skip to main content
10.1145/1374376.1374398acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
research-article

Infeasibility of instance compression and succinct PCPs for NP

Published: 17 May 2008 Publication History

Abstract

The OR-SAT problem asks, given Boolean formulae Φ1,...,Φm each of size at most n, whether at least one of the Φi's is satisfiable. We show that there is no reduction from OR-SAT to any set A where the length of the output is bounded by a polynomial in n, unless NP ⊆ coNP/poly, and the Polynomial-Time Hierarchy collapses. This result settles an open problem proposed by Bodlaender et. al. [4] and Harnik and Naor [15] and has a number of implications. A number of parametric $\NP$ problems, including Satisfiability, Clique, Dominating Set and Integer Programming, are not instance compressible or polynomially kernelizable unless NP ⊆ coNP/poly. Satisfiability does not have PCPs of size polynomial in the number of variables unless NP ⊆ coNP/poly. An approach of Harnik and Naor to constructing collision-resistant hash functions from one-way functions is unlikely to be viable in its present form. (Buhrman-Hitchcock) There are no subexponential-size hard sets for NP unless NP is in co-NP/poly. We also study probabilistic variants of compression, and show various results about and connections between these variants. To this end, we introduce a new strong derandomization hypothesis, the Oracle Derandomization Hypothesis, and discuss how it relates to traditional derandomization assumptions.

References

[1]
L. Adleman. Two theorems on random polynomial time. In Proceedings of the 20th Annual IEEE Symposium on the Foundations of Computer Science, pages 75--83, 1978.
[2]
S. Arora, C. Lund, R. Motwani, M. Sudan, and M. Szegedy. Proof verification and the hardness of approximation problems. Journal of the ACM, 45(3):501--555, 1998.
[3]
S. Arora and S. Safra. Probabilistic checking of proofs: A new characterization of NP. Journal of the ACM, 45(1):70--122, 1998.
[4]
H. Bodlaender, R. Downey, M. Fellows, and D. Hermelin. On problems without polynomial kernels. Manuscript, 2007.
[5]
H. Buhrman and J. Hitchcock. NP-complete sets are exponentially dense unless NP ⊆ co-NP/poly. In Proceedings of 23rd Annual IEEE Conference on Computational Complexity, 2008. To appear.
[6]
J.-Y. Cai, V. Chakaravarthy, L. Hemaspaandra, and M. Ogihara. Competing provers yield improved Karp--Lipton collapse results. Information and Computation, 198(1):1--23, 2005.
[7]
L. Cai, J. Chen, R. Downey, and M. Fellows. Advice classes of parameterized tractability. Annals of Pure and Applied logic, 84(1):119--138, 1997.
[8]
S. Cook. The complexity of theorem-proving procedures. In Proceedings of the 3rd Annual ACM Symposium on Theory of Computing, pages 151--158, 1971.
[9]
I. Dinur. The PCP theorem by gap amplification. Journal of the ACM, 54(3), 2007.
[10]
R. Downey and M. Fellows. Parameterized Complexity. Springer-Verlag, 1999.
[11]
B. Dubrov and Y. Ishai. On the randomness complexity of efficient sampling. In Proceedings of the 38th Annual ACM Symposium on Theory of Computing, pages 711--720, 2006.
[12]
J. Flum and M. Grohe. Parameterized Complexity Theory. Springer, 2006.
[13]
L. Fortnow and R. Santhanam. Infeasibility of instance compression and succinct PCPs for NP. Electronic Colloquium on Computational Complexity (ECCC), 14(96), 2007.
[14]
J. Guo and R. Niedermeier. Invitation to data reduction and problem kernelization. ACM SIGACT News, 38(1):31--45, 2007.
[15]
D. Harnik and M. Naor. On the compressibility of NP instances and cryptographic applications. In Proceedings if the 47th Annual IEEE Symposium on Foundations of Computer Science, pages 719--728, 2006.
[16]
R. Impagliazzo and A. Wigderson. P = BPP if E requires exponential circuits: Derandomizing the XOR lemma. In Proceedings of the 29th Annual ACM Symposium on the Theory of Computing, pages 220--229, 1997.
[17]
Y. T. Kalai and R. Raz. Interactive PCP. Electronic Colloquium on Computational Complexity, 7(31), 2007.
[18]
R. Karp and R. Lipton. Turing machines that take advice. L’Enseignement Mathématique, 28(2):191--209, 1982.
[19]
A. Klivans and D. van Melkebeek. Graph nonisomorphism has subexponential size proofs unless the polynomial hierarchy collapses. SIAM Journal of Computing, 31(5):1501--1526, 2002.
[20]
S. Mahaney. Sparse complete sets for NP: Solution of a conjecture of berman and hartmanis. Journal of Computer and System Sciences, 25(2):130--143, 1982.
[21]
R. Niedermeier. Invitation to Fixed-Parameter Algorithms. Oxford University Press, 2006.
[22]
R. Shaltiel and C. Umans. Simple extractors for all min-entropies and a new pseudo-random generator. In Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science, 2001.
[23]
D. Simon. Finding collisions on a one-way street: Can secure hash functions be based on general assumptions? Advances in Cryptology, EUROCRYPT 1998, Lecture Notes in Computer Science, 1403:334--345, 1998.
[24]
C.-K. Yap. Some consequences of non-uniform conditions on uniform classes. Theoretical Computer Science, 26:287--300, 1983.

Cited By

View all
  • (2024)Batch Proofs Are Statistically HidingProceedings of the 56th Annual ACM Symposium on Theory of Computing10.1145/3618260.3649775(435-443)Online publication date: 10-Jun-2024
  • (2024)Probabilistically Checkable Arguments for All NPAdvances in Cryptology – EUROCRYPT 202410.1007/978-3-031-58734-4_12(345-374)Online publication date: 1-May-2024
  • (2023)Polynomial Turing Compressions for Some Graph Problems Parameterized by Modular-WidthComputing and Combinatorics10.1007/978-3-031-49190-0_9(127-140)Online publication date: 9-Dec-2023
  • Show More Cited By

Index Terms

  1. Infeasibility of instance compression and succinct PCPs for NP

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computing
    May 2008
    712 pages
    ISBN:9781605580470
    DOI:10.1145/1374376
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 17 May 2008

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. cryptography
    2. instance compression
    3. parameterized complexity
    4. polynomial hierarchy
    5. succinct PCPs

    Qualifiers

    • Research-article

    Conference

    STOC '08
    Sponsor:
    STOC '08: Symposium on Theory of Computing
    May 17 - 20, 2008
    British Columbia, Victoria, Canada

    Acceptance Rates

    STOC '08 Paper Acceptance Rate 80 of 325 submissions, 25%;
    Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

    Upcoming Conference

    STOC '25
    57th Annual ACM Symposium on Theory of Computing (STOC 2025)
    June 23 - 27, 2025
    Prague , Czech Republic

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)15
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 18 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Batch Proofs Are Statistically HidingProceedings of the 56th Annual ACM Symposium on Theory of Computing10.1145/3618260.3649775(435-443)Online publication date: 10-Jun-2024
    • (2024)Probabilistically Checkable Arguments for All NPAdvances in Cryptology – EUROCRYPT 202410.1007/978-3-031-58734-4_12(345-374)Online publication date: 1-May-2024
    • (2023)Polynomial Turing Compressions for Some Graph Problems Parameterized by Modular-WidthComputing and Combinatorics10.1007/978-3-031-49190-0_9(127-140)Online publication date: 9-Dec-2023
    • (2020)Crossing Paths with Hans Bodlaender: A Personal View on Cross-Composition for Sparsification Lower BoundsTreewidth, Kernels, and Algorithms10.1007/978-3-030-42071-0_8(89-111)Online publication date: 20-Apr-2020
    • (2019)Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPsAdvances in Cryptology – CRYPTO 201910.1007/978-3-030-26954-8_3(67-97)Online publication date: 1-Aug-2019
    • (2018)Fréchet Distance Between a Line and Avatar Point SetAlgorithmica10.1007/s00453-017-0352-y80:9(2616-2636)Online publication date: 1-Sep-2018
    • (2018)What Is Known About Vertex Cover Kernelization?Adventures Between Lower Bounds and Higher Altitudes10.1007/978-3-319-98355-4_19(330-356)Online publication date: 9-Aug-2018
    • (2018)Extremal Kernelization: A Commemorative PaperCombinatorial Algorithms10.1007/978-3-319-78825-8_3(24-36)Online publication date: 17-Apr-2018
    • (2016)Depth-Reduction for Composites2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS)10.1109/FOCS.2016.20(99-108)Online publication date: Oct-2016
    • (2016)Towards Non-Black-Box Separations of Public Key Encryption and One Way FunctionProceedings, Part II, of the 14th International Conference on Theory of Cryptography - Volume 998610.1007/978-3-662-53644-5_7(169-191)Online publication date: 31-Oct-2016
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media