COMPLEXITY THEORY Review Lecture 12: Hierarchy Theorems

Total Page:16

File Type:pdf, Size:1020Kb

COMPLEXITY THEORY Review Lecture 12: Hierarchy Theorems COMPLEXITY THEORY Review Lecture 12: Hierarchy Theorems Markus Krotzsch¨ Knowledge-Based Systems TU Dresden, 29th Nov 2017 Markus Krötzsch, 29th Nov 2017 Complexity Theory slide 2 of 22 Relationships of Complexity Classes Relationships of Complexity Classes Relating different complexity classes is a central goal of complexity theory Complexity classes differ by: L NL P NP PSpace = NPSpace Exp Underlying machine model (e.g., DTM vs. NTM) ⊆ ⊆ ⊆ ⊆ ⊆ • = = = ? = = = Restricted resource (e.g., time or space) • coL coNL coP coNP coPSpace = coNPSpace coExp Resource bound (e.g., polynomial or exponential) ⊆ ⊆ ⊆ ⊆ ⊆ • Some intuitions: Nondeterminism seems to add some more power • Obvious question: Space seems to be more powerful than time • More resources seem to add more power • Are any of these strict (? ⊆ However: it is often difficult to confirm these intuitive ideas formally (and many of them remain unproven) Markus Krötzsch, 29th Nov 2017 Complexity Theory slide 3 of 22 Markus Krötzsch, 29th Nov 2017 Complexity Theory slide 4 of 22 Something we do know At least one thing is known to be (mostly) true: Intuition: If we allow a given Turing machine to use strictly more time or space, then it can really solve strictly more problems. Diagonalisation This is not always true, but it is true for “reasonable” ways of defining resource • bounds, such as polynomial or exponential We will formalise and prove it later today • The proof method we will use is called diagonalisation • Markus Krötzsch, 29th Nov 2017 Complexity Theory slide 5 of 22 Markus Krötzsch, 29th Nov 2017 Complexity Theory slide 6 of 22 Review: Cantor’s Argument Review: The Halting Problem Diagonalisation is the basis of a well known argument to show that the powerset 2S of a We have used a similar argument to show undecidability of the Halting problem: countable set is not countable S Proof: Suppose for a contradiction that Halting is decidable. Proof: Suppose for a contradiction that 2S is countable. Then set of all Turing machines can be enumerated in a list , , , ... • M1 M2 M3 Then the sets in 2 can be enumerated in a list , , , ... We are interested in their halting on inputs of the form for some TM • S S1 S2 S3 ⊆ S • hMi M Let us write this list as boolean matrix with rows representing the sets We can write it as a boolean matrix with rows representing the TMs • • , , , ..., columns representing a (countably infinite) enumeration of , and 1, 2, 3, ..., columns representing a (countably infinite) enumeration of strings S1 S2 S3 S M M M boolean entries encoding the relationship. , and boolean entries encoding if TM halts. ∈ hMi For a contradiction, define a set by diagonalisation to differ from all other in Using a decider for the halting problem, we can define a TM d by diagonalisation • Sd Si • M the enumeration: to differ from all other i in the enumeration: M s s s ... ... 1 2 3 hM1i hM2i hM3i ... ... S1 × M1 × ... ... S2 × M2 × 3 ... 3 ... S. ×. ×. M. ×. ×. .. .. ... ... Sd × × Md × × Markus Krötzsch, 29th Nov 2017 Complexity Theory slide 7 of 22 Markus Krötzsch, 29th Nov 2017 Complexity Theory slide 8 of 22 Generalising Diagonalisation Diagonalisation of Resources Consider resources R and R for two classes of Turing machines and , and two To generalise diagonalisation as amethod for complexity classes, we consider arbitrary 1 2 K1 K2 functions f , f : N N. resources (time, space, . ): 1 2 → Definition 12.3: We say that R1(f1) allows diagonalisation over R2(f2) if there ex- Definition 12.1: Given a class of Turing machines (e.g., 2-tape determinis- K ists a Turing machine 1 such that tic TMs), R is a resource (e.g., time or space) defined for all machines in if D ∈ K K L( ) R (f ), and R (w) N for all and all words w. • D ∈ 1 1 M ∈ ∪ {∞} M ∈ K for each that is R -bounded by f , there exists a w such that • M ∈ K2 2 2 Then, for any function f : N N gives rises to a class of languages: , w L( ) if and only if , w < L( ). → hM i ∈ D hM i M R(f ) = L there is with L( ) = L and R (w) f ( w ) for all w Σ∗ . { | M ∈ K M M ≤ | | ∈ } Theorem 12.4: If R (f ) allows diagonalisation over R (f ), then R (f ) R (f ) , . 1 1 2 2 1 1 \ 2 2 ∅ Proof: Let be as in Definition 12.3. We show L( ) < R (f ). Example 12.2: We will use, e.g., the following resources: D D 2 2 (1) Suppose for a contradiction that there is 2 that is R2-bounded by f2 with DTime time used by a deterministic 1-tape TM M ∈ K • L( ) = L( ). DTime time used by a deterministic k-tape TM D M • k (2) We obtain a contradiction, since, by Definition 12.3, there is a word w such that DTime time used by a deterministic TM with any number of tapes , , • ∗ w L( ) = L( ) if and only if w < L( ) hM i ∈ D M hM i M Markus Krötzsch, 29th Nov 2017 Complexity Theory slide 9 of 22 Markus Krötzsch, 29th Nov 2017 Complexity Theory slide 10 of 22 Reasonable bounds What kind of functions should we consider as resource bounds? Functions f : N N can be very weird • → The intuition “higher bound more power” turns out to be wrong in general • ⇒ However, our intuition can be confirmed for “reasonable” functions: Hierarchy Theorems Definition 12.5: A function t : N N is time-constructible if t(n) n for all n and → ≥ there exists a TM that computes t(n) in unary in time O(t(n)). A function s : N N is space-constructible if s(n) log n and there exists a TM → ≥ that computes s(n) in unary in space O(s(n)). Note 1: We do consider arbitrary deterministic multi-tape TMs here. Note 2: A TM that computes f (n) “in unary” takes n as input and writes a symbol (say x) f (n) times before terminating Markus Krötzsch, 29th Nov 2017 Complexity Theory slide 11 of 22 Markus Krötzsch, 29th Nov 2017 Complexity Theory slide 12 of 22 Time and space constructible functions Using Constructibility to Halt We had required time-bounded nondeterministic TMs to halt on all computation paths, There are alternative definitions of time and space constructibility in the literature, but even if not accepting. — Is this really necessary? the general intuition is similar: Time-constructible: Computing f does not require significantly more time than the Theorem 12.7: Given a time-constructible function f and an NTM , one can • M resulting value of f construct an O(f )-time bounded NTM 0 that accepts exactly those words w that M | | Space-constructible: Computing f does not require significantly more space than accepts in f ( w ) steps. • M | | the resulting value of f Consequences: (1) we can enforce timely termination on unsuccessful paths; (2) if we All functions commonly used to bound time or space satisfy these criteria: have at least polynomial time, this can also be achieved with only one tape. Proof: On input w, operates as follows: Theorem 12.6: If f and g are time-constructible (space-constructible), then so M0 are f + g, f g, 2f , and f g. Moreover, the following common functions have these (1) Compute f ( w ) on a separate tape (creating f ( w ) symbols). This can be done in · | | | | properties: O(f ( w )) time. | | nd (d 1), bn (b 2), and n! are time-constructible (2) Perform the same transitions as (on dedicated tapes) while “counting down” the • ≥ ≥ M d n f ( w ) symbols in each step log n, n (d 1), b (b 2), and n! are space-constructible | | • ≥ ≥ (3) Terminate if either terminates (in this case return its result) or if the countdown M reaches 0 (in this case reject). Markus Krötzsch, 29th Nov 2017 Complexity Theory slide 13 of 22 Markus Krötzsch, 29th Nov 2017 Complexity Theory slide 14 of 22 Doing more by using more tapes Doing more by using more tapes (2) We first show a preliminary result: “more time + more tapes = more power” We first show a preliminary result: “more time + more tapes = more power” Theorem 12.8: Let f , g : N N such that f is time-constructible, and g o(f ). Theorem 12.8: Let f , g : N N such that f is time-constructible, and g o(f ). → ∈ → ∈ Then, for all k N, we have Then, for all k N, we have ∈ ∈ DTimek(g) ( DTime (f ) DTimek(g) ( DTime (f ) ∗ ∗ Proof: Clearly, DTimek(g) DTimek(f ) DTime (f ). We get DTime (f ) , DTimek(g) by Proof (continued): To invoke Theorem 12.4, we still have to show that, for every k-tape ⊆ ⊆ ∗ ∗ showing that that DTime (f ) allows diagonalisation over DTimek(g). TM that is g-time bounded, there is a word w such that ∗ M We define a multi-tape TM for inputs of the form , w (other cases do not matter): , w L( ) if and only if , w < L( ) , D hM i hM i ∈ D hM i M Compute f ( w ) in unary on a separate “countdown” tape For this, we need to show that there is a word w for which ’s simulation of will • |hM i|, D M Simulate on w , using an appropriate number of tapes (see Theorem 3.8). terminate on time: • M hM i , Time-bound the simulation by f ( w ) using the countdown tape as in For all , there is a constant number c of steps that will at most need to • |hM i| • M M D Theorem 12.7 simulate one step of (this depends on the size of ) M M If rejects (in this time bound), then accept; otherwise, if accepts or fails to Since g o(f ) there is a number n0 such that f (n) c g(n) for all n n0.
Recommended publications
  • CS601 DTIME and DSPACE Lecture 5 Time and Space Functions: T, S
    CS601 DTIME and DSPACE Lecture 5 Time and Space functions: t, s : N → N+ Definition 5.1 A set A ⊆ U is in DTIME[t(n)] iff there exists a deterministic, multi-tape TM, M, and a constant c, such that, 1. A = L(M) ≡ w ∈ U M(w)=1 , and 2. ∀w ∈ U, M(w) halts within c · t(|w|) steps. Definition 5.2 A set A ⊆ U is in DSPACE[s(n)] iff there exists a deterministic, multi-tape TM, M, and a constant c, such that, 1. A = L(M), and 2. ∀w ∈ U, M(w) uses at most c · s(|w|) work-tape cells. (Input tape is “read-only” and not counted as space used.) Example: PALINDROMES ∈ DTIME[n], DSPACE[n]. In fact, PALINDROMES ∈ DSPACE[log n]. [Exercise] 1 CS601 F(DTIME) and F(DSPACE) Lecture 5 Definition 5.3 f : U → U is in F (DTIME[t(n)]) iff there exists a deterministic, multi-tape TM, M, and a constant c, such that, 1. f = M(·); 2. ∀w ∈ U, M(w) halts within c · t(|w|) steps; 3. |f(w)|≤|w|O(1), i.e., f is polynomially bounded. Definition 5.4 f : U → U is in F (DSPACE[s(n)]) iff there exists a deterministic, multi-tape TM, M, and a constant c, such that, 1. f = M(·); 2. ∀w ∈ U, M(w) uses at most c · s(|w|) work-tape cells; 3. |f(w)|≤|w|O(1), i.e., f is polynomially bounded. (Input tape is “read-only”; Output tape is “write-only”.
    [Show full text]
  • Interactive Proof Systems and Alternating Time-Space Complexity
    Theoretical Computer Science 113 (1993) 55-73 55 Elsevier Interactive proof systems and alternating time-space complexity Lance Fortnow” and Carsten Lund** Department of Computer Science, Unicersity of Chicago. 1100 E. 58th Street, Chicago, IL 40637, USA Abstract Fortnow, L. and C. Lund, Interactive proof systems and alternating time-space complexity, Theoretical Computer Science 113 (1993) 55-73. We show a rough equivalence between alternating time-space complexity and a public-coin interactive proof system with the verifier having a polynomial-related time-space complexity. Special cases include the following: . All of NC has interactive proofs, with a log-space polynomial-time public-coin verifier vastly improving the best previous lower bound of LOGCFL for this model (Fortnow and Sipser, 1988). All languages in P have interactive proofs with a polynomial-time public-coin verifier using o(log’ n) space. l All exponential-time languages have interactive proof systems with public-coin polynomial-space exponential-time verifiers. To achieve better bounds, we show how to reduce a k-tape alternating Turing machine to a l-tape alternating Turing machine with only a constant factor increase in time and space. 1. Introduction In 1981, Chandra et al. [4] introduced alternating Turing machines, an extension of nondeterministic computation where the Turing machine can make both existential and universal moves. In 1985, Goldwasser et al. [lo] and Babai [l] introduced interactive proof systems, an extension of nondeterministic computation consisting of two players, an infinitely powerful prover and a probabilistic polynomial-time verifier. The prover will try to convince the verifier of the validity of some statement.
    [Show full text]
  • On the Randomness Complexity of Interactive Proofs and Statistical Zero-Knowledge Proofs*
    On the Randomness Complexity of Interactive Proofs and Statistical Zero-Knowledge Proofs* Benny Applebaum† Eyal Golombek* Abstract We study the randomness complexity of interactive proofs and zero-knowledge proofs. In particular, we ask whether it is possible to reduce the randomness complexity, R, of the verifier to be comparable with the number of bits, CV , that the verifier sends during the interaction. We show that such randomness sparsification is possible in several settings. Specifically, unconditional sparsification can be obtained in the non-uniform setting (where the verifier is modelled as a circuit), and in the uniform setting where the parties have access to a (reusable) common-random-string (CRS). We further show that constant-round uniform protocols can be sparsified without a CRS under a plausible worst-case complexity-theoretic assumption that was used previously in the context of derandomization. All the above sparsification results preserve statistical-zero knowledge provided that this property holds against a cheating verifier. We further show that randomness sparsification can be applied to honest-verifier statistical zero-knowledge (HVSZK) proofs at the expense of increasing the communica- tion from the prover by R−F bits, or, in the case of honest-verifier perfect zero-knowledge (HVPZK) by slowing down the simulation by a factor of 2R−F . Here F is a new measure of accessible bit complexity of an HVZK proof system that ranges from 0 to R, where a maximal grade of R is achieved when zero- knowledge holds against a “semi-malicious” verifier that maliciously selects its random tape and then plays honestly.
    [Show full text]
  • The Complexity of Space Bounded Interactive Proof Systems
    The Complexity of Space Bounded Interactive Proof Systems ANNE CONDON Computer Science Department, University of Wisconsin-Madison 1 INTRODUCTION Some of the most exciting developments in complexity theory in recent years concern the complexity of interactive proof systems, defined by Goldwasser, Micali and Rackoff (1985) and independently by Babai (1985). In this paper, we survey results on the complexity of space bounded interactive proof systems and their applications. An early motivation for the study of interactive proof systems was to extend the notion of NP as the class of problems with efficient \proofs of membership". Informally, a prover can convince a verifier in polynomial time that a string is in an NP language, by presenting a witness of that fact to the verifier. Suppose that the power of the verifier is extended so that it can flip coins and can interact with the prover during the course of a proof. In this way, a verifier can gather statistical evidence that an input is in a language. As we will see, the interactive proof system model precisely captures this in- teraction between a prover P and a verifier V . In the model, the computation of V is probabilistic, but is typically restricted in time or space. A language is accepted by the interactive proof system if, for all inputs in the language, V accepts with high probability, based on the communication with the \honest" prover P . However, on inputs not in the language, V rejects with high prob- ability, even when communicating with a \dishonest" prover. In the general model, V can keep its coin flips secret from the prover.
