Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3055399.3055466acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
research-article
Public Access

Average-case fine-grained hardness

Published: 19 June 2017 Publication History

Abstract

We present functions that can be computed in some fixed polynomial time but are hard on average for any algorithm that runs in slightly smaller time, assuming widely-conjectured worst-case hardness for problems from the study of fine-grained complexity. Unconditional constructions of such functions are known from before (Goldmann et al., IPL '94), but these have been canonical functions that have not found further use, while our functions are closely related to well-studied problems and have considerable algebraic structure.
Based on the average-case hardness and structural properties of our functions, we outline the construction of a Proof of Work scheme and discuss possible approaches to constructing fine-grained One-Way Functions. We also show how our reductions make conjectures regarding the worst-case hardness of the problems we reduce from (and consequently the Strong Exponential Time Hypothesis) heuristically falsifiable in a sense similar to that of (Naor, CRYPTO '03).
We prove our hardness results in each case by showing fine-grained reductions from solving one of three problems - namely, Orthogonal Vectors (OV), 3SUM, and All-Pairs Shortest Paths (APSP) - in the worst case to computing our function correctly on a uniformly random input. The conjectured hardness of OV and 3SUM then gives us functions that require n2-o(1) time to compute on average, and that of APSP gives us a function that requires n3-o(1) time. Using the same techniques we also obtain a conditional average-case time hierarchy of functions.

Supplementary Material

MP4 File (d2_sa_3.mp4)

