s volum e contains th e lectur e note s fro m th e Graduat e Summe r Schoo l progra m o n Computationa l Complexity Theor y hel d i n Princeto n i n the summe r o f 2000 . 2000 Mathematics Subject Classification. Primar y 68Qxx ; Secondar y 03D15 . Library o f Congress Cataloging-in-Publicatio n Dat a Computational complexit y theor y / Steve n Rudich , Av i Wigderson, editors , p. cm . — (IAS/Park Cit y mathematic s series , ISS N 1079-563 4 ; v. 10) "Volume contain s the lecture note s fro m th e Graduate Summe r Schoo l progra m o n Computa - tional Complexit y Theor y hel d i n Princeton i n the summer o f 2000"—T.p. verso . Includes bibliographica l references . ISBN 0-8218-2872- X (hardcove r : acid-fre e paper ) 1. Computational complexity . I . Rudich, Steven . II . Wigderson, Avi . III . Series. QA267.7.C685 200 4 511.3'52—dc22 2004049026 Copying an d reprinting. Materia l i n this boo k ma y be reproduced b y any means fo r edu - cational an d scientific purpose s withou t fe e or permission wit h th e exception o f reproduction b y services that collec t fee s fo r delivery o f documents an d provided tha t th e customary acknowledg - ment o f the source i s given. Thi s consen t doe s no t extend t o other kind s o f copying fo r genera l distribution, fo r advertising o r promotional purposes , o r fo r resale. Request s fo r permission fo r commercial us e of material shoul d b e addressed to the Acquisitions Department, America n Math - ematical Society , 20 1 Charles Street , Providence , Rhod e Islan d 02904-2294 , USA . Requests can also be made b y e-mail to [email protected] . Excluded fro m thes e provision s i s material i n articles fo r which the author hold s copyright. I n such cases , requests fo r permission to use or reprint shoul d b e addressed directl y to the author(s). (Copyright ownershi p i s indicated i n the notice i n the lower right-han d corne r o f the first pag e of each article. ) © 200 4 by the American Mathematica l Society . Al l rights reserved . The America n Mathematica l Societ y retain s al l rights except thos e grante d t o the United State s Government . Printed i n the United State s o f America. @ Th e paper use d i n this boo k i s acid-free an d falls withi n th e guidelines established t o ensure permanenc e an d durability. Visit th e AMS home pag e at http://www.ams.org / 10 9 8 7 6 5 4 3 2 1 0 9 08 07 06 05 0 4 Contents Preface xii i Introduction 1 Week One : COMPLEXITY THEORY : FRO M GODE L T O FEYNMA N 3 Steven Rudich , Complexit y Theory : Fro m Gode l t o Feynma n 5 Lecture 1 . History an d Basi c Concept s 7 1.1. Histor y 7 1.2. Th e Turin g Machin e 8 1.3. Som e Basic Definition s 11 1.4. Th e Church-Turin g Thesi s 12 1.5. Computationa l Resource s 12 1.6. Godel' s Lette r 13 1.7. Th e Moder n Da y Versio n o f P = N P 13 1.8. Appendi x 17 Lecture 2 . Resources, Reduction s an d P vs . N P 19 2.1. Tim e an d Spac e 19 2.2. Polynomia l Tim e 19 2.3. Non-Deterministi c Turin g Machine s 20 2.4. Consequence s o f P = N P 22 2.5. Reducibilit y 23 2.6. Completenes s 24 2.7. Cook-Levi n Theore m 25 2.8. Othe r NP-complet e Problem s 27 2.9. Wha t Gode l Misse d 27 Lecture 3 . Probabilistic an d Quantu m Computatio n 29 3.1. Schwartz-Zippe l Theore m 29 3.2. Verifyin g Arithmeti c 30 3.3. Probabilisti c Complexit y Classe s 30 3.4. Quantu m Computatio n 32 3.5. Conclusio n 33 V vi CONTENT S Lecture 4 . Complexity Classe s 3 5 4.1. Simulatio n 3 5 4.2. Hierarch y Theorem s 3 7 4.3. Ladner' s Theore m 3 8 4.4. Relativizatio n 3 9 4.5. Relation s Betwee n Som e Complexit y Classe s 4 0 4.6. Co-classe s 4 1 Lecture 5 . Space Complexit y an d Circui t Complexit y 4 5 5.1. Savitch' s Theore m 4 5 5.2. Th e Immerman-Szelepcseny i Theore m 4 6 5.3. PSPACE-Completenes s 4 8 5.4. Boolea n Circuit s 4 9 5.5. Circui t Complexit y Classe s 5 1 5.6. Non-Unifor m Circuit s an d Advic e Turing Machine s 5 2 Lecture 6 . Oracle s an d the Polynomia l Tim e Hierarch y 5 5 6.1. Complexit y Classe s Relativ e to a n Oracl e 5 5 6.2. Polynomia l Hierarch y 5 6 6.3. Placin g BPP i n the Worl d Pictur e 6 0 6.4. Karp-Lipto n Theore m 6 2 Lecture 7 . Circuit Lowe r Bound s 6 5 7.1. Circui t Complexit y an d Lo w Degree Polynomials 6 5 7.2. Approximatio n Metho d 6 6 Lecture 8 . "Natural " Proof s o f Lowe r Bound s 7 5 8.1. Ho w to Reaso n Tha t a Problem i s Hard 7 5 8.2. A n Ol d "Stumblin g Block" : Relativizatio n 7 5 8.3. A New Direction: Non-Unifor m Lowe r Bound s 7 6 8.4. A New "Stumblin g Block" : Natura l Proof s 7 6 8.5. Natura l Proof s o f Lowe r Bound s fo r AC o 7 7 8.6. Generalizin g Ou r Definition s 7 9 8.7. "Naturalizing " Smolensky' s Proo f 7 9 8.8. What' s "Bad " Abou t a Natural Proof ? 8 1 8.9. Wh y D o Natural Proof s Arise ? 8 3 8.10. Unnatura l Circui t Lowe r Bound s 8 3 8.11. Th e Bi g Picture 8 3 Bibliography 8 5 Avi Wigderson , Averag e Cas e Complexit y 8 9 Lecture 1 . Average Cas e Complexit y 9 1 1.1. Introductio n 9 1 1.2. Levin' s Theory o f Average-Case Complexit y 9 1 1.3. A "Generic " Dist-NP Complet e Problem 9 4 1.4. Convertin g Worst-Cas e Hardnes s int o Average-Cas e Hardnes s 9 5 1.5. Fiv e Possible World s 9 6 Bibliography 99 CONTENTS vi i Sanjeev Arora , Explorin g Complexit y throug h Reduction s 10 1 Introduction 10 3 Lecture 1 . PCP Theore m an d Hardnes s o f Computing Approximat e Solution s 10 5 1. Approximatio n Algorithm s 10 5 2. Probabilisticall y Checkabl e Proof s 10 6 3. Hastad' s PC P an d Inapproximabilit y o f MAX-3SAT 10 8 4. Inapproximabilit y o f MAX-3SAT(13) 10 8 5. Inapproximabilit y o f MAX-INDEP-SET 10 9 6. Inapproximabilit y o f Other Problem s 11 0 7. Histor y 11 1 Lecture 2 . Which Problem s Hav e Strongly Exponentia l Complexity ? 11 3 1. SERF-Reduction s 11 3 2. Th e Mai n Theore m 11 4 Lecture 3 . Toda's Theorem : PH C P* p 11 9 1. Classe s #P an d 0P 11 9 2. Th e Mai n Lemm a 12 1 3. Proo f o f Theorem 2 1 12 2 4. Ope n Problem s 12 3 Bibliography 12 5 Ran Raz , Quantu m Computatio n 12 7 Lecture 1 . Introduction 12 9 1.1. Classica l Deterministi c Machine s 13 0 1.2. Classica l Probabilisti c Machine s 13 1 1.3. Quantu m System s 13 2 1.4. Dirac' s Ke t Notatio n 13 3 1.5. Quantu m Measuremen t 13 4 1.6. Transitio n Matri x an d Interferenc e 13 4 1.7. Measuremen t Accordin g to a Differen t Bas e 13 5 1.8. Th e Polarizer s Experimen t 13 6 1.9. Historica l Backgroun d 13 7 Lecture 2 . Bipartite Quantu m System s 13 9 2.1.
Recommended publications
  • Adaptive Garbled RAM from Laconic Oblivious Transfer
    Adaptive Garbled RAM from Laconic Oblivious Transfer Sanjam Garg?1, Rafail Ostrovsky??2, and Akshayaram Srinivasan1 1 University of California, Berkeley fsanjamg,[email protected] 2 UCLA [email protected] Abstract. We give a construction of an adaptive garbled RAM scheme. In the adaptive setting, a client first garbles a \large" persistent database which is stored on a server. Next, the client can provide garbling of mul- tiple adaptively and adversarially chosen RAM programs that execute and modify the stored database arbitrarily. The garbled database and the garbled program should reveal nothing more than the running time and the output of the computation. Furthermore, the sizes of the garbled database and the garbled program grow only linearly in the size of the database and the running time of the executed program respectively (up to poly logarithmic factors). The security of our construction is based on the assumption that laconic oblivious transfer (Cho et al., CRYPTO 2017) exists. Previously, such adaptive garbled RAM constructions were only known using indistinguishability obfuscation or in random oracle model. As an additional application, we note that this work yields the first constant round secure computation protocol for persistent RAM pro- grams in the malicious setting from standard assumptions. Prior works did not support persistence in the malicious setting. 1 Introduction Over the years, garbling methods [Yao86,LP09,AIK04,BHR12b,App17] have been extremely influential and have engendered an enormous number of applications ? Research supported in part from DARPA/ARL SAFEWARE Award W911NF15C0210, AFOSR Award FA9550-15-1-0274, AFOSR YIP Award, DARPA and SPAWAR under contract N66001-15-C-4065, a Hellman Award and research grants by the Okawa Foundation, Visa Inc., and Center for Long-Term Cybersecurity (CLTC, UC Berkeley).
    [Show full text]
  • Securely Obfuscating Re-Encryption
    Securely Obfuscating Re-Encryption Susan Hohenberger¤ Guy N. Rothblumy abhi shelatz Vinod Vaikuntanathanx December 1, 2008 Abstract We present a positive obfuscation result for a traditional cryptographic functionality. This posi- tive result stands in contrast to well-known impossibility results [3] for general obfuscation and recent impossibility and improbability [13] results for obfuscation of many cryptographic functionalities. Whereas other positive obfuscation results in the standard model apply to very simple point func- tions, our obfuscation result applies to the signi¯cantly more complex and widely-used re-encryption functionality. This functionality takes a ciphertext for message m encrypted under Alice's public key and transforms it into a ciphertext for the same message m under Bob's public key. To overcome impossibility results and to make our results meaningful for cryptographic functionalities, our scheme satis¯es a de¯nition of obfuscation which incorporates more security-aware provisions. ¤Johns Hopkins University, [email protected]. Research partially performed at IBM Zurich Research Laboratory, Switzer- land. yMIT CSAIL, [email protected]. Research supported by NSF grant CNS-0430450 and NSF grant CFF-0635297. zUniversity of Virginia, [email protected]. Research performed at IBM Zurich Research Laboratory, Switzerland. xMIT CSAIL, [email protected] 1 1 Introduction A recent line of research in theoretical cryptography aims to understand whether it is possible to obfuscate programs so that a program's code becomes unintelligible while its functionality remains unchanged. A general method for obfuscating programs would lead to the solution of many open problems in cryptography. Unfortunately, Barak, Goldreich, Impagliazzo, Rudich, Sahai, Vadhan and Yang [3] show that for many notions of obfuscation, a general program obfuscator does not exist|i.e., they exhibit a class of circuits which cannot be obfuscated.
    [Show full text]
  • Prediction from Partial Information and Hindsight, with Application to Circuit Lower Bounds
    comput. complex. c Springer Nature Switzerland AG 2019 DOI 10.1007/s00037-019-00177-4 computational complexity PREDICTION FROM PARTIAL INFORMATION AND HINDSIGHT, WITH APPLICATION TO CIRCUIT LOWER BOUNDS Or Meir and Avi Wigderson Abstract. Consider a random sequence of n bits that has entropy at least n − k, where k n. A commonly used observation is that an average coordinate of this random sequence is close to being uniformly distributed, that is, the coordinate “looks random.” In this work, we prove a stronger result that says, roughly, that the average coordinate n looks random to an adversary that is allowed to query ≈ k other co- ordinates of the sequence, even if the adversary is non-deterministic. This implies corresponding results for decision trees and certificates for Boolean functions. As an application of this result, we prove a new result on depth-3 cir- cuits, which recovers as a direct corollary the known lower bounds for the parity and majority functions, as well as a lower bound on sensi- tive functions due to Boppana (Circuits Inf Process Lett 63(5):257–261, 1997). An interesting feature of this proof is that it works in the frame- work of Karchmer and Wigderson (SIAM J Discrete Math 3(2):255–265, 1990), and, in particular, it is a “top-down” proof (H˚astad et al. in Computat Complex 5(2):99–112, 1995). Finally, it yields a new kind of a random restriction lemma for non-product distributions, which may be of independent interest. Keywords. Certificate complexity, Circuit complexity, Circuit com- plexity lower bounds, Decision tree complexity, Information theoretic, Query complexity, Sensitivity Subject classification.
    [Show full text]
  • Statistical Queries and Statistical Algorithms: Foundations and Applications∗
    Statistical Queries and Statistical Algorithms: Foundations and Applications∗ Lev Reyzin Department of Mathematics, Statistics, and Computer Science University of Illinois at Chicago [email protected] Abstract We give a survey of the foundations of statistical queries and their many applications to other areas. We introduce the model, give the main definitions, and we explore the fundamental theory statistical queries and how how it connects to various notions of learnability. We also give a detailed summary of some of the applications of statistical queries to other areas, including to optimization, to evolvability, and to differential privacy. 1 Introduction Over 20 years ago, Kearns [1998] introduced statistical queries as a framework for designing machine learning algorithms that are tolerant to noise. The statistical query model restricts a learning algorithm to ask certain types of queries to an oracle that responds with approximately correct answers. This framework has has proven useful, not only for designing noise-tolerant algorithms, but also for its connections to other noise models, for its ability to capture many of our current techniques, and for its explanatory power about the hardness of many important problems. Researchers have also found many connections between statistical queries and a variety of modern topics, including to evolvability, differential privacy, and adaptive data analysis. Statistical queries are now both an important tool and remain a foundational topic with many important questions. The aim of this survey is to illustrate these connections and bring researchers to the forefront of our understanding of this important area. We begin by formally introducing the model and giving the main definitions (Section 2), we then move to exploring the fundamental theory of learning statistical queries and how how it connects to other notions of arXiv:2004.00557v2 [cs.LG] 14 May 2020 learnability (Section 3).
    [Show full text]
  • Download This PDF File
    T G¨ P 2012 C N Deadline: December 31, 2011 The Gödel Prize for outstanding papers in the area of theoretical computer sci- ence is sponsored jointly by the European Association for Theoretical Computer Science (EATCS) and the Association for Computing Machinery, Special Inter- est Group on Algorithms and Computation Theory (ACM-SIGACT). The award is presented annually, with the presentation taking place alternately at the Inter- national Colloquium on Automata, Languages, and Programming (ICALP) and the ACM Symposium on Theory of Computing (STOC). The 20th prize will be awarded at the 39th International Colloquium on Automata, Languages, and Pro- gramming to be held at the University of Warwick, UK, in July 2012. The Prize is named in honor of Kurt Gödel in recognition of his major contribu- tions to mathematical logic and of his interest, discovered in a letter he wrote to John von Neumann shortly before von Neumann’s death, in what has become the famous P versus NP question. The Prize includes an award of USD 5000. AWARD COMMITTEE: The winner of the Prize is selected by a committee of six members. The EATCS President and the SIGACT Chair each appoint three members to the committee, to serve staggered three-year terms. The committee is chaired alternately by representatives of EATCS and SIGACT. The 2012 Award Committee consists of Sanjeev Arora (Princeton University), Josep Díaz (Uni- versitat Politècnica de Catalunya), Giuseppe Italiano (Università a˘ di Roma Tor Vergata), Mogens Nielsen (University of Aarhus), Daniel Spielman (Yale Univer- sity), and Eli Upfal (Brown University). ELIGIBILITY: The rule for the 2011 Prize is given below and supersedes any di fferent interpretation of the parametric rule to be found on websites on both SIGACT and EATCS.
    [Show full text]
  • ERIC W. ALLENDER Department of Computer Science
    ERIC W. ALLENDER Department of Computer Science, Rutgers University 110 Frelinghuysen Road Piscataway, New Jersey 08854-8019 (848) 445-7296 (office) [email protected] http://www.cs.rutgers.edu/ ˜ allender CURRENT POSITION: 2008 to present Distinguished Professor, Department of Computer Science, Rutgers University, New Brunswick, New Jersey. Member of the Graduate Faculty, Member of the DIMACS Center for Discrete Mathematics and Theoretical Computer Science (since 1989), Member of the Graduate Faculty of the Mathematics Department (since 1993). 1997 to 2008 Professor, Department of Computer Science, Rutgers University, New Brunswick, New Jersey. 1991 to 1997 Associate Professor, Department of Computer Science, Rutgers Uni- versity, New Brunswick, New Jersey. 1985 to 1991 Assistant Professor, Department of Computer Science, Rutgers Univer- sity, New Brunswick, New Jersey. VISITING POSITIONS: Aug.–Dec. 2018 Long-Term Visitor, Simons Institute for the Theory of Computing, Uni- versity of California, Berkeley. Jan.–Mar. 2015 Visiting Scholar, University of California, San Diego. Sep.–Oct. 2011 Visiting Scholar, Institute for Theoretical Computer Science, Tsinghua University, Beijing, China. Jan.–Apr. 2010 Visiting Scholar, Department of Decision Sciences, University of South Africa, Pretoria. Oct.–Dec. 2009 Visiting Scholar, Department of Mathematics, University of Cape Town, South Africa. Mar.–June 1997 Gastprofessor, Wilhelm-Schickard-Institut f¨ur Informatik, Universit¨at T¨ubingen, Germany. Dec. 96–Feb. 97 Visiting Scholar, Department of Theoretical Computer Science, Insti- tute of Mathematical Sciences, Chennai (Madras), India. 1992–1993 Visiting Research Scientist, Department of Computer Science, Prince- ton University. May – July 1989 Gastdozent, Institut f¨ur Informatik, Universit¨at W¨urzburg, West Ger- many. 1 RESEARCH INTERESTS: My research interests lie in the area of computational complexity, with particular emphasis on parallel computation, circuit complexity, Kol- mogorov complexity, and the structure of complexity classes.
    [Show full text]
  • Manuel Blum's CV
    Manuel Blum [email protected] MANUEL BLUM Bruce Nelson Professor of Computer Science Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213 Telephone: Office: (412) 268-3742, Fax: (412) 268-5576 Home: (412) 687-8730, Mobile: (412) 596-4063 Email: [email protected] Personal Born: 26 April1938 in Caracas, Venezuela. Citizenship: Venezuela and USA. Naturalized Citizen of USA, January 2000. Wife: Lenore Blum, Distinguished Career Professor of Computer Science, CMU Son: Avrim Blum, Professor of Computer Science, CMU. Interests: Computational Complexity; Automata Theory; Algorithms; Inductive Inference: Cryptography; Program Result-Checking; Human Interactive Proofs. Employment History Research Assistant and Research Associate for Dr. Warren S. McCulloch, Research Laboratory of Electronics, MIT, 1960-1965. Assistant Professor, Department of Mathematics, MIT, 1966-68. Visiting Assistant Professor, Associate Professor, Professor, Department of Electrical Engineering and Computer Sciences, University of California, Berkeley, 1968-2001. Associate Chair for Computer Science, U.C. Berkeley, 1977-1980. Arthur J. Chick Professor of Computer Science, U.C. Berkeley, 1995-2001. Group in Logic and Methodology of Science, U.C. Berkeley, 1974-present. Visiting Professor of Computer Science. City University of Hong Kong, 1997-1999. Bruce Nelson Professor of Computer Science, Carnegie Mellon University, 2001-present. Education B.S., Electrical Engineering, MIT, 1959; M.S., Electrical Engineering, MIT. 1961. Ph.D., Mathematics, MIT, 1964, Professor Marvin Minsky, supervisor. Manuel Blum [email protected] Honors MIT Class VIB (Honor Sequence in EE), 1958-61 Sloan Foundation Fellowship, 1972-73. U.C. Berkeley Distinguished Teaching Award, 1977. Fellow of the IEEE "for fundamental contributions to the abstract theory of computational complexity,” 1982.
    [Show full text]
  • P Versus NP Problem 1 P Versus NP Problem
    P versus NP problem 1 P versus NP problem List of unsolved problems in computer science If the solution to a problem can be quickly verified by a computer, can the computer also solve that problem quickly? Millennium Prize Problems • P versus NP problem • Hodge conjecture • Poincaré conjecture (solved) • Riemann hypothesis • Yang–Mills existence and mass gap • Navier–Stokes existence and smoothness • Birch and Swinnerton-Dyer conjecture • v • t [1] • e The P versus NP problem is a major unsolved problem in computer science. Informally, it asks whether every problem whose solution can be quickly verified by a computer can also be quickly solved by a computer. It was introduced in 1971 by Stephen Cook in his seminal paper "The complexity of theorem proving procedures" and is considered by many to be the most important open problem in the field.[3] It is one of the seven Millennium Prize Problems selected by the Clay Mathematics Institute to carry a US$1,000,000 prize for the first correct solution. Diagram of complexity classes provided that P ≠ NP. The existence of problems within NP but outside both P and NP-complete, under [2] The informal term quickly used above means the that assumption, was established by Ladner's theorem. existence of an algorithm for the task that runs in polynomial time. The general class of questions for which some algorithm can provide an answer in polynomial time is called "class P" or just "P". For some questions, there is no known way to find an answer quickly, but if one is provided with information showing what the answer is, it may be possible to verify the answer quickly.
    [Show full text]
  • Towards an Algebraic Natural Proofs Barrier Via Polynomial Identity Testing
    Electronic Colloquium on Computational Complexity, Report No. 9 (2017) Towards an algebraic natural proofs barrier via polynomial identity testing Joshua A. Grochow,∗ Mrinal Kumar,y Michael Saks,z and Shubhangi Sarafx January 9, 2017 Abstract We observe that a certain kind of algebraic proof|which covers essentially all known algebraic circuit lower bounds to date|cannot be used to prove lower bounds against VP if and only if what we call succinct hitting sets exist for VP. This is analogous to the Razborov{Rudich natural proofs barrier in Boolean circuit complexity, in that we rule out a large class of lower bound techniques under a derandomization assumption. We also discuss connections between this algebraic natural proofs barrier, geometric complexity theory, and (algebraic) proof complexity. 1 Introduction The natural proofs barrier [51] showed that a large class of circuit-based proof techniques could not separate P from NP, assuming the existence of pseudo-random generators of a certain strength. In light of the recent advances in techniques for lower bounds on algebraic circuits [5{7, 11, 15, 20, 21, 23{42, 47, 52, 55], it is natural to wonder whether our current algebraic techniques could plausibly separate VP from VNP, or whether there is some barrier in this setting as well. People often hand-wave about an \algebraic natural proofs barrier," by analogy to Razborov{Rudich, but it has not been clear what this means precisely, and to date no such barrier is known in a purely algebraic setting (see below for a discussion of the related work by Aaronson and Drucker [2, 3] in a partially algebraic, partially Boolean setting).
    [Show full text]
  • Succinct Hitting Sets and Barriers to Proving Algebraic Circuits Lower
    Succinct Hitting Sets and Barriers to Proving Algebraic Circuits Lower Bounds Michael A. Forbes∗ Amir Shpilka† Ben Lee Volk† Abstract We formalize a framework of algebraically natural lower bounds for algebraic circuits. Just as with the natural proofs notion of Razborov and Rudich [RR97] for boolean circuit lower bounds, our notion of algebraically natural lower bounds captures nearly all lower bound techniques known. However, unlike the boolean setting, there has been no concrete evidence demonstrating that this is a barrier to obtaining super-polynomial lower bounds for general algebraic circuits, as there is little understanding whether algebraic circuits are expressive enough to support “cryptography” secure against algebraic circuits. Following a similar result of Williams [Wil16] in the boolean setting, we show that the existence of an algebraic natural proofs barrier is equivalent to the existence of succinct deran- domization of the polynomial identity testing problem. That is, whether the coefficient vec- tors of polylog(N)-degree polylog(N)-size circuits is a hitting set for the class of poly(N)-degree poly(N)-size circuits. Further, we give an explicit universal construction showing that if such a succinct hitting set exists, then our universal construction suffices. Further, we assess the existing literature constructing hitting sets for restricted classes of algebraic circuits and observe that none of them are succinct as given. Yet, we show how to modify some of these constructions to obtain succinct hitting sets. This constitutes the first evidence supporting the existence of an algebraic natural proofs barrier. Our framework is similar to the Geometric Complexity Theory (GCT) program of Mulmu- ley and Sohoni [MS01], except that here we emphasize constructiveness of the proofs while the GCT program emphasizes symmetry.
    [Show full text]
  • Program of the Thirty-Second Annual ACM Symposium on Theory of Computing
    Program of the Thirty-Second Annual ACM Symposium on Theory of Computing May 21-23, 2000, Portland, Oregon, USA Important Note There will be a workshop on “Challenges for Theoretical Computer Science” on Saturday, May 20, the day before the STOC conference starts. Details will be posted on the SIGACT web page as they become available. Sunday, May 21, 2000 Session 1A Chair: Frances Yao 8:30 am Extractors and pseudo-random generators with optimal seed length Russell Impagliazzo, Ronen Shaltiel, and Avi Wigderson 8:55 am Pseudo-random functions and factoring Moni Naor, Omer Reingold, and Alon Rosen 9:20 am Satisfiability of equations in free groups is in PSPACE Claudio Guti´errez 9:45 am Setting 2 variables at a time yields a new lower bound for random 3-SAT Dimitris Achlioptas Sessions 1B Chair: Ding-Zhu Du 8:30 am A new algorithmic approach to the general Lovasz Local Lemma with applications to scheduling and satisfiability problems Artur Czumaj and Christian Scheideler 8:55 am A deterministic polynomial-time algorithm for approximating mixed discriminant and mixed volume Leonid Gurvits and Alex Samorodnitsky 9:20 am Randomized metarounding Robert Carr and Santosh Vempala 9:45 am Isomorphism testing for embeddable graphs through definability Martin Grohe Coffee Break 10:10 am - 10:30 am Session 2A Chair: Frances Yao 10:30 am Circuit minimization problem Valentine Kabanets and Jin-Yi Cai 10:55 am On the efficiency of local decoding procedures for error-correcting codes Jonathan Katz and Luca Trevisan 11:20 am Statistical mechanics, three-dimensionality
    [Show full text]
  • Salil P. Vadhan
    Harvard University John A. Paulson School of Engineering and Applied Sciences Maxwell Dworkin 337 Salil Vadhan 33 Oxford Street Vicky Joseph Professor Cambridge, MA 02138 USA of Computer Science salil [email protected] & Applied Mathematics Salil P. Vadhan Curriculum Vitae February 2019 Contents Biographical . 2 Research Interests . 2 Current Positions . 2 Previous Positions . 2 Education . 3 Honors . 3 Professional Activities . 5 Doctoral Advisees . 7 Other Graduate Research Advising . 9 Undergraduate Research Advising . 10 Postdoctoral Fellows . 14 Visitors Hosted . 16 University and Departmental Service . 16 Teaching . 18 External Funding . 19 Chronological List of Research Papers . 21 Theses, Surveys, Books, and Policy Commentary . 31 Other Work from Research Group . 33 Invited Talks at Workshops and Conferences . 40 Departmental Seminars and Colloquia . 44 1 Biographical Maxwell Dworkin Laboratory Office: (617) 496-0439 Harvard University Fax: (617) 496-6404 33 Oxford Street, Room 337 Citizenship: United States Cambridge, MA 02138 Spouse: Jennifer Sun (married 7/99) [email protected] Children: Kaya Tsai-Feng Vadhan (5/03) http://www.seas.harvard.edu/~salil Amari Tsai-Ming Vadhan (6/05) Research Interests • Computational Complexity, Cryptography, Data Privacy, Randomness in Computation. Current Positions Harvard University Cambridge, MA • Area Chair for Computer Science, July 2017{present. • Vicky Joseph Professor of Computer Science and Applied Mathematics (with tenure), Harvard John A. Paulson School of Engineering and Applied Sciences, July 2009{present. • Harvard College Professor, 2016{2021 Previous Positions National Chiao-Tung University Hsinchu, Taiwan • Visiting Chair Professor, Department of Applied Mathematics and Shing-Tung Yau Center, August 2015{July 2016. Stanford University Stanford, CA • Visiting Scholar, August 2011{July 2012.
    [Show full text]