    [Show full text]
  • Simple Doubly-Efficient Interactive Proof Systems for Locally
    Electronic Colloquium on Computational Complexity, Revision 3 of Report No. 18 (2017) Simple doubly-efficient interactive proof systems for locally-characterizable sets Oded Goldreich∗ Guy N. Rothblumy September 8, 2017 Abstract A proof system is called doubly-efficient if the prescribed prover strategy can be implemented in polynomial-time and the verifier’s strategy can be implemented in almost-linear-time. We present direct constructions of doubly-efficient interactive proof systems for problems in P that are believed to have relatively high complexity. Specifically, such constructions are presented for t-CLIQUE and t-SUM. In addition, we present a generic construction of such proof systems for a natural class that contains both problems and is in NC (and also in SC). The proof systems presented by us are significantly simpler than the proof systems presented by Goldwasser, Kalai and Rothblum (JACM, 2015), let alone those presented by Reingold, Roth- blum, and Rothblum (STOC, 2016), and can be implemented using a smaller number of rounds. Contents 1 Introduction 1 1.1 The current work . 1 1.2 Relation to prior work . 3 1.3 Organization and conventions . 4 2 Preliminaries: The sum-check protocol 5 3 The case of t-CLIQUE 5 4 The general result 7 4.1 A natural class: locally-characterizable sets . 7 4.2 Proof of Theorem 1 . 8 4.3 Generalization: round versus computation trade-off . 9 4.4 Extension to a wider class . 10 5 The case of t-SUM 13 References 15 Appendix: An MA proof system for locally-chracterizable sets 18 ∗Department of Computer Science, Weizmann Institute of Science, Rehovot, Israel.
    [Show full text]
  • On the Existence of Extractable One-Way Functions
    On the Existence of Extractable One-Way Functions The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation Bitansky, Nir et al. “On the Existence of Extractable One-Way Functions.” SIAM Journal on Computing 45.5 (2016): 1910–1952. © 2016 by SIAM As Published http://dx.doi.org/10.1137/140975048 Publisher Society for Industrial and Applied Mathematics Version Final published version Citable link http://hdl.handle.net/1721.1/107895 Terms of Use Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. SIAM J. COMPUT. c 2016 Society for Industrial and Applied Mathematics Vol. 45, No. 5, pp. 1910{1952 ∗ ON THE EXISTENCE OF EXTRACTABLE ONE-WAY FUNCTIONS NIR BITANSKYy , RAN CANETTIz , OMER PANETHz , AND ALON ROSENx Abstract. A function f is extractable if it is possible to algorithmically \extract," from any adversarial program that outputs a value y in the image of f , a preimage of y. When combined with hardness properties such as one-wayness or collision-resistance, extractability has proven to be a powerful tool. However, so far, extractability has not been explicitly shown. Instead, it has only been considered as a nonstandard knowledge assumption on certain functions. We make headway in the study of the existence of extractable one-way functions (EOWFs) along two directions. On the negative side, we show that if there exist indistinguishability obfuscators for circuits, then there do not exist EOWFs where extraction works for any adversarial program with auxiliary input of unbounded polynomial length.
    [Show full text]
  • Spring 2020 (Provide Proofs for All Answers) (120 Points Total)
    Complexity Qual Spring 2020 (provide proofs for all answers) (120 Points Total) 1 Problem 1: Formal Languages (30 Points Total): For each of the following languages, state and prove whether: (i) the lan- guage is regular, (ii) the language is context-free but not regular, or (iii) the language is non-context-free. n n Problem 1a (10 Points): La = f0 1 jn ≥ 0g (that is, the set of all binary strings consisting of 0's and then 1's where the number of 0's and 1's are equal). ∗ Problem 1b (10 Points): Lb = fw 2 f0; 1g jw has an even number of 0's and at least two 1'sg (that is, the set of all binary strings with an even number, including zero, of 0's and at least two 1's). n 2n 3n Problem 1c (10 Points): Lc = f0 #0 #0 jn ≥ 0g (that is, the set of all strings of the form 0 repeated n times, followed by the # symbol, followed by 0 repeated 2n times, followed by the # symbol, followed by 0 repeated 3n times). Problem 2: NP-Hardness (30 Points Total): There are a set of n people who are the vertices of an undirected graph G. There's an undirected edge between two people if they are enemies. Problem 2a (15 Points): The people must be assigned to the seats around a single large circular table. There are exactly as many seats as people (both n). We would like to make sure that nobody ever sits next to one of their enemies.
    [Show full text]
  • Probabilistic Proof Systems: a Primer
    Probabilistic Proof Systems: A Primer Oded Goldreich Department of Computer Science and Applied Mathematics Weizmann Institute of Science, Rehovot, Israel. June 30, 2008 Contents Preface 1 Conventions and Organization 3 1 Interactive Proof Systems 4 1.1 Motivation and Perspective ::::::::::::::::::::::: 4 1.1.1 A static object versus an interactive process :::::::::: 5 1.1.2 Prover and Veri¯er :::::::::::::::::::::::: 6 1.1.3 Completeness and Soundness :::::::::::::::::: 6 1.2 De¯nition ::::::::::::::::::::::::::::::::: 7 1.3 The Power of Interactive Proofs ::::::::::::::::::::: 9 1.3.1 A simple example :::::::::::::::::::::::: 9 1.3.2 The full power of interactive proofs ::::::::::::::: 11 1.4 Variants and ¯ner structure: an overview ::::::::::::::: 16 1.4.1 Arthur-Merlin games a.k.a public-coin proof systems ::::: 16 1.4.2 Interactive proof systems with two-sided error ::::::::: 16 1.4.3 A hierarchy of interactive proof systems :::::::::::: 17 1.4.4 Something completely di®erent ::::::::::::::::: 18 1.5 On computationally bounded provers: an overview :::::::::: 18 1.5.1 How powerful should the prover be? :::::::::::::: 19 1.5.2 Computational Soundness :::::::::::::::::::: 20 2 Zero-Knowledge Proof Systems 22 2.1 De¯nitional Issues :::::::::::::::::::::::::::: 23 2.1.1 A wider perspective: the simulation paradigm ::::::::: 23 2.1.2 The basic de¯nitions ::::::::::::::::::::::: 24 2.2 The Power of Zero-Knowledge :::::::::::::::::::::: 26 2.2.1 A simple example :::::::::::::::::::::::: 26 2.2.2 The full power of zero-knowledge proofs ::::::::::::
    [Show full text]
  • A Short History of Computational Complexity
    The Computational Complexity Column by Lance FORTNOW NEC Laboratories America 4 Independence Way, Princeton, NJ 08540, USA [email protected] http://www.neci.nj.nec.com/homepages/fortnow/beatcs Every third year the Conference on Computational Complexity is held in Europe and this summer the University of Aarhus (Denmark) will host the meeting July 7-10. More details at the conference web page http://www.computationalcomplexity.org This month we present a historical view of computational complexity written by Steve Homer and myself. This is a preliminary version of a chapter to be included in an upcoming North-Holland Handbook of the History of Mathematical Logic edited by Dirk van Dalen, John Dawson and Aki Kanamori. A Short History of Computational Complexity Lance Fortnow1 Steve Homer2 NEC Research Institute Computer Science Department 4 Independence Way Boston University Princeton, NJ 08540 111 Cummington Street Boston, MA 02215 1 Introduction It all started with a machine. In 1936, Turing developed his theoretical com- putational model. He based his model on how he perceived mathematicians think. As digital computers were developed in the 40's and 50's, the Turing machine proved itself as the right theoretical model for computation. Quickly though we discovered that the basic Turing machine model fails to account for the amount of time or memory needed by a computer, a critical issue today but even more so in those early days of computing. The key idea to measure time and space as a function of the length of the input came in the early 1960's by Hartmanis and Stearns.
    [Show full text]
  • Computational Complexity Theory
    Computational Complexity Theory Markus Bl¨aser Universit¨atdes Saarlandes Draft|February 5, 2012 and forever 2 1 Simple lower bounds and gaps Lower bounds The hierarchy theorems of the previous chapter assure that there is, e.g., a language L 2 DTime(n6) that is not in DTime(n3). But this language is not natural.a But, for instance, we do not know how to show that 3SAT 2= DTime(n3). (Even worse, we do not know whether this is true.) The best we can show is that 3SAT cannot be decided by a O(n1:81) time bounded and simultaneously no(1) space bounded deterministic Turing machine. aThis, of course, depends on your interpretation of \natural" . In this chapter, we prove some simple lower bounds. The bounds in this section will be shown for natural problems. Furthermore, these bounds are unconditional. While showing the NP-hardness of some problem can be viewed as a lower bound, this bound relies on the assumption that P 6= NP. However, the bounds in this chapter will be rather weak. 1.1 A logarithmic space bound n n Let LEN = fa b j n 2 Ng. LEN is the language of all words that consists of a sequence of as followed by a sequence of b of equal length. This language is one of the examples for a context-free language that is not regular. We will show that LEN can be decided with logarithmic space and that this amount of space is also necessary. The first part is easy. Exercise 1.1 Prove: LEN 2 DSpace(log).
