Range Avoidance for Constant Depth Circuits: Hardness and Algorithms

Authors Karthik Gajulapalli, Alexander Golovnev, Satyajeet Nagargoje, Sidhant Saraogi



PDF
Thumbnail PDF

File

LIPIcs.APPROX-RANDOM.2023.65.pdf
  • Filesize: 0.8 MB
  • 18 pages

Document Identifiers

Author Details

Karthik Gajulapalli
  • Georgetown University, Washington, DC, USA
Alexander Golovnev
  • Georgetown University, Washington, DC, USA
Satyajeet Nagargoje
  • Georgetown University, Washington, DC, USA
Sidhant Saraogi
  • Georgetown University, Washington, DC, USA

Acknowledgements

We would like to thank Justin Thaler, Sam King, and anonymous reviewers for their helpful comments on our paper.

Cite AsGet BibTex

Karthik Gajulapalli, Alexander Golovnev, Satyajeet Nagargoje, and Sidhant Saraogi. Range Avoidance for Constant Depth Circuits: Hardness and Algorithms. In Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (APPROX/RANDOM 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 275, pp. 65:1-65:18, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)
https://doi.org/10.4230/LIPIcs.APPROX/RANDOM.2023.65

Abstract

Range Avoidance (Avoid) is a total search problem where, given a Boolean circuit 𝖢: {0,1}ⁿ → {0,1}^m, m > n, the task is to find a y ∈ {0,1}^m outside the range of 𝖢. For an integer k ≥ 2, NC⁰_k-Avoid is a special case of Avoid where each output bit of 𝖢 depends on at most k input bits. While there is a very natural randomized algorithm for Avoid, a deterministic algorithm for the problem would have many interesting consequences. Ren, Santhanam, and Wang (FOCS 2022) and Guruswami, Lyu, and Wang (RANDOM 2022) proved that explicit constructions of functions of high formula complexity, rigid matrices, and optimal linear codes, reduce to NC⁰₄-Avoid, thus establishing conditional hardness of the NC⁰₄-Avoid problem. On the other hand, NC⁰₂-Avoid admits polynomial-time algorithms, leaving the question about the complexity of NC⁰₃-Avoid open. We give the first reduction of an explicit construction question to NC⁰₃-Avoid. Specifically, we prove that a polynomial-time algorithm (with an NP oracle) for NC⁰₃-Avoid for the case of m = n+n^{2/3} would imply an explicit construction of a rigid matrix, and, thus, a super-linear lower bound on the size of log-depth circuits. We also give deterministic polynomial-time algorithms for all NC⁰_k-Avoid problems for m ≥ n^{k-1}/log(n). Prior work required an NP oracle, and required larger stretch, m ≥ n^{k-1}.

Subject Classification

ACM Subject Classification
  • Theory of computation → Circuit complexity
Keywords
  • Boolean function analysis
  • Explicit Constructions
  • Low-depth Circuits
  • Range Avoidance
  • Matrix Rigidity
  • Circuit Lower Bounds

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads

References

  1. Josh Alman and Lijie Chen. Efficient construction of rigid matrices using an NP oracle. In FOCS, 2019. Google Scholar
  2. Benny Applebaum, Yuval Ishai, and Eyal Kushilevitz. Cryptography in NC⁰. SIAM Journal on Computing, 36(4):845-888, 2006. Google Scholar
  3. Sanjeev Arora and Boaz Barak. Computational complexity: a modern approach. Cambridge University Press, 2009. Google Scholar
  4. Amey Bhangale, Prahladh Harsha, Orr Paradise, and Avishay Tal. Rigid matrices from rectangular PCPs. In FOCS, 2020. Google Scholar
  5. Aleksandr V. Chashkin. On the complexity of Boolean matrices, graphs and their corresponding Boolean functions. Discrete Mathematics and Applications, 4(3):229-257, 1994. Google Scholar
  6. Yeyuan Chen, Yizhi Huang, Jiatu Li, and Hanlin Ren. Range avoidance, remote point, and hard partial truth table via satisfying-pairs algorithms. In STOC, 2023. Google Scholar
  7. Joel Friedman. A note on matrix rigidity. Combinatorica, 13(2):235-239, 1993. Google Scholar
  8. Oded Goldreich and Avishay Tal. Matrix rigidity of random Toeplitz matrices. In STOC, 2016. Google Scholar
  9. Venkatesan Guruswami, Xin Lyu, and Xiuhan Wang. Range avoidance for low-depth circuits and connections to pseudorandomness. In RANDOM, 2022. Google Scholar
  10. Rahul Ilango, Jiatu Li, and Ryan Williams. Indistinguishability obfuscation, range avoidance, and bounded arithmetic. In STOC, 2023. Google Scholar
  11. Russell Impagliazzo and Ramamohan Paturi. The complexity of k-SAT. In CCC, 1999. Google Scholar
  12. Russell Impagliazzo, Ramamohan Paturi, and Francis Zane. Which problems have strongly exponential complexity? In FOCS, 1998. Google Scholar
  13. Yuval Ishai and Eyal Kushilevitz. Randomizing polynomials: A new representation with applications to round-efficient secure computation. In FOCS, 2000. Google Scholar
  14. Yuval Ishai and Eyal Kushilevitz. Perfect constant-round secure computation via perfect randomizing polynomials. In ICALP, 2002. Google Scholar
  15. Robert Kleinberg, Oliver Korten, Daniel Mitropolsky, and Christos Papadimitriou. Total functions in the polynomial hierarchy. In ITCS, 2021. Google Scholar
  16. Oliver Korten. The hardest explicit construction. In FOCS, 2021. Google Scholar
  17. Jiatu Li and Tianqi Yang. 3.1n-o(n) circuit lower bounds for explicit functions. In STOC, 2022. Google Scholar
  18. Pavel Pudlák and Vojtech Rödl. Some combinatorial-algebraic problems from complexity theory. Discrete Mathematics, 1(136):253-279, 1994. Google Scholar
  19. Hanlin Ren, Rahul Santhanam, and Zhikun Wang. On the range avoidance problem for circuits. In FOCS, 2022. Google Scholar
  20. Claude E. Shannon. The synthesis of two-terminal switching circuits. The Bell System Technical Journal, 28:59-98, 1949. Google Scholar
  21. Mohammad A. Shokrollahi, Daniel A. Spielman, and Volker Stemann. A remark on matrix rigidity. Information Processing Letters, 64(6):283-285, 1997. Google Scholar
  22. Leslie G. Valiant. Graph-theoretic arguments in low-level complexity. In MFCS, 1977. Google Scholar
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail