Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Algorithms and Lower Bounds for De Morgan Formulas of Low-Communication Leaf Gates

Published: 01 September 2021 Publication History

Abstract

The class FORMULA[s]∘G consists of Boolean functions computable by size-s De Morgan formulas whose leaves are any Boolean functions from a class G. We give lower bounds and (SAT, Learning, and pseudorandom generators (PRGs)) algorithms for FORMULA[n1.99]∘G, for classes G of functions with low communication complexity. Let R(k)G be the maximum k-party number-on-forehead randomized communication complexity of a function in G. Among other results, we show the following:
The Generalized Inner Product function GIPkn cannot be computed in FORMULA[s]° G on more than 1/2+ε fraction of inputs for
s=o(n2/k⋅4k⋅R(k)(G)⋅log⁡(n/ε)⋅log⁡(1/ε))2).
This significantly extends the lower bounds against bipartite formulas obtained by [62]. As a corollary, we get an average-case lower bound for GIPkn against FORMULA[n1.99]∘PTFk−1, i.e., sub-quadratic-size De Morgan formulas with degree-k-1) PTF (polynomial threshold function) gates at the bottom. Previously, it was open whether a super-linear lower bound holds for AND of PTFs.
There is a PRG of seed length n/2+O(s⋅R(2)(G)⋅log⁡(s/ε)⋅log⁡(1/ε)) that ε-fools FORMULA[s]∘G. For the special case of FORMULA[s]∘LTF, i.e., size-s formulas with LTF (linear threshold function) gates at the bottom, we get the better seed length O(n1/2⋅s1/4⋅log⁡(n)⋅log⁡(n/ε)). In particular, this provides the first non-trivial PRG (with seed length o(n)) for intersections of n halfspaces in the regime where ε≤1/n, complementing a recent result of [45].
There exists a randomized 2n-t #SAT algorithm for FORMULA[s]∘G, where
t=Ω(n\√s⋅log2⁡(s)⋅R(2)(G))/1/2.
In particular, this implies a nontrivial #SAT algorithm for FORMULA[n1.99]∘LTF.
The Minimum Circuit Size Problem is not in FORMULA[n1.99]∘XOR; thereby making progress on hardness magnification, in connection with results from [14, 46]. On the algorithmic side, we show that the concept class FORMULA[n1.99]∘XOR can be PAC-learned in time 2O(n/log n).