    [Show full text]
  • Introduction to Complexity Theory Big O Notation Review Linear Function: R(N)=O(N)
    GS019 - Lecture 1 on Complexity Theory Jarod Alper (jalper) Introduction to Complexity Theory Big O Notation Review Linear function: r(n)=O(n). Polynomial function: r(n)=2O(1) Exponential function: r(n)=2nO(1) Logarithmic function: r(n)=O(log n) Poly-log function: r(n)=logO(1) n Definition 1 (TIME) Let t : . Define the time complexity class, TIME(t(n)) to be ℵ−→ℵ TIME(t(n)) = L DTM M which decides L in time O(t(n)) . { |∃ } Definition 2 (NTIME) Let t : . Define the time complexity class, NTIME(t(n)) to be ℵ−→ℵ NTIME(t(n)) = L NDTM M which decides L in time O(t(n)) . { |∃ } Example 1 Consider the language A = 0k1k k 0 . { | ≥ } Is A TIME(n2)? Is A ∈ TIME(n log n)? Is A ∈ TIME(n)? Could∈ we potentially place A in a smaller complexity class if we consider other computational models? Theorem 1 If t(n) n, then every t(n) time multitape Turing machine has an equivalent O(t2(n)) time single-tape turing≥ machine. Proof: see Theorem 7:8 in Sipser (pg. 232) Theorem 2 If t(n) n, then every t(n) time RAM machine has an equivalent O(t3(n)) time multi-tape turing machine.≥ Proof: optional exercise Conclusion: Linear time is model specific; polynomical time is model indepedent. Definition 3 (The Class P ) k P = [ TIME(n ) k Definition 4 (The Class NP) GS019 - Lecture 1 on Complexity Theory Jarod Alper (jalper) k NP = [ NTIME(n ) k Equivalent Definition of NP NP = L L has a polynomial time verifier .
    [Show full text]
  • Lecture 3: Instructor: Rafael Pass Scribe: Ashwinkumar B
    COM S 6810 Theory of Computing January 27, 2009 Lecture 3: Instructor: Rafael Pass Scribe: Ashwinkumar B. V 1 Review In the last class Diagonalization was introduced and used to prove some of the first results in Complexity theory. This included 2 • Time Hierarchy Theorem (DT IME(n × log (n)) * DT IME(n)) 2 • Nondeterministic Time Hierarchy Theorem (NTIME(n×log (n)) * NTIME(n)) • Ladners Theorem (Proves the existence of Existence of NP-intermediate problems) After these theorems were proved there was a hope in the community that a clever use of Diagonalization might resolve the P 6= NP ? question. But then the result that any proof which resolves P 6= NP ? must be non-relativising with respect to oracle machines showed that P 6= NP ? cannot be resolved just be the clever use of Diagonalization . Definition 1 For every O ⊆ f0; 1g∗,P O is the set of languages decided by a polynomial- time TM with oracle access to O and NP O is the set of languages decided by a polynomial- time NTM with oracle access to O. O1 O1 O2 O2 Theorem 1 [1] 9 oracles O1 and O2 such that P = NP and P = NP Proof. • To show that 9 oracle O such that P O = NP O Define (1) O(< M >; x; 1n) = 1 if M(x)=1 and M(x) stops in 2n steps = 0 otherwise EXP = [ Dtime(2nc ) ⊆ P O (2) c>1 Simple as the polytime TM can just make a call to the oracle. P O ⊆ NP O(Trivially true) (3) 3-1 NP O ⊆ EXP (4) Any TM which runs in time EXP can enumerate all the choices of the NTM which runs in poly time and can simulate the oracle From equations 2,3,4 we can easily see that P O = NP O = EXP • To show that 9 oracle O such that P O 6= NP O The above step in the proof was left as an exercise and can be found in Section 3.5 of [2] 2 Space Complexity 2.1 Notations • SP ACE(s(n)) =Languages decidable by some TM using O(s(n)) space.
    [Show full text]