Interactive Proofs

Interactive Proofs

Interactive Proofs Lecture 19 And Beyond 1 So far 2 So far IP = PSPACE = AM[poly] 2 So far IP = PSPACE = AM[poly] PSPACE enough to calculate max Pr[yes] 2 So far IP = PSPACE = AM[poly] PSPACE enough to calculate max Pr[yes] AM[poly] protocol for TQBF using arithmetization 2 So far IP = PSPACE = AM[poly] PSPACE enough to calculate max Pr[yes] AM[poly] protocol for TQBF using arithmetization In fact IP[k] ⊆ AM[k+2] for all k(n) 2 So far IP = PSPACE = AM[poly] PSPACE enough to calculate max Pr[yes] AM[poly] protocol for TQBF using arithmetization In fact IP[k] ⊆ AM[k+2] for all k(n) Using a public-coin set lower-bound proof 2 So far IP = PSPACE = AM[poly] PSPACE enough to calculate max Pr[yes] AM[poly] protocol for TQBF using arithmetization In fact IP[k] ⊆ AM[k+2] for all k(n) Using a public-coin set lower-bound proof AM[k] = AM for constant k ≥ 2 2 So far IP = PSPACE = AM[poly] PSPACE enough to calculate max Pr[yes] AM[poly] protocol for TQBF using arithmetization In fact IP[k] ⊆ AM[k+2] for all k(n) Using a public-coin set lower-bound proof AM[k] = AM for constant k ≥ 2 Using MA ⊆ AM and alternate characterization in terms of pairs of complementary ATTMs 2 So far IP = PSPACE = AM[poly] PSPACE enough to calculate max Pr[yes] AM[poly] protocol for TQBF using arithmetization In fact IP[k] ⊆ AM[k+2] for all k(n) Using a public-coin set lower-bound proof AM[k] = AM for constant k ≥ 2 Using MA ⊆ AM and alternate characterization in terms of pairs of complementary ATTMs Perfect completeness: One-sided-error-AM = AM 2 So far IP = PSPACE = AM[poly] PSPACE enough to calculate max Pr[yes] AM[poly] protocol for TQBF using arithmetization In fact IP[k] ⊆ AM[k+2] for all k(n) Using a public-coin set lower-bound proof AM[k] = AM for constant k ≥ 2 Using MA ⊆ AM and alternate characterization in terms of pairs of complementary ATTMs Perfect completeness: One-sided-error-AM = AM P Similar to BPP ⊆ Σ2 (yields MAM protocol; MAM=AM) 2 P AM ⊆ Π2 3 P AM ⊆ Π2 Consider any L with an AM protocol 3 P AM ⊆ Π2 Consider any L with an AM protocol By perfect completeness: 3 P AM ⊆ Π2 Consider any L with an AM protocol By perfect completeness: x∈L ⇒ ∀ yArthur ∃ zMerlin R(x,yArthur,zMerlin) = 1 3 P AM ⊆ Π2 Consider any L with an AM protocol By perfect completeness: x∈L ⇒ ∀ yArthur ∃ zMerlin R(x,yArthur,zMerlin) = 1 And by (any positive) soundness: 3 P AM ⊆ Π2 Consider any L with an AM protocol By perfect completeness: x∈L ⇒ ∀ yArthur ∃ zMerlin R(x,yArthur,zMerlin) = 1 And by (any positive) soundness: x∉L ⇒ ∃ yArthur ∀ zMerlin R(x,yArthur,zMerlin) = 0 3 P AM ⊆ Π2 Consider any L with an AM protocol By perfect completeness: x∈L ⇒ ∀ yArthur ∃ zMerlin R(x,yArthur,zMerlin) = 1 And by (any positive) soundness: x∉L ⇒ ∃ yArthur ∀ zMerlin R(x,yArthur,zMerlin) = 0 i.e., x∈L ⇔ ∀y ∃z R(x,y,z) = 1 3 P AM ⊆ Π2 Consider any L with an AM protocol By perfect completeness: x∈L ⇒ ∀ yArthur ∃ zMerlin R(x,yArthur,zMerlin) = 1 And by (any positive) soundness: x∉L ⇒ ∃ yArthur ∀ zMerlin R(x,yArthur,zMerlin) = 0 i.e., x∈L ⇔ ∀y ∃z R(x,y,z) = 1 P Similarly, MA ⊆ Σ2 3 AM and coNP 4 AM and coNP If coNP ⊆ AM, then PH collapses to level 2 4 AM and coNP If coNP ⊆ AM, then PH collapses to level 2 P P Will show coNP ⊆ AM ⇒ Σ2 ⊆ AM ⊆ Π2 4 AM and coNP If coNP ⊆ AM, then PH collapses to level 2 P P Will show coNP ⊆ AM ⇒ Σ2 ⊆ AM ⊆ Π2 P L ∈ Σ2 : { x| ∃y (x,y) ∈ L’} where L’ ∈ coNP 4 AM and coNP If coNP ⊆ AM, then PH collapses to level 2 P P Will show coNP ⊆ AM ⇒ Σ2 ⊆ AM ⊆ Π2 P L ∈ Σ2 : { x| ∃y (x,y) ∈ L’} where L’ ∈ coNP MAM protocol for L: Merlin sends y, and then they run an AM protocol for (x,y) ∈ L’ 4 AM and coNP If coNP ⊆ AM, then PH collapses to level 2 P P Will show coNP ⊆ AM ⇒ Σ2 ⊆ AM ⊆ Π2 P L ∈ Σ2 : { x| ∃y (x,y) ∈ L’} where L’ ∈ coNP MAM protocol for L: Merlin sends y, and then they run an AM protocol for (x,y) ∈ L’ But MAM = AM 4 AM and coNP If coNP ⊆ AM, then PH collapses to level 2 P P Will show coNP ⊆ AM ⇒ Σ2 ⊆ AM ⊆ Π2 P L ∈ Σ2 : { x| ∃y (x,y) ∈ L’} where L’ ∈ coNP MAM protocol for L: Merlin sends y, and then they run an AM protocol for (x,y) ∈ L’ But MAM = AM Corollary: If GI is NP-complete, PH collapses (recall GNI ∈ AM) 4 AM and coNP ⊆ If coNP AM, then PH collapses to level 2 BPP NP coNP P P Will show coNP ⊆ AM ⇒ Σ2 ⊆ AM ⊆ Π2 P P L ∈ Σ2 : { x| ∃y (x,y) ∈ L’} where L’ ∈ coNP MAM protocol for L: Merlin sends y, and then they run an AM protocol for (x,y) ∈ L’ But MAM = AM Corollary: If GI is NP-complete, PH collapses (recall GNI ∈ AM) 4 AM and coNP ⊆ AM If coNP AM, then PH collapses to level 2 BPP NP coNP P P Will show coNP ⊆ AM ⇒ Σ2 ⊆ AM ⊆ Π2 P P L ∈ Σ2 : { x| ∃y (x,y) ∈ L’} where L’ ∈ coNP MAM protocol for L: Merlin sends y, and then they run an AM protocol for (x,y) ∈ L’ But MAM = AM Corollary: If GI is NP-complete, PH collapses (recall GNI ∈ AM) 4 Zoo NEXP EXP IP PSPACE P P Σ2 Π2 MA AM NP BPP RP P L 5 Program Checking 6 Program Checking Suppose a special computer (using nano-bio-quantum technology!) is being sold for solving Graph Non-Isomorphism (GNI) efficiently 6 Program Checking Suppose a special computer (using nano-bio-quantum technology!) is being sold for solving Graph Non-Isomorphism (GNI) efficiently How do we trust this? 6 Program Checking Suppose a special computer (using nano-bio-quantum technology!) is being sold for solving Graph Non-Isomorphism (GNI) efficiently How do we trust this? Vendor: Trust me, this always works 6 Program Checking Suppose a special computer (using nano-bio-quantum technology!) is being sold for solving Graph Non-Isomorphism (GNI) efficiently How do we trust this? Vendor: Trust me, this always works User: In fact I just care if it works correctly on the inputs I want to solve. Maybe for each input I have, your machine could prove correctness using an IP protocol? 6 Program Checking Suppose a special computer (using nano-bio-quantum technology!) is being sold for solving Graph Non-Isomorphism (GNI) efficiently How do we trust this? Vendor: Trust me, this always works User: In fact I just care if it works correctly on the inputs I want to solve. Maybe for each input I have, your machine could prove correctness using an IP protocol? Vendor: But I don’t have a (nano-bio-quantum) implementation of the prover’s program... 6 Program Checking 7 Program Checking Program checker 7 Program Checking Program checker User 7 Program Checking Program checker P User 7 Program Checking Program checker x checker P User 7 Program Checking Program checker x checker P User 7 Program Checking Program checker x checker P User 7 Program Checking Program checker x checker P User f(x) or P≠f 7 Program Checking Program checker On each input, either ensures (w.h.p) that P’s output is correct, or finds out that P≠f, efficiently x checker P User f(x) or P≠f 7 Program Checking Program checker On each input, either ensures (w.h.p) that P’s output is correct, or finds out that P≠f, efficiently x Completeness: Vendor need not checker fear being falsely accused P User f(x) or P≠f 7 Program Checking Program checker On each input, either ensures (w.h.p) that P’s output is correct, or finds out that P≠f, efficiently x Completeness: Vendor need not checker fear being falsely accused P User f(x) or P≠f Soundness: User need not fear using a wrong value as f(x) 7 Program Checking Program checker On each input, either ensures (w.h.p) that P’s output is correct, or finds out that P≠f, efficiently x Completeness: Vendor need not checker fear being falsely accused P User f(x) or P≠f Soundness: User need not fear using a wrong value as f(x) Will consider boolean f (i.e., a language L) 7 Program Checking and IP x P User f(x) or P≠f 8 Program Checking and IP PC for L from IP protocols (for L and Lc) x P User f(x) or P≠f 8 Program Checking and IP PC for L from IP protocols (for L and Lc) Prover Verifier x P User f(x) or P≠f 8 Program Checking and IP PC for L from IP protocols (for L and Lc) PC must be efficient. Provers may not be Prover Verifier x P User f(x) or P≠f 8 Program Checking and IP PC for L from IP protocols (for L and Lc) PC must be efficient. Provers may not be Prover Verifier If provers (for L and Lc) are efficient given L-oracle, can construct PC! x P User f(x) or P≠f 8 Program Checking and IP PC for L from IP protocols (for L and Lc) PC must be efficient.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    115 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us