Abstract
The field of computational complexity is reaching what could be termed middle age, with over forty years having passed since the first papers defining the discipline. With this metaphor in mind, the early nineteeneighties represented the end of adolescence for the area, the time when it stopped wondering what it would be when it grew up. During the childhood period of the sixties, research centered on establishing the extent to which computational complexity, or the inherrent computational resources required to solve a problem, actually existed and was well-defined.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Adleman, L.: Two Theorems on Random Polynomial Time. In: FOCS, pp. 75–83 (1978)
Aiello, W., Goldwasser, S., Hstad, J.: On the power of interaction. Combinatorica 10(1), 3–25 (1990)
Agrawal, M., Kayal, N., Saxena, N.: Primes is in P. Annals of Mathematics 160(2), 781–793 (2004)
Ajtai, M.: Σ1,1 formulas on finite structures. Annals of Pure and Applied Logic (1983)
Ajtai, M., Komlos, J., Szemeredi, E.: Deterministic Simulation in LOGSPACE. In: 19th STOC, pp. 132–140 (1987)
Akavia, A., Goldwasser, S., Safra, S.: Proving Hard-core Predicates Using List Decoding. In: FOCS, pp. 146–156 (2003)
Aleliunas, R., Karp, R., Lipton, R., Lovasz, L., Rackoff, C.: Random Walks, Universal Traversal Sequences, and the Complexity of Maze Problems. In: 20th FOCS, pp. 218–223 (1979)
Andreev, A.E., Clementi, A.E.F., Rolim, J.D.P.: A new general derandomization method. Journal of the Association for Computing Machinery 45(1), 179–213 (1998), (preliminary version in ICALP 1996)
Andreev, A., Clementi, A., Rolim, J., Trevisan, L.: Weak random sources, hitting sets, and BPP simulation. In: 38th FOCS, pp. 264–272 (1997)
Arora, S., Lund, C.: Hardness of Approximations. In: Hochbaum, D. (ed.) Approximation Algorithms for NP-hard Problems, PWS Publishing (1996)
Arora, S., Lund, C., Motwani, R., Sudan, M., Szegedy, M.: Proof verification and the hardness of approximation problems. Journal of the Association for Computing Machinery 45(3), 501–555 (1998)
Arora, S., Sudan, M.: Improved low-degree testing and its applications. In: Proceedings of the Twenty-Ninth Annual ACM Symposium on Theory of Computing, pp. 485–495 (1997)
Arora, S., Safra, S.: Probabilistic checking of proofs: A new characterization of NP. Journal of the Association for Computing Machinery 45 (1), 70–122 (1998) (preliminary version in FOCS 1992)
Babai, L., Fortnow, L., Levin, L.A., Szegedy, M.: Checking Computations in Polylogarithmic Time 23rd STOC, pp. 21-31 (1991)
Babai, L., Fortnow, L., Lund, C.: Non-deterministic exponential time has two-prover interactive protocols. Computational Complexity 1, 3–40 (1991)
Babai, L., Fortnow, L., Nisan, N., Wigderson, A.: BPP has subexponential time simulations unless EXPTIME has publishable proofs. Complexity 3, 307–318 (1993)
Babai, L., Moran, S.: Arthur-Merlin games: a randomized proof system, and a hierarchy of complexity class. JCSS 36 (2), 254–276 (1988)
Barak, B., Impagliazzo, R., Wigderson, A.: Extracting Randomness Using Few Independent Sources. In: 45th FOCS, pp. 384–393 (2004)
Barak, B., Kindler, G., Shaltiel, R., Sudakov, B., Wigderson, A.: Simulating independence: new constructions of condesnsors, ramsey graphs, dispersers and extractors. In: 37th STOC, pp. 1–10 (2005)
Beaver, D., Feigenbaum, J.: Hiding instances in multioracle queries. In: Choffrut, C., Lengauer, T. (eds.) STACS 1990. LNCS, vol. 415, pp. 37–48. Springer, Heidelberg (1990)
Ben-Or, M., Goldwasser, S., Kilian, J., Wigderson, A.: Multi-Prover Interactive Proofs: How to Remove Intractability Assumptions. In: STOC, pp. 113–131 (1988)
Berlekamp, E.R.: Proc. of the 3rd Southeastern Conference on Combinatorics. In: Proc. of the 3rd Southeastern Conference on Combinatorics, GRAPH THEORY AND COMPUTING, pp. 1–7 (1972)
Blum, M.: Independent Unbiased Coin Flips From a Correlated Biased Source: a Finite State Markov. Combinatorica 6(2), 97–108 (1986); Chain FOCS, 425-433 (1984)
Blum, M., Kannan, S.: Designing Programs That Check Their Work. In: STOC, pp. 86–97 (1989)
Blum, M., Luby, M., Rubinfeld, R.: Self-Testing/Correcting with Applications to Numerical Problems. J. Comput. Syst. Sci. 47(3), 549–595 (1993)
Blum, M., Micali, S.: How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits. SIAM J. Comput. 13, 850–864 (1984)
Bourgain, J., Katz, N., Tao, T.: A sum-product estimate in finite fields, and applications. Geometric and Functional Analysis 14, 27–57 (2004)
Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Transaction on Information Theory IT-22 (6), 644–654 (1976)
Chor, B., Goldreich, O., Hstad, J., Friedman, J., Rudich, S., Smolensky, R.: The Bit Extraction Problem of t-Resilient Functions. In: FOCS, pp. 396–407 (1985)
Cook, S.: An Overview of Computational Complexity. Communications of the ACM 26(3), 401–407
Dinur, I.: The PCP Theorem by gap amplification. ECCC tech. report TR05-046 (2005)
Feige, U., Goldwasser, S., Lovasz, L., Safra, S., Szegedy, M.: Approximating Clique is Almost NP-complete. In: FOCS, pp. 2–12 (1991)
Fortnow, L.: Comparing notions of full derandomization. In: Proceedings of the Sixteenth Annual IEEE Conference on Computational Complexity, pp. 28–34 (2001)
Furst, M., Saxe, J.B., Sipser, M.: Parity, Circuits, and the Polynomial-Time Hierarchy. Mathematical Systems Theory 17(1), 13–27 (1984)
Gabber, O., Galil, Z.: Explicit Constructions of Linear-Sized Superconcentrators. J. Comput. Syst. Sci. 22(3), 407–420 (1981)
Gill, J.: Computational complexity of proabilistic Turing machines. SIAM J. Comput. 6, 675–695 (1977)
Goldreich, O., Levin, L.A.: A Hard-Core Predicate for all One-Way Functions. In: ACM Symp. on Theory of Computing, pp. 25–32 (1989)
Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. J. ACM 33(4), 792–807 (1986)
Goldwasser, S., Sipser, M.: Private Coins versus Public Coins in Interactive Proof Systems. In: STOC, pp. 59–68 (1986)
Goldwasser, S., Micali, S., Rackoff, C.: The Knowledge Complexity of Interactive Proof Systems. SIAM J. Comput. 18(1), 186–208 (1989)
Hstad, J.: Almost Optimal Lower Bounds for Small Depth Circuits. In: STOC, pp. 6–20 (1986)
Hstad, J., Impagliazzo, R., Levin, L.A., Luby, M.: A Pseudorandom Generator from any One-way Function. SIAM J. Comput. 28(4), 1364–1396 (1999)
Heintz, J., Schnorr, C.-P.: Testing Polynomials which Are Easy to Compute. In: STOC, pp. 262–272 (1980)
Impagliazzo, R.: Hard-core Distributions for Somewhat Hard Problems. In: 36th FOCS, pp. 538–545 (1995)
Impagliazzo, R.: Hardness as randomness: a survey of universal derandomization. CoRR cs.CC/0304040 (2003)
Impagliazzo, R., Kabanets, V., Wigderson, A.: In search of an easy witness: Exponential time vs. probabilistic polynomial time. In: Proceedings of the Sixteenth Annual IEEE Conference on Computational Complexity, pp. 1–11 (2001)
Impagliazzo, R., Rudich, S.: Limits on the Provable Consequences of One-Way Permutations. In: STOC, pp. 44–61 (1989)
Impagliazzo, R., Wigderson, A.: P=BPP if E requires exponential circuits: Derandomizing the XOR Lemma. In: Proceedings of the Twenty-Ninth Annual ACM Symposium on Theory of Computing, pp. 220–229 (1997)
Impagliazzo, R., Wigderson, A.: Randomness vs. time: Derandomization under a uniform assumption. In: Proceedings of the Thirty-Ninth Annual IEEE Symposium on Foundations of Computer Science, pp. 734–743 (1998)
Johnson, D.: The NP-completeness column: An ongoing guide (12th article) Journal of Algorithms 5, 433–447 (1984)
Kabanets, V.: Easiness assumptions and hardness tests: Trading time for zero error. Journal of Computer and System Sciences 63(2), 236–252 (2001) (preliminary version in CCC 2000)
Kabanets, V.: Derandomization: A brief overview. Bulletin of the European Association for Theoretical Computer Science 76, 88–103 (2002) (also available as ECCC TR02-008)
Kabanets, V., Impagliazzo, R.: Derandomizing Polynomial Identity Tests Means Proving Circuit Lower Bounds. Computational Complexity 13(1-2), 1–46 (2004)
Kaltofen, E.: Polynomial factorization 1987–1991. In: Simon, I. (ed.) LATIN 1992. LNCS, vol. 583, pp. 294–313. Springer, Heidelberg (1992)
Karp, R.M.: Combinatorics, Complexity, and Randomness. Commun. ACM 29(2), 97–109 (1986)
Karp, R.M., Lipton, R.J.: Turing Machines that Take Advice. L’Ensignment Mathematique 28, 191–209 (1982)
Karp, R.M., Pippenger, N., Sipser, M.: A time randomness tradeoff AMS. In: Conference on Probabilistic Computational Complexity (1985)
Konyagin, S.: A sum-product estimate in fields of prime order Arxiv technical report 0304217 (2003)
Levin, L.A.: One-Way Functions and Pseudorandom Generators. Combinatorica 7(4), 357–363 (1987)
Levin, L.A.: Average Case Complete Problems. SIAM J. Comput. 15(1), 285–286 (1986)
New directions in testing. Distributed Computing and Cryptography (1991)
Luby, M., Rackoff, C.: How to Construct Pseudorandom Permutations from Pseudorandom Functions. SIAM J. Comput. 17(2), 373–386 (1988)
Lund, C., Fortnow, L., Karloff, H., Nisan, N.: Algebraic methods for interactive proof systems. Journal of the Association for Computing Machinery 39(4), 859–868 (1992)
Lipton, R.: New directions in testing. In: Feigenbaum, J., Merrit, M. (eds.) Distributed Computing and Cryptography. DIMACS Series in Discrete Mathematics and Theoretical Computer Science, vol. 2, pp. 191–202. AMS, Providence(1991)
Minsky, M., Pappert, S.: Perceptrons: An Introduction to Computational Geometry. MIT Press, Cambridge (1969), (expanded edition, 1988)
Nisan, N., Wigderson, A.: Hardness vs. randomness. Journal of Computer and System Sciences 49, 149–167 (1994)
Nisan, N., Zuckerman, D.: Randomness is Linear in Space. JCSS 52(1), 43–52 (1996)
Papadimitriou, C.H.: Computational Complexity. Addison-Wesley, Reading (1994)
Papadimitriou, C.H., Yannakakis, M.: Optimization, Approximation, and Complexity Classes. In: STOC 1988, Computational Complexity, Addison-Wesley, Reading (1994)
Rabin, M.O.: Probabilistic Algorithm for Testing Primality. Journal of Number Theory 12, 128–138 (1980)
Razborov, A.A.: Lower bounds for the monotone complexity of some Boolean functions. Doklady Akademii Nauk SSSR 281(4), 798–801 (1985), English translation in Soviet Math. Doklady 31, 354-357 (1985)
Razborov, A.A.: Lower bounds on the size of bounded-depth networks over a complete basis with logical addition. Mathematicheskie Zemetki 41(4), 598–607 (1987), English translation in Notes of the Academy of Sci. of the USSR  41(4)333-338 (1987)
Razborov, A.A., Rudich, S.: Natural proofs. Journal of Computer and System Sciences 55, 24–35 (1997)
Riordan, J., Shannon, C.: The Number of Two-Terminal Series-Parallel Networks. Journal of Mathematics and Physics 21, 83–93 (1942)
Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 120–126 (1978)
Rudich, S.: The Use of Interaction in Public Cryptosystems. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 242–251. Springer, Heidelberg (1991)
Santha, M., Vazirani, U.V.: Generating Quasi-Random Sequences from Slightly Random Sources. In: 25th FOCS, pp. 434–440 (1984)
Schwartz, J.T.: Fast probabilistic algorithms for verification of polynomial identities. Journal of the Association for Computing Machinery 27(4), 701–717 (1980)
Shaltiel, R., Umans, C.: Simple extractors for all min-entropies and a new pseudo-random generator. In: Proceedings of the Forty-Second Annual IEEE Symposium on Foundations of Computer Science, pp. 648–657 (2001)
Shamir, A.: IP=PSPACE. Journal of the Association for Computing Machinery 39(4), 869–877 (1992)
Sipser, M.: Extractors, Randomness, or Time versus Space. JCSS 36(3), 379–383 (1988)
Smolensky, R.: Algebraic Methods in the Theory of Lower Bounds for Boolean Circuit Complexity. In: STOC, pp. 77–82 (1987)
Solovay, R., Strassen, V.: A fast Monte Carlo test for primality. SIAM Journal on Computing 6(1), 84–85 (1979)
Sudan, M., Trevisan, L., Vadhan, S.: Pseudorandom generators without the XOR lemma. Journal of Computer and System Sciences 62 (2), 236–266 (2001) (preliminary version in STOC 1999)
Sudan, M.: Decoding of Reed Solomon codes beyond the error-correction bound. Journal of Complexity 13(1), 180–193 (1997)
Tardos, É.: The gap between monotone and non-monotone circuit complexity is exponential. Combinatorica 8(1), 141–142 (1988)
Toda, S.: On the computational power of PP and ⊕P. In: 30th FOCS, pp. 514–519 (1989)
Trevisan, L.: Extractors and pseudorandom generators. Journal of the Association for Computing Machinery 48(4), 860–879 (2001) (preliminary version in STOC 1999)
Trevisan, L.: List Decoding Using the XOR Lemma. Electronic Colloquium on Computational Complexity tech report 03-042 (2003)
Umans, C.: Pseudo-random generators for all hardnesses. In: Proceedings of the Thirty-Fourth Annual ACM Symposium on Theory of Computing (2002)
Valiant, L.: Why is Boolean complexity theory difficult? In: Paterson, M.S. (ed.) Feedback Shift Registers. London Math. Society Lecture Note Series, vol. 169, pp. 84–94. Cambridge University Press, Cambridge (1992)
von Neumann, J.: Various Techniques Used in Relation to Random Digits. Applied Math. Series 12, 36–38 (1951)
Wegener, I.: The Complexity of Boolean Functions. Wiley-Teubner, Chichester (1987)
Yablonski, S.: The algorithmic difficulties of synthesizing minimal switching circuits. Problemy Kibornetiki 2, 75–121 (1959)
Yao, A.C.: Theory and applications of trapdoor functions. In: Proceedings of the Twenty-Third Annual IEEE Symposium on Foundations of Computer Science, pp. 80–91 (1982)
Yao, A.C.: Separating the Polynomial-Time Hierarchy by Oracles. In: FOCS, pp. 1–10 (1985)
Zippel, R.E.: Probabilistic algorithms for sparse polynomials. In: Ng, K.W. (ed.) EUROSAM 1979 and ISSAC 1979. LNCS, vol. 72, pp. 216–226. Springer, Heidelberg (1979)
Zuckerman, D.: General Weak Random Sources. In: 31st FOCS, pp. 534–543 (1990)
Zuckerman, D.: Simulating BPP Using a General Weak Random Source. In: FOCS, pp. 79–89 (1991)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Impagliazzo, R. (2005). Computational Complexity Since 1980. In: Sarukkai, S., Sen, S. (eds) FSTTCS 2005: Foundations of Software Technology and Theoretical Computer Science. FSTTCS 2005. Lecture Notes in Computer Science, vol 3821. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11590156_2
Download citation
DOI: https://doi.org/10.1007/11590156_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30495-1
Online ISBN: 978-3-540-32419-5
eBook Packages: Computer ScienceComputer Science (R0)