skip to main content
10.1145/3564246.3585215acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
research-article

When Arthur Has Neither Random Coins Nor Time to Spare: Superfast Derandomization of Proof Systems

Authors Info & Claims
Published:02 June 2023Publication History

ABSTRACT

What is the actual cost of derandomization? And can we get it for free? These questions were recently raised by Doron et. al (FOCS 2020) and have been attracting considerable interest. In this work we extend the study of these questions to the setting of derandomizing interactive proofs systems.

First, we show conditional derandomization of MA and of AM with optimal runtime overhead, where optimality is under the #NSETH assumption. Specifically, denote by AMTIME[⇌ c][T] a protocol with c turns of interaction in which the verifier runs in polynomial time T. We prove that, for every constant є>0,

MATIME[T] ⊆ NTIME[T2+є] ,  

AMTIME[⇌ c][T] ⊆ NTIME[n· T⌈ c/2 ⌉ + є] ;  

assuming the existence of properties of Boolean functions that can be recognized quickly from the function’s truth-table such that functions with the property are hard for proof systems that receive near-maximal amount of non-uniform advice.

To obtain faster derandomization, we introduce the notion of a deterministic effective argument system. This is an NP-type proof system in which the verifier is deterministic, and the soundness is relaxed to be computational, as follows: For every probabilistic polynomial-time adversary P, the probability that P finds an input xL and misleading proof π such that V(x,π)=1 is negligible.

Under strong hardness assumptions, we prove that any constant-round doubly efficient proof system can be compiled into a deterministic effective argument system, with essentially no time overhead. As one corollary, under strong hardness assumptions, for every є>0 there is a deterministic verifier V that gets an n-bit formula Φ of size 2o(n), runs in time 2є · n, and satisfies the following: An honest prover running in time 2O(n) can print, for every Φ, a proof π such that V(Φ,π) outputs the number of satisfying assignments for Φ; and for every adversary P running in time 2O(n), the probability that P finds Φ and π such that V(Φ,π) outputs an incorrect count is 2−ω(n).

References

  1. László Babai and Shlomo Moran. 1988. Arthur-Merlin games: a randomized proof system, and a hierarchy of complexity classes. Journal of Computer and System Sciences, 36, 2 (1988), 254–276. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Boaz Barak. 2001. How to Go Beyond the Black-Box Simulation Barrier. In 42nd Annual Symposium on Foundations of Computer Science, FOCS 2001, 14-17 October 2001, Las Vegas, Nevada, USA. IEEE Computer Society, 106–115. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. James Bartusek, Liron Bronfman, Justin Holmgren, Fermi Ma, and Ron D. Rothblum. 2019. On the (In)security of Kilian-Based SNARGs. In Theory of Cryptography - 17th International Conference, TCC 2019, Nuremberg, Germany, December 1-5, 2019, Proceedings, Part II, Dennis Hofheinz and Alon Rosen (Eds.) (Lecture Notes in Computer Science, Vol. 11892). Springer, 522–551. Google ScholarGoogle Scholar
  4. Mihir Bellare and Phillip Rogaway. 1993. Entity Authentication and Key Distribution. In Advances in Cryptology - CRYPTO ’93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings, Douglas R. Stinson (Ed.) (Lecture Notes in Computer Science, Vol. 773). Springer, 232–249. Google ScholarGoogle Scholar
  5. Eli Ben-Sasson, Alessandro Chiesa, and Nicholas Spooner. 2016. Interactive Oracle Proofs. In Theory of Cryptography - 14th International Conference, TCC 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part II, Martin Hirt and Adam D. Smith (Eds.) (Lecture Notes in Computer Science, Vol. 9986). 31–60. Google ScholarGoogle Scholar
  6. Eli Ben-Sasson, Oded Goldreich, Prahladh Harsha, Madhu Sudan, and Salil P. Vadhan. 2005. Short PCPs Verifiable in Polylogarithmic Time. In 20th Annual IEEE Conference on Computational Complexity (CCC 2005), 11-15 June 2005, San Jose, CA, USA. IEEE Computer Society, 120–134. Google ScholarGoogle Scholar
  7. Gilles Brassard, David Chaum, and Claude Crépeau. 1988. Minimum disclosure proofs of knowledge. 37, 156–189. Google ScholarGoogle Scholar
  8. Gilles Brassard and Claude Crépeau. 1986. Non-transitive transfer of confidence: A perfect zero-knowledge interactive protocol for SAT and beyond. In Proc. 27th Annual IEEE Symposium on Foundations of Computer Science (FOCS). Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Ran Canetti, Yilei Chen, Justin Holmgren, Alex Lombardi, Guy N. Rothblum, Ron D. Rothblum, and Daniel Wichs. 2019. Fiat-Shamir: from practice to theory. In Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, STOC 2019, Phoenix, AZ, USA, June 23-26, 2019, Moses Charikar and Edith Cohen (Eds.). ACM, 1082–1090. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Lijie Chen and Roei Tell. 2021. Hardness vs Randomness, Revised: Uniform, Non-Black-Box, and Instance-Wise. In Proc. 62nd Annual IEEE Symposium on Foundations of Computer Science (FOCS). Google ScholarGoogle Scholar
  11. Lijie Chen and Roei Tell. 2021. Simple and fast derandomization from very hard functions: Eliminating randomness at almost no cost. In Proc. 53st Annual ACM Symposium on Theory of Computing (STOC). Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Lijie Chen and Roei Tell. 2022. When Arthur has Neither Random Coins nor Time to Spare: Superfast Derandomization of Proof Systems. Electronic Colloquium on Computational Complexity: ECCC, 29 (2022), 057. Google ScholarGoogle Scholar
  13. Arka Rai Choudhuri, Abhishek Jain, and Zhengzhong Jin. 2021. SNARGs for $ \ mathcal¶\$ from LWE. In 62nd IEEE Annual Symposium on Foundations of Computer Science, FOCS 2021, Denver, CO, USA, February 7-10, 2022. IEEE, 68–79. Google ScholarGoogle Scholar
  14. Dean Doron, Dana Moshkovitz, Justin Oh, and David Zuckerman. 2020. Nearly Optimal Pseudorandomness From Hardness. In Proc. 61st Annual IEEE Symposium on Foundations of Computer Science (FOCS). Google ScholarGoogle ScholarCross RefCross Ref
  15. Joan Feigenbaum and Lance Fortnow. 1993. Random-self-reducibility of complete sets. SIAM Journal of Computing, 22, 5 (1993), 994–1005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Amos Fiat and Adi Shamir. 1986. How To Prove Yourself: Practical Solutions to Identification and Signature Problems. In Proc. Advances in Cryptology (CRYPTO). 186–194. Google ScholarGoogle Scholar
  17. Oded Goldreich. 2018. On doubly-efficient interactive proof systems. Foundations and Trends® in Theoretical Computer Science, 13, 3 (2018), front matter, 1–89. Google ScholarGoogle ScholarCross RefCross Ref
  18. Oded Goldreich and Avi Widgerson. 2014. On derandomizing algorithms that err extremely rarely. In Proc. 46th Annual ACM Symposium on Theory of Computing (STOC). 109–118. Full version available online at Electronic Colloquium on Computational Complexity: ECCC, 20:152 (Rev. 2), 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Shafi Goldwasser and Yael Tauman Kalai. 2003. On the (In)security of the Fiat-Shamir Paradigm. In 44th Symposium on Foundations of Computer Science (FOCS 2003), 11-14 October 2003, Cambridge, MA, USA, Proceedings. IEEE Computer Society, 102–113. Google ScholarGoogle ScholarCross RefCross Ref
  20. Shafi Goldwasser, Yael Tauman Kalai, and Guy N. Rothblum. 2015. Delegating computation: interactive proofs for muggles. Journal of the ACM, 62, 4 (2015), Art. 27, 64. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Dan Gutfreund, Ronen Shaltiel, and Amnon Ta-Shma. 2003. Uniform hardness versus randomness tradeoffs for Arthur-Merlin games. Computational Complexity, 12, 3-4 (2003), 85–130. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Justin Holmgren, Alex Lombardi, and Ron D. Rothblum. 2021. Fiat-Shamir via list-recoverable codes (or: parallel repetition of GMW is not zero-knowledge). In STOC ’21: 53rd Annual ACM SIGACT Symposium on Theory of Computing, Virtual Event, Italy, June 21-25, 2021, Samir Khuller and Virginia Vassilevska Williams (Eds.). ACM, 750–760. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Russell Impagliazzo, Valentine Kabanets, and Avi Wigderson. 2002. In search of an easy witness: exponential time vs. probabilistic polynomial time. Journal of Computer and System Sciences, 65, 4 (2002), 672–694. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Joe Kilian. 1992. A Note on Efficient Zero-Knowledge Proofs and Arguments. In Proc. 24th Annual ACM Symposium on Theory of Computing (STOC). Google ScholarGoogle Scholar
  25. Adam Klivans and Dieter van Melkebeek. 1998. Graph Nonisomorphism has Subexponential Size Proofs Unless the Polynomial-Time Hierarchy Collapses. Electronic Colloquium on Computational Complexity: ECCC, 5 (1998), 75. Google ScholarGoogle Scholar
  26. Silvio Micali. 2000. Computationally sound proofs. SIAM Journal of Computing, 30, 4 (2000), 1253–1298. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Peter Bro Miltersen and N. V. Vinodchandran. 2005. Derandomizing Arthur-Merlin games using hitting sets. Computational Complexity, 14, 3 (2005), 256–279. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Noam Nisan and Avi Wigderson. 1994. Hardness vs. randomness. Journal of Computer and System Sciences, 49, 2 (1994), 149–167. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Chris Peikert and Sina Shiehian. 2019. Noninteractive Zero Knowledge for NP from (Plain) Learning with Errors. In Advances in Cryptology - CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part I, Alexandra Boldyreva and Daniele Micciancio (Eds.) (Lecture Notes in Computer Science, Vol. 11692). Springer, 89–114. Google ScholarGoogle Scholar
  30. David Pointcheval and Jacques Stern. 1996. Provably Secure Blind Signature Schemes. In Advances in Cryptology - ASIACRYPT ’96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings, Kwangjo Kim and Tsutomu Matsumoto (Eds.) (Lecture Notes in Computer Science, Vol. 1163). Springer, 252–265. Google ScholarGoogle Scholar
  31. Alexander A. Razborov and Steven Rudich. 1997. Natural proofs. Journal of Computer and System Sciences, 55, 1, part 1 (1997), 24–35. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Omer Reingold, Guy N. Rothblum, and Ron D. Rothblum. 2018. Efficient Batch Verification for UP. In Proc. 33rd Annual IEEE Conference on Computational Complexity (CCC). 22:1–22:23. Google ScholarGoogle Scholar
  33. Omer Reingold, Guy N. Rothblum, and Ron D. Rothblum. 2021. Constant-round interactive proofs for delegating computation. SIAM Journal of Computing, 50, 3 (2021), STOC16–255–STOC16–340. Google ScholarGoogle ScholarCross RefCross Ref
  34. Ronen Shaltiel and Christopher Umans. 2005. Simple extractors for all min-entropies and a new pseudorandom generator. Journal of the ACM, 52, 2 (2005), 172–216. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Ronen Shaltiel and Christopher Umans. 2006. Pseudorandomness for Approximate Counting and Sampling. Comput. Complex., 15, 4 (2006), 298–341. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Ronen Shaltiel and Christopher Umans. 2007. Low-end uniform hardness vs. randomness tradeoffs for AM. In Proc. 39th Annual ACM Symposium on Theory of Computing (STOC). 430–439. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Adi Shamir. 1992. IP = PSPACE. Journal of the ACM, 39, 4 (1992), 869–877. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Michael Sipser. 1988. Expanders, randomness, or time versus space. Journal of Computer and System Sciences, 36, 3 (1988), 379–383. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Roei Tell. 2022. How to Find Water in the Ocean: A Survey on Quantified Derandomization. Foundations and Trends(r) in Theoretical Computer Science, 15, 1 (2022), 1–125. Google ScholarGoogle Scholar
  40. Ryan Williams. 2013. Improving Exhaustive Search Implies Superpolynomial Lower Bounds. SIAM Journal of Computing, 42, 3 (2013), 1218–1244. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Richard Ryan Williams. 2016. Strong ETH breaks with Merlin and Arthur: short non-interactive proofs of batch evaluation. In Proc. 31st Annual IEEE Conference on Computational Complexity (CCC). 50, Art. No. 2, 17. Google ScholarGoogle Scholar

Index Terms

  1. When Arthur Has Neither Random Coins Nor Time to Spare: Superfast Derandomization of Proof Systems

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        STOC 2023: Proceedings of the 55th Annual ACM Symposium on Theory of Computing
        June 2023
        1926 pages
        ISBN:9781450399135
        DOI:10.1145/3564246

        Copyright © 2023 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 2 June 2023

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate1,469of4,586submissions,32%

        Upcoming Conference

        STOC '24
        56th Annual ACM Symposium on Theory of Computing (STOC 2024)
        June 24 - 28, 2024
        Vancouver , BC , Canada

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader