Bpp Has Subexponential Time Simulations Unless Exptime Has Publishable Proofs

Total Page:16

File Type:pdf, Size:1020Kb

Bpp Has Subexponential Time Simulations Unless Exptime Has Publishable Proofs BPP HAS SUBEXPONENTIAL TIME SIMULATIONS UNLESS EXPTIME HAS PUBLISHABLE PROOFS Laszlo Babai Lance Fortnow Noam Nisan and Avi Wigderson Abstract We show that BPP can b e simulated in sub exp onential time for innitely many input lengths unless exp onential time collapses to the second level of the p olynomialtime hierarchy has p olynomialsize circuits and has publishable pro ofs EXPTIME MA We also show that BPP is contained in sub exp onential time unless ex p onential time has publishable pro ofs for innitely many input lengths In addition we show BPP can b e simulated in sub exp onential time for innitely many input lengths unless there exist unary languages in MA P The pro ofs are based on the recent characterization of the p ower of multiprover interactive proto cols and on random selfreducibili ty via lowdegree p olynomials They exhibit an interplay b etween Bo olean circuit simulation interactive pro ofs and classical complexity classes An imp ortant feature of this pro of is that it do es not relativize One of the ingredients of our pro of is a lemma that states that if EXPTIME has p olynomial size circuits then EXPTIME MA This extends previous work by Alb ert Meyer Key words Complexity Classes Interactive Pro of Systems Sub ject classications Q Intro duction How much time is necessary to deterministically simulate a probabilistic machine We could simulate our machine for every p ossible choice of coin tosses Babai et al and then compute the probability of acceptance Simulating a probabilistic p olynomialtime Turing machine using this metho d would require exp onential time Do es there exist a faster way One solution involves pseudorandom numb er generators A pseudorandom numb er generator maps some set of random bits to a larger set of bits where the larger set of bits is computationally indistinguishable from random One could use a pseudorandom numb er generator to reduce the numb er of random bits needed for a probabilistic algorithm to accept a certain language and thus to reduce the numb er of computation paths to simulate Blum and Micali describ ed the rst secure pseudorandom generator based on the assumption of the hardness of the discrete log function These ideas are generalized by Yao who showed that one can convert any oneway p ermutation into a pseudorandom numb er generator to show that BPP has sub exp onential time simulations A series of results show that any oneway function is enough to create a pseudorandom generator that could b e used to show that BPP is in sub exp onential time Rather than making hardness assumptions on certain typ es of functions in this pap er we shall consider the eect of complexity theoretic assumptions Nisan and Wigderson show that if there exists a function computable in exp onential time that cannot b e approximated by a p olynomialsize circuit then there exists a pseudorandom numb er generator computable in sub exp onential time that lo oks random to p olynomialsize circuits for innitely many input lengths They use this pseudorandom numb er generator to show that if such a hard function exists then BPP has such a weak sub exp onential simulation We generalize this result by showing that a much weaker assumption will still give the same consequence We show that BPP has a weak sub exp onential n for innitely many values of n and every simulation ie a simulation in time unless exp onential time has p olynomial size circuits and is contained in the class MA of languages with probabilistically checkable pro ofs Since MA is P P known to lie within we deduce that sub exp onential simulations for 2 2 BPP exist unless EXPTIME lies within the second level of the p olynomialtime hierarchy Thus the main theorems of our pap er are the following Theorem BPP admits weak sub exp onential time simulations unless EXPTIME P MA P pol y 2 BPP is contained in sub exp onential time unless MA weakly simulates EXPTIME BPP and Sub exp onential Time We will use Theorem to also prove the following Theorem BPP admits weak sub exp onential time simulations unless there exist unary languages in MA P From the pro of of Theorem we will deduce the following corollary Corollary If EH E then P BPP Corollary is a rare instance of a collapse at the exp onentialtime level implying a collapse at the p olynomialtime level Background and Denitions Nisan and Wigderson showed a general theorem on how certain hard functions could b e used to create various pseudorandom numb er generators We will use a sp ecic corollary of their work k n and the notation E for We use the notation EXPTIME for DTIME k 0 P cn k DTIME We dene EH the exp onentialtime hierarchy as E c0 k 0 The class MA dened by Babai cf denotes the MerlinArthur class the class of languages accepted by an interactive pro of system consisting of a single message from the prover followed by probabilistic verication Formally we say that L MA if there exists a probabilistic p olynomial time machine M and a p olynomial q n such that For all x L there exists a y jy j q jxj and M x y accepts with probability at least twothirds and For all x L and for all y such that jy j q jxj M x y accepts with probability at most onethird Arguably this represents the class of languages with publishable proofs of mem b ership not requiring direct interaction b etween prover and verier the verier P P can ip coins at any later date Babai has shown that contains 2 2 MA Let f g Let f b e a function mapping to We say f is tn approximated by circuits of size sn if for all suciently large n there exists a circuit C of size sn on inputs of length n such that n PrC x f x n tn Babai et al n where x is chosen uniformly over We say that f is weakly tnapproximated by circuits of size sn if the ab ove statement holds for innitely many n Nisan and Wigderson use j approximated by circuits of size sn to mean weakly n approximated by circuits of size sn for any xed j in our terminology A function f cannot b e weakly approximated by p olynomialsize circuits j j if it cannot b e weakly n approximated by circuits of size n for any xed j A language cannot b e approximated if the characteristic function of that language cannot b e approximated A language class cannot b e approximated if some language in that class cannot b e approximated The class P pol y consists of all languages recognizable by a nonuniform family of p olynomialsize circuits We say that a machine M weakly computes the language L if for innitely many values of n n n L LM We say that L admits weak subexponential simulations if for every n time b ounded Turing machine which weakly computes L We there exists a say that a language class C admits weak sub exp onential simulations if each memb er of C do es A class D weakly simulates a class C if for every language in C there is a language in D that agrees with C for innitely many input lengths We will use and signicantly extend the following theorems due to Nisan and Wigderson Theorem If EXPTIME cannot b e approximated by p olynomialsize circuits then BPP admits weak sub exp onential simulations If EXPTIME cannot b e weakly approximated by p olynomialsize circuits n then BPP DTIME 0 To extend these theorems we will use some of the recent work by Babai Fortnow and Lund on multiple prover interactive pro of systems Interac tive pro of systems were intro duced by Babai and Goldwasser Micali and Racko as a probabilistic extension of NP The mo del consists of an in nitely p owerful but untrustworthy prover that tries to convince a probabilistic p olynomialtime verier that a string is in a certain language A recent series of results by Lund Fortnow Karlo and Nisan and Shamir show that this mo del accepts exactly those languages recognizable in p olynomial space BPP and Sub exp onential Time BenOr Goldwasser Kilian and Wigderson generalize this mo del to have many provers that cannot communicate with each other or see the communi cation of the others with the verier Babai Fortnow and Lund show that this mo del accepts exactly the languages recognizable in nondeterministic ex p onential time We will use the following theorem from regarding the p ower of EXPTIME provers Theorem Any language in EXPTIME has a multiprover interactive pro of system where the honest provers are limited to computing within de terministic exp onential time We note that this result implies that EXPTIME admits instance checking in the sense of Blum and Kannan cf Random SelfReducibil i ty in High Complexity Classes Following an idea of Beaver and Feigenbaum Lipton observed that the p ermanent function has the following random selfreducibility prop erty if p is a prime greater than n and an oracle tells the value of n n p ermanents 1 over Z correctly for a p ortion of the set of inputs then one can use this p 3n oracle to nd the correct value with exp onentially small probability of error on every input Blum Luby and Rubinfeld used similar ideas The idea of the pro of is that the value of p ermanent of A can b e computed using interp olation from the p ermanents of any n matrices A B where i B is a random matrix and Z i p A similar idea works for arbitrary p olynomials of low degree In particular by extending a Bo olean function f to a multilinear function g over Z we p f obtain a random selfreducible f hard and PSPACE easy function g We prove the following lemmas from for completeness s Lemma Let A f g Q b e a function Then A has a unique multi s e linear extension A Q Q e
Recommended publications
  • Notes for Lecture 2
    Notes on Complexity Theory Last updated: December, 2011 Lecture 2 Jonathan Katz 1 Review The running time of a Turing machine M on input x is the number of \steps" M takes before it halts. Machine M is said to run in time T (¢) if for every input x the running time of M(x) is at most T (jxj). (In particular, this means it halts on all inputs.) The space used by M on input x is the number of cells written to by M on all its work tapes1 (a cell that is written to multiple times is only counted once); M is said to use space T (¢) if for every input x the space used during the computation of M(x) is at most T (jxj). We remark that these time and space measures are worst-case notions; i.e., even if M runs in time T (n) for only a fraction of the inputs of length n (and uses less time for all other inputs of length n), the running time of M is still T . (Average-case notions of complexity have also been considered, but are somewhat more di±cult to reason about. We may cover this later in the semester; or see [1, Chap. 18].) Recall that a Turing machine M computes a function f : f0; 1g¤ ! f0; 1g¤ if M(x) = f(x) for all x. We will focus most of our attention on boolean functions, a context in which it is more convenient to phrase computation in terms of languages. A language is simply a subset of f0; 1g¤.
    [Show full text]
  • CS601 DTIME and DSPACE Lecture 5 Time and Space Functions: T, S
    CS601 DTIME and DSPACE Lecture 5 Time and Space functions: t, s : N → N+ Definition 5.1 A set A ⊆ U is in DTIME[t(n)] iff there exists a deterministic, multi-tape TM, M, and a constant c, such that, 1. A = L(M) ≡ w ∈ U M(w)=1 , and 2. ∀w ∈ U, M(w) halts within c · t(|w|) steps. Definition 5.2 A set A ⊆ U is in DSPACE[s(n)] iff there exists a deterministic, multi-tape TM, M, and a constant c, such that, 1. A = L(M), and 2. ∀w ∈ U, M(w) uses at most c · s(|w|) work-tape cells. (Input tape is “read-only” and not counted as space used.) Example: PALINDROMES ∈ DTIME[n], DSPACE[n]. In fact, PALINDROMES ∈ DSPACE[log n]. [Exercise] 1 CS601 F(DTIME) and F(DSPACE) Lecture 5 Definition 5.3 f : U → U is in F (DTIME[t(n)]) iff there exists a deterministic, multi-tape TM, M, and a constant c, such that, 1. f = M(·); 2. ∀w ∈ U, M(w) halts within c · t(|w|) steps; 3. |f(w)|≤|w|O(1), i.e., f is polynomially bounded. Definition 5.4 f : U → U is in F (DSPACE[s(n)]) iff there exists a deterministic, multi-tape TM, M, and a constant c, such that, 1. f = M(·); 2. ∀w ∈ U, M(w) uses at most c · s(|w|) work-tape cells; 3. |f(w)|≤|w|O(1), i.e., f is polynomially bounded. (Input tape is “read-only”; Output tape is “write-only”.
    [Show full text]
  • Interactive Proof Systems and Alternating Time-Space Complexity
    Theoretical Computer Science 113 (1993) 55-73 55 Elsevier Interactive proof systems and alternating time-space complexity Lance Fortnow” and Carsten Lund** Department of Computer Science, Unicersity of Chicago. 1100 E. 58th Street, Chicago, IL 40637, USA Abstract Fortnow, L. and C. Lund, Interactive proof systems and alternating time-space complexity, Theoretical Computer Science 113 (1993) 55-73. We show a rough equivalence between alternating time-space complexity and a public-coin interactive proof system with the verifier having a polynomial-related time-space complexity. Special cases include the following: . All of NC has interactive proofs, with a log-space polynomial-time public-coin verifier vastly improving the best previous lower bound of LOGCFL for this model (Fortnow and Sipser, 1988). All languages in P have interactive proofs with a polynomial-time public-coin verifier using o(log’ n) space. l All exponential-time languages have interactive proof systems with public-coin polynomial-space exponential-time verifiers. To achieve better bounds, we show how to reduce a k-tape alternating Turing machine to a l-tape alternating Turing machine with only a constant factor increase in time and space. 1. Introduction In 1981, Chandra et al. [4] introduced alternating Turing machines, an extension of nondeterministic computation where the Turing machine can make both existential and universal moves. In 1985, Goldwasser et al. [lo] and Babai [l] introduced interactive proof systems, an extension of nondeterministic computation consisting of two players, an infinitely powerful prover and a probabilistic polynomial-time verifier. The prover will try to convince the verifier of the validity of some statement.
    [Show full text]
  • If Np Languages Are Hard on the Worst-Case, Then It Is Easy to Find Their Hard Instances
    IF NP LANGUAGES ARE HARD ON THE WORST-CASE, THEN IT IS EASY TO FIND THEIR HARD INSTANCES Dan Gutfreund, Ronen Shaltiel, and Amnon Ta-Shma Abstract. We prove that if NP 6⊆ BPP, i.e., if SAT is worst-case hard, then for every probabilistic polynomial-time algorithm trying to decide SAT, there exists some polynomially samplable distribution that is hard for it. That is, the algorithm often errs on inputs from this distribution. This is the ¯rst worst-case to average-case reduction for NP of any kind. We stress however, that this does not mean that there exists one ¯xed samplable distribution that is hard for all probabilistic polynomial-time algorithms, which is a pre-requisite assumption needed for one-way func- tions and cryptography (even if not a su±cient assumption). Neverthe- less, we do show that there is a ¯xed distribution on instances of NP- complete languages, that is samplable in quasi-polynomial time and is hard for all probabilistic polynomial-time algorithms (unless NP is easy in the worst case). Our results are based on the following lemma that may be of independent interest: Given the description of an e±cient (probabilistic) algorithm that fails to solve SAT in the worst case, we can e±ciently generate at most three Boolean formulae (of increasing lengths) such that the algorithm errs on at least one of them. Keywords. Average-case complexity, Worst-case to average-case re- ductions, Foundations of cryptography, Pseudo classes Subject classi¯cation. 68Q10 (Modes of computation (nondetermin- istic, parallel, interactive, probabilistic, etc.) 68Q15 Complexity classes (hierarchies, relations among complexity classes, etc.) 68Q17 Compu- tational di±culty of problems (lower bounds, completeness, di±culty of approximation, etc.) 94A60 Cryptography 2 Gutfreund, Shaltiel & Ta-Shma 1.
    [Show full text]
  • Computational Complexity: a Modern Approach
    i Computational Complexity: A Modern Approach Draft of a book: Dated January 2007 Comments welcome! Sanjeev Arora and Boaz Barak Princeton University [email protected] Not to be reproduced or distributed without the authors’ permission This is an Internet draft. Some chapters are more finished than others. References and attributions are very preliminary and we apologize in advance for any omissions (but hope you will nevertheless point them out to us). Please send us bugs, typos, missing references or general comments to [email protected] — Thank You!! DRAFT ii DRAFT Chapter 9 Complexity of counting “It is an empirical fact that for many combinatorial problems the detection of the existence of a solution is easy, yet no computationally efficient method is known for counting their number.... for a variety of problems this phenomenon can be explained.” L. Valiant 1979 The class NP captures the difficulty of finding certificates. However, in many contexts, one is interested not just in a single certificate, but actually counting the number of certificates. This chapter studies #P, (pronounced “sharp p”), a complexity class that captures this notion. Counting problems arise in diverse fields, often in situations having to do with estimations of probability. Examples include statistical estimation, statistical physics, network design, and more. Counting problems are also studied in a field of mathematics called enumerative combinatorics, which tries to obtain closed-form mathematical expressions for counting problems. To give an example, in the 19th century Kirchoff showed how to count the number of spanning trees in a graph using a simple determinant computation. Results in this chapter will show that for many natural counting problems, such efficiently computable expressions are unlikely to exist.
    [Show full text]
  • The Complexity Zoo
    The Complexity Zoo Scott Aaronson www.ScottAaronson.com LATEX Translation by Chris Bourke [email protected] 417 classes and counting 1 Contents 1 About This Document 3 2 Introductory Essay 4 2.1 Recommended Further Reading ......................... 4 2.2 Other Theory Compendia ............................ 5 2.3 Errors? ....................................... 5 3 Pronunciation Guide 6 4 Complexity Classes 10 5 Special Zoo Exhibit: Classes of Quantum States and Probability Distribu- tions 110 6 Acknowledgements 116 7 Bibliography 117 2 1 About This Document What is this? Well its a PDF version of the website www.ComplexityZoo.com typeset in LATEX using the complexity package. Well, what’s that? The original Complexity Zoo is a website created by Scott Aaronson which contains a (more or less) comprehensive list of Complexity Classes studied in the area of theoretical computer science known as Computa- tional Complexity. I took on the (mostly painless, thank god for regular expressions) task of translating the Zoo’s HTML code to LATEX for two reasons. First, as a regular Zoo patron, I thought, “what better way to honor such an endeavor than to spruce up the cages a bit and typeset them all in beautiful LATEX.” Second, I thought it would be a perfect project to develop complexity, a LATEX pack- age I’ve created that defines commands to typeset (almost) all of the complexity classes you’ll find here (along with some handy options that allow you to conveniently change the fonts with a single option parameters). To get the package, visit my own home page at http://www.cse.unl.edu/~cbourke/.
    [Show full text]
  • When Subgraph Isomorphism Is Really Hard, and Why This Matters for Graph Databases Ciaran Mccreesh, Patrick Prosser, Christine Solnon, James Trimble
    When Subgraph Isomorphism is Really Hard, and Why This Matters for Graph Databases Ciaran Mccreesh, Patrick Prosser, Christine Solnon, James Trimble To cite this version: Ciaran Mccreesh, Patrick Prosser, Christine Solnon, James Trimble. When Subgraph Isomorphism is Really Hard, and Why This Matters for Graph Databases. Journal of Artificial Intelligence Research, Association for the Advancement of Artificial Intelligence, 2018, 61, pp.723 - 759. 10.1613/jair.5768. hal-01741928 HAL Id: hal-01741928 https://hal.archives-ouvertes.fr/hal-01741928 Submitted on 26 Mar 2018 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Journal of Artificial Intelligence Research 61 (2018) 723-759 Submitted 11/17; published 03/18 When Subgraph Isomorphism is Really Hard, and Why This Matters for Graph Databases Ciaran McCreesh [email protected] Patrick Prosser [email protected] University of Glasgow, Glasgow, Scotland Christine Solnon [email protected] INSA-Lyon, LIRIS, UMR5205, F-69621, France James Trimble [email protected] University of Glasgow, Glasgow, Scotland Abstract The subgraph isomorphism problem involves deciding whether a copy of a pattern graph occurs inside a larger target graph.
    [Show full text]
  • Delegating Computation: Interactive Proofs for Muggles∗
    Electronic Colloquium on Computational Complexity, Revision 1 of Report No. 108 (2017) Delegating Computation: Interactive Proofs for Muggles∗ Shafi Goldwasser Yael Tauman Kalai Guy N. Rothblum MIT and Weizmann Institute Microsoft Research Weizmann Institute [email protected] [email protected] [email protected] Abstract In this work we study interactive proofs for tractable languages. The (honest) prover should be efficient and run in polynomial time, or in other words a \muggle".1 The verifier should be super-efficient and run in nearly-linear time. These proof systems can be used for delegating computation: a server can run a computation for a client and interactively prove the correctness of the result. The client can verify the result's correctness in nearly-linear time (instead of running the entire computation itself). Previously, related questions were considered in the Holographic Proof setting by Babai, Fortnow, Levin and Szegedy, in the argument setting under computational assumptions by Kilian, and in the random oracle model by Micali. Our focus, however, is on the original inter- active proof model where no assumptions are made on the computational power or adaptiveness of dishonest provers. Our main technical theorem gives a public coin interactive proof for any language computable by a log-space uniform boolean circuit with depth d and input length n. The verifier runs in time n · poly(d; log(n)) and space O(log(n)), the communication complexity is poly(d; log(n)), and the prover runs in time poly(n). In particular, for languages computable by log-space uniform NC (circuits of polylog(n) depth), the prover is efficient, the verifier runs in time n · polylog(n) and space O(log(n)), and the communication complexity is polylog(n).
    [Show full text]
  • Interactive Proofs
    Interactive proofs April 12, 2014 [72] L´aszl´oBabai. Trading group theory for randomness. In Proc. 17th STOC, pages 421{429. ACM Press, 1985. doi:10.1145/22145.22192. [89] L´aszl´oBabai and Shlomo Moran. Arthur-Merlin games: A randomized proof system and a hierarchy of complexity classes. J. Comput. System Sci., 36(2):254{276, 1988. doi:10.1016/0022-0000(88)90028-1. [99] L´aszl´oBabai, Lance Fortnow, and Carsten Lund. Nondeterministic ex- ponential time has two-prover interactive protocols. In Proc. 31st FOCS, pages 16{25. IEEE Comp. Soc. Press, 1990. doi:10.1109/FSCS.1990.89520. See item 1991.108. [108] L´aszl´oBabai, Lance Fortnow, and Carsten Lund. Nondeterministic expo- nential time has two-prover interactive protocols. Comput. Complexity, 1 (1):3{40, 1991. doi:10.1007/BF01200056. Full version of 1990.99. [136] Sanjeev Arora, L´aszl´oBabai, Jacques Stern, and Z. (Elizabeth) Sweedyk. The hardness of approximate optima in lattices, codes, and systems of linear equations. In Proc. 34th FOCS, pages 724{733, Palo Alto CA, 1993. IEEE Comp. Soc. Press. doi:10.1109/SFCS.1993.366815. Conference version of item 1997:160. [160] Sanjeev Arora, L´aszl´oBabai, Jacques Stern, and Z. (Elizabeth) Sweedyk. The hardness of approximate optima in lattices, codes, and systems of linear equations. J. Comput. System Sci., 54(2):317{331, 1997. doi:10.1006/jcss.1997.1472. Full version of 1993.136. [111] L´aszl´oBabai, Lance Fortnow, Noam Nisan, and Avi Wigderson. BPP has subexponential time simulations unless EXPTIME has publishable proofs. In Proc.
    [Show full text]
  • Interactive Proofs for Quantum Computations
    Innovations in Computer Science 2010 Interactive Proofs For Quantum Computations Dorit Aharonov Michael Ben-Or Elad Eban School of Computer Science, The Hebrew University of Jerusalem, Israel [email protected] [email protected] [email protected] Abstract: The widely held belief that BQP strictly contains BPP raises fundamental questions: Upcoming generations of quantum computers might already be too large to be simulated classically. Is it possible to experimentally test that these systems perform as they should, if we cannot efficiently compute predictions for their behavior? Vazirani has asked [21]: If computing predictions for Quantum Mechanics requires exponential resources, is Quantum Mechanics a falsifiable theory? In cryptographic settings, an untrusted future company wants to sell a quantum computer or perform a delegated quantum computation. Can the customer be convinced of correctness without the ability to compare results to predictions? To provide answers to these questions, we define Quantum Prover Interactive Proofs (QPIP). Whereas in standard Interactive Proofs [13] the prover is computationally unbounded, here our prover is in BQP, representing a quantum computer. The verifier models our current computational capabilities: it is a BPP machine, with access to few qubits. Our main theorem can be roughly stated as: ”Any language in BQP has a QPIP, and moreover, a fault tolerant one” (providing a partial answer to a challenge posted in [1]). We provide two proofs. The simpler one uses a new (possibly of independent interest) quantum authentication scheme (QAS) based on random Clifford elements. This QPIP however, is not fault tolerant. Our second protocol uses polynomial codes QAS due to Ben-Or, Cr´epeau, Gottesman, Hassidim, and Smith [8], combined with quantum fault tolerance and secure multiparty quantum computation techniques.
    [Show full text]
  • Lecture 10: Space Complexity III
    Space Complexity Classes: NL and L Reductions NL-completeness The Relation between NL and coNL A Relation Among the Complexity Classes Lecture 10: Space Complexity III Arijit Bishnu 27.03.2010 Space Complexity Classes: NL and L Reductions NL-completeness The Relation between NL and coNL A Relation Among the Complexity Classes Outline 1 Space Complexity Classes: NL and L 2 Reductions 3 NL-completeness 4 The Relation between NL and coNL 5 A Relation Among the Complexity Classes Space Complexity Classes: NL and L Reductions NL-completeness The Relation between NL and coNL A Relation Among the Complexity Classes Outline 1 Space Complexity Classes: NL and L 2 Reductions 3 NL-completeness 4 The Relation between NL and coNL 5 A Relation Among the Complexity Classes Definition for Recapitulation S c NPSPACE = c>0 NSPACE(n ). The class NPSPACE is an analog of the class NP. Definition L = SPACE(log n). Definition NL = NSPACE(log n). Space Complexity Classes: NL and L Reductions NL-completeness The Relation between NL and coNL A Relation Among the Complexity Classes Space Complexity Classes Definition for Recapitulation S c PSPACE = c>0 SPACE(n ). The class PSPACE is an analog of the class P. Definition L = SPACE(log n). Definition NL = NSPACE(log n). Space Complexity Classes: NL and L Reductions NL-completeness The Relation between NL and coNL A Relation Among the Complexity Classes Space Complexity Classes Definition for Recapitulation S c PSPACE = c>0 SPACE(n ). The class PSPACE is an analog of the class P. Definition for Recapitulation S c NPSPACE = c>0 NSPACE(n ).
    [Show full text]
  • Glossary of Complexity Classes
    App endix A Glossary of Complexity Classes Summary This glossary includes selfcontained denitions of most complexity classes mentioned in the b o ok Needless to say the glossary oers a very minimal discussion of these classes and the reader is re ferred to the main text for further discussion The items are organized by topics rather than by alphab etic order Sp ecically the glossary is partitioned into two parts dealing separately with complexity classes that are dened in terms of algorithms and their resources ie time and space complexity of Turing machines and complexity classes de ned in terms of nonuniform circuits and referring to their size and depth The algorithmic classes include timecomplexity based classes such as P NP coNP BPP RP coRP PH E EXP and NEXP and the space complexity classes L NL RL and P S P AC E The non k uniform classes include the circuit classes P p oly as well as NC and k AC Denitions and basic results regarding many other complexity classes are available at the constantly evolving Complexity Zoo A Preliminaries Complexity classes are sets of computational problems where each class contains problems that can b e solved with sp ecic computational resources To dene a complexity class one sp ecies a mo del of computation a complexity measure like time or space which is always measured as a function of the input length and a b ound on the complexity of problems in the class We follow the tradition of fo cusing on decision problems but refer to these problems using the terminology of promise problems
    [Show full text]