Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Quadratic Simulations of Merlin–Arthur Games

Published: 03 May 2020 Publication History

Abstract

The known proofs of MA ⊆ PP incur a quadratic overhead in the running time. We prove that this quadratic overhead is necessary for black-box simulations; in particular, we obtain an oracle relative to which MA-TIME (t) ⊈ P-TIME (o(t2)). We also show that 2-sided-error Merlin–Arthur games can be simulated by 1-sided-error Arthur–Merlin games with quadratic overhead. We also present a simple, query complexity based proof (provided by Mika Göös) that there is an oracle relative to which MA ⊈ NPBPP (which was previously known to hold by a proof using generics).

References

[1]
Scott Aaronson and Avi Wigderson. 2009. Algebrization: A new barrier in complexity theory. ACM Trans. Comput. Theor. 1, 1 (2009), 2:1--2:54.
[2]
Eric Allender, Michal Koucký, Detlef Ronneburger, Sambuddha Roy, and V. Vinay. 2001. Time-space tradeoffs in the counting hierarchy. In Proceedings of the 16th Conference on Computational Complexity (CCC’01). IEEE, 295--302.
[3]
László Babai. 1985. Trading group theory for randomness. In Proceedings of the 17th Symposium on Theory of Computing (STOC’85). ACM, 421--429.
[4]
Richard Beigel, Nick Reingold, and Daniel Spielman. 1995. PP is closed under intersection. J. Comput. Syst. Sci. 50, 2 (1995), 191--202.
[5]
Harry Buhrman and Ronald de Wolf. 2002. Complexity measures and decision tree complexity: A survey. Theor. Comput. Sci. 288, 1 (2002), 21--43.
[6]
Neal Carothers. [n.d.]. A Short Course on Approximation Theory. Lecture notes. Retrieved from http://personal.bgsu.edu/ carother/Approx.html.
[7]
Aviad Cohen and Avi Wigderson. 1989. Dispersers, deterministic amplification, and weak random sources. In Proceedings of the 30th Symposium on Foundations of Computer Science (FOCS’89). IEEE, 14--19.
[8]
Scott Diehl. 2007. Lower bounds for swapping Arthur and Merlin. In Proceedings of the 11th International Workshop on Randomization and Computation (RANDOM’07). Springer, 449--463.
[9]
Scott Diehl and Dieter van Melkebeek. 2006. Time-space lower bounds for the polynomial-time hierarchy on randomized machines. SIAM J. Comput. 36, 3 (2006), 563--594.
[10]
Hartmut Ehlich and Karl Zeller. 1964. Schwankung von Polynomen zwischen Gitterpunkten. Math. Zeitschr. 86, 1 (1964), 41--44.
[11]
Stephen Fenner, Lance Fortnow, Stuart Kurtz, and Lide Li. 2003. An oracle builder’s toolkit. Inf. Comput. 182, 2 (2003), 95--136.
[12]
Lance Fortnow and John Rogers. 1999. Complexity limitations on quantum computation. J. Comput. Syst. Sci. 59, 2 (1999), 240--252.
[13]
Ofer Gabber and Zvi Galil. 1981. Explicit constructions of linear-sized superconcentrators. J. Comput. Syst. Sci. 22, 3 (1981), 407--420.
[14]
Russell Impagliazzo and David Zuckerman. 1989. How to recycle random bits. In Proceedings of the 30th Symposium on Foundations of Computer Science (FOCS’89). IEEE, 248--253.
[15]
Eyal Kushilevitz and Noam Nisan. 1997. Communication Complexity. Cambridge University Press.
[16]
Clemens Lautemann. 1983. BPP and the polynomial hierarchy. Inf. Process. Lett. 17, 4 (1983), 215--217.
[17]
Marvin Minsky and Seymour Papert. 1987. Perceptrons—An Introduction to Computational Geometry. MIT Press.
[18]
Noam Nisan and Mario Szegedy. 1994. On the degree of Boolean functions as real polynomials. Comput. Complex. 4, 4 (1994), 301--313.
[19]
Ran Raz, Gábor Tardos, Oleg Verbitsky, and Nikolai Vereshchagin. 1999. Arthur–Merlin games in boolean decision trees. J. Comput. Syst. Sci. 59, 2 (1999), 346--372.
[20]
Theodore Rivlin. 1981. An Introduction to the Approximation of Functions. Dover.
[21]
Theodore Rivlin and Elliot Ward Cheney. 1966. A comparison of uniform approximations on an interval and a finite subset thereof. SIAM J. Numer. Anal. 3, 2 (1966), 311--320.
[22]
Alexander Russell and Ravi Sundaram. 1998. Symmetric alternation captures BPP. Comput. Complex. 7, 2 (1998), 152--162.
[23]
Alexander Sherstov. 2013. The intersection of two halfspaces has high threshold degree. SIAM J. Comput. 42, 6 (2013), 2329--2374.
[24]
Alexander Sherstov. 2018. Breaking the Minsky–Papert barrier for constant-depth circuits. SIAM J. Comput. 47, 5 (2018), 1809--1857.
[25]
Michael Sipser. 1983. A complexity theoretic approach to randomness. In Proceedings of the 15th Symposium on Theory of Computing (STOC’83). ACM, 330--335.
[26]
Dieter van Melkebeek. 2006. A survey of lower bounds for satisfiability and related problems. Found. Trends Theor. Comput. Sci. 2, 3 (2006), 197--303.
[27]
Dieter van Melkebeek and Thomas Watson. 2012. Time-space efficient simulations of quantum computations. Theor. Comput. 8, 1 (2012), 1--51.
[28]
Nikolai Vereshchagin. 1992. On the power of PP. In Proceedings of the 7th Structure in Complexity Theory Conference (STRUCTURES’92). IEEE, 138--143.
[29]
Nikolai Vereshchagin. 1995. Lower bounds for perceptrons solving some separation problems and oracle separation of AM from PP. In Proceedings of the 3rd Israel Symposium on Theory of Computing and Systems (ISTCS’95). IEEE, 46--51.
[30]
Nikolai Vereshchagin. 1999. Relativizability in complexity theory. In Provability, Complexity, Grammars. AMS Translations, Series 2, Vol. 192. American Mathematical Society, 87--172.
[31]
Emanuele Viola. 2009. On approximate majority and probabilistic time. Comput. Complex. 18, 3 (2009), 337--375.
[32]
Thomas Watson. 2018. Quadratic simulations of Merlin–Arthur games. In Proceedings of the 13th Latin American Theoretical Informatics Symposium (LATIN’18). Springer, 864--872.
[33]
Ryan Williams. 2008. Time-space tradeoffs for counting NP solutions modulo integers. Comput. Complex. 17, 2 (2008), 179--219.

Index Terms

  1. Quadratic Simulations of Merlin–Arthur Games

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Computation Theory
    ACM Transactions on Computation Theory  Volume 12, Issue 2
    June 2020
    138 pages
    ISSN:1942-3454
    EISSN:1942-3462
    DOI:10.1145/3382781
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 03 May 2020
    Accepted: 01 March 2020
    Revised: 01 April 2019
    Received: 01 December 2017
    Published in TOCT Volume 12, Issue 2

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Arthur
    2. Merlin
    3. Quadratic
    4. games
    5. simulations

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    • NSF

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 100
      Total Downloads
    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 11 Feb 2025

    Other Metrics

    Citations

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media