skip to main content
10.1145/1374376.1374398acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
research-article

Infeasibility of instance compression and succinct PCPs for NP

Published:17 May 2008Publication History

ABSTRACT

The OR-SAT problem asks, given Boolean formulae Φ1,...,Φm each of size at most n, whether at least one of the Φi's is satisfiable. We show that there is no reduction from OR-SAT to any set A where the length of the output is bounded by a polynomial in n, unless NP ⊆ coNP/poly, and the Polynomial-Time Hierarchy collapses. This result settles an open problem proposed by Bodlaender et. al. [4] and Harnik and Naor [15] and has a number of implications. A number of parametric $\NP$ problems, including Satisfiability, Clique, Dominating Set and Integer Programming, are not instance compressible or polynomially kernelizable unless NP ⊆ coNP/poly. Satisfiability does not have PCPs of size polynomial in the number of variables unless NP ⊆ coNP/poly. An approach of Harnik and Naor to constructing collision-resistant hash functions from one-way functions is unlikely to be viable in its present form. (Buhrman-Hitchcock) There are no subexponential-size hard sets for NP unless NP is in co-NP/poly. We also study probabilistic variants of compression, and show various results about and connections between these variants. To this end, we introduce a new strong derandomization hypothesis, the Oracle Derandomization Hypothesis, and discuss how it relates to traditional derandomization assumptions.

References

  1. L. Adleman. Two theorems on random polynomial time. In Proceedings of the 20th Annual IEEE Symposium on the Foundations of Computer Science, pages 75--83, 1978. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. S. Arora, C. Lund, R. Motwani, M. Sudan, and M. Szegedy. Proof verification and the hardness of approximation problems. Journal of the ACM, 45(3):501--555, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. S. Arora and S. Safra. Probabilistic checking of proofs: A new characterization of NP. Journal of the ACM, 45(1):70--122, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. H. Bodlaender, R. Downey, M. Fellows, and D. Hermelin. On problems without polynomial kernels. Manuscript, 2007.Google ScholarGoogle Scholar
  5. H. Buhrman and J. Hitchcock. NP-complete sets are exponentially dense unless NP ⊆ co-NP/poly. In Proceedings of 23rd Annual IEEE Conference on Computational Complexity, 2008. To appear. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J.-Y. Cai, V. Chakaravarthy, L. Hemaspaandra, and M. Ogihara. Competing provers yield improved Karp--Lipton collapse results. Information and Computation, 198(1):1--23, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. L. Cai, J. Chen, R. Downey, and M. Fellows. Advice classes of parameterized tractability. Annals of Pure and Applied logic, 84(1):119--138, 1997.Google ScholarGoogle ScholarCross RefCross Ref
  8. S. Cook. The complexity of theorem-proving procedures. In Proceedings of the 3rd Annual ACM Symposium on Theory of Computing, pages 151--158, 1971. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. I. Dinur. The PCP theorem by gap amplification. Journal of the ACM, 54(3), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. R. Downey and M. Fellows. Parameterized Complexity. Springer-Verlag, 1999. Google ScholarGoogle ScholarCross RefCross Ref
  11. B. Dubrov and Y. Ishai. On the randomness complexity of efficient sampling. In Proceedings of the 38th Annual ACM Symposium on Theory of Computing, pages 711--720, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. J. Flum and M. Grohe. Parameterized Complexity Theory. Springer, 2006. Google ScholarGoogle Scholar
  13. L. Fortnow and R. Santhanam. Infeasibility of instance compression and succinct PCPs for NP. Electronic Colloquium on Computational Complexity (ECCC), 14(96), 2007.Google ScholarGoogle Scholar
  14. J. Guo and R. Niedermeier. Invitation to data reduction and problem kernelization. ACM SIGACT News, 38(1):31--45, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. D. Harnik and M. Naor. On the compressibility of NP instances and cryptographic applications. In Proceedings if the 47th Annual IEEE Symposium on Foundations of Computer Science, pages 719--728, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. R. Impagliazzo and A. Wigderson. P = BPP if E requires exponential circuits: Derandomizing the XOR lemma. In Proceedings of the 29th Annual ACM Symposium on the Theory of Computing, pages 220--229, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Y. T. Kalai and R. Raz. Interactive PCP. Electronic Colloquium on Computational Complexity, 7(31), 2007.Google ScholarGoogle Scholar
  18. R. Karp and R. Lipton. Turing machines that take advice. L’Enseignement Mathématique, 28(2):191--209, 1982.Google ScholarGoogle Scholar
  19. A. Klivans and D. van Melkebeek. Graph nonisomorphism has subexponential size proofs unless the polynomial hierarchy collapses. SIAM Journal of Computing, 31(5):1501--1526, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. S. Mahaney. Sparse complete sets for NP: Solution of a conjecture of berman and hartmanis. Journal of Computer and System Sciences, 25(2):130--143, 1982.Google ScholarGoogle ScholarCross RefCross Ref
  21. R. Niedermeier. Invitation to Fixed-Parameter Algorithms. Oxford University Press, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  22. R. Shaltiel and C. Umans. Simple extractors for all min-entropies and a new pseudo-random generator. In Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. D. Simon. Finding collisions on a one-way street: Can secure hash functions be based on general assumptions? Advances in Cryptology, EUROCRYPT 1998, Lecture Notes in Computer Science, 1403:334--345, 1998.Google ScholarGoogle ScholarCross RefCross Ref
  24. C.-K. Yap. Some consequences of non-uniform conditions on uniform classes. Theoretical Computer Science, 26:287--300, 1983.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Infeasibility of instance compression and succinct PCPs for NP

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computing
      May 2008
      712 pages
      ISBN:9781605580470
      DOI:10.1145/1374376

      Copyright © 2008 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 17 May 2008

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      STOC '08 Paper Acceptance Rate80of325submissions,25%Overall Acceptance Rate1,469of4,586submissions,32%

      Upcoming Conference

      STOC '24
      56th Annual ACM Symposium on Theory of Computing (STOC 2024)
      June 24 - 28, 2024
      Vancouver , BC , Canada

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader