Skip to main content

The 1-Versus-2 Queries Problem Revisited

  • Conference paper
Algorithms and Computation (ISAAC 2007)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4835))

Included in the following conference series:

Abstract

The 1-versus-2 queries problem, which has been extensively studied in computational complexity theory, asks in its generality whether every efficient algorithm that makes at most 2 queries to a \(\Sigma^{p}_{k}\)-complete set L k has an efficient simulation that makes at most 1 query to L k . We obtain solutions to this problem under hypotheses weaker than previously considered. We prove that:

  1. 1

    For each k ≥ 2, \({\rm P}^{\Sigma^{p}_{k}[2]}_{tt} \subseteq {\rm ZPP}^{\Sigma^{p}_{k}[1]} \Longrightarrow {\rm PH} = \Sigma^{p}_{k}\), and

  2. 1

    \({\rm P}^{{\rm NP}[2]}_{tt} \subseteq {\rm ZPP}^{{\rm NP}[1]} \Longrightarrow {\rm PH} = {\rm S}^{p}_{2}\).

Here, for a complexity class \({\rm \mathcal{C}}\) and integer j ≥ 1, we model \({\rm ZPP}^{{\rm \mathcal{C}}[j]}\) to be the class of problems solvable by zero-error randomized algorithms that always run in polynomial time, make at most j queries to \({\rm \mathcal{C}}\), and succeed with probability only 1/2 + 1/poly(·). This same model of \({\rm ZPP}^{{\rm \mathcal{C}}[j]}\), also considered in [CC06], subsumes the class of problems solvable by randomized algorithms that always answer correctly in expected polynomial time and make at most j queries to \({\rm \mathcal{C}}\).

Hemaspaandra, Hemaspaandra, and Hempel [HHH98], for k > 2, and Buhrman and Fortnow [BF99], for k = 2, had obtained the same consequence as of ours in (1) using the stronger hypothesis \({\rm P}^{\Sigma^{p}_{k}[2]}_{tt} \subseteq {\rm P}^{\Sigma^{p}_{k}[1]}\). Fortnow, Pavan, and Sengupta [FPS] had obtained the same consequence as of ours in (2) using the stronger hypothesis \({\rm P}^{{\rm NP}[2]}_{tt} \subseteq {\rm P}^{{\rm NP}[1]}\).

Our results may also be viewed as steps towards obtaining solutions to the most general form of the 1-versus-2 queries problem: For any k ≥ 1, whether \({\rm P}^{\Sigma^{p}_{k}[2]}_{tt}\) can be simulated in \({\rm BPP}^{\Sigma^{p}_{k}[1]}\).

Research supported by the New Researcher Grant of the University of South Florida.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bshouty, N., Cleve, R., Gavaldà, R., Kannan, S., Tamon, C.: Oracles and queries that are sufficient for exact learning. Journal of Computer and System Sciences 52(3), 421–433 (1996)

    Article  MATH  MathSciNet  Google Scholar 

  2. Beigel, R., Chang, R., Ogiwara, M.: A relationship between difference hierarchies and relativized polynomial hierarchies. Mathematical Systems Theory 26(3), 293–310 (1993)

    Article  MATH  MathSciNet  Google Scholar 

  3. Buhrman, H., Fortnow, L.: Two queries. Journal of Computer and System Sciences 59(2), 182–194 (1999)

    Article  MATH  MathSciNet  Google Scholar 

  4. Cai, J.: S\(_{2}^{p}\) is subset of ZPPNP. Journal of Computer and System Sciences 73(1), 25–35 (2007)

    Article  MATH  MathSciNet  Google Scholar 

  5. Canetti, R.: More on BPP and the polynomial-time hierarchy. Information Processing Letters 57(5), 237–241 (1996)

    Article  MATH  MathSciNet  Google Scholar 

  6. Cai, J., Chakaravarthy, V.: On zero error algorithms having oracle access to one query. Journal of Combinatorial Optimization 11(2), 189–202 (2006)

    Article  MATH  MathSciNet  Google Scholar 

  7. Cai, J., Chakaravarthy, V., Hemaspaandra, L., Ogihara, M.: Competing provers yield improved Karp-Lipton collapse results. Information and Computation 198(1), 1–23 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  8. Chang, R., Kadin, J.: On computing boolean connectives of characteristic functions. Mathematical Systems Theory 28(3), 173–198 (1995)

    Article  MATH  MathSciNet  Google Scholar 

  9. Chang, R., Kadin, J.: The boolean hierarchy and the polynomial hierarchy: A closer connection. SIAM Journal on Computing 25(2), 340–354 (1996)

    Article  MATH  MathSciNet  Google Scholar 

  10. Chang, R., Purini, S.: Bounded queries and the NP machine hypothesis. In: Proceedings of the 22nd Annual IEEE Conference on Computational Complexity, pp. 52–59. IEEE Computer Society Press, June (2007)

    Google Scholar 

  11. Chakaravarthy, V., Roy, S.: Oblivious symmetric alternation. In: Durand, B., Thomas, W. (eds.) STACS 2006. LNCS, vol. 3884, pp. 230–241. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  12. Fortnow, L., Pavan, A., Sengupta, S.: Proving SAT does not have small circuits with an application to the two queries problem. Journal of Computer and System Sciences (to appear)

    Google Scholar 

  13. Hemaspaandra, E., Hemaspaandra, L., Hempel, H.: A downward collapse within the polynomial hierarchy. SIAM Journal on Computing 28(2), 383–393 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  14. Hemaspaandra, E., Hemaspaandra, L., Hempel, H.: Extending downward collapse from 1-versus-2 queries to m-versus-m + 1 queries. SIAM Journal on Computing 34(6), 1352–1369 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  15. Kadin, J.: The polynomial time hierarchy collapses if the boolean hierarchy collapses. SIAM Journal on Computing 17(6), 1263–1282 (1988) Erratum appears in the same journal 20(2) 404

    Article  MATH  MathSciNet  Google Scholar 

  16. Karp, R., Lipton, R.: Some connections between nonuniform and uniform complexity classes. In: Proceedings of the 12th ACM Symposium on Theory of Computing, pp. 302–309. ACM Press, New York (1980)

    Google Scholar 

  17. Krentel, M.: The complexity of optimization problems. Journal of Computer and System Sciences 36(3), 490–509 (1988)

    Article  MATH  MathSciNet  Google Scholar 

  18. Pavan, A., Santhanam, R., Vinodchandran, N.: Some results on average-case hardness within the polynomial hierarchy. In: Proceedings of the 26th Conference on Foundations of Software Technology and Theoretical Computer Science, pp. 188–199 (2006)

    Google Scholar 

  19. Russell, A., Sundaram, R.: Symmetric alternation captures BPP. Computational Complexity 7(2), 152–162 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  20. Wagner, K.: Number-of-query hierarchies. Technical Report 4, Institut für Informatik, Universität Würzburg, Würzburg, Germany (February 1989)

    Google Scholar 

  21. Yap, C.: Some consequences of non-uniform conditions on uniform classes. Theoretical Computer Science 26, 287–300 (1983)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Takeshi Tokuyama

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tripathi, R. (2007). The 1-Versus-2 Queries Problem Revisited. In: Tokuyama, T. (eds) Algorithms and Computation. ISAAC 2007. Lecture Notes in Computer Science, vol 4835. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77120-3_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77120-3_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77118-0

  • Online ISBN: 978-3-540-77120-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics