pcp theorem pcp theorem is the most important result in
play

PCP Theorem [PCP Theorem is] the most important result in complexity - PowerPoint PPT Presentation

PCP Theorem [PCP Theorem is] the most important result in complexity theory since Cooks Theorem. Ingo Wegener, 2005 Computational Complexity, by Fu Yuxi PCP Theorem 1 / 119 S. Arora, C. Lund, R. Motwani, M. Sudan, and M. Szegedy. Proof


  1. Corollary . There exists some ρ < 1 such that if there is a P-time ρ -approximation algorithm for Max - 3SAT then P = NP . ◮ The ρ -approximation algorithm for Max - 3SAT is NP-hard. Computational Complexity, by Fu Yuxi PCP Theorem 27 / 119

  2. Equivalence of the Two Views Computational Complexity, by Fu Yuxi PCP Theorem 28 / 119

  3. CSP, Constraint Satisfaction Problem If q is a natural number, then a q CSP instance ϕ with n variables is a collection of constraints ϕ 1 , . . . , ϕ m : { 0 , 1 } n → { 0 , 1 } such that for each i ∈ [ m ] the function ϕ i depends on q of its input locations. We call q the arity of ϕ , and m the size of ϕ . An assignment u ∈ { 0 , 1 } n satisfies a constraint ϕ i if ϕ i ( u ) = 1. Let �� n � i =1 ϕ i ( u ) val ( ϕ ) = max . m u ∈{ 0 , 1 } n We say that ϕ is satisfiable if val ( ϕ ) = 1. q CSP is a generalization of 3 SAT . Computational Complexity, by Fu Yuxi PCP Theorem 29 / 119

  4. 1. We assume that n ≤ qm . 2. Since every ϕ i can be described by a formula of size q 2 q , and every variable can be coded up by log n bits, a q CSP instance can be described by O ( mq 2 q log n ) bits. 3. The greedy algorithm for MAX -3 SAT can be applied to MAX q CSP to produce an assignment satisfying ≥ val ( ϕ ) m constraints. 2 q Computational Complexity, by Fu Yuxi PCP Theorem 30 / 119

  5. Gap CSP Suppose q ∈ N and ρ ≤ 1. Let ρ - GAP q CSP be the promise problem of determining if a q CSP instance ϕ satisfies either (1) val ( ϕ ) = 1 or (2) val ( ϕ ) < ρ . We say that ρ - GAP q CSP is NP-hard if for every NP-problem L some P-time computable function f : L → ρ - GAP q CSP exists such that x ∈ L ⇒ val ( f ( x )) = 1 , x / ∈ L ⇒ val ( f ( x )) < ρ. PCP Theorem. There exists some ρ ∈ (0 , 1) such that ρ - GAP 3 SAT is NP-hard. Computational Complexity, by Fu Yuxi PCP Theorem 31 / 119

  6. PCP Theorem . There exist q ∈ N and ρ ∈ (0 , 1) such that ρ - GAP q CSP is NP-hard. Computational Complexity, by Fu Yuxi PCP Theorem 32 / 119

  7. Equivalence Proof PCP Theorem ⇒ PCP Theorem . This is essentially the Cook-Levin reduction. 1. Suppose NP ⊆ PCP (log , 1). Then 3 SAT has a PCP verifier V that makes q queries using c log n random bits. 2. Given input x with | x | = n and random string r ∈ { 0 , 1 } c log n , V ( x , r ) is a Boolean function of type { 0 , 1 } q → { 0 , 1 } . 3. ϕ = { V ( x , r ) } r ∈{ 0 , 1 } c log n is a P-size q CSP instance. ◮ By completeness, x ∈ 3SAT ⇒ val ( ϕ ) = 1. ◮ By soundness, x / ∈ 3SAT ⇒ val ( ϕ ) ≤ 1 / 2. 4. The map from 3 SAT to 1 2 - GAP q CSP is P-time computable. ◮ V runs in P-time. Computational Complexity, by Fu Yuxi PCP Theorem 33 / 119

  8. Equivalence Proof PCP Theorem ⇐ PCP Theorem . Suppose L ∈ NP and ρ - GAP q CSP is NP-hard for some q ∈ N , ρ < 1. By assumption there is some P-time reduction f : L → ρ - GAP q CSP . 1. The verifier for L works as follows: ◮ On input x , compute the q CSP instance f ( x ) = { ϕ i } i ∈ [ m ] . ◮ Given a proof π , which is an assignment to the variables, it randomly chooses i ∈ [ m ] and checks if ϕ i is satisfied by reading the relevant q bits of the proof. 2. If x ∈ L , the verifier always accepts; otherwise it accepts with probability < ρ . Computational Complexity, by Fu Yuxi PCP Theorem 34 / 119

  9. Equivalence Proof PCP Theorem ⇔ PCP Theorem . This is very much like the equivalence between SAT and 3 SAT . 1. Let ǫ > 0 and q ∈ N be such that (1 − ǫ )- GAP q CSP is NP-hard. 2. Let ϕ = { ϕ i } m i =1 be a q CSP instance with n variables. 3. Each ϕ i is the conjunction of at most 2 q clauses, each being the disjunction of at most q literals. 4. If all assignments fail at least an ǫ fragment of the constraints of ϕ , then all ǫ assignments fail at least a q 2 q fragment of the clauses of the 3 SAT instance. Computational Complexity, by Fu Yuxi PCP Theorem 35 / 119

  10. Proof View Inapproximability View PCP verifier V CSP instance ϕ PCP proof π assignment to variables u proof length | π | number of variables n number of queries q arity of constraints q number of random bits r logarithm of number of constraints log m soundness parameter ǫ maximum fraction of violated constraints of no instance NP ⊆ PCP (log , 1) ρ - GAP q CSP is NP-hard The equivalence of the proof view and the inapproximability view is essentially due to the Cook-Levin Theorem for PTM. Computational Complexity, by Fu Yuxi PCP Theorem 36 / 119

  11. Inapproximability Computational Complexity, by Fu Yuxi PCP Theorem 37 / 119

  12. Min - VC and Max - IS are inherently different from the perspective of approximation. ◮ Min - VC + Max - IS = n . n − IS ◮ ρ -approximation algorithm of Max - IS ⇒ n − ρ IS -approximation algorithm of Min - VC . Computational Complexity, by Fu Yuxi PCP Theorem 38 / 119

  13. Lemma . There is a P-time computable function f from 3CNF formulas to graphs that maps a formula ϕ to an n -vertex graph f ( ϕ ) whose independent set is of size val ( ϕ ) n 7 . The standard Karp reduction from 3SAT to Max - IS is as follows: ◮ Each clause is translated to a clique of 7 nodes, each node represents a (partial) assignment that validates the clause. ◮ Two nodes from two different cliques are connected if and only if they conflict. A 3CNF formula ϕ consisting of m clauses is translated to a graph with 7 m nodes, and an assignment satisfying l clauses of ϕ if and only if the graph has an independent set of size l . Computational Complexity, by Fu Yuxi PCP Theorem 39 / 119

  14. Theorem . The following statements are valid. 1. ∃ ρ ′ < 1. ρ ′ -approximation to Min - VC is NP-hard, and 2. ∀ ρ < 1. ρ -approximation to Max - IS is NP-hard. [ ∃ ρ . ρ -approximation to Max - IS is NP-hard.] ∗ By PCP Theorem, ρ -approximation to Max - 3SAT is NP-hard for some ρ . So by Lemma ρ -approximation to Max - IS is NP-hard. 1. Referring to the map of Lemma, the minimum vertex cover has size n − val ( ϕ ) n 7 . Let ρ ′ = 7 − ρ . Suppose Min - VC had a ρ ′ -approximation algorithm. 6 ◮ If val ( ϕ ) = 1, it would produce a vertex cover of size ≤ 1 ρ ′ ( n − n 7 ) = n − ρ n 7 . ◮ If val ( ϕ ) < ρ , the minimum vertex cover has size > n − ρ n 7 . The algorithm must return a vertex cover of size > n − ρ n 7 . The first proposition is established. The second will be proved by making use of [ ] ∗ . Computational Complexity, by Fu Yuxi PCP Theorem 40 / 119

  15. � IS � � ρ IS � 2. Assume that Max - IS were ρ 0 -approximate. Let k satisfy ρ 0 > . k k 1. Suppose G is the input graph. Construct G k as follows: ◮ The vertices are k -size subsets of V G ; ◮ Two vertices S 1 , S 2 are disconnected if S 1 ∪ S 2 is an independent set of G . 2. Apply the ρ 0 -approximation algorithm to G k , and derive an independent set of G from the output of the algorithm. � IS � ◮ The largest independent set of G k is of size , where IS is the maximum k independent set of G . � IS � � ρ IS � ◮ The output is an independent set of size ≥ ρ 0 > . k k ◮ An independent set of size ρ IS can be derived. This is a contradiction. Computational Complexity, by Fu Yuxi PCP Theorem 41 / 119

  16. The Fourier Transform Technique Computational Complexity, by Fu Yuxi PCP Theorem 42 / 119

  17. A Boolean function f : { 0 , 1 } n → { 0 , 1 } is a linear function if f ( x + y ) = f ( x ) + f ( y ) , where “+” is the exclusive-or operator. Computational Complexity, by Fu Yuxi PCP Theorem 43 / 119

  18. Fourier Transform over GF (2) n Boolean functions can be studied using Fourier transform over GF (2) n . We shall use { +1 , − 1 } instead of { 0 , 1 } in this section. ◮ 0 ↔ ( − 1) 0 = 1 and 1 ↔ ( − 1) 1 = − 1. ◮ { 0 , 1 } n is turned into {± 1 } n . ◮ ”exclusive-or” is turned into “multiplication”. Computational Complexity, by Fu Yuxi PCP Theorem 44 / 119

  19. Fourier Transform over GF (2) n The 2 n -dimensional Hilbert space R {± 1 } n is defined as follows: For f , g ∈ R {± 1 } n , 1. ( f + g )( x ) = f ( x ) + g ( x ), 2. ( cf )( x ) = cf ( x ), and 3. expectation inner product: � f , g � = E x ∈{± 1 } n [ f ( x ) g ( x )]. Standard orthogonal basis: { e x } x ∈{± 1 } n . Computational Complexity, by Fu Yuxi PCP Theorem 45 / 119

  20. Fourier Transform over GF (2) n Fourier Basis: { χ α } α ⊆ [ n ] , where χ α ( x ) = � i ∈ α x i . 1. χ ∅ = 1 . 2. We will see that Fourier basis functions are the same as the linear functions. 3. Inner product � χ α , χ β � = 1 if α = β and = 0 otherwise. Fourier basis is orthonormal. ◮ � χ α , χ α � = E x ∈{± 1 } n [ χ α ( x ) χ α ( x )] = E x ∈{± 1 } n [ χ α ( x · x )] = E x ∈{± 1 } n [1] = 1. ◮ � χ α , χ β � = E x ∈{± 1 } n [ χ α ( x ) χ β ( x )] = 0 if α � = β . The notation y · z stands for the dot product of y and z . Computational Complexity, by Fu Yuxi PCP Theorem 46 / 119

  21. Fourier Transform over GF (2) n f = � α ⊆ [ n ] � f α χ α for every f ∈ R {± 1 } n , where � f α is the α th Fourier coefficient of f . Lemma . (i) � f , g � = � g α . (ii) (Parsevals Identity) � f , f � = � α ⊆ [ n ] � α ⊆ [ n ] � f 2 f α � α . Proof. � f , g � = � � f α χ α , � g β χ β � = � g α � χ α , χ β � = � α ⊆ [ n ] � α,β ⊆ [ n ] � α ⊆ [ n ] � β ⊆ [ n ] � f α � f α � g α . Computational Complexity, by Fu Yuxi PCP Theorem 47 / 119

  22. Fourier Transform over GF (2) n Example. 1. Majority function of 3 variables = 1 2 u 1 + 1 2 u 2 + 1 2 u 3 − 1 2 u 1 u 2 u 3 . 2. Projection function λ x 1 . . . x n . x i . Here � f α is 1 if α = { i } and is 0 if α � = { i } . Computational Complexity, by Fu Yuxi PCP Theorem 48 / 119

  23. Fourier Transform over GF (2) n Theorem . Suppose f : {± 1 } n → {± 1 } satisfies Pr x , y [ f ( x · y ) = f ( x ) f ( y )] ≥ 1 2 + ǫ . Then there is some α ⊆ [ n ] such that � f α ≥ 2 ǫ . The assumption is equivalent to E x , y [ f ( x · y ) f ( x ) f ( y )] ≥ 1 2 + ǫ − ( 1 2 − ǫ ) = 2 ǫ . Now � � � � � � 2 ǫ ≤ E x , y [ f ( x · y ) f ( x ) f ( y )] = E x , y [( f α χ α ( x · y ))( f β χ β ( x ))( f γ χ γ ( y ))] α β γ � f α � � f β � = E x , y [ f γ χ α ( x ) χ α ( y ) χ β ( x ) χ γ ( y )] α,β γ � � f α � f β � = f γ E x , y [ χ α ( x ) χ α ( y ) χ β ( x ) χ γ ( y )] α,β,γ � � f α � f β � = f γ E x [ χ α ( x ) χ β ( x )] E y [ χ α ( y ) χ γ ( y )] α,β,γ � � f 3 � � � f 2 � = α ≤ (max f α ) α = max f α . α α α α The last equality is due to the fact that f is Boolean. Computational Complexity, by Fu Yuxi PCP Theorem 49 / 119

  24. Fourier Transform over GF (2) n For Boolean functions f , g : {± 1 } n → {± 1 } , the inner product � f , g � is |{ x | f ( x ) = g ( x ) }| − |{ x | f ( x ) � = g ( x ) }| . 2 n 2 n Referring to the Theorem, let � f α ≥ 2 ǫ be the largest Fourier coefficient of f . Then � f , χ α � ≥ 2 ǫ. In other words f coincides with the basis function χ α on ≥ 1 2 + ǫ fraction of inputs. Computational Complexity, by Fu Yuxi PCP Theorem 50 / 119

  25. Efficient Conversion of NP Certificate to PCP Proof Computational Complexity, by Fu Yuxi PCP Theorem 51 / 119

  26. Proofs of PCP Theorems involve some interesting ways of encoding NP-certificates and the associated methods of checking if a string is a valid encoding. One idea is to amplify any error that appears in an NP-certificate. We shall showcase how it works by looking at a problem to which the amplification power of Walsh-Hadamard Code can be exploited. Theorem . NP ⊆ PCP ( poly ( n ) , 1). Computational Complexity, by Fu Yuxi PCP Theorem 52 / 119

  27. Walsh-Hadamard Code The Walsh-Hadamard function WH : { 0 , 1 } n → { 0 , 1 } 2 n encodes a string of length n by a function in n variables over GF (2): WH ( u ) : x �→ u ⊙ x , where u ⊙ x = � n i =1 u i x i (mod 2). Random Subsum Principle. ◮ If u � = v then for exactly half the choices of x , u ⊙ x � = v ⊙ x . Computational Complexity, by Fu Yuxi PCP Theorem 53 / 119

  28. Walsh-Hadamard Codeword We say that f is a Walsh-Hadamard codeword if f = WH ( u ) for some u ∈ { 0 , 1 } n . 1. Walsh-Hadamard codewords are precisely the linear functions. This is because a linear function f is the same as WH ( f ), where   f ( e 1 )  f ( e 2 )    f =  . .  . . f ( e n ) 2. Walsh-Hadamard codewords are essentially the Fourier basis functions. Computational Complexity, by Fu Yuxi PCP Theorem 54 / 119

  29. Let ρ ∈ [0 , 1]. The functions f , g : { 0 , 1 } n → { 0 , 1 } are ρ -close if Pr x ∈ R { 0 , 1 } n [ f ( x ) = g ( x )] ≥ ρ. Theorem . Let f : { 0 , 1 } n → { 0 , 1 } be such that for some ρ > 1 2 , Pr x , y ∈ R { 0 , 1 } n [ f ( x + y ) = f ( x ) + f ( y )] ≥ ρ. Then f is ρ -close to a linear function. Proof. Let ρ = 1 2 + ǫ . This follows immediately from the theorem of the previous section. Computational Complexity, by Fu Yuxi PCP Theorem 55 / 119

  30. Local Testing of Walsh-Hadamard Codeword A local test of f checks if f is a Walsh-Hadamard codeword by making a constant number of queries. ◮ It accepts every linear function, and ◮ it rejects every function that is far from being linear with high probability. For δ ∈ (0 , 1 / 2) a (1 − δ )-linearity test rejects with probability ≥ 1 2 any function not (1 − δ )-close to a linear function by testing f ( x + y ) = f ( x ) + f ( y ) randomly for 1 1 δ times. δ ≈ 1 e < 1 The error probability is ≤ (1 − δ ) 2 . Computational Complexity, by Fu Yuxi PCP Theorem 56 / 119

  31. Local Decoding 4 and f is (1 − δ )-close to some linear function � Suppose δ < 1 f . Given x one can learn � f ( x ) by making only two queries to f . 1. Choose x ′ ∈ R { 0 , 1 } n ; 2. Set x ′′ = x + x ′ ; 3. Output f ( x ′ ) + f ( x ′′ ). By union bound � f ( x ) = � f ( x ′ ) + � f ( x ′′ ) = f ( x ′ ) + f ( x ′′ ) holds with probability ≥ 1 − 2 δ . Computational Complexity, by Fu Yuxi PCP Theorem 57 / 119

  32. Quadratic Equation in GF (2) Suppose A is an m × n 2 matrix and b is an m -dimensional vector with values in GF (2). Let ( A , b ) ∈ QUADEQ if there is an n -dimensional vector u such that A ( u ⊗ u ) = b , where u ⊗ u is the tensor product of u . u ⊗ u = ( u 1 u 1 , . . . , u 1 u n , . . . , u n u 1 , . . . , u n u n ) † . Computational Complexity, by Fu Yuxi PCP Theorem 58 / 119

  33. Quadratic Equation in GF (2) An instance of QUADEQ over u 1 , u 2 , u 3 , u 4 , u 5 : u 1 u 2 + u 3 u 4 + u 1 u 5 = 1 u 1 u 1 + u 2 u 3 + u 1 u 4 = 0 A satisfying assignment is (0 , 0 , 1 , 1 , 0). Computational Complexity, by Fu Yuxi PCP Theorem 59 / 119

  34. QUADEQ is NP-Complete CKT - SAT ≤ K QUADEQ . ◮ The inputs and the outputs are turned into variables. ◮ Boolean equality x ∨ y = z relating the inputs to the output is turned into algebraic equality (1 − x )(1 − y ) = 1 − z in GF (2), which is equivalent to xx + yy + xy + zz = 0. ◮ ¬ x = z is turned into xx + zz = 1. ◮ x ∧ y = z is turned into xy + zz = 0. Computational Complexity, by Fu Yuxi PCP Theorem 60 / 119

  35. From NP Certificate to PCP Proof A certificate for ( A , b ) is an n -dimensional vector u witnessing ( A , b ) ∈ QUADEQ . ◮ To check if u is a solution, one reads the n bits of u and checks the m equations. We convert an NP-certificate u to the PCP-proof WH ( u ) WH ( u ⊗ u ). ◮ The proof is a string of length 2 n + 2 n 2 . ◮ Using the proof it is straightforward to verify probabilistically if ( A , b ) ∈ QUADEQ . Computational Complexity, by Fu Yuxi PCP Theorem 61 / 119

  36. Verifier for QUADEQ Step 1. Verify that f , g are linear functions. 1. Perform a 0 . 999-linearity test on f , g . If successful we may assume that f ( r ) = u ⊙ r and g ( z ) = w ⊙ z . Computational Complexity, by Fu Yuxi PCP Theorem 62 / 119

  37. Verifier for QUADEQ Step 2. Verify that g encodes ( u ⊗ u ) ⊙ . 1. Get independent random r , r ′ . 2. Reject if f ( r ) f ( r ′ ) � = g ( r ⊗ r ′ ). 3. Repeat the test 10 times. ◮ In a correct proof f ( r ) f ( r ′ ) = ( � i u i r i )( � j ) = � j u j r ′ i , j u i u j r i r ′ j = g ( r ⊗ r ′ ). ◮ Assume w � = u ⊗ u . Let matrices W and U be w and respectively u ⊗ u . One has ◮ g ( r ⊗ r ′ ) = w ⊙ ( r ⊗ r ′ ) = � i , j w ij r i r ′ j = r W r ′ , and ◮ f ( r ) f ( r ′ ) = ( u ⊗ r )( u ⊗ r ′ ) = ( � i u i r i )( � j u j r ′ j ) = r U r ′ . 2 of r ’s; and r W r ′ , r U r ′ differ for at least 1 r W , r U differ for at least 1 4 of ( r , r ′ )’s. 4 ) 10 > 0 . 9. ◮ The overall probability of rejection is at least 1 − ( 3 Computational Complexity, by Fu Yuxi PCP Theorem 63 / 119

  38. Verifier for QUADEQ Step 3. Verify that g encodes a solution. 1. Take a random subset S of [ m ]. 2. Reject if g ( � k ∈ S A k , ) � = � k ∈ S b k . ◮ There is enough time to check A ( u ⊗ u ) = b by checking, for every k ∈ [ m ], the equality g ( A k , ) = b k . ◮ However since m is part of the input, the number of queries, which must be a constant, should not depend on m . ◮ If { k ∈ [ m ] | g ( A k , ) � = b k } � = ∅ , then Pr S ⊆ R [ m ] [ | S ∩ { k ∈ [ m ] | g ( A k , ) � = b k }| is odd ] = 1 2 . Note that g ( � k ∈ S A k , ) = � k ∈ S g ( A k , ) by linearity. Computational Complexity, by Fu Yuxi PCP Theorem 64 / 119

  39. Suppose the PCP verifier for QUADEQ makes q 0 queries. It follows from the completeness of QUADEQ that all NP problems have PCP verifiers that toss coins for a polynomial number of time and make precisely q 0 queries. Computational Complexity, by Fu Yuxi PCP Theorem 65 / 119

  40. Proof of PCP Theorem Computational Complexity, by Fu Yuxi PCP Theorem 66 / 119

  41. CSP with Nonbinary Alphabet q CSP W is analogous to q CSP except that the alphabet is [ W ] instead of { 0 , 1 } . The constraints are functions of type [ W ] q → { 0 , 1 } . For ρ ∈ (0 , 1), we define the promise problem ρ - GAP q CSP W analogous to ρ - GAP q CSP . Computational Complexity, by Fu Yuxi PCP Theorem 67 / 119

  42. 3 COL is a case of 2 CSP 3 . Computational Complexity, by Fu Yuxi PCP Theorem 68 / 119

  43. PCP Theorem states that ρ - GAP q CSP is NP-hard for some q , ρ . The proof we shall describe is based on the following: 1. If ϕ of m constraints is unsatisfied, then val ( ϕ ) ≤ 1 − 1 m . 2. There is a construction that increases the gap. The idea is to start with an NP-problem, then apply Step 2 for log m times. Computational Complexity, by Fu Yuxi PCP Theorem 69 / 119

  44. Let f be a function mapping CSP instances to CSP instances. It is a CL-reduction (complete linear-blowup reduction) if it is P-time computable and the following are valid for every CSP instance ϕ . ◮ Completeness. If ϕ is satisfiable then f ( ϕ ) is satisfiable. ◮ Linear Blowup. If ϕ has m constraints, f ( ϕ ) has no more than Cm constraints over a new alphabet W . ◮ C , W depend on neither the number of constraints nor the number of variables of ϕ . Computational Complexity, by Fu Yuxi PCP Theorem 70 / 119

  45. Main Lemma . There exist constants q 0 ≥ 3, ǫ 0 > 0 and CL-reduction f such that for every q 0 CSP instance ϕ and every ǫ < ǫ 0 , f ( ϕ ) is a q 0 CSP instance satisfying val ( ϕ ) ≤ 1 − ǫ ⇒ val ( f ( ϕ )) ≤ 1 − 2 ǫ. q 0 CSP Instance Arity Alphabet Constraint Gap 1 − ǫ ϕ q 0 binary m ⇓ ⇓ ⇓ ⇓ ⇓ 1 − 2 ǫ f ( ϕ ) q 0 binary Cm In the following proof of the PCP Theorem, q 0 , ǫ 0 , ℓ , W , W ′ , d , t are all constants. They depend neither on the number n of variables nor on the number m of constraints. Computational Complexity, by Fu Yuxi PCP Theorem 71 / 119

  46. Proof of PCP Theorem Let q 0 ≥ 3 and ǫ 0 > 0 be given by the Main Lemma. A CL-reduction from q 0 CSP to (1 − 2 ǫ 0 )- GAP q 0 CSP is obtained as follows: 1. q 0 CSP is NP-hard. 2. For a q 0 CSP instance ϕ with m constraints, apply Main Lemma for log m times to amplify the gap. We get an instance ψ . 3. If ϕ is satisfiable, then ψ is satisfiable. Otherwise according to Main Lemma val ( ψ ) ≤ 1 − 2 log m · 1 m ≤ 1 − 2 ǫ 0 . 4. | ψ | ≤ C log m m = poly ( | ϕ | ). Conclude that (1 − 2 ǫ 0 )- GAP q 0 CSP is NP-hard. C depends on two constants, q 0 and 2 (the size of alphabet). Computational Complexity, by Fu Yuxi PCP Theorem 72 / 119

  47. Main Lemma is proved in three steps. 1. Prove that every q CSP instance can be turned into a “nice” q CSP W instance. 2. Gap Amplification. Construct a CL-reduction f that increases both the gap and the alphabet size of a “nice” q CSP instance. [Dinur’s proof] 3. Alphabet Reduction. Construct a CL-reduction g that decreases the alphabet size to 2 with a modest reduction in the gap. [Proof of Arora et al.] Computational Complexity, by Fu Yuxi PCP Theorem 73 / 119

  48. Gap Amplification . For all numbers ℓ, q , there are number W , ǫ 0 ∈ (0 , 1) and a CL-reduction g ℓ, q such that for every q CSP instance ϕ , ψ = g ℓ, q ( ϕ ) is a 2 CSP W instance that satisfies the following for all ǫ < ǫ 0 . val ( ϕ ) ≤ 1 − ǫ ⇒ val ( ψ ) ≤ 1 − ℓǫ. Alphabet Reduction . There exist a constant q 0 and a CL-reduction h such that for every 2 CSP W instance ϕ , ψ = h ( ϕ ) is a q 0 CSP instance satisfying val ( ϕ ) ≤ 1 − ǫ ⇒ val ( ψ ) ≤ 1 − ǫ/ 3 . CSP Instance Arity Alphabet Constraint Gap ϕ q 0 binary m 1 − ǫ ⇓ ⇓ ⇓ ⇓ ⇓ C ′ m f ( ϕ ) 2 nonbinary 1 − 6 ǫ ⇓ ⇓ ⇓ ⇓ ⇓ C ′′ C ′ m g ( f ( ϕ )) q 0 binary 1 − 2 ǫ Computational Complexity, by Fu Yuxi PCP Theorem 74 / 119

  49. Dinur makes use of expander graphs to construct new constraints. Let ϕ be a 2 CSP W instance with n variables. The constraint graph G ϕ of ϕ is defined as follows: 1. the vertex set is [ n ], and 2. ( i , j ) is an edge if there is a constraint on the variables u i , u j . Parallel edges and self-loops are allowed. Computational Complexity, by Fu Yuxi PCP Theorem 75 / 119

  50. A 2 CSP W instance ϕ is nice if the following are valid: 1. There is a constant d such that G ϕ is a ( d , 0 . 9)-expander. 2. At every vertex half of the adjacent edges are self loops. A nice CSP instance looks like an expander. In a nice CSP a t + 1 step random walk is very much like a t step random walk. Computational Complexity, by Fu Yuxi PCP Theorem 76 / 119

  51. Lemma . Let G be a d -regular n -vertex graph, S be a vertex subset and T = S . Then | E ( S , T ) | ≥ (1 − λ G ) d | S || T | | S | + | T | . (1) The vector x defined below satisfies � x � 2 2 = | S || T | ( | S | + | T | ) and x ⊥ 1 . � + | T | , i ∈ S , x i = −| S | , i ∈ T . Let Z = � i , j A i , j ( x i − x j ) 2 . By definition Z = 2 d | E ( S , T ) | ( | S | + | T | ) 2 . On the other hand � � � A i , j x 2 A i , j x 2 j = 2 � x � 2 Z = i − 2 A i , j x i x j + 2 − 2 � x , A x � . i , j i , j i , j Since x ⊥ 1 , � x , A x � ≤ λ G � x � 2 2 (cf. Rayleigh quotient). Computational Complexity, by Fu Yuxi PCP Theorem 77 / 119

  52. Let G = ( V , E ) be an expander and S ⊆ V with | S | ≤ | V | / 2. The following holds. � 1 � Pr ( u , v ) ∈ E [ u ∈ S , v ∈ S ] ≤ | S | 2 + λ G . (2) | V | 2 Observe that | S | / | V | = Pr ( u , v ) ∈ E [ u ∈ S , v ∈ S ] + Pr ( u , v ) ∈ E [ u ∈ S , v ∈ S ]. And by (1), one has Pr ( u , v ) ∈ E [ u ∈ S , v ∈ S ] = E ( S , S ) / d | V | ≥ | S | | V | · 1 2 · (1 − λ G ) . We are done by substituting | S | / | V | − Pr ( u , v ) ∈ E [ u ∈ S , v ∈ S ] for Pr ( u , v ) ∈ E [ u ∈ S , v ∈ S ]. � 1 � 2 + λ ℓ Pr ( u , v ) ∈ E ℓ [ u ∈ S , v ∈ S ] ≤ | S | G . (3) | V | 2 Computational Complexity, by Fu Yuxi PCP Theorem 78 / 119

  53. Step 1: Reduction to Nice Instance The reduction consists of three steps. Step1 . 1 ⇒ 2 CSP 2 q 0 instance q 0 CSP instance Step1 . 2 ⇒ 2 CSP 2 q 0 instance with regular constraint graph Step1 . 3 ⇒ nice 2 CSP 2 q 0 instance . In all the three steps the fraction of violated constraints decreases. Computational Complexity, by Fu Yuxi PCP Theorem 79 / 119

  54. Step 1: Reduction to Nice Instance Step 1.1 . There exists a CL-reduction that maps a q 0 CSP instance ϕ to a 2 CSP 2 q 0 instance ψ such that val ( ϕ ) ≤ 1 − ǫ ⇒ val ( ψ ) ≤ 1 − ǫ . q 0 Suppose ϕ has variables x 1 , . . . , x n and m constraints. ◮ The new instance ψ has variables x 1 , . . . , x n , y 1 , . . . , y m , where y i ∈ { 0 , 1 } q 0 codes up an assignment to x 1 , . . . , x n . ◮ For each variable x j in ϕ i , construct the constraint ψ i , j stating that y i satisfies ϕ i and y i is consistent to x j . What is the formula ψ ij ( y i , x j )? What is the size of ψ ij ( y i , x j )? Computational Complexity, by Fu Yuxi PCP Theorem 80 / 119

  55. Step 1: Reduction to Nice Instance Step 1.2 . There exist an absolute constant d and a CL-reduction that maps a 2 CSP W instance ϕ to a 2 CSP W instance ψ such that ǫ val ( ϕ ) ≤ 1 − ǫ ⇒ val ( ψ ) ≤ 1 − 100 Wd and that G ψ is d -regular. Let { G k } k be an explicit ( d − 1 , 0 . 9)-expander. We get ψ by replacing each k -degree i = y j ′ node of G ϕ by G k and adding the identity constraint (of the form y j i , where i ∈ [ n ]) to each edge ( j , j ′ ) of G k . If ϕ has m constraints, ψ has dm constraints. Suppose val ( ϕ ) ≤ 1 − ǫ and v is an unsatisfying assignment to ψ . ǫ m It suffices to prove that v violates at least 100 W constraints of ψ . Continue on the next slide. Fact . For every c ∈ (0 , 1) there is a constant d and an algorithm that, given input n , runs in poly ( n ) time and outputs an ( n , d , c )-expander. Computational Complexity, by Fu Yuxi PCP Theorem 81 / 119

  56. Step 1: Reduction to Nice Instance Let u be the assignment to ϕ that is defined by the plurality of the assignment v to ψ . Let t i be the number of v j i ’s, where j ∈ [ k ], that disagree with u i . Clearly t i ≤ k (1 − 1 W ). If � n i =1 t i is large, each G k already contains enough violated constraints. 1. � n 4 ǫ m . Let S i = { y j i | v j i =1 t i ≥ 1 i = u i } and let S i = { y 1 i , . . . , y k i } \ S i . The number of constraints of G k violated by v is at least (1) ≥ (1 − λ G k )( d − 1) | S i || S i | = 1 d − 1 1 E ( S i , S i ) | S i || S i | ≥ 10 W t i , 10 k | S i | + | S i | where ≥ is due to | S i | ≥ k / W . Now � ǫ m ǫ i ∈ [ n ] E ( S i , S i ) ≥ 40 Wd · dm . 40 W = 2. � n i =1 t i < 1 4 ǫ m . Since val ( ϕ ) ≤ 1 − ǫ , there is at least ǫ m constraints violated in ϕ by u . These ǫ m constraints are also in ψ with variables being v . Since every constraint has two variables, less than 1 4 ǫ m + 1 4 ǫ m constraints have valuations in ψ different from those in ϕ . So at least 1 2 ǫ m constraints are violated. Computational Complexity, by Fu Yuxi PCP Theorem 82 / 119

  57. Step 1: Reduction to Nice Instance Step 1.3 . There is an absolute constant d and a CL-reduction that maps a 2 CSP W instance ϕ with G ϕ being d ′ -regular for some d ′ ≤ d to a 2 CSP W instance ψ such that ǫ val ( ϕ ) ≤ 1 − ǫ ⇒ val ( ψ ) < 1 − 10 d and that G ψ is nice, 4 d -regular, and half of the edges adjacent to each vertex are loops. There is a constant d and an explicit ( d , 0 . 1)-expander { G n } n ∈ N . We may assume that ϕ is d -regular (adding self-loops if d ′ < d ) and that ϕ contains n variables. We get ψ from ϕ by adding a tautological constraint for every edge of G n and adding 2 d tautological constraints forming self-loops for each vertex. Then λ G ψ ≤ 3 4 + 1 4 λ G ϕ < 0 . 9 . Notice that “adding” decreases ǫ by a factor ≤ d and “adding” by a further factor ≤ 4. Computational Complexity, by Fu Yuxi PCP Theorem 83 / 119

  58. Step 2: Gap Amplification To amplify the gap, we apply a path-product like operation on constraint graphs so that a new constraint is a conjunction of some old constraints. Path construction increases the fraction of violated constraints. We need to address the issue of how to compose two-variable constraints so that every new constraint contains two variables. Computational Complexity, by Fu Yuxi PCP Theorem 84 / 119

  59. Step 2: Gap Amplification Construction of the 2 CSP W ′ instance ψ t : Variables. 1. Let x 1 , . . . , x n denote the variables of ψ . 2. ψ t contains n variables y 1 , . . . , y n ∈ W ′ < W d 5 t , where y i is an assignment to those of x 1 , . . . , x n reachable within t + δ ( t ) steps from x i . We will let δ ( t ) = √ t . For i , j ∈ [ n ] we say that an assignment to y i claims a value for x j . The belt zone is for consistence checking. x j √ t t + t x i x k Computational Complexity, by Fu Yuxi PCP Theorem 85 / 119

  60. Step 2: Gap Amplification Construction of the 2 CSP W ′ instance ψ t : Constraints. 1. For each 2 t +1 step path p = ( i 1 , . . . , i 2 t +2 ) in G ψ , introduce C p = � j ∈ [2 t +2] C j p as a constraint of ψ t such that for each j that C j p appears in C p , the following hold: 1.1 The length of ( i 1 , . . . , i j ) and the length of ( i j +1 , . . . , i 2 t +2 ) are ≤ t + √ t ; 1.2 C j p is obtained from the constraint of x i j and x i j +1 by replacing x i j , x i j +1 respectively by y i 1 ’s claim for x i j and y i 2 t +2 ’s claim for x i j +1 . i j i j +1 √ √ t + t i 1 i 2 t +2 t + t t t Computational Complexity, by Fu Yuxi PCP Theorem 86 / 119

  61. Step 2: Gap Amplification Lemma . There is an algorithm that given t > 1 and a nice 2 CSP W instance ψ with n 2 edges, d -degree G ψ , produces a 2 CSP W ′ instance ψ t satisfying 1-4. variables, m = dn 1. W ′ < W d 5 t and ψ t has at most n · d t + √ t +1 constraints. 2. If ψ is satisfiable then ψ t is satisfiable. √ t d √ t , if val ( ψ ) ≤ 1 − ǫ , then val ( ψ t ) ≤ 1 − ℓǫ for ℓ = 1 3. For ǫ < 10 4 dW 5 . 4. The formula ψ t is produced in poly ( m , W d 5 t ) time. Gap Amplification follows immediately from the lemma. ◮ If ℓ = 6 and W = 2 q 0 , we get a constant t and a constant ǫ 0 = 1 d √ t . ◮ In this case ψ t has O ( m ) constraints and is produced in poly ( m ) time. Computational Complexity, by Fu Yuxi PCP Theorem 87 / 119

  62. Step 2: Gap Amplification The conditions 1, 2, 4 of the lemma are satisfied. Computational Complexity, by Fu Yuxi PCP Theorem 88 / 119

  63. Step 2: Gap Amplification Fix an arbitrary assignment v 1 , . . . , v n to y 1 , . . . , y n . We would like to define an assignment to x 1 , . . . , x n from v 1 , . . . , v n . 1. Let Z i ∈ [ W ] be a random variable defined by the following. ◮ Starting from the vertex i , take a t step random walk in G ψ to reach some vertex k ; output v k ’s claim for x i . Let w i denote the most likely value of Z i . 1 2. We call w 1 , . . . , w n the plurality assignment to x 1 , . . . , x n . Clearly Pr [ Z i = w i ] ≥ W . You are what your friends think you are. Computational Complexity, by Fu Yuxi PCP Theorem 89 / 119

  64. Step 2: Gap Amplification 2 A random 2 t +1 step path p = ( i 1 , . . . , i 2 t +2 ) is picked up with probability n · d 2 t +1 . Equivalently such a random path can be chosen in either of the following manners. 1. Pick up a random node, and take a 2 t +1 step random walk from the node. 2. Pick up a random edge, and then take a j -step random walk from one node of the edge and a (2 t − j )-step random walk from the other node of the edge. Pick up a random constraint of ψ t is the same as picking up a random 2 t +1 step path. Computational Complexity, by Fu Yuxi PCP Theorem 90 / 119

  65. Step 2: Gap Amplification For j ∈ [2 t +1] the j -th edge ( i j , i j +1 ) in p is truthful if v i 1 claims the plurality value for i j and v i 2 t +2 claims the plurality value for i j +1 . Suppose val ( ψ ) ≤ 1 − ǫ . There is a set F of ǫ m = ǫ dn 2 constraints in ψ violated by the assignment x 1 = w 1 , . . . , x n = w n ◮ If p has an edge that is both truthful and in F , the constraint C p is violated. 100 W . For each j ∈ [ t + 1 , t + δ √ t ], 1 Claim . Let δ = the proof is on the next slide 1 Pr p Pr e ∈ R E [ the j th edge of p is truthful | the j th edge of p is e ] ≥ 2 W 2 . ǫ Consequently an edge in p is violated with probability at least 2 W 2 . Computational Complexity, by Fu Yuxi PCP Theorem 91 / 119

  66. A 2 t +1 step random walk with ( i j , i j +1 ) = e can be generated by a ( j − 1)-step random walk from i j and a (2 t − j +1)-step random walk from i j +1 . It boils down to proving 1 Pr [ v i 1 claims the plurality value for i j ] · Pr [ v i 2 t +2 claims the plurality value for i j +1 ] ≥ 2 W 2 . (4) If j = t + 1 then the left hand side of (4) is at least 1 / W 2 . Otherwise observe that ◮ a j -step random walk can be generated by tossing coin for j times and taking S j -step non-self-loop random walk, where S j = ♯ head’s, and that ◮ the statistical distance ∆( S t , S t + δ √ t ) is bounded by 10 δ . Intuitively it is very likely that starting from a same vertex a ( t + δ √ t )-step random walk and a t -step walk would end up in the same vertex. � 1 � � 1 � 1 Thus the left hand side of (4) is at least W − 10 δ W − 10 δ ≥ 2 W 2 . Computational Complexity, by Fu Yuxi PCP Theorem 92 / 119

  67. Step 2: Gap Amplification Let V be the random variable for the number of edges among the middle δ √ t edges that are truthful and in F . Pr [ V > 0] is the probability of a ψ t ’s constraint being violated. If Pr [ V > 0] ≥ ǫ ′ , then at least ǫ ′ fraction of ψ t ’s constraints are violated. Lemma . For every non-negative random variable V , Pr [ V > 0] ≥ E [ V ] 2 E [ V 2 ] . Proof. E [ V | V > 0] 2 ≤ E [ V 2 | V > 0] by convex property. The lemma follows from the following. ◮ E [ V 2 | V > 0] = � i i 2 · Pr [ V = i | V > 0] = � i i 2 · Pr [ V = i ] E [ V 2 ] Pr [ V > 0] = Pr [ V > 0] . �� � 2 � � 2 ◮ E [ V | V > 0] 2 = ( � i i · Pr [ V = i | V > 0]) 2 = i i · Pr [ V = i ] E [ V ] = . Pr [ V > 0] Pr [ V > 0] Computational Complexity, by Fu Yuxi PCP Theorem 93 / 119

  68. Step 2: Gap Amplification Claim . E [ V ] ≥ δ √ t ǫ 2 W 2 . Proof. By the previous claim, the probability of an edge in the middle interval of size δ √ t 2 W 2 . Then E [ V ] ≥ δ √ t ǫ ǫ that is truthful and in F is at least 2 W 2 by linearity. � Claim . E [ V 2 ] ≤ 11 δ √ td ǫ . Proof. ◮ Let V ′ be the number of edges in the middle interval that are in F . Now V ≤ V ′ . It suffices to show that E [ V ′ 2 ] ≤ 11 δ √ td ǫ . ◮ For j ∈ { t + 1 , . . . , t + δ √ t } , let I j be an indicator random variable that is 1 if the j th edge is in F and 0 otherwise. Then V ′ = � j ∈{ t +1 ,..., t + δ √ t } I j . ◮ Let S be the set of end points of the edges in F . Then | S | dn ≤ ǫ . continue on next slide. Computational Complexity, by Fu Yuxi PCP Theorem 94 / 119

  69. Step 2: Gap Amplification   �� � � E [ V ′ 2 ] I 2  = E + E I j I j ′ j j j � = j ′ √ � Pr [ j th edge is in F ∧ j ′ th edge is in F ] = ǫδ t + 2 j < j ′ � √ Pr [ j th vertex of walk lies in S ∧ j ′ th vertex of walk lies in S ] ≤ t + 2 ǫδ j < j ′ √ � � ≤ ǫδ t + 2 Pr [ j th vertex of walk lies in S ] · Pr ( a , b ) ∈ E j ′− j [ a ∈ S , b ∈ S ] j j ′ > j � � 2 + ( λ G ) j ′ − j √ � � (3) 1 ≤ ǫδ t + 2 d ǫ · d ǫ 2 j j ′ > j   � √ √ √ t ) 2 ( d ǫ ) 2 ( λ G ) k  1 +  ≤ ǫδ t + ( δ λ G < 0 . 9 and δ < 1 and td ǫ < 1 k ≥ 1 √ ≤ 11 δ td ǫ. Computational Complexity, by Fu Yuxi PCP Theorem 95 / 119

  70. Step 2: Gap Amplification Finally we conclude that E [ V ] 2 Pr [ V > 0] ≥ E [ V 2 ] � δ √ t ǫ � 2 1 ≥ · 11 δ √ td ǫ 2 W 2 √ t = δ · 44 dW 4 · ǫ √ t 1 100 W · 44 dW 4 · ǫ = √ t > 10 4 dW 5 ǫ = ℓǫ. Computational Complexity, by Fu Yuxi PCP Theorem 96 / 119

  71. Step 3: Alphabet Reduction We look for an algorithm that transforms a 2 CSP W to a q 0 CSP instance. A simple idea is to turn a variable over [ W ] to log W boolean variables. ◮ A constraint can be turned into a circuit C of size bounded by 2 2 log W < W 4 . ◮ This would produce a CSP instance of arity 2 log W . The problem with this idea is that 2 log W is greater than q 0 (in fact W ≥ 2 q 0 ). ◮ If we apply Gap Amplification and Alphabet Reduction for log m times, we would get a CSP instance whose arity depends on input size. Computational Complexity, by Fu Yuxi PCP Theorem 97 / 119

  72. Step 3: Alphabet Reduction A more sophisticated idea is to design a PCP checker for constraint checking! 1. We turn the 2 CSP W problem to evaluation checking problem for CKT - SAT . 2. We further turn it to solution checking problem for QUADEQ . 3. We then apply the construction of the PCP verifier (with q 0 queries!) for QUADEQ . 4. Finally we turn the PCP verifier to a q 0 CSP instance. PCP of Proximity, Verifier Composition, Proof Composition. ◮ In some occasions a verifier is allowed to make only a small or constant number of queries. In other words it cannot read any complete assignment to variables. ◮ A solution is to see an assignment as part of a proof. Consequently a verifier can only get to see a fragment of the proof. This is the PCP verifier for QUADEQ ! Computational Complexity, by Fu Yuxi PCP Theorem 98 / 119

  73. Step 3: Alphabet Reduction Suppose a constraint has been converted to a QUADEQ instance. ◮ Let u 1 and u 2 be assignments to log W variables. ◮ Let c be bit string of size ℓ = poly ( W ) that represents the quadratic equations derived from the circuit C . We assume that the first 2 log W bits of c are u 1 u 2 . Let π 1 π 2 π 3 be a PCP proof for the QUADEQ instance, where ◮ π 1 is supposedly WH ( u 1 ), π 2 is supposedly WH ( u 2 ) and π 3 is supposedly WH ( c ). Computational Complexity, by Fu Yuxi PCP Theorem 99 / 119

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend