majority is incompressible by ac 0 p circuits
play

Majority is incompressible by AC 0 [ p ] circuits Igor Carboni - PowerPoint PPT Presentation

Majority is incompressible by AC 0 [ p ] circuits Igor Carboni Oliveira Columbia University Joint work with Rahul Santhanam (Univ. Edinburgh) 1 Part 1 Background, Examples, and Motivation 2 Basic Definitions AC 0 d circuits: polynomial size


  1. Majority is incompressible by AC 0 [ p ] circuits Igor Carboni Oliveira Columbia University Joint work with Rahul Santhanam (Univ. Edinburgh) 1

  2. Part 1 Background, Examples, and Motivation 2

  3. Basic Definitions AC 0 d circuits: polynomial size circuits of depth ≤ d containing unbounded fan-in AND, OR, NOT gates. size = number of wires. AC 0 d [ p ] circuits: allow mod p gates in the previous model ( p prime). We have mod p ( z 1 , . . . , z m ) = 1 if and only if p | � j z j . Majority = { Majority n } n ∈ N , where Majority n : { 0 , 1 } n → { 0 , 1 } . Majority n ( x 1 , . . . , x n ) = 1 if and only if � i x i ≥ n / 2. 3

  4. Basic Definitions AC 0 d circuits: polynomial size circuits of depth ≤ d containing unbounded fan-in AND, OR, NOT gates. size = number of wires. AC 0 d [ p ] circuits: allow mod p gates in the previous model ( p prime). We have mod p ( z 1 , . . . , z m ) = 1 if and only if p | � j z j . Majority = { Majority n } n ∈ N , where Majority n : { 0 , 1 } n → { 0 , 1 } . Majority n ( x 1 , . . . , x n ) = 1 if and only if � i x i ≥ n / 2. 3

  5. Basic Definitions AC 0 d circuits: polynomial size circuits of depth ≤ d containing unbounded fan-in AND, OR, NOT gates. size = number of wires. AC 0 d [ p ] circuits: allow mod p gates in the previous model ( p prime). We have mod p ( z 1 , . . . , z m ) = 1 if and only if p | � j z j . Majority = { Majority n } n ∈ N , where Majority n : { 0 , 1 } n → { 0 , 1 } . Majority n ( x 1 , . . . , x n ) = 1 if and only if � i x i ≥ n / 2. 3

  6. Basic Results Razborov/Smolensky (1987). If Majority is computed by AC 0 d [ p ] circuits then d = Ω( log n / log log n ) . This lower bound is optimal. No explicit lower bounds for poly size circuits beyond depth log n / log log n . Technique does not generalize to modulo m gates, where m = p · q . As far as we know, it is possible that NP ⊆ AC 0 3 [6] (linear size). 4

  7. Basic Results Razborov/Smolensky (1987). If Majority is computed by AC 0 d [ p ] circuits then d = Ω( log n / log log n ) . This lower bound is optimal. No explicit lower bounds for poly size circuits beyond depth log n / log log n . Technique does not generalize to modulo m gates, where m = p · q . As far as we know, it is possible that NP ⊆ AC 0 3 [6] (linear size). 4

  8. Basic Results Razborov/Smolensky (1987). If Majority is computed by AC 0 d [ p ] circuits then d = Ω( log n / log log n ) . This lower bound is optimal. No explicit lower bounds for poly size circuits beyond depth log n / log log n . Technique does not generalize to modulo m gates, where m = p · q . As far as we know, it is possible that NP ⊆ AC 0 3 [6] (linear size). 4

  9. This Talk Understand structure of polynomial-size circuits with mod p gates computing Majority . Follows from the investigation of more general framework: “Interactive Compression Games”. Hybridizes computational complexity and communication complexity. 5

  10. This Talk Understand structure of polynomial-size circuits with mod p gates computing Majority . Follows from the investigation of more general framework: “Interactive Compression Games”. Hybridizes computational complexity and communication complexity. 5

  11. Example: Boolean circuits for symmetric functions Idea. Boolean circuits can process log n bits very efficiently. Every f : { 0 , 1 } log n → { 0 , 1 } computed by CNF/DNF of size n . Circuit for Majority n ( x ) . Computes O ( log n ) -bit string counting #1’s in x . Partition input bits into (log n )-bit blocks, produce ( log log n ) -bit strings from each block. In each layer, reduces number of strings by a factor of roughly log n . 6

  12. Example: Boolean circuits for symmetric functions Idea. Boolean circuits can process log n bits very efficiently. Every f : { 0 , 1 } log n → { 0 , 1 } computed by CNF/DNF of size n . Circuit for Majority n ( x ) . Computes O ( log n ) -bit string counting #1’s in x . Partition input bits into (log n )-bit blocks, produce ( log log n ) -bit strings from each block. In each layer, reduces number of strings by a factor of roughly log n . 6

  13. Example: Boolean circuits for symmetric functions Idea. Boolean circuits can process log n bits very efficiently. Every f : { 0 , 1 } log n → { 0 , 1 } computed by CNF/DNF of size n . Circuit for Majority n ( x ) . Computes O ( log n ) -bit string counting #1’s in x . Partition input bits into (log n )-bit blocks, produce ( log log n ) -bit strings from each block. In each layer, reduces number of strings by a factor of roughly log n . 6

  14. Example: Boolean circuits for symmetric functions Lemma. For every d ≥ 1, we obtain an AC 0 d circuit with n / ( log n ) ( d − 1 ) − o ( 1 ) output wires encoding #1’s in x . n input bits processed in O ( log log n n ) = O ( log n / log log n ) stages. We will revisit this construction later in the talk. 7

  15. Example: Boolean circuits for symmetric functions Lemma. For every d ≥ 1, we obtain an AC 0 d circuit with n / ( log n ) ( d − 1 ) − o ( 1 ) output wires encoding #1’s in x . n input bits processed in O ( log log n n ) = O ( log n / log log n ) stages. We will revisit this construction later in the talk. 7

  16. Interactive Compression Games (Chattopadhyay and Santhanam, 2012) Fix a circuit class C and a Boolean function f . We define a communication game between Alice and Bob. Alice knows the input x ∈ { 0 , 1 } n , but her computations are limited to C . Bob is computationally unbounded, but has no access to x . Goal: Players must interact in order to compute f ( x ) . Minimize total number of bits sent by Alice. f / ∈ C ⇐ ⇒ C -compression game for f is nontrivial. 8

  17. Interactive Compression Games (Chattopadhyay and Santhanam, 2012) Fix a circuit class C and a Boolean function f . We define a communication game between Alice and Bob. Alice knows the input x ∈ { 0 , 1 } n , but her computations are limited to C . Bob is computationally unbounded, but has no access to x . Goal: Players must interact in order to compute f ( x ) . Minimize total number of bits sent by Alice. f / ∈ C ⇐ ⇒ C -compression game for f is nontrivial. 8

  18. Interactive Compression Games (Chattopadhyay and Santhanam, 2012) Fix a circuit class C and a Boolean function f . We define a communication game between Alice and Bob. Alice knows the input x ∈ { 0 , 1 } n , but her computations are limited to C . Bob is computationally unbounded, but has no access to x . Goal: Players must interact in order to compute f ( x ) . Minimize total number of bits sent by Alice. f / ∈ C ⇐ ⇒ C -compression game for f is nontrivial. 8

  19. Interactive Compression Games Formally: A C -bounded protocol Π n = � C ( 1 ) , . . . , C ( r ) , f ( 1 ) , . . . , f ( r − 1 ) , E n � with r = r ( n ) rounds consists of a sequence of C -circuits for Alice, a strategy for Bob, given by functions f ( 1 ) , . . . , f ( r − 1 ) , and a set of accepting transcripts E n . Every protocol Π n has its signature (Π n ) = ( n , s 1 , t 1 , s 2 , . . . , t r − 1 , s r ) , which is the sequence corresponding to the input size n = | x | and the length of the messages exchanged by Alice and Bob during the protocol. Π n solves the compression game of a function h n : { 0 , 1 } n → { 0 , 1 } if h ( x ) = 1 ⇐ ⇒ transcript Π n ( x ) ∈ E n . Finally, we let cost (Π n ) = s 1 + . . . + s r . 9

  20. Interactive Compression Games Formally: A C -bounded protocol Π n = � C ( 1 ) , . . . , C ( r ) , f ( 1 ) , . . . , f ( r − 1 ) , E n � with r = r ( n ) rounds consists of a sequence of C -circuits for Alice, a strategy for Bob, given by functions f ( 1 ) , . . . , f ( r − 1 ) , and a set of accepting transcripts E n . Every protocol Π n has its signature (Π n ) = ( n , s 1 , t 1 , s 2 , . . . , t r − 1 , s r ) , which is the sequence corresponding to the input size n = | x | and the length of the messages exchanged by Alice and Bob during the protocol. Π n solves the compression game of a function h n : { 0 , 1 } n → { 0 , 1 } if h ( x ) = 1 ⇐ ⇒ transcript Π n ( x ) ∈ E n . Finally, we let cost (Π n ) = s 1 + . . . + s r . 9

  21. Interactive Compression Games Formally: A C -bounded protocol Π n = � C ( 1 ) , . . . , C ( r ) , f ( 1 ) , . . . , f ( r − 1 ) , E n � with r = r ( n ) rounds consists of a sequence of C -circuits for Alice, a strategy for Bob, given by functions f ( 1 ) , . . . , f ( r − 1 ) , and a set of accepting transcripts E n . Every protocol Π n has its signature (Π n ) = ( n , s 1 , t 1 , s 2 , . . . , t r − 1 , s r ) , which is the sequence corresponding to the input size n = | x | and the length of the messages exchanged by Alice and Bob during the protocol. Π n solves the compression game of a function h n : { 0 , 1 } n → { 0 , 1 } if h ( x ) = 1 ⇐ ⇒ transcript Π n ( x ) ∈ E n . Finally, we let cost (Π n ) = s 1 + . . . + s r . 9

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend