majority is incompressible by ac 0 p circuits
play

Majority is incompressible by AC 0 [ p ] circuits Igor Carboni - PowerPoint PPT Presentation

Majority is incompressible by AC 0 [ p ] circuits Igor Carboni Oliveira Columbia University Joint work with Rahul Santhanam (Univ. Edinburgh) 1 Part 1 Background, Examples, and Motivation 2 Basic Definitions AC 0 d circuits: polynomial size


  1. Majority is incompressible by AC 0 [ p ] circuits Igor Carboni Oliveira Columbia University Joint work with Rahul Santhanam (Univ. Edinburgh) 1

  2. Part 1 Background, Examples, and Motivation 2

  3. Basic Definitions AC 0 d circuits: polynomial size circuits of depth ≤ d containing unbounded fan-in AND, OR, NOT gates. size = number of wires. AC 0 d [ p ] circuits: allow mod p gates in the previous model ( p prime). We have mod p ( z 1 , . . . , z m ) = 1 if and only if p | � j z j . Majority = { Majority n } n ∈ N , where Majority n : { 0 , 1 } n → { 0 , 1 } . Majority n ( x 1 , . . . , x n ) = 1 if and only if � i x i ≥ n / 2. 3

  4. Basic Definitions AC 0 d circuits: polynomial size circuits of depth ≤ d containing unbounded fan-in AND, OR, NOT gates. size = number of wires. AC 0 d [ p ] circuits: allow mod p gates in the previous model ( p prime). We have mod p ( z 1 , . . . , z m ) = 1 if and only if p | � j z j . Majority = { Majority n } n ∈ N , where Majority n : { 0 , 1 } n → { 0 , 1 } . Majority n ( x 1 , . . . , x n ) = 1 if and only if � i x i ≥ n / 2. 3

  5. Basic Definitions AC 0 d circuits: polynomial size circuits of depth ≤ d containing unbounded fan-in AND, OR, NOT gates. size = number of wires. AC 0 d [ p ] circuits: allow mod p gates in the previous model ( p prime). We have mod p ( z 1 , . . . , z m ) = 1 if and only if p | � j z j . Majority = { Majority n } n ∈ N , where Majority n : { 0 , 1 } n → { 0 , 1 } . Majority n ( x 1 , . . . , x n ) = 1 if and only if � i x i ≥ n / 2. 3

  6. Basic Results Razborov/Smolensky (1987). If Majority is computed by AC 0 d [ p ] circuits then d = Ω( log n / log log n ) . This lower bound is optimal. No explicit lower bounds for poly size circuits beyond depth log n / log log n . Technique does not generalize to modulo m gates, where m = p · q . As far as we know, it is possible that NP ⊆ AC 0 3 [6] (linear size). 4

  7. Basic Results Razborov/Smolensky (1987). If Majority is computed by AC 0 d [ p ] circuits then d = Ω( log n / log log n ) . This lower bound is optimal. No explicit lower bounds for poly size circuits beyond depth log n / log log n . Technique does not generalize to modulo m gates, where m = p · q . As far as we know, it is possible that NP ⊆ AC 0 3 [6] (linear size). 4

  8. Basic Results Razborov/Smolensky (1987). If Majority is computed by AC 0 d [ p ] circuits then d = Ω( log n / log log n ) . This lower bound is optimal. No explicit lower bounds for poly size circuits beyond depth log n / log log n . Technique does not generalize to modulo m gates, where m = p · q . As far as we know, it is possible that NP ⊆ AC 0 3 [6] (linear size). 4

  9. This Talk Understand structure of polynomial-size circuits with mod p gates computing Majority . Follows from the investigation of more general framework: “Interactive Compression Games”. Hybridizes computational complexity and communication complexity. 5

  10. This Talk Understand structure of polynomial-size circuits with mod p gates computing Majority . Follows from the investigation of more general framework: “Interactive Compression Games”. Hybridizes computational complexity and communication complexity. 5

  11. Example: Boolean circuits for symmetric functions Idea. Boolean circuits can process log n bits very efficiently. Every f : { 0 , 1 } log n → { 0 , 1 } computed by CNF/DNF of size n . Circuit for Majority n ( x ) . Computes O ( log n ) -bit string counting #1’s in x . Partition input bits into (log n )-bit blocks, produce ( log log n ) -bit strings from each block. In each layer, reduces number of strings by a factor of roughly log n . 6

  12. Example: Boolean circuits for symmetric functions Idea. Boolean circuits can process log n bits very efficiently. Every f : { 0 , 1 } log n → { 0 , 1 } computed by CNF/DNF of size n . Circuit for Majority n ( x ) . Computes O ( log n ) -bit string counting #1’s in x . Partition input bits into (log n )-bit blocks, produce ( log log n ) -bit strings from each block. In each layer, reduces number of strings by a factor of roughly log n . 6

  13. Example: Boolean circuits for symmetric functions Idea. Boolean circuits can process log n bits very efficiently. Every f : { 0 , 1 } log n → { 0 , 1 } computed by CNF/DNF of size n . Circuit for Majority n ( x ) . Computes O ( log n ) -bit string counting #1’s in x . Partition input bits into (log n )-bit blocks, produce ( log log n ) -bit strings from each block. In each layer, reduces number of strings by a factor of roughly log n . 6

  14. Example: Boolean circuits for symmetric functions Lemma. For every d ≥ 1, we obtain an AC 0 d circuit with n / ( log n ) ( d − 1 ) − o ( 1 ) output wires encoding #1’s in x . n input bits processed in O ( log log n n ) = O ( log n / log log n ) stages. We will revisit this construction later in the talk. 7

  15. Example: Boolean circuits for symmetric functions Lemma. For every d ≥ 1, we obtain an AC 0 d circuit with n / ( log n ) ( d − 1 ) − o ( 1 ) output wires encoding #1’s in x . n input bits processed in O ( log log n n ) = O ( log n / log log n ) stages. We will revisit this construction later in the talk. 7

  16. Interactive Compression Games (Chattopadhyay and Santhanam, 2012) Fix a circuit class C and a Boolean function f . We define a communication game between Alice and Bob. Alice knows the input x ∈ { 0 , 1 } n , but her computations are limited to C . Bob is computationally unbounded, but has no access to x . Goal: Players must interact in order to compute f ( x ) . Minimize total number of bits sent by Alice. f / ∈ C ⇐ ⇒ C -compression game for f is nontrivial. 8

  17. Interactive Compression Games (Chattopadhyay and Santhanam, 2012) Fix a circuit class C and a Boolean function f . We define a communication game between Alice and Bob. Alice knows the input x ∈ { 0 , 1 } n , but her computations are limited to C . Bob is computationally unbounded, but has no access to x . Goal: Players must interact in order to compute f ( x ) . Minimize total number of bits sent by Alice. f / ∈ C ⇐ ⇒ C -compression game for f is nontrivial. 8

  18. Interactive Compression Games (Chattopadhyay and Santhanam, 2012) Fix a circuit class C and a Boolean function f . We define a communication game between Alice and Bob. Alice knows the input x ∈ { 0 , 1 } n , but her computations are limited to C . Bob is computationally unbounded, but has no access to x . Goal: Players must interact in order to compute f ( x ) . Minimize total number of bits sent by Alice. f / ∈ C ⇐ ⇒ C -compression game for f is nontrivial. 8

  19. Interactive Compression Games Formally: A C -bounded protocol Π n = � C ( 1 ) , . . . , C ( r ) , f ( 1 ) , . . . , f ( r − 1 ) , E n � with r = r ( n ) rounds consists of a sequence of C -circuits for Alice, a strategy for Bob, given by functions f ( 1 ) , . . . , f ( r − 1 ) , and a set of accepting transcripts E n . Every protocol Π n has its signature (Π n ) = ( n , s 1 , t 1 , s 2 , . . . , t r − 1 , s r ) , which is the sequence corresponding to the input size n = | x | and the length of the messages exchanged by Alice and Bob during the protocol. Π n solves the compression game of a function h n : { 0 , 1 } n → { 0 , 1 } if h ( x ) = 1 ⇐ ⇒ transcript Π n ( x ) ∈ E n . Finally, we let cost (Π n ) = s 1 + . . . + s r . 9

  20. Interactive Compression Games Formally: A C -bounded protocol Π n = � C ( 1 ) , . . . , C ( r ) , f ( 1 ) , . . . , f ( r − 1 ) , E n � with r = r ( n ) rounds consists of a sequence of C -circuits for Alice, a strategy for Bob, given by functions f ( 1 ) , . . . , f ( r − 1 ) , and a set of accepting transcripts E n . Every protocol Π n has its signature (Π n ) = ( n , s 1 , t 1 , s 2 , . . . , t r − 1 , s r ) , which is the sequence corresponding to the input size n = | x | and the length of the messages exchanged by Alice and Bob during the protocol. Π n solves the compression game of a function h n : { 0 , 1 } n → { 0 , 1 } if h ( x ) = 1 ⇐ ⇒ transcript Π n ( x ) ∈ E n . Finally, we let cost (Π n ) = s 1 + . . . + s r . 9

  21. Interactive Compression Games Formally: A C -bounded protocol Π n = � C ( 1 ) , . . . , C ( r ) , f ( 1 ) , . . . , f ( r − 1 ) , E n � with r = r ( n ) rounds consists of a sequence of C -circuits for Alice, a strategy for Bob, given by functions f ( 1 ) , . . . , f ( r − 1 ) , and a set of accepting transcripts E n . Every protocol Π n has its signature (Π n ) = ( n , s 1 , t 1 , s 2 , . . . , t r − 1 , s r ) , which is the sequence corresponding to the input size n = | x | and the length of the messages exchanged by Alice and Bob during the protocol. Π n solves the compression game of a function h n : { 0 , 1 } n → { 0 , 1 } if h ( x ) = 1 ⇐ ⇒ transcript Π n ( x ) ∈ E n . Finally, we let cost (Π n ) = s 1 + . . . + s r . 9

Recommend


More recommend