Overview of recent claims about P = NP
Sven Laur swen@math.ut.ee Helsinki University of Technology
†The text in orange represents author’s personal opinion and thus might be slightly subjective.
Overview of recent claims about P = NP Sven Laur swen@math.ut.ee - - PowerPoint PPT Presentation
Overview of recent claims about P = NP Sven Laur swen@math.ut.ee Helsinki University of Technology The text in orange represents authors personal opinion and thus might be slightly subjective. Is the question P = NP really important?
†The text in orange represents author’s personal opinion and thus might be slightly subjective.
T-79.515 Cryptography: Special Topics, March 21, 2005 1
T-79.515 Cryptography: Special Topics, March 21, 2005 2
T-79.515 Cryptography: Special Topics, March 21, 2005 3
T-79.515 Cryptography: Special Topics, March 21, 2005 4
T-79.515 Cryptography: Special Topics, March 21, 2005 5
T-79.515 Cryptography: Special Topics, March 21, 2005 6
Programs Formally documented programs Ad hock programs Formal proofs Constructive proofs Classical non-constructive proofs Proofs of correctness Automatic syntesis Automatic syntesis
T-79.515 Cryptography: Special Topics, March 21, 2005 7
T-79.515 Cryptography: Special Topics, March 21, 2005 8
T-79.515 Cryptography: Special Topics, March 21, 2005 9
T-79.515 Cryptography: Special Topics, March 21, 2005 10
T-79.515 Cryptography: Special Topics, March 21, 2005 11
T-79.515 Cryptography: Special Topics, March 21, 2005 12
T-79.515 Cryptography: Special Topics, March 21, 2005 13
T-79.515 Cryptography: Special Topics, March 21, 2005 14
T-79.515 Cryptography: Special Topics, March 21, 2005 15
T-79.515 Cryptography: Special Topics, March 21, 2005 16
T-79.515 Cryptography: Special Topics, March 21, 2005 17
T-79.515 Cryptography: Special Topics, March 21, 2005 18
P3(φ(x) ∧ ψ(y)) T ⊢ φ(x) ∧ ψ(y)
T ⊢ φ(x)
P2(ψ(y))
e ⊢ ∀x∀y[
T-79.515 Cryptography: Special Topics, March 21, 2005 19
e ⊢ ∀x(ρr(x) ∼ [
e ∧ P ⊢ ρr(x)]
T-79.515 Cryptography: Special Topics, March 21, 2005 20
e ⊢ ∀w(ρp-utm-p(k, c2, w) ∼ ρp-utm-p(m, c1, k, w)).
T-79.515 Cryptography: Special Topics, March 21, 2005 21
e ⊢ ∀w(ρM(w) ∼ ¬[
e ∧ M ⊢ ρM(w)]
e ∧ M ⊢ ρp-utm-p(k, c1, w)]
T-79.515 Cryptography: Special Topics, March 21, 2005 22
e ∧ M ⊢ ρM(w)
e is inconsistent.
e ∧ M ⊢ ¬[
e ∧ M◦ ⊢ φ(w)]
e is inconsistent.
T-79.515 Cryptography: Special Topics, March 21, 2005 23
T-79.515 Cryptography: Special Topics, March 21, 2005 24
T-79.515 Cryptography: Special Topics, March 21, 2005 25
D3(φ(x) ∧ ψ(y)) T ⊢ φ(x) ∧ ψ(y)
T ⊢ φ(x)
D2(ψ(y))
e ⊢ ∀x∀y([
T-79.515 Cryptography: Special Topics, March 21, 2005 26
T-79.515 Cryptography: Special Topics, March 21, 2005 27
e ⊢ ∀w( ρM(w) ∼ ¬[
e ⊢ ∀w(¬ρM(w) ∼ ¬[
T-79.515 Cryptography: Special Topics, March 21, 2005 28
e ⊢ ¬[
e ⊢ ¬[
e is inconsistent.
e ∧ M ⊢ ¬[
e is inconsistent. T-79.515 Cryptography: Special Topics, March 21, 2005 29
e ⊢ ∀w(¬[
e ⊢ ∀w(¬[
T-79.515 Cryptography: Special Topics, March 21, 2005 30
M◦ KM◦ M1 M ψ Prohibited call to subroutine return KM◦ Call to subroutine return ¬M◦ ¬[ [M⋆(ψ) ∼ ψ] ] return KM◦ ¬[ [M⋆(ψ) ⊃ ψ] ] ¬[ [¬M⋆(ψ) ⊃ ¬ψ] ] [ [KM◦] ]
T-79.515 Cryptography: Special Topics, March 21, 2005 31
T-79.515 Cryptography: Special Topics, March 21, 2005 32
e ⊢ ∀M ∀n ∃w ≥ n ¬[
e ⊢ ∃w ≥ n ¬[
e ⊢ ∀M ∀n ∃w ≥ n ¬[
T-79.515 Cryptography: Special Topics, March 21, 2005 33
e ∧ P ⊢ ∃w(ni ≤ w < mi + |ni|c) ψ(M, w) T-79.515 Cryptography: Special Topics, March 21, 2005 34
T-79.515 Cryptography: Special Topics, March 21, 2005 35