Abstract
We briefly survey a number of important recent achievements in Theoretical Computer Science (TCS), especially Computational Complexity Theory. We will discuss the PCP Theorem, its implications to inapproximability on combinatorial optimization problems; space bounded computations, especially deterministic logspace algorithm for undirected graph connectivity problem; deterministic polynomial-time primality test; lattice complexity, worst-case to average-case reductions; pseudorandomness and extractor constructions; and Valiant's new theory of holographic algorithms and reductions.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Thomas H Cormen, Charles E Leiserson, Ronald L Rivest, Cliff Stein. Introduction to Algorithms. Second Edition, MIT Press and McGraw-Hill, 2001.
Hopcroft J E, Ullman J D. Introduction to Automata Theory, Languages, and Computation. Addison Wesley, 1979.
Manuel Blum, Silvio Micali. How to generate cryptographically strong sequences of pseudo random bits. In Proc. 23rd IEEE Symp. Foundations of Computer Science, 1982, pp.112–117.
Andrew Chi-Chih Yao. Theory and applications of trapdoor functions (extended abstract). In Proc. 23rd IEEE Symposium on Foundations of Computer Science, 1982, pp.80–91.
Cook S A. The complexity of theorem proving procedures. In Proc. 3rd ACM Symp. Theory of Computing, 1971, pp.151–158.
Shafi Goldwasser, Silvio Micali, Charles Rackoff. The knowledge complexity of interactive proof systems. SIAM Journal on Computing, 1989, 18(1): 186–208.
László Babai. Trading group theory for randomness. In Proc. 17th ACM Symp. Theory of Computing, 1985, pp.421–429.
László Babai, Shlomo Moran. Arthur-Merlin games: A randomized proof system, and a hierarchy of complexity classes. Journal of Computer and System Sciences, 1988, 36(2): 254-276.
Shafi Goldwasser, Michael Sipser. Private coins versus public coins in interactive proof systems. In Proc. 18th ACM Symposium on Theory of Computing, 1986, pp.59–68.
Richard Karp. Reducibility Among Combinatorial Problems. Complexity of Computer Computations, Miller R E, Thatcher J W (eds.), NY: Plenam Press, 1972, pp.85–103.
Carsten Lund, Lance Fortnow, Howard J Karloff, Noam Nisan. Algebraic methods for interactive proof systems. In Proc. 31st IEEE Symposium on Foundations of Computer Science, 1990, pp.2–10.
Adi Shamir. IP = PSPACE. Journal of the ACM, 1992, 39(4): 869–877.
Michael Ben-Or, Shafi Goldwasser, Joe Kilian, Avi Wigderson. Multi-prover interactive proofs: How to remove intractability assumptions. In Proc. 20th ACM Symposium on Theory of Computing, 1988, pp.113–131.
Uriel Feige, Shafi Goldwasser, Lszl Lovász, Shmuel Safra, Mario Szegedy. Interactive proofs and the hardness of approximating cliques. Journal of the ACM, 1996, 43(2): 268–292.
Savitch W J. Relationships between nondeterministic and deterministic tape complexities. Journal of Computer and System Sciences, 1970, 4(2): 177–192.
Aleliunas R, Karp R M, Lipton R J et al. Random walks, universal traversal sequences, and the complexity of maze problems. In Proc. 20th IEEE Symposium on Foundations of Computer Science, 1979, pp.218–223.
Nisan N. Pseudorandom generators for space-bounded computation. Combinatorica, 1992, 12(4): 449–461.
Noam Nisan, Endre Szemerédi, Avi Wigderson. Undirected connectivity in O(log 1.5 n) space. In Proc. 33rd IEEE Symposium on Foundations of Computer Science, 1992, pp.24–29.
Saks M, Zhou S. BP H SPACE(S)⊂eqDSPACE(S3/2). Journal of Computer and System Sciences, 1999, 58: 376–403.
Armoni R, Amnon Ta-Shma, Wigderson A, Zhou S. An O(log (n)4/3) space algorithm for (s,t) connectivity in undirected graphs. Journal of the ACM, 2000, 47(2): 294–311.
Cai J-Y, Chakaravarthy V T, van Melkebeek D. Time-space tradeoff in derandomizing probabilistic logspace. In Proc. 21st International Symposium on Theoretical Aspects of Computer Science, 2004, pp.571–583.
Reingold O, Vadhan S, Wigderson A. Entropy waves, the zig-zag graph product, and new constant-degree expanders. Annals of Mathematics, 2001, 155(1): 157–187.
Reingold O. Undirected st-connectivity in log-space. In Proc. 37th ACM Symposium on the Theory of Computing, 2005. (To appear)
Irit Dinur. The PCP theorem by gap amplification. Electronic colloquium on computational complexity. Report TR05-046, http://eccc.uni-trier.de/eccc-reports/2005/TR05-046/index.html
Neil Immerman. Nondeterministic space is closed under complementation. SIAM Journal on Computing, 1988, 17(5): 935–938.
Róbert Szelepcsényi. The method of forcing for nondeterministic automata. Bulletin of the European Association for Theoretical Computer Science, 1987, 33: 96–100.
Pratt V R. Every prime has a succinct certificate. SIAM Journal on Computing, 1975, 4: 214–220.
Solovay R, Strassen V. A fast Monte-Carlo test for primality. SIAM Journal on Computing, 1977, 6: 84–85.
Rabin M O. Probabilistic algorithm for testing primality. Journal of Number Theory, 1980, 12: 128–138.
Miller G L. Riemann's hypothesis and tests for primality. In Proc. Seventh Annual ACM Symposium on the Theory of Computing, 1975, pp.234–239.
Adleman L, Huang M-D. Recognizing primes in random polynomial time. In Proc. 19th ACM Symposium on Theory of Computing, 1987, pp.462–469.
Manindra Agrawal, Neeraj Kayal, Nitin Saxena. PRIMES is in P. Annals of Mathematics, 2004, 160: 781–793.
Granville A. It is easy to determine whether a given integer is prime. Bull. Amer. Math. Soc., 2005, 42: 3–38.
Shor P. Algorithms for quantum computation: Discrete logarithms and factoring. In Proc. 35th Annual Symposium on Foundations of Computer Science, 1994, pp.124–134.
Lenstra A K, Lenstra H W, Lovász L. Factoring polynomials with rational coefficients. Mathematische Annalen, 1982, 261: 515–534.
Lenstra H W Jr. Integer programming with a fixed number of variables. Mathematics of Operations Research, 1983, 8: 538–548.
Lovász L. An Algorithmic Theory of Numbers, Graphs and Convexity. SIAM, Philadelphia, 1986.
Ajtai M. Generating hard instances of lattice problems. In Proc. 28th ACM Symp. the Theory of Computing, 1996, pp.99–108. Full version available from ECCC as TR96-007.
Ajtai M. The shortest vector problem in L2 is NP-hard for randomized reductions. In Proc. 30th ACM Symposium on the Theory of Computing, 1998, pp.10–19. Full version available from ECCC as TR97-047.
Ajtai M, Dwork C. A public-key cryptosystem with worst-case/average-case equivalence. In Proc. 29th ACM Symposium on the Theory of Computing, 1997, pp.284–293. Full version available from ECCC as TR96-065.
Cai J-Y, Nerurkar A. An improved worst-case to average-case connection for lattice problems. In Proc. 38th IEEE Symposium on Foundations of Computer Science, 1997, pp.468–477.
Goldreich O, Goldwasser S. On the limits of non-approximability of lattice problems. In Proc. 30th ACM Symposium on Theory of Computing, 1998, pp.1–9, J. Comput. Syst. Sci., 2000, 60(3): 540–563.
Goldreich O, Goldwasser S, Halevi S. Public-key cryptosystems from lattice reduction problems. In Advances in Cryptology — CRYPTO '97, Burton S Kaliski Jr. (ed.), Lecture Notes in Computer Science, Springer-Verlag, 1997, 1294: 112–131.
Micciancio D. The shortest vector in a lattice is hard to approximate to within some constant. In Proc. 39th IEEE Symposium on Foundations of Computer Science, 1998, pp.92–98.
Nguyen P, Stern J. A converse to the Ajtai-Dwork security proof and its cryptographic implications. Available from ECCC as TR98-010.
Daniele Micciancio, Oded Regev. Worst-case to average-case reductions based on Gaussian measures. In Proc. 45th IEEE Symp. Foundations of Computer Science, 2004, pp.372–381.
Subhash Khot. Hardness of approximating the shortest vector problem in lattices. In Proc. 45th IEEE Symposium on Foundations of Computer Science, 2004, pp.126–135.
Dorit Aharonov, Oded Regev. Lattice problems in NP ∩ coNP. In Proc. 45th IEEE Symposium on Foundations of Computer Science, 2004, pp.362–371.
Cai J-Y. A relation of primal-dual lattices and the complexity of shortest lattice vector problem. Theoretical Computer Science, 1998, 207: 105–116.
Cai J-Y. A worst-case to average-case connection for closest vector problem. In Proc. 42nd IEEE Symposium on Foundations of Computer Science, 2001, pp.308–317.
Metropolis N, Ulam S. The Monte Carlo method. Journal of American Statistical Association, 1949, 44: 335–341.
Donald E Knuth. The Art of Computer Programming. Third Edition, Reading, Massachusetts: Addison-Wesley, 1997.
Hastad J, Impagliazzo R, Levin L, Luby M. A pseudorandom generator from any one-way function. SIAM Journal on Computing, 1999, 28(4): 1364–1396.
Carter L, Wegman M. Universal hash functions. Journal of Computer and System Sciences, 1979, 18: 143–154.
Santha M, Vazirani U V. Generating quasi-random sequences from semi-random sources. Journal of Computer and System Sciences, 1986, 33(1): 75–87.
Vazirani U V, Vazirani V V. Random polynomial time is equal to slightly-random polynomial time. In Proc. 26th IEEE Symp. Foundations of Computer Science, 1985, pp.417–428.
Noam Nisan, David Zuckerman. Randomness is linear in space. J. Comput. Syst. Sci., 1996, 52(1): 43–52.
Chi-Jen Lu, Omer Reingold, Salil P Vadhan, Avi Wigderson. Extractors: Optimal up to constant factors. In Proc. 35th ACM Symp. the Theory of Computing, 2003, pp.602–611.
Luca Trevisan. Extractors and pseudorandom generators. Journal of the ACM, 2001, 48(4): 860–879.
Ran Raz, Omer Reingold, Salil P Vadhan. Extracting all the randomness and reducing the error in Trevisan's extractors. J. Comput. Syst. Sci., 2002, 65(1): 97–128.
Leslie G Valiant. Holographic algorithms (extended abstract). In Proc. 45th IEEE Symp. Foundations of Computer Science, 2004, pp.306–315. A more detailed version appeared in Electronic Colloquium on Computational Complexity Report TR05-099.
Temperley H N V, Fisher M E. Dimer problem in statistical mechanics — An exact result. Philosophical Magazine, 1961, 6: 1061–1063.
Kasteleyn P W. The statistics of dimers on a lattice. Physica, 1961, 27: 1209–1225.
Kasteleyn P W. Graph Theory and Crystal Physics. Graph Theory and Theoretical Physics, Harary F (ed.), London: Academic Press, 1967, pp.43–110.
Cai J-Y, Choudhary V. Valiant's Holant Theorem and Matchgate Tensors. (To appear)
Jerrum M. Two-dimensional monomer-dimer systems are computationally intractible. J. Stat. Phys., 1987, 48: 121–134; erratum, 1990, 59: 1087–1088.
Salil P Vadhan. The complexity of counting in sparse, regular, and planar graphs. SIAM J. Comput., 2001, 31(2): 398–427.
Leslie G Valiant. Quantum circuits that can be simulated classically in polynomial time. SIAM Journal of Computing, 2002, 31(4): 1229–1254.
Leslie G Valiant. Expressiveness of matchgates. Theoretical Computer Science, 2002, 281(1): 457–471. See also 2003, 299: 795.
Leslie G Valiant. Holographic circuits. In Proc. 32nd International Colloquium on Automata, Languages and Programming, 2005. (To appear)
Leslie G Valiant. Completeness for parity problems. In Proc. 11th International Computing and Combinatorics Conference, 2005. (To appear)
Cai J-Y, Choudhary V. Liant's Holant theorem and matchgate tensors. Available from ECCC, Electronic Colloquium on Computational Complexity TR05-118, at http://www/eccc.uni-trier.de/eccc/
Author information
Authors and Affiliations
Corresponding author
Additional information
Supported by the NSF, USA (Grant Nos. CCR-0208013 and CCR-0511679) and the National Natural Science Foundation of China (Grant No. 60496321).
Jin-Yi Cai studied at Fudan University, Temple University and Cornell University, where he received his Ph.D. degree in 1986. He held faculty positions at Yale University (1986–1989), Princeton University (1989–1993), and SUNY Buffalo (1993–2000), rising from assistant professor to professor. He is currently a professor of computer science at the University of Wisconsin–Madison. He received a Presidential Young Investigator Award in 1990, an Alfred P. Sloan Fellowship in Computer Science in 1994, a John Simon Guggenheim Fellowship in 1998, and a Morningside Silver Medal of Mathematics in 2004. He also received the Humboldt Research Award for Senior U.S. Scientists. He has been elected a fellow of ACM.
Hong Zhu studied at Mathematical Department of Fudan University in 1956–1961, after graduated he became a teacher (from assistant professor to professor and surpervisor of Ph.D. candidates) of Fudan University since 1961. Hong Zhu works in the area of Theoretical Computer Science since 1978. He has two pieces of work cited by Knuth in his well known book, The Art of Computer Programming. He was a visiting professor of Clermont-Ferrand University and the University of North Carolina at Charlotte and the Advance Science and Technology University of Japan, etc. He is a joint professor of Shanghai Jiaotong University.
Hong Zhu serves as Syndic of Chinese Cryptology Society, Chairman of Association of Discrete Mathematics and on the Editorial Board of Computer and Artificial Intelligence (Europe).
Hong Zhu received a second rank award of Education Ministry for Progress in Science and Technology in 1997.
Rights and permissions
About this article
Cite this article
Cai, JY., Zhu, H. Progress in Computational Complexity Theory. J Comput Sci Technol 20, 735–750 (2005). https://doi.org/10.1007/s11390-005-0735-4
Received:
Issue Date:
DOI: https://doi.org/10.1007/s11390-005-0735-4