References

[1]
Amir Abboud. 2017. Personal communication. (2017).
[2]
Amir Abboud, Arturs Backurs, and Virginia Vassilevska Williams. 2015. If the current clique algorithms are optimal, so is Valiant’s parser. In Foundations of Computer Science (FOCS), 2015 IEEE 56th Annual Symposium on. IEEE, 98–117.
[3]
Amir Abboud, Arturs Backurs, and Virginia Vassilevska Williams. 2015.
[4]
Quadratic-Time Hardness of LCS and other Sequence Similarity Measures. CoRR abs/1501.07053 (2015). http://arxiv.org/abs/1501.07053
[5]
Amir Abboud, Thomas Dueholm Hansen, Virginia Vassilevska Williams, and Ryan Williams. 2015.
[6]
Simulating branching programs with edit distance and friends or: A polylog shaved is a lower bound made. arXiv preprint arXiv:1511.06022 (2015).
[7]
Amir Abboud and Kevin Lewi. 2013. Exact weight subgraphs and the k-sum conjecture. In International Colloquium on Automata, Languages, and Programming. Springer Berlin Heidelberg, 1–12.
[8]
Amir Abboud, Virginia Vassilevska Williams, and Oren Weimann. 2014. Consequences of faster alignment of sequences. In International Colloquium on Automata, Languages, and Programming. Springer, 39–51. STOC’17, June 2017, Montreal, Canada Ball et al.
[9]
Amir Abboud, Virginia Vassilevska Williams, and Huacheng Yu. 2015. Matching Triangles and Basing Hardness on an Extremely Popular Conjecture. Manuscript: https://dl.dropboxusercontent.com/u/14999836/publications/MatchTria. pdf. (2015).
[10]
László Babai. 1985.
[11]
Trading Group Theory for Randomness. In Proceedings of the 17th Annual ACM Symposium on Theory of Computing, May 6-8, 1985, Providence, Rhode Island, USA, Robert Sedgewick (Ed.). ACM, 421–429.
[12]
Arturs Backurs, Nishanth Dikkala, and Christos Tzamos. 2016. Tight Hardness Results for Maximum Weight Rectangles. arXiv preprint arXiv:1602.05837 (2016).
[13]
Arturs Backurs and Piotr Indyk. 2014. Edit Distance Cannot Be Computed in Strongly Subquadratic Time (unless SETH is false). CoRR abs/1412.0348 (2014). http://arxiv.org/abs/1412.0348
[14]
Arturs Backurs and Christos Tzamos. 2016. Improving Viterbi is Hard: Better Runtimes Imply Faster Clique Algorithms. arXiv preprint arXiv:1607.04229 (2016).
[15]
Marshall Ball, Alon Rosen, Manuel Sabin, and Prashant Nalini Vasudevan. 2017.
[16]
Proofs of Useful Work. In submission. (2017).
[17]
Armin Biere, Marijn Heule, and Hans van Maaren. 2009.
[18]
Handbook of satisfiability. Vol. 185. ios press. http://gauss.ececs.uc.edu/Courses/c626/notes/history.pdf
[19]
Andreas Björklund and Petteri Kaski. 2016. How proofs are prepared at Camelot. In Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing. ACM, 391–400.
[20]
Andrej Bogdanov and Luca Trevisan. 2006.
[21]
Average-Case Complexity. Foundations and Trends in Theoretical Computer Science 2, 1 (2006). //
[22]
Karl Bringmann, Allan Grønlund, and Kasper Green Larsen. 2016. A Dichotomy for Regular Expression Membership Testing. arXiv preprint arXiv:1611.00918 (2016).
[23]
Karl Bringmann and Marvin Künnemann. 2015.
[24]
Quadratic conditional lower bounds for string problems and dynamic time warping. In Foundations of Computer Science (FOCS), 2015 IEEE 56th Annual Symposium on. IEEE, 79–97.
[25]
Jin-yi Cai, Aduri Pavan, and D. Sivakumar. 1999. On the Hardness of Permanent. In STACS 99, 16th Annual Symposium on Theoretical Aspects of Computer Science, Trier, Germany, March 4-6, 1999, Proceedings (Lecture Notes in Computer Science), Christoph Meinel and Sophie Tison (Eds.), Vol. 1563. Springer, 90–99.
[26]
Chris Calabro, Russell Impagliazzo, Valentine Kabanets, and Ramamohan Paturi. 2003. The Complexity of Unique k-SAT: An Isolation Lemma for k-CNFs. In 18th Annual IEEE Conference on Computational Complexity (Complexity 2003), 7-10 July 2003, Aarhus, Denmark. 135.
[27]
Marco L. Carmosino, Jiawei Gao, Russell Impagliazzo, Ivan Mihajlin, Ramamohan Paturi, and Stefan Schneider. 2016.
[28]
Nondeterministic Extensions of the Strong Exponential Time Hypothesis and Consequences for Non-reducibility. In Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, Cambridge, MA, USA, January 14-16, 2016. 261–270. //
[29]
Timothy M Chan and Ryan Williams. 2016.
[30]
Deterministic apsp, orthogonal vectors, and more: Quickly derandomizing razborov-smolensky. In Proceedings of the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms. Society for Industrial and Applied Mathematics, 1246–1255.
[31]
M. Cygan, F.V. Fomin, L. Kowalik, D. Lokshtanov, D. Marx, M. Pilipczuk, M. Pilipczuk, and S. Saurabh. 2015.
[32]
Parameterized Algorithms. Springer International Publishing. 469–470 pages. https://books.google.co.il/books?id=Frg0CgAAQBAJ
[33]
Akshay Degwekar, Vinod Vaikuntanathan, and Prashant Nalini Vasudevan. 2016. Fine-Grained Cryptography. In Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III. 533–562.
[34]
Holger Dell, Thore Husfeldt, and Martin Wahlén. 2010. Exponential time complexity of the permanent and the Tutte polynomial. In International Colloquium on Automata, Languages, and Programming. Springer, 426–437.
[35]
Cynthia Dwork and Moni Naor. 1992. Pricing via Processing or Combatting Junk Mail. In Advances in Cryptology - CRYPTO ’92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings. 139–147.
[36]
J Feigenbaum and L Fortnow. 1990. On the Random-Self-Reducibility of Complete Sets. University of Chicago Technical Report (1990), 90–22.
[37]
Charles M. Fiduccia. 1972. Polynomial Evaluation via the Division Algorithm: The Fast Fourier Transform Revisited. In Proceedings of the 4th Annual ACM Symposium on Theory of Computing, May 1-3, 1972, Denver, Colorado, USA, Patrick C. Fischer, H. Paul Zeiger, Jeffrey D. Ullman, and Arnold L. Rosenberg (Eds.). ACM, 88–93.
[38]
Anka Gajentaan and Mark H Overmars. 1995. On a class of O (n 2 ) problems in computational geometry. Computational geometry 5, 3 (1995), 165–185.
[39]
Jiawei Gao and Russell Impagliazzo. 2016. Orthogonal Vectors is hard for firstorder properties on sparse graphs. Electronic Colloquium on Computational Complexity (ECCC) 23 (2016), 53. http://eccc.hpi-web.de/report/2016/053
[40]
Peter Gemmell and Madhu Sudan. 1992. Highly resilient correctors for polynomials. Information processing letters 43, 4 (1992), 169–174.
[41]
Mikael Goldmann, Per Grape, and Johan Håstad. 1994.
[42]
On Average Time Hierarchies. Inf. Process. Lett. 49, 1 (1994), 15–20.
[43]
Oded Goldreich, Shafi Goldwasser, and Silvio Micali. 1984. How to Construct Random Functions (Extended Abstract). In 25th Annual Symposium on Foundations of Computer Science, West Palm Beach, Florida, USA, 24-26 October 1984.
[44]
464–479.
[45]
Oded Goldreich and Guy Rothblum. February 2017. Simple Doubly-Efficient Interactive Proof Systems for Locally-Characterizable Sets. Electronic Colloquium on Computational Complexity Report TR17-018. (February 2017).
[46]
Shafi Goldwasser and Dhiraj Holden. 2016.
[47]
On the Fine Grained Complexity of Polynomial Time Problems Given Correlated Instances. In Innovations in Theoretical Computer Science (ITCS).
[48]
Shafi Goldwasser and Michael Sipser. 1986. Private coins versus public coins in interactive proof systems. In Proceedings of the eighteenth annual ACM symposium on Theory of computing. ACM, 59–68.
[49]
Johan Håstad. 1987. One-way permutations in N C 0. Inform. Process. Lett. 26, 3 (1987), 153–155.
[50]
Johan Håstad, Russell Impagliazzo, Leonid A. Levin, and Michael Luby. 1999. A Pseudorandom Generator from any One-way Function. SIAM J. Comput. 28, 4 (1999), 1364–1396.
[51]
Ellis Horowitz. 1972.
[52]
A fast method for interpolation using preconditioning. Inform. Process. Lett. 1, 4 (1972), 157–163.
[53]
R. Impagliazzo. 1995. A Personal View of Average-case Complexity. In Proceedings of the 10th Annual Structure in Complexity Theory Conference (SCT’95) (SCT ’95). IEEE Computer Society, Washington, DC, USA, 134–. http://dl.acm.org/citation. cfm?id=829497.829786
[54]
Russell Impagliazzo and Michael Luby. 1989. One-way Functions are Essential for Complexity Based Cryptography (Extended Abstract). In 30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October - 1 November 1989. 230–235.
[56]
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, and Amit Sahai. 2008. Cryptography with constant computational overhead. In Proceedings of the fortieth annual ACM symposium on Theory of computing. ACM, 433–442.
[57]
Jeffrey C Lagarias and Andrew M. Odlyzko. 1987. Computing π (x): An analytic method. Journal of Algorithms 8, 2 (1987), 173–191.
[58]
Leonid A. Levin. 1986. Average Case Complete Problems. SIAM J. Comput. 15, 1 (1986), 285–286.
[59]
Richard Lipton. 1991.
[60]
New directions in testing. Distributed Computing and Cryptography 2 (1991), 191–202.
[61]
Ueli M Maurer. 1992. Conditionally-perfect secrecy and a provably-secure randomized cipher. Journal of Cryptology 5, 1 (1992), 53–66.
[62]
Ralph C. Merkle. 1978. Secure Communications Over Insecure Channels. Commun. ACM 21, 4 (1978), 294–299.
[63]
Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008).
[64]
Moni Naor. 2003.
[65]
On cryptographic assumptions and challenges. In Annual International Cryptology Conference. Springer, 96–109.
[66]
Jaroslav Nešetřil and Svatopluk Poljak. 1985. On the complexity of the subgraph problem. Commentationes Mathematicae Universitatis Carolinae 26, 2 (1985), 415–419.
[67]
Mihai P ˇ atraşcu. 2010. Towards Polynomial Lower Bounds for Dynamic Problems. In Proceedings of the Forty-second ACM Symposium on Theory of Computing (STOC ’10). ACM, New York, NY, USA, 603–610.
[68]
Liam Roditty and Uri Zwick. 2004.
[69]
On dynamic shortest paths problems. In European Symposium on Algorithms. Springer, 580–591.
[70]
Virginia Vassilevska and Ryan Williams. 2009. Finding, minimizing, and counting weighted subgraphs. In In Proceedings of the Fourty-First Annual ACM Symposium on the Theory of Computing. 455–464.
[71]
Ryan Williams. 2005.
[72]
A new algorithm for optimal 2-constraint satisfaction and its implications. Theor. Comput. Sci. 348, 2-3 (2005), 357–365. //
[73]
Ryan Williams. 2016. Strong ETH Breaks With Merlin and Arthur: Short Non-Interactive Proofs of Batch Evaluation. In 31st Conference on Computational Complexity, CCC 2016, May 29 to June 1, 2016, Tokyo, Japan. 2:1–2:17.
[74]
Virginia Vassilevska Williams. 2015. Hardness of easy problems: Basing hardness on popular conjectures such as the strong exponential time hypothesis. In Proc. International Symposium on Parameterized and Exact Computation. 16–28. http: //theory.stanford.edu/~virgi/ipecsurvey.pdf

Cited By

View all
  • (2024)On Sequential Functions and Fine-Grained CryptographyAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68388-6_14(393-428)Online publication date: 17-Aug-2024
  • (2024)Fine-Grained Non-interactive Key Exchange, RevisitedAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68379-4_9(286-312)Online publication date: 16-Aug-2024
  • (2024)Towards Permissionless Consensus in the Standard Model via Fine-Grained ComplexityAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68379-4_4(113-146)Online publication date: 16-Aug-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
STOC 2017: Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing
June 2017
1268 pages
ISBN:9781450345286
DOI:10.1145/3055399
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 19 June 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Average-Case Complexity
  2. Cryptography
  3. Fine-Grained Complexity
  4. Heuristic Falsifiability
  5. Proofs of Work
  6. Worst-Case to Average-Case Reduction

Qualifiers

  • Research-article

Funding Sources

Conference

STOC '17
Sponsor:
STOC '17: Symposium on Theory of Computing
June 19 - 23, 2017
Montreal, Canada

Acceptance Rates

Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)153
  • Downloads (Last 6 weeks)24
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2024)On Sequential Functions and Fine-Grained CryptographyAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68388-6_14(393-428)Online publication date: 17-Aug-2024
  • (2024)Fine-Grained Non-interactive Key Exchange, RevisitedAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68379-4_9(286-312)Online publication date: 16-Aug-2024
  • (2024)Towards Permissionless Consensus in the Standard Model via Fine-Grained ComplexityAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68379-4_4(113-146)Online publication date: 16-Aug-2024
  • (2024)k-SUM in the Sparse Regime: Complexity and ApplicationsAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68379-4_10(315-351)Online publication date: 16-Aug-2024
  • (2023)Hardness Self-Amplification: Simplified, Optimized, and UnifiedProceedings of the 55th Annual ACM Symposium on Theory of Computing10.1145/3564246.3585189(70-83)Online publication date: 2-Jun-2023
  • (2023)Evolved PoW: Integrating the Matrix Computation in Machine Learning Into Blockchain MiningIEEE Internet of Things Journal10.1109/JIOT.2022.316597310:8(6689-6702)Online publication date: 15-Apr-2023
  • (2023)Improved Merlin–Arthur Protocols for Central Problems in Fine-Grained ComplexityAlgorithmica10.1007/s00453-023-01102-685:8(2395-2426)Online publication date: 17-Feb-2023
  • (2023)Fine-Grained Non-interactive Key-Exchange: Constructions and Lower BoundsAdvances in Cryptology – EUROCRYPT 202310.1007/978-3-031-30545-0_3(55-85)Online publication date: 16-Apr-2023
  • (2022)Worst-case to average-case reductions via additive combinatoricsProceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing10.1145/3519935.3520041(1566-1574)Online publication date: 9-Jun-2022
  • (2022)SETH-based Lower Bounds for Subset Sum and Bicriteria PathACM Transactions on Algorithms10.1145/345052418:1(1-22)Online publication date: 23-Jan-2022
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media