Abstract 1 Introduction 2 Preliminaries 3 A Simple Proof of the PCRP Theorem References

Yet Another Simple Proof of the PCRP Theorem

Naoto Ohsaka ORCID CyberAgent, Inc., Tokyo, Japan
Abstract

The Probabilistically Checkable Reconfiguration Proof (PCRP) theorem, proven by Hirahara and Ohsaka (STOC 2024) [22] and Karthik C.Β S.Β and Manurangsi [29], provides a new PCP-type characterization of 𝐏𝐒𝐏𝐀𝐂𝐄: A language L is in 𝐏𝐒𝐏𝐀𝐂𝐄 if and only if there exists a probabilistic verifier 𝒱 and a pair of polynomial-time computable proofs π𝗂𝗇𝗂,π𝖾𝗇𝖽 such that the following hold for every input x:

  • β– 

    If x∈L, then π𝗂𝗇𝗂⁒(x) can be transformed into π𝖾𝗇𝖽⁒(x) by repeatedly flipping a single bit of the proof at a time, while making 𝒱⁒(x) to accept every intermediate proof with probability 1.

  • β– 

    If xβˆ‰L, then any such transformation induces a proof that is rejected by 𝒱⁒(x) with probability more than 12.

The PCRP theorem finds many applications in 𝐏𝐒𝐏𝐀𝐂𝐄-hardness of approximation for reconfiguration problems.

In this paper, we present an alternative proof of the PCRP theorem that is β€œsimpler” than those of Hirahara and OhsakaΒ [22] and Karthik C.Β S.Β and ManurangsiΒ [29]. Our PCRP system is obtained by combining simple robustization and composition steps in a modular fashion, which renders its analysis more intuitive. The crux of implementing the robustization step is an error-correcting code that enjoys both list decodability and reconfigurability, the latter of which enables to reconfigure between a pair of codewords, while avoiding getting too close to any other codewords.

Keywords and phrases:
reconfiguration problems, hardness of approximation, probabilistic proof systems
Category:
Track A: Algorithms, Complexity and Games
Copyright and License:
[Uncaptioned image] © Naoto Ohsaka; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation β†’ Problems, reductions and completeness
; Theory of computation β†’ Error-correcting codes
Editors:
Keren Censor-Hillel, Fabrizio Grandoni, JoΓ«l Ouaknine, and Gabriele Puppis

1 Introduction

Given a combinatorial problem and a pair of its feasible solutions, can we find a β€œstep-by-step” transformation from one to the other that maintains the feasibility at every intermediate state? Combinatorial reconfiguration is a brand-new field in theoretical computer science, aimed at studying connectivity problems over the solution space of a combinatorial problem, called the source problem. One canonical reconfiguration problem is 3-SAT ReconfigurationΒ [15], whose source problem is 3-SAT: For a satisfiable 3-CNF formula Ο† and a pair of its satisfying assignments σ𝗂𝗇𝗂,σ𝖾𝗇𝖽, we shall transform σ𝗂𝗇𝗂 into σ𝖾𝗇𝖽 by repeatedly flipping a single variable assignment at a time, while always preserving that Ο† is satisfied. Formally, a reconfiguration sequence from σ𝗂𝗇𝗂 to σ𝖾𝗇𝖽 is a sequence of assignments to Ο†, denoted by Οƒβ†’=(Οƒ(1),…,Οƒ(T)), such that Οƒ(1)=σ𝗂𝗇𝗂, Οƒ(T)=σ𝖾𝗇𝖽, and Οƒ(t) and Οƒ(t+1) differ in at most one variable.

Since Ito, Demaine, Harvey, Papadimitriou, Sideri, Uehara, and UnoΒ [27] initiated the unified framework for reconfiguration, many reconfiguration problems have been formulated, including those of Boolean satisfiability, constraint satisfaction problems, and graph problems.

Of particular interest has been to elucidate their computational complexity. On the hardness side, a reconfiguration problem generally becomes 𝐏𝐒𝐏𝐀𝐂𝐄-complete if its source problem is intractable (say, 𝐍𝐏-complete), e.g., reconfiguration problems of 3-SAT [15], 4-Coloring [8], and Independent Set [19, 20]. On the tractable side, a source problem in 𝐏 frequently leads to a reconfiguration problem that also belongs to 𝐏, e.g., 2-SAT [15], Matching [27], and Spanning Tree [27]. Some exceptions are known, such as 3-Coloring [10] and Shortest Path [7]. Having established the complexity results of popular reconfiguration problems, researchers have turned their attention to parameterized complexity [5, 6, 9, 31] and restricted graph classes [18, 28, 30, 43]. We refer the readers to the surveys by Bousquet, Mouawad, Nishimura, and SiebertzΒ [9], Mynhardt and NasserasrΒ [32], NishimuraΒ [33], and van den HeuvelΒ [42] as well as the Combinatorial Reconfiguration wiki [24] for more hardness and algorithmic results.

In this paper, we consider approximability of reconfiguration problems, which has been recently studied from both hardness and algorithmic sides, e.g., [21, 22, 23, 29, 34, 35, 36, 37, 38, 39]. For a reconfiguration problem, its approximate version affords to relax the feasibility of intermediate solutions, but requires to optimize the β€œworst” feasibility during reconfiguration. For example, in Maxmin 3-SAT Reconfiguration [27] – an approximate version of 3-SAT Reconfiguration – we are allowed to use any non-satisfying assignments to produce a reconfiguration sequence, but are required to maximize the minimum fraction of satisfied clauses.

Solving Maxmin 3-SAT Reconfiguration approximately, we may be able to find a β€œreasonable” reconfiguration sequence consisting of almost-satisfying assignments, so that we can mange No instances of 3-SAT Reconfiguration.

Ito, Demaine, Harvey, Papadimitriou, Sideri, Uehara, and UnoΒ [27, TheoremsΒ 4Β andΒ 5] showed that Maxmin SAT Reconfiguration and Maxmin Clique Reconfiguration are 𝐍𝐏-hard to approximate. Their proofs do not bring 𝐏𝐒𝐏𝐀𝐂𝐄-hardness because of relying on the 𝐍𝐏-hardness of approximating the corresponding source problems (i.e., Max SAT [26] and Max Clique [25]). Since many reconfiguration problems are 𝐏𝐒𝐏𝐀𝐂𝐄-complete, 𝐍𝐏-hardness results seem not optimal. In fact, [27] posed 𝐏𝐒𝐏𝐀𝐂𝐄-hardness of approximation for reconfiguration problems as an open problem. The significance of showing 𝐏𝐒𝐏𝐀𝐂𝐄-hardness compared to 𝐍𝐏-hardness is that it not only rules out polynomial-time algorithms under 𝐏≠𝐏𝐒𝐏𝐀𝐂𝐄, but further disproves the existence of a witness (especially a reconfiguration sequence) of polynomial length under 𝐍𝐏≠𝐏𝐒𝐏𝐀𝐂𝐄.

1.1 PCRP Theorem, Its Consequences, and Our Contribution

Recently, Hirahara and OhsakaΒ [22] and Karthik C.Β S.Β and ManurangsiΒ [29] established a reconfiguration analogue of the PCP theorem [2, 3], a.k.a.Β the Probabilistically Checkable Reconfiguration Proof (PCRP) theorem, which provides a new PCP-type characterization of 𝐏𝐒𝐏𝐀𝐂𝐄. For a pair of proofs π𝗂𝗇𝗂,Ο€π–Ύπ—‡π–½βˆˆ{0,1}n, a reconfiguration sequence from π𝗂𝗇𝗂 to π𝖾𝗇𝖽 is a sequence Ο€β†’=(Ο€(1),…,Ο€(T)) over {0,1}n such that Ο€(1)=π𝗂𝗇𝗂, Ο€(T)=π𝖾𝗇𝖽, and Ο€(t) and Ο€(t+1) differ in at most one bit for every t.

Theorem 1.1 (PCRP theorem [22, 29]; see Theorem 3.1 for the formal statement).

A language LβŠ†{0,1}βˆ— is in 𝐏𝐒𝐏𝐀𝐂𝐄 if and only if there exists a probabilistic verifier 𝒱 with randomness complexity π’ͺ⁑(log⁑n) and query complexity π’ͺ⁑(1) and a pair of polynomial-time computable proofs π𝗂𝗇𝗂,π𝖾𝗇𝖽:{0,1}βˆ—β†’{0,1}βˆ— such that the following hold for every input x∈{0,1}βˆ—:

  • β– 

    (Completeness) If x∈L, then there exists a reconfiguration sequence Ο€β†’ from π𝗂𝗇𝗂⁒(x) to π𝖾𝗇𝖽⁒(x) such that 𝒱⁒(x) accepts every proof in Ο€β†’ with probability 1.

  • β– 

    (Soundness) If xβˆ‰L, then every reconfiguration sequence Ο€β†’ from π𝗂𝗇𝗂⁒(x) to π𝖾𝗇𝖽⁒(x) contains some proof that is rejected by 𝒱⁒(x) with probability more than 12.

The PCRP theorem, along with a series of gap-preserving reductions [21, 22, 23, 29, 34, 35, 36], implies that several reconfiguration problems are 𝐏𝐒𝐏𝐀𝐂𝐄-hard to approximate, thereby resolving the open problem due to Ito, Demaine, Harvey, Papadimitriou, Sideri, Uehara, and UnoΒ [27] affirmatively.

Corollary 1.2 (from Theorem 1.1 and [21, 22, 23, 29, 34, 35, 36]).

There exists a universal constant Ρ∈(0,1) such that approximate versions of the following reconfiguration problems are 𝐏𝐒𝐏𝐀𝐂𝐄-hard to approximate within a factor of 1Β±Ξ΅:

3-SAT Reconfiguration, 2-CSP Reconfiguration, Independent Set Reconfiguration, Vertex Cover Reconfiguration, Dominating Set Reconfiguration, Set Cover Reconfiguration, Max Cut Reconfiguration, and Nondeterministic Constraint Logic.

