CS151 Complexity Theory Lecture 15 May 18, 2004. CS151 Lecture 152 Outline IP = PSPACE Arthur-Merlin games –classes MA, AM Optimization, Approximation,

Slides:



Advertisements
Similar presentations
A threshold of ln(n) for approximating set cover By Uriel Feige Lecturer: Ariel Procaccia.
Advertisements

Complexity Theory Lecture 9 Lecturer: Moni Naor. Recap Last week: –Toda’s Theorem: PH  P #P. –Program checking and hardness on the average of the permanent.
An Introduction to Computational Complexity Edith Elkind IAM, ECS.
IP=PSPACE Nikhil Srivastava CPSC 468/568. Outline IP Warmup: coNP  IP by arithmetization PSPACE (wrong) attempt at PSPACE  IP (revised) PSPACE  IP.
Theory of Computing Lecture 18 MAS 714 Hartmut Klauck.
The Theory of NP-Completeness
1 NP-Complete Problems. 2 We discuss some hard problems:  how hard? (computational complexity)  what makes them hard?  any solutions? Definitions 
Dana Moshkovitz. Back to NP L  NP iff members have short, efficiently checkable, certificates of membership. Is  satisfiable?  x 1 = truex 11 = true.
Umans Complexity Theory Lectures Lecture 15: Approximation Algorithms and Probabilistically Checkable Proofs (PCPs)
PCPs and Inapproximability Introduction. My T. Thai 2 Why Approximation Algorithms  Problems that we cannot find an optimal solution.
Complexity 16-1 Complexity Andrei Bulatov Non-Approximability.
CSC5160 Topics in Algorithms Tutorial 2 Introduction to NP-Complete Problems Feb Jerry Le
Complexity 26-1 Complexity Andrei Bulatov Interactive Proofs.
Introduction to Approximation Algorithms Lecture 12: Mar 1.
Complexity 18-1 Complexity Andrei Bulatov Probabilistic Algorithms.
CS151 Complexity Theory Lecture 6 April 15, 2015.
CS21 Decidability and Tractability
February 23, 2015CS21 Lecture 201 CS21 Decidability and Tractability Lecture 20 February 23, 2015.
CS151 Complexity Theory Lecture 7 April 20, 2004.
1 Adapted from Oded Goldreich’s course lecture notes.
1 Optimization problems such as MAXSAT, MIN NODE COVER, MAX INDEPENDENT SET, MAX CLIQUE, MIN SET COVER, TSP, KNAPSACK, BINPACKING do not have a polynomial.
CS151 Complexity Theory Lecture 12 May 6, CS151 Lecture 122 Outline The Polynomial-Time Hierarachy (PH) Complete problems for classes in PH, PSPACE.
NP-Complete Problems Reading Material: Chapter 10 Sections 1, 2, 3, and 4 only.
1 CSE 417: Algorithms and Computational Complexity Winter 2001 Lecture 23 Instructor: Paul Beame.
Analysis of Algorithms CS 477/677
Computability and Complexity 24-1 Computability and Complexity Andrei Bulatov Approximation.
CS151 Complexity Theory Lecture 13 May 11, CS151 Lecture 132 Outline Natural complete problems for PH and PSPACE proof systems interactive proofs.
CS151 Complexity Theory Lecture 6 April 15, 2004.
Lecture 20: April 12 Introduction to Randomized Algorithms and the Probabilistic Method.
CS151 Complexity Theory Lecture 16 May 25, CS151 Lecture 162 Outline approximation algorithms Probabilistically Checkable Proofs elements of the.
The Theory of NP-Completeness 1. Nondeterministic algorithms A nondeterminstic algorithm consists of phase 1: guessing phase 2: checking If the checking.
1 The Theory of NP-Completeness 2012/11/6 P: the class of problems which can be solved by a deterministic polynomial algorithm. NP : the class of decision.
Nattee Niparnan. Easy & Hard Problem What is “difficulty” of problem? Difficult for computer scientist to derive algorithm for the problem? Difficult.
APPROXIMATION ALGORITHMS VERTEX COVER – MAX CUT PROBLEMS
1 Introduction to Approximation Algorithms. 2 NP-completeness Do your best then.
CS151 Complexity Theory Lecture 13 May 11, Outline proof systems interactive proofs and their power Arthur-Merlin games.
1 Interactive Proofs proof systems interactive proofs and their power Arthur-Merlin games.
Approximation Algorithms
Week 10Complexity of Algorithms1 Hard Computational Problems Some computational problems are hard Despite a numerous attempts we do not know any efficient.
EMIS 8373: Integer Programming NP-Complete Problems updated 21 April 2009.
CS151 Complexity Theory Lecture 14 May 13, Arthur-Merlin Games IP permits verifier to keep coin-flips private –necessary feature? –GNI protocol.
CSCI 3160 Design and Analysis of Algorithms Tutorial 10 Chengyu Lin.
CS151 Complexity Theory Lecture 12 May 6, QSAT is PSPACE-complete Theorem: QSAT is PSPACE-complete. Proof: 8 x 1 9 x 2 8 x 3 … Qx n φ(x 1, x 2,
Interactive proof systems Section 10.4 Giorgi Japaridze Theory of Computability.
NP-Complete Problems. Running Time v.s. Input Size Concern with problems whose complexity may be described by exponential functions. Tractable problems.
Fall 2013 CMU CS Computational Complexity Lecture 7 Alternating Quantifiers, PH, PSPACE. These slides are mostly a resequencing of Chris Umans’
Lecture 6 NP Class. P = ? NP = ? PSPACE They are central problems in computational complexity.
CS6045: Advanced Algorithms NP Completeness. NP-Completeness Some problems are intractable: as they grow large, we are unable to solve them in reasonable.
CS151 Complexity Theory Lecture 16 May 20, The outer verifier Theorem: NP  PCP[log n, polylog n] Proof (first steps): –define: Polynomial Constraint.
Probabilistic verification Mario Szegedy, Rutgers www/cs.rutgers.edu/~szegedy/07540 Lecture 1.
NP Completeness Piyush Kumar. Today Reductions Proving Lower Bounds revisited Decision and Optimization Problems SAT and 3-SAT P Vs NP Dealing with NP-Complete.
CSC 413/513: Intro to Algorithms
Complexity 24-1 Complexity Andrei Bulatov Interactive Proofs.
The Theory of NP-Completeness 1. Nondeterministic algorithms A nondeterminstic algorithm consists of phase 1: guessing phase 2: checking If the checking.
COSC 3101A - Design and Analysis of Algorithms 14 NP-Completeness.
CS151 Complexity Theory Lecture 15 May 18, Gap producing reductions Main purpose: –r-approximation algorithm for L 2 distinguishes between f(yes)
Complexity 27-1 Complexity Andrei Bulatov Interactive Proofs (continued)
Approximation algorithms
More NP-Complete and NP-hard Problems
P & NP.
Probabilistic Algorithms
CS21 Decidability and Tractability
CS151 Complexity Theory Lecture 13 May 15, 2017.
Interactive Proofs Adapted from Oded Goldreich’s course lecture notes.
Approximation Algorithms
Interactive Proofs Adapted from Oded Goldreich’s course lecture notes.
Interactive Proofs Adapted from Oded Goldreich’s course lecture notes.
Umans Complexity Theory Lectures
Instructor: Aaron Roth
Interactive Proofs Adapted from Oded Goldreich’s course lecture notes.
Presentation transcript:

CS151 Complexity Theory Lecture 15 May 18, 2004

CS151 Lecture 152 Outline IP = PSPACE Arthur-Merlin games –classes MA, AM Optimization, Approximation, and Probabilistically Checkable Proofs

May 18, 2004CS151 Lecture 153 Shamir’s Theorem Theorem: IP = PSPACE –Note: IP  PSPACE enumerate all possible interactions, explicitly calculate acceptance probability interaction extremely powerful ! An implication : you can interact with master player of Generalized Geography and determine if she can win from the current configuration even if you do not have the power to compute optimal moves!

May 18, 2004CS151 Lecture 154 Shamir’s Theorem need to prove PSPACE  IP –use same protocol as for coNP –some modifications needed

May 18, 2004CS151 Lecture 155 Shamir’s Theorem protocol for QSAT –arithmetization step produces arithmetic expression p φ : (  x i ) φ  Σ x i = 0, 1 p φ (  x i ) φ  ∏ x i = 0, 1 p φ –start with QSAT formula in special form (“simple”) no occurrence of x i separated by more than one “  ” from point of quantification

May 18, 2004CS151 Lecture 156 Shamir’s Theorem –quantified Boolean expression φ is true if and only if p φ > 0 –Problem: ∏’s may cause p φ > 2 2 |φ| –Solution: evaluate mod 2 n  q  2 3n –prover sends “good” q in first round “good” q is one for which p φ mod q > 0 –Claim: good q exists # primes in range is at least 2 n

May 18, 2004CS151 Lecture 157 The QSAT protocol ProverVerifier input: φ p 1 (0)+p 1 (1) = k? or p 1 (0)p 1 (1) = k? pick random z 1 in F q p 1 (x): remove outer Σ or ∏ from p φ k, q, p 1 (x) z1z1 p 2 (x): remove outer Σ or ∏ from p φ [x 1  z 1 ] p 2 (x) z2z2 p 2 (0)+p 2 (1)=p 1 (z 1 )? or p 2 (0)p 2 (1) = p 1 (z 1 )? pick random z 2 in F q p 3 (x): remove outer Σ or ∏ from p φ [x 1  z 1, x 2  z 2 ] p 3 (x) p n (x) p n (0)+p n (1)=p n-1 (z n-1 )? or p n (0)p n (1) = p n-1 (z n-1 )? pick random z n in F q p n (z n ) = p φ [x 1  z 1,…, x n  z n ].

May 18, 2004CS151 Lecture 158 Analysis of the QSAT protocol Completeness: –if φ  QSAT then honest prover on previous slide will always cause verifier to accept

May 18, 2004CS151 Lecture 159 Analysis of the QSAT protocol Soundness: –let p i (x) be the correct polynomials –let p i *(x) be the polynomials sent by (cheating) prover –φ  QSAT  0 = p 1 (0) +/x p 1 (1) ≠ k –either p 1 *(0) +/x p 1 *(1) ≠ k (and V rejects) –or p 1 * ≠ p 1  Pr z 1 [p 1 *(z 1 ) = p 1 (z 1 )]  2|φ|/2 n –assume (p i+1 (0) +/x p i+1 (1)=) p i (z i ) ≠ p i *(z i ) –either p i+1 *(0) +/x p i+1 *(1) ≠ p i *(z i ) (and V rejects) –or p i+1 * ≠ p i+1  Pr z i+1 [p i+1 *(z i+1 ) = p i+1 (z i+1 )]  2|φ|/2 n φ is “simple”

May 18, 2004CS151 Lecture 1510 Analysis of protocol Soundness (continued): –if verifier does not reject, there must be some i for which: p i * ≠ p i and yet p i *(z i ) = p i (z i ) –for each i, probability is  2|φ|/2 n –union bound: probability that there exists an i for which the bad event occurs is  2n|φ|/2 n  poly(n)/2 n << 1/3 Conclude: QSAT is in IP

May 18, 2004CS151 Lecture 1511 Example Papadimitriou – pp φ =  x  y(x  y)   z((x  z)  (y  z))   w(z  (y  w)) p φ = ∏ x=0,1 Σ y=0,1 [(x + y) * ∏ z=0,1 [(xz + y(1-z)) + Σ w=0,1 (z + y(1-w))]] (p φ = 96 but V doesn’t know that yet !)

May 18, 2004CS151 Lecture 1512 Example p φ = ∏ x=0,1 Σ y=0,1 [(x + y) * ∏ z=0,1 [(xz + y(1-z)) + Σ w=0,1 (z + y(1-w))]] Round 1: (prover claims p φ > 0) –prover sends q = 13; claims p φ = 96 mod 13 = 5; sends k = 5 –prover removes outermost “∏”; sends p 1 (x) = 2x 2 + 8x + 6 –verifier checks: p 1 (0)p 1 (1) = (6)(16) = 96  5 (mod 13) –verifier picks randomly: z 1 = 9

May 18, 2004CS151 Lecture 1513 Example φ =  x  y(x  y)   z((x  z)  (y  z))   w(z  (y  w)) p φ = ∏ x=0,1 Σ y=0,1 [(x + y) * ∏ z=0,1 [(xz + y(1-z)) + Σ w=0,1 (z + y(1-w))]] p φ [x  9] = Σ y=0,1 [(9 + y) * ∏ z=0,1 [(9z + y(1-z)) + Σ w=0,1 (z + y(1-w))]]

May 18, 2004CS151 Lecture 1514 Example p 1 (9) = Σ y=0,1 [(9 + y) * ∏ z=0,1 [(9z + y(1-z)) + Σ w=0,1 (z + y(1-w))]] Round 2: (prover claims this = 6) –prover removes outermost “Σ”; sends p 2 (y) = 2y 3 + y 2 + 3y –verifier checks: p 2 (0) + p 2 (1) = = 6  6 (mod 13) –verifier picks randomly: z 2 = 3

May 18, 2004CS151 Lecture 1515 Example φ =  x  y(x  y)   z((x  z)  (y  z))   w(z  (y  w)) p φ = ∏ x=0,1 Σ y=0,1 [(x + y) * ∏ z=0,1 [(xz + y(1-z)) + Σ w=0,1 (z + y(1-w))]] p φ [x  9, y  3] = [(9 + 3) * ∏ z=0,1 [(9z + 3(1-z)) + Σ w=0,1 (z + 3(1-w))]]

May 18, 2004CS151 Lecture 1516 Example p 2 (3) = [(9 + 3) * ∏ z=0,1 [(9z + 3(1-z)) + Σ w=0,1 (z + 3(1-w))]] Round 3: (prover claims this = 7) –everyone agrees expression = 12*(…) –prover removes outermost “∏”; sends p 3 (z) = 8z + 6 –verifier checks: p 3 (0) * p 3 (1) = (6)(14) = 84; 12*84  7 (mod 13) –verifier picks randomly: z 3 = 7

May 18, 2004CS151 Lecture 1517 Example φ =  x  y(x  y)   z((x  z)  (y  z))   w(z  (y  w)) p φ = ∏ x=0,1 Σ y=0,1 [(x + y) * ∏ z=0,1 [(xz + y(1-z)) + Σ w=0,1 (z + y(1-w))]] p φ [x  9, y  3, z  7] = 12 * [(9*7 + 3(1-7)) + Σ w=0,1 (7 + 3(1-w))]

May 18, 2004CS151 Lecture 1518 Example 12*p 3 (7) = 12 * [(9*7 + 3(1-7)) + Σ w=0,1 (7 + 3(1-w))] Round 4: (prover claims = 12*10) –everyone agrees expression = 12*[6+(…)] –prover removes outermost “Σ”; sends p 4 (w) = 10w + 10 –verifier checks: p 4 (0)+p 4 (1) = = 30; 12*[6+30]  12*10 (mod 13) –verifier picks randomly: z 4 = 2 –Final check: 12*[(9*7+3(1-7))+(7+3(1-2))] = 12*[6+p 4 (2)] = 12*[6+30]

May 18, 2004CS151 Lecture 1519 Arthur-Merlin Games IP permits verifier to keep coin-flips private –necessary feature? –GNI protocol breaks without it Arthur-Merlin game: interactive protocol in which coin-flips are public –Arthur (verifier) may as well just send results of coin-flips and ask Merlin (prover) to perform any computation he would have done

May 18, 2004CS151 Lecture 1520 Arthur-Merlin Games Clearly Arthur-Merlin  IP –“private coins are at least as powerful as public coins” Proof that IP = PSPACE actually shows PSPACE  Arthur-Merlin  IP  PSPACE –“public coins are at least as powerful as private coins” !

May 18, 2004CS151 Lecture 1521 Arthur-Merlin Games Delimiting # of rounds: –AM[k] = Arthur-Merlin game with k rounds, Arthur (verifier) goes first –MA[k] = Arthur-Merlin game with k rounds, Merlin (prover) goes first Theorem: AM[k] (MA[k]) equals AM[k] (MA[k]) with perfect completeness. – i.e., x  L implies accept with probability 1 –we will not prove

May 18, 2004CS151 Lecture 1522 Arthur-Merlin Games Theorem: for all constant k  2 AM[k] = AM[2]. Proof: –we show MA[2]  AM[2] –implies can move all of Arthur’s messages to beginning of interaction: AMAMAM…AM = AAMMAM…AM … = AAA…AMMM…M

May 18, 2004CS151 Lecture 1523 Arthur-Merlin Games Proof (continued): –given L  MA[2] x  L   m Pr r [(x, m, r)  R] = 1  Pr r [  m (x, m, r)  R] = 1 x  L   m Pr r [(x, m, r)  R]  ε  Pr r [  m (x, m, r)  R]  2 |m| ε –by repeating t times with independent random strings r, can make error ε < 2 -t –set t = m+1 to get 2 |m| ε < ½. order reversed

May 18, 2004CS151 Lecture 1524 MA and AM Two important classes: –MA = MA[2] –AM = AM[2] definitions without reference to interaction: –L  MA iff  poly-time language R x  L   m Pr r [(x, m, r)  R] = 1 x  L   m Pr r [(x, m, r)  R]  ½ –L  AM iff  poly-time language R x  L  Pr r [  m (x, m, r)  R] = 1 x  L  Pr r [  m (x, m, r)  R]  ½

May 18, 2004CS151 Lecture 1525 MA and AM L  AM iff  poly-time language R x  L  Pr r [  m (x, m, r)  R] = 1 x  L  Pr r [  m (x, m, r)  R]  ½ Relation to other complexity classes: –both contain NP (can elect to not use randomness) –both contained in ∏ 2. L  ∏ 2 iff  R  P for which: x  L  Pr r [  m (x, m, r)  R] = 1 x  L  Pr r [  m (x, m, r)  R] < 1 –so clear that AM  ∏ 2 –know that MA  AM

May 18, 2004CS151 Lecture 1526 MA and AM P NP coNP Σ2Σ2 Π2Π2 AMcoAM MAcoMA

May 18, 2004CS151 Lecture 1527 MA and AM We know Arthur-Merlin = IP. –“public coins = private coins” Theorem (GS): IP[k]  AM[O(k)] –stronger result –implies for all constant k  2, IP[k] = AM[O(k)] = AM[2] So, GNI  IP[2] = AM

May 18, 2004CS151 Lecture 1528 MA and AM Theorem: coNP  AM  PH = AM. Proof: –suffices to show Σ 2  AM (and use AM  Π 2 ) –L  Σ 2 iff  poly-time language R x  L   y  z (x, y, z)  R x  L   y  z (x, y, z)  R –Merlin sends y –1 AM exchange decides coNP query:  z (x, y, z)  R ? –3 rounds; in AM

May 18, 2004CS151 Lecture 1529 Back to Graph Isomorphism The payoff: –not known if GI is NP-complete. –previous Theorems: if GI is NP-complete then PH = AM –unlikely! –Proof: GI NP-complete  GNI coNP- complete  coNP  AM  PH = AM

May 18, 2004CS151 Lecture 1530 New topic(s) Optimization problems, Approximation Algorithms, and Probabilistically Checkable Proofs

May 18, 2004CS151 Lecture 1531 Optimization Problems many hard problems (especially NP-hard) are optimization problems –e.g. find shortest TSP tour –e.g. find smallest vertex cover –e.g. find largest clique –may be minimization or maximization problem –“opt” = value of optimal solution

May 18, 2004CS151 Lecture 1532 Approximation Algorithms often happy with approximately optimal solution –warning: lots of heuristics –we want approximation algorithm with guaranteed approximation ratio of r –meaning: on every input x, output is guaranteed to have value at most r*opt for minimization at least opt/r for maximization

May 18, 2004CS151 Lecture 1533 Approximation Algorithms Example approximation algorithm: –Recall: Vertex Cover (VC): given a graph G, what is the smallest subset of vertices that touch every edge? –NP-complete

May 18, 2004CS151 Lecture 1534 Approximation Algorithms Approximation algorithm for VC: –pick an edge (x, y), add vertices x and y to VC –discard edges incident to x or y; repeat. Claim: approximation ratio is 2. Proof: –an optimal VC must include at least one endpoint of each edge considered –therefore 2*opt  actual

May 18, 2004CS151 Lecture 1535 Approximation Algorithms diverse array of ratios achievable some examples: –(min) Vertex Cover: 2 –MAX-3-SAT (find assignment satisfying largest # clauses): 8/7 –(min) Set Cover: ln n –(max) Clique: n/log 2 n –(max) Knapsack: (1 + ε) for any ε > 0

May 18, 2004CS151 Lecture 1536 Approximation Algorithms (max) Knapsack: (1 + ε) for any ε > 0 called Polynomial Time Approximation Scheme (PTAS) –algorithm runs in poly time for every fixed ε>0 –poor dependence on ε allowed If all NP optimization problems had a PTAS, almost like P = NP (!)

May 18, 2004CS151 Lecture 1537 Approximation Algorithms A job for complexity: How to explain failure to do better than ratios on previous slide? –just like: how to explain failure to find poly- time algorithm for SAT... –first guess: probably NP-hard –what is needed to show this? “gap-producing” reduction from NP- complete problem L 1 to L 2

May 18, 2004CS151 Lecture 1538 Approximation Algorithms “gap-producing” reduction from NP- complete problem L 1 to L 2 no yes L1L1 L 2 (min. problem) f opt k rk