Abstract
It is shown that there exists \(f : \{0,1\}^{n/2} \times \{0,1\}^{n/2} \rightarrow \{0,1\}\) in E\(^\mathbf {NP}\) such that for every \(2^{n/2} \times 2^{n/2}\) matrix M of rank \(\le \rho \) we have \(\mathbb {P}_{x,y}[f(x,y)\ne M_{x,y}] \ge 1/2-2^{-\varOmega (k)}\), whenever \(\log \rho \le \delta n/k(\log n + k)\) for a sufficiently small \(\delta > 0\), and n is large enough. This generalizes recent results which bound below the probability by \(1/2-\varOmega (1)\) or apply to constant-depth circuits.
Supported by NSF CCF award 1813930.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Alman, J., Chan, T.M., Williams, R.: Polynomial representations of threshold functions and algorithmic applications. In: IEEE Symposium on Foundations of Computer Science (FOCS) (2016)
Alman, J., Chen, L.: Efficient construction of rigid matrices using an NP oracle. In: IEEE Symposium on Foundations of Computer Science (FOCS), pp. 1034–1055 (2019)
Ben-Sasson, E., Viola, E.: Short PCPs with projection queries. In: Colloquium on Automata, Languages and Programming (ICALP) (2014)
Bhangale, A., Harsha, P., Paradise, O., Tal, A.: Rigid matrices from rectangular PCPs. In: IEEE Symposium on Foundations of Computer Science (FOCS) (2020)
Chan, T.M., Williams, R.: Deterministic APSP, orthogonal vectors, and more: quickly derandomizing razborov-smolensky. In: ACM-SIAM Symposium on Discrete Algorithms (SODA), pp. 1246–1255 (2016)
Chen, L.: Non-deterministic quasi-polynomial time is average-case hard for ACC circuits. In: IEEE Symposium on Foundations of Computer Science (FOCS) (2019)
Chen, L., Lyu, X.: Inverse-exponential correlation bounds and extremely rigid matrices from a new derandomized XOR lemma. In: ACM Symposium on the Theory of Computing (STOC) (2021)
Chen, L., Lyu, X., Williams, R.: Almost everywhere circuit lower bounds from non-trivial derandomization. In: IEEE Symposium on Foundations of Computer Science (FOCS) (2020)
Chen, L., Ren, H.: Strong average-case circuit lower bounds from non-trivial derandomization. In: ACM Symposium on the Theory of Computing (STOC) (2020)
Chen, L., Williams, R.R.: Stronger connections between circuit analysis and circuit lower bounds, via PCPs of proximity. In: IEEE Conference on Computational Complexity (CCC), pp. 19:1–19:43 (2019)
Chen, R., Oliveira, I.C., Santhanam, R.: An average-case lower bound against \(ACC^0\). In: LATIN. Lecture Notes in Computer Science, vol. 10807, pp. 317–330. Springer (2018)
Cook, S.A.: A hierarchy for nondeterministic time complexity. J. Comput. Syst. Sci. 7(4), 343–353 (1973)
Goldreich, O., Nisan, N., Wigderson, A.: On Yao’s XOR-Lemma. In: Goldreich, O. (ed.) Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation. LNCS, vol. 6650, pp. 273–301. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-22670-0_23
Murray, C., Williams, R.R.: Circuit lower bounds for nondeterministic quasi-polytime: an easy witness lemma for NP and NQP. In: STOC, pp. 890–901. ACM (2018)
Paradise, O.: Smooth and strong PCPss. In: ACM Innovations in Theoretical Computer Science conf. (ITCS), pp. 2:1–2:41 (2020)
Rajgopal, N., Santhanam, R., Srinivasan, S.: Deterministically counting satisfying assignments for constant-depth circuits with parity gates, with implications for lower bounds. In: Potapov, I., Spirakis, P.G., Worrell, J. (eds.) Symposium on Mathamatics Foundations of Computer Science (MFCS). LIPIcs, vol. 117, pp. 78:1–78:15. Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2018). https://doi.org/10.4230/LIPIcs.MFCS.2018.78
Razborov, A.: Lower bounds on the dimension of schemes of bounded depth in a complete basis containing the logical addition function. Math. Notes Acad. Sci. USSR 41(4), 598–607 (1987)
Seiferas, J.I., Fischer, M.J., Meyer, A.R.: Separating nondeterministic time complexity classes. J. ACM 25(1), 146–167 (1978)
Servedio, R.A., Viola, E.: On a special case of rigidity (2012). http://www.ccs.neu.edu/home/viola/
Smolensky, R.: Algebraic methods in the theory of lower bounds for Boolean circuit complexity. In: 19th ACM Symposium on the Theory of Computing (STOC), pp. 77–82. ACM (1987)
Smolensky, R.: On representations by low-degree polynomials. In: 34th IEEE Symposium on Foundations of Computer Science (FOCS), pp. 130–138 (1993)
Tamaki, S.: A satisfiability algorithm for depth two circuits with a sub-quadratic number of symmetric and threshold gates. Electron. Coll. Comput. Complexity (ECCC) 23, 100 (2016). http://eccc.hpi-web.de/report/2016/100
Valiant, L.G.: Graph-theoretic arguments in low-level complexity. In: Gruska, J. (ed.) MFCS 1977. LNCS, vol. 53, pp. 162–176. Springer, Heidelberg (1977). https://doi.org/10.1007/3-540-08353-7_135
Viola, E.: New lower bounds for probabilistic degree and AC0 with parity gates. Electron. Coll. Computat. Complexity (ECCC) 27, 15 (2020)
Vyas, N., Williams, R.: Lower bounds against sparse symmetric functions of ACC circuits: expanding the reach of #SAT algorithms. In: Symposium on Theoretical Aspects of Computer Science (STACS) (2020)
Williams, R.: Improving exhaustive search implies superpolynomial lower bounds. In: 42nd ACM Symposium on the Theory of Computing (STOC), pp. 231–240 (2010)
Williams, R.: Guest column: a casual tour around a circuit complexity bound. SIGACT News 42(3), 54–76 (2011)
Williams, R.: Natural proofs versus derandomization. In: ACM Symposium on the Theory of Computing (STOC) (2013)
Williams, R.: New algorithms and lower bounds for circuits with linear threshold gates. In: ACM Symposium on the Theory of Computing (STOC) (2014)
Williams, R.: Nonuniform ACC circuit lower bounds. J. ACM 61(1), 2:1–2:32 (2014). http://doi.acm.org/10.1145/2559903
Zák, S.: A turing machine time hierarchy. Theor. Comput. Sci. 26, 327–333 (1983)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendices
A Proof of Lemma 3
Proof
The first column of A is \(\langle i,u \rangle \), row-indexed by \(i \in \mathrm {\{0,1\}}^m\). The second column of A is all 1, while the third column of A is all b. The second row of B is \(\langle j,u \rangle \), column-indexed by \(j \in \mathrm {\{0,1\}}^m\), while every other entry in B is 1.
B Proof of Lemma 4
Proof
The algorithm on input \(\widetilde{\pi } = \sum _{i = 1}^m \alpha _i \cdot (-1)^{A^{(i)}B^{(i)}}\) runs as follows:
-
1.
Initialize the result \(\mathsf {res}\) to be 0.
-
2.
For each \(R_\mathsf {shared}\in \mathrm {\{0,1\}}^{r_\mathsf {shared}}\):
-
(a)
Compute the decision function \(D = D(1^n;R_{\mathsf {shared}})\) and randomness parity check \((C_1, \dots , C_p) = (C_1(1^n; R_{\mathsf {shared}}), \dots , C_p(1^n; R_{\mathsf {shared}}))\).
-
(b)
For each \(k \in [q]\), for each \(i \in [m]\),
-
i
Compute the \(2^{r_\mathsf {rect}} \times \rho \) matrices \(A^{(k,i)}\) whose \(R_\mathsf {row}\)-th row is the row of \(A^{(i)}\) indexed by \(i^{(k)}(1^n; R_\mathsf {row}, R_\mathsf {shared})\) for all \(R_\mathsf {row}\in \mathrm {\{0,1\}}^{r_\mathsf {rect}}\).
-
ii
Compute the \(\rho \times 2^{r_\mathsf {rect}}\) matrices \(B^{(k,i)}\) whose \(R_\mathsf {col}\)-th column is the column of \(B^{(i)}\) indexed by \(j^{(k)}(1^n; R_\mathsf {col}, R_\mathsf {shared})\) for all \(R_\mathsf {col}\in \mathrm {\{0,1\}}^{r_\mathsf {rect}}\).
-
i
-
(c)
For each \(j \in [p]\),
-
i
Compute the \(2^{r_\mathsf {rect}} \times 3\) matrix \(A^{(q+j,1)}\) and the \(3 \times 2^{r_\mathsf {rect}}\) matrix \(B^{(q+j, 1)}\) with \(\left( (-1)^{A^{(q+j,1)}B^{(q+j,1)}}\right) _{R_\mathsf {row},R_\mathsf {col}} = C_j(R_\mathsf {row}, R_\mathsf {col})\) given by Lemma 3.
-
i
-
(d)
Now we define q m-sums of rank-\(\rho \) matrices, \(\widetilde{Q}_{k} = C \sum _{i = 1}^m b_i \cdot (-1)^{A^{(k,i)}B^{(k,i)}}\) for each \(k \in [q]\), and p 1-sums of rank-3 matrices, \(\widetilde{Q}_{q+j} = (-1)^{A^{(q+j,1)} B^{(q+j, 1)}}\) for each \(j \in [p]\). Apply Theorem 2 to calculate the following value and add it to \(\mathsf {res}\):
$$ \mathrm {\mathbb {E}}_{R_\mathsf {row}, R_\mathsf {col}}\left[ \left( \overline{D}(\widetilde{Q}_1, \dots , \widetilde{Q}_q, \widetilde{Q}_{q+1}, \dots , \widetilde{Q}_{q+p})\right) _{R_\mathsf {row}, R_\mathsf {col}}\right] . $$
-
(a)
-
3.
Return \(\mathsf {res}\) as the value of \(\mathrm {\mathbb {E}}_R\left[ \widetilde{V}^{\widetilde{\pi }}(1^n;R)\right] \).
Correctness of the algorithm follows from Definition 6.
Step 2(b) runs in time \(O(2^{r_\mathsf {rect}} \cdot (t + m\rho ))\), while Step 2(c) runs in \(O(r 2^{r_\mathsf {rect}})\) by Lemma 3, which is dominated by the runtime of Step 2(b) since \(t \ge r\). By Theorem 2, Step 2(d) takes time \(O\big (2^{q+p}\cdot m^{q+p}\cdot (T(2^{r_\mathsf {rect}}, (q+p)\rho ) + \mathrm {{poly}}(n, q+p, r))\big ) = O\left( 2^{q+p}\cdot m^{q+p}\cdot T(2^{r_\mathsf {rect}}, (q+p)\rho )\right) \mathrm {{poly}}(n)\), if \((q+p)\rho = \left( 2^{r_\mathsf {rect}}\right) ^{o(1)}\), i.e. \(\log ((q+p)\rho ) = o(r)\). Therefore the running time of the above algorithm is
C Proof of Lemma 7
Proof
Fix an arbitrary \(R_\mathsf {shared}\in \mathrm {\{0,1\}}^{r_\mathsf {shared}}\). By definition \(\mathrm {\mathbb {E}}_{R_\mathsf {row}, R_\mathsf {col}} \left[ \left| V^\pi (1^n;R) - \widetilde{V}^{\widetilde{\pi }}(1^n;R)\right| \right] \) is
where \(D = D(1^n; R_\mathsf {shared})\), \((C_1, \dots , C_p) = (C_1(1^n; R_\mathsf {shared}), \dots , C_p(1^n; R_\mathsf {shared}))\), \(i^{(k)} = i^{(k)}(1^n; R_\mathsf {row}, R_\mathsf {shared})\) and \(j^{(k)} = j^{(k)}(1^n; R_\mathsf {row}, R_\mathsf {shared})\) for all \(k \in [q]\).
We write D in its Fourier expansion \(D(z_1, \dots , z_{q+p}) = \sum _{S \subseteq [q+p]} \beta _S \prod _{k \in S} z_k\), where for each \(S \subseteq [q+p]\), \(\beta _S = \mathrm {\mathbb {E}}_{z \in \mathrm {\{-1,1\}}^{q+p}} \left[ D(z) \prod _{k \in S} z_k\right] \). For all \(z\in \mathrm {\{-1,1\}}^{q+p}\), \(D(z) \in \mathrm {\{0,1\}}\) and \(\prod _{k \in S} z_k \in \mathrm {\{-1,1\}}\), thus \(\left| \beta _S\right| \le 1\) for any S. Hence by the triangular inequality we can bound (2) by
as all the \(C_k\)’s are \(\mathrm {\{-1,1\}}\)-valued.
Fix any \(S \subseteq [q]\). Wlog let \(S = \{1, \dots , d\}\) for some \(d \le q\), then the expectation in (3) can be written as
where the first inequality comes from the triangular inequality, the second inequality follows from the Cauchy-Schwarz inequality, and the last inequality follows from the assumptions that \(\pi \in \mathrm {\{-1,1\}}^{\ell \times \ell }\) and \(\widetilde{\pi }\) is bounded for V.
Summing over S, we can bound (3) by
where the first step uses double counting, and the last step follows from Jensen’s inequality.
Therefore by averaging over \(R_\mathsf {shared}\), we have
where the first step uses triangular inequality, the second step uses the above bound for every \(R_\mathsf {shared}\), the third step comes from Jensen’s inequality, and the fourth step follows from the smoothness of V.
D Proof of Lemma 8
Proof
We prove it by induction on k. For \(k=1\) it is trivial as h is bounded. Now we assume that the hypothesis holds for \(k-1\), and we are proving for k.
For all \(x_1 \in \mathrm {\{0,1\}}^n\), define \(g(x_1) = \mathrm {\mathbb {E}}_{y \sim \mathrm {\{0,1\}}^{n(k-1)}}\left[ f^{\oplus k-1}(y)h(x_1, y)\right] \), where we use y for \((x_2, \dots , x_k)\) for convenience. If there exists \(x_1 \in \mathrm {\{0,1\}}^n\) such that \(|g(x_1)| \ge \mathrm {\varepsilon }_{k-1}\), then we know that \(f^{\oplus k-1}\) \(\mathrm {\varepsilon }_{k-1}\)-correlates with \(h'\) defined by \(h'(y) = h(x_1,y)\), so we can use the induction hypothesis for \(k-1\) to get a bounded m-sum of functions obtained by fixing inputs of \(h'\), thus by fixing inputs of h.
Otherwise, for all \(x_1 \in \mathrm {\{0,1\}}^n\) we have \(\left| g(x_1)\right| \le \mathrm {\varepsilon }_{k-1} = \frac{2\mathrm {\varepsilon }_k}{1+ \mathrm {\varepsilon }}\). We take m i.i.d. samples \(y_1, \dots , y_m\) uniformly from \(\mathrm {\{0,1\}}^{n(k-1)}\) for \(m = O\left( \frac{n}{(\mathrm {\varepsilon }_k)^2}\right) \), then define \(\widetilde{g}(x_1) = \mathrm {\mathbb {E}}_{i \in [m]} \left[ f^{\oplus k-1}(y_i)h(x_1, y_i)\right] \). By Chernoff bound,
By union bound, there exists a fix assignment to \(y_1, \dots , y_m\) such that for all \(x_1 \in \mathrm {\{0,1\}}^n\),
thus \(\left| \widetilde{g}(x_1)\right| \le \left| g(x_1)\right| + \left| g(x_1) - \widetilde{g}(x_1)\right| \le \left( \frac{2}{1+\mathrm {\varepsilon }} + \frac{1-\mathrm {\varepsilon }}{(1+\mathrm {\varepsilon })^2}\right) \mathrm {\varepsilon }_k = \frac{3 + \mathrm {\varepsilon }}{(1 + \mathrm {\varepsilon })^2} \mathrm {\varepsilon }_k\).
Let \(r = \frac{3 + \mathrm {\varepsilon }}{(1 + \mathrm {\varepsilon })^2} \mathrm {\varepsilon }_k\). We define \(\widetilde{h}\) by
Now \(|\widetilde{h}(x_1)| \le 1\) for all \(x_1\). We can write \(\widetilde{h}\) as \(C \sum _{i = 1}^m b_i h_i\), where
which is a bounded \(O(n/\mathrm {\varepsilon }_k^2)\)-sum of functions that can be obtained by fixing inputs of h. The bit-complexity of m is \(O(k + \log n)\), and O(k) for r, thus the bit-complexity of \(\widetilde{h}\) is \(O(k + \log n)\).
What remains is to prove that \(\mathsf {corr}(f, \widetilde{h}) \ge \mathrm {\varepsilon }\). By the definition of g and assumption we have \(\mathsf {corr}(f,g) = \mathsf {corr}(f^{\oplus k}, h) \ge \mathrm {\varepsilon }_k\). Therefore by the definition of \(\widetilde{h}\), the fact that \(f(x_1) \in \mathrm {\{-1,1\}}\) for all \(x_1\), and (4), we have
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Huang, X., Viola, E. (2021). Average-Case Rigidity Lower Bounds. In: Santhanam, R., Musatov, D. (eds) Computer Science – Theory and Applications. CSR 2021. Lecture Notes in Computer Science(), vol 12730. Springer, Cham. https://doi.org/10.1007/978-3-030-79416-3_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-79416-3_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-79415-6
Online ISBN: 978-3-030-79416-3
eBook Packages: Computer ScienceComputer Science (R0)