In this paper, we present an alternative proof of the PCRP theorem that is β€œsimpler” than those of Hirahara and OhsakaΒ [22] and Karthik C.Β S.Β and ManurangsiΒ [29]. Our technical contribution is to develop a reconfiguration analogue of robustization [4, 12] and composition [2, 3]. Below, we review existing proofs of the PCRP theorem [22, 29], followed by our proof and techniques.

1.2 Recap of Two Proofs due to [22, 29]

We recapitulate two proofs of the PCRP theorem due to Hirahara and OhsakaΒ [22] and Karthik C.Β S.Β and ManurangsiΒ [29]. Let LβŠ†{0,1}βˆ— be a 𝐏𝐒𝐏𝐀𝐂𝐄-complete language, say, 3-SAT Reconfiguration,111 Hirahara and OhsakaΒ [22] adopted Succinct Reach and Karthik C.Β S.Β and ManurangsiΒ [29] adopted 2-CSP Reconfiguration, but the choice of 𝐏𝐒𝐏𝐀𝐂𝐄-complete languages does not so matter. for which we will design a PCRP system. Suppose that we are given a satisfiable 3-CNF formula Ο† over n variables and a pair of its satisfying assignments σ𝗂𝗇𝗂,Οƒπ–Ύπ—‡π–½βˆˆ{0,1}n. Both [22, 29] employ the following common strategy:

  • β– 

    Encode each assignment to Ο† using an error-correcting code 𝖀𝗇𝖼:{0,1}nβ†’{0,1}p⁒(n).

  • β– 

    Check if an input string f∈{0,1}p⁒(n) is the encoded satisfying assignment to Ο† (i.e., f=𝖀𝗇𝖼⁑(Οƒ) for some assignment Οƒβˆˆ{0,1}n), by running the assignment tester [12] (a.k.a.Β PCP of proximity [4]) on f along with an auxiliary proof Ο€βˆˆ{0,1}βˆ—.

Ideally, the existence of a reconfiguration sequence Οƒβ†’ from σ𝗂𝗇𝗂 to σ𝖾𝗇𝖽 consisting of satisfying assignments to Ο† should imply the existence of a reconfiguration sequence Ξ β†’ from 𝖀𝗇𝖼⁑(σ𝗂𝗇𝗂)βˆ˜Ο€π—‚π—‡π—‚ to 𝖀𝗇𝖼⁑(σ𝖾𝗇𝖽)βˆ˜Ο€π–Ύπ—‡π–½ consisting only of accepting proofs, where π𝗂𝗇𝗂 and π𝖾𝗇𝖽 are auxiliary proofs accepted by the assignment tester along with 𝖀𝗇𝖼⁑(σ𝗂𝗇𝗂) and 𝖀𝗇𝖼⁑(σ𝖾𝗇𝖽), respectively. On the other hand, if there is a reconfiguration sequence Ξ β†’ from 𝖀𝗇𝖼⁑(σ𝗂𝗇𝗂)βˆ˜Ο€π—‚π—‡π—‚ to 𝖀𝗇𝖼⁑(σ𝖾𝗇𝖽)βˆ˜Ο€π–Ύπ—‡π–½ in which every proof is accepted with a high probability (say, 0.99), then (σ𝗂𝗇𝗂,σ𝖾𝗇𝖽;Ο†) must be a Yes instance of 3-SAT Reconfiguration. The challenge for the former requirement (i.e., completeness) is that every reconfiguration sequence between different codewords must induce a string that is β€œfar” from every codeword, which would be rejected by the assignment tester, whereas for the latter requirement (i.e., soundness) is that we should be able to extract from Ξ β†’ a reconfiguration sequence Οƒβ†’ consisting of satisfying assignments to Ο†. Hirahara and OhsakaΒ [22] and Karthik C.Β S.Β and ManurangsiΒ [29] took slightly different approaches to these challenges.

Hirahara–Ohsaka’s System

Hirahara and OhsakaΒ [22] first create a pair of fresh copies of the input string, denoted by f and g, so that one of them can be arbitrarily edited as long as the other is the encoded satisfying assignment. Introduce then a special symbol βŠ₯ to indicate that a particular copy is in the β€œin transition” state. The verifier 𝒱HO of [22] is given oracle access to a pair of strings f,g∈{0,1,βŠ₯}p⁒(n), supposed to be the encoding of adjacent satisfying assignments, and an auxiliary proof Ο€βˆˆ{0,1,βŠ₯}ℓ⁒(n), supposed to assert that f∘g is as expected. Here, we say that a pair of assignments are adjacent if they differ in at most one variable. Informally, 𝒱HO performs the following three stages:

  1. 1.

    𝒱HO makes sure that f or g is a codeword of 𝖀𝗇𝖼 (by using its local tester). If this is not the case, then it immediately rejects.

  2. 2.

    𝒱HO determines if f or g contains β€œmany” βŠ₯’s (by random sampling), and if so, then it immediately accepts. This stage is crucial for achieving the perfect completeness.

  3. 3.

    Otherwise (i.e., both f and g contain β€œfew” βŠ₯’s), 𝒱HO runs an assignment tester on f∘gβˆ˜Ο€ (as if f∘gβˆ˜Ο€ does not contain any βŠ₯) to ensure that f∘g is indeed the encoding of adjacent satisfying assignments to Ο†, which is a crucial stage for the soundness.

One subtle issue is that implementing 𝒱HO causes minor changes in the assignment tester, which makes its analysis less intuitive.

Karthik C.Β S.–Manurangsi’s System

Karthik C.Β S.Β and ManurangsiΒ [29] first create fresh four copies of the input string, denoted by f1,f2,f3,f4, so that whenever three of them are the encoded adjacent satisfying assignments to Ο†, the remaining copy can be whatever. Create also a special variable vβˆ— to denote which copy is currently β€œin transition.” The verifier 𝒱KM of [29] is given oracle access to four strings f1,f2,f3,f4∈{0,1}p⁒(n), three of which are supposed to be the encoding of adjacent satisfying assignments, four auxiliary proofs Ο€1,Ο€2,Ο€3,Ο€4∈{0,1}ℓ⁒(n), where each Ο€k should assert that {fi}iβ‰ k are as expected, and the special variable vβˆ—βˆˆ[4]. Roughly speaking, 𝒱KM works as follows: Suppose that 𝒱KM finds vβˆ— to take a value k∈[4]; i.e., fk is on the way of transition. Then, 𝒱KM calls an assignment tester on {fi}iβ‰ kβˆ˜Ο€k to confirm that {fi}iβ‰ k are indeed the encoding of adjacent satisfying assignments to Ο†.

Unlike 𝒱HO of [22], implementing 𝒱KM does not require any modification in assignment testers. However, 𝒱KM entails four copies of the input string and the special variable vβˆ— to take the majority decoding, which makes the (soundness) analysis slightly complicated. Another drawback common to [22, 29] is that both 𝒱HO and 𝒱KM apply error-correcting codes and assignment testers all at once, and thus, we are not able to analyze their effects separately.

1.3 Overview of Our Proof

We now outline our proof of the PCRP theorem. Our proof also relies on error-correcting codes and assignment testers as in [22, 29], but does not involve either the special symbol βŠ₯ or the special variable vβˆ—. The crucial difference from [22, 29] is that our PCRP system is obtained by combining simple robustization and composition steps in a modular fashion, which renders its analysis more intuitive. This can be thought of as an extension of alphabet reduction [11] for Maxmin 2-CSP Reconfiguration due to [35].

Starting Point (Section 3.1)

The starting point for which we build a PCRP system is a 𝐏𝐒𝐏𝐀𝐂𝐄-complete problem called Succinct Reach [14, 22, 40], defined as follows: Given a circuit C:{0,1}2⁒nβ†’{0,1} that represents an exponentially large graph G over {0,1}n such that a pair of β€œvertices” Ξ±,β∈{0,1}n are adjacent in G if and only if C⁒(α∘β)=1, we are required to decide if there exists an undirected path from 0n to 1n in G.222 Without loss of generality, we can assume that G is undirected and has self-loops at every vertex. Succinct Reach can be thought of as a reconfiguration problem, which asks if there exists a reconfiguration edge sequence (Ξ±(1)∘β(1),…,Ξ±(T)∘β(T)) from 0n∘0n to 1n∘1n such that Ξ±(t)=Ξ±(t+1) or Ξ²(t)=Ξ²(t+1) for every t, and every (Ξ±(t),Ξ²(t)) is an edge of G.333 We remark that reconfiguration edge sequences are different from reconfiguration sequences, in which every adjacent pair of strings differ in at most one bit. Such a sequence has the following interpretation [22] under the token jumping model [28]: Given a pair of β€œtokens” initially placed on self-loop (0n,0n) of G, we can transfer them to self-loop (1n,1n) of G by repeatedly moving a single token while preserving that the two tokens are always adjacent in G.

Robustization (Section 3.2)

The first step is robustization [4, 12], which reduces Succinct Reach to a β€œrobust” version of Circuit SAT Reconfiguration. Given a circuit Ξ¦:{0,1}2⁒p⁒(n)β†’{0,1} and a pair of its satisfying assignments σ𝗂𝗇𝗂,σ𝖾𝗇𝖽, Circuit SAT Reconfiguration asks to decide if there exists a reconfiguration sequence Οƒβ†’ from σ𝗂𝗇𝗂 to σ𝖾𝗇𝖽 consisting only of satisfying assignments to Ξ¦. We shall achieve the following requirement in reducing an input C of Succinct Reach to an input (σ𝗂𝗇𝗂,σ𝖾𝗇𝖽;Ξ¦) of Circuit SAT Reconfiguration (Lemma 3.7):

  • β– 

    (Perfect completeness) If C is a Yes instance, then (σ𝗂𝗇𝗂,σ𝖾𝗇𝖽;Ξ¦) is a Yes instance.

  • β– 

    (Robust soundness) If C is a No instance, then every possible reconfiguration sequence Οƒβ†’ from σ𝗂𝗇𝗂 to σ𝖾𝗇𝖽 contains some assignment that is Ω⁒(1)-far from every satisfying assignment to Ξ¦.

