Report
Report
Problems
Aniruddh Pramod Supervisor: Dr. Satyadev Nandakumar
Mathematics and Scientific Computing Computer Science and Engineering
IIT Kanpur IIT Kanpur
[email protected] [email protected]
Abstract—In this report, we will discuss some key papers from Cryptomania to Heuristica are known, however the other
in computational complexity to understand the main proof direction of these implications are all open questions. The
techniques that have been used to make progress in the subject establishment of each of these will exclude a world from the
of metacomplexity. Starting from Natural Proofs, which work by
identifying a notion of variation that is high in SAT but low for five possibilities.
polynomial circuits, we then move on to Black Box Generators,
which have been the most important tool of the past decade.
We also discuss a non-black-box worst-to-average-case reduction
proposed by Hirahara, which shows promise in overcoming
the barriers that the previous techniques were running into.
We pay special attention to Kolmogorov Complexity techniques
that have been applied to these problems. By studying these
results, we would like to illuminate the complex interplay between
computational complexity, randomness, and circuit lower bounds.
I. I NTRODUCTION
The main discussion in this report is centered around 4 Fig. 1. Illustration of Impagliazzo’s Five Worlds
influential results in the field of metacomplexity. The first is
a natural proof by Sipser [1] which establishes that P arity Organization: Section II reviews background and proof
cannot be computed in AC 0 circuits. We then move on to techniques that are used in the report. In section III, we look
black box generator proofs. We cover Carmosino’s work [4] at natural proofs. In section IV we talk about proofs via black
that establishes a learning algorithm from a natural proof and box generators and finally in section V we look at a non-black-
Hirahara’s proof [3] on the hardness of partial function variants box reduction. In addition to section II, every section will start
of the Minimum Circuit Size Problem - MCSP. Finally we with an introduction to the key concepts and techniques used
cover [5], Hirahara’s novel non-black-box worst to average in that section.
case reduction for MINKT. II. BACKGROUND
Impagliazzo [6] studied the interplay between pseudoran- We define key notation and terminology in this section and
domness and metacomplexity and established that there are shed light on some essential techinques we will be using in
five possible worlds that could correspond to ours. The first the main proofs.
of these is Algorithmica, where NP is easy in the worst case
and P = NP. The second is Heuristica, where NP is hard A. Notation
in the worst case but easy on average case, ie. P ̸= NP and For an integer n, we define [n] = {1, . . . , n}. For a finite
DistNP ⊆ AvgP. The third is Pessiland, where even though set D we will use x ∼ D to indicate that x is randomly
NP is hard on average, there are no one-way functions. The sampled from the distribution D or x ∈R X to indicate that
fourth is Minicrypt, where one-way functions exist but public x is uniformly randomly picked from the set X.
key cryptography does not, and finally we have Cryptomania We also use ≲ and ≳ to represent an approximate inequality,
where we can have public key cryptography. Fig. 1 provides in particular, a ≲ b is the same as a ≤ (1 + o(1)) · b, where
a picture to better illustrate this. o(1) approaches 0 for suitable choice of constraints.
Proving the inexistence of these worlds, in particular Pes- For a function f , we will denote its truth table tt(f ) =
siland and Heuristica is where much of the attention of f (z1 ) . . . f (z2l ), with zi ∈ {0, 1}l being lexicographically
compelxity theorists is devoted to. One way implications ordered l-bit strings.
For a language L ⊆ {0, 1}∗ , the characteristic function of such that U A (d) outputs tt(g) of length 2l in t steps and
the language is L : {0, 1}∗ → {0, 1} such that L(x) = 1 iff dist(f, g) ≤ 0.5 − δ.
x ∈ L for every string x. D EFINITION 2.6: (KT Complexity). For any oracle A ⊆
Promise Problems: A pair (LY , LN ) of languages such that {0, 1}∗ , the KT Complexity of x relative to A is defined as
LY ∩ LN = ∅. These are called the YES and NO instances KT A (x) := min{|d| + t : U A (d) = x in t steps}.
respectively. A language A such that LY ⊆ A ⊆ {0, 1}∗ \ LN Problems formulations on Kolmogorov Complexity: We are
is called a solution to the promise problem. A promise problem interested in MKTP and MINKT, which are formulated thusly,
where the ‘promise’ is the entire language is called a decision D EFINITION 2.7: For an oracle A, we define MKTPA :=
problem. {(x, 1s ) : KT A (x) ≤ s} .
Gap Problems: A Gap problem effectively turns an approx- D EFINITION 2.8: For any oracle A, define MINKTA :=
imation task into a promise problem. We set two thresholds {(x, 1t , 1s ) : KtA (x) ≤ s}.
for the approximation. The YES instances are the ones where It is easy to check that MINKT ∈ NP since we can guess a
the quantity is above the higher threshold, the NO instances certificate of length atmost s and check if U (d) outputs x in
are the ones where the quantity is below the lower threshold. t steps.
The task is to decide, given an input, if it is a YES or NO
D EFINITION 2.9: (Certificate) A string d is called a certifi-
instance.
cate for KtA (x) ≺ s if U A (d) outputs x within t steps and
Circuits: For a boolean circuit C, we represent its size by |d| ≤ s.
|C|. We assume size is measured by gates, although the exact
We also define the promise and search versions of MINKT,
method of measuring of gates is not really important and
equivalence can be shown at the cost of small changes to the D EFINITION 2.10: (Promise-MINKT) Let σ, τ : N × N be
bounds. functions such that σ(n, s) ≥ s and τ (n, t) ≥ t for n, s, t ∈ N.
Then Gapσ,τ MINKT is the promise problem defined as -
AC Circuits: We focus on proofs involving a class of
circuits called AC circuits. These are circuits which can • YES instances: (x, 1t , 1s ) such that Kt (x) ≤ s
use a polynomial number of unlimited fan-in AND and OR • NO instances: (x, 1t , 1s ) such that Kt′ (x) > σ(|x|, s) for
gates. AC 0 is the class of AC circuits with constant depth. t′ := τ (|x|, t)
Additionally, we’ll use AC 0 [p] for a prime p when we want D EFINITION 2.11: (Search-MINKT) For functions σ, τ de-
to include MOD p gates. fined in 2.10, the search version of Gapσ,τ MINKT is defined
Additionally in the context of a circuit, an d-circuit is a as -
circuit of depth d. Similarly a i-parity circuit is a circuit that
• Inputs: A binary string x and integer t in unary.
computes the parity function on i variables.
• Output: A certificate for Kt′ (x) ≺ σ(|x|, Kt (x)) for any
B. Pseudorandom Generators t′ ≥ τ (|x|, t).
ACKNOWLEDGMENT
I would like to express my sincere gratitude to my project
supervisor, Dr. Satyadev Nandakumar, for his guidance and
mentorship throughout this project. It has been a privilege to
explore this challenging field, which is graced by extremely
elegant proofs, and I am grateful for this opportunity to be
able to explore the same by going through some of the most
important papers in this field through the ages.
R EFERENCES
[1] Furst, M., Saxe, J.B. & Sipser, M. Parity, circuits, and the polynomial-
time hierarchy. Math. Systems Theory 17, 13–27 (1984)
[2] Alexander A. Razborov and Steven Rudich. 1994. Natural proofs. In
Proceedings of the twenty-sixth annual ACM symposium on Theory of
Computing (STOC ’94). Association for Computing Machinery, New
York, NY, USA, 204–213. https://doi.org/10.1145/195058.195134
[3] S. Hirahara, ”NP-Hardness of Learning Programs and Partial MCSP,”
2022 IEEE 63rd Annual Symposium on Foundations of Com-
puter Science (FOCS), Denver, CO, USA, 2022, pp. 968-979, doi:
10.1109/FOCS54457.2022.00095.
[4] Marco L. Carmosino, Russell Impagliazzo, Valentine Kabanets, and
Antonina Kolokolova. Learning Algorithms from Natural Proofs. In
31st Conference on Computational Complexity (CCC 2016). Leibniz
International Proceedings in Informatics (LIPIcs), Volume 50, pp. 10:1-
10:24, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2016)
[5] S. Hirahara, ”Non-Black-Box Worst-Case to Average-Case Reductions
within NP,” 2018 IEEE 59th Annual Symposium on Foundations of
Computer Science (FOCS), Paris, France, 2018, pp. 247-258, doi:
10.1109/FOCS.2018.00032.