References

[1]
Amir Abboud and Karl Bringmann. 2018. Tighter connections between formula-SAT and shaving logs. In ICALP. 8:1–8:18.
[2]
Amir Abboud, Aviad Rubinstein, and R. Ryan Williams. 2017. Distributed PCP theorems for hardness of approximation in P. In FOCS. 25–36.
[3]
Amir Abboud, Richard Ryan Williams, and Huacheng Yu. 2015. More applications of the polynomial method to algorithm design. In SODA. 218–230.
[4]
Josh Alman, Timothy M. Chan, and R. Ryan Williams. 2016. Polynomial representations of threshold functions and algorithmic applications. In FOCS. 467–476.
[5]
Noga Alon, Oded Goldreich, Johan Håstad, and René Peralta. 1992. Simple construction of almost k-wise independent random variables. Random Structures & Algorithms 3, 3 (1992), 289–304.
[6]
Andris Ambainis, Andrew M. Childs, Ben Reichardt, Robert Spalek, and Shengyu Zhang. 2010. Any AND-OR formula of size can be evaluated in time on a quantum computer. SIAM Journal on Computing 39, 6 (2010), 2513–2530.
[7]
Alexander E. Andreev. 1987. On a method for obtaining more than quadratic effective lower bounds for the complexity of -schemes. Moscow Univeristy Mathematics Bulletin 42, 1 (1987), 63–66.
[8]
Roy Armoni, Michael E. Saks, Avi Wigderson, and Shiyu Zhou. 1996. Discrepancy Sets and Pseudorandom generators for combinatorial rectangles. In FOCS. 412–421.
[9]
László Babai, Noam Nisan, and Mario Szegedy. 1992. Multiparty protocols, pseudorandom generators for logspace, and time-space trade-offs. Journal of Computer and System Sciences 45, 2 (1992), 204–232.
[10]
Robert Beals, Harry Buhrman, Richard Cleve, Michele Mosca, and Ronald de Wolf. 2001. Quantum lower bounds by polynomials. Journal of the ACM 48, 4 (2001), 778–797.
[11]
Dan Boneh, Yuval Ishai, Alain Passelègue, Amit Sahai, and David J. Wu. 2018. Exploring crypto dark matter: New simple PRF candidates and their applications. In TCC. 699–729.
[12]
Harry Buhrman, Ilan Newman, Hein Röhrig, and Ronald de Wolf. 2007. Robust polynomials and quantum algorithms. Theory of Computing Systems 40, 4 (2007), 379–395.
[13]
Lijie Chen. 2018. On the hardness of approximate and exact (Bichromatic) maximum inner product. In CCC. 14:1–14:45.
[14]
Lijie Chen, Ce Jin, and Ryan Williams. 2019. Hardness magnification for all sparse NP languages. In FOCS. 1240–1255.
[15]
Lijie Chen and Ruosong Wang. 2019. Classical algorithms from quantum and Arthur-Merlin communication protocols. In ITCS. 23:1–23:20.
[16]
Ruiwen Chen, Valentine Kabanets, Antonina Kolokolova, Ronen Shaltiel, and David Zuckerman. 2015. Mining circuit lower bound proofs for meta-algorithms. Computational Complexity 24, 2 (2015), 333–392.
[17]
Mahdi Cheraghchi, Valentine Kabanets, Zhenjian Lu, and Dimitrios Myrisiotis. 2019. Circuit lower bounds for MCSP from local pseudorandom generators. In ICALP. 39:1–39:14.
[18]
Don Coppersmith. 1982. Rapid multiplication of rectangular matrices. SIAM Journal on Computing 11, 3 (1982), 467–471.
[19]
Evgeny Dantsin and Edward A. Hirsch. 2009. Worst-case upper bounds.Handbook of Satisfiability, Vol. 185 (2009), 403–424.
[20]
Irit Dinur and Or Meir. 2018. Toward the KRW composition conjecture: Cubic formula lower bounds via communication complexity. Computational Complexity 27, 3 (2018), 375–462.
[21]
Edward Farhi, Jeffrey Goldstone, and Sam Gutmann. 2008. A quantum algorithm for the Hamiltonian NAND tree. Theory of Computing 4, 1 (2008), 169–190.
[22]
Bill Fefferman, Ronen Shaltiel, Christopher Umans, and Emanuele Viola. 2013. On beating the hybrid argument. Theory of Computing 9 (2013), 809–843.
[23]
Yoav Freund. 1990. Boosting a weak learning algorithm by majority. In COLT. 202–216.
[24]
Mika Göös, Toniann Pitassi, and Thomas Watson. 2018. The landscape of communication complexity classes. Computational Complexity 27, 2 (2018), 245–304.
[25]
Parikshit Gopalan, Ryan O'Donnell, Yi Wu, and David Zuckerman. 2010. Fooling functions of halfspaces under product distributions. In CCC. 223–234.
[26]
Lov K. Grover. 1996. A fast quantum mechanical algorithm for database search. In STOC. 212–219.
[27]
Prahladh Harsha and Srikanth Srinivasan. 2019. On polynomial approximations to AC. Random Structures & Algorithms 54, 2 (2019), 289–303.
[28]
Johan Håstad. 1998. The shrinkage exponent of De Morgan formulas is 2. SIAM Journal on Computing 27, 1 (1998), 48–64.
[29]
Peter Høyer, Troy Lee, and Robert Spalek. 2007. Negative weights make adversaries stronger. In STOC. 526–535.
[30]
Russell Impagliazzo, Raghu Meka, and David Zuckerman. 2012. Pseudorandomness from Shrinkage. In FOCS. 111–119.
[31]
Russell Impagliazzo and Noam Nisan. 1993. The effect of random restrictions on formula size. Random Structures & Algorithms 4, 2 (1993), 121–134.
[32]