In the same manner as [22, 29], we first encode each β€œvertex” represented by C:{0,1}2⁒nβ†’{0,1} using an error-correcting code 𝖀𝗇𝖼:{0,1}nβ†’{0,1}p⁒(n), whose relative distance will be denoted by ρ. Obviously, two (supposedly satisfying) assignments σ𝗂𝗇𝗂,Οƒπ–Ύπ—‡π–½βˆˆ{0,1}2⁒p⁒(n) should be defined as σ𝗂𝗇𝗂≔𝖀𝗇𝖼⁑(0n)βˆ˜π–€π—‡π–Όβ‘(0n) and σ𝖾𝗇𝖽≔𝖀𝗇𝖼⁑(1n)βˆ˜π–€π—‡π–Όβ‘(1n). The central question is how to design a new circuit Ξ¦:{0,1}2⁒p⁒(n)β†’{0,1}, which takes a pair of strings f,g∈{0,1}p⁒(n), so as to meet the above requirements.

The first naive attempt mimics the existing robustization, e.g., [11]: Our (seemingly promising) circuit accepts only 𝖀𝗇𝖼⁑(Ξ±)βˆ˜π–€π—‡π–Όβ‘(Ξ²) such that C⁒(α∘β)=1, which, however, fails to derive the perfect completeness. Intuitively, there is no consecutive path between distinct codewords of 𝖀𝗇𝖼, making the reconfiguration impossible.

Example 1.3 (first failed attempt).

Construct a circuit Φ~1 such that Φ~1⁒(f∘g)=1 if and only if

  1. 1.

    both f and g are some codewords of 𝖀𝗇𝖼, and

  2. 2.

    if f=𝖀𝗇𝖼⁑(Ξ±) and g=𝖀𝗇𝖼⁑(Ξ²), then C⁒(α∘β)=1.

Consider any reconfiguration sequence Οƒβ†’ from σ𝗂𝗇𝗂 to σ𝖾𝗇𝖽. Since 𝖀𝗇𝖼⁑(0n) and 𝖀𝗇𝖼⁑(1n) are ρ-far from each other, Οƒβ†’ must contain some assignment Οƒβˆ˜=f∘∘g∘ such that f∘ is ρ2-far from every codeword of 𝖀𝗇𝖼; i.e., Οƒβˆ˜ is ρ4-far from every satisfying assignment to Ξ¦~1, losing the perfect completeness. β€ƒβŒŸ

Given the first attempt’s failure, one may think of forcing the circuit to accept a pair of strings that are up to ρ2-close to some codewords. Unfortunately, this modification now reduces the robust soundness to o⁒(1). The nature behind this failure is that moving one bit away from the radius of the ball results in a rejecting string, even though it is only one bit away from an accepting string.

Example 1.4 (second failed attempt).

Construct a circuit Φ~2 such that Φ~2⁒(f∘g)=1 if and only if

  1. 1.

    both f and g are ρ2-close to some codewords of 𝖀𝗇𝖼, and

  2. 2.

    if f and g are ρ2-close to 𝖀𝗇𝖼⁑(Ξ±) and 𝖀𝗇𝖼⁑(Ξ²), respectively, then C⁒(α∘β)=1.

Then, the following issue arises: Even if an assignment Οƒβˆˆ{0,1}2⁒p⁒(n) is ρ2-far from 𝖀𝗇𝖼⁑(Ξ±)βˆ˜π–€π—‡π–Όβ‘(Ξ²) for every strings Ξ±,β∈{0,1}n, we cannot exclude the possibility that Οƒ is still o⁒(1)-close to some satisfying assignment to Ξ¦~2. Let f∈{0,1}p⁒(n) be a string that is ρ2-close to both 𝖀𝗇𝖼⁑(0n) and 𝖀𝗇𝖼⁑(1n). Consider the following reconfiguration sequence Οƒβ†’ from σ𝗂𝗇𝗂 to σ𝖾𝗇𝖽 via f∘f:

(𝖀𝗇𝖼⁑(0n)βˆ˜π–€π—‡π–Όβ‘(0n),β‹―,fβˆ˜π–€π—‡π–Όβ‘(0n),β‹―,f∘f,β‹―,fβˆ˜π–€π—‡π–Όβ‘(1n),β‹―,𝖀𝗇𝖼⁑(1n)βˆ˜π–€π—‡π–Όβ‘(1n)).

Changing a few bits of f, we can reach a new string f⋆ that is ρ2-close to 𝖀𝗇𝖼⁑(0n) but ρ2-far from any other codeword of 𝖀𝗇𝖼. Since Ξ¦~2⁒(fβ‹†βˆ˜f⋆)=1 by definition, f∘f is o⁒(1)-close to a satisfying assignment (i.e., fβ‹†βˆ˜f⋆) to Ξ¦~2. Similarly, every assignment in Οƒβ†’ can be shown o⁒(1)-close to some satisfying assignment to Ξ¦~2. β€ƒβŒŸ

The crux of realizing the perfect completeness and robust soundness simultaneously is the following error-correcting code, which enjoys both list decodability and reconfigurability.

Theorem 1.5 (informal; see Theorem 3.4 [16] and Lemma 3.5).

There exists an error-correcting code 𝖀𝗇𝖼:{0,1}nβ†’{0,1}p⁒(n) for some polynomial p such that the following hold:

  • β– 

    (List decodability) There exists a polynomial-time algorithm that list-decodes 𝖀𝗇𝖼 up to relative radius 13.

  • β– 

    (Reconfigurability) For every distinct strings Ξ±β‰ Ξ²βˆˆ{0,1}n, there exists a reconfiguration sequence from 𝖀𝗇𝖼⁑(Ξ±) to 𝖀𝗇𝖼⁑(Ξ²) in which every string is

    • –

      14-close to at least either 𝖀𝗇𝖼⁑(Ξ±) or 𝖀𝗇𝖼⁑(Ξ²), and

    • –

      13-far from 𝖀𝗇𝖼⁑(Ξ³) for every string Ξ³β‰ Ξ±,Ξ².

The latter property enables to reconfigure between a distinct pair of codewords, while avoiding getting too (say, 13) close to any other codewords. Specifically, a standard concatenation of Reed–Solomon codes and Hadamard codes [1, 13, 16] suffices to meet the list decodabilityΒ [16] and the reconfigurability, which only involves an elementary proof. Note that the reconfigurability of Hadamard codes has been investigated by OhsakaΒ [35].

Owing to Theorem 1.5, we eventually implement the actual circuit Ξ¦:{0,1}2⁒p⁒(n)β†’{0,1} such that Φ⁒(f∘g)=1 if and only if

  1. 1.

    both f and g are 14-close to some codewords of 𝖀𝗇𝖼, and

  2. 2.

    if f and g are 13-close to 𝖀𝗇𝖼⁑(Ξ±) and 𝖀𝗇𝖼⁑(Ξ²), respectively, then C⁒(α∘β)=1.

(The difference from Ξ¦~1 and Ξ¦~2 of Examples 1.3 andΒ 1.4 is highlighted.) Intuitively speaking, the threshold gap between the first and second conditions enables us to bypass the issues of the two naive failed attempts at the same time.

Composition (Section 3.3)

The second step is composition [2, 3], which builds a PCRP system for a β€œrobust” version of Circuit SAT Reconfiguration. Given a circuit Ξ¦:{0,1}2⁒p⁒(n)β†’{0,1} and a pair of its satisfying assignments σ𝗂𝗇𝗂,σ𝖾𝗇𝖽 produced by the robustization step, we shall construct a verifier 𝒱 and a pair of proofs Π𝗂𝗇𝗂,Ξ π–Ύπ—‡π–½βˆˆ{0,1}poly(n) such that the following hold (Lemma 3.8):

  • β– 

    (Perfect completeness) If C is a Yes instance, then there exists a reconfiguration sequence Ξ β†’ from Π𝗂𝗇𝗂 to Π𝖾𝗇𝖽 such that 𝒱 accepts every proof in Ξ β†’ with probability 1.

  • β– 

    (Soundness) If C is a No instance, then every reconfiguration sequence Ξ β†’ from Π𝗂𝗇𝗂 to Π𝖾𝗇𝖽 contains some proof that is rejected by 𝒱 with probability more than 12.

A naive failed attempt is to just feed Ξ¦ to an assignment tester π’œ as in the 𝐍𝐏 regime [11]. Given oracle access to an assignment Οƒβˆˆ{0,1}2⁒p⁒(n) and an auxiliary proof Ο€βˆˆ{0,1}ℓ⁒(n), π’œ meets the following conditions:

  • β– 

    If Φ⁒(Οƒ)=1, then there exists a proof Ο€ such that π’œΟƒβˆ˜Ο€β’(Ξ¦) accepts with probability 1.

  • β– 

    If Οƒ is Ξ΅-far from every satisfying assignment to Ξ¦, then π’œΟƒβˆ˜Ο€β’(Ξ¦) rejects with probability Ω⁒(Ξ΅) for every proof Ο€.

Define Ξ π—‚π—‡π—‚β‰”Οƒπ—‚π—‡π—‚βˆ˜Ο€π—‚π—‡π—‚ and Ξ π–Ύπ—‡π–½β‰”Οƒπ–Ύπ—‡π–½βˆ˜Ο€π–Ύπ—‡π–½ for some proofs π𝗂𝗇𝗂,Ο€π–Ύπ—‡π–½βˆˆ{0,1}ℓ⁒(n) such that both π’œΞ π—‚π—‡π—‚β’(Ξ¦) and π’œΞ π–Ύπ—‡π–½β’(Ξ¦) accept with probability 1. The robust soundness of Circuit SAT Reconfiguration implies the aforementioned soundness. On the other hand, the perfect completeness would be broken because we need to reconfigure between Π𝗂𝗇𝗂 and Π𝖾𝗇𝖽, which may be significantly different.

We resolve this issue by creating twins of proofs Ο€1,Ο€2 so that a kind of β€œredundancy” is ensured. Our actual PCRP verifier 𝒱 runs π’œΟƒβˆ˜Ο€1⁒(Ξ¦) and π’œΟƒβˆ˜Ο€2⁒(Ξ¦) independently, and accepts if (at least) either of the runs accepted. The perfect completeness is almost immediate by definition of 𝒱. If Οƒ is Ξ΅-far from every satisfying assignment to Ξ¦, then 𝒱 rejects with probability Ω⁒(Ξ΅2) for every alleged proofs Ο€1,Ο€2, implying the desired soundness.

2 Preliminaries

Notations and Definitions

For a nonnegative integer nβˆˆβ„•, let [n]≔{1,2,…,n}. The base of logarithms is 2. A sequence of a finite number of elements a(1),…,a(T) is denoted by aβ†’=(a(1),…,a(T)), and we write a∈aβ†’ to indicate that a appears in aβ†’ (at least once). The symbol ∘ stands for a concatenation of two strings, βŸ¨β‹…,β‹…βŸ© for the inner product, 𝔽q with a prime power q for the finite field with q elements, 0n for 0⁒⋯⁒0⏟n⁒ times, and 1n for 1⁒⋯⁒1⏟n⁒ times. Let Ξ£ denote a finite set called alphabet. For a string f∈Σn and an index set IβŠ†[n], we use f|I∈ΣI to denote the restriction of f to I. The relative Hamming distance between two strings f,g∈Σn, denoted by δ⁑(f,g), is defined as the fraction of positions at which f and g differ; namely,

δ⁑(f,g)≔ℙi∼[n][f⁒(i)β‰ g⁒(i)]. (2.1)

We say that f is Ξ΅-close to g if δ⁑(f,g)β©½Ξ΅ and Ξ΅-far from g if δ⁑(f,g)>Ξ΅. Analogous notations are used for a set of strings SβŠ†Ξ£n; e.g., δ⁑(f,S)≔ming∈S⁑δ⁑(f,g) and f is Ξ΅-close to S if δ⁑(f,S)β©½Ξ΅.

2.1 Error-Correcting Codes

Here, we introduce error-correcting codes, followed by two examples.

Definition 2.1 (error-correcting code).

For a real ρ∈[0,1], a function 𝖀𝗇𝖼:Ξ£kβ†’Ξ£n is an error-correcting code with relative distance ρ if δ⁑(𝖀𝗇𝖼⁑(Ξ±),𝖀𝗇𝖼⁑(Ξ²))⩾ρ for every distinct strings Ξ±β‰ Ξ²βˆˆΞ£k. Each 𝖀𝗇𝖼⁑(Ξ±) for α∈Σk is called a codeword of 𝖀𝗇𝖼. Denote by 𝖀𝗇𝖼⁑(β‹…) the set of all codewords of 𝖀𝗇𝖼.

Definition 2.2 (Reed–Solomon code [41]).

For a finite field 𝔽 and two positive integers k,n such that kβ©½nβ©½|𝔽|, the Reed–Solomon code is defined as a function 𝖱𝖲𝔽:𝔽k→𝔽n such that 𝖱𝖲𝔽⁑(Ξ±)≔(fα⁒(x1),…,fα⁒(xn)) for each string Ξ±βˆˆπ”½k, where fα⁒(x)β‰”βˆ‘i∈[k]α⁒(i)β‹…xiβˆ’1 and x1,…,xn are n distinct elements of 𝔽.

Definition 2.3 (Hadamard code).

For a positive integer n, the Hadamard code is defined as a function 𝖧𝖺𝖽:{0,1}nβ†’{0,1}2n such that 𝖧𝖺𝖽⁑(Ξ±)≔(⟨α,x1⟩,…,⟨α,x2n⟩) for each string α∈{0,1}n, where xi is the ith string of {0,1}n.444The inner product is taken modulo 2.

The relative distance of Reed–Solomon codes and Hadamard codes is nβˆ’k+1n and 12, respectively, see, e.g., [17]. Moreover, 𝖧𝖺𝖽⁑(Ξ±) and 𝖧𝖺𝖽⁑(Ξ²) for every distinct strings Ξ±β‰ Ξ²βˆˆ{0,1}n differ in exactly half the bits.

2.2 Verifiers and Assignment Testers

Subsequently, we introduce the notion of verifier, followed by assignment tester [12] (a.k.a. PCP of proximity [4]).

Definition 2.4 (verifier).

A verifier with randomness complexity r:β„•β†’β„• and query complexity q:β„•β†’β„• is a probabilistic polynomial-time algorithm 𝒱 that given an input x∈{0,1}βˆ—, tosses r=r⁒(|x|) random bits R∈{0,1}r and uses R to generate a sequence of q=q⁒(|x|) queries I=(i1,…,iq) and a circuit D:{0,1}qβ†’{0,1}. Given an input x∈{0,1}βˆ— and oracle access to a proof Ο€βˆˆ{0,1}βˆ—, denote 𝒱’s (randomized) output by 𝒱π⁒(x)≔D⁒(Ο€|I) over the randomness of R. We say that 𝒱⁒(x) accepts Ο€ or simply 𝒱π⁒(x) accepts if 𝒱π⁒(x)=1, and that 𝒱π⁒(x) rejects if 𝒱π⁒(x)=0.

Definition 2.5 (assignment tester [4, 12]).

An assignment tester with rejection rate ΞΊ>0 is a verifier π’œ such that for a polynomial-size circuit Ξ¦:{0,1}nβ†’{0,1} (as explicit input) and oracle access to its assignment y∈{0,1}n (as implicit input) and a proof Ο€βˆˆ{0,1}βˆ—, the following hold:

  • β– 

    (Perfect completeness) If Φ⁒(y)=1, then there exists a proof Ο€βˆˆ{0,1}βˆ— such that π’œβ’(x) accepts yβˆ˜Ο€ with probability 1; namely,

    βˆƒΟ€βˆˆ{0,1}βˆ—,β„™[π’œyβˆ˜Ο€β’(x)=1]=1. (2.2)
  • β– 

    (Soundness) If y is Ξ΅-far from every satisfying assignment to Ξ¦, then for every proof Ο€βˆˆ{0,1}βˆ—, π’œβ’(x) rejects yβˆ˜Ο€ with probability more than ΞΊβ‹…Ξ΅; namely,

    βˆ€Ο€βˆˆ{0,1}βˆ—,β„™[π’œyβˆ˜Ο€β’(x)=0]>ΞΊβ‹…Ξ΅. (2.3)

There exists an assignment tester with randomness complexity π’ͺ⁑(log⁑n), query complexity π’ͺ⁑(1), and rejection rate Ω⁒(1), described as follows.

Theorem 2.6 ([4, 12]).

There exists an assignment tester π’œ with randomness complexity r⁒(n)=π’ͺ⁑(log⁑n), query complexity q⁒(n)=π’ͺ⁑(1), and rejection rate ΞΊ>0. Moreover, for a polynomial-size circuit Ξ¦:{0,1}nβ†’{0,1} and its satisfying assignment y∈{0,1}n, a proof Ο€βˆˆ{0,1}βˆ— such that π’œyβˆ˜Ο€β’(x) accepts with probability 1 can be computed in polynomial time.

3 A Simple Proof of the PCRP Theorem

In this section, we present a simple proof of the Probabilistically Checkable Reconfiguration Proof (PCRP) theorem. For a pair of proofs π𝗂𝗇𝗂,Ο€π–Ύπ—‡π–½βˆˆ{0,1}n, a reconfiguration sequence from π𝗂𝗇𝗂 to π𝖾𝗇𝖽 is defined as a sequence Ο€β†’=(Ο€(1),…,Ο€(T)) over {0,1}n such that Ο€(1)=π𝗂𝗇𝗂, Ο€(T)=π𝖾𝗇𝖽, and Ο€(t) and Ο€(t+1) differ in at most one bit for every t. The PCRP theorem is formally stated as follows.

Theorem 3.1 (Probabilistically Checkable Reconfiguration Proof theorem [22, 29]).

A language LβŠ†{0,1}βˆ— is in 𝐏𝐒𝐏𝐀𝐂𝐄 if and only if there exists a verifier 𝒱 with randomness complexity r⁒(n)=π’ͺ⁑(log⁑n) and query complexity q⁒(n)=π’ͺ⁑(1) and a pair of polynomial-time computable proofs π𝗂𝗇𝗂,π𝖾𝗇𝖽:{0,1}βˆ—β†’{0,1}βˆ— such that the following hold for every input x∈{0,1}βˆ—:

  • β– 

    (Completeness) If x∈L, then there exists a reconfiguration sequence Ο€β†’=(Ο€(1),…,Ο€(T)) from π𝗂𝗇𝗂⁒(x) to π𝖾𝗇𝖽⁒(x) such that 𝒱⁒(x) accepts every proof Ο€(t) in Ο€β†’ with probability 1; namely,

    βˆ€t∈[T],β„™[𝒱π(t)⁒(x)=1]=1. (3.1)
  • β– 

    (Soundness) If xβˆ‰L, then every reconfiguration sequence Ο€β†’=(Ο€(1),…,Ο€(T)) from π𝗂𝗇𝗂⁒(x) to π𝖾𝗇𝖽⁒(x) contains some proof Ο€(t) that is rejected by 𝒱⁒(x) with probability more than 12; namely,

    βˆƒt∈[T],β„™[𝒱π(t)⁒(x)=0]>12. (3.2)

Since the β€œif” direction of Theorem 3.1 is obvious (see, e.g., [22]), we prove the β€œonly-if” direction; i.e., we will construct a PCRP system for a 𝐏𝐒𝐏𝐀𝐂𝐄-complete language in the remainder of this section.

3.1 Succinct Reach and 𝐏𝐒𝐏𝐀𝐂𝐄-completeness

We first introduce a 𝐏𝐒𝐏𝐀𝐂𝐄-complete problem called Succinct Reach, e.g., [14, 40], for which we design a PCRP system. The input of Succinct Reach is specified by a polynomial-size circuit C:{0,1}2⁒nβ†’{0,1}. Informally, C β€œsuccinctly” represents an exponentially large graph G over {0,1}n such that a pair of β€œvertices” Ξ±,β∈{0,1}n are adjacent in G if and only if C⁒(α∘β)=1. Hereafter, we restrict C to satisfy the following conditions:

(C1)

C⁒(α∘β)=C⁒(β∘α) for every strings α,β∈{0,1}n (i.e., G is undirected), and

(C2)

C⁒(α∘α)=1 for every string α∈{0,1}n (i.e., G has self-loops at every vertex).

For four strings α𝗂𝗇𝗂,β𝗂𝗇𝗂,α𝖾𝗇𝖽,Ξ²π–Ύπ—‡π–½βˆˆ{0,1}n, a reconfiguration edge sequence from Ξ±π—‚π—‡π—‚βˆ˜Ξ²π—‚π—‡π—‚ to Ξ±π–Ύπ—‡π–½βˆ˜Ξ²π–Ύπ—‡π–½ is a sequence (Ξ±(1)∘β(1),…,Ξ±(T)∘β(T)) over {0,1}2⁒n such that Ξ±(1)∘β(1)=Ξ±π—‚π—‡π—‚βˆ˜Ξ²π—‚π—‡π—‚, Ξ±(T)∘β(T)=Ξ±π–Ύπ—‡π–½βˆ˜Ξ²π–Ύπ—‡π–½, and (Ξ±(t)=Ξ±(t+1) or Ξ²(t)=Ξ²(t+1)) for every t. We are now ready to define the Succinct Reach problem.

Problem 3.2.

Given a polynomial-size circuit C:{0,1}2⁒nβ†’{0,1} that satisfies (C1) and (C2), Succinct Reach asks to decide if there exists a reconfiguration edge sequence (Ξ±(1)∘β(1),…,Ξ±(T)∘β(T)) from 0n∘0n to 1n∘1n such that C⁒(Ξ±(t)∘β(t))=1 for every t∈[T].

As an immediate corollary of Hirahara and OhsakaΒ [22, Proposition 5.3], we have the 𝐏𝐒𝐏𝐀𝐂𝐄-completeness of Succinct Reach.

Corollary 3.3 (from [22, Proposition 5.3]).

Succinct Reach is 𝐏𝐒𝐏𝐀𝐂𝐄-complete.

3.2 Reducing Succinct Reach to β€œRobust” Version of Circuit SAT Reconfiguration

We construct a polynomial-time reduction from Succinct Reach to a β€œrobust” version of Circuit SAT Reconfiguration. Given a polynomial-size circuit Ξ¦:{0,1}nβ†’{0,1} and a pair of its satisfying assignments σ𝗂𝗇𝗂,Οƒπ–Ύπ—‡π–½βˆˆ{0,1}n, Circuit SAT Reconfiguration asks to decide if there exists a reconfiguration sequence Οƒβ†’=(Οƒ(1),…,Οƒ(T)) from σ𝗂𝗇𝗂 to σ𝖾𝗇𝖽 such that Φ⁒(Οƒ(t))=1 for every t. The robust soundness requests that every reconfiguration sequence Οƒβ†’ from σ𝗂𝗇𝗂 to σ𝖾𝗇𝖽 contains some assignment that is Ω⁒(1)-far from every satisfying assignment to Ξ¦. To achieve this requirement, we encode each β€œvertex” represented by a polynomial-size circuit C:{0,1}2⁒nβ†’{0,1} of Succinct Reach using a special error-correcting code that enjoys list decodability and reconfigurability.

Concatenated Codes, List Decodability, and Reconfigurability

Our error-correcting code 𝖀𝗇𝖼 is obtained as a standard concatenation of Reed–Solomon codes and Hadamard codes [13], see also [1, ChapterΒ 19] and [16, ChapterΒ 8]. Let nβˆˆβ„• be a positive integer that is a power of 2 for simplicity of notation. Define B≔28=256, Ξ΅0≔1B, and 𝔽≔𝔽2log⁑(B⁒n). Note that |𝔽|=B⁒n. The concatenation of a Reed–Solomon code 𝖱𝖲𝔽:𝔽n→𝔽B⁒n with a Hadamard code 𝖧𝖺𝖽:{0,1}log⁑(B⁒n)β†’{0,1}B⁒n, denoted by π–§π–Ίπ–½βˆ˜π–±π–²π”½:{0,1}n⁒log⁑(B⁒n)β†’{0,1}(B⁒n)2, is defined as follows. By a canonical bijection between elements in 𝔽 and strings in {0,1}log⁑|𝔽|, we consider 𝖱𝖲𝔽 as an outer code from {0,1}n⁒log⁑|𝔽| to 𝔽B⁒n whereas 𝖧𝖺𝖽 as an inner code from 𝔽 to {0,1}|𝔽|. For each string α∈{0,1}n⁒log⁑(B⁒n), we define (π–§π–Ίπ–½βˆ˜π–±π–²π”½)⁒(Ξ±) as

(π–§π–Ίπ–½βˆ˜π–±π–²π”½)(Ξ±)≔(𝖧𝖺𝖽(𝖱𝖲𝔽(Ξ±)1),…,𝖧𝖺𝖽(𝖱𝖲𝔽(Ξ±)B⁒n)), (3.3)

where 𝖱𝖲𝔽(Ξ±)kβˆˆπ”½ is the kth symbol of 𝖱𝖲𝔽⁑(Ξ±)βˆˆπ”½B⁒n. Define finally 𝖀𝗇𝖼:{0,1}nβ†’{0,1}p⁒(n) as 𝖀𝗇𝖼⁑(Ξ±)≔(π–§π–Ίπ–½βˆ˜π–±π–²π”½)⁒(α∘0n⁒log⁑(B⁒n)βˆ’n) for each string α∈{0,1}n, where p⁒(n)≔(B⁒n)2. Note that the relative distance of π–§π–Ίπ–½βˆ˜π–±π–²π”½ (and thus 𝖀𝗇𝖼) is at least the product of the relative distances of the outer and inner codes, i.e., 12β‹…B⁒nβˆ’n+1B⁒n>1βˆ’Ξ΅02.

GuruswamiΒ [16] established the list decodability of π–§π–Ίπ–½βˆ˜π–±π–²π”½ for general finite field 𝔽, which implies the following.

Theorem 3.4 (list decodability of 𝖀𝗇𝖼 [16, TheoremΒ 8.2]).

There exists a polynomial-time list-decoding algorithm π’Ÿπ–€π—‡π–Ό that takes a string f∈{0,1}p⁒(n) and produces a list of all codewords in 𝖀𝗇𝖼⁑(β‹…) that are ρ-close to f, where

ρ≔1βˆ’Ξ΅02βˆ’π’ͺ⁑(1n2). (3.4)

Moreover, 𝖀𝗇𝖼 enjoys the following reconfigurability property.

Lemma 3.5 (reconfigurability of 𝖀𝗇𝖼).

For every distinct strings Ξ±β‰ Ξ²βˆˆ{0,1}n, there exists a reconfiguration sequence fβ†’=(f(1),…,f(T)) from 𝖀𝗇𝖼⁑(Ξ±) to 𝖀𝗇𝖼⁑(Ξ²) over {0,1}p⁒(n) such that for every string γ∈{0,1}nβˆ–{Ξ±,Ξ²} and every t∈[T],

min⁑{δ⁑(f(t),𝖀𝗇𝖼⁑(Ξ±)),δ⁑(f(t),𝖀𝗇𝖼⁑(Ξ²))} β©½14, (3.5)
δ⁑(f(t),𝖀𝗇𝖼⁑(Ξ³)) >12βˆ’Ξ΅0βˆ’π’ͺ⁑(1n). (3.6)
Proof.

For any distinct strings Ξ±β‰ Ξ²βˆˆ{0,1}n, let Ξ±Β―β‰”Ξ±βˆ˜0n⁒log⁑(B⁒n)βˆ’n and Ξ²Β―β‰”Ξ²βˆ˜0n⁒log⁑(B⁒n)βˆ’n. Note that 𝖀𝗇𝖼⁑(Ξ±)=(π–§π–Ίπ–½βˆ˜π–±π–²π”½)⁒(Ξ±Β―) and 𝖀𝗇𝖼⁑(Ξ²)=(π–§π–Ίπ–½βˆ˜π–±π–²π”½)⁒(Ξ²Β―). Think of a string in {0,1}(B⁒n)2 as consisting of B⁒n blocks in {0,1}B⁒n. Recall that if 𝖱𝖲𝔽(Ξ±Β―)k≠𝖱𝖲𝔽(Ξ²Β―)k for the kth block, then 𝖧𝖺𝖽(𝖱𝖲𝔽(Ξ±Β―)k) and 𝖧𝖺𝖽(𝖱𝖲𝔽(Ξ²Β―)k) differ in exactly B⁒n2 bits owing to the relative distance of 𝖧𝖺𝖽. Consider a reconfiguration sequence fβ†’ from 𝖀𝗇𝖼⁑(Ξ±) to 𝖀𝗇𝖼⁑(Ξ²) obtained by the following procedure.

Let f∘=(f1∘,…,fB⁒n∘)∈({0,1}B⁒n)B⁒n be any intermediate string of fβ†’. We first prove Eq. 3.5 for f∘. By construction, B⁒n blocks of f∘ can be partitioned into XβˆͺYβˆͺZ=[B⁒n] such that fk∘=𝖧𝖺𝖽(𝖱𝖲𝔽(Ξ±Β―)k) for every k∈X, fk∘=𝖧𝖺𝖽(𝖱𝖲𝔽(Ξ²Β―)k) for every k∈Y, and fk∘ is neither 𝖧𝖺𝖽(𝖱𝖲𝔽(Ξ±Β―)k) nor 𝖧𝖺𝖽(𝖱𝖲𝔽(Ξ²Β―)k) for every k∈Z (i.e., it is on the way of transition). Since |Z|β©½1 and every block fk∘ is 12-close to both 𝖧𝖺𝖽(𝖱𝖲𝔽(Ξ±Β―)k) and 𝖧𝖺𝖽(𝖱𝖲𝔽(Ξ²Β―)k), we derive

δ⁑(f∘,𝖀𝗇𝖼⁑(Ξ±))β©½1B⁒nβ‹…(0β‹…|X|+12β‹…|Y|+12β‹…|Z|)β©½|Y|+|Z|2⁒B⁒n,δ⁑(f∘,𝖀𝗇𝖼⁑(Ξ²))β©½1B⁒nβ‹…(12β‹…|X|+0β‹…|Y|+12β‹…|Z|)β©½|X|+|Z|2⁒B⁒n, (3.7)
⟹min⁑{δ⁑(f∘,𝖀𝗇𝖼⁑(Ξ±)),δ⁑(f∘,𝖀𝗇𝖼⁑(Ξ²))}β©½min⁑{|X|+|Z|,|Y|+|Z|}2⁒B⁒nβ©½B⁒n22⁒B⁒n=14, (3.8)

where we used the fact that min⁑{|X|+|Z|,|Y|+|Z|}⩽B⁒n2.

We then prove Eq. 3.6 for f∘. Let γ∈{0,1}nβˆ–{Ξ±,Ξ²} and Ξ³Β―β‰”Ξ³βˆ˜0n⁒log⁑(B⁒n)βˆ’n. Since the relative distance of 𝖱𝖲𝔽 is 1βˆ’Ξ΅0, we have 𝖱𝖲𝔽(Ξ³Β―)k=𝖱𝖲𝔽(Ξ±Β―)k or 𝖱𝖲𝔽(Ξ³Β―)k=𝖱𝖲𝔽(Ξ²Β―)k for at most 2⁒Ρ0β‹…B⁒n number of k’s in XβˆͺY. Therefore, Ξ΄(fk∘,𝖧𝖺𝖽(𝖱𝖲𝔽(Ξ³Β―)k))=12 for at least (|XβˆͺY|βˆ’2⁒Ρ0β‹…B⁒n) number of k’s in XβˆͺY. Consequently, we get

δ⁑(f∘,𝖀𝗇𝖼⁑(Ξ³))β©Ύ1B⁒nβ‹…12⁒(|X|+|Y|βˆ’2⁒Ρ0β‹…B⁒n)β©Ύ12βˆ’Ξ΅0βˆ’π’ͺ⁑(1n), (3.9)

where we used the fact that |X|+|Y|β©ΎB⁒nβˆ’1, as desired. β—€

β–ΆΒ Remark 3.6.

In the proof of Lemma 3.5, we essentially used the following simple properties of Hadamard and Reed–Solomon codes:

  • β– 

    Since δ⁑(𝖀𝗇𝖼⁑(Ξ±),𝖀𝗇𝖼⁑(Ξ²))β©½12 for every distinct strings Ξ±β‰ Ξ² by the relative distance of Hadamard codes, we can transform 𝖀𝗇𝖼⁑(Ξ±) into 𝖀𝗇𝖼⁑(Ξ²) without getting 14-far from both 𝖀𝗇𝖼⁑(Ξ±) and 𝖀𝗇𝖼⁑(Ξ²).

  • β– 

    Since δ⁑(𝖱𝖲𝔽⁑(Ξ±),𝖱𝖲𝔽⁑(Ξ²))β©½1βˆ’Ξ΅0 for every distinct strings Ξ±β‰ Ξ² by the relative distance of Reed–Solomon codes, we can transform 𝖱𝖲𝔽⁑(Ξ±) into 𝖱𝖲𝔽⁑(Ξ²) without getting close to any other codeword 𝖱𝖲𝔽⁑(Ξ³).

Reduction

Our reduction from Succinct Reach to (a β€œrobust” version of) Circuit SAT Reconfiguration is described as follows. Given a polynomial-size circuit C:{0,1}2⁒nβ†’{0,1} as an input of Succinct Reach, let 𝖀𝗇𝖼:{0,1}nβ†’{0,1}p⁒(n) be the proposed error-correcting code. Without loss of generality, we can assume that n is a power of 2 and sufficiently large so that Theorem 3.4 holds even if Eq. 3.4 is replaced by β€œΟβ‰”13” and Lemma 3.5 holds even if Eq. 3.6 is replaced by β€œΞ΄β‘(f(t),𝖀𝗇𝖼⁑(Ξ³))β©Ύ25>13.” Create a new polynomial-size circuit Ξ¦:{0,1}2⁒p⁒(n)β†’{0,1} such that Φ⁒(f∘g)=1 for two strings f,g∈{0,1}p⁒(n) if and only if the following hold:

max⁑{δ⁑(f,𝖀𝗇𝖼⁑(β‹…)),δ⁑(g,𝖀𝗇𝖼⁑(β‹…))}β©½14, (3.10)
βˆ€Ξ±,β∈{0,1}n,(max⁑{δ⁑(f,𝖀𝗇𝖼⁑(Ξ±)),δ⁑(g,𝖀𝗇𝖼⁑(Ξ²))}β©½13⟹C⁒(Ξ±,Ξ²)=1). (3.11)

Specifically, Ξ¦ can be implemented as follows.

Define σ𝗂𝗇𝗂,Οƒπ–Ύπ—‡π–½βˆˆ{0,1}2⁒p⁒(n) as σ𝗂𝗇𝗂≔𝖀𝗇𝖼⁑(0n)βˆ˜π–€π—‡π–Όβ‘(0n) and σ𝖾𝗇𝖽≔𝖀𝗇𝖼⁑(1n)βˆ˜π–€π—‡π–Όβ‘(1n). Observe easily that Φ⁒(σ𝗂𝗇𝗂)=1 and Φ⁒(σ𝖾𝗇𝖽)=1, which completes the description of the reduction.

Correctness

We obtain the following β€œperfect” completeness and β€œrobust” soundness.

Lemma 3.7.

The following hold:

  • β– 

    (Perfect completeness) If C is a Yes instance, then there exists a reconfiguration sequence Οƒβ†’=(Οƒ(1),…,Οƒ(T)) from σ𝗂𝗇𝗂 to σ𝖾𝗇𝖽 such that Φ⁒(Οƒ(t))=1 for every t∈[T].

  • β– 

    (Robust soundness) If C is a No instance, then every reconfiguration sequence Οƒβ†’=(Οƒ(1),…,Οƒ(T)) from σ𝗂𝗇𝗂 to σ𝖾𝗇𝖽 contains some assignment Οƒ(t) that is 148-far from every satisfying assignment to Ξ¦.

Proof.

We first prove the perfect completeness. Suppose that C is a Yes instance; i.e., there exists a reconfiguration edge sequence (Ξ±(1)∘β(1),…,Ξ±(T)∘β(T)) from 0n∘0n to 1n∘1n such that C⁒(Ξ±(t)∘β(t))=1 for every t∈[T]. Consider a reconfiguration sequence Οƒtβ†’ from 𝖀𝗇𝖼⁑(Ξ±(t))βˆ˜π–€π—‡π–Όβ‘(Ξ²(t)) to 𝖀𝗇𝖼⁑(Ξ±(t+1))βˆ˜π–€π—‡π–Όβ‘(Ξ²(t+1)) for each t∈[Tβˆ’1] obtained by the following procedure.

We claim that any intermediate assignment Οƒβˆ˜ of Οƒtβ†’ satisfies Ξ¦. Suppose first that Ξ²(t)=Ξ²(t+1) but Ξ±(t)β‰ Ξ±(t+1); namely, Οƒβˆ˜ is of the form fβˆ˜βˆ˜π–€π—‡π–Όβ‘(Ξ²(t)) for some string f∘∈{0,1}p⁒(n). Since δ⁑(f∘,𝖀𝗇𝖼⁑(β‹…))β©½14 by Lemma 3.5, Οƒβˆ˜ satisfies Eq. 3.10. Observe further that δ⁑(f∘,𝖀𝗇𝖼⁑(Ξ³))>13 for every string Ξ³βˆ‰{Ξ±(t),Ξ±(t+1)} by Lemma 3.5, δ⁑(𝖀𝗇𝖼⁑(Ξ²(t)),𝖀𝗇𝖼⁑(Ξ³))β©Ύ12 for every string Ξ³β‰ Ξ²(t), and C⁒(Ξ±(t)∘β(t))=C⁒(Ξ±(t+1)∘β(t))=1 by assumption; i.e., Οƒβˆ˜ satisfies Eq. 3.11, implying that Φ⁒(Οƒβˆ˜)=1. Suppose next that Ξ±(t)=Ξ±(t+1) but Ξ²(t)β‰ Ξ²(t+1). Similarly to the first case, we can show that Φ⁒(Οƒβˆ˜)=1. Suppose finally that Ξ±(t)=Ξ±(t+1) and Ξ²(t)=Ξ²(t+1), which is a trivial case. Consequently, concatenating Οƒtβ†’ for every t∈[Tβˆ’1], we obtain a reconfiguration sequence Οƒβ†’ from σ𝗂𝗇𝗂 to σ𝖾𝗇𝖽 consisting only of satisfying assignments to Ξ¦, which completes the proof the perfect completeness.

We then prove the robust soundness. Suppose that C is a No instance. Let Οƒβ†’=(Οƒ(1),…,Οƒ(T)) be any reconfiguration sequence from σ𝗂𝗇𝗂 to σ𝖾𝗇𝖽, where each Οƒ(t) is of the form f(t)∘g(t)∈{0,1}2⁒p⁒(n). Create then a sequence Ξ³β†’=(Ξ±(1)∘β(1),…,Ξ±(T)∘β(T)) over {0,1}2⁒n by β€œdecoding” Οƒβ†’; namely, Ξ±(t) and Ξ²(t) for each t are defined as follows:

Ξ±(t)≔argminα∈{0,1}nδ⁑(f(t),𝖀𝗇𝖼⁑(Ξ±))⁒ and ⁒β(t)≔argminβ∈{0,1}nδ⁑(g(t),𝖀𝗇𝖼⁑(Ξ²)), (3.12)

where ties are broken according to any prefixed order over {0,1}n. Note that Ξ±(1)=Ξ²(1)=0n and Ξ±(T)=Ξ²(T)=1n. Since Οƒ(t) and Οƒ(t+1) differ in at most one bit, Ξ±(t)=Ξ±(t+1) or Ξ²(t)=Ξ²(t+1) for every t; i.e., Ξ³β†’ is a valid reconfiguration edge sequence from 0n∘0n to 1n∘1n. In particular, Ξ³β†’ must contain Ξ±(t)∘β(t) such that C⁒(Ξ±(t)∘β(t))=0.

We will demonstrate that Οƒ(t) is 148-far from every satisfying assignment to Ξ¦. Let Οƒβˆ—=fβˆ—βˆ˜gβˆ—βˆˆ{0,1}2⁒p⁒(n) be any satisfying assignment to Ξ¦. There must exist a pair Ξ±βˆ—,Ξ²βˆ—βˆˆ{0,1}n such that δ⁑(fβˆ—,𝖀𝗇𝖼⁑(Ξ±βˆ—))β©½14, δ⁑(gβˆ—,𝖀𝗇𝖼⁑(Ξ²βˆ—))β©½14, and C⁒(Ξ±βˆ—βˆ˜Ξ²βˆ—)=1. Deduce that (1) fβˆ— is 13-far from 𝖀𝗇𝖼⁑(Ξ±(t)) or (2) gβˆ— is 13-far from 𝖀𝗇𝖼⁑(Ξ²(t)), because otherwise we have Φ⁒(fβˆ—βˆ˜gβˆ—)=0. Suppose first that δ⁑(fβˆ—,𝖀𝗇𝖼⁑(Ξ±(t)))>13, implying that Ξ±βˆ—β‰ Ξ±(t). Putting together, we have the following three inequalities in hand (see Figure 1):

δ⁑(fβˆ—,𝖀𝗇𝖼⁑(Ξ±(t))) >13, (by assumption) (3.13)
δ⁑(fβˆ—,𝖀𝗇𝖼⁑(Ξ±βˆ—)) β©½14, (by assumption) (3.14)
δ⁑(f(t),𝖀𝗇𝖼⁑(Ξ±(t))) ⩽δ⁑(f(t),𝖀𝗇𝖼⁑(Ξ±βˆ—)). (by definition of ⁒α(t)⁒) (3.15)

Simple calculation using the triangle inequality derives

δ⁑(fβˆ—,𝖀𝗇𝖼⁑(Ξ±(t)))⩽δ⁑(fβˆ—,f(t))+δ⁑(f(t),𝖀𝗇𝖼⁑(Ξ±(t)))⩽δ⁑(fβˆ—,f(t))+δ⁑(f(t),𝖀𝗇𝖼⁑(Ξ±βˆ—))⩽δ⁑(fβˆ—,f(t))+δ⁑(f(t),fβˆ—)+δ⁑(fβˆ—,𝖀𝗇𝖼⁑(Ξ±βˆ—))=2⋅δ⁑(f(t),fβˆ—)+δ⁑(fβˆ—,𝖀𝗇𝖼⁑(Ξ±βˆ—)), (3.16)
⟹δ⁑(f(t),fβˆ—)β©Ύ12β‹…(δ⁑(fβˆ—,𝖀𝗇𝖼⁑(Ξ±(t)))⏟>13βˆ’Ξ΄β‘(fβˆ—,𝖀𝗇𝖼⁑(Ξ±βˆ—))⏟⩽14)>124. (3.17)

Consequently, Οƒ(t) must be 148-far from Οƒβˆ—. Suppose next that δ⁑(gβˆ—,𝖀𝗇𝖼⁑(Ξ²(t)))>13. Similarly to the first case, we can show that δ⁑(g(t),gβˆ—)>124, deriving that Οƒ(t) is 148-far from Οƒβˆ—, which completes the proof of the robust soundness. β—€

Figure 1: Illustration of the proof of the robust soundness in Lemma 3.7. One one hand, f(t) is closer to 𝖀𝗇𝖼⁑(Ξ±(t)) than 𝖀𝗇𝖼⁑(Ξ±βˆ—) (denoted by blue crosshatch pattern). On the other hand, fβˆ— is 13-far from 𝖀𝗇𝖼⁑(Ξ±(t)) and 14-close to 𝖀𝗇𝖼⁑(Ξ±βˆ—) (denoted by red lines). The two regions must be 124-far from each other.

3.3 Composing Assignment Testers

We build a PCRP system for Circuit SAT Reconfiguration to complete the proof of Theorem 3.1.

Reduction

Our reduction from (a β€œrobust” version of) Circuit SAT Reconfiguration to a PCRP system is described as follows. Given a polynomial-size circuit Ξ¦:{0,1}2⁒p⁒(n)β†’{0,1} and a pair of its satisfying assignments σ𝗂𝗇𝗂,Οƒπ–Ύπ—‡π–½βˆˆ{0,1}p⁒(n) produced by Lemma 3.7, we apply Theorem 2.6 to obtain an assignment tester π’œ for Ξ¦ with randomness complexity π’ͺ⁑(log⁑n), query complexity π’ͺ⁑(1), and rejection rate ΞΊ>0. The proof length of π’œ, denoted by ℓ⁒(n), can be bounded by some polynomial in the size of Ξ¦ and thus n. Our PCRP verifier 𝒱 is given oracle access to an assignment Οƒβˆˆ{0,1}2⁒p⁒(n) as implicit input and twins of proof Ο€1,Ο€2∈{0,1}ℓ⁒(n). Then, 𝒱 runs π’œΟƒβˆ˜Ο€1⁒(Ξ¦) and π’œΟƒβˆ˜Ο€2⁒(Ξ¦) independently and accepts if (at least) either of the runs accepted, which is described as follows.

By Theorem 2.6, compute two proofs π𝗂𝗇𝗂,Ο€π–Ύπ—‡π–½βˆˆ{0,1}ℓ⁒(n) in polynomial time such that π’œβ’(Ξ¦) accepts Οƒπ—‚π—‡π—‚βˆ˜Ο€π—‚π—‡π—‚ and Οƒπ–Ύπ—‡π–½βˆ˜Ο€π–Ύπ—‡π–½ with probability 1. Define two proofs Π𝗂𝗇𝗂,Ξ π–Ύπ—‡π–½βˆˆ{0,1}2⁒p⁒(n)+2⁒ℓ⁒(n) as Ξ π—‚π—‡π—‚β‰”Οƒπ—‚π—‡π—‚βˆ˜Ο€π—‚π—‡π—‚βˆ˜Ο€π—‚π—‡π—‚ and Ξ π–Ύπ—‡π–½β‰”Οƒπ–Ύπ—‡π–½βˆ˜Ο€π–Ύπ—‡π–½βˆ˜Ο€π–Ύπ—‡π–½. Observe that 𝒱 accepts Π𝗂𝗇𝗂 and Π𝖾𝗇𝖽 with probability 1, which completes the description of the PCRP system.

Correctness

We show the following perfect completeness and soundness.

Lemma 3.8.

The following hold:

  • β– 

    (Perfect completeness) If C is a Yes instance, then there exists a reconfiguration sequence Ξ β†’ from Π𝗂𝗇𝗂 to Π𝖾𝗇𝖽 such that 𝒱 accepts every proof in Ξ β†’ with probability 1.

  • β– 

    (Soundness) If C is a No instance, then every reconfiguration sequence Ξ β†’ from Π𝗂𝗇𝗂 to Π𝖾𝗇𝖽 contains some proof that is rejected by 𝒱 with probability more than (ΞΊ48)2.

Proof.

We first prove the perfect completeness. Suppose that C is a Yes instance. By Lemma 3.7, there exists a reconfiguration sequence Οƒβ†’=(Οƒ(1),…,Οƒ(T)) from σ𝗂𝗇𝗂 to σ𝖾𝗇𝖽 such that Φ⁒(Οƒ(t))=1 for every t. Let Ο€(t) be a proof such that π’œβ’(Ξ¦) accepts Οƒ(t)βˆ˜Ο€(t) with probability 1. In particular, Ο€(1)=π𝗂𝗇𝗂 and Ο€(T)=π𝖾𝗇𝖽. Consider a reconfiguration sequence Ξ β†’ from Π𝗂𝗇𝗂 to Π𝖾𝗇𝖽 obtained by the following procedure.

We claim that 𝒱 accepts any intermediate proof Π∘ of Ξ β†’ with probability 1. By construction, Π∘ is of the form Οƒβˆ˜βˆ˜Ο€1βˆ˜βˆ˜Ο€2∘ such that Οƒβˆ˜=Οƒ(t) and (Ο€1∘=Ο€(t) or Ο€2∘=Ο€(t)) for some t. Since π’œβ’(Ξ¦) always accepts Οƒ(t)βˆ˜Ο€(t), we find 𝒱 to accept Π∘ with probability 1, which completes the proof of the perfect completeness.

We then prove the soundness. Suppose that C is a No instance. Let Ξ β†’=(Ξ (1),…,Ξ (T)) be any reconfiguration sequence from Π𝗂𝗇𝗂 to Π𝖾𝗇𝖽. By Lemma 3.7, Ξ β†’ contains a proof Ξ (t)=Οƒ(t)βˆ˜Ο€1(t)βˆ˜Ο€2(t) such that Οƒ(t) is 148-far from every satisfying assignment to Ξ¦. Since π’œβ’(Ξ¦) rejects both Οƒ(t)βˆ˜Ο€1(t) and Οƒ(t)βˆ˜Ο€2(t) with probability more than ΞΊ48 by Theorem 2.6, 𝒱 rejects Ξ (t) with probability

β„™[(π’œβ’(Ξ¦)⁒ rejects ⁒σ(t)βˆ˜Ο€1(t))⁒ and ⁒(π’œβ’(Ξ¦)⁒ rejects ⁒σ(t)βˆ˜Ο€2(t))]>(ΞΊ48)2, (3.18)

which completes the proof of the soundness. β—€

The proof of Theorem 3.1 follows from 𝐏𝐒𝐏𝐀𝐂𝐄-completeness of Succinct Reach (Corollary 3.3) and its PCRP system (Lemma 3.8), where the soundness error can be reduced to 12 by repeating 𝒱 a constant number of times.

References

  • [1] Sanjeev Arora and Boaz Barak. Computational Complexity: A Modern Approach. Cambridge University Press, 2009. doi:10.1017/CBO9780511804090.
  • [2] Sanjeev Arora, Carsten Lund, Rajeev Motwani, Madhu Sudan, and Mario Szegedy. Proof verification and the hardness of approximation problems. Journal of the ACM, 45(3):501–555, 1998. doi:10.1145/278298.278306.
  • [3] Sanjeev Arora and Shmuel Safra. Probabilistic checking of proofs: A new characterization of NP. Journal of the ACM, 45(1):70–122, 1998. doi:10.1145/273865.273901.
  • [4] Eli Ben-Sasson, Oded Goldreich, Prahladh Harsha, Madhu Sudan, and Salil Vadhan. Robust PCPs of proximity, shorter PCPs, and applications to coding. SIAM Journal on Computing, 36(4):889–974, 2006. doi:10.1137/S0097539705446810.
  • [5] HansΒ L. Bodlaender, Carla Groenland, Jesper Nederlof, and CΓ©line Swennenhuis. Parameterized problems complete for nondeterministic FPT time and logarithmic space. Information and Computation, 300:105195, 2024. doi:10.1016/j.ic.2024.105195.
  • [6] HansΒ L. Bodlaender, Carla Groenland, and CΓ©line M.Β F. Swennenhuis. Parameterized complexities of dominating and independent set ceconfiguration. In Proceedings of the International Symposium on Parameterized and Exact Computation (IPEC), pages 9:1–9:16, 2021. doi:10.4230/LIPIcs.IPEC.2021.9.
  • [7] Paul Bonsma. The complexity of rerouting shortest paths. Theoretical Computer Science, 510:1–12, 2013. doi:10.1016/j.tcs.2013.09.012.
  • [8] Paul Bonsma and Luis Cereceda. Finding paths between graph colourings: PSPACE-completeness and superpolynomial distances. Theoretical Computer Science, 410(50):5215–5226, 2009. doi:10.1016/j.tcs.2009.08.023.
  • [9] Nicolas Bousquet, AmerΒ E. Mouawad, Naomi Nishimura, and Sebastian Siebertz. A survey on the parameterized complexity of reconfiguration problems. Computer Science Review, 53:100663, 2024. doi:10.1016/j.cosrev.2024.100663.
  • [10] Luis Cereceda, Jan vanΒ den Heuvel, and Matthew Johnson. Finding paths between 3-colorings. Journal of Graph Theory, 67(1):69–82, 2011. doi:10.1002/jgt.20514.
  • [11] Irit Dinur. The PCP theorem by gap amplification. Journal of the ACM, 54(3):12, 2007. doi:10.1145/1236457.1236459.
  • [12] Irit Dinur and Omer Reingold. Assignment testers: Towards a combinatorial proof of the PCP theorem. SIAM Journal on Computing, 36(4):975–1024, 2006. doi:10.1137/S0097539705446962.
  • [13] G.Β David Forney, Jr. Concatenated Codes. PhD thesis, Massachusetts Institute of Technology, 1965. URL: http://hdl.handle.net/1721.1/13449.
  • [14] Hana Galperin and Avi Wigderson. Succinct representations of graphs. Information and Control, 56(3):183–198, 1983. doi:10.1016/S0019-9958(83)80004-7.
  • [15] Parikshit Gopalan, PhokionΒ G. Kolaitis, Elitza Maneva, and ChristosΒ H. Papadimitriou. The connectivity of Boolean satisfiability: Computational and structural dichotomies. SIAM Journal on Computing, 38(6):2330–2355, 2009. doi:10.1137/07070440X.
  • [16] Venkatesan Guruswami. List Decoding of Error-Correcting Codes. PhD thesis, Massachusetts Institute of Technology, September 2001. URL: http://hdl.handle.net/1721.1/8700.
  • [17] Venkatesan Guruswami, Atri Rudra, and Madhu Sudan. Essential coding theory, 2019. Draft available at https://cse.buffalo.edu/faculty/atri/courses/coding-theory/book/.
  • [18] Arash Haddadan, Takehiro Ito, AmerΒ E. Mouawad, Naomi Nishimura, Hirotaka Ono, Akira Suzuki, and Youcef Tebbal. The complexity of dominating set reconfiguration. Theoretical Computer Science, 651:37–49, 2016. doi:10.1016/j.tcs.2016.08.016.
  • [19] RobertΒ A. Hearn and ErikΒ D. Demaine. PSPACE-completeness of sliding-block puzzles and other problems through the nondeterministic constraint logic model of computation. Theoretical Computer Science, 343(1-2):72–96, 2005. doi:10.1016/j.tcs.2005.05.008.
  • [20] RobertΒ A. Hearn and ErikΒ D. Demaine. Games, Puzzles, and Computation. A K Peters, Ltd., 2009.
  • [21] Shuichi Hirahara and Naoto Ohsaka. Optimal PSPACE-hardness of approximating set cover reconfiguration. In Proceedings of the International Colloquium on Automata, Languages, and Programming (ICALP), pages 85:1–85:18, 2024. doi:10.4230/LIPIcs.ICALP.2024.85.
  • [22] Shuichi Hirahara and Naoto Ohsaka. Probabilistically checkable reconfiguration proofs and inapproximability of reconfiguration problems. In Proceedings of the ACM Symposium on Theory of Computing (STOC), pages 1435–1445, 2024. doi:10.1145/3618260.3649667.
  • [23] Shuichi Hirahara and Naoto Ohsaka. Asymptotically optimal inapproximability of maxmin k-cut reconfiguration. In Proceedings of the International Colloquium on Automata, Languages, and Programming (ICALP), 2025. to appear.
  • [24] DucΒ A. Hoang. Combinatorial Reconfiguration, 2024. URL: https://reconf.wikidot.com/.
  • [25] Johan HΓ₯stad. Clique is hard to approximate within n1βˆ’Ξ΅. Acta Mathematica, 182:105–142, 1999. doi:10.1007/BF02392825.
  • [26] Johan HΓ₯stad. Some optimal inapproximability results. Journal of the ACM, 48(4):798–859, 2001. doi:10.1145/502090.502098.
  • [27] Takehiro Ito, ErikΒ D. Demaine, Nicholas J.Β A. Harvey, ChristosΒ H. Papadimitriou, Martha Sideri, Ryuhei Uehara, and Yushi Uno. On the complexity of reconfiguration problems. Theoretical Computer Science, 412(12-14):1054–1065, 2011. doi:10.1016/j.tcs.2010.12.005.
  • [28] Marcin KamiΕ„ski, Paul Medvedev, and Martin Milanič. Complexity of independent set reconfigurability problems. Theoretical Computer Science, 439:9–15, 2012. doi:10.1016/j.tcs.2012.03.004.
  • [29] Karthik C. S. and Pasin Manurangsi. On inapproximability of reconfiguration problems: PSPACE-hardness and some tight NP-hardness results. Electronic Colloquium on Computational Complexity, TR24-007, 2023. URL: http://eccc.weizmann.ac.il/report/2024/007.
  • [30] Daniel Lokshtanov and AmerΒ E. Mouawad. The complexity of independent set reconfiguration on bipartite graphs. ACM Transactions on Algorithms, 15(1):7:1–7:19, 2019. doi:10.1145/3280825.
  • [31] AmerΒ E. Mouawad, Naomi Nishimura, Venkatesh Raman, Narges Simjour, and Akira Suzuki. On the parameterized complexity of reconfiguration problems. Algorithmica, 78(1):274–297, 2017. doi:10.1007/s00453-016-0159-2.
  • [32] ChristinaΒ M. Mynhardt and Shahla Nasserasr. Reconfiguration of colourings and dominating sets in graphs. In 50 years of Combinatorics, Graph Theory, and Computing, chapterΒ 10, pages 171–191. Chapman and Hall/CRC, 2019.
  • [33] Naomi Nishimura. Introduction to reconfiguration. Algorithms, 11(4):52, 2018. doi:10.3390/a11040052.
  • [34] Naoto Ohsaka. Gap preserving reductions between reconfiguration problems. In Proceedings of the International Symposium on Theoretical Aspects of Computer Science (STACS), pages 49:1–49:18, 2023. doi:10.4230/LIPIcs.STACS.2023.49.
  • [35] Naoto Ohsaka. Alphabet reduction for reconfiguration problems. In Proceedings of the International Colloquium on Automata, Languages, and Programming (ICALP), pages 113:1–113:17, 2024. doi:10.4230/LIPIcs.ICALP.2024.113.
  • [36] Naoto Ohsaka. Gap amplification for reconfiguration problems. In Proceedings of the ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 1345–1366, 2024. doi:10.1137/1.9781611977912.54.
  • [37] Naoto Ohsaka. Tight inapproximability of target set reconfiguration. Computing Research Repository, abs/2402.15076, 2024. doi:10.48550/arXiv.2402.15076.
  • [38] Naoto Ohsaka. On approximate reconfigurability of label cover. Information Processing Letters, 189:106556, 2025. doi:10.1016/j.ipl.2024.106556.
  • [39] Naoto Ohsaka and Tatsuya Matsuoka. Reconfiguration problems on submodular functions. In Proceedings of the ACM International Conference on Web Search and Data Mining (WSDM), pages 764–774, 2022. doi:10.1145/3488560.3498382.
  • [40] ChristosΒ H. Papadimitriou and Mihalis Yannakakis. A note on succinct representations of graphs. Information and Control, 71(3):181–185, 1986. doi:10.1016/S0019-9958(86)80009-2.
  • [41] IrvingΒ S. Reed and Gustave Solomon. Polynomial codes over certain finite fields. Journal of the Society for Industrial and Applied Mathematics, 8(2):300–304, 1960. doi:10.1137/0108018.
  • [42] Jan vanΒ den Heuvel. The complexity of change. In Surveys in Combinatorics 2013, volume 409, pages 127–160. Cambridge University Press, 2013. doi:10.1017/CBO9781139506748.005.
  • [43] Marcin Wrochna. Reconfiguration in bounded bandwidth and tree-depth. Journal of Computer and System Sciences, 93:1–10, 2018. doi:10.1016/j.jcss.2017.11.003.