Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3188745.3188822acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
research-article

Quantified derandomization of linear threshold circuits

Published: 20 June 2018 Publication History

Abstract

One of the prominent current challenges in complexity theory is the attempt to prove lower bounds for TC0, the class of constant-depth, polynomial-size circuits with majority gates. Relying on the results of Williams (2013), an appealing approach to prove such lower bounds is to construct a non-trivial derandomization algorithm for TC0. In this work we take a first step towards the latter goal, by proving the first positive results regarding the derandomization of TC0 circuits of depth d>2.
Our first main result is a quantified derandomization algorithm for TC0 circuits with a super-linear number of wires. Specifically, we construct an algorithm that gets as input a TC0 circuit C over n input bits with depth d and n1+exp(−d) wires, runs in almost-polynomial-time, and distinguishes between the case that C rejects at most 2n1−1/5d inputs and the case that C accepts at most 2n1−1/5d inputs. In fact, our algorithm works even when the circuit C is a linear threshold circuit, rather than just a TC0 circuit (i.e., C is a circuit with linear threshold gates, which are stronger than majority gates).
Our second main result is that even a modest improvement of our quantified derandomization algorithm would yield a non-trivial algorithm for standard derandomization of all of TC0, and would consequently imply that NEXPTC0. Specifically, if there exists a quantified derandomization algorithm that gets as input a TC0 circuit with depth d and n1+O(1/d) wires (rather than n1+exp(−d) wires), runs in time at most 2nexp(−d), and distinguishes between the case that C rejects at most 2n1−1/5d inputs and the case that C accepts at most 2n1−1/5d inputs, then there exists an algorithm with running time 2n1−Ω(1) for standard derandomization of TC0.

Supplementary Material

MP4 File (6b-1.mp4)

References

[1]
Scott Aaronson. 2017.
[2]
P ? = N P. Accessed at http://www.scottaaronson.com/ papers/pnp.pdf, June 20, 2017.
[3]
Miklos Ajtai and Avi Wigderson. 1985. Deterministic simulation of probabilistic constant depth circuits. In Proc. 26th Annual IEEE Symposium on Foundations of Computer Science (FOCS).
[4]
Eric Allender and Michal Koucký. 2010. Amplifying lower bounds by means of self-reducibility. Journal of the ACM 57, 3 (2010), 14, 36.
[5]
N. Alon, J. Bruck, J. Naor, M. Naor, and R. M. Roth. 1992.
[6]
Construction of Asymptotically Good Low-rate Error-correcting Codes Through Pseudo-random Graphs. IEEE Transactions on Information Theory 38, 2 (1992), 509–516.
[7]
Kazuyuki Amano and Atsushi Saito. 2015.
[8]
Sanjeev Arora and Boaz Barak. 2009.
[9]
Computational complexity: A modern approach. Cambridge University Press, Cambridge.
[10]
Z. Bar-Yossef, O. Reingold, R. Shaltiel, and L. Trevisan. 2002. Streaming computation of combinatorial objects. In Proc. 17th Annual IEEE Conference on Computational Complexity (CCC). 133–142.
[11]
Paul Beame, Erik Brisson, and Richard Ladner. 1992. The complexity of computing symmetric functions using threshold circuits. Theoretical Computer Science 100, 1 (1992), 253–265.
[12]
Paul Beame, Russell Impagliazzo, and Srikanth Srinivasan. 2012. Approximating AC 0 by small height decision trees and a deterministic algorithm for #AC 0 SAT. In Proc. 27th Annual IEEE Conference on Computational Complexity (CCC). 117– 125.
[13]
Eli Ben-Sasson and Emanuele Viola. 2014. Short PCPs with projection queries. In Proc. 41st International Colloquium on Automata, Languages and Programming (ICALP). 163–173.
[14]
Manuel Blum and Silvio Micali. 1984. How to Generate Cryptographically Strong Sequences of Pseudo-random Bits. SIAM Journal of Computing 13, 4 (1984), 850–864.
[15]
Mark Braverman. 2010. Polylogarithmic independence fools AC 0 circuits. Journal of the ACM 57, 5 (2010).
[16]
Ruiwen Chen, Valentine Kabanets, Antonina Kolokolova, Ronen Shaltiel, and David Zuckerman. 2015. Mining circuit lower bound proofs for meta-algorithms. Computational Complexity 24, 2 (2015), 333–392.
[17]
Ruiwen Chen, Rahul Santhanam, and Srikanth Srinivasan. 2016. Average-case lower bounds and satisfiability algorithms for small threshold circuits. In Proc. 31st Annual IEEE Conference on Computational Complexity (CCC). 1:1–1:35.
[18]
Kuan Cheng and Xin Li. 2016. Randomness Extraction in AC0 and with Small Locality. Electronic Colloquium on Computational Complexity: ECCC 23 (2016), 18.
[19]
Ilias Diakonikolas, Parikshit Gopalan, Ragesh Jaiswal, Rocco A. Servedio, and Emanuele Viola. 2010. Bounded independence fools halfspaces. SIAM Journal of Computing 39, 8 (2010), 3441–3462.
[20]
Devdatt Dubhashi and Alessandro Panconesi. 2009.
[21]
Concentration of Measure for the Analysis of Randomized Algorithms. Cambridge University Press.
[22]
Quantified Derandomization of Linear Threshold Circuits STOC’18, June 25–29, 2018, Los Angeles, CA, USA
[23]
Anna Gál, Kristoffer Arnsfelt Hansen, Michal Koucký, Pavel Pudlák, and Emanuele Viola. 2013.
[24]
Tight bounds on computing error-correcting codes by bounded-depth circuits with arbitrary gates. IEEE Transactions on Information Theory 59, 10 (2013), 6611–6627.
[25]
Oded Goldreich. 2008.
[26]
Computational Complexity: A Conceptual Perspective. Cambridge University Press, New York, NY, USA.
[27]
Oded Goldreich, Emanuele Viola, and Avi Wigderson. 2015.
[28]
On Randomness Extraction in AC0. In Proc. 30th Annual IEEE Conference on Computational Complexity (CCC). 601–668.
[29]
Oded Goldreich and Avi Widgerson. 2013. On derandomizing algorithms that err extremely rarely. Electronic Colloquium on Computational Complexity: ECCC 20 (2013), 152.
[30]
Oded Goldreich and Avi Widgerson. 2014. On derandomizing algorithms that err extremely rarely. In Proc. 46th Annual ACM Symposium on Theory of Computing (STOC). 109–118. Full version available online at Electronic Colloquium on Computational Complexity: ECCC, 20:152 (Rev. 2), 2013.
[31]
Parikshit Gopalan, Daniel Kane, and Raghu Meka. 2015.
[32]
Pseudorandomness via the discrete Fourier transform. In Proc. 56th Annual IEEE Symposium on Foundations of Computer Science (FOCS). 903–922.
[33]
Parikshit Gopalan, Raghu Meka, and Omer Reingold. 2013. DNF sparsification and a faster deterministic counting algorithm. Computational Complexity 22, 2 (2013), 275–310.
[34]
Parikshit Gopalan, Ryan O’Donnell, Yi Wu, and David Zuckerman. 2010. Fooling functions of halfspaces under product distributions. In Proc. 25th Annual IEEE Conference on Computational Complexity (CCC). 223–234.
[35]
Hans Dietmar Gröger and György" Turán. 1991. On linear decision trees computing Boolean functions. In Proc. 18th International Colloquium on Automata, Languages and Programming (ICALP). 707–718.
[36]
Prahladh Harsha, Adam Klivans, and Raghu Meka. 2012. An invariance principle for polytopes. Journal of the ACM 59, 6 (2012), 29:1–29:25.
[37]
Alexander D. Healy. 2008. Randomness-efficient sampling within NC 1. Computational Complexity 17, 1 (2008), 3–37.
[38]
Russell Impagliazzo, Valentine Kabanets, and Avi Wigderson. 2002. In search of an easy witness: exponential time vs. probabilistic polynomial time. Journal of Computer and System Sciences 65, 4 (2002), 672–694.
[39]
Russell Impagliazzo, William Matthews, and Ramamohan Paturi. 2012. A satisfiability algorithm for AC 0. In Proc. 23rd Annual ACM-SIAM Symposium on Discrete Algorithms (SODA). 961–972.
[40]
Russell Impagliazzo, Raghu Meka, and David Zuckerman. 2012. Pseudorandomness from shrinkage. In Proc. 53rd Annual IEEE Symposium on Foundations of Computer Science (FOCS). 111–119.
[41]
Russell Impagliazzo, Ramamohan Paturi, and Michael E. Saks. 1997. Size-depth tradeoffs for threshold circuits. SIAM Journal of Computing 26, 3 (1997), 693–707.
[42]
Russell Impagliazzo, Ramamohan Paturi, and Stefan Schneider. 2013. A satisfiability algorithm for sparse depth two threshold circuits. In Proc. 54th Annual IEEE Symposium on Foundations of Computer Science (FOCS). 479–488.
[43]
R. Impagliazzo and A. Wigderson. 1998. Randomness vs. Time: De-Randomization Under a Uniform Assumption. In Proc. 39th Annual IEEE Symposium on Foundations of Computer Science (FOCS). 734–.
[44]
Daniel M. Kane. 2011. A small PRG for polynomial threshold functions of Gaussians. In Proc. 52nd Annual IEEE Symposium on Foundations of Computer Science (FOCS). 257–266.
[45]
Daniel M. Kane. 2014.
[46]
A pseudorandom generator for polynomial threshold functions of Gaussian with subpolynomial seed length. In Proc. 29th Annual IEEE Conference on Computational Complexity (CCC). 217–228.
[47]
Daniel M. Kane and Ryan Williams. 2016. Super-linear Gate and Super-quadratic Wire Lower Bounds for Depth-two and Depth-three Threshold Circuits. In Proc. 48th Annual ACM Symposium on Theory of Computing (STOC). 633–643.
[48]
Zohar S. Karnin, Yuval Rabani, and Amir Shpilka. 2012.
[49]
Explicit dimension reduction and its applications. SIAM Journal of Computing 41, 1 (2012), 219–249.
[50]
Pravesh K. Kothari and Raghu Meka. 2015.
[51]
Almost optimal pseudorandom generators for spherical caps. In Proc. 47th Annual ACM Symposium on Theory of Computing (STOC). 247–256.
[52]
Nathan Linial, Yishay Mansour, and Noam Nisan. 1993. Constant depth circuits, Fourier transform, and learnability. Journal of the Association for Computing Machinery 40, 3 (1993), 607–620.
[53]
Raghu Meka and David Zuckerman. 2013. Pseudorandom generators for polynomial threshold functions. SIAM Journal of Computing 42, 3 (2013), 1275–1301.
[54]
Joseph Naor and Moni Naor. 1993. Small-bias probability spaces: efficient constructions and applications. SIAM Journal of Computing 22, 4 (1993), 838–856.
[55]
Noam Nisan. 1993.
[56]
The communication complexity of threshold gates. In Combinatorics, Paul Erdős is eighty, Vol. 1. 301–315.
[57]
Noam Nisan and Avi Wigderson. 1994.
[58]
Hardness vs. randomness. Journal of Computer and System Sciences 49, 2 (1994), 149–167.
[59]
Ryan O’Donnell. 2014.
[60]
Analysis of Boolean Functions. Cambridge University Press.
[61]
Ramamohan Paturi and Michael E. Saks. 1994. Approximating threshold circuits by rational functions. Information and Computation 112, 2 (1994), 257–272.
[62]
Yuval Rabani and Amir Shpilka. 2010. Explicit Construction of a Small epsilon-Net for Linear Threshold Functions. SIAM Journal of Computing 39, 8 (2010), 3501–3520.
[63]
Ran Raz, Omer Reingold, and Salil Vadhan. 2002. Extracting all the randomness and reducing the error in Trevisan’s extractors. Journal of Computer and System Sciences 65, 1 (2002), 97–128.
[64]
V. P. Roychowdhury, A. Orlitsky, and Kai-Yeung Siu. 1994.
[65]
Lower bounds on threshold and related circuits via communication complexity. IEEE Transactions on Information Theory 40, 2 (1994), 467–474.
[66]
Takayuki Sakai, Kazuhisa Seto, Suguru Tamaki, and Junichi Teruyama. 2016.
[67]
Bounded depth circuits with weighted symmetric gates: satisfiability, lower bounds and compression. In Proc. 41st International Symposium on Mathematical Foundations of Computer Science.
[68]
Rahul Santhanam. 2010. Fighting perebor: new and improved algorithms for formula and QBF satisfiability. In Proc. 51st Annual IEEE Symposium on Foundations of Computer Science (FOCS). 183–192.
[69]
Rahul Santhanam and Ryan Williams. 2013. On medium-uniformity and circuit lower bounds. In Proc. 28th Annual IEEE Conference on Computational Complexity (CCC). 15–23.
[70]
Rocco Servedio and Li-Yang Tan. 2017. Deterministic search for CNF satisfying assignments in almost polynomial time. In Proc. 58th Annual IEEE Symposium on Foundations of Computer Science (FOCS).
[71]
Rocco Servedio and Li-Yang Tan. 2017. Learning and fooling depth-two threshold circuits. (2017).
[72]
Unpublished manuscript.
[73]
Rocco A. Servedio. 2007.
[74]
Every linear threshold function has a low-weight approximator. Computational Complexity 16, 2 (2007), 180–209.
[75]
K. Seto and S. Tamaki. 2012. A Satisfiability Algorithm and Average-Case Hardness for Formulas over the Full Binary Basis. In Proc. 27th Annual IEEE Conference on Computational Complexity (CCC). 107–116.
[76]
Roman Smolensky. 1990.
[77]
Amnon Ta-Shma. 2017. Explicit, Almost Optimal, Epsilon-Balanced Codes. In Proc. 49th Annual ACM Symposium on Theory of Computing (STOC).
[78]
Suguru Tamaki. 2016. A Satisfiability Algorithm for Depth Two Circuits with a Sub-Quadratic Number of Symmetric and Threshold Gates. Electronic Colloquium on Computational Complexity: ECCC 23 (2016), 100.
[79]
Roei Tell. 2017. Improved Bounds for Quantified Derandomization of Constant-Depth Circuits and Polynomials. In Proc. 32nd Annual IEEE Conference on Computational Complexity (CCC). 18:1 – 18:49.
[80]
Roei Tell. 2017. Quantified Derandomization of Linear Threshold Circuits (rev. 2). Electronic Colloquium on Computational Complexity: ECCC 24 (2017), 145.
[81]
Luca Trevisan. 2001. Extractors and Pseudorandom Generators. Journal of the ACM 48, 4 (2001), 860–879.
[82]
Luca Trevisan and TongKe Xue. 2013. A derandomized switching lemma and an improved derandomization of AC0. In Proc. 28th Annual IEEE Conference on Computational Complexity (CCC). 242–247.
[83]
Emanuele Viola. 2005. The complexity of constructing pseudorandom generators from hard functions. Computational Complexity 13, 3-4 (2005), 147–188.
[84]
Ryan Williams. 2011.
[85]
Non-uniform ACC circuit lower bounds. In Proc. 26th Annual IEEE Conference on Computational Complexity (CCC). 115–125.
[86]
Ryan Williams. 2013.
[87]
Improving Exhaustive Search Implies Superpolynomial Lower Bounds. SIAM Journal of Computing 42, 3 (2013), 1218–1244.
[88]
Ryan Williams. 2014. Algorithms for circuits and circuits for algorithms: Connecting the tractable and intractable. In Proc. International Congress of Mathematicians (ICM). 659–682.
[89]
Ryan Williams. 2014. New algorithms and lower bounds for circuits with linear threshold gates. In Proc. 55th Annual ACM Symposium on Theory of Computing (STOC). 194–202.

Cited By

View all
  • (2024)On the Complexity of Avoiding Heavy Elements2024 IEEE 65th Annual Symposium on Foundations of Computer Science (FOCS)10.1109/FOCS61266.2024.00140(2403-2412)Online publication date: 27-Oct-2024
  • (2023)Depth-𝑑 Threshold Circuits vs. Depth-(𝑑+1) AND-OR TreesProceedings of the 55th Annual ACM Symposium on Theory of Computing10.1145/3564246.3585216(895-904)Online publication date: 2-Jun-2023
  • (2022)Nearly Optimal Pseudorandomness from HardnessJournal of the ACM10.1145/355530769:6(1-55)Online publication date: 17-Nov-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
STOC 2018: Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing
June 2018
1332 pages
ISBN:9781450355599
DOI:10.1145/3188745
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 June 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Circuit Lower Bounds
  2. Derandomization
  3. Linear Threshold Circuits

Qualifiers

  • Research-article

Conference

STOC '18
Sponsor:
STOC '18: Symposium on Theory of Computing
June 25 - 29, 2018
CA, Los Angeles, USA

Acceptance Rates

Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

Upcoming Conference

STOC '25
57th Annual ACM Symposium on Theory of Computing (STOC 2025)
June 23 - 27, 2025
Prague , Czech Republic

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)0
Reflects downloads up to 17 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)On the Complexity of Avoiding Heavy Elements2024 IEEE 65th Annual Symposium on Foundations of Computer Science (FOCS)10.1109/FOCS61266.2024.00140(2403-2412)Online publication date: 27-Oct-2024
  • (2023)Depth-𝑑 Threshold Circuits vs. Depth-(𝑑+1) AND-OR TreesProceedings of the 55th Annual ACM Symposium on Theory of Computing10.1145/3564246.3585216(895-904)Online publication date: 2-Jun-2023
  • (2022)Nearly Optimal Pseudorandomness from HardnessJournal of the ACM10.1145/355530769:6(1-55)Online publication date: 17-Nov-2022
  • (2022)The exact complexity of pseudorandom functions and the black-box natural proof barrier for bootstrapping results in computational complexityProceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing10.1145/3519935.3520010(962-975)Online publication date: 9-Jun-2022
  • (2022)A Short List of Equalities Induces Large Sign-RankSIAM Journal on Computing10.1137/19M127134851:3(820-848)Online publication date: 14-Jun-2022
  • (2022)Fooling Constant-Depth Threshold Circuits (Extended Abstract)2021 IEEE 62nd Annual Symposium on Foundations of Computer Science (FOCS)10.1109/FOCS52979.2021.00019(104-115)Online publication date: Feb-2022
  • (2022)On Hitting-Set Generators for Polynomials that Vanish RarelyComputational Complexity10.1007/s00037-022-00229-231:2Online publication date: 1-Dec-2022
  • (2021)Hardness of KT characterizes parallel cryptographyProceedings of the 36th Computational Complexity Conference10.4230/LIPIcs.CCC.2021.35Online publication date: 20-Jul-2021
  • (2021)Simple and fast derandomization from very hard functions: eliminating randomness at almost no costProceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing10.1145/3406325.3451059(283-291)Online publication date: 15-Jun-2021
  • (2020)Sharp threshold results for computational complexityProceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing10.1145/3357713.3384283(1335-1348)Online publication date: 22-Jun-2020
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media