Russell Impagliazzo, Noam Nisan, and Avi Wigderson. 1994. Pseudorandomness for network algorithms. In STOC. 356–364.
[33]
Stasys Jukna. 2012. Boolean Function Complexity: Advances and Frontiers. Algorithms and Combinatorics, Vol. 27. Springer.
[34]
Valentine Kabanets. 2002. Derandomization: A brief overview. Current Trends in Theoretical Computer Science 1 (2002), 165–188.
[35]
Valentine Kabanets and Zhenjian Lu. 2018. Satisfiability and derandomization for small polynomial threshold circuits. In APPROX/RANDOM. 46:1–46:19.
[36]
Adam Tauman Kalai, Adam R. Klivans, Yishay Mansour, and Rocco A. Servedio. 2008. Agnostically learning halfspaces. SIAM Journal on Computing 37, 6 (2008), 1777–1805.
[37]
Adam Tauman Kalai, Yishay Mansour, and Elad Verbin. 2008. On agnostic boosting and parity learning. In STOC. 629–638.
[38]
Michael J. Kearns and Umesh V. Vazirani. 1994. An Introduction to Computational Learning Theory. MIT Press.
[39]
Valeriy M. Khrapchenko. 1971. Method of determining lower bounds for the complexity of -schemes. Mathematical Notes 10, 1 (1971), 474–479.
[40]
Eyal Kushilevitz and Noam Nisan. 1997. Communication Complexity. Cambridge University Press.
[41]
Sophie Laplante, Troy Lee, and Mario Szegedy. 2006. The quantum adversary method and classical formula size lower bounds. Computational Complexity 15, 2 (2006), 163–196.
[42]
Saburo Muroga, Iwao Toda, and Satoru Takasu. 1961. Theory of majority decision elements. Journal of the Franklin Institute 271 (1961), 376–418.
[43]
E. I. Nechiporuk. 1966. On a Boolean function. Doklady Akademii Nauk SSSR 169, 4 (1966), 765–766. English translation in Soviet Mathematics Doklady.
[44]
Noam Nisan. 1994. The communication complexity of threshold gates. In Proceedings of “Combinatorics, Paul Erdos is Eighty”. 301–315.
[45]
Ryan O'Donnell, Rocco A. Servedio, and Li-Yang Tan. 2019. Fooling polytopes. In STOC. 614–625.
[46]
Igor Carboni Oliveira, Ján Pich, and Rahul Santhanam. 2019. Hardness magnification near state-of-the-art lower bounds. In CCC. 27:1–27:29.
[47]
Igor Carboni Oliveira and Rahul Santhanam. 2017. Conspiracies between learning algorithms, circuit lower bounds, and pseudorandomness. In CCC. 18:1–18:49.
[48]
Mike Paterson and Uri Zwick. 1993. Shrinkage of De Morgan formulae under restriction. Random Structures & Algorithms 4, 2 (1993), 135–150.
[49]
Mihai Patrascu and Ryan Williams. 2010. On the possibility of faster SAT algorithms. In SODA. 1065–1075.
[50]
Pavel Pudlák, Vojtech Rödl, and Petr Savický. 1988. Graph complexity. Acta Informatica 25, 5 (1988), 515–535. https://doi.org/10.1007/BF00279952
[51]
Ben Reichardt. 2009. Span programs and quantum query complexity: The general adversary bound is nearly tight for every Boolean function. In FOCS. 544–551.
[52]
Ben Reichardt. 2011. Faster quantum algorithm for evaluating game trees. In SODA. 546–559.
[53]
Ben Reichardt. 2011. Reflections for quantum query algorithms. In SODA. 560–569.
[54]
Ben Reichardt and Robert Spalek. 2012. Span-program-based quantum algorithm for evaluating formulas. Theory of Computing 8, 1 (2012), 291–319.
[55]
Igor S. Sergeev. 2017. Upper bounds for the size and the depth of formulae for MOD-functions. Discrete Mathematics and Applications 27, 1 (2017), 15–22.
[56]
Rocco A. Servedio and Li-Yang Tan. 2017. What circuit classes can be learned with non-trivial savings?. In ITCS. 30:1–30:21.
[57]
Rocco A. Servedio and Li-Yang Tan. 2019. Improved pseudorandom generators from pseudorandom multi-switching lemmas. In APPROX/RANDOM. 45:1–45:23.
[58]
Bella Abramovna Subbotovskaya. 1961. Realization of linear functions by formulas using, &, –. In Doklady Akademii Nauk, Vol. 136. Russian Academy of Sciences, 553–555.
[59]
Avishay Tal. 2014. Shrinkage of De Morgan formulae by spectral techniques. In FOCS. 551–560.
[60]
Avishay Tal. 2015. #SAT algorithms from shrinkage. Electronic Colloquium on Computational Complexity (ECCC) 22 (2015), 114.
[61]
Avishay Tal. 2016. The bipartite formula complexity of inner-product is quadratic. Electronic Colloquium on Computational Complexity (ECCC) 23 (2016), 181.
[62]
Avishay Tal. 2017. Formula lower bounds via the quantum method. In STOC. 1256–1268.
[63]
Salil P. Vadhan. 2012. Pseudorandomness. Foundations and Trends in Theoretical Computer Science 7, 1-3 (2012), 1–336.
[64]
Leslie G. Valiant. 1984. A theory of the learnable. In STOC. 436–445.
[65]
Emanuele Viola. 2015. The communication complexity of addition. Combinatorica 35, 6 (2015), 703–747.
[66]
Ryan Williams. 2014. Nonuniform ACC circuit lower bounds. Journal of the ACM 61, 1 (2014), 2:1–2:32.
[67]
Ryan Williams. 2016. Strong ETH breaks with Merlin and Arthur: Short non-interactive proofs of batch evaluation. In CCC. 2:1–2:17.
[68]
Andrew Chi-Chih Yao. 1982. Theory and applications of trapdoor functions. In FOCS. 80–91.

Cited By

View all
  • (2022)Beyond Natural Proofs: Hardness Magnification and LocalityJournal of the ACM10.1145/353839169:4(1-49)Online publication date: 23-Aug-2022
  • (2022)Fooling Constant-Depth Threshold Circuits (Extended Abstract)2021 IEEE 62nd Annual Symposium on Foundations of Computer Science (FOCS)10.1109/FOCS52979.2021.00019(104-115)Online publication date: Feb-2022
  • (2021)MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and ApplicationsAdvances in Cryptology – CRYPTO 202110.1007/978-3-030-84259-8_18(517-547)Online publication date: 11-Aug-2021

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Computation Theory
ACM Transactions on Computation Theory  Volume 13, Issue 4
December 2021
198 pages
ISSN:1942-3454
EISSN:1942-3462
DOI:10.1145/3481683
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 September 2021
Accepted: 01 April 2021
Revised: 01 March 2021
Received: 01 August 2020
Published in TOCT Volume 13, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. De Morgan formulas
  2. circuit lower bounds
  3. satisfiability (SAT)
  4. pseudorandom generators (PRGs)
  5. learning
  6. communication complexity
  7. parities

Qualifiers

  • Research-article
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)10
  • Downloads (Last 6 weeks)0
Reflects downloads up to 24 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Beyond Natural Proofs: Hardness Magnification and LocalityJournal of the ACM10.1145/353839169:4(1-49)Online publication date: 23-Aug-2022
  • (2022)Fooling Constant-Depth Threshold Circuits (Extended Abstract)2021 IEEE 62nd Annual Symposium on Foundations of Computer Science (FOCS)10.1109/FOCS52979.2021.00019(104-115)Online publication date: Feb-2022
  • (2021)MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and ApplicationsAdvances in Cryptology – CRYPTO 202110.1007/978-3-030-84259-8_18(517-547)Online publication date: 11-Aug-2021

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media