Yet Another Simple Proof of the PCRP Theorem
Abstract
The Probabilistically Checkable Reconfiguration Proof (PCRP) theorem, proven by Hirahara and Ohsaka (STOC 2024) [22] and Karthik C.Β S.Β and Manurangsi [29], provides a new PCP-type characterization of : A language is in if and only if there exists a probabilistic verifier and a pair of polynomial-time computable proofs such that the following hold for every input :
-
If , then can be transformed into by repeatedly flipping a single bit of the proof at a time, while making to accept every intermediate proof with probability .
-
If , then any such transformation induces a proof that is rejected by with probability more than .
The PCRP theorem finds many applications in -hardness of approximation for reconfiguration problems.
In this paper, we present an alternative proof of the PCRP theorem that is βsimplerβ than those of Hirahara and OhsakaΒ [22] and Karthik C.Β S.Β and ManurangsiΒ [29]. Our PCRP system is obtained by combining simple robustization and composition steps in a modular fashion, which renders its analysis more intuitive. The crux of implementing the robustization step is an error-correcting code that enjoys both list decodability and reconfigurability, the latter of which enables to reconfigure between a pair of codewords, while avoiding getting too close to any other codewords.
Keywords and phrases:
reconfiguration problems, hardness of approximation, probabilistic proof systemsCategory:
Track A: Algorithms, Complexity and Games2012 ACM Subject Classification:
Theory of computation Problems, reductions and completeness ; Theory of computation Error-correcting codesEditors:
Keren Censor-Hillel, Fabrizio Grandoni, JoΓ«l Ouaknine, and Gabriele PuppisSeries and Publisher:

1 Introduction
Given a combinatorial problem and a pair of its feasible solutions, can we find a βstep-by-stepβ transformation from one to the other that maintains the feasibility at every intermediate state? Combinatorial reconfiguration is a brand-new field in theoretical computer science, aimed at studying connectivity problems over the solution space of a combinatorial problem, called the source problem. One canonical reconfiguration problem is 3-SAT ReconfigurationΒ [15], whose source problem is 3-SAT: For a satisfiable -CNF formula and a pair of its satisfying assignments , we shall transform into by repeatedly flipping a single variable assignment at a time, while always preserving that is satisfied. Formally, a reconfiguration sequence from to is a sequence of assignments to , denoted by , such that , , and and differ in at most one variable.
Since Ito, Demaine, Harvey, Papadimitriou, Sideri, Uehara, and UnoΒ [27] initiated the unified framework for reconfiguration, many reconfiguration problems have been formulated, including those of Boolean satisfiability, constraint satisfaction problems, and graph problems.
Of particular interest has been to elucidate their computational complexity. On the hardness side, a reconfiguration problem generally becomes -complete if its source problem is intractable (say, -complete), e.g., reconfiguration problems of 3-SAT [15], 4-Coloring [8], and Independent Set [19, 20]. On the tractable side, a source problem in frequently leads to a reconfiguration problem that also belongs to , e.g., 2-SAT [15], Matching [27], and Spanning Tree [27]. Some exceptions are known, such as 3-Coloring [10] and Shortest Path [7]. Having established the complexity results of popular reconfiguration problems, researchers have turned their attention to parameterized complexity [5, 6, 9, 31] and restricted graph classes [18, 28, 30, 43]. We refer the readers to the surveys by Bousquet, Mouawad, Nishimura, and SiebertzΒ [9], Mynhardt and NasserasrΒ [32], NishimuraΒ [33], and van den HeuvelΒ [42] as well as the Combinatorial Reconfiguration wiki [24] for more hardness and algorithmic results.
In this paper, we consider approximability of reconfiguration problems, which has been recently studied from both hardness and algorithmic sides, e.g., [21, 22, 23, 29, 34, 35, 36, 37, 38, 39]. For a reconfiguration problem, its approximate version affords to relax the feasibility of intermediate solutions, but requires to optimize the βworstβ feasibility during reconfiguration. For example, in Maxmin 3-SAT Reconfiguration [27] β an approximate version of 3-SAT ReconfigurationΒ β we are allowed to use any non-satisfying assignments to produce a reconfiguration sequence, but are required to maximize the minimum fraction of satisfied clauses.
Solving Maxmin 3-SAT Reconfiguration approximately, we may be able to find a βreasonableβ reconfiguration sequence consisting of almost-satisfying assignments, so that we can mange No instances of 3-SAT Reconfiguration.
Ito, Demaine, Harvey, Papadimitriou, Sideri, Uehara, and UnoΒ [27, TheoremsΒ 4Β andΒ 5] showed that Maxmin SAT Reconfiguration and Maxmin Clique Reconfiguration are -hard to approximate. Their proofs do not bring -hardness because of relying on the -hardness of approximating the corresponding source problems (i.e., Max SAT [26] and Max Clique [25]). Since many reconfiguration problems are -complete, -hardness results seem not optimal. In fact, [27] posed -hardness of approximation for reconfiguration problems as an open problem. The significance of showing -hardness compared to -hardness is that it not only rules out polynomial-time algorithms under , but further disproves the existence of a witness (especially a reconfiguration sequence) of polynomial length under .
1.1 PCRP Theorem, Its Consequences, and Our Contribution
Recently, Hirahara and OhsakaΒ [22] and Karthik C.Β S.Β and ManurangsiΒ [29] established a reconfiguration analogue of the PCP theorem [2, 3], a.k.a.Β the Probabilistically Checkable Reconfiguration Proof (PCRP) theorem, which provides a new PCP-type characterization of . For a pair of proofs , a reconfiguration sequence from to is a sequence over such that , , and and differ in at most one bit for every .
Theorem 1.1 (PCRP theorem [22, 29]; see Theorem 3.1 for the formal statement).
A language is in if and only if there exists a probabilistic verifier with randomness complexity and query complexity and a pair of polynomial-time computable proofs such that the following hold for every input :
-
(Completeness) If , then there exists a reconfiguration sequence from to such that accepts every proof in with probability .
-
(Soundness) If , then every reconfiguration sequence from to contains some proof that is rejected by with probability more than .
The PCRP theorem, along with a series of gap-preserving reductions [21, 22, 23, 29, 34, 35, 36], implies that several reconfiguration problems are -hard to approximate, thereby resolving the open problem due to Ito, Demaine, Harvey, Papadimitriou, Sideri, Uehara, and UnoΒ [27] affirmatively.
Corollary 1.2 (from Theorem 1.1 and [21, 22, 23, 29, 34, 35, 36]).
There exists a universal constant such that approximate versions of the following reconfiguration problems are -hard to approximate within a factor of :
3-SAT Reconfiguration, 2-CSP Reconfiguration, Independent Set Reconfiguration, Vertex Cover Reconfiguration, Dominating Set Reconfiguration, Set Cover Reconfiguration, Max Cut Reconfiguration, and Nondeterministic Constraint Logic.
In this paper, we present an alternative proof of the PCRP theorem that is βsimplerβ than those of Hirahara and OhsakaΒ [22] and Karthik C.Β S.Β and ManurangsiΒ [29]. Our technical contribution is to develop a reconfiguration analogue of robustization [4, 12] and composition [2, 3]. Below, we review existing proofs of the PCRP theorem [22, 29], followed by our proof and techniques.
1.2 Recap of Two Proofs due to [22, 29]
We recapitulate two proofs of the PCRP theorem due to Hirahara and OhsakaΒ [22] and Karthik C.Β S.Β and ManurangsiΒ [29]. Let be a -complete language, say, 3-SAT Reconfiguration,111 Hirahara and OhsakaΒ [22] adopted Succinct Reach and Karthik C.Β S.Β and ManurangsiΒ [29] adopted 2-CSP Reconfiguration, but the choice of -complete languages does not so matter. for which we will design a PCRP system. Suppose that we are given a satisfiable -CNF formula over variables and a pair of its satisfying assignments . Both [22, 29] employ the following common strategy:
-
Encode each assignment to using an error-correcting code .
Ideally, the existence of a reconfiguration sequence from to consisting of satisfying assignments to should imply the existence of a reconfiguration sequence from to consisting only of accepting proofs, where and are auxiliary proofs accepted by the assignment tester along with and , respectively. On the other hand, if there is a reconfiguration sequence from to in which every proof is accepted with a high probability (say, ), then must be a Yes instance of 3-SAT Reconfiguration. The challenge for the former requirement (i.e., completeness) is that every reconfiguration sequence between different codewords must induce a string that is βfarβ from every codeword, which would be rejected by the assignment tester, whereas for the latter requirement (i.e., soundness) is that we should be able to extract from a reconfiguration sequence consisting of satisfying assignments to . Hirahara and OhsakaΒ [22] and Karthik C.Β S.Β and ManurangsiΒ [29] took slightly different approaches to these challenges.
HiraharaβOhsakaβs System
Hirahara and OhsakaΒ [22] first create a pair of fresh copies of the input string, denoted by and , so that one of them can be arbitrarily edited as long as the other is the encoded satisfying assignment. Introduce then a special symbol to indicate that a particular copy is in the βin transitionβ state. The verifier of [22] is given oracle access to a pair of strings , supposed to be the encoding of adjacent satisfying assignments, and an auxiliary proof , supposed to assert that is as expected. Here, we say that a pair of assignments are adjacent if they differ in at most one variable. Informally, performs the following three stages:
-
1.
makes sure that or is a codeword of (by using its local tester). If this is not the case, then it immediately rejects.
-
2.
determines if or contains βmanyβ βs (by random sampling), and if so, then it immediately accepts. This stage is crucial for achieving the perfect completeness.
-
3.
Otherwise (i.e., both and contain βfewβ βs), runs an assignment tester on (as if does not contain any ) to ensure that is indeed the encoding of adjacent satisfying assignments to , which is a crucial stage for the soundness.
One subtle issue is that implementing causes minor changes in the assignment tester, which makes its analysis less intuitive.
Karthik C.Β S.βManurangsiβs System
Karthik C.Β S.Β and ManurangsiΒ [29] first create fresh four copies of the input string, denoted by , so that whenever three of them are the encoded adjacent satisfying assignments to , the remaining copy can be whatever. Create also a special variable to denote which copy is currently βin transition.β The verifier of [29] is given oracle access to four strings , three of which are supposed to be the encoding of adjacent satisfying assignments, four auxiliary proofs , where each should assert that are as expected, and the special variable . Roughly speaking, works as follows: Suppose that finds to take a value ; i.e., is on the way of transition. Then, calls an assignment tester on to confirm that are indeed the encoding of adjacent satisfying assignments to .
Unlike of [22], implementing does not require any modification in assignment testers. However, entails four copies of the input string and the special variable to take the majority decoding, which makes the (soundness) analysis slightly complicated. Another drawback common to [22, 29] is that both and apply error-correcting codes and assignment testers all at once, and thus, we are not able to analyze their effects separately.
1.3 Overview of Our Proof
We now outline our proof of the PCRP theorem. Our proof also relies on error-correcting codes and assignment testers as in [22, 29], but does not involve either the special symbol or the special variable . The crucial difference from [22, 29] is that our PCRP system is obtained by combining simple robustization and composition steps in a modular fashion, which renders its analysis more intuitive. This can be thought of as an extension of alphabet reduction [11] for Maxmin 2-CSP Reconfiguration due to [35].
Starting Point (Section 3.1)
The starting point for which we build a PCRP system is a -complete problem called Succinct Reach [14, 22, 40], defined as follows: Given a circuit that represents an exponentially large graph over such that a pair of βverticesβ are adjacent in if and only if , we are required to decide if there exists an undirected path from to in .222 Without loss of generality, we can assume that is undirected and has self-loops at every vertex. Succinct Reach can be thought of as a reconfiguration problem, which asks if there exists a reconfiguration edge sequence from to such that or for every , and every is an edge of .333 We remark that reconfiguration edge sequences are different from reconfiguration sequences, in which every adjacent pair of strings differ in at most one bit. Such a sequence has the following interpretation [22] under the token jumping model [28]: Given a pair of βtokensβ initially placed on self-loop of , we can transfer them to self-loop of by repeatedly moving a single token while preserving that the two tokens are always adjacent in .
Robustization (Section 3.2)
The first step is robustization [4, 12], which reduces Succinct Reach to a βrobustβ version of Circuit SAT Reconfiguration. Given a circuit and a pair of its satisfying assignments , Circuit SAT Reconfiguration asks to decide if there exists a reconfiguration sequence from to consisting only of satisfying assignments to . We shall achieve the following requirement in reducing an input of Succinct Reach to an input of Circuit SAT Reconfiguration (Lemma 3.7):
-
(Perfect completeness) If is a Yes instance, then is a Yes instance.
-
(Robust soundness) If is a No instance, then every possible reconfiguration sequence from to contains some assignment that is -far from every satisfying assignment to .
In the same manner as [22, 29], we first encode each βvertexβ represented by using an error-correcting code , whose relative distance will be denoted by . Obviously, two (supposedly satisfying) assignments should be defined as and . The central question is how to design a new circuit , which takes a pair of strings , so as to meet the above requirements.
The first naive attempt mimics the existing robustization, e.g., [11]: Our (seemingly promising) circuit accepts only such that , which, however, fails to derive the perfect completeness. Intuitively, there is no consecutive path between distinct codewords of , making the reconfiguration impossible.
Example 1.3 (first failed attempt).
Construct a circuit such that if and only if
-
1.
both and are some codewords of , and
-
2.
if and , then .
Consider any reconfiguration sequence from to . Since and are -far from each other, must contain some assignment such that is -far from every codeword of ; i.e., is -far from every satisfying assignment to , losing the perfect completeness. β
Given the first attemptβs failure, one may think of forcing the circuit to accept a pair of strings that are up to -close to some codewords. Unfortunately, this modification now reduces the robust soundness to . The nature behind this failure is that moving one bit away from the radius of the ball results in a rejecting string, even though it is only one bit away from an accepting string.
Example 1.4 (second failed attempt).
Construct a circuit such that if and only if
-
1.
both and are -close to some codewords of , and
-
2.
if and are -close to and , respectively, then .
Then, the following issue arises: Even if an assignment is -far from for every strings , we cannot exclude the possibility that is still -close to some satisfying assignment to . Let be a string that is -close to both and . Consider the following reconfiguration sequence from to via :
Changing a few bits of , we can reach a new string that is -close to but -far from any other codeword of . Since by definition, is -close to a satisfying assignment (i.e., ) to . Similarly, every assignment in can be shown -close to some satisfying assignment to . β
The crux of realizing the perfect completeness and robust soundness simultaneously is the following error-correcting code, which enjoys both list decodability and reconfigurability.
Theorem 1.5 (informal; see Theorem 3.4 [16] and Lemma 3.5).
There exists an error-correcting code for some polynomial such that the following hold:
-
(List decodability) There exists a polynomial-time algorithm that list-decodes up to relative radius .
-
(Reconfigurability) For every distinct strings , there exists a reconfiguration sequence from to in which every string is
-
β
-close to at least either or , and
-
β
-far from for every string .
-
β
The latter property enables to reconfigure between a distinct pair of codewords, while avoiding getting too (say, ) close to any other codewords. Specifically, a standard concatenation of ReedβSolomon codes and Hadamard codes [1, 13, 16] suffices to meet the list decodabilityΒ [16] and the reconfigurability, which only involves an elementary proof. Note that the reconfigurability of Hadamard codes has been investigated by OhsakaΒ [35].
Owing to Theorem 1.5, we eventually implement the actual circuit such that if and only if
-
1.
both and are -close to some codewords of , and
-
2.
if and are -close to and , respectively, then .
(The difference from and of Examples 1.3 andΒ 1.4 is highlighted.) Intuitively speaking, the threshold gap between the first and second conditions enables us to bypass the issues of the two naive failed attempts at the same time.
Composition (Section 3.3)
The second step is composition [2, 3], which builds a PCRP system for a βrobustβ version of Circuit SAT Reconfiguration. Given a circuit and a pair of its satisfying assignments produced by the robustization step, we shall construct a verifier and a pair of proofs such that the following hold (Lemma 3.8):
-
(Perfect completeness) If is a Yes instance, then there exists a reconfiguration sequence from to such that accepts every proof in with probability .
-
(Soundness) If is a No instance, then every reconfiguration sequence from to contains some proof that is rejected by with probability more than .
A naive failed attempt is to just feed to an assignment tester as in the regime [11]. Given oracle access to an assignment and an auxiliary proof , meets the following conditions:
-
If , then there exists a proof such that accepts with probability .
-
If is -far from every satisfying assignment to , then rejects with probability for every proof .
Define and for some proofs such that both and accept with probability . The robust soundness of Circuit SAT Reconfiguration implies the aforementioned soundness. On the other hand, the perfect completeness would be broken because we need to reconfigure between and , which may be significantly different.
We resolve this issue by creating twins of proofs so that a kind of βredundancyβ is ensured. Our actual PCRP verifier runs and independently, and accepts if (at least) either of the runs accepted. The perfect completeness is almost immediate by definition of . If is -far from every satisfying assignment to , then rejects with probability for every alleged proofs , implying the desired soundness.
2 Preliminaries
Notations and Definitions
For a nonnegative integer , let . The base of logarithms is . A sequence of a finite number of elements is denoted by , and we write to indicate that appears in (at least once). The symbol stands for a concatenation of two strings, for the inner product, with a prime power for the finite field with elements, for , and for . Let denote a finite set called alphabet. For a string and an index set , we use to denote the restriction of to . The relative Hamming distance between two strings , denoted by , is defined as the fraction of positions at which and differ; namely,
(2.1) |
We say that is -close to if and -far from if . Analogous notations are used for a set of strings ; e.g., and is -close to if .
2.1 Error-Correcting Codes
Here, we introduce error-correcting codes, followed by two examples.
Definition 2.1 (error-correcting code).
For a real , a function is an error-correcting code with relative distance if for every distinct strings . Each for is called a codeword of . Denote by the set of all codewords of .
Definition 2.2 (ReedβSolomon code [41]).
For a finite field and two positive integers such that , the ReedβSolomon code is defined as a function such that for each string , where and are distinct elements of .
Definition 2.3 (Hadamard code).
For a positive integer , the Hadamard code is defined as a function such that for each string , where is the th string of .444The inner product is taken modulo .
The relative distance of ReedβSolomon codes and Hadamard codes is and , respectively, see, e.g., [17]. Moreover, and for every distinct strings differ in exactly half the bits.
2.2 Verifiers and Assignment Testers
Subsequently, we introduce the notion of verifier, followed by assignment tester [12] (a.k.a. PCP of proximity [4]).
Definition 2.4 (verifier).
A verifier with randomness complexity and query complexity is a probabilistic polynomial-time algorithm that given an input , tosses random bits and uses to generate a sequence of queries and a circuit . Given an input and oracle access to a proof , denote βs (randomized) output by over the randomness of . We say that accepts or simply accepts if , and that rejects if .
Definition 2.5 (assignment tester [4, 12]).
An assignment tester with rejection rate is a verifier such that for a polynomial-size circuit (as explicit input) and oracle access to its assignment (as implicit input) and a proof , the following hold:
-
(Perfect completeness) If , then there exists a proof such that accepts with probability ; namely,
(2.2) -
(Soundness) If is -far from every satisfying assignment to , then for every proof , rejects with probability more than ; namely,
(2.3)
There exists an assignment tester with randomness complexity , query complexity , and rejection rate , described as follows.
3 A Simple Proof of the PCRP Theorem
In this section, we present a simple proof of the Probabilistically Checkable Reconfiguration Proof (PCRP) theorem. For a pair of proofs , a reconfiguration sequence from to is defined as a sequence over such that , , and and differ in at most one bit for every . The PCRP theorem is formally stated as follows.
Theorem 3.1 (Probabilistically Checkable Reconfiguration Proof theorem [22, 29]).
A language is in if and only if there exists a verifier with randomness complexity and query complexity and a pair of polynomial-time computable proofs such that the following hold for every input :
-
(Completeness) If , then there exists a reconfiguration sequence from to such that accepts every proof in with probability ; namely,
(3.1) -
(Soundness) If , then every reconfiguration sequence from to contains some proof that is rejected by with probability more than ; namely,
(3.2)
Since the βifβ direction of Theorem 3.1 is obvious (see, e.g., [22]), we prove the βonly-ifβ direction; i.e., we will construct a PCRP system for a -complete language in the remainder of this section.
3.1 Succinct Reach and -completeness
We first introduce a -complete problem called Succinct Reach, e.g., [14, 40], for which we design a PCRP system. The input of Succinct Reach is specified by a polynomial-size circuit . Informally, βsuccinctlyβ represents an exponentially large graph over such that a pair of βverticesβ are adjacent in if and only if . Hereafter, we restrict to satisfy the following conditions:
- (C1)
-
for every strings (i.e., is undirected), and
- (C2)
-
for every string (i.e., has self-loops at every vertex).
For four strings , a reconfiguration edge sequence from to is a sequence over such that , , and ( or ) for every . We are now ready to define the Succinct Reach problem.
Problem 3.2.
Given a polynomial-size circuit that satisfies (C1) and (C2), Succinct Reach asks to decide if there exists a reconfiguration edge sequence from to such that for every .
As an immediate corollary of Hirahara and OhsakaΒ [22, Proposition 5.3], we have the -completeness of Succinct Reach.
Corollary 3.3 (from [22, Proposition 5.3]).
Succinct Reach is -complete.
3.2 Reducing Succinct Reach to βRobustβ Version of Circuit SAT Reconfiguration
We construct a polynomial-time reduction from Succinct Reach to a βrobustβ version of Circuit SAT Reconfiguration. Given a polynomial-size circuit and a pair of its satisfying assignments , Circuit SAT Reconfiguration asks to decide if there exists a reconfiguration sequence from to such that for every . The robust soundness requests that every reconfiguration sequence from to contains some assignment that is -far from every satisfying assignment to . To achieve this requirement, we encode each βvertexβ represented by a polynomial-size circuit of Succinct Reach using a special error-correcting code that enjoys list decodability and reconfigurability.
Concatenated Codes, List Decodability, and Reconfigurability
Our error-correcting code is obtained as a standard concatenation of ReedβSolomon codes and Hadamard codes [13], see also [1, ChapterΒ 19] and [16, ChapterΒ 8]. Let be a positive integer that is a power of for simplicity of notation. Define , , and . Note that . The concatenation of a ReedβSolomon code with a Hadamard code , denoted by , is defined as follows. By a canonical bijection between elements in and strings in , we consider as an outer code from to whereas as an inner code from to . For each string , we define as
(3.3) |
where is the th symbol of . Define finally as for each string , where . Note that the relative distance of (and thus ) is at least the product of the relative distances of the outer and inner codes, i.e., .
GuruswamiΒ [16] established the list decodability of for general finite field , which implies the following.
Theorem 3.4 (list decodability of [16, TheoremΒ 8.2]).
There exists a polynomial-time list-decoding algorithm that takes a string and produces a list of all codewords in that are -close to , where
(3.4) |
Moreover, enjoys the following reconfigurability property.
Lemma 3.5 (reconfigurability of ).
For every distinct strings , there exists a reconfiguration sequence from to over such that for every string and every ,
(3.5) | ||||
(3.6) |
Proof.
For any distinct strings , let and . Note that and . Think of a string in as consisting of blocks in . Recall that if for the th block, then and differ in exactly bits owing to the relative distance of . Consider a reconfiguration sequence from to obtained by the following procedure.
Let be any intermediate string of . We first prove Eq. 3.5 for . By construction, blocks of can be partitioned into such that for every , for every , and is neither nor for every (i.e., it is on the way of transition). Since and every block is -close to both and , we derive
(3.7) | |||
(3.8) |
where we used the fact that .
We then prove Eq. 3.6 for . Let and . Since the relative distance of is , we have or for at most number of βs in . Therefore, for at least number of βs in . Consequently, we get
(3.9) |
where we used the fact that , as desired.
Β Remark 3.6.
In the proof of Lemma 3.5, we essentially used the following simple properties of Hadamard and ReedβSolomon codes:
-
Since for every distinct strings by the relative distance of Hadamard codes, we can transform into without getting -far from both and .
-
Since for every distinct strings by the relative distance of ReedβSolomon codes, we can transform into without getting close to any other codeword .
Reduction
Our reduction from Succinct Reach to (a βrobustβ version of) Circuit SAT Reconfiguration is described as follows. Given a polynomial-size circuit as an input of Succinct Reach, let be the proposed error-correcting code. Without loss of generality, we can assume that is a power of and sufficiently large so that Theorem 3.4 holds even if Eq. 3.4 is replaced by ββ and Lemma 3.5 holds even if Eq. 3.6 is replaced by β.β Create a new polynomial-size circuit such that for two strings if and only if the following hold:
(3.10) | |||
(3.11) |
Specifically, can be implemented as follows.
Define as and . Observe easily that and , which completes the description of the reduction.
Correctness
We obtain the following βperfectβ completeness and βrobustβ soundness.
Lemma 3.7.
The following hold:
-
(Perfect completeness) If is a Yes instance, then there exists a reconfiguration sequence from to such that for every .
-
(Robust soundness) If is a No instance, then every reconfiguration sequence from to contains some assignment that is -far from every satisfying assignment to .
Proof.
We first prove the perfect completeness. Suppose that is a Yes instance; i.e., there exists a reconfiguration edge sequence from to such that for every . Consider a reconfiguration sequence from to for each obtained by the following procedure.
We claim that any intermediate assignment of satisfies . Suppose first that but ; namely, is of the form for some string . Since by Lemma 3.5, satisfies Eq. 3.10. Observe further that for every string by Lemma 3.5, for every string , and by assumption; i.e., satisfies Eq. 3.11, implying that . Suppose next that but . Similarly to the first case, we can show that . Suppose finally that and , which is a trivial case. Consequently, concatenating for every , we obtain a reconfiguration sequence from to consisting only of satisfying assignments to , which completes the proof the perfect completeness.
We then prove the robust soundness. Suppose that is a No instance. Let be any reconfiguration sequence from to , where each is of the form . Create then a sequence over by βdecodingβ ; namely, and for each are defined as follows:
(3.12) |
where ties are broken according to any prefixed order over . Note that and . Since and differ in at most one bit, or for every ; i.e., is a valid reconfiguration edge sequence from to . In particular, must contain such that .
We will demonstrate that is -far from every satisfying assignment to . Let be any satisfying assignment to . There must exist a pair such that , , and . Deduce that (1) is -far from or (2) is -far from , because otherwise we have . Suppose first that , implying that . Putting together, we have the following three inequalities in hand (see Figure 1):
(by assumption) | (3.13) | ||||
(by assumption) | (3.14) | ||||
(3.15) |
Simple calculation using the triangle inequality derives
(3.16) | |||
(3.17) |
Consequently, must be -far from . Suppose next that . Similarly to the first case, we can show that , deriving that is -far from , which completes the proof of the robust soundness.
3.3 Composing Assignment Testers
We build a PCRP system for Circuit SAT Reconfiguration to complete the proof of Theorem 3.1.
Reduction
Our reduction from (a βrobustβ version of) Circuit SAT Reconfiguration to a PCRP system is described as follows. Given a polynomial-size circuit and a pair of its satisfying assignments produced by Lemma 3.7, we apply Theorem 2.6 to obtain an assignment tester for with randomness complexity , query complexity , and rejection rate . The proof length of , denoted by , can be bounded by some polynomial in the size of and thus . Our PCRP verifier is given oracle access to an assignment as implicit input and twins of proof . Then, runs and independently and accepts if (at least) either of the runs accepted, which is described as follows.
By Theorem 2.6, compute two proofs in polynomial time such that accepts and with probability . Define two proofs as and . Observe that accepts and with probability , which completes the description of the PCRP system.
Correctness
We show the following perfect completeness and soundness.
Lemma 3.8.
The following hold:
-
(Perfect completeness) If is a Yes instance, then there exists a reconfiguration sequence from to such that accepts every proof in with probability .
-
(Soundness) If is a No instance, then every reconfiguration sequence from to contains some proof that is rejected by with probability more than .
Proof.
We first prove the perfect completeness. Suppose that is a Yes instance. By Lemma 3.7, there exists a reconfiguration sequence from to such that for every . Let be a proof such that accepts with probability . In particular, and . Consider a reconfiguration sequence from to obtained by the following procedure.
We claim that accepts any intermediate proof of with probability . By construction, is of the form such that and ( or ) for some . Since always accepts , we find to accept with probability , which completes the proof of the perfect completeness.
We then prove the soundness. Suppose that is a No instance. Let be any reconfiguration sequence from to . By Lemma 3.7, contains a proof such that is -far from every satisfying assignment to . Since rejects both and with probability more than by Theorem 2.6, rejects with probability
(3.18) |
which completes the proof of the soundness.
The proof of Theorem 3.1 follows from -completeness of Succinct Reach (Corollary 3.3) and its PCRP system (Lemma 3.8), where the soundness error can be reduced to by repeating a constant number of times.
References
- [1] Sanjeev Arora and Boaz Barak. Computational Complexity: A Modern Approach. Cambridge University Press, 2009. doi:10.1017/CBO9780511804090.
- [2] Sanjeev Arora, Carsten Lund, Rajeev Motwani, Madhu Sudan, and Mario Szegedy. Proof verification and the hardness of approximation problems. Journal of the ACM, 45(3):501β555, 1998. doi:10.1145/278298.278306.
- [3] Sanjeev Arora and Shmuel Safra. Probabilistic checking of proofs: A new characterization of NP. Journal of the ACM, 45(1):70β122, 1998. doi:10.1145/273865.273901.
- [4] Eli Ben-Sasson, Oded Goldreich, Prahladh Harsha, Madhu Sudan, and Salil Vadhan. Robust PCPs of proximity, shorter PCPs, and applications to coding. SIAM Journal on Computing, 36(4):889β974, 2006. doi:10.1137/S0097539705446810.
- [5] HansΒ L. Bodlaender, Carla Groenland, Jesper Nederlof, and CΓ©line Swennenhuis. Parameterized problems complete for nondeterministic FPT time and logarithmic space. Information and Computation, 300:105195, 2024. doi:10.1016/j.ic.2024.105195.
- [6] HansΒ L. Bodlaender, Carla Groenland, and CΓ©line M.Β F. Swennenhuis. Parameterized complexities of dominating and independent set ceconfiguration. In Proceedings of the International Symposium on Parameterized and Exact Computation (IPEC), pages 9:1β9:16, 2021. doi:10.4230/LIPIcs.IPEC.2021.9.
- [7] Paul Bonsma. The complexity of rerouting shortest paths. Theoretical Computer Science, 510:1β12, 2013. doi:10.1016/j.tcs.2013.09.012.
- [8] Paul Bonsma and Luis Cereceda. Finding paths between graph colourings: PSPACE-completeness and superpolynomial distances. Theoretical Computer Science, 410(50):5215β5226, 2009. doi:10.1016/j.tcs.2009.08.023.
- [9] Nicolas Bousquet, AmerΒ E. Mouawad, Naomi Nishimura, and Sebastian Siebertz. A survey on the parameterized complexity of reconfiguration problems. Computer Science Review, 53:100663, 2024. doi:10.1016/j.cosrev.2024.100663.
- [10] Luis Cereceda, Jan vanΒ den Heuvel, and Matthew Johnson. Finding paths between 3-colorings. Journal of Graph Theory, 67(1):69β82, 2011. doi:10.1002/jgt.20514.
- [11] Irit Dinur. The PCP theorem by gap amplification. Journal of the ACM, 54(3):12, 2007. doi:10.1145/1236457.1236459.
- [12] Irit Dinur and Omer Reingold. Assignment testers: Towards a combinatorial proof of the PCP theorem. SIAM Journal on Computing, 36(4):975β1024, 2006. doi:10.1137/S0097539705446962.
- [13] G.Β David Forney, Jr. Concatenated Codes. PhD thesis, Massachusetts Institute of Technology, 1965. URL: http://hdl.handle.net/1721.1/13449.
- [14] Hana Galperin and Avi Wigderson. Succinct representations of graphs. Information and Control, 56(3):183β198, 1983. doi:10.1016/S0019-9958(83)80004-7.
- [15] Parikshit Gopalan, PhokionΒ G. Kolaitis, Elitza Maneva, and ChristosΒ H. Papadimitriou. The connectivity of Boolean satisfiability: Computational and structural dichotomies. SIAM Journal on Computing, 38(6):2330β2355, 2009. doi:10.1137/07070440X.
- [16] Venkatesan Guruswami. List Decoding of Error-Correcting Codes. PhD thesis, Massachusetts Institute of Technology, September 2001. URL: http://hdl.handle.net/1721.1/8700.
- [17] Venkatesan Guruswami, Atri Rudra, and Madhu Sudan. Essential coding theory, 2019. Draft available at https://cse.buffalo.edu/faculty/atri/courses/coding-theory/book/.
- [18] Arash Haddadan, Takehiro Ito, AmerΒ E. Mouawad, Naomi Nishimura, Hirotaka Ono, Akira Suzuki, and Youcef Tebbal. The complexity of dominating set reconfiguration. Theoretical Computer Science, 651:37β49, 2016. doi:10.1016/j.tcs.2016.08.016.
- [19] RobertΒ A. Hearn and ErikΒ D. Demaine. PSPACE-completeness of sliding-block puzzles and other problems through the nondeterministic constraint logic model of computation. Theoretical Computer Science, 343(1-2):72β96, 2005. doi:10.1016/j.tcs.2005.05.008.
- [20] RobertΒ A. Hearn and ErikΒ D. Demaine. Games, Puzzles, and Computation. A K Peters, Ltd., 2009.
- [21] Shuichi Hirahara and Naoto Ohsaka. Optimal PSPACE-hardness of approximating set cover reconfiguration. In Proceedings of the International Colloquium on Automata, Languages, and Programming (ICALP), pages 85:1β85:18, 2024. doi:10.4230/LIPIcs.ICALP.2024.85.
- [22] Shuichi Hirahara and Naoto Ohsaka. Probabilistically checkable reconfiguration proofs and inapproximability of reconfiguration problems. In Proceedings of the ACM Symposium on Theory of Computing (STOC), pages 1435β1445, 2024. doi:10.1145/3618260.3649667.
- [23] Shuichi Hirahara and Naoto Ohsaka. Asymptotically optimal inapproximability of maxmin -cut reconfiguration. In Proceedings of the International Colloquium on Automata, Languages, and Programming (ICALP), 2025. to appear.
- [24] DucΒ A. Hoang. Combinatorial Reconfiguration, 2024. URL: https://reconf.wikidot.com/.
- [25] Johan HΓ₯stad. Clique is hard to approximate within . Acta Mathematica, 182:105β142, 1999. doi:10.1007/BF02392825.
- [26] Johan HΓ₯stad. Some optimal inapproximability results. Journal of the ACM, 48(4):798β859, 2001. doi:10.1145/502090.502098.
- [27] Takehiro Ito, ErikΒ D. Demaine, Nicholas J.Β A. Harvey, ChristosΒ H. Papadimitriou, Martha Sideri, Ryuhei Uehara, and Yushi Uno. On the complexity of reconfiguration problems. Theoretical Computer Science, 412(12-14):1054β1065, 2011. doi:10.1016/j.tcs.2010.12.005.
- [28] Marcin KamiΕski, Paul Medvedev, and Martin MilaniΔ. Complexity of independent set reconfigurability problems. Theoretical Computer Science, 439:9β15, 2012. doi:10.1016/j.tcs.2012.03.004.
- [29] Karthik C. S. and Pasin Manurangsi. On inapproximability of reconfiguration problems: PSPACE-hardness and some tight NP-hardness results. Electronic Colloquium on Computational Complexity, TR24-007, 2023. URL: http://eccc.weizmann.ac.il/report/2024/007.
- [30] Daniel Lokshtanov and AmerΒ E. Mouawad. The complexity of independent set reconfiguration on bipartite graphs. ACM Transactions on Algorithms, 15(1):7:1β7:19, 2019. doi:10.1145/3280825.
- [31] AmerΒ E. Mouawad, Naomi Nishimura, Venkatesh Raman, Narges Simjour, and Akira Suzuki. On the parameterized complexity of reconfiguration problems. Algorithmica, 78(1):274β297, 2017. doi:10.1007/s00453-016-0159-2.
- [32] ChristinaΒ M. Mynhardt and Shahla Nasserasr. Reconfiguration of colourings and dominating sets in graphs. In 50 years of Combinatorics, Graph Theory, and Computing, chapterΒ 10, pages 171β191. Chapman and Hall/CRC, 2019.
- [33] Naomi Nishimura. Introduction to reconfiguration. Algorithms, 11(4):52, 2018. doi:10.3390/a11040052.
- [34] Naoto Ohsaka. Gap preserving reductions between reconfiguration problems. In Proceedings of the International Symposium on Theoretical Aspects of Computer Science (STACS), pages 49:1β49:18, 2023. doi:10.4230/LIPIcs.STACS.2023.49.
- [35] Naoto Ohsaka. Alphabet reduction for reconfiguration problems. In Proceedings of the International Colloquium on Automata, Languages, and Programming (ICALP), pages 113:1β113:17, 2024. doi:10.4230/LIPIcs.ICALP.2024.113.
- [36] Naoto Ohsaka. Gap amplification for reconfiguration problems. In Proceedings of the ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 1345β1366, 2024. doi:10.1137/1.9781611977912.54.
- [37] Naoto Ohsaka. Tight inapproximability of target set reconfiguration. Computing Research Repository, abs/2402.15076, 2024. doi:10.48550/arXiv.2402.15076.
- [38] Naoto Ohsaka. On approximate reconfigurability of label cover. Information Processing Letters, 189:106556, 2025. doi:10.1016/j.ipl.2024.106556.
- [39] Naoto Ohsaka and Tatsuya Matsuoka. Reconfiguration problems on submodular functions. In Proceedings of the ACM International Conference on Web Search and Data Mining (WSDM), pages 764β774, 2022. doi:10.1145/3488560.3498382.
- [40] ChristosΒ H. Papadimitriou and Mihalis Yannakakis. A note on succinct representations of graphs. Information and Control, 71(3):181β185, 1986. doi:10.1016/S0019-9958(86)80009-2.
- [41] IrvingΒ S. Reed and Gustave Solomon. Polynomial codes over certain finite fields. Journal of the Society for Industrial and Applied Mathematics, 8(2):300β304, 1960. doi:10.1137/0108018.
- [42] Jan vanΒ den Heuvel. The complexity of change. In Surveys in Combinatorics 2013, volume 409, pages 127β160. Cambridge University Press, 2013. doi:10.1017/CBO9781139506748.005.
- [43] Marcin Wrochna. Reconfiguration in bounded bandwidth and tree-depth. Journal of Computer and System Sciences, 93:1β10, 2018. doi:10.1016/j.jcss.2017.11.003.