Polynomial Size, Short-Circuit Resilient Circuits for NC
Abstract
We show how to convert any circuit of poly-logarithmic depth and polynomial size into a functionally equivalent circuit of polynomial size (and polynomial depth) that is resilient to adversarial short-circuit errors. Specifically, the resulting circuit computes the same function even if up to gates on every root-to-leaf path are short-circuited, i.e., their output is replaced with the value of one of its inputs, where is the depth of the circuit and is a fixed constant.
Previously, such a result was known for formulas (Kalai-Lewko-Rao, FOCS 2012). It was also known how to convert general circuits to error resilient ones whose size is quasi-polynomial in the size of the original circuit (Efremenko et al. STOC 2022). The reason both these works do not extend to our setting is that there may be many paths from the root to a given gate, and the resilient circuits needs to “remember” a lot of information about these paths, which causes it to be large. Our main idea is to reduce the amount of this information at the cost of increasing the depth of the resilient circuit.
Keywords and phrases:
Error-resilient computation, short-circuit errorsFunding:
Raghuvansh R. Saxena: Supported by the Department of Atomic Energy, Government of India, under project no. RTI4001.Copyright and License:
![[Uncaptioned image]](x1.png)
2012 ACM Subject Classification:
Theory of computation Communication complexity ; Theory of computation Circuit complexityEditors:
Raghu MekaSeries and Publisher:

1 Introduction
Constructing error-resilient circuits is one of the most fundamental problems in theoretical computer science, dating back to von Neumann [30]. In the study of error resilient circuits, the goal is to convert any circuit into a circuit that computes the same function as even if some of the gates of are faulty. Moreover, the goal is to do so with a small overhead in size, i.e., constructing a circuit whose size is bounded by a polynomial in the size of .
In this paper, we show how to convert any polynomial size circuit of poly-logarithmic depth into a polynomial size circuit that is functionally equivalent and is resilient to short-circuit errors, an error model that was introduced by Kleitman, Leighton, and Ma [20], and was soon adopted as a central model in the study of error-resilient circuits [18, 4, 7]. In this error model, the adversary can replace any gate in the circuit with an arbitrary gate as long as and (and in particular can replace an AND gate with an OR gate, and vice versa)111Note that the restriction that for all is necessary since otherwise an adversary can simply flip the result of the output gate, and thus no circuit can be resilient to even a single error. . Equivalently, we can say that the value of the gate is replaced by the value of one of its children (the wire to the other child is “cut out”). This model is motivated by applications; indeed, as noted in [20], “stuck-at” and “power-ground” failures resulting from short-circuits or broken connections are more common than other types of errors.
Similar to the works of [18, 4, 7], we consider omniscient adversaries that have full information about the entire circuit, and can corrupt of the gates on every root-to-leaf path, where is the depth of the circuit and is some fixed constant. These prior works were either restricted to formulas, i.e., logarithmic depth circuits [18, 4], or incurred a quasi-polynomial blowup to the circuit size [7]. Moreover, it was conjectured in [7] that, unlike the case of formulas [18, 4], a quasi-polynomial blowup in the circuit size is necessary when converting general circuits into noise resilient ones.
1.1 Our Results
We show that how to convert any circuit of polynomial size and poly-logarithmic depth (i.e., any circuit) into a functionally equivalent circuit of polynomial size (and polynomial depth) that is error resilient.
Theorem 1 (Informal, see formal version in Theorem 8).
Let be a Boolean circuit in the class that222Thus, if takes variables as input, the number of gates in is bounded by a polynomial in and the depth of is bounded by a polynomial in . The other constants in the theorem statement depend on the degree of these polynomials; see the formal version of the theorem (Theorem 8) for the precise dependence. computes a function . There exists a Boolean circuit whose size and depth are polynomial in the size of that computes even when a constant fraction of gates in any input to output path in are short-circuited.
In terms of comparison, Theorem 1 improves on the main result of [18] in the sense that it works for all circuits with polynomial size and poly-logarithmic depth while [18] only works for formulas. It also improves upon [7] in the sense that it gets a polynomial blowup in the size instead of the quasi-polynomial blowup obtained in [7]. However, it does not subsume either of these results. For example, [18] also preserve the depth of the original formula up to constant factors but we do not provide such a guarantee, and [7] works for general circuits, including those not in the class .
We also mention that [7] believed that the quasi-polynomial blowup they obtain is inherent and conjectured that a polynomial blowup will not suffice like it does in the case of formulas [18, 4]. Theorem 1 disproves this conjecture for the restricted case of circuits in . Proving/disproving the conjecture for general circuits is an amazing problem that we leave open. However, proving this conjecture, even in an existential manner, would imply , and thus may be extremely hard. Indeed, if , then a general polynomial size circuit has a functionally equivalent circuit in and we can use Theorem 1 to make it error resilient with only a polynomial blowup.
Error-resilient dag-protocols
Computation and communication have a deep connection. Just like prior work [18, 4, 7], the current work also exploits this connection via the Karchmer-Wigderson transformation. Specifically, Karchmer and Wigderson [19] show that any circuit computing a function can be converted into a communication protocol for a related search problem such that the depth of the circuit matches the length of the communication protocol, and vice versa. An analogous transformation can be shown in the reverse direction, i.e. a transformation that takes error-resilient communication protocols to error resilient circuits, and was used in [18, 4] to build error resilient formulas.
The Karchmer-Wigderson transformation does not preserve the size of the circuit and in fact, blows it up to be exponential in the depth. To circumvent this blowup in size, [25, 29] showed how to convert any circuit into a “dag-protocol” that preserves both its size and depth. dag-protocols are a generalization of communication protocols, and can be represented by the following pebble game: There is a rooted directed acyclic graph, and each non-sink node in the graph belongs to one of the two parties, while each sink node is associated with an output. The game starts with a “pebble” at the root of graph, that is moved along the edges of the graph. At every step, if the pebble is not already at a sink node, the party who owns that node will move the pebble along one of its out-edges. This will end when the pebble reaches a sink node, and the output will be the output of the sink node.
[25, 29] showed that every circuit computing a function can be converted to a dag-protocol with the same size and depth that solves with a strong correctness guarantee called rectangular correctness (see Definition 5 for a precise definition). The reverse direction also holds, and in fact even holds in the error-resilient setting. This direction was used to get error-resilient circuits from error-resilient dag-protocols in [7]. We adopt a similar approach and use the [25, 29] transformation to go from circuits to dag-protocols and back. Indeed, our main technical result is the following theorem about error-resilient dag-protocols.
Theorem 2 (Informal, see formal version in Theorem 9).
Let be a search problem and be a dag-protocol that solves with rectangular correctness. Assume that the depth of is poly-logarithmic in the size. There exists a dag-protocol with a polynomially larger size that solves with rectangular correctness even if a constant fraction of nodes on any root to leaf path in the protocol are adversarially corrupted.
1.2 Related Work
The works most closely related to ours are the works [18, 4, 7] cited above. We discuss additional related work below.
Other noise models for circuits
Even though the short-circuit error model we consider is the most studied one, other models have also been considered. For example, von Neumann [30] initiated the study of the stochastic noise model, where the noise flips the value of each gate in the circuit independently with some small fixed probability. Von Neumann’s model was studied by a long sequence of works, including [6, 22, 23, 11, 8, 9, 17, 13, 12, 10]. In this model, it is known that a circuit of size can converted to a noise resilient circuit of size , and that a function with sensitivity requires a resilient circuits of size [30, 6, 22, 13, 12].
In this paper, we study the short-circuit error model of [20] but there is also a different adversarial model studied by [14], where the adversary may corrupt the output of a small constant fraction of the gates at each layer of the circuit in an arbitrary way. They show how to construct error resilient circuits for symmetric functions in this model, by exploiting interesting connections between their model and probabilistically checkable proofs. However, the obtained circuit is only guaranteed to compute, what they call, a “loose version” of the function, and may err on many inputs. Lastly, we mention the orthogonal direction of constructing testable circuits which are circuits on which errors can detected (but not necessarily corrected) efficiently [2, 1].
Codes for interactive communication
As our work develops error-resilient circuits via error-resilient dag-protocols, it is also connected with the vast literature on codes for interactive communication, or simply “interactive codes”, that are used to make communication protocols resilient to noise. This field, initiated by the seminal works [26, 27, 28] has received a lot of attention over the last three decades, and various aspects of interactive codes have been extensively studied. A work loosely related to circuits is [5] but see [16] for an excellent survey. We note that all constructions of error resilient dag-protocols are heavily inspired by an underlying interactive coding scheme (recall that dag-protocols are a generalization of communication protocols).
dag-protocols
Razborov [25] introduced a model of PLS communication protocols, and used it generalize the Karchmer-Wigderson transformation [19] in a way that preserves both the size and the depth of the circuit. This connection was used by Krajícek [21], who introduced the technique of monotone feasible interpolation, which became a popular method for proving lower bounds on the refutation size in propositional proof systems such as Resolution, and Cutting Planes [3], by reducing to monotone circuit lower bounds. The notion of PLS communication protocols was simplified by Pudlak [24] and Sokolov [29] to the notion of dag-like communication protocols, which we call dag-protocols. Subsequently, a “converse” to monotone feasible interpolation was established in [15] to prove new lower bounds on monotone circuits by lifting lower bounds on Resolution refutations. To the best of our knowledge, our work is the only work, other than [7], to use the notion of dag-protocols in a “positive” manner, namely to construct error-resilient circuits, in contrast to prior work which mainly used this notion to prove lower bounds in proof complexity and circuit complexity.
1.3 Additional Discussion
An obvious problem left open by our work is whether general circuits can be made error resilient with only a polynomial overhead. As mentioned above, the only work in this regard is [7], that showed that general circuits can be made error-resilient by incurring a quasi-polynomial overhead. Specifically, if the original circuit has size and depth , they construct a resilient version of this circuit that has size and depth . [7] further say that the power of seems inherent.
The current work manages to get around the in the exponent, at the cost of increasing depth to be a polynomial (note that in our setting). It is interesting to see if our techniques can be combined with [7] to shave off a small factor off of this exponent for general circuits, at the expense of a larger depth. We leave this investigation to future work. Another great question for future research is whether the polynomial blowup in depth that we suffer is inherent, or is there a way to make circuits in error resilient while preserving their depth up to a constant factor.
Another interesting direction for future work is whether the resilient circuit can be computed efficiently, say in time polynomial in the size of the circuit. The initial work of [18] guaranteed efficiency when the initial circuit is a formula although the later work [7] was not able to generalize it to circuits333Note that the error-resilient circuit of [7] is of quasi-polynomial size, and thus polynomial in this size of this circuit means that it is quasi-polynomial in the size of the original circuit.. The current work for circuits in also leaves this direction open. Finally, even though we get resilience to some constant fraction of adversarial errors, we make no efforts to optimize this constant. Finding the right constant is a great question for future work (see [4]).
2 Technical Overview
We now overview the ideas behind Theorem 1 and contrast it with prior work [18, 4, 7]. Roughly speaking, Theorem 1 says that there exist polynomial sized resilient circuits for every circuit in . We let and be the size and the depth of , respectively, and use to denote the Boolean function computed by . We will also assume without loss of generality that the circuit is layered and alternating. Just like prior work, our construction is in three-steps via dag-protocols 444Readers not familiar with dag-protocols may find it useful to first go over Section 2.1 of [7].:
-
1.
Circuits dag-protocols. This step is the same as prior work, and uses the Karchmer-Wigderson transformation [19] to transform the circuit that computes to a dag-protocol that solves the Karchmer-Wigderson game associated with with rectangular correctness. This transformation satisfies the property that short-circuit errors in the original circuit correspond to running the protocol over a channel with corruption noise and perfect feedback. We will call such channels feedback channels for simplicity and use this property in the Step below.
-
2.
dag-protocols error-resilient dag-protocols. This is the main step in the proof where the input is a dag-protocol and the goal is to output a functionally equivalent dag-protocol that works on feedback channels. This is the main contribution of this work and is detailed below.
-
3.
Error-resilient dag-protocols error-resilient circuits. Having constructed a protocol that solves with rectangular correctness even on feedback channels, we use the “inverse” Karchmer-Wigderson transformation to transform it to a Boolean circuit computing that is resilient to short-circuit errors. This step in our proof can also be found in prior work.
The main contribution of this work is Step above, which transforms dag-protocols to error-resilient dag-protocols. Analogous transformations in prior work were usually done using interactive coding schemes, an area of research initiated by the seminal works [26, 27, 28] that is dedicated to making communication protocols resilient to errors. At an extremely high level, this is done by designing mechanisms to detect errors fast and then using rewind mechanisms to rewind to a point in the communication history that was before these errors occurred.
However, to rewind to a point in the communication history before the errors occurred, the resilient protocol needs to remember the state at that point. After the Karchmer-Wigderson transformation, this extra memory shows up as a blowup in the size of the resilient circuit, which we want to minimize. To be more specific, prior work on resilient circuits [7], remembers different states at every point in the resilient protocol which means that each layer in the resilient circuit is quasi-polynomially larger (i.e., has size ) than each layer in the original circuit. Thus, even though [7] increase the number of layers by only a constant factor, the blowup in the size of each layer makes the overall blowup quasi-polynomial.
Our approach is to greatly reduce the size of every layer, at the expense of the increasing the total number of layers. This means that we cannot even afford to remember many states at any point. As any interactive coding scheme we are aware of remembers at least logarithmically many states, they would not suit us, and new ideas are needed.
2.1 Our Approach For
We start by considering a restricted case where the original circuit lies in . Even though circuits in can be transformed into formulas with only a polynomial blowup, we will stick with the circuit view as it will allow us to generalize later on. Note that prior work already gives a resilient circuit for this case that has size polynomial in and has depth . We construct a different resilient circuit that has the same size guarantee but relaxes the depth guarantee555The depth is at most the size, so it must still be polynomial in .. This alternate construction allows us to extend to all of .
Our approach
We devise a way to make dag-protocols corresponding to circuits resilient while remembering only a constant number (in fact, ) states at each point, at the cost of blowing up the number of layers exponentially. As the depth of circuits is logarithmic in , this exponential blowup is still polynomial in . Moreover, as we only remember a constant number of states at each point, the blowup in the size of each layer is also polynomial, and combining this with the blowup in the number of layers still gives a polynomial blowup.
Note that any protocol must at least remember the current state, and thus a protocol that remembers only states actually remembers only extra state! Interestingly, for our protocol, this extra state is not a state in the past but actually the next state in the future that the protocol is considering going to. Specifically, if the protocol is currently in state in layer (for some ), and wants to advance to a state in layer , then instead of jumping to that state directly, it is remembered as a “candidate” state until the protocol has enough “confidence” in the candidate to advance. This confidence is implemented via a variable that is incremented every time the parties want to advance and decremented every time they suspect that the states in memory are incorrect. Only after the confidence hits a certain threshold does the protocol actually advance to the state in layer .
We will view the thresholds as being cumulative, i.e., is the total confidence required to go from layer to layer . This means that is the additional confidence needed to advance from layer to layer . With this said, the obvious question is how large does need to be? In other words, how much confidence should the protocol have in the candidate before they advance to a state in layer ? To answer this question, one needs to consider the total “loss” of the protocol in case it advances wrongly and reaches an incorrect state. As no state in the past is remembered, the only way the protocol can recover from this incorrect state is if it starts all over again and reaches the state in layer , which requires a total increase in confidence of . Thus, the increase (which equals ) of the confidence required to jump from layer to layer should be the same order of magnitude as the confidence needed to reach layer from the beginning of the protocol. Solving, we get that should be (at least) exponential in . This is the choice that we make, setting for some suitable constant .
Protocol details
We now provide more details of our protocol and argue its correctness. The protocol starts at the initial (root) node in layer with confidence . At any given time, the protocol is in some layer, say layer with some confidence , and trying to continue the simulation from some state in this layer. For this, the protocol first checks666As in prior work, assuming that the original dag-protocol is rectangular correct is crucial for the protocol to be able to check whether or not there are errors. As this is not a novel idea for the current work, we omit a precise description in this sketch. (Very) roughly speaking (see formal definition in Definition 5), a state is said to be rectangular correct for inputs and for Alice and Bob respectively, if there exists inputs for Alice and for Bob such that the protocol reaches that state when executed with inputs and and also reaches it with inputs and . This means that the parties can go over all possible inputs of the other party in order to check if the state is (rectangular) correct or not. if the current state has any errors. If so, the protocol decreases the confidence by . This may cause to hit , which is taken as a signal to forget all progress and restart the simulation. If no errors are found, then the current state is assumed to be correct and the action to be taken is determined by the value of the confidence .
If we have , then it must be the case that the confidence was decreased after reaching layer . The protocol simply increases it by trying to get it back to so that further progress can be made. If the confidence , the confidence in layer is high enough for the protocol to compute a candidate in layer . A candidate for the state to advance to is computed and the confidence is further increased by .
Finally, if the confidence , then the protocol must already have a candidate that it is considering going to. The protocol then checks if this candidate was caused due to errors, and if so, decreases the confidence by . If the confidence is lowered all the way back to , the protocol “forgets” about the candidate (and will compute a new one in the future if needed). On the other hand, if the candidate was not due to errors, the protocol increases the confidence by . If this increased confidence reaches , it is high enough to advance. The protocol forgets about the current state in layer and continue the rest of the simulation from the state in layer .
Arguing correctness
We now show that the above protocol indeed simulates the original protocol correctly. For this, we first show that if the protocol has high confidence at the end of the protocol, specifically, if , where is the total number of layers (depth) of the original protocol, then the output of the protocol must be correct. Indeed, if the confidence is that high, the protocol is in a state in layer or higher777We append the original protocol with dummy states to get states beyond layer ., and the only reason this state would not be correct is if the protocol advanced to it incorrectly. However, this means that there must have been at least errors while this state was the next candidate. As the confidence thresholds are exponential, we have that the total number of errors is at least , which is more than a constant fraction and therefore, unaffordable.
Now, all we need to show is that the confidence is indeed high at the end of the protocol. For this, we fix any execution of the protocol and partition the rounds into rounds where the protocol wants to “go back” and decrease the confidence (this happens when either the current state or the next state has any errors) and rounds where it does not. We collect the former type of rounds in the set . By definition, the confidence will increase in any round not in unless there are errors, and will decrease in any round in unless there are errors. As the total number of errors is only a small constant fraction, this means that all we need to do to show that the confidence is high at the end of the protocol is to show that the size of is small.
To show this, we argue that the size of is at most a constant factor more than the number of rounds in where the protocol did not go back. To see why, note that the first round in must be a round where the protocol added an incorrect next state as their candidate . As mentioned above, if the next state is in layer , this only happens when the confidence is exactly .
As long as the protocol does not advance to this next state (in other words, it remains a candidate), the confidence must stay above , as otherwise the protocol will forget the incorrect candidate and look for a new one. This means that the total number of rounds where the protocol does not go back and increase the confidence exceeds the total number of rounds where the protocol did go back, and we are done. On the other hand, if the protocol does advance to the candidate, there must have been at least errors, and by definition of , these are high enough (up to constant factors) for rounds of progress. Thus, the protocol can wait until the confidence hits and restart the simulation from there.
2.2 From to
We now show how we can extend the ideas above to get a simulation for all of . Note that the Karchmer-Wigderson transformation transforms general circuits to dag-protocols of poly-logarithmic depth. As our arguments above increase the depth exponentially, using them on general circuits would make the depth super-polynomial.
To reduce the depth, we extend our protocol above to also remember some states in the past. Specifically, if the current state is layer , the protocol also remembers the state it encountered in the most recent layer that was a multiple of , for all . As the total number of layers we have is poly-logarithmic, we get that when is larger than some fixed constant, the most recent layer that is a multiple of is just layer . This means that the parties only remember a constant number of distinct states, implying as above that the blowup in the size of each layer is still polynomial.
We now argue why remembering these extra states (“meeting points”) in the past will also reduce the total number of layers back to polynomial. The reason is that if the protocol remembers meeting point in the near future, then, when the confidence is too low, the protocol does not have to forget all progress and restart the simulation from scratch. Instead, the protocol only has to forget the progress since the last meeting point and restart the simulation from said meeting point. Because of the loss in progress is now smaller, we can allow the confidence increase (which equals ) required to advance to also be smaller. As this happens for almost all , the value of , the highest confidence threshold is significantly smaller, and we can bound it by a polynomial.
The new confidence thresholds
We are yet to specify the precise increase in confidence (which equals ) required to advance to a state in layer . For this, we look at the representation of as an integer888The actual proof uses the representation of for technical reasons. in base . If are the digits in this representation, we set to be proportional to . As there is a meeting point in memory for every power of , it can be seen that takes into account the distance from all the meeting points stored in memory, while maintaining the exponential growth required between two meeting points. We defer the remaining details to the proof.
Getting rectangular correctness
Just like prior work, for Step above to work, it is crucial that our simulation protocol is rectangular correct, which is a stronger notion of correctness than standard correctness, and is necessary for Step to work. Without going into the precise definition, this means that we need to account for the errors in the rounds where the parties (Alice and Bob) are talking separately. That is, the errors in rounds where Alice is talking cannot be used to offset the rounds where Bob is going back and decreasing the confidence, and vice versa.
Other than doubling the notation we use (e.g., we now need to remember a pair of meeting points, one for Alice and one for Bob, etc.), this also introduces a more subtle challenge regarding the fraction of errors that we can be resilient to. To understand this, recall that the layers in the original circuit, and therefore the layers in the original dag-protocol, are alternating. This means that the party controlling the layer changes every time the protocol advances a layer. Now, imagine what happens when the adversary spends errors in a layer controlled by Alice to advance it incorrectly to a layer controlled by Bob.
As the errors for the both the parties are accounted for separately, Bob cannot detect and correct these errors, and the protocol will run as if there were no errors till the next time Alice gets to speak. This happens only after rounds, which due to our definition of , may be a factor of larger than , the total number of errors inserted by the adversary. Thus, it is possible for the adversary to waste rounds of simulation per error, implying that there has to be a multiplicative loss in the overall error resilience. Moreover, cannot be too small, as then the parties will not be able to correctly maintain their meeting points. We are able to show that this loss is a constant proportional to the total number of meeting points; see the formal version of our main theorem (Theorem 8).
3 Model and Preliminaries
We now describe the model and our result more formally. Note that our description closely follows [7].
3.1 Circuits and dag-protocols
Circuits
We will consider Boolean circuits with negations at the inputs. That is, a Boolean circuit will be a directed acyclic graph where each non-source node (or gate) is labelled as an gate or an gate, while each source node is labelled with an input variable or the negation of the input variable. The source nodes are also called input gates and one designated node in is called the output gate. We use and to denote the set of all the nodes in that are labelled and respectively. We define how computation over a circuit takes place by inductively defining the functions computed at each gate . We have:
(1) |
When is the output gate, we omit it from the notation and simply write , which we call the function computed by . We will assume that every gate in that is not an input gate has at least one edge coming to it. We define the size of to be the number of nodes in and the depth of to be the length of the longest path in starting from an input gate and ending at the output gate. We use to denote the size of .
Note that edges in are going “up” from the inputs to the output gate. This contrasts with the edges in dag-protocols that are going “down” from the root to the leaves as defined below. These two directions, although different, follow the conventions for both circuits and dag-protocols.
Search problems and KW-games
Let and be input sets for Alice and Bob respectively and be a set of outputs. A search problem on these input and output sets is defined by a relation , and the goal of Alice and Bob is to determine, given inputs and respectively, an element such that .
KW-games are special type of search problems that are defined using a Boolean function on variables (for some ). Here, the set is the set of all inputs for which evaluates to , is the set of all inputs for which evaluates to , and is the set . As and are disjoint by definition, for any , , there exists such that . The search problem is the problem of finding such an , namely, it is the subset:
dag-protocols
We now define the notion of dag-protocols. Let , , and be input and output sets as above. A dag-protocol is defined by a tuple:
Here, is a directed acyclic graph with vertices partitioned into , , and respectively, and edges . We will use to be the set of all vertices in and is a special vertex called the root. For all , the function is a “message function” that maps Alice’s input set to a vertex in that has an edge to. Similarly, for all , the function maps Bob’s input set to a vertex in that has an edge to. We often conflate the two and write with the understanding that the second argument is redundant if and the first argument is redundant if . Finally, for all , the value is the output value for the vertex . We will assume that vertices in do not have any out-edges, all other vertices have at least one outgoing edge (as otherwise the message functions will not be defined) and does not have any incoming edges. We define the size of to be , the number of nodes in , and the depth of to be the length of the longest path in starting from . We use to denote the size of .
As mentioned above, edges in a dag-protocol go “down” from the root to the leaves, and are thus opposite to our convention for circuits. We are explicit about the direction in our exposition whenever there is room for ambiguity.
Execution of a dag-protocol
A dag-protocol as above is executed by start with inputs , and a vertex , and continuing as follows: If then the execution simply uses the message function and updates the current vertex to 999Recall that is independent of if and is independent of if .. Otherwise, we have , and the execution terminates with the output . As this output is determined by and , we will denote it using . For a search problem , we say that solves if for all , , we have .
3.2 Rectangular Correctness & Equivalence of Circuits and dag-protocols
The models of Boolean circuits and dag-protocols described above have a deep connection. To understand this connection, we first define the notion of rectangular correctness for dag-protocols.
Definition 3 (Rectangles for dag-protocols).
Let be a dag-protocol with input sets , , and output set . We inductively define the (combinatorial) rectangle associated with each vertex. For the root , define the rectangle to . For a node , define the (combinatorial) rectangle to be the smallest rectangle containing .
For a combinatorial rectangle , we will use to denote the projection of the rectangle on the set and to denote the projection on the set . As we defined to be the smallest rectangle in Definition 3, we have the following observation.
Observation 4.
Let be a dag-protocol with input sets , , and output set and be the associated rectangles. For all and all , there exists a such that and such that and . An analogous claim holds with the roles of and reversed.
Additionally, observe that for all vertices , the rectangle contains all the pairs such that the execution of goes to on inputs and . Thus, the following notion of rectangular correctness is stronger than the “standard” notion of correctness.
Definition 5 (Rectangular Correctness).
Let be a dag-protocol with inputs sets , , and output set , and be the associated rectangles. For a search problem , we say that solves with rectangular correctness if for all and all , we have .
We are now ready to state the equivalence between circuits and dag-protocols formally. This theorem can also be found in [7]. We include a proof for completeness.
Theorem 6 ([25, 29]).
Let be a Boolean function.
-
1.
For any circuit that computes , there is a dag-protocol with the same size and depth as that solves with rectangular correctness.
-
2.
For any dag-protocol that solves with rectangular correctness, there is a circuit with that computes .
Proof.
We only prove Item 1 as Item 2 is implied by Theorem 7 proved later. Fix a circuit and define a dag-protocol for by setting the graph to be the same graph as except that the directions of all the edges are reversed. Let be the set of all gates in , be the set of all the gates in and be the set of all the inputs gates. Let be the output gate of . For all , we define to be the variable that (possibly after negation) is input at that gate. It remains to define the message transmission functions .
Fix and recall that the input set and . For and , we define as follows: If , then is just a function of . If , then, as is a gate101010We abuse notation and use to denote both the vertices in and the corresponding vertices in ., by Equation 1, there exists a neighbor (in-neighbor in and out-neighbor in ) of such that , and we set to be the lexicographically smallest such neighbor . Otherwise, we set to be the lexicographically smallest neighbor of . Observe that such a neighbor always exists as is not an input gate. Similarly, if , then is just a function of . If , then, as is a gate, by Equation 1, there exists a neighbor (in-neighbor in and out-neighbor in ) of such that , and we set to be the lexicographically smallest such neighbor . Otherwise, we set to be the lexicographically smallest neighbor of . As before, such a neighbor always exists as is not an input gate.
We clearly have and we just have to show that solves with rectangular correctness. By Definition 5, we have to show that, if are the rectangles associated with as in Definition 3, then, for all and all , we have . In fact, we will show the stronger statement that for all and all , we have:
This is indeed stronger, as if , then Equation 1 says that is just the (possibly negated) input variable implying that . We show this by induction starting from the root downwards to the nodes reachable from it111111Observe that if is not reachable from , then Definition 3 says that and there is nothing to show.. For the root , we use the fact that it corresponds to the output gate of implying that . The result follows as and .
We now show it for assuming it holds for all that have edges to in (equivalently, all that has an edge to in the circuit ). Let be arbitrary. We only show that as the proof that is analogous. As , we have by 4 that there exists that has an edge to in and a such that and . Applying the induction hypothesis on , it follows that . Now, if , then the fact that has an edge to in together with Equation 1 implies that , as desired. On the other hand, if , then, use the fact that to get that , finishing the proof.
3.3 Error Models
Circuits
We consider short-circuit errors. Let be a Boolean circuit as above. An error pattern for is defined by a function satisfying the property that maps to an in-neighbor of , i.e. to a neighbor of that is “below” it, or to , for all . In particular, if , we have . It will often be convenient to separate into two functions and write , where is the function restricted to the vertices in and is the function restricted to the vertices in . Let be a circuit and be an error pattern for . Let be a gate. We define how computation takes place in in the presence of errors by inductively defining the functions computed at each gate . We have121212Recall that the label of an input gate is either an input variable or the negation of an input variable.:
(2) |
We omit from the notation if is the output gate of . Let be a circuit and be a set of error patterns for . For a function , we say that computes despite , if for all , we have . We say that is rectangular if viewing every as a pair gives a combinatorial rectangle. When this happens, we use to denote the projection of this rectangle on the first coordinate and to denote the projection on the second coordinate (thus, )
We now define the set of error patterns that we work with. Let be an integer parameter. For a circuit , define the set to be the set of all error patterns such that for any path in that starts at an input gate and ends the output gate, at most gates on the path satisfy and at most gates on the path satisfy . Observe that the set is rectangular for all .
dag-protocols
Let be a dag-protocol as above. An error pattern for is defined by a function satisfying the property that maps to an out-neighbor of , i.e. to a neighbor of that is “below” it131313Recall that our conventions for the directions of edges in circuits is opposite that in dag-protocols., or to . In particular, if , we have . It will often be convenient to separate into two functions , where is the function restricted to the vertices in , and is the function restricted to the vertices in . The error pattern affects the execution of as follows: If the current vertex is and , the execution proceeds as before. On the other hand, if (observe that this can only happen if ), the execution updates the current vertex to instead of updating using the function as before.
Let be a dag-protocol and be a set of error patterns for . Similarly to before, we say that is rectangular if viewing every as a pair gives a combinatorial rectangle. When this happens, we use to denote the projection of this rectangle on the first coordinate and to denote the projection on the second coordinate (thus, ). For a rectangular , define the dag-protocol to be the same as except that the input sets are now and and the message functions are defined as (recall that ):
(3) |
For a search problem and a rectangular , we say that solves with rectangular correctness despite if solves with rectangular correctness, where is the search problem satisfying for all values of .
We now define the set of error patterns that we work with. Let be an integer parameter. For a dag-protocol , define the set to be the set of all error patterns such that for any path in that starts at and ends at a node in , at most nodes on the path satisfy and at most nodes on the path satisfy . Observe that the set is rectangular for all . For convenience, we will often abbreviate to .
3.4 Connecting the Error Models
We now show that error resilient dag-protocols are stronger than error-resilient circuits. Observe that the theorem below implies Item 2 of Theorem 6 as can be seen by setting . Additionally, note that the theorem below differs from the analogous theorem in [7] in that the number of allowed errors is the same for every path, while in [7], it was a constant fraction of the length of the path. Having it as a constant fraction creates some minor complications while trimming the “empty edges” (in the first paragraph of the proof), that were overlooked in [7]. These complications do not affect the rest of the proof of [7], as [7] actually works even when the allowed number of errors is the same for every path (and equals a constant fraction of the length of the longest path). Nonetheless, we flesh out the details of trimming for our model formally in the full version. We also mention that having the same number of errors on all the paths, irrespective of their length, is a stronger error model than having the number of errors on each path be proportional to its length.
Theorem 7.
Let be given and be a Boolean function. For any dag-protocol that solves with rectangular correctness despite , there is a circuit with size and depth at most that of that computes despite .
Proof.
Fix a protocol that solves with rectangular correctness despite . We can assume without loss of generality that there are no empty edges in , as defined in the full version. Equivalently, if are the rectangles associated with according to Definition 3 and are the message functions, for all edges we have:
(4) |
As that solves with rectangular correctness despite , we have that solves with rectangular correctness. From Definition 5, we get that for all and all , we have . Simplifying using the definition of , we get:
(5) |
We now define the circuit . The gates in the circuit are exactly the nodes in and we abuse notation slightly by using etc. to refer to both. For any edge , we add the flipped edge to the circuit . We define all gates in to be gates and all gates in to be gates while is chosen as the output gate. The remaining gates are in are input gates whose labels are defined next. As in Equation 5 is a combinatorial rectangle, we get that there exists such that
If , we label the input gate by the variable unnegated, and we label it by the negated variable otherwise. This finishes the description of . As the claim about the size is straightforward, we focus on showing that computes despite . As both and have the same graph upto the directions of the edges, observe that any error pattern for can also be seen as a pattern for and that . Because of this, we interpret any error pattern as an error pattern for and we and subscripts and to refer to both. We also define the error patterns and to be those that map all gates in (equivalently, ) and (equivalently, ) respectively to . To show that computes despite , we show inductively that for all , we have:
(6) |
This suffices as plugging and using the definition of from Definition 3, we get that:
As short-circuiting a gate in can never change the output from to and short-circuiting a gate in can never change the output from to , we get that:
Thus, we get that for all . As , we get that computes despite , as desired. Having shown that Equation 6 is sufficient, we now prove that Equation 6 holds by induction. For the base case, when , this follows by our labels and Equations 2 and 5. We show the results for assuming it holds for all that have edges to in . If , there is nothing to show, so we assume otherwise. As the proof in the other case is similar, assume without loss of generality that . From Equation 4, we get that for all that have edges to in , we have that there exists such that . As , the message function is determined by the first argument and we get from Definition 3 that:
(7) |
We now show Equation 6. Fix .
-
Showing that when : By Equation 3, we get that implying from Definition 3 that . By the induction hypothesis on , we get that . From Equation 2, we get:
-
Showing that when : We have from that . From Equation 7, there exists an in-neighbor of in and such that . By the induction hypothesis on , we have . From Equation 2, we get:
-
Showing that : We have from that . It follows from Equation 7 that for all in-neighbors of in , we have that there exists such that . From the induction hypothesis on , we get that for all such . From Equation 2, we get:
3.5 Our Results
We are now ready to state our main result formally. We show that:
Theorem 8 (Formal version of Theorem 1).
Let , be integers and be a Boolean function. Let be a Boolean circuit of size and depth141414The “” in this expression is for technical convenience. that computes . There exists and a Boolean circuit with size at most and depth that computes despite .
To prove Theorem 8, we need the following result about dag-protocols, which forms the technical core of Theorem 8.
Theorem 9 (Formal version of Theorem 2).
Let be a search problem and be a dag-protocol of size and depth that solves with rectangular correctness. Let be an integer satisfying151515The “” in this expression is for technical convenience. . There exists (defined in the full version) and a dag-protocol (as defined in the full version) with size and depth that solves with rectangular correctness despite .
Proof of Theorem 8 assuming Theorem 9.
Fix a circuit as in the theorem statement. Applying Theorem 6, we get that there exists a dag-protocol with size and depth that solves with rectangular correctness. Applying Theorem 9, we get that there exists and a dag-protocol with size and depth that solves with rectangular correctness despite . Now, applying Theorem 7 on , we get that there exists a circuit with size at most and depth at most that computes despite , as desired.
References
- [1] Mirza Ahad Baig, Suvradip Chakraborty, Stefan Dziembowski, Małgorzata Gałązka, Tomasz Lizurej, and Krzysztof Pietrzak. Efficiently testable circuits. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023), 2023. doi:h10.4230/LIPIcs.ITCS.2023.10.
- [2] Mirza Ahad Baig, Suvradip Chakraborty, Stefan Dziembowski, Małgorzata Gałązka, Tomasz Lizurej, and Krzysztof Pietrzak. Efficiently testable circuits without conductivity. In Theory of Cryptography Conference, 2023. doi:10.1007/978-3-031-48621-0_5.
- [3] Maria Luisa Bonet and Samuel R. Buss. Size-depth tradeoffs for boolean fomulae. Information Processing Letters, 49(3):151–155, 1994. doi:10.1016/0020-0190(94)90093-0.
- [4] Mark Braverman, Klim Efremenko, Ran Gelles, and Michael A. Yitayew. Optimal short-circuit resilient formulas. In Computational Complexity Conference (CCC), volume 137, pages 10:1–10:22, 2019. doi:10.4230/LIPICS.CCC.2019.10.
- [5] T.-H. Hubert Chan, Zhibin Liang, Antigoni Polychroniadou, and Elaine Shi. Small memory robust simulation of client-server interactive protocols over oblivious noisy channels. In Symposium on Discrete Algorithms (SODA), pages 2349–2365, 2020. doi:10.1137/1.9781611975994.144.
- [6] Roland L’vovich Dobrushin and SI Ortyukov. Upper bound on the redundancy of self-correcting arrangements of unreliable functional elements. Problemy Peredachi Informatsii, 13(3):56–76, 1977.
- [7] Klim Efremenko, Bernhard Haeupler, Yael Tauman Kalai, Pritish Kamath, Gillat Kol, Nicolas Resch, and Raghuvansh R. Saxena. Circuits resilient to short-circuit errors. In 54th Annual ACM SIGACT Symposium on Theory of Computing, Rome, Italy, June 20 - 24, 2022, 2022.
- [8] William S. Evans and Nicholas Pippenger. On the maximum tolerable noise for reliable computation by formulas. IEEE Transactions on Information Theory, 44(3):1299–1305, 1998. doi:10.1109/18.669417.
- [9] William S. Evans and Leonard J. Schulman. Signal propagation and noisy circuits. IEEE Transactions on Information Theory, 45(7):2367–2373, 1999. doi:10.1109/18.796377.
- [10] William S. Evans and Leonard J. Schulman. On the maximum tolerable noise of k-input gates for reliable computation by formulas. IEEE Transactions on Information Theory, 49:3094–3098, 2003. doi:10.1109/TIT.2003.818405.
- [11] Tomás Feder. Reliable computation by networks in the presence of noise. IEEE Transactions on Information Theory, 35(3):569–571, 1989. doi:10.1109/18.30978.
- [12] Péter Gács and Anna Gál. Lower bounds for the complexity of reliable boolean circuits with noisy gates. IEEE Transactions on Information Theory, 40(2):579–583, 1994. doi:10.1109/18.312190.
- [13] Anna Gál. Lower bounds for the complexity of reliable boolean circuits with noisy gates. In Foundations of Computer Science (FOCS), pages 594–601, 1991. doi:10.1109/SFCS.1991.185424.
- [14] Anna Gál and Mario Szegedy. Fault tolerant circuits and probabilistically checkable proofs. In Proceedings of Structure in Complexity Theory. Tenth Annual IEEE Conference, pages 65–73, 1995. doi:10.1109/SCT.1995.514728.
- [15] Ankit Garg, Mika Göös, Pritish Kamath, and Dmitry Sokolov. Monotone circuit lower bounds from resolution. In Symposium on Theory of Computing (STOC), pages 902–911, 2018. doi:10.1145/3188745.3188838.
- [16] Ran Gelles. Coding for interactive communication: A survey. Foundations and Trends in Theoretical Computer Science, 13(1–2):1–157, 2017. doi:10.1561/0400000079.
- [17] Bruce E. Hajek and Timothy Weller. On the maximum tolerable noise for reliable computation by formulas. IEEE Transactions on Information Theory, 37(2):388–391, 1991. doi:10.1109/18.75261.
- [18] Yael Tauman Kalai, Allison B. Lewko, and Anup Rao. Formulas resilient to short-circuit errors. In Foundations of Computer Science (FOCS), pages 490–499, 2012. doi:10.1109/FOCS.2012.69.
- [19] Mauricio Karchmer and Avi Wigderson. Monotone circuits for connectivity require super-logarithmic depth. In Symposium on Theory of Computing (STOC), pages 539–550, 1988. doi:10.1145/62212.62265.
- [20] Daniel J. Kleitman, Frank Thomson Leighton, and Yuan Ma. On the design of reliable boolean circuits that contain partially unreliable gates. Journal of Computer and System Sciences, 55(3):385–401, 1997. doi:10.1006/JCSS.1997.1531.
- [21] Jan Krajícek. Interpolation theorems, lower bounds for proof systems, and independence results for bounded arithmetic. Journal of Symbolic Logic, 62(2):457–486, 1997. doi:10.2307/2275541.
- [22] Nicholas Pippenger. On networks of noisy gates. In Foundations of Computer Science (FOCS), pages 30–38, 1985. doi:10.1109/SFCS.1985.41.
- [23] Nicholas Pippenger. Reliable computation by formulas in the presence of noise. IEEE Transactions on Information Theory, 34(2):194–197, 1988. doi:10.1109/18.2628.
- [24] Pavel Pudlák. On extracting computations from propositional proofs (a survey). In IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2010), volume 8, pages 30–41, 2010. doi:10.4230/LIPICS.FSTTCS.2010.30.
- [25] Alexander Razborov. Unprovability of lower bounds on circuit size in certain fragments of bounded arithmetic. Izvestiya of the RAN, pages 201–224, 1995.
- [26] Leonard J Schulman. Communication on noisy channels: A coding theorem for computation. In Foundations of Computer Science (FOCS), pages 724–733. IEEE, 1992. doi:10.1109/SFCS.1992.267778.
- [27] Leonard J. Schulman. Deterministic coding for interactive communication. In Symposium on Theory of Computing (STOC), pages 747–756, 1993. doi:10.1145/167088.167279.
- [28] Leonard J Schulman. Coding for interactive communication. IEEE Transactions on Information Theory, 42(6):1745–1756, 1996. doi:10.1109/18.556671.
- [29] Dmitry Sokolov. Dag-like communication and its applications. In Proceedings of the 12th Computer Science Symposium in Russia (CSR), pages 294–307. Springer, 2017. doi:10.1007/978-3-319-58747-9_26.
- [30] John von Neumann. Probabilistic logics and the synthesis of reliable organisms from unreliable components. Automata Studies, pages 43–98, 1956.