PROOF COMPLEXITY AND THE BINARY ENCODING OF COMBINATORIAL PRINCIPLES

被引:0
作者
Dantchev, Stefan [1 ]
Galesi, Nicola [2 ]
Ghani, Abdul [1 ]
Martin, Barnaby [1 ]
机构
[1] Univ Durham, Dept Comp Sci, Durham, England
[2] Sapienza Univ Roma, Dipartimento Ingn Informat Automat & Gest A Rubert, Rome, Italy
基金
英国工程与自然科学研究理事会;
关键词
propositional proof complexity; resolution; lift-and-project methods; Sherali-Adams; binary encoding; WEAK PIGEONHOLE PRINCIPLE; RESOLUTION LOWER BOUNDS; K-DNF RESOLUTION; SPACE COMPLEXITY; RANDOM FORMULAS; GAP; HARD;
D O I
10.1137/20M134784X
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider proof complexity in light of the unusual binary encoding of certain combinatorial principles. We contrast this proof complexity with the normal unary encoding in several refutation systems, based on Resolution and Sherali-Adams. We first consider Res(s), which is an extension of Resolution working on s-DNFs (Disjunctive Normal Form formulas). We prove an exponential lower bound of n(Omega(k)/d(s)) for the size of refutations of the binary version of the k-Clique Principle in Res(s), where s = o ((log log n)(1/3)) and d(s) is a doubly exponential function. Our result improves that of Lauria et al., who proved a similar lower bound for Res(1), i.e., Resolution. For the k-Clique and other principles we study, we show how lower bounds in Resolution for the unary version follow from lower bounds in Res(log n) for the binary version, so we start a systematic study of the complexity of proofs in Resolution-based systems for families of contradictions given in the binary encoding. We go on to consider the binary version of the (weak) Pigeonhole Principle Bin-PHPnm. We prove that for any delta, epsilon > 0, Bin-PHPnm requires refutations of size 2(n1-delta) in Res(s) for s = O(log(1/2-epsilon) n). Our lower bound cannot be improved substantially with the same method since for m >= 2(root n) (log) (n) we can prove there are 2(O) ((root n) (log) (n)) size refutations of Bin-PHPnm in Res (log n). This is a consequence of the same upper bound for the unary weak Pigeonhole Principle of Buss and Pitassi. We contrast unary versus binary encoding in the Sherali-Adams (SA) refutation system where we prove lower bounds for both rank and size. For the unary encoding of the Pigeonhole Principle and the Ordering Principle, it is known that linear rank is required for refutations in SA, although both admit refutations of polynomial size. We prove that the binary encoding of the (weak) Pigeonhole Principle Bin-PHPnm requires exponentially sized (in n) SA refutations, whereas the binary encoding of the Ordering Principle admits logarithmic rank, polynomially sized SA refutations. We continue by considering a natural refutation system we call "SA+Squares," which is intermediate between SA and Lasserre (Sum-of-Squares). This has been studied under the name static-LS+infinity by Grigoriev et al. In this system, the unary encoding of the Linear Ordering Principle LOPn requires O (n) rank while the unary encoding of the Pigeonhole Principle becomes constant rank. Since Potechin has shown that the rank of LOPn in Lasserre is O (root n log n), we uncover an almost quadratic separation between SA+Squares and Lasserre in terms of rank. Grigoriev et al. noted that the unary Pigeonhole Principle has rank 2 in SA+Squares and therefore polynomial size. Since we show the same applies to the binary Bin-PHPnn+1, we deduce an exponential separation for size between SA and SA+Squares.
引用
收藏
页码:764 / 802
页数:39
相关论文
共 50 条
[41]   ON OPTIMAL HEURISTIC RANDOMIZED SEMIDECISION PROCEDURES, WITH APPLICATION TO PROOF COMPLEXITY [J].
Hirsch, Edward A. ;
Itsykson, Dmitry .
27TH INTERNATIONAL SYMPOSIUM ON THEORETICAL ASPECTS OF COMPUTER SCIENCE (STACS 2010), 2010, 5 :453-463
[42]   On the relative complexity of resolution refinements and cutting planes proof systems [J].
Bonet, ML ;
Esteban, JL ;
Galesi, N ;
Johannsen, J .
SIAM JOURNAL ON COMPUTING, 2000, 30 (05) :1462-1484
[43]   Spatial transcriptomics using combinatorial fluorescence spectral and lifetime encoding, imaging and analysis [J].
Vu, Tam ;
Vallmitjana, Alexander ;
Gu, Joshua ;
La, Kieu ;
Xu, Qi ;
Flores, Jesus ;
Zimak, Jan ;
Shiu, Jessica ;
Hosohama, Linzi ;
Wu, Jie ;
Douglas, Christopher ;
Waterman, Marian L. ;
Ganesan, Anand ;
Hedde, Per Niklas ;
Gratton, Enrico ;
Zhao, Weian .
NATURE COMMUNICATIONS, 2022, 13 (01)
[44]   Effect of Changing the Basis in Genetic Algorithms Using Binary Encoding [J].
Kim, Yong-Hyuk ;
Yoon, Yourim .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2008, 2 (04) :184-193
[45]   Solving multiplicative programs by binary-encoding the multiplication operation [J].
Saghand, Payman Ghasemi ;
Rigterink, Fabian ;
Mahmoodian, Vahid ;
Charkhgard, Hadi .
COMPUTERS & OPERATIONS RESEARCH, 2023, 159
[46]   Proof Complexity for the Maximum Satisfiability Problem and its Use in SAT Refutations [J].
Rollon, Emma ;
Larrosa, Javier .
JOURNAL OF LOGIC AND COMPUTATION, 2022, 32 (07) :1401-1435
[47]   A note on propositional proof complexity of some Ramsey-type statements [J].
Jan Krajíček .
Archive for Mathematical Logic, 2011, 50 :245-255
[48]   On Optimal Heuristic Randomized Semidecision Procedures, with Applications to Proof Complexity and Cryptography [J].
Edward A. Hirsch ;
Dmitry Itsykson ;
Ivan Monakhov ;
Alexander Smal .
Theory of Computing Systems, 2012, 51 :179-195
[49]   Analyzing influenza virus sequences using binary encoding approach [J].
Lam, Ham Ching ;
Sreevatsan, Srinand ;
Boley, Daniel .
SCIENTIFIC PROGRAMMING, 2012, 20 (01) :3-13
[50]   On Optimal Heuristic Randomized Semidecision Procedures, with Applications to Proof Complexity and Cryptography [J].
Hirsch, Edward A. ;
Itsykson, Dmitry ;
Monakhov, Ivan ;
Smal, Alexander .
THEORY OF COMPUTING SYSTEMS, 2012, 51 (02) :179-195