An Introduction to Probabilistically Checkable Proofs and the PCP Theorem

Total Page:16

File Type:pdf, Size:1020Kb

Load more

An Introduction to Probabilistically Checkable Proofs and the PCP Theorem Jose Falcon, Mitesh Jain June 2, 2013 1 Introduction Define the languages of NP as the languages with efficient proof systems. Definition 1. A language L is in NP if there is a polynomial-time deter- ministic Turing machine V that, given an input x, verifies proofs, denoted π, of x 2 L. The following properties hold: x 2 L =) 9π : Vπ(x) = 1 (1) x2 = L =) 8π : Vπ(x) = 0: (2) Vπ(x) has access to an input string x and a certificate string π. Note that we use \proof" and \certificate" interchangeably. It is instructive to pose NP-problems as a game between a solver and a veri- fier. A solver must produce a certificate π of the existence of x 2 L, whereas a verifier correctly and efficiently determines the validity of π. Consider the problem SAT: a certificate is merely an assignment to the variables of the input formula. The verifier can substitute the assignment into the original formula and quickly discern satisfiability. Notice, however, the verifier scans every bit of π. An astute reader may ask if it is necessary to read every bit of a certifi- cate. Certainly we must if we rely on substitution as a means of verification. However, if we change the structure of our certificate, can we provide a new proof system which is verifiable by reading a constant number of bits of π, if only probabilistically? Surprisingly, we can. 1 1.1 PCP Verifiers Let us generalize our notion of a verifier. First, outfit the verifier with an address tape so that it may randomly access individual bits of π. An address is written to the tape by throwing r(n) random coins, where each coin corresponds to a bit on the tape. Next, limit the number of queries to the proof to q(n). Relative to the classical verifier, this restricts the power of the PCP verifier. We allow the verifier to err, and consider the following questions: • what is the tradeoff between the query complexity and the error in- curred by the verifier; and • how small can the probabilistically checkable proof be relative to the classical proof? 1.1.1 Formalization A probabilistic verifier admits the following properties: a correct proof of x 2 L is always accepted, i.e., Pr[accepting a correct proof] = 1; and, if x2 = L, then every claimed certificate of x 2 L is rejected with high probability. Definition 2. Let L be a language and q; r : N ! N. L has an (r(n); q(n))- PCP verifier if there is a polynomial-time probabilistic algorithm V such that it is: • Efficient: given an input x 2 f0; 1gn and random access to a cer- tificate π 2 f0; 1g∗, V uses at most r(n) random coins and makes at most q(n) queries to π. V accepts or rejects when it outputs \1" or \0" respectively. • Complete: if x 2 L then there exists a certificate π 2 f0; 1g∗ such that Pr[Vπ(x) = 1] = 1. • Sound: if x2 = L then for every certificate π 2 f0; 1g∗, Pr[Vπ(x) = 1 0] > 2 . A language L is in PCP(r(n); q(n)), if L has a (c·r(n); d·q(n))-PCP verifier, for constants c; d > 0. 2 Notice this formulation dictates the maximum size of a proof that can be verified. Given an address tape of length r(n) we may access 2r(n) bits. Querying the proof q(n) times is equivalent to accessing q(n) proofs of size 2r(n). Thus, proofs may be at most q(n) · 2r(n) bits. 1.2 The PCP Theorem The following theorem is known as the PCP theorem and was shown by Arora et al. in 1992 [1]. Theorem 3. NP = PCP(log n; 1). A proof of this result is outside the scope of this project. Theorem 3 shows, in short, that every NP-language has a PCP verifier that verifies certificates of at most poly(n) bits by reading a constant number of bits. The follow- ing section outlines a proof of a weaker PCP theorem that provides some intuition of the proof of 3. 2 A Proof of a Weak PCP Theorem The primary contribution of this project is a pedagogical proof of the fol- lowing PCP theorem: Theorem 4. NP ⊆ PCP(poly(n); 1). Theorem 4 is weaker than the PCP theorem stated in the previous sec- tion in the sense that the proofs it validates may be much larger. The former verifies proofs of exponential size, whereas the latter verifies proofs of poly- nomial size. It is interesting, still, that exponentially sized proofs can be verified by a constant number of queries. The remainder of this section outlines a proof of a (poly(n); 1)-PCP ver- ifier for CIRCUIT-SAT. Because CIRCUIT-SAT is known to be NP-complete, any NP-language has a PCP verifier by first reducing to CIRCUIT-SAT. For simplicity, we assume the problem is translated into a set of equivalent boolean quadratic constraints. The pith of the verifier is to encode solutions to these constraints as functions which can be quickly tested and decoded. Our main tools include, boolean linear functions, Walsh-Hadamard codes and boolean quadratic equations. Finally, we prove the verifier is efficient, complete and sound. 3 2.1 Linear Functions and Bit Vectors Throughout our study of the Walsh-Hadamard code (section 2.2) and theo- rem 4, we frequently depend on linear functions from f0; 1gn to f0; 1g. Definition 5. A function f : f0; 1gn ! f0; 1g is linear if, for every x; y 2 f0; 1gn, f(x + y) = f(x) + f(y), and f(αx) = αf(x). It is also convenient to reason about bit strings as vectors. Consider the dot product of u; x 2 f0; 1gn as vectors. Definition 6. The dot product of any u; x 2 f0; 1gn is defined as n X `u(x) = uixi (mod 2) i=1 Corollary 7. `u(x) is a linear function. The next lemma shows that if two bit strings u; v are different, then for half the choices of x, `u(x) 6= `v(x). It appears frequently throughout the 1 design of the PCP verifier (section 2.3) in the form, Pr[`u(x) 6= `v(x)] = . x 2 Lemma 8. Let u; v 2 f0; 1gn. If u 6= v, then for half the choices of x, `u(x) 6= `v(x). n n Proof. Let u = u1u2 : : : un 2 f0; 1g and v = v1v2 : : : vn 2 f0; 1g such that u 6= v. Then u and v differ in at least one bit. Without loss of generality, let k be the least index such that uk 6= vk. We show that `u(x) 6= `v(x) for half the choices of x 2 f0; 1gn by a simple counting argument. Let x = x1x2 : : : xn and consider the following. n X uixi (3) i=1;i6=k n X vixi (4) i=1;i6=k By definition, `u(x) = (3) + ukxk (mod 2) (5) `v(x) = (4) + vkxk (mod 2) (6) Suppose (3) = (4); we are forced to set xk = 1 to ensure `u(x) 6= `v(x). Otherwise (3) 6= (4) and setting xk = 0 ensures the inequality. Since there are 2n possible choices of x, but a single bit is fixed for every choice, there n−1 are 2 possible choices of x where `u(x) 6= `v(x). 4 A useful fact for conceptualizing Walsh-Hadamard codewords (section n 2.2) is that the set Ln = f`u j u 2 f0; 1g g is equal to the set of all linear functions from f0; 1gn to f0; 1g. Lemma 9. A function f : f0; 1gn ! f0; 1g is linear if and only if there n exists some u 2 f0; 1g such that f(x) = `u(x). Proof. Starting in the \if" direction, suppose f(x) = `u(x). It follows from corollary 7 that f is linear. In the \only if" direction, suppose f : f0; 1gn ! f0; 1g is linear. We must show there exists some u such that f(x) = `u(x). Consider the following bit vectors, e1 = 100 ::: 0; e2 = 010 ::: 0; : : : ; en = 000 ::: 1; n where ei 2 f0; 1g . Any bit vector x = x1x2 : : : xn can be decomposed as the summation of the following unit vectors, x = x1e1 + x2e2 + ::: + xnen Here, xi acts as a scalar. Since f(x) is linear, f(x) = f(x1e1) + f(x2e2) + ::: + f(xnen) = x1f(e1) + x2f(e2) + ::: + xnf(en) n X = xiui; where ui = f(ei) i=1 = `u(x): n Corollary 10. The set Ln = f`u j u 2 f0; 1g g is the set of all linear func- tions from f0; 1gn to f0; 1g. 2.2 The Walsh-Hadamard Code The Walsh-Hadamard code is an encoding of binary strings of length n as binary strings of length 2n. The Walsh-Hadamard encoding function WH : f0; 1gn ! f0; 1g2n is defined as: Definition 11. WH(u) = `u. 5 This definition may seem counterintuitive; WH maps binary strings to bi- nary strings, but clearly `u is a function. It is useful, then, to think of WH(u) as a binary string encoding the dot product of u with every i 2 f0; 1gn. Ob- th serve that the i bit of WH(u), written WH(u)i, is equal to the dot product of u with i.
Recommended publications
  • CS601 DTIME and DSPACE Lecture 5 Time and Space Functions: T, S

    CS601 DTIME and DSPACE Lecture 5 Time and Space Functions: T, S

    CS601 DTIME and DSPACE Lecture 5 Time and Space functions: t, s : N → N+ Definition 5.1 A set A ⊆ U is in DTIME[t(n)] iff there exists a deterministic, multi-tape TM, M, and a constant c, such that, 1. A = L(M) ≡ w ∈ U M(w)=1 , and 2. ∀w ∈ U, M(w) halts within c · t(|w|) steps. Definition 5.2 A set A ⊆ U is in DSPACE[s(n)] iff there exists a deterministic, multi-tape TM, M, and a constant c, such that, 1. A = L(M), and 2. ∀w ∈ U, M(w) uses at most c · s(|w|) work-tape cells. (Input tape is “read-only” and not counted as space used.) Example: PALINDROMES ∈ DTIME[n], DSPACE[n]. In fact, PALINDROMES ∈ DSPACE[log n]. [Exercise] 1 CS601 F(DTIME) and F(DSPACE) Lecture 5 Definition 5.3 f : U → U is in F (DTIME[t(n)]) iff there exists a deterministic, multi-tape TM, M, and a constant c, such that, 1. f = M(·); 2. ∀w ∈ U, M(w) halts within c · t(|w|) steps; 3. |f(w)|≤|w|O(1), i.e., f is polynomially bounded. Definition 5.4 f : U → U is in F (DSPACE[s(n)]) iff there exists a deterministic, multi-tape TM, M, and a constant c, such that, 1. f = M(·); 2. ∀w ∈ U, M(w) uses at most c · s(|w|) work-tape cells; 3. |f(w)|≤|w|O(1), i.e., f is polynomially bounded. (Input tape is “read-only”; Output tape is “write-only”.
  • Complexity Theory Lecture 9 Co-NP Co-NP-Complete

    Complexity Theory Lecture 9 Co-NP Co-NP-Complete

    Complexity Theory 1 Complexity Theory 2 co-NP Complexity Theory Lecture 9 As co-NP is the collection of complements of languages in NP, and P is closed under complementation, co-NP can also be characterised as the collection of languages of the form: ′ L = x y y <p( x ) R (x, y) { |∀ | | | | → } Anuj Dawar University of Cambridge Computer Laboratory NP – the collection of languages with succinct certificates of Easter Term 2010 membership. co-NP – the collection of languages with succinct certificates of http://www.cl.cam.ac.uk/teaching/0910/Complexity/ disqualification. Anuj Dawar May 14, 2010 Anuj Dawar May 14, 2010 Complexity Theory 3 Complexity Theory 4 NP co-NP co-NP-complete P VAL – the collection of Boolean expressions that are valid is co-NP-complete. Any language L that is the complement of an NP-complete language is co-NP-complete. Any of the situations is consistent with our present state of ¯ knowledge: Any reduction of a language L1 to L2 is also a reduction of L1–the complement of L1–to L¯2–the complement of L2. P = NP = co-NP • There is an easy reduction from the complement of SAT to VAL, P = NP co-NP = NP = co-NP • ∩ namely the map that takes an expression to its negation. P = NP co-NP = NP = co-NP • ∩ VAL P P = NP = co-NP ∈ ⇒ P = NP co-NP = NP = co-NP • ∩ VAL NP NP = co-NP ∈ ⇒ Anuj Dawar May 14, 2010 Anuj Dawar May 14, 2010 Complexity Theory 5 Complexity Theory 6 Prime Numbers Primality Consider the decision problem PRIME: Another way of putting this is that Composite is in NP.
  • The Shrinking Property for NP and Conp✩

    The Shrinking Property for NP and Conp✩

    Theoretical Computer Science 412 (2011) 853–864 Contents lists available at ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs The shrinking property for NP and coNPI Christian Glaßer a, Christian Reitwießner a,∗, Victor Selivanov b a Julius-Maximilians-Universität Würzburg, Germany b A.P. Ershov Institute of Informatics Systems, Siberian Division of the Russian Academy of Sciences, Russia article info a b s t r a c t Article history: We study the shrinking and separation properties (two notions well-known in descriptive Received 18 August 2009 set theory) for NP and coNP and show that under reasonable complexity-theoretic Received in revised form 11 November assumptions, both properties do not hold for NP and the shrinking property does not hold 2010 for coNP. In particular we obtain the following results. Accepted 15 November 2010 Communicated by A. Razborov P 1. NP and coNP do not have the shrinking property unless PH is finite. In general, Σn and P Πn do not have the shrinking property unless PH is finite. This solves an open question Keywords: posed by Selivanov (1994) [33]. Computational complexity 2. The separation property does not hold for NP unless UP ⊆ coNP. Polynomial hierarchy 3. The shrinking property does not hold for NP unless there exist NP-hard disjoint NP-pairs NP-pairs (existence of such pairs would contradict a conjecture of Even et al. (1984) [6]). P-separability Multivalued functions 4. The shrinking property does not hold for NP unless there exist complete disjoint NP- pairs. Moreover, we prove that the assumption NP 6D coNP is too weak to refute the shrinking property for NP in a relativizable way.
  • On the Randomness Complexity of Interactive Proofs and Statistical Zero-Knowledge Proofs*

    On the Randomness Complexity of Interactive Proofs and Statistical Zero-Knowledge Proofs*

    On the Randomness Complexity of Interactive Proofs and Statistical Zero-Knowledge Proofs* Benny Applebaum† Eyal Golombek* Abstract We study the randomness complexity of interactive proofs and zero-knowledge proofs. In particular, we ask whether it is possible to reduce the randomness complexity, R, of the verifier to be comparable with the number of bits, CV , that the verifier sends during the interaction. We show that such randomness sparsification is possible in several settings. Specifically, unconditional sparsification can be obtained in the non-uniform setting (where the verifier is modelled as a circuit), and in the uniform setting where the parties have access to a (reusable) common-random-string (CRS). We further show that constant-round uniform protocols can be sparsified without a CRS under a plausible worst-case complexity-theoretic assumption that was used previously in the context of derandomization. All the above sparsification results preserve statistical-zero knowledge provided that this property holds against a cheating verifier. We further show that randomness sparsification can be applied to honest-verifier statistical zero-knowledge (HVSZK) proofs at the expense of increasing the communica- tion from the prover by R−F bits, or, in the case of honest-verifier perfect zero-knowledge (HVPZK) by slowing down the simulation by a factor of 2R−F . Here F is a new measure of accessible bit complexity of an HVZK proof system that ranges from 0 to R, where a maximal grade of R is achieved when zero- knowledge holds against a “semi-malicious” verifier that maliciously selects its random tape and then plays honestly.
  • Randomised Computation 1 TM Taking Advices 2 Karp-Lipton Theorem

    Randomised Computation 1 TM Taking Advices 2 Karp-Lipton Theorem

    INFR11102: Computational Complexity 29/10/2019 Lecture 13: More on circuit models; Randomised Computation Lecturer: Heng Guo 1 TM taking advices An alternative way to characterize P=poly is via TMs that take advices. Definition 1. For functions F : N ! N and A : N ! N, the complexity class DTime[F ]=A consists of languages L such that there exist a TM with time bound F (n) and a sequence fangn2N of “advices” satisfying: • janj ≤ A(n); • for jxj = n, x 2 L if and only if M(x; an) = 1. The following theorem explains the notation P=poly, namely “polynomial-time with poly- nomial advice”. S c Theorem 1. P=poly = c;d2N DTime[n ]=nd . Proof. If L 2 P=poly, then it can be computed by a family C = fC1;C2; · · · g of Boolean circuits. Let an be the description of Cn, andS the polynomial time machine M just reads 2 c this description and simulates it. Hence L c;d2N DTime[n ]=nd . For the other direction, if a language L can be computed in polynomial-time with poly- nomial advice, say by TM M with advices fang, then we can construct circuits fDng to simulate M, as in the theorem P ⊂ P=poly in the last lecture. Hence, Dn(x; an) = 1 if and only if x 2 L. The final circuit Cn just does exactly what Dn does, except that Cn “hardwires” the advice an. Namely, Cn(x) := Dn(x; an). Hence, L 2 P=poly. 2 Karp-Lipton Theorem Dick Karp and Dick Lipton showed that NP is unlikely to be contained in P=poly [KL80].
  • Week 1: an Overview of Circuit Complexity 1 Welcome 2

    Week 1: an Overview of Circuit Complexity 1 Welcome 2

    Topics in Circuit Complexity (CS354, Fall’11) Week 1: An Overview of Circuit Complexity Lecture Notes for 9/27 and 9/29 Ryan Williams 1 Welcome The area of circuit complexity has a long history, starting in the 1940’s. It is full of open problems and frontiers that seem insurmountable, yet the literature on circuit complexity is fairly large. There is much that we do know, although it is scattered across several textbooks and academic papers. I think now is a good time to look again at circuit complexity with fresh eyes, and try to see what can be done. 2 Preliminaries An n-bit Boolean function has domain f0; 1gn and co-domain f0; 1g. At a high level, the basic question asked in circuit complexity is: given a collection of “simple functions” and a target Boolean function f, how efficiently can f be computed (on all inputs) using the simple functions? Of course, efficiency can be measured in many ways. The most natural measure is that of the “size” of computation: how many copies of these simple functions are necessary to compute f? Let B be a set of Boolean functions, which we call a basis set. The fan-in of a function g 2 B is the number of inputs that g takes. (Typical choices are fan-in 2, or unbounded fan-in, meaning that g can take any number of inputs.) We define a circuit C with n inputs and size s over a basis B, as follows. C consists of a directed acyclic graph (DAG) of s + n + 2 nodes, with n sources and one sink (the sth node in some fixed topological order on the nodes).
  • Chapter 24 Conp, Self-Reductions

    Chapter 24 Conp, Self-Reductions

    Chapter 24 coNP, Self-Reductions CS 473: Fundamental Algorithms, Spring 2013 April 24, 2013 24.1 Complementation and Self-Reduction 24.2 Complementation 24.2.1 Recap 24.2.1.1 The class P (A) A language L (equivalently decision problem) is in the class P if there is a polynomial time algorithm A for deciding L; that is given a string x, A correctly decides if x 2 L and running time of A on x is polynomial in jxj, the length of x. 24.2.1.2 The class NP Two equivalent definitions: (A) Language L is in NP if there is a non-deterministic polynomial time algorithm A (Turing Machine) that decides L. (A) For x 2 L, A has some non-deterministic choice of moves that will make A accept x (B) For x 62 L, no choice of moves will make A accept x (B) L has an efficient certifier C(·; ·). (A) C is a polynomial time deterministic algorithm (B) For x 2 L there is a string y (proof) of length polynomial in jxj such that C(x; y) accepts (C) For x 62 L, no string y will make C(x; y) accept 1 24.2.1.3 Complementation Definition 24.2.1. Given a decision problem X, its complement X is the collection of all instances s such that s 62 L(X) Equivalently, in terms of languages: Definition 24.2.2. Given a language L over alphabet Σ, its complement L is the language Σ∗ n L. 24.2.1.4 Examples (A) PRIME = nfn j n is an integer and n is primeg o PRIME = n n is an integer and n is not a prime n o PRIME = COMPOSITE .
  • Dspace 6.X Documentation

    Dspace 6.X Documentation

    DSpace 6.x Documentation DSpace 6.x Documentation Author: The DSpace Developer Team Date: 27 June 2018 URL: https://wiki.duraspace.org/display/DSDOC6x Page 1 of 924 DSpace 6.x Documentation Table of Contents 1 Introduction ___________________________________________________________________________ 7 1.1 Release Notes ____________________________________________________________________ 8 1.1.1 6.3 Release Notes ___________________________________________________________ 8 1.1.2 6.2 Release Notes __________________________________________________________ 11 1.1.3 6.1 Release Notes _________________________________________________________ 12 1.1.4 6.0 Release Notes __________________________________________________________ 14 1.2 Functional Overview _______________________________________________________________ 22 1.2.1 Online access to your digital assets ____________________________________________ 23 1.2.2 Metadata Management ______________________________________________________ 25 1.2.3 Licensing _________________________________________________________________ 27 1.2.4 Persistent URLs and Identifiers _______________________________________________ 28 1.2.5 Getting content into DSpace __________________________________________________ 30 1.2.6 Getting content out of DSpace ________________________________________________ 33 1.2.7 User Management __________________________________________________________ 35 1.2.8 Access Control ____________________________________________________________ 36 1.2.9 Usage Metrics _____________________________________________________________
  • NP-Completeness Part I

    NP-Completeness Part I

    NP-Completeness Part I Outline for Today ● Recap from Last Time ● Welcome back from break! Let's make sure we're all on the same page here. ● Polynomial-Time Reducibility ● Connecting problems together. ● NP-Completeness ● What are the hardest problems in NP? ● The Cook-Levin Theorem ● A concrete NP-complete problem. Recap from Last Time The Limits of Computability EQTM EQTM co-RE R RE LD LD ADD HALT ATM HALT ATM 0*1* The Limits of Efficient Computation P NP R P and NP Refresher ● The class P consists of all problems solvable in deterministic polynomial time. ● The class NP consists of all problems solvable in nondeterministic polynomial time. ● Equivalently, NP consists of all problems for which there is a deterministic, polynomial-time verifier for the problem. Reducibility Maximum Matching ● Given an undirected graph G, a matching in G is a set of edges such that no two edges share an endpoint. ● A maximum matching is a matching with the largest number of edges. AA maximummaximum matching.matching. Maximum Matching ● Jack Edmonds' paper “Paths, Trees, and Flowers” gives a polynomial-time algorithm for finding maximum matchings. ● (This is the same Edmonds as in “Cobham- Edmonds Thesis.) ● Using this fact, what other problems can we solve? Domino Tiling Domino Tiling Solving Domino Tiling Solving Domino Tiling Solving Domino Tiling Solving Domino Tiling Solving Domino Tiling Solving Domino Tiling Solving Domino Tiling Solving Domino Tiling The Setup ● To determine whether you can place at least k dominoes on a crossword grid, do the following: ● Convert the grid into a graph: each empty cell is a node, and any two adjacent empty cells have an edge between them.
  • The Complexity Zoo

    The Complexity Zoo

    The Complexity Zoo Scott Aaronson www.ScottAaronson.com LATEX Translation by Chris Bourke [email protected] 417 classes and counting 1 Contents 1 About This Document 3 2 Introductory Essay 4 2.1 Recommended Further Reading ......................... 4 2.2 Other Theory Compendia ............................ 5 2.3 Errors? ....................................... 5 3 Pronunciation Guide 6 4 Complexity Classes 10 5 Special Zoo Exhibit: Classes of Quantum States and Probability Distribu- tions 110 6 Acknowledgements 116 7 Bibliography 117 2 1 About This Document What is this? Well its a PDF version of the website www.ComplexityZoo.com typeset in LATEX using the complexity package. Well, what’s that? The original Complexity Zoo is a website created by Scott Aaronson which contains a (more or less) comprehensive list of Complexity Classes studied in the area of theoretical computer science known as Computa- tional Complexity. I took on the (mostly painless, thank god for regular expressions) task of translating the Zoo’s HTML code to LATEX for two reasons. First, as a regular Zoo patron, I thought, “what better way to honor such an endeavor than to spruce up the cages a bit and typeset them all in beautiful LATEX.” Second, I thought it would be a perfect project to develop complexity, a LATEX pack- age I’ve created that defines commands to typeset (almost) all of the complexity classes you’ll find here (along with some handy options that allow you to conveniently change the fonts with a single option parameters). To get the package, visit my own home page at http://www.cse.unl.edu/~cbourke/.
  • Lecture 10: Learning DNF, AC0, Juntas Feb 15, 2007 Lecturer: Ryan O’Donnell Scribe: Elaine Shi

    Lecture 10: Learning DNF, AC0, Juntas Feb 15, 2007 Lecturer: Ryan O’Donnell Scribe: Elaine Shi

    Analysis of Boolean Functions (CMU 18-859S, Spring 2007) Lecture 10: Learning DNF, AC0, Juntas Feb 15, 2007 Lecturer: Ryan O’Donnell Scribe: Elaine Shi 1 Learning DNF in Almost Polynomial Time From previous lectures, we have learned that if a function f is ǫ-concentrated on some collection , then we can learn the function using membership queries in poly( , 1/ǫ)poly(n) log(1/δ) time.S |S| O( w ) In the last lecture, we showed that a DNF of width w is ǫ-concentrated on a set of size n ǫ , and O( w ) concluded that width-w DNFs are learnable in time n ǫ . Today, we shall improve this bound, by showing that a DNF of width w is ǫ-concentrated on O(w log 1 ) a collection of size w ǫ . We shall hence conclude that poly(n)-size DNFs are learnable in almost polynomial time. Recall that in the last lecture we introduced H˚astad’s Switching Lemma, and we showed that 1 DNFs of width w are ǫ-concentrated on degrees up to O(w log ǫ ). Theorem 1.1 (Hastad’s˚ Switching Lemma) Let f be computable by a width-w DNF, If (I, X) is a random restriction with -probability ρ, then d N, ∗ ∀ ∈ d Pr[DT-depth(fX→I) >d] (5ρw) I,X ≤ Theorem 1.2 If f is a width-w DNF, then f(U)2 ǫ ≤ |U|≥OX(w log 1 ) ǫ b O(w log 1 ) To show that a DNF of width w is ǫ-concentrated on a collection of size w ǫ , we also need the following theorem: Theorem 1.3 If f is a width-w DNF, then 1 |U| f(U) 2 20w | | ≤ XU b Proof: Let (I, X) be a random restriction with -probability 1 .
  • Theory of Computation

    Theory of Computation

    A Universal Program (4) Theory of Computation Prof. Michael Mascagni Florida State University Department of Computer Science 1 / 33 Recursively Enumerable Sets (4.4) A Universal Program (4) The Parameter Theorem (4.5) Diagonalization, Reducibility, and Rice's Theorem (4.6, 4.7) Enumeration Theorem Definition. We write Wn = fx 2 N j Φ(x; n) #g: Then we have Theorem 4.6. A set B is r.e. if and only if there is an n for which B = Wn. Proof. This is simply by the definition ofΦ( x; n). 2 Note that W0; W1; W2;::: is an enumeration of all r.e. sets. 2 / 33 Recursively Enumerable Sets (4.4) A Universal Program (4) The Parameter Theorem (4.5) Diagonalization, Reducibility, and Rice's Theorem (4.6, 4.7) The Set K Let K = fn 2 N j n 2 Wng: Now n 2 K , Φ(n; n) #, HALT(n; n) This, K is the set of all numbers n such that program number n eventually halts on input n. 3 / 33 Recursively Enumerable Sets (4.4) A Universal Program (4) The Parameter Theorem (4.5) Diagonalization, Reducibility, and Rice's Theorem (4.6, 4.7) K Is r.e. but Not Recursive Theorem 4.7. K is r.e. but not recursive. Proof. By the universality theorem, Φ(n; n) is partially computable, hence K is r.e. If K¯ were also r.e., then by the enumeration theorem, K¯ = Wi for some i. We then arrive at i 2 K , i 2 Wi , i 2 K¯ which is a contradiction.