Proceedings. Fourteenth Annual IEEE Conference on Computational Complexity (Formerly: Structure in Complexity Theory Conference) (Cat.No.99CB36317)最新文献

筛选
英文 中文
Proofs, codes, and polynomial-time reducibilities 证明,代码,和多项式时间的可约性
Ravi Kumar, D. Sivakumar
{"title":"Proofs, codes, and polynomial-time reducibilities","authors":"Ravi Kumar, D. Sivakumar","doi":"10.1109/CCC.1999.766261","DOIUrl":"https://doi.org/10.1109/CCC.1999.766261","url":null,"abstract":"We show how to construct proof systems for NP languages where a deterministic polynomial-time verifier can check membership, given any N/sup (2/3)+/spl epsi// bits of an N-bit witness of membership. We also provide a slightly superpolynomial time proof system where the verifier can check membership, given only N/sup (1/2)+/spl epsi// bits of an N-bit witness. These pursuits are motivated by the work of Gal et. al. (1997). In addition, we construct proof systems where a deterministic polynomial-time verifier can check membership, given an N-bit string that agrees with a legitimate witness on just (N/2)+N/sup (4/5)+/spl epsi// bits. Our results and framework have applications for two related areas of research in complexity theory: proof systems for NP, and the relative power of Cook reductions and Karp-Levin type reductions. Our proof techniques are based on algebraic coding theory and small sample space constructions.","PeriodicalId":432015,"journal":{"name":"Proceedings. Fourteenth Annual IEEE Conference on Computational Complexity (Formerly: Structure in Complexity Theory Conference) (Cat.No.99CB36317)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117353679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Upper semilattice of binary strings with the relation "x is simple conditional to y" 关系为“x是y的简单条件”的二元字符串的上半格
A. Muchnik, Andrei E. Romashchenko, A. Shen, N. Vereshchagin
{"title":"Upper semilattice of binary strings with the relation \"x is simple conditional to y\"","authors":"A. Muchnik, Andrei E. Romashchenko, A. Shen, N. Vereshchagin","doi":"10.1109/CCC.1999.766270","DOIUrl":"https://doi.org/10.1109/CCC.1999.766270","url":null,"abstract":"In this paper we construct a structure R that is a \"finite version\" of the semilattice of Turing degrees. Its elements are strings (technically, sequences of strings) and x/spl les/y means that K(x|)=(conditional Kolmogorov complexity of x relative to y) is small. We construct two elements in R that do not have greatest lower bound. We give a series of examples that show how natural algebraic constructions give two elements that have lower bound O (minimal element) but significant mutual information. (A first example of that kind was constructed by Gacs-Korner (1973) using completely different technique.) We define a notion of \"complexity profile\" of the pair of elements of R and give (exact) upper and lower bounds for it in a particular case.","PeriodicalId":432015,"journal":{"name":"Proceedings. Fourteenth Annual IEEE Conference on Computational Complexity (Formerly: Structure in Complexity Theory Conference) (Cat.No.99CB36317)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128517107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Deterministic amplification of space-bounded probabilistic algorithms 空间有界概率算法的确定性放大
Ziv Bar-Yossef, Oded Goldreich, A. Wigderson
{"title":"Deterministic amplification of space-bounded probabilistic algorithms","authors":"Ziv Bar-Yossef, Oded Goldreich, A. Wigderson","doi":"10.1109/CCC.1999.766276","DOIUrl":"https://doi.org/10.1109/CCC.1999.766276","url":null,"abstract":"This paper initiates the study of deterministic amplification of space-bounded probabilistic algorithms. The straightforward implementations of known amplification methods cannot be used for such algorithms, since they consume too much space. We present a new implementation of the Ajtai-Komlos-Szemeredi method, that enables to amplify an S-space algorithm that uses r random bits and errs with probability /spl epsiv/ to an O(kS)-space algorithm that uses r+O(k) random bits and errs with probability /spl epsiv//sup /spl Omega/(k)/. This method can be used to reduce the error probability of BPL algorithms below any constant, with only a constant addition of new random bits. This is weaker than the exponential reduction that can be achieved for BPP algorithms by methods that use only O(r) random bits. However we prove that any black-box amplification method that uses O(r) random bits and makes at most p parallel simulations reduces the error to at most /spl epsiv//sup O(p)/. Hence, in BPL, where p should be a constant, the error cannot be reduced to less than a constant. This means that our method is optimal with respect to black-box amplification methods, that use O(r) random bits. The new implementation of the AKS method is based on explicit constructions of constant-space online extractors and online expanders. These are extractors and expanders, for which neighborhoods can be computed in a constant space by a Turing machine with a one-way input tape.","PeriodicalId":432015,"journal":{"name":"Proceedings. Fourteenth Annual IEEE Conference on Computational Complexity (Formerly: Structure in Complexity Theory Conference) (Cat.No.99CB36317)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127764122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
On monotone planar circuits 单调平面电路
D. A. Barrington, Chi-Jen Lu, Peter Bro Miltersen, Sven Skyum
{"title":"On monotone planar circuits","authors":"D. A. Barrington, Chi-Jen Lu, Peter Bro Miltersen, Sven Skyum","doi":"10.1109/CCC.1999.766259","DOIUrl":"https://doi.org/10.1109/CCC.1999.766259","url":null,"abstract":"In this paper we show several results about monotone planar circuits. We show that monotone planar circuits of bounded width, with access to negated input variables, compute exactly the functions in non-uniform AC/sup 0/. This provides a striking contrast to the non-planar case, where exactly NC/sup 1/ is computed. We show that the circuit value problem for monotone planar circuits, with inputs on the outerface only, can be solved in LOGDCFL/spl sube/SC, improving a LOGCFL upper bound due to Dymond and Cook. We show that for monotone planar circuits, with inputs on the outerface only, excessive depth compared to width is useless; any function computed by a monotone planar circuit of width w with inputs on the outerface can be computed by a monotone planar circuit of width O(w) and depth w/sup O(1)/. Finally, we show that monotone planar read-once circuits, with inputs on the outerface only, can be efficiently learned using membership queries.","PeriodicalId":432015,"journal":{"name":"Proceedings. Fourteenth Annual IEEE Conference on Computational Complexity (Formerly: Structure in Complexity Theory Conference) (Cat.No.99CB36317)","volume":"06 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128729078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Some recent progress on the complexity of lattice problems 关于格问题复杂性的一些最新进展
Jin-Yi Cai
{"title":"Some recent progress on the complexity of lattice problems","authors":"Jin-Yi Cai","doi":"10.1109/CCC.1999.766274","DOIUrl":"https://doi.org/10.1109/CCC.1999.766274","url":null,"abstract":"We survey some recent developments in the study of the complexity of lattice problems. After a discussion of some problems on lattices which can be algorithmically solved efficiently, our main focus is the recent progress on complexity results of intractability. We discuss Ajtai's worst-case/average-case connections, NP-hardness and non-NP-hardness, transference theorems between primal and dual lattices, and the Ajtai-Dwork cryptosystem.","PeriodicalId":432015,"journal":{"name":"Proceedings. Fourteenth Annual IEEE Conference on Computational Complexity (Formerly: Structure in Complexity Theory Conference) (Cat.No.99CB36317)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133698679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Applications of a new transference theorem to Ajtai's connection factor 一个新的转移定理在Ajtai连接因子中的应用
Jin-Yi Cai
{"title":"Applications of a new transference theorem to Ajtai's connection factor","authors":"Jin-Yi Cai","doi":"10.1109/CCC.1999.766278","DOIUrl":"https://doi.org/10.1109/CCC.1999.766278","url":null,"abstract":"We apply a new transference theorem from the geometry of numbers to Ajtai's connection of average-case to worst-case complexity of lattice problems. We also derive stronger bounds for the special class of lattices which possess n/sup /spl epsiv//-unique shortest lattice vectors. This class of lattices plays a significant role in Ajtai's connection of average-case to worst-case complexity of the shortest lattice vector problem, and in the Ajtai-Dwork public-key cryptosystem. Our proofs are non-constructive, based on methods from harmonic analysis. They yield currently the best Ajtai connection factors.","PeriodicalId":432015,"journal":{"name":"Proceedings. Fourteenth Annual IEEE Conference on Computational Complexity (Formerly: Structure in Complexity Theory Conference) (Cat.No.99CB36317)","volume":"3 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123873428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A lower bound for primality 原数的下界
E. Allender, M. Saks, I. Shparlinski
{"title":"A lower bound for primality","authors":"E. Allender, M. Saks, I. Shparlinski","doi":"10.1109/CCC.1999.766257","DOIUrl":"https://doi.org/10.1109/CCC.1999.766257","url":null,"abstract":"Recent work by Bernasconi, Damm and Shparlinski proved lower bounds on the circuit complexity of the square-free numbers, and raised as an open question if similar (or stronger) lower bounds could be proved for the set of prime numbers. In this short note, we answer this question affirmatively, by showing that the set of prime numbers (represented in the usual binary notation) is not contained in AC/sup 0/ [p] for any prime p. Similar lower bounds are presented for the set of square-free numbers, and for the problem of computing the greatest common divisor of two numbers.","PeriodicalId":432015,"journal":{"name":"Proceedings. Fourteenth Annual IEEE Conference on Computational Complexity (Formerly: Structure in Complexity Theory Conference) (Cat.No.99CB36317)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114667840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Comparing entropies in statistical zero knowledge with applications to the structure of SZK 统计零知识中的熵与SZK结构的应用比较
Oded Goldreich, S. Vadhan
{"title":"Comparing entropies in statistical zero knowledge with applications to the structure of SZK","authors":"Oded Goldreich, S. Vadhan","doi":"10.1109/CCC.1999.766262","DOIUrl":"https://doi.org/10.1109/CCC.1999.766262","url":null,"abstract":"We consider the following (promise) problem, denoted ED (for Entropy Difference): The input is a pair of circuits, and YES instances (resp., NO instances) are such pairs in which the first (resp., second) circuit generates a distribution with noticeably higher entropy. On one hand we show that any language having a (honest-verifier) statistical zero-knowledge proof is Karp-reducible to ED. On the other hand, we present a public-coin (honest-verifier) statistical zero-knowledge proof for ED. Thus, we obtain an alternative proof of Okamoto's result by which HVSZK: (i.e., honest-verifier statistical zero knowledge) equals public-coin HVSZK. The new proof is much simpler than the original one. The above also yields a trivial proof that HVSZK: is closed under complementation (since ED easily reduces to its complement). Among the new results obtained is an equivalence of a weak notion of statistical zero knowledge to the standard one.","PeriodicalId":432015,"journal":{"name":"Proceedings. Fourteenth Annual IEEE Conference on Computational Complexity (Formerly: Structure in Complexity Theory Conference) (Cat.No.99CB36317)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122595380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 90
Complicated complementations 复杂的互补
H. Buhrman, L. Torenvliet
{"title":"Complicated complementations","authors":"H. Buhrman, L. Torenvliet","doi":"10.1109/CCC.1999.766281","DOIUrl":"https://doi.org/10.1109/CCC.1999.766281","url":null,"abstract":"Kolmogorov complexity has proven to be a very useful tool in simplifying and improving proofs that use complicated combinatorial arguments. Using Kolmogorov complexity for oracle construction, we obtain separation results that are much stronger than separations obtained previously even with the use of very complicated combinatorial arguments. Moreover the use of Kolmogorov arguments almost trivializes the construction itself: In particular we construct relativized worlds where: 1. NP/spl cap/CoNP/spl isin/P/poly. 2. NP has a set that is both simple and NP/spl cap/CoNP-immune. 3. CoNP has a set that is both simple and NP/spl cap/CoNP-immune. 4. /spl Pi//sub 2//sup p/ has a set that is both simple and /spl Pi//sub 2//sup p//spl cap//spl Sigma//sup 2p/-immune.","PeriodicalId":432015,"journal":{"name":"Proceedings. Fourteenth Annual IEEE Conference on Computational Complexity (Formerly: Structure in Complexity Theory Conference) (Cat.No.99CB36317)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126590524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Short proofs are narrow-resolution made simple 简短的证明是将小分辨率变得简单
Eli Ben-Sasson, A. Wigderson
{"title":"Short proofs are narrow-resolution made simple","authors":"Eli Ben-Sasson, A. Wigderson","doi":"10.1145/375827.375835","DOIUrl":"https://doi.org/10.1145/375827.375835","url":null,"abstract":"We develop a general strategy for proving width lower bounds, which follows Haken's original proof technique but is now simple and clear. It reveals that large width is implied by certain natural expansion properties of the clauses (axioms) of the tautology in question. We show that in the classical examples of the Pigeonhole principle, Tseitin graph tautologies, and random k-CNFs, these expansion properties are quite simple to prove. We further illustrate the power of this approach by proving new exponential lower bounds to two different restricted versions of the pigeon-hole principle. One restriction allows the encoding of the principle to use arbitrarily many extension variables in a structured way. The second restriction allows every pigeon to choose a hole from some constant size set of holes.","PeriodicalId":432015,"journal":{"name":"Proceedings. Fourteenth Annual IEEE Conference on Computational Complexity (Formerly: Structure in Complexity Theory Conference) (Cat.No.99CB36317)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134125529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 534
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信