279 results on '"Probabilistically checkable proof"'
Search Results
2. An Alternative Approach to Non-black-box Simulation in Fully Concurrent Setting
- Author
-
Kiyoshima, Susumu, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Kobsa, Alfred, Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Dodis, Yevgeniy, editor, and Nielsen, Jesper Buus, editor
- Published
- 2015
- Full Text
- View/download PDF
3. Short PCPs with Projection Queries
- Author
-
Ben-Sasson, Eli, Viola, Emanuele, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Kobsa, Alfred, editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Weikum, Gerhard, editor, Esparza, Javier, editor, Fraigniaud, Pierre, editor, Husfeldt, Thore, editor, and Koutsoupias, Elias, editor
- Published
- 2014
- Full Text
- View/download PDF
4. On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption
- Author
-
Gupta, Divya, Sahai, Amit, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Meier, Willi, editor, and Mukhopadhyay, Debdeep, editor
- Published
- 2014
- Full Text
- View/download PDF
5. Probabilistic Verification and Non-approximability
- Author
-
Szegedy, Mario, Kolipaka, Kashyap, Pardalos, Panos M., editor, Du, Ding-Zhu, editor, and Graham, Ronald L., editor
- Published
- 2013
- Full Text
- View/download PDF
6. Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise
- Author
-
Jain, Abhishek, Krenn, Stephan, Pietrzak, Krzysztof, Tentes, Aris, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Wang, Xiaoyun, editor, and Sako, Kazue, editor
- Published
- 2012
- Full Text
- View/download PDF
7. Verifiable Delegation of Computation over Large Datasets
- Author
-
Benabbas, Siavosh, Gennaro, Rosario, Vahlis, Yevgeniy, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, and Rogaway, Phillip, editor
- Published
- 2011
- Full Text
- View/download PDF
8. A Brief Introduction to Property Testing
- Author
-
Goldreich, Oded, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, and Goldreich, Oded, editor
- Published
- 2011
- Full Text
- View/download PDF
9. A Brief Introduction to Property Testing
- Author
-
Goldreich, Oded, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, and Goldreich, Oded, editor
- Published
- 2010
- Full Text
- View/download PDF
10. On the Approximation Resistance of a Random Predicate
- Author
-
Håstad, Johan, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Charikar, Moses, editor, Jansen, Klaus, editor, Reingold, Omer, editor, and Rolim, José D. P., editor
- Published
- 2007
- Full Text
- View/download PDF
11. On 2-Query Codeword Testing with Near-Perfect Completeness
- Author
-
Guruswami, Venkatesan, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Dough, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, and Asano, Tetsuo, editor
- Published
- 2006
- Full Text
- View/download PDF
12. A Sanctuary for Mobile Agents
- Author
-
Yee, Bennet S., Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, Vitek, Jan, editor, and Jensen, Christian D., editor
- Published
- 1999
- Full Text
- View/download PDF
13. The (parallel) approximability of non-boolean satisfiability problems and restricted integer programming
- Author
-
Serna, Maria, Trevisan, Luca, Xhafa, Fatos, Goos, G., editor, Hartmanis, J., editor, van Leeuwen, J., editor, Morvan, Michel, editor, Meinel, Christoph, editor, and Krob, Daniel, editor
- Published
- 1998
- Full Text
- View/download PDF
14. MNP: A class of NP optimization problems : Extended abstract
- Author
-
Cheng, Qi, Zhu, Hong, Goos, Gehard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, Du, Ding-Zhu, editor, and Li, Ming, editor
- Published
- 1995
- Full Text
- View/download PDF
15. Shorter and Faster Post-Quantum Designated-Verifier zkSNARKs from Lattices
- Author
-
Hang Su, David J. Wu, and Yuval Ishai
- Subjects
Soundness ,Discrete mathematics ,Reduction (recursion theory) ,business.industry ,Computer science ,020206 networking & telecommunications ,0102 computer and information sciences ,02 engineering and technology ,Extension (predicate logic) ,Gas meter prover ,Encryption ,Mathematical proof ,01 natural sciences ,Quadratic equation ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,business ,Probabilistically checkable proof - Abstract
Zero-knowledge succinct arguments of knowledge (zkSNARKs) enable efficient privacy-preserving proofs of membership for general NP languages. Our focus in this work is on post-quantum zkSNARKs, with a focus on minimizing proof size. Currently, there is a 1000x gap in the proof size between the best pre-quantum constructions and the best post-quantum ones. Here, we develop and implement new lattice-based zkSNARKs in the designated-verifier preprocessing model. With our construction, after an initial preprocessing step, a proof for an NP relation of size 2^20 is just over 16 KB. Our proofs are 10.3x shorter than previous post-quantum zkSNARKs for general NP languages. Compared to previous lattice-based zkSNARKs (also in the designated-verifier preprocessing model), we obtain a 42x reduction in proof size and a 60x reduction in the prover's running time, all while achieving a much higher level of soundness. Compared to the shortest pre-quantum zkSNARKs by Groth (Eurocrypt 2016), the proof size in our lattice-based construction is 131x longer, but both the prover and the verifier are faster (by 1.2x and 2.8x, respectively). Our construction follows the general blueprint of Bitansky et al. (TCC 2013) and Boneh et al. (Eurocrypt 2017) of combining a linear probabilistically checkable proof (linear PCP) together with a linear-only vector encryption scheme. We develop a concretely-efficient lattice-based instantiation of this compiler by considering quadratic extension fields of moderate characteristic and using linear-only vector encryption over rank-2 module lattices.
- Published
- 2021
- Full Text
- View/download PDF
16. SETH vs Approximation
- Author
-
Aviad Rubinstein and Virginia Vassilevska Williams
- Subjects
Thesaurus (information retrieval) ,Multidisciplinary ,Perspective (geometry) ,Theoretical computer science ,010201 computation theory & mathematics ,Computer science ,010102 general mathematics ,Approximation algorithm ,0102 computer and information sciences ,0101 mathematics ,01 natural sciences ,Probabilistically checkable proof - Abstract
Our story is about hardness of problems in P, but its roots begin with two algorithmic approaches that have been developed to cope with NP-hard problems: approximation algorithms and fasterthan- brute-force algorithms. Approximation algorithms were proposed as a response for NP-hardness almost immediately (in historical perspective of almost half a century), and have been one of the most celebrated success stories of our eld. An outstanding complexity result in this area, which has since turned into a sub- eld of its own, is the Probabilistically Checkable Proof (PCP) Theorem. For many problems like Max-3-SAT we now have nearly tight hardness-of-approximation results.
- Published
- 2019
- Full Text
- View/download PDF
17. Are PCPs Inherent in Efficient Arguments?
- Author
-
Rothblum, Guy and Vadhan, Salil
- Subjects
PROBABILITY theory ,CRYPTOGRAPHY ,LOGARITHMS ,COMPUTATIONAL complexity ,ELECTRONIC data processing - Abstract
Starting with Kilian (STOC ‘92), several works have shown how to use probabilistically checkable proofs (PCPs) and cryptographic primitives such as collision-resistant hashing to construct very efficient argument systems (a.k.a. computationally sound proofs), for example with polylogarithmic communication complexity. Ishai et al. (CCC ‘07) raised the question of whether PCPs are inherent in efficient arguments, and if so, to what extent. We give evidence that they are, by showing how to convert any argument system whose soundness is reducible to the security of some cryptographic primitive into a PCP system whose efficiency is related to that of the argument system and the reduction (under certain complexity assumptions). [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
18. An algebraic proof of the real number PCP theorem
- Author
-
Klaus Meer and Martijn Baartse
- Subjects
Statistics and Probability ,PCP theorem ,Discrete mathematics ,Numerical Analysis ,Control and Optimization ,Algebra and Number Theory ,Degree (graph theory) ,Applied Mathematics ,General Mathematics ,010103 numerical & computational mathematics ,0102 computer and information sciences ,Computer Science::Computational Complexity ,01 natural sciences ,Combinatorics ,010201 computation theory & mathematics ,Order (group theory) ,MAX-3SAT ,0101 mathematics ,Algebraic number ,Probabilistically checkable proof ,Real number ,Mathematics ,Analytic proof - Abstract
The PCP theorem has recently been shown to hold as well in the real number model of Blum, Shub, and Smale (Baartse and Meer, 2015). The proof given there structurally closely follows the proof of the original PCP theorem by Dinur (2007). In this paper we show that the theorem also can be derived using algebraic techniques similar to those employed by Arora etal. (Arora etal., 1998; Arora and Safra, 1998) in the first proof of the PCP theorem. This needs considerable additional efforts. Due to severe problems when using low degree algebraic polynomials over the reals as codewords for one of the verifiers to be constructed, we work with certain trigonometric polynomials. This entails the necessity to design new segmentation procedures in order to obtain well structured real verifiers appropriate for applying the classical technique of verifier composition.We believe that designing as well an algebraic proof for the real PCP theorem on one side leads to interesting questions in real number complexity theory and on the other sheds light on which ingredients are necessary in order to prove an important result as the PCP theorem in different computational models.
- Published
- 2017
- Full Text
- View/download PDF
19. A New Multilayered PCP and the Hardness of Hypergraph Vertex Cover.
- Author
-
Dinur, Irit, Guruswami, Venkatesan, Khot, Subhash, and Regev, Oded
- Subjects
- *
HYPERGRAPHS , *COMBINATORICS , *APPROXIMATION theory , *MATHEMATICAL constants , *PROBABILITY theory , *VERTEX operator algebras - Abstract
Given a k-uniform hypergraph, the Ek-Vertex-Cover problem is to find the smallest subset of vertices that intersects every hyperedge. We present a new multilayered probabilistically checkable proof (PCP) construction that extends the Raz verifier. This enables us to prove that Ek-Vertex-Cover is NP-hard to approximate within a factor of $(k-1-\epsilon)$ for arbitrary constants $\epsilon>0$ and $k\ge 3$. The result is nearly tight as this problem can be easily approximated within factor k. Our construction makes use of the biased long-code and is analyzed using combinatorial properties of s-wise t-intersecting families of subsets. We also give a different proof that shows an inapproximability factor of $\lfloor \frac{k}{2} \rfloor -\eps$. In addition to being simpler, this proof also works for superconstant values of k up to (log N) 1/c, where c > 1 is a fixed constant and N is the number of hyperedges. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
20. Hardness of Coloring 2-Colorable 12-Uniform Hypergraphs with $2^{(\log {n})^{\Omega(1)}}$ Colors
- Author
-
Subhash Khot and Rishi Saket
- Subjects
Discrete mathematics ,Hypergraph ,General Computer Science ,Degree (graph theory) ,General Mathematics ,Short Code ,Computer Science::Computational Complexity ,Binary logarithm ,Omega ,Combinatorics ,Probabilistically checkable proof ,computer ,Mathematics ,computer.programming_language - Abstract
We show that it is quasi-NP-hard to color 2-colorable 12-uniform hypergraphs with $2^{(\log n)^{\Omega(1) }}$ colors where $n$ is the number of vertices. Previously, Guruswami Harsha, H\aa stad, Srinivasan, and Varma showed that it is quasi-NP-hard to color 2-colorable 8-uniform hypergraphs with $2^{2^{\Omega(\sqrt{\log \log n})}}$ colors. Their result is obtained by composing a standard outer probabilistically checkable proof (PCP) with an inner PCP based on the short code of superconstant degree. Our result is instead obtained by composing a new outer PCP with an inner PCP based on the short code of degree two.
- Published
- 2017
- Full Text
- View/download PDF
21. Multi-focused Proofs with Different Polarity Assignments
- Author
-
Vivek Nigam, Elaine Pimentel, and João Carlos Neto
- Subjects
Discrete mathematics ,General Computer Science ,Proof complexity ,Proof by contradiction ,010102 general mathematics ,Combinatorial proof ,0102 computer and information sciences ,01 natural sciences ,Theoretical Computer Science ,Intuitionistic logic ,010201 computation theory & mathematics ,Proof theory ,Identity of proofs ,Direct proof ,Structural proof theory ,0101 mathematics ,Proof Systems ,Probabilistically checkable proof ,Focusing ,Mathematics ,Analytic proof ,Computer Science(all) - Abstract
In this work, we will reason on how a given focused proof, where atoms are assigned with some polarity, can be transformed into another focused proof, where the polarity assignment to atoms is changed. This will allow, in principle, transforming a proof obtained using one proof system into a proof using another proof system. More specifically, using the intuitionistic focused system LJF restricted to Harrop formulas, we define a procedure, introducing cuts, for transforming a focused proof where an atom is assigned with positive polarity into another focused proof where the same atom is assigned negative polarity and vice-versa. Then we show how to eliminate these cuts, obtaining a very interesting result: while the process of eliminating a cut on a positive atom gives rise to a proof with one smaller cut, in the negative case the number of introduced cuts grows exponentially. We end the paper by showing how to use maximal multi-focusing identify proofs in LJF, giving rise to a 1-1 translation between maximal proofs in LJF and proofs in the natural deduction system for intuitionistic logic NJ, restricted to Harrop formulas.
- Published
- 2016
- Full Text
- View/download PDF
22. A novel approach to public-coin concurrent zero-knowledge and applications on resettable security
- Author
-
Zhenbin Yan and Yi Deng
- Subjects
Theoretical computer science ,General Computer Science ,Computational complexity theory ,Computer science ,Hash function ,020207 software engineering ,02 engineering and technology ,One-way function ,Cryptographic protocol ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,Zero-knowledge proof ,State (computer science) ,Probabilistically checkable proof - Abstract
Canetti, Lin and Paneth in TCC 2013 showed a $O(\log^{1+\varepsilon}{n})$ rounds public-coin concurrent zero-knowledge argument system (CZK) based on the existence of collision resistant hash functions, which is currently known as round optimal public-coin CZK from standard assumptions. In this paper, we further address this problem and present an alternative construction of public-coin CZK argument system with succinct slot. The key technique involves a new variant of Baraks non-black-box simulate approach. In particular, the original protocol uses $n$ commitments in each slot, while our construction uses one commitment in each slot. Through our simulation techniques, the simulator recovers any previous state needed for the probabilistically checkable proof (PCP from the current committed state, which, in our view, may be of independent interest. Furthermore, the public-coin CZK argument system can be transformed into a resettable security protocol based on the one way functions assumption. Therefore, we present a new construction of the simultaneous resettable zero-knowledge argument system.
- Published
- 2019
- Full Text
- View/download PDF
23. Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs
- Author
-
Henry Corrigan-Gibbs, Dan Boneh, Niv Gilboa, Yuval Ishai, and Elette Boyle
- Subjects
Theoretical computer science ,Computer science ,Small number ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,010201 computation theory & mathematics ,TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Zero-knowledge proof ,Probabilistically checkable proof ,Computer Science::Databases - Abstract
We introduce and study the notion of fully linear probabilistically checkable proof systems. In such a proof system, the verifier can make a small number of linear queries that apply jointly to the input and a proof vector.
- Published
- 2019
- Full Text
- View/download PDF
24. Non-interactive proofs of proximity
- Author
-
Ron D. Rothblum and Tom Gur
- Subjects
Statement (computer science) ,Discrete mathematics ,Property testing ,0209 industrial biotechnology ,Theoretical computer science ,Sublinear function ,Property (programming) ,General Mathematics ,Multiplicative function ,Interactive proof system ,0102 computer and information sciences ,02 engineering and technology ,Mathematical proof ,01 natural sciences ,Theoretical Computer Science ,QA76 ,Computational Mathematics ,020901 industrial engineering & automation ,Computational Theory and Mathematics ,010201 computation theory & mathematics ,Probabilistically checkable proof ,Mathematics - Abstract
We initiate a study of non-interactive proofs of proximity. These proof systems consist of a verifier that wishes to ascertain the validity of a given statement, using a short (sublinear length) explicitly given proof, and a sublinear number of queries to its input. Since the verifier cannot even read the entire input, we only require it to reject inputs that are far from being valid. Thus, the verifier is only assured of the proximity of the statement to a correct one. Such proof systems can be viewed as the N P (or more accurately MA) analogue of property testing. We explore both the power and limitations of non-interactive proofs of proximity. We show that such proof systems can be exponentially stronger than property testers, but are exponentially weaker than the interactive proofs of proximity studied by Rothblum, Vadhan and Wigderson (STOC 2013). In addition, we show a natural problem that has a full and (almost) tight multiplicative trade-off between the length of the proof and the verifier’s query complexity. On the negative side, we also show that there exist properties for which even a linearly-long (non-interactive) proof of proximity cannot significantly reduce the query complexity.
- Published
- 2018
25. Combinatorial PCPs with Short Proofs
- Author
-
Or Meir
- Subjects
PCP theorem ,Discrete mathematics ,0209 industrial biotechnology ,Polynomial ,Degree (graph theory) ,General Mathematics ,0102 computer and information sciences ,02 engineering and technology ,Computer Science::Computational Complexity ,Binary logarithm ,Mathematical proof ,01 natural sciences ,Theoretical Computer Science ,Combinatorics ,Computational Mathematics ,020901 industrial engineering & automation ,Computational Theory and Mathematics ,010201 computation theory & mathematics ,Simple (abstract algebra) ,MAX-3SAT ,Multiplication ,Algebraic number ,Probabilistically checkable proof ,Mathematics - Abstract
The Probabilistically Checkable Proof (PCP) theorem (Arora and Safra in J ACM 45(1):70---122, 1998; Arora et al. in J ACM 45(3):501---555, 1998) asserts the existence of proofs that can be verified by reading a very small part of the proof. Since the discovery of the theorem, there has been a considerable work on improving the theorem in terms of the length of the proofs, culminating in the construction of PCPs of quasi-linear length, by Ben-Sasson and Sudan (SICOMP 38(2):551---607, 2008) and Dinur (J ACM 54(3):241---250, 2007). One common theme in the aforementioned PCP constructions is that they all rely heavily on sophisticated algebraic machinery. The aforementioned work of Dinur (2007) suggested an alternative approach for constructing PCPs, which gives a simpler and arguably more intuitive proof of the PCP theorem using combinatorial techniques. However, this combinatorial construction only yields PCPs of polynomial length and is therefore inferior to the algebraic constructions in this respect. This gives rise to the natural question of whether the proof length of the algebraic constructions can be matched using the combinatorial approach. In this work, we provide a combinatorial construction of PCPs of length $${n\cdot\left(\log n\right)^{O(\log\log n)}}$$n·lognO(loglogn), coming very close to the state-of-the-art algebraic constructions (whose proof length is $${n\cdot\left(\log n\right)^{O(1)}}$$n·lognO(1)). To this end, we develop a few generic PCP techniques which may be of independent interest. It should be mentioned that our construction does use low-degree polynomials at one point. However, our use of polynomials is confined to the construction of error-correcting codes with a certain simple multiplication property, and it is conceivable that such codes could be constructed without the use of polynomials. In addition, we provide a variant of the main construction that does not use polynomials at all and has proof length $${n^{4} \cdot\left(\log n\right)^{O(\log\log n)}}$$n4·lognO(loglogn). This is already an improvement over the aforementioned combinatorial construction of Dinur.
- Published
- 2016
- Full Text
- View/download PDF
26. [Untitled]
- Author
-
Jukka Suomela and Mika Göös
- Subjects
PCP theorem ,Discrete mathematics ,NEXPTIME ,Proof complexity ,0102 computer and information sciences ,02 engineering and technology ,Mathematical proof ,01 natural sciences ,Theoretical Computer Science ,Nondeterministic algorithm ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,Computational Theory and Mathematics ,010201 computation theory & mathematics ,TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS ,0202 electrical engineering, electronic engineering, information engineering ,Bipartite graph ,020201 artificial intelligence & image processing ,Graph property ,Probabilistically checkable proof ,Mathematics - Abstract
This work studies decision problems related to graph properties from the perspective of nondeterministic distributed algorithms. For a yes-instance there must exist a proof that can be verified with a distributed algorithm: all nodes must accept a valid proof, and at least one node must reject an invalid proof. We focus on locally checkable proofs that can be verified with a constant-time distributed algorithm. For example, it is easy to prove that a graph is bipartite: the locally checkable proof gives a 2-coloring of the graph, which only takes 1 bit per node. However, it is more difficult to prove that a graph is not bipartite—it turns out that any locally checkable proof requires W(log n) bits per node. In this work we classify graph properties according to their local proof complexity, i. e., how many bits per node are needed in a locally checkable proof. We establish tight or near- tight results for classical graph properties such as the chromatic number. We show that the local proof complexities form a natural hierarchy of complexity classes: for many classical
- Published
- 2016
- Full Text
- View/download PDF
27. A manually-checkable proof for the NP-hardness of 11-color pattern self-assembly tileset synthesis
- Author
-
Shinnosuke Seki, Ming-Yang Kao, and Aleck Johnsen
- Subjects
Discrete mathematics ,Control and Optimization ,Applied Mathematics ,0102 computer and information sciences ,02 engineering and technology ,021001 nanoscience & nanotechnology ,01 natural sciences ,Computer Science Applications ,Combinatorics ,Set (abstract data type) ,Computational Theory and Mathematics ,010201 computation theory & mathematics ,visual_art ,Theory of computation ,visual_art.visual_art_medium ,Discrete Mathematics and Combinatorics ,Tile ,0210 nano-technology ,Probabilistically checkable proof ,Mathematics ,Integer (computer science) - Abstract
Patterned self-assembly tile set synthesis (pats) aims at minimizing the number of distinct DNA tile types used to self-assemble a given rectangular color pattern. For an integer k, k-pats is the subproblem of pats that restricts input patterns to those with at most k colors. We give an efficient [InlineEquation not available: see fulltext.] verifier, and based on that, we establish a manually-checkable proof for the NP-hardness of 11-pats; the best previous manually-checkable proof is for 29-pats.
- Published
- 2015
- Full Text
- View/download PDF
28. Delegating Computation
- Author
-
Guy N. Rothblum, Yael Tauman Kalai, and Shafi Goldwasser
- Subjects
Discrete mathematics ,Theoretical computer science ,Correctness ,Computer science ,Boolean circuit ,Interactive proof system ,Gas meter prover ,Mathematical proof ,Combinatorics ,Artificial Intelligence ,Hardware and Architecture ,Control and Systems Engineering ,Communication complexity ,Probabilistically checkable proof ,Time complexity ,Software ,Verifiable computing ,Information Systems - Abstract
In this work we study interactive proofs for tractable languages. The (honest) prover should be efficient and run in polynomial time or, in other words, a “muggle”.1 The verifier should be super-efficient and run in nearly linear time. These proof systems can be used for delegating computation: a server can run a computation for a client and interactively prove the correctness of the result. The client can verify the result’s correctness in nearly linear time (instead of running the entire computation itself). Previously, related questions were considered in the holographic proof setting by Babai et al. [1991b] in the argument setting under computational assumptions by Kilian, and in the random oracle model by Micali [1994]. Our focus, however, is on the original interactive proof model where no assumptions are made on the computational power or adaptiveness of dishonest provers. Our main technical theorem gives a public coin interactive proof for any language computable by a log-space uniform boolean circuit with depth d and input length n . The verifier runs in time n · poly( d , log( n )) and space O (log( n )), the communication complexity is poly( d , log( n )), and the prover runs in time poly( n ). In particular, for languages computable by log-space uniform NC (circuits of polylog( n ) depth), the prover is efficient, the verifier runs in time n · polylog( n ) and space O (log( n )), and the communication complexity is polylog( n ). Using this theorem we make progress on several questions. --- We show how to construct 1-round computationally sound arguments with polylog communication for any log-space uniform NC computation. The verifier runs in quasi-linear time. This result uses a recent transformation of Kalai and Raz from public coin interactive proofs to 1-round arguments . The soundness of the argument system is based on the existence of a PIR scheme with polylog communication. --- We construct interactive proofs with public coin, log-space, poly-time verifiers for all of P are given. This settles an open question regarding the expressive power of proof systems with such verifiers. --- We construct zero-knowledge interactive proofs are given with communication complexity quasi-linear in the witness length for any NP language verifiable in NC , based on the existence of 1-way functions. --- We construct probabilistically checkable arguments (a model due to Kalai and Raz) of size polynomial in the witness length (rather than instance length) for any NP language verifiable in NC , under computational assumptions, are provided.
- Published
- 2015
- Full Text
- View/download PDF
29. Improving Legibility of Formal Proofs Based on the Close Reference Principle is NP-Hard
- Author
-
Karol Pąk
- Subjects
Natural deduction ,Computer science ,Programming language ,Proof complexity ,business.industry ,Proof assistant ,Mizar system ,computer.software_genre ,Mathematical proof ,Legibility ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,Computational Theory and Mathematics ,Artificial Intelligence ,TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS ,Automated proof checking ,ComputingMethodologies_DOCUMENTANDTEXTPROCESSING ,Artificial intelligence ,business ,computer ,Probabilistically checkable proof ,Software - Abstract
Proof development in proof assistants such as HOL, Coq, Mizar, etc. is an activity where authors usually produce proofs by typing out proof scripts or system tactics. Quite frequently, however, authors also have to read existing proof scripts, either to imitate smart proof pieces, or to refactor fragments of reasoning to make some theorem stronger, more easily applicable and so on. Therefore, it is important to develop techniques to improve legibility of proofs, since it directly affects productivity of script writers. To analyze the legibility of natural deduction proofs, we investigate proof graphs that represent the flow of information in given reasoning. Our analysis of the information flow leads to methods of improving proof readability based on Behaghel's First Law, which states that in legible text relevant pieces of information must occur close to each other. The presented method maximizes the number of close connections between premises and steps that use these steps as justification. In this paper we show that our optimization method is NP-hard.
- Published
- 2015
- Full Text
- View/download PDF
30. The Unique Games Conjecture, Integrality Gap for Cut Problems and Embeddability of Negative-Type Metrics into ℓ 1
- Author
-
Subhash Khot and Nisheeth K. Vishnoi
- Subjects
Discrete mathematics ,Conjecture ,Reduction (recursion theory) ,Unique games conjecture ,Hardness of approximation ,Upper and lower bounds ,Combinatorics ,Artificial Intelligence ,Hardware and Architecture ,Control and Systems Engineering ,Metric (mathematics) ,Embedding ,Probabilistically checkable proof ,Software ,Information Systems ,Mathematics - Abstract
In this article, we disprove a conjecture of Goemans and Linial; namely, that every negative type metric embeds into ℓ 1 with constant distortion. We show that for an arbitrarily small constant δ > 0, for all large enough n , there is an n -point negative type metric which requires distortion at least (log log n ) 1/6-δ to embed into ℓ 1 . Surprisingly, our construction is inspired by the Unique Games Conjecture (UGC), establishing a previously unsuspected connection between probabilistically checkable proof systems (PCPs) and the theory of metric embeddings. We first prove that the UGC implies a super-constant hardness result for the (nonuniform) S PARSEST C UT problem. Though this hardness result relies on the UGC, we demonstrate, nevertheless, that the corresponding PCP reduction can be used to construct an “integrality gap instance” for S PARSEST C UT . Towards this, we first construct an integrality gap instance for a natural SDP relaxation of U NIQUE G AMES . Then we “simulate” the PCP reduction and “translate” the integrality gap instance of U NIQUE G AMES to an integrality gap instance of S PARSEST C UT . This enables us to prove a (log log n ) 1/6-δ integrality gap for S PARSEST C UT , which is known to be equivalent to the metric embedding lower bound.
- Published
- 2015
- Full Text
- View/download PDF
31. Different Proofs are Good Proofs
- Author
-
Deborah L. McGuinness, Li Ding, Cynthia Chang, Paulo Pinheiro da Silva, and Geoff Sutcliffe
- Subjects
Discrete mathematics ,Automated theorem proving ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,Position (vector) ,TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS ,Automated proof checking ,Calculus ,Order (group theory) ,Mathematical proof ,Probabilistically checkable proof ,Measure (mathematics) ,Mathematics ,Ranking (information retrieval) - Abstract
In order to compare the quality of proofs, it is necessary to measure artifacts of the proofs, and evaluate the measurements to determine differences between the proofs. This paper discounts the approach of ranking measurements of proof artifacts, and takes the position that different proofs are good proofs. The position is based on proofs in the TSTP solution library, which are generated by Automated Theorem Proving (ATP) systems applied to first-order logic problems in the TPTP problem library.
- Published
- 2018
- Full Text
- View/download PDF
32. No-signaling Linear PCPs
- Author
-
Susumu Kiyoshima
- Subjects
TheoryofComputation_MISCELLANEOUS ,Soundness ,Discrete mathematics ,0209 industrial biotechnology ,Linear function (calculus) ,Distribution (number theory) ,Computation ,0102 computer and information sciences ,02 engineering and technology ,Computer Science::Computational Complexity ,Gas meter prover ,01 natural sciences ,Oracle ,Set (abstract data type) ,Computer Science::Graphics ,020901 industrial engineering & automation ,010201 computation theory & mathematics ,Probabilistically checkable proof ,Mathematics - Abstract
In this paper, we give a no-signaling linear probabilistically checkable proof (PCP) system for polynomial-time deterministic computation, i.e., a PCP system for \({\mathcal {P}}\) such that (1) the PCP oracle is a linear function and (2) the soundness holds against any (computational) no-signaling cheating prover, who is allowed to answer each query according to a distribution that depends on the entire query set in a certain way. To the best of our knowledge, our construction is the first PCP system that satisfies these two properties simultaneously.
- Published
- 2018
- Full Text
- View/download PDF
33. Logic of proofs with complexity operators
- Author
-
Sergei Artemov and Artëm Chuprina
- Subjects
Discrete mathematics ,Theoretical computer science ,Linear temporal logic ,Proof complexity ,Second-order logic ,Multimodal logic ,Dynamic logic (modal logic) ,Intermediate logic ,Descriptive complexity theory ,Probabilistically checkable proof ,Mathematics - Published
- 2017
- Full Text
- View/download PDF
34. A knowledge-based interactive verifier for logic programs
- Author
-
Emmanouil Marakakis, Nikos Papadakis, and Haridimos Kondylakis
- Subjects
Correctness ,Theoretical computer science ,Proof complexity ,Computer science ,Proof assistant ,Proof of knowledge ,Interactive proof system ,Computer-assisted proof ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,Artificial Intelligence ,Control and Systems Engineering ,TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS ,Automated proof checking ,Probabilistically checkable proof ,Software - Abstract
This paper presents an interactive verifier for logic programs. These logic programs are constructed by a schema-based method. Each program is associated with proof schemes due to the program development method. The correctness proof of a program is guided by its associated proof schemes. The main components of the verifier are the prover which carries out the proof steps, the knowledge base (KB) which includes representations of all theories and transformation rules, the KB update which supports the update of KB and the graphical user interface (GUI). The emphasis in the design of this proof checker is on effective guidance of the proof based on the activated proof schemes and on performance by the verifier of tedious, trivial and time consuming tasks. The difficult proof decisions are taken by the user, then, the proof checker applies them. The design of the interface is based on providing the user the required support for the proof of a theorem and for the update of KB. This system is an effective and useful tool for the interactive verification of non-trivial logic programs.
- Published
- 2014
- Full Text
- View/download PDF
35. Partially definable forcing and bounded arithmetic
- Author
-
Moritz Müller, Albert Atserias, Universitat Politècnica de Catalunya. Departament de Ciències de la Computació, Universitat Politècnica de Catalunya. ALBCOM - Algorismia, Bioinformàtica, Complexitat i Mètodes Formals, and Centre de Recerca Matemàtica
- Subjects
Pure mathematics ,Logic ,Matemàtica constructiva ,Depth frege proofs ,510 - Consideracions fonamentals i generals de les matemàtiques ,Size ,Bounded arithmetic ,Computer Science::Logic in Computer Science ,Hardware_ARITHMETICANDLOGICSTRUCTURES ,Algebra over a field ,Complexity gap ,Complexitat computacional ,Probabilistically checkable proof ,Propositional proof systems ,Mathematics ,Discrete mathematics ,Forcing (recursion theory) ,Proof complexity ,Pigeonhole principle ,Proposició (Lògica) ,Resolution (logic) ,Computational complexity ,Philosophy ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,Informàtica::Informàtica teòrica [Àrees temàtiques de la UPC] ,Matemàtiques i estadística::Anàlisi matemàtica [Àrees temàtiques de la UPC] ,Forcing ,Resolution - Abstract
We describe a method of forcing against weak theories of arithmetic and its applications in propositional proof complexity.
- Published
- 2014
- Full Text
- View/download PDF
36. Lifting lower bounds for tree-like proofs
- Author
-
Phuong Nguyen, Alexis Maciel, and Toniann Pitassi
- Subjects
Discrete mathematics ,Proofs involving the addition of natural numbers ,Proof complexity ,General Mathematics ,Boolean circuit ,Sequent calculus ,Mathematical proof ,Computational hardness assumption ,Upper and lower bounds ,Theoretical Computer Science ,Combinatorics ,Computational Mathematics ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,Computational Theory and Mathematics ,Probabilistically checkable proof ,Mathematics - Abstract
It is known that constant-depth Frege proofs of some tautologies require exponential size. No such lower bound result is known for more general proof systems. We consider tree-like sequent calculus proofs in which formulas can contain modular connectives and only the cut formulas are restricted to be of constant depth. Under a plausible hardness assumption concerning small-depth Boolean circuits, we prove exponential lower bounds for such proofs. We prove these lower bounds directly from the computational hardness assumption. We start with a lower bound for cut-free proofs and "lift" it so it applies to proofs with constant-depth cuts. By using the same approach, we obtain the following additional results. We provide a much simpler proof of a known unconditional lower bound in the case where modular connectives are not used. We establish a conditional exponential separation between the power of constant-depth proofs that use different modular connectives. We show that these tree-like proofs with constant-depth cuts cannot polynomially simulate similar dag-like proofs, even when the dag-like proofs are cut-free. We present a new proof of the non-finite axiomatizability of the theory of bounded arithmetic I Δ0(R). Finally, under a plausible hardness assumption concerning the polynomial-time hierarchy, we show that the hierarchy $${G_i^*}$$ of quantified propositional proof systems does not collapse.
- Published
- 2013
- Full Text
- View/download PDF
37. Scalable fine-grained proofs for formula processing
- Author
-
Pascal Fontaine, Haniel Barbosa, Jasmin Christian Blanchette, Mathias Fleury, Theoretical Computer Science, Network Institute, Modeling and Verification of Distributed Algorithms and Systems (VERIDIS), Department of Formal Methods (LORIA - FM), Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Inria Nancy - Grand Est, Institut National de Recherche en Informatique et en Automatique (Inria)-Max-Planck-Institut für Informatik (MPII), Max-Planck-Gesellschaft-Max-Planck-Gesellschaft, Max-Planck-Institut für Informatik (MPII), Max-Planck-Gesellschaft, Vrije Universiteit Amsterdam [Amsterdam] (VU), Proof-oriented development of computer-based systems (MOSEL), Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS), Max-Planck-Gesellschaft-Max-Planck-Gesellschaft-Inria Nancy - Grand Est, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Department of Formal Methods (LORIA - FM), Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS), Universidade Federal do Rio Grande do Norte [Natal] (UFRN), Universite de Lorraine, CNRS, Inria, LORIA, Nancy, France, Universidade Federal do Rio Grande do Norte, Natal, Brazil, Vrije Universiteit Amsterdam, Amsterdam, The Netherlands, Max-Planck-Institut für Informatik, Saarbrücken, Germany, Leonardo de Moura, ANR-13-IS02-0001,SMArT,Satisfaisabilité Modulo Arithmétique et Théories(2013), European Project: 712689,H2020,H2020-FETOPEN-2015-CSA,SC-square(2016), Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL), Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Institut National de Recherche en Informatique et en Automatique (Inria), and de Moura, Leonardo
- Subjects
Rewriting ,Computer science ,automatic theorem proving ,HOL ,Proof production ,Proof checking ,0102 computer and information sciences ,02 engineering and technology ,satisfiability modulo theories ,Skolem normal form ,Mathematical proof ,computer.software_genre ,01 natural sciences ,Computer-assisted proof ,Artificial Intelligence ,Satisfiability modulo theories ,Automated proof checking ,Computer Science::Logic in Computer Science ,0202 electrical engineering, electronic engineering, information engineering ,Rule of inference ,Probabilistically checkable proof ,Mathematics ,Recursion ,Proofs of Fermat's little theorem ,Programming language ,Proof complexity ,Proof assistant ,[INFO.INFO-LO]Computer Science [cs]/Logic in Computer Science [cs.LO] ,020207 software engineering ,Data structure ,Formula processing ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,Computational Theory and Mathematics ,010201 computation theory & mathematics ,SMT ,TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS ,Proof reconstruction ,020201 artificial intelligence & image processing ,computer ,Software ,Analytic proof - Abstract
International audience; We present a framework for processing formulas in automatic theorem provers, with generation of detailed proofs. The main components are a generic contextual recursion algorithm and an extensible set of inference rules. Clausification, skolemization, theory-specific simplifications, and expansion of 'let' expressions are instances of this framework. With suitable data structures, proof generation adds only a linear-time overhead, and proofs can be checked in linear time. We implemented the approach in the SMT solver veriT. This allowed us to dramatically simplify the code base while increasing the number of problems for which detailed proofs can be produced, which is important for independent checking and reconstruction in proof assistants. To validate the framework, we implemented proof reconstruction in Isabelle/HOL.
- Published
- 2017
- Full Text
- View/download PDF
38. [Untitled]
- Author
-
Ali Kemal Sinop and Venkatesan Guruswami
- Subjects
Combinatorics ,Physics ,Semidefinite programming ,Conjecture ,Computational Theory and Mathematics ,Graph (abstract data type) ,Fraction (mathematics) ,Graph coloring ,Hardness of approximation ,Time complexity ,Probabilistically checkable proof ,Theoretical Computer Science - Abstract
We study the maximization version of the fundamental graph coloring problem. Here the goal is to color the vertices of a k -colorable graph with k colors so that a maximum fraction of edges are properly colored (i.e. their endpoints receive different colors). A random k -coloring properly colors an expected fraction $1-\frac{1}{k}$ of edges. We prove that given a graph promised to be k -colorable, it is NP-hard to find a k -coloring that properly colors more than a fraction of edges. Previously, only a hardness factor of $1- O\bigl(\frac{1}{k^2}\bigr)$ was known. Our result pins down the correct asymptotic dependence of the approximation factor on k . Along the way, we prove that approximating the Maximum 3-colorable subgraph problem within a factor greater than $\frac{32}{33}$ is NP-hard. Using semidefinite programming, it is known that one can do better than a random coloring and properly color a fraction $1-\frac{1}{k} +\frac{2 \ln k}{k^2}$ of edges in polynomial time. We show that, assuming the 2-to-1 conjecture, it is hard to properly color (using k colors) more than a fraction $1-\frac{1}{k} + O\left(\frac{\ln k}{k^2}\right)$ of edges of a k -colorable graph.
- Published
- 2013
- Full Text
- View/download PDF
39. Removing the Outliers of Diverse Zero-Knowledge Proof Systems using Mahalanobis Distance
- Author
-
Jeril Kuriakose and Sandeep Joshi
- Subjects
Theoretical computer science ,Computer science ,Proof assistant ,Non-interactive zero-knowledge proof ,Interactive proof system ,Proof of knowledge ,020206 networking & telecommunications ,0102 computer and information sciences ,02 engineering and technology ,Gas meter prover ,Computer security ,computer.software_genre ,Mathematical proof ,01 natural sciences ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,010201 computation theory & mathematics ,TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS ,0202 electrical engineering, electronic engineering, information engineering ,Zero-knowledge proof ,Probabilistically checkable proof ,computer - Abstract
The purpose behind zero-knowledge proofs are to deliver a mystification to the verifier, so that the verifier will not comprehend the information sent by the prover. Cryptography and complexity theory have gained a lot of importance because of zero-knowledge proofs. An enigmatic outset was dignified, that lead to the foundation zero-knowledge proof systems. Zero-knowledge proofs are generally used to verify a prover's theorem to a verifier, in such a way that the verifier will not be able to discover any supplementary evidence other than the proof given to him. In this paper, we have reviewed different zero-knowledge argument / proof techniques. We have also reviewed the proof system implications in the presence of malicious prover and malicious verifier. We have removed the outliers of the experiment by using Mahalanobis distance. Examples associated to zero-knowledge argument systems are also given.
- Published
- 2016
- Full Text
- View/download PDF
40. A Rewrite System for Proof Constructivization
- Author
-
Raphaël Cauderlier, Deduction modulo, interopérabilité et démonstration automatique (DEDUCTEAM), Laboratoire Spécification et Vérification [Cachan] (LSV), École normale supérieure - Cachan (ENS Cachan)-Centre National de la Recherche Scientifique (CNRS)-École normale supérieure - Cachan (ENS Cachan)-Centre National de la Recherche Scientifique (CNRS)-Inria Saclay - Ile de France, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Centre d'études et de recherche en informatique et communications (CEDRIC), Ecole Nationale Supérieure d'Informatique pour l'Industrie et l'Entreprise (ENSIIE)-Conservatoire National des Arts et Métiers [CNAM] (CNAM), HESAM Université - Communauté d'universités et d'établissements Hautes écoles Sorbonne Arts et métiers université (HESAM)-HESAM Université - Communauté d'universités et d'établissements Hautes écoles Sorbonne Arts et métiers université (HESAM), Inria Saclay - Ile de France, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire Spécification et Vérification [Cachan] (LSV), and École normale supérieure - Cachan (ENS Cachan)-Centre National de la Recherche Scientifique (CNRS)-École normale supérieure - Cachan (ENS Cachan)-Centre National de la Recherche Scientifique (CNRS)
- Subjects
Discrete mathematics ,010308 nuclear & particles physics ,Proof complexity ,010102 general mathematics ,Proof assistant ,[INFO.INFO-LO]Computer Science [cs]/Logic in Computer Science [cs.LO] ,Mathematical proof ,01 natural sciences ,Computer-assisted proof ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,Proof theory ,Automated proof checking ,TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS ,Computer Science::Logic in Computer Science ,0103 physical sciences ,Calculus ,Structural proof theory ,0101 mathematics ,Probabilistically checkable proof ,Mathematics - Abstract
International audience; Proof constructivization is the problem of automatically extracting constructive proofs out of classical proofs. This process is required when classical theorem provers are integrated in intuitionistic proof assistants. We use the ability of rewrite systems to represent partial functions to implement heuristics for proof constructivization in Dedukti, a logical framework based on rewriting in which proofs are first-class objects which can be the subject of computation. We benchmark these heuristics on the proofs output by the automated theorem prover Zenon on the TPTP library of problems.
- Published
- 2016
- Full Text
- View/download PDF
41. Constant-round interactive proofs for delegating computation
- Author
-
Omer Reingold, Ron D. Rothblum, and Guy N. Rothblum
- Subjects
Theoretical computer science ,General Computer Science ,General Mathematics ,media_common.quotation_subject ,Computation ,Proof of knowledge ,0102 computer and information sciences ,02 engineering and technology ,Gas meter prover ,computer.software_genre ,Mathematical proof ,01 natural sciences ,0202 electrical engineering, electronic engineering, information engineering ,Probabilistically checkable proof ,media_common ,PSPACE ,Mathematics ,Discrete mathematics ,Delegation ,Programming language ,Proof assistant ,Interactive proof system ,020206 networking & telecommunications ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,010201 computation theory & mathematics ,TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS ,Verifiable secret sharing ,Constant (mathematics) ,computer - Abstract
The celebrated IP=PSPACE Theorem of Lund et-al. (J.ACM 1992) and Shamir (J.ACM 1992), allows an all-powerful but untrusted prover to convince a polynomial-time verifier of the validity of extremely complicated statements (as long as they can be evaluated using polynomial space). The interactive proof system designed for this purpose requires a polynomial number of communication rounds and an exponential-time (polynomial-space complete) prover. In this paper, we study the power of more efficient interactive proof systems. Our main result is that for every statement that can be evaluated in polynomial time and bounded-polynomial space there exists an interactive proof that satisfies the following strict efficiency requirements: (1) the honest prover runs in polynomial time, (2) the verifier is almost linear time (and under some conditions even sub linear), and (3) the interaction consists of only a constant number of communication rounds. Prior to this work, very little was known about the power of efficient, constant-round interactive proofs (rather than arguments). This result represents significant progress on the round complexity of interactive proofs (even if we ignore the running time of the honest prover), and on the expressive power of interactive proofs with polynomial-time honest prover (even if we ignore the round complexity). This result has several applications, and in particular it can be used for verifiable delegation of computation. Our construction leverages several new notions of interactive proofs, which may be of independent interest. One of these notions is that of unambiguous interactive proofs where the prover has a unique successful strategy. Another notion is that of probabilistically checkable interactive proofs (PCIPs) where the verifier only reads a few bits of the transcript in checking the proof (this could be viewed as an interactive extension of PCPs).
- Published
- 2016
- Full Text
- View/download PDF
42. Comparative study of diverse zero-knowledge argument systems
- Author
-
Shraddha S. More, Dhvani Shah, Jeril Kuriakose, Pushpendra Singh Sisodia, and Amruth
- Subjects
Theoretical computer science ,Proof assistant ,Non-interactive zero-knowledge proof ,Proof of knowledge ,Interactive proof system ,020206 networking & telecommunications ,0102 computer and information sciences ,02 engineering and technology ,Gas meter prover ,Mathematical proof ,01 natural sciences ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,010201 computation theory & mathematics ,TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS ,0202 electrical engineering, electronic engineering, information engineering ,Zero-knowledge proof ,Probabilistically checkable proof ,Mathematics - Abstract
Cryptography and complexity theory have gained a lot of importance because of zero-knowledge proofs. The motive behind zero-knowledge proofs are to provide an obfuscation to the verifier, so that the verifier will not understand the information sent by the prover. Zero-knowledge proofs are normally used to verify a prover's theorem to a verifier, in such a way that the verifier will not be able to discover any supplementary evidence other than the proof given to him. An enigmatic conception was formalized, that lead to the formation zero-knowledge proof systems. In this paper, we have reviewed different zero-knowledge argument / proof techniques. We have also reviewed the proof system implications in the presence of malicious prover and malicious verifier. Examples related to zero-knowledge argument systems are also given.
- Published
- 2016
- Full Text
- View/download PDF
43. Towards NP–P via proof complexity and search
- Author
-
Samuel R. Buss
- Subjects
Discrete mathematics ,Logic ,Proof complexity ,010102 general mathematics ,Combinatorial proof ,0102 computer and information sciences ,01 natural sciences ,Computer-assisted proof ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,010201 computation theory & mathematics ,Proof theory ,TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS ,Direct proof ,Zero-knowledge proof ,Structural proof theory ,0101 mathematics ,Probabilistically checkable proof ,Mathematics - Abstract
This is a survey of work on proof complexity and proof search from a logico-algorithmic viewpoint, as motivated by the P versus NP problem. We discuss propositional proof complexity, Cook’s program, proof automatizability, proof search, algorithms for satisfiability, and the state of the art of our (in)ability to separate P and NP .
- Published
- 2012
- Full Text
- View/download PDF
44. The Depth of Resolution Proofs
- Author
-
Alasdair Urquhart
- Subjects
Discrete mathematics ,Relation (database) ,Logic ,Proof complexity ,Resolution (logic) ,Characterization (mathematics) ,Mathematical proof ,Measure (mathematics) ,Longest path problem ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,History and Philosophy of Science ,TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS ,Probabilistically checkable proof ,Mathematics - Abstract
This paper investigates the depth of resolution proofs, that is to say, the length of the longest path in the proof from an input clause to the conclusion. An abstract characterization of the measure is given, as well as a discussion of its relation to other measures of space complexity for resolution proofs
- Published
- 2011
- Full Text
- View/download PDF
45. Guest column: testing linear properties
- Author
-
Madhu Sudan
- Subjects
Property testing ,Multidisciplinary ,Theoretical computer science ,Development (topology) ,Computer science ,Reed–Muller code ,Mathematical proof ,Column (database) ,Probabilistically checkable proof ,Theme (narrative) ,Focus (linguistics) - Abstract
The last two decades have seen enormous progress in the development of sublinear-time algorithms -- i.e., algorithms that examine/reveal properties of "data" in less time than it would take to read all of the data. A large, and important, subclass of such properties turn out to be "linear". In particular, these developments have contributed to the rich theory of probabilistically checkable proofs (PCPs) and locally testable codes (LTCs). In this survey, we focus on some of the general technical themes at work behind the many results in this area.
- Published
- 2011
- Full Text
- View/download PDF
46. Are PCPs Inherent in Efficient Arguments?
- Author
-
Salil Vadhan and Guy N. Rothblum
- Subjects
Discrete mathematics ,Soundness ,TheoryofComputation_COMPUTATIONBYABSTRACTDEVICES ,Reduction (recursion theory) ,Cryptographic primitive ,Theoretical computer science ,business.industry ,Computer science ,General Mathematics ,Hash function ,Cryptography ,Cryptographic protocol ,Mathematical proof ,Theoretical Computer Science ,Computational Mathematics ,Computational Theory and Mathematics ,Argument ,business ,Communication complexity ,Probabilistically checkable proof - Abstract
Starting with Kilian (STOC `92), several works have shown how to use probabilistically checkable proofs (PCPs) and cryptographic primitives such as collision-resistant hashing to construct very efficient argument systems (a.k.a. computationally sound proofs), for example with polylogarithmic communication complexity. Ishai et al. (CCC `07) raised the question of whether PCPs are inherent in efficient arguments, and to what extent. We give evidence that they are, by showing how to convert any argument system whose soundness is reducible to the security of some cryptographic primitive into a PCP system whose efficiency is related to that of the argument system and the reduction (under certain complexity assumptions).
- Published
- 2010
- Full Text
- View/download PDF
47. On constant-round zero-knowledge proofs of knowledge for NP-relations
- Author
-
Haixia Xu, Bao Li, Hongda Li, and Dengguo Feng
- Subjects
Discrete mathematics ,General Computer Science ,Factoring ,Proof complexity ,Open problem ,Calculus ,Proof of knowledge ,Zero-knowledge proof ,Mathematical proof ,Constant (mathematics) ,Probabilistically checkable proof ,Mathematics - Abstract
This paper considers the existence of constant-round zero-knowledge proofs of knowledge for NP under standard assumptions. By introducing a new interactive proof model, we construct a 3-round zero-knowledge proof of knowledge system for the NP-relation under the assumption that factoring is intractable. Our construction not only shows the existence of constant-round zero-knowledge proofs of knowledge, but also gives a positive answer to the open problem of the existence of 3-round zero-knowledge proofs for NP.
- Published
- 2010
- Full Text
- View/download PDF
48. Integrality Gaps of $2-o(1)$ for Vertex Cover SDPs in the Lovász–Schrijver Hierarchy
- Author
-
Konstantinos Georgiou, Avner Magen, Toniann Pitassi, and Iannis Tourlakis
- Subjects
Vertex (graph theory) ,Combinatorics ,Semidefinite programming ,Linear programming relaxation ,General Computer Science ,Linear programming ,General Mathematics ,Maximum cut ,Vertex cover ,Approximation algorithm ,Probabilistically checkable proof ,Mathematics - Abstract
Linear and semidefinite programming are highly successful approaches for obtaining good approximations for NP-hard optimization problems. For example, breakthrough approximation algorithms for Max Cut and Sparsest Cut use semidefinite programming. Perhaps the most prominent NP-hard problem whose exact approximation factor is still unresolved is Vertex Cover. Probabilistically checkable proof (PCP)-based techniques of Dinur and Safra [Ann. of Math./ (2), 162 (2005), pp. 439-486] show that it is not possible to achieve a factor better than 1.36; on the other hand no known algorithm does better than the factor of 2 achieved by the simple greedy algorithm. There is a widespread belief that semidefinite programming (SDP) techniques are the most promising methods available for improving upon this factor of 2. Following a line of study initiated by Arora et al. [Theory Comput., 2 (2006), pp. 19-51], our aim is to show that a large family of linear programming (LP)- and SDP-based algorithms fail to produce an approximation for Vertex Cover better than 2. Lovasz and Schrijver [SIAM J. Optim., 1 (1991), pp. 166-190] introduced the systems $LS$ and $LS_+$ for systematically tightening LP and SDP relaxations, respectively, over many rounds. These systems naturally capture large classes of LP and SDP relaxations; indeed, $LS_+$ captures the celebrated SDP-based algorithms for Max Cut and Sparsest Cut mentioned above. We rule out polynomial-time SDP-based $2-\Omega(1)$ approximations for Vertex Cover using $LS_+$. In particular, for every $\epsilon>0$ we prove an integrality gap of $2-\epsilon$ for Vertex Cover SDPs obtained by tightening the standard LP relaxation with $\Omega(\sqrt{\log n/\log\log n})$ rounds of $LS_+$. While tight integrality gaps were known for Vertex Cover in the weaker $LS$ system [G. Schoenebeck, L. Trevisan, and M. Tulsiani, Proceedings of the 39th Annual ACM Symposium on Theory of Computing, ACM Press, New York, 2007, pp. 302-310], previous results did not rule out a $2-\Omega(1)$ approximation after even two rounds of $LS_+$.
- Published
- 2010
- Full Text
- View/download PDF
49. Sub-Constant Error Probabilistically Checkable Proof of Almost-Linear Size
- Author
-
Ran Raz and Dana Moshkovitz
- Subjects
Discrete mathematics ,Degree (graph theory) ,General Mathematics ,String (computer science) ,Omega ,Satisfiability ,Theoretical Computer Science ,Combinatorics ,Computational Mathematics ,Alpha (programming language) ,Computational Theory and Mathematics ,Completeness (statistics) ,Constant (mathematics) ,Probabilistically checkable proof ,Mathematics - Abstract
We show a construction of a PCP with both sub-constant error and almost-linear size. Specifically, for some constant 0
- Published
- 2009
- Full Text
- View/download PDF
50. Sound 3-Query PCPPs Are Long
- Author
-
Prahladh Harsha, Arie Matsliah, Eli Ben-Sasson, Oded Lachish, and Quantum Computing and Advanced System Research
- Subjects
Discrete mathematics ,Soundness ,Theoretical computer science ,Property (programming) ,Connection (vector bundle) ,Function (mathematics) ,Mathematical proof ,Oracle ,Theoretical Computer Science ,Exponential function ,Computational Theory and Mathematics ,TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS ,Probabilistically checkable proof ,Mathematics - Abstract
We initiate the study of the trade-off between the length of a probabilistically checkable proof of proximity (PCPP) and the maximal soundness that can be guaranteed by a 3-query verifier with oracle access to the proof. Our main observation is that a verifier limited to querying a short proof cannot obtain the same soundness as that obtained by a verifier querying a long proof. Moreover, we quantify the soundness deficiency as a function of the proof-length and show that any verifier obtaining “best possible” soundness must query an exponentially long proof. In terms of techniques, we focus on the special class of inspective verifiers that read at most 2 proof-bits per invocation. For such verifiers, we prove exponential length-soundness trade-offs that are later on used to imply our main results for the case of general (i.e., not necessarily inspective) verifiers. To prove the exponential trade-off for inspective verifiers, we show a connection between PCPP proof length and property-testing query complexity that may be of independent interest. The connection is that any linear property that can be verified with proofs of length ℓ by linear inspective verifiers must be testable with query complexity ≈ logℓ.
- Published
- 2009
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.