Infeasibility of instance compression and succinct PCPs for NP

被引:130
作者
Fortnow, Lance [1 ]
Santhanam, Rahul [1 ]
机构
[1] Northwestern Univ, Dept EECS, Evanston, IL 60208 USA
关键词
Computational complexity; Kernalization; Instance complexity; Probabilistically checkable proof systems; PROOFS;
D O I
10.1016/j.jcss.2010.06.007
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The OR-SAT problem asks, given Boolean formulae phi(1), ..., phi(m) each of size at most n, whether at least one of the phi(i)'s is satisfiable. We show that there is no reduction from OR-SAT to any set A where the length of the output is bounded by a polynomial in n, unless NP subset of coNP/poly, and the Polynomial-Time Hierarchy collapses. This result settles an open problem proposed by Bodlaender et al. (2008) [6] and Harnik and Naor (2006) [20] and has a number of implications. (i) A number of parametric NP problems, including Satisfiability, Clique, Dominating Set and Integer Programming, are not instance compressible or polynomially kernelizable unless NP subset of coNP/poly. (ii) Satisfiability does not have PCPs of size polynomial in the number of variables unless NP subset of coNP/poly. (iii) An approach of Harnik and Naor to constructing collision-resistant hash functions from one-way functions is unlikely to be viable in its present form. (iv) (Buhrman-Hitchcock) There are no subexponential-size hard sets for NP unless NP is in co-NP/poly. We also study probabilistic variants of compression, and show various results about and connections between these variants. To this end, we introduce a new strong derandomization hypothesis, the Oracle Derandomization Hypothesis, and discuss how it relates to traditional derandomization assumptions. (C) 2010 Elsevier Inc. All rights reserved.
引用
收藏
页码:91 / 106
页数:16
相关论文
共 33 条
[21]  
KALAI YT, 2007, EL C COMP COMPL, V7
[22]   Graph nonisomorphism has subexponential size proofs unless the polynomial-time hierarchy collapses [J].
Klivans, AR ;
van Melkebeek, D .
SIAM JOURNAL ON COMPUTING, 2002, 31 (05) :1501-1526
[23]  
Lipton R. J., 1982, LENSEIGN MATH, V28
[24]   SPARSE COMPLETE-SETS FOR NP - SOLUTION OF A CONJECTURE OF BERMAN AND HARTMANIS [J].
MAHANEY, SR .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1982, 25 (02) :130-143
[25]  
MARX D, 2006, COMPUTER J IN PRESS
[26]  
Maurer U. M., 1992, Journal of Cryptology, V5, P53, DOI 10.1007/BF00191321
[27]  
Niedermeier R., 2006, Oxford Lecture Series in Mathematics and its Applications
[28]  
SHALTIEL R, 2001, P 42 IEEE S FDN COMP
[29]  
Simon DR, 1998, LECT NOTES COMPUT SC, V1403, P334, DOI 10.1007/BFb0054137
[30]   Constructing locally computable extractors and cryptosystems in the bounded-storage model [J].
Vadhan, SP .
JOURNAL OF CRYPTOLOGY, 2004, 17 (01) :43-77