Abstract
It is known that \({\rm S}_{2}^{p} \subseteq {\rm ZPP}^{NP}\) (Cai, 2001). The reverse direction of whether ZPPNP is contained in \({\rm S}_{2}^{p}\) remains open. We show that if the zero-error algorithm is allowed to ask only one query to the NP oracle (for any input and random string), then it can be simulated in \({\rm S}_{2}^{p}\). That is, we prove that \({\rm S}_{2}^{p}\). Next we consider whether the above result can be improved as \({\rm ZPP}^{NP[1]} \subseteq {\rm P}^{NP}\) and point out a difficulty in doing so. Via a simple proof, we observe that BPP ⊆ ZPPNP[1] (a result implicitly proven in some prior work). Thus, achieving the above improvement would imply BPP ⊆ PNP, settling a long standing open problem.
We then argue that the above mentioned improvement can be obtained for the next level of the polynomial time hierarchy. Namely, we prove that \({\rm ZPP}^{\Sigma_{2}^{p}[1]} \subseteq {\rm P}^{\Sigma_{2}^{p}[2]}\). On the other hand, by adapting our proof of our main result it can be shown that \({\rm ZPP}^{\Sigma_{2}^{p}[1]} \subseteq {\rm S}_{2}^{\rm NP[1]}\). For the purpose of comparing these two results, we prove that \({\rm P}^{\Sigma_{2}^{p}} \subseteq {\rm S}_{2}^{\rm NP[1]}\). We conclude by observing that the above claims extend to the higher levels of the hierarchy: for k ≥ 2,
\({\rm ZPP}^{\Sigma_{k}^{p}[1]} \subseteq {\rm P}^{\Sigma_{k}^{p}[2]}\) and \({\rm P}^{\Sigma_{k}^{p}} \subseteq {\rm S}_{2}^{\Sigma_{k-1}^{p}[1]}\).
Similar content being viewed by others
References
Babai L, Moran S (1988) Arthur-merlin games: A randomized proof system, and a hierarchy of complexity classes. Journal of Computer and System Sciences 36(2):254–276
Boppana R, Håastad J, Zachos S (1987) Does Co-NP have short interactive proofs? Information Processing Letters 25(2):127–132
Cai J (2001) \(\rm S_2^p \subseteq ZPP^NP\). In Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science
Cai J, Chakaravarthy V (2005) A note on zero algorithms having oracle access to one NP query. In Proceedings of the 11th Annual International Computing and Combinatorics Conference
Cai J, Chakaravarthy V, Hemaspaandra L, Ogihara M (2003) Competing provers yield improvedKarp–Lipton collapse results. In Proceedings of the 20th Annual Symposium on Theoretical Aspects of Computer Science
Canetti R (1996) More on BPP and the polynomial-time hierarchy. Information Processing Letters 57(5):237–241
Fortnow L, Impagliazzo R, Kabanets V, Umans C (2005) On the complexity of succinct zero-sum games. In Proceedings of the 20th Annual IEEE Conference on Computational Complexity
Fortnow L, Pavan A, Sengupta S (2003) Proving SAT does not have small circuits with an application to the two queries problem. In Proceedings of the 18th Annual IEEE Conference on Computational Complexity
Goldreich O, Zuckerman D (1997) Another proof that BPP PH (and more). Technical Report TR97–045, Electronic Colloquium on Computational Complexity. Available at http://www.eccc.uni-trier.de/eccc
Goldwasser S, Sipser M (1986) Private coins versus public coins in interactive proof systems. In Proceedings of the 18th ACM Symposium on Theory of Computing
Impagliazzo R, Wigderson A (1997) P=BPP unless E has subexponential circuits: Derandomizing the XOR lemma. In Proceedings of the 29th ACM Symposium on Theory of Computing
Klivans A, van Melkebeek D (2002) Graph nonisomorphism has subexponential size proofs unless the polynomial hierarchy collapses. SIAM Journal on Computing 31(5):1501–1526
Lautemann C (1982) BPP and the polynomial hierarchy. Information Processing Letters 17(4):215–217
Miltersen P, Vinodchandran N (1999) Derandomizing Arthur-Merlin games using hitting sets. In Proceedings of the 40th IEEE Symposium on Foundations of Computer Science
Nisan N, Wigderson A (1994) Hardness vs randomness. Journal of Computer and System Sciences 49(2):149–167
Russell A, Sundaram R (1998) Symmetric alternation captures BPP. Computational Complexity 7(2):152–162
Shaltiel R, Umans C (2005) Pseudorandomness for approximate counting and sampling. In Proceedings of the 20th Annual IEEE Conference on Computational Complexity
Sipser M (1983) A complexity theoretic approach to randomness. In Proceedings of the 15th ACM Symposium on Theory of Computing
Zuckerman D (1996) Simulating BPP using a general weak random source. Algorithmica 16(4/5):367–391
Author information
Authors and Affiliations
Corresponding author
Additional information
Research supported in part by NSF grant CCR-0208013. A preliminary version of the paper was presented at COCOON′05 Cai and Chakaravarthy (2005).
Part of the research was conducted while the author was at the University of Wisconsin, Madison.
Rights and permissions
About this article
Cite this article
Cai, JY., Chakaravarthy, V.T. On zero error algorithms having oracle access to one query. J Comb Optim 11, 189–202 (2006). https://doi.org/10.1007/s10878-006-7130-0
Received:
Accepted:
Issue Date:
DOI: https://doi.org/10.1007/s10878-006-7130-0