Power from random strings

被引:87
作者
Allender, E [1 ]
Buhrman, H
Koucky, M
Van Melkebeek, D
Ronneburger, D
机构
[1] Rutgers State Univ, Piscataway, NJ 08855 USA
[2] CWI, NL-1090 GB Amsterdam, Netherlands
[3] Univ Amsterdam, NL-1090 GB Amsterdam, Netherlands
[4] McGill Univ, Montreal, PQ H3A 2T5, Canada
[5] Univ Wisconsin, Madison, WI 53706 USA
[6] CUNY York Coll, Jamaica, NY 11451 USA
关键词
Kolmogorov complexity; completeness; reductions; randomness; derandomization;
D O I
10.1137/050628994
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We show that sets consisting of strings of high Kolmogorov complexity provide examples of sets that are complete for several complexity classes under probabilistic and nonuniform reductions. These sets are provably not complete under the usual many-one reductions. Let R-C, R-Kt, R-KS, R-KT be the sets of strings x having complexity at least | x|/ 2, according to the usual Kolmogorov complexity measure C, Levin's time-bounded Kolmogorov complexity Kt [ L. Levin, Inform. and Control, 61 ( 1984), pp. 15 - 37], a space-bounded Kolmogorov measure KS, and a new time-bounded Kolmogorov complexity measure KT, respectively. Our main results are as follows: 1. R-KS and R-Kt are complete for PSPACE and EXP, respectively, under P/poly-truth-table reductions. Similar results hold for other classes with PSPACE-robust Turing complete sets. 2. EXP = NP(R)Kt. 3. PSPACE = ZPP(R)KS subset of P-RC. 4. The Discrete Log, Factoring, and several lattice problems are solvable in (BPPKT)-K-R. Our hardness result for PSPACE gives rise to fairly natural problems that are complete for PSPACE under <= (p)(T) reductions, but not under <= m(l)(og) reductions. Our techniques also allow us to show that all computably enumerable sets are reducible to R-C via P/poly-truth-table reductions. This provides the first "efficient" reduction of the halting problem to R-C.
引用
收藏
页码:1467 / 1493
页数:27
相关论文
共 62 条
[11]  
Allender Eric, 2001, Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS), V2245, P1, DOI 10.1007/3-540-45294-X_1
[12]  
[Anonymous], 1982, 23 ANN S FDN COMPUTE, DOI DOI 10.1109/SFCS.1982.45
[13]  
ANTUNES L, 2001, P 16 IEEE C COMP COM, P266
[14]  
Babai L., 1993, Computational Complexity, V3, P307, DOI 10.1007/BF01275486
[15]  
Babai L., 1991, Computational Complexity, V1, P3, DOI 10.1007/BF01200056
[16]   ON UNIFORMITY WITHIN NC1 [J].
BARRINGTON, DAM ;
IMMERMAN, N ;
STRAUBING, H .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1990, 41 (03) :274-306
[17]   Computational complexity via programming languages: constant factors do matter [J].
Ben-Amram, AM ;
Jones, ND .
ACTA INFORMATICA, 2000, 37 (02) :83-120
[18]  
BERMAN P, 1978, LECTURE NOTES COMPUT, V62, P63
[19]   HOW TO GENERATE CRYPTOGRAPHICALLY STRONG SEQUENCES OF PSEUDO-RANDOM BITS [J].
BLUM, M ;
MICALI, S .
SIAM JOURNAL ON COMPUTING, 1984, 13 (04) :850-864
[20]  
Buhrman H, 2005, LECT NOTES COMPUT SC, V3404, P412