On the Automatability of Tree-Like -DNF Resolution
Abstract
A proof system is said to be automatable in time if there exists an algorithm that given as input an unsatisfiable formula outputs a refutation of in the proof system in time , where is the size of the smallest -refutation of plus the size of . Atserias and Bonet (ECCC 2002), observed that tree-like -DNF resolution is automatable in time for a universal constant . We show that, under the randomized exponential-time hypothesis (rETH), this is tight up to a -factor in the exponent, i.e., we prove that tree-like -DNF resolution, for at most logarithmic in the number of variables of , is not automatable in time unless rETH is false. Our proof builds on the non-automatability results for resolution by Atserias and Müller (FOCS 2019), for algebraic proof systems by de Rezende, Göös, Nordström, Pitassi, Robere and Sokolov (STOC 2021), and for tree-like resolution by de Rezende (LAGOS 2021).
Keywords and phrases:
Proof Complexity, Tree-like -DNF Resolution, AutomatabilityFunding:
Gaia Carenini: Trinity College CB European PhD Studentship.Copyright and License:
2012 ACM Subject Classification:
Theory of computationAcknowledgements:
The authors wish to thank Noel Arteche and Jonas Conneryd for feedback on the presentation. We are also grateful to the anonymous reviewers for their careful reading of our manuscript and their many insightful comments and suggestions. Part of this work was done while G. Carenini was a student at the Department of Computer Science of Ecole Normale Supérieure – PSL Research University, Paris, France.Editors:
Srikanth SrinivasanSeries and Publisher:
Leibniz International Proceedings in Informatics, Schloss Dagstuhl – Leibniz-Zentrum für Informatik
1 Introduction
A central question in proof complexity concerns the difficulty of finding proofs: given a theorem, can we efficiently find a proof of it in a given proof system? This question – whether proof search is automatable – was first raised informally by Gödel in a 1956 letter to von Neumann [39] and has been studied formally since the 1990s when Bonet, Pitassi and Raz introduced the notion of automatability. A proof system is said to be automatable in time if there exists an algorithm that, given an unsatisfiable formula , outputs a refutation of in in time , where denotes the sum of the size of the smallest -refutation of and the size of .
A series of results in the late 1990s and early 2000s established non-automatability of various proof systems under standard complexity-theoretic and cryptographic assumptions [7, 26, 28, 12, 1, 11, 5, 2, 21]. While cryptographic assumptions remain the only known way to proving non-automatability of Frege systems beyond -Frege [3], recent years have seen renewed interest in understanding the automatability of weaker systems [31, 6, 23, 22, 8, 18, 16, 25, 33]. This resurgence is largely due to a breakthrough result by Atserias and Müller [6], who showed via a clever – and in hindsight natural – reduction that automating resolution is NP-hard.
A key frontier in this line of research involves understanding the automatability of tree-like proof systems. These systems correspond to natural search algorithms that explore the solution space via branching heuristics. Thus, non-automatability results for such systems translate into lower bounds for SAT solvers implementing these heuristics. A canonical example is tree-like resolution, where derived clauses may only be used once to derive new clauses. Robinson [37] showed that tree-like resolution is polynomially equivalent to non-deterministic DPLL [15, 14] algorithms.
The DPLL algorithm searches for satisfying assignments to a CNF formula by recursively branching on the assignment of a variable. A natural generalization of this algorithm is to allows branching on Boolean functions that depend only on a small number of variables. Such algorithms correspond to the tree-like -DNF resolution proof system (Res()), a generalization of tree-like resolution where up to literals may be resolved at once.
Automating tree-like proof systems involves efficiently identifying good branching choices. This is often challenging, and many tree-like proof systems are not known to be automatable even in random subexponential time. The exceptions, for which non-trivial automating algorithms are known, are tree-like resolution and tree-like -DNF resolution: Beame and Pitassi [7] proposed a simple automating algorithm for tree-like resolution running in time , which was later adapted by Atserias and Bonet [4] to show that tree-like -DNF resolution is automatable in time , for a universal constant , independent of . This latter result holds even when is a function of the number of variables of the formula,
The first evidence that tree-like resolution is not automatable in polynomial time was given by Alekhnovich and Razborov [2]. Their result, combined with a derandomization procedure from [20], implies that if tree-like resolution is automatable in polynomial time, then . More recently, Mertz, Pitassi and Wei [31] proved that automating tree-like resolution in time would refute the Exponential Time Hypothesis (ETH). Finally, de Rezende [16, 17] improved this to to show that automating tree-like resolution in time contradicts ETH, and doing so in time contradicts randomized ETH [19].
For most other tree-like systems, the picture remains unclear. Even though non-automatability results akin to those of [16] are plausible, it is not known whether they would be tight. In most cases, we do not know of any non-trivial automating algorithm. This leaves open the question of whether we can prove better non-automatability results for other tree-like proof systems.
1.1 Our result
We prove our result under the randomized exponential time hypothesis which we introduce next. The exponential time hypothesis (ETH), is the strengthening of the conjecture, introduced by Impagliazzo and Paturi [24], that states that 3- cannot be solved in subexponential time. More formally, it states that there exists an such that 3- for -variate formulas cannot be decided in deterministic time . The randomized exponential time hypothesis (rETH), introduced by Dell et al. [19], is instead a strengthening of the conjecture. It asserts that there exists and such that 3- for -variate formulas with clauses cannot be decided in randomized time .
Our main result is that for any function , if tree-like Res() is automatable in time , then rETH is false. We defer the definition of the Res() proof system to Section 2, but note here that in this work – and also in many others – the argument of the function is the number of variables in the formula (and does not depend on the size of the proof as per Krajicek’s original definition [27]).
Theorem 1 (Informal).
For any function , if tree-like Res() is automatable on -variate CNF formulas in time , then rETH is false.
This implies that, under rETH, the algorithm of [4] that automates tree-like Res() in time is tight up to a factor in the exponent. Previously, the best known lower bound under rETH, for both tree-like resolution and tree-like Res(), was [16].
Theorem 1 is a consequence of the following result, which is our main technical contribution.
Theorem 2 (Main result).
There exists a randomized algorithm that given as input a CNF formula on variables and clauses and an integer , runs in time , where , and outputs a CNF formula that, except with negligible probability, satisfies:
-
1.
if is satisfiable, then admits a tree-like Res() refutation of size ; and
-
2.
if is unsatisfiable, then requires a tree-like refutation of size , for all .
1.2 Prior related work
The overall structure of the proof of Theorem 2 follows the general strategy of Atserias and Müller [6], and uses ideas from [18] and [16]. In what follows, we briefly summarize these results, and after that we discuss the challenges encountered to prove our main theorem, and the new ideas needed to overcome them.
The main technical theorem in [6], which yields the NP-hardness of automating resolution, is given below.
Theorem 3 ([6]).
There is a polynomial-time algorithm that on input an -variate CNF formula outputs a CNF formula such that
-
If is satisfiable, then admits a resolution refutation of size at most .
-
If is unsatisfiable, then requires resolution refutations of size at least .
The starting point of the algorithm is to build the formula that encodes, in a natural way, that has a (DAG-like) resolution refutation of size at most . The idea for building this formula to obtain a large gap between the size of refutation depending on whether is satisfiable or not comes from Pudlák [34], inspired by Razborov [36]. Pudlák [34] showed that if is satisfiable then has a short resolution refutation. Intuitively, this refutation uses a satisfying assignment for as a guide to find an incorrect step in the purported refutation of , which must exist since satisfies all clause in but falsifies the final empty clause.
Proving a lower bound for when is unsatisfiable turns out to be more challenging and, to address this, Atserias and Müller [6] define a relativized or lifted version of for which they can prove the lower bound and, at the same time, show that the upper bound still holds. In [18] a similar formula is defined and the result is extended to the algebraic proof systems polynomial calculus and Nullstellensatz. The main novelty of [18] is to show that the lower bound can be proven by a reduction from the pigeonhole principle. Finally, in [16], it is shown that, unless rETH is false it is not possible to automate tree-like resolution in time . The main idea of this result is to define a blown-up version of of size such that, when is satisfiable, there is a tree-like Resolution refutation of this formula in size .
1.3 Our technical contribution
In most of the follow-up works to [6], the main technical challenge was to show that, when is unsatisfiable, there exist no small refutations of for some proof system , which was typically stronger than resolution. For tree-like resolution, however, the main difficulty is quite different. Pudlák’s upper bound [34] for the case where satisfiable is inherently DAG-like, and the best known tree-like resolution refutations are of exponential size. In fact, we do not expect significantly smaller tree-like resolution refutations of to exist. In particular, if there were such refutations of polynomial size, then the algorithm of [7] that automates tree-like resolution in quasi-polynomial time would imply that NP is in quasi-polynomial time. Overcoming this limitation requires a substantial modification to the structure of .
The key insight of [16] is that one can (randomly) construct a much larger formula, denoted , of size , such that, when is satisfiable, admits a tree-like resolution refutation also of the size .111In [16], it is mistakenly stated that this can be achieved without randomness. However, the construction of in [16] relies on polynomially unbalanced expander graphs with constant degree, and these are only known to constructable in randomized polynomial time. Together with an exponential lower bound in the casa is unsatisfiable, this construction yields that automating tree-like resolution in time would lead to a randomized algorithm for SAT running in time .
This non-automatability result also extends to tree-like Res(). However, for this system, the best known automating algorithm – due to Atserias and Bonet [4] – runs in time . To show that this upper bound is (nearly) tight, we must construct a smaller formula which also admits a smaller tree-like Res() refutation when is satisfiable. In order to understand the challenge we face in obtaining a better non-automatability result for tree-like Res(), we need to describe in more detail the formula , which we do in Section 2. For now, we note that [16] actually shows that we can construct formulas with the following trade-off: for any size parameter , it is possible to construct a formula of size such that the upper bound for refuting when is satisfiable is . In order to obtain our non-automatability result for tree-like Res(), however, we would need that both the formula and the upper bound be of size roughly .
We present the intuition behind the construction of in the next section. One of the core technical challenges is efficiently representing and accessing objects of size within a formula whose size is only . We would like to represent such objects via pigeonhole principle instances, but the naive encoding would produce a formula of size . The key insight is to instead use small circuits that compute the neighbor function of an unbalanced expander graph used for defining the pigeonhole principle instances. These circuits act as shortcuts for accessing the larger set of objects, allowing us to simulate the effect of having access to items within a formula of size .
For the lower bound, our argument builds on the strategy in [18], which relies on a low-depth reduction from the pigeonhole principle. However, in our case, the formula incorporates different types of unbalanced expanders, making it difficult to reduce from a single pigeonhole principle instance, as was done previously. To address this, we introduce a generalized reduction that maps multiple formulas to a single formula. We note that even in [18], using these generalized reductions would have slightly improved the parameters, making them match those of [6].
Organization of the paper
The paper is organized as follows. Section 2 recalls the necessary concepts in proof complexity and graph theory, states formally Theorem 1, and provides the intuition guiding the construction of the CNF formula . Section 3 is devoted to the definition of the formula , which we denote . Section 4 proves the upper bound in Theorem 2. Section 5 briefly outlines the proof of the lower bound in Theorem 2. Finally, Section 6 concludes the paper with some related open problems.
2 Preliminaries and proof overview
In this section we state Theorem 1 formally and show why it follows from Theorem 2. We then present the idea behind the construction of the formula output by the algorithm of Theorem 2. Before starting, we need to introduce some notation and definitions.
For a positive integer , the set is denoted by . Given a Boolean variable ranging over , its positive literal is (sometimes denoted as ) and its negative literal is (sometimes denoted as ). A clause is a disjunction of literals and a term is a conjunction of literals . We view clauses and terms as sets: the order of the literals is irrelevant, and we can assume there are no repetitions.
A CNF formula is a conjunction of clauses and a DNF formula is a disjunction of terms . A -CNF formula is a CNF formula where every clause has at most literals and analogously a -DNF formula is a DNF formula where every term has at most literals. We say that a variable appears in a clause or in a term if a literal over is an element of or of , respectively. A formula is satisfiable if there exists an assignment to the Boolean variables of the formula that sets its value to ; otherwise it is said to be unsatisfiable.
The -DNF resolution proof system, denoted by Res(), is a proof system where each lines is a -DNFs and new lines can be derived from previous one using any of the following inference rules
| Weakening | Cut |
|---|---|
| -introduction | -elimination |
where and are -DNF formulas, and are sets of literals such that , are literals, and . We recall that in this work, when is a function , the argument of the function is the number of variables in the formula (and does not depend on the size of the proof as per Krajicek’s original definition of -DNF resolution, which he denotes [27]).
A Res() derivation from a CNF formula is a sequence of -DNF formulas such that each , either belongs to or follows from preceding s by an application of one of the inference rules. A Res() refutation of is a Res() derivation from where the final clause is the empty clause, denoted . The size of a Res() derivation is and is denoted by . A refutation is said to be tree-like if every appearing in is used in at most one derivation step.
The resolution proof system corresponds to and has only two inference rules:
| Weakening | Cut |
|---|---|
where and are clauses, and is a variable.
2.1 Formal main result
We are now ready to state Theorem 1 formally.
Theorem 4.
Let be a non-decreasing function where . If there exists an algorithm such that given as input an unsatisfiable -variate CNF formula , the algorithm outputs in time a Res() refutation of , where and is the size of plus the size of the smallest Res() refutation of , then rETH is false.
2.2 Expander graphs used to construct the formula
Before we present the intuition behind the construction of the formula , we introduce some graph theory notation and define the expander graphs that we use to construct the formula . We refer the reader to, e.g., [10] for missing basic definitions in graph theory.
In this paper, graphs are simple and undirected. We often identify the vertex set of a graph with the subset of , and assume that the vertices of the graph inherit the standard ordering of . A -regular graph is a graph where every vertex has degree exactly . In the context of bipartite graphs, we say that is left -regular graph (resp., right -regular graph) if and only if all its vertices in (resp., ) have degree . Given a graph , and a subset of the its vertex set , we define the neighborhood of , denoted as , to be the set of all vertices in which are adjacent to some vertex in . Formally, . We assume that the neighbors of a vertex are ordered according to an arbitrary yet fixed ordering. We define the following function that allows us to access the neighbors of a vertex.
Definition 5 (Neighbor function).
Let be a left -regular bipartite graph. The neighbor function of , denoted as , is the function that takes as input a vertex and an index and returns as output the th neighbor of .
We now define the types of expander graphs which appear in this work.
Definition 6 (Bipartite expander graph).
A -bipartite expander graph is a left -regular bipartite graph where for every subset such that , the neighborhood of satisfies . If we have the stronger condition that there are at least vertices in that are adjacent to exactly one vertex in , then we say that is a -bipartite unique-neighbor expander.
We are interested in unbalanced bipartite expander graphs with small left degree. For our purposes, we require more than the existence of such expander graphs – we need there to be a small circuit that computes its neighbor function and, moreover, these circuit must be constructable in randomized polynomial time.
Theorem 7.
There is an absolute constant and a randomized algorithm that given as inputs , outputs in time a circuit , for , that computes the neighbor function of a graph that with probability at least is a -bipartite unique-neighbor expander.
The proof of this theorem uses known constructions of -independent functions, and can be found in the full-length version of this paper. We are now ready to describe the main ideas needed for the construction .
2.3 Intuition for construction of
Let be a CNF formula over variables with clauses. The formula encodes that there is a resolution refutation of of size , which is usually chosen to be a polynomial in . As mentioned earlier, Pudlák’s [34] upper bound for when is satisfiable, which was adapted in [6], is intrinsically DAG-like. We do not expect there to be polynomial-size tree-like refutations of for satisfiable since, due to the quasi-polynomial algorithm that automates tree-like , this would imply that it is possible to solve SAT in quasi-polynomial time. It may be the case that tree-like requires size at least to refute , regardless of whether is satisfiable and, therefore, it seems that non-automatability results for tree-like are unlikely to be obtained using this formula.
In order to describe the formula we first describe a simplified version of , which is inspired by the formula from [16]. Consider the trivial tree-like resolution refutation of a formula , denoted by , corresponding to the refutation of depth that has leaves, one for every width- clause (each of which is a weakening of some axiom), and that resolves over variables in reverse order, that is, then , etc., until it resolves over to derive the empty clause. We view the clauses of this refutation as arranged in layers, and we say that all clauses that are obtained by resolving over variable are in layer .
We can create a formula stating that this tree-like resolution refutation fits into a smaller structure as follows (see Figure 1). The variables of this formula are partitioned into blocks, one block for each clause of the purported structured derivation. The structure of the blocks is as follows. We start from the top of the refutation (the part closest to ) and for the first layers we simply copy the first layers of (i.e., copy the structure and the clauses). At this point, we have leaves and our structure is starting to get too big. We therefore create a new layer with only blocks and encode (the contradictory statement) that, actually, the blocks of the layer above can be mapped in a one-to-one fashion to these new blocks. This mapping is encoded by enforcing that if block is mapped to block then both contain the exact same clause. Starting from each of the new blocks, we construct a full binary tree of blocks of depth . This gives us blocks at the last layer and we again map these blocks to blocks. By repeating this procedure times, we create a structure of depth , but that has size only . For reasons that will become clear soon, we encode the mapping from to as a pigeonhole principle instance over an expander of constant degree . Note that this structure has size .
We can define a formula, which we refer to (see Figure 1), of size that encodes that a resolution refutation with this structure exists. For some intuition as to why could give us a non-automatability result for tree-like resolution, observe that, if is unsatisfiable, the only reason is unsatisfiable is that we cannot have a one-to-one map from blocks to blocks. Since pigeonhole principle formulas over expander graphs are hard to refute for resolution, it is reasonable that should be hard to refute for resolution (and thus also for tree-like resolution).
When is satisfiable, however, there is another reason is unsatisfiable: there is an assignment that satisfies all clauses in . A proof that is unsatisfiable corresponds to showing that, no matter what purported refutation of is (that fits in the structure), it will contain a mistake. It is too early to get into many details here, but the rough intuition is that a tree-like resolution refutation of can be viewed as following a path from the clause to a clause at the bottom of the structure of keeping the invariant that falsifies all clauses of the purported refutation it goes through. If we did not find a mistake in the purported refutation earlier, once we reach a clause at the bottom layer we necessarily find a mistake, since by the invariant falsifies , but it satisfies all clauses of , so cannot be a weakening of an axiom of .
This argument can be carried out in tree-like resolution in size which is proportional to the number of paths from the top block to a block at the bottom layer in . If we did not have an expander graph between layers, but instead had a complete bipartite graph, the number of such paths would be , which is too large. With bipartite expander graphs with maximum left-degree , the number of such paths becomes . If we define , we have that the size of the formula and the upper bound when is satisfiable is . This, together with a size lower bound of for refuting when is unsatisfiable, gives the non-automatability result for tree-like resolution in [16].
This result for tree-like resolution also applies for tree-like , but our goal is to prove a stronger non-automatability result for tree-like . To this end, we want to design a formula that is both smaller and for which we get a smaller tree-like refutation when is satisfiable. The best one could hope for, without contradicting ETH, is that both the size and the upper bound become . By varying , we can make either of the parameters small, but not both at the same time. In particular, if we consider with we get an upper bound of , at the cost of increasing the size of the formula to . (Note that the upper bound is smaller than the size of the formula since by definition of refutation size we only count the clauses used in the refutation.) In particular, between two “shrinking layers”, we have trees of size .
Here is where our modules comes into play. Let be the root of one of the trees of size . Instead of encoding that there is a tree-like derivation of from the leaves, we encode that there is size- resolution derivation of from only clauses. This can be done using a formula that is structurally close to , except that instead of a fixed we have blocks encoding potential axioms , and we do not enforce that the last block is the empty clause. We denote the formula encoding this small derivation by .
We can use these formulas to obtain a formula similar to but of size as follows. Observe that after each layer of modules we have sets of axioms . We now define the graph PHP formula over blocks that map these blocks to blocks. To build this formula we use a bipartite expander graphs, shrinking expanders, that plays the analogous role as the expander graph in .
While the formula obtained at this point has the correct size, we need to ensure that the upper bound can go through. To this end, we need to be able to easily access any of the extensions of . We therefore encode an additional graph PHP formula over an expander graph, the shortcut expander, that maps partial assignments to the blocks corresponding to . This expander graph is too large to be hardcoded (the whole point is that we are trying to get the formula size down to ) so we instead encode a circuit of size that computes the neighbor function of this graph. With some other minor technicalities, like adding some extension variables, we can obtain an upper bound of roughly . This would already give us a good non-automatability result, but we can get a bit better by balancing the size of the formula and the upper bound. This is why the precise parameters of our formula presented in the next section differ slightly from the ones presented here.
3 The formula
This section is devoted to the definition of the formula . The idea is that, given a CNF formula , we would like to encode that admits a short tree-like Resolution refutation. Instead, what actually is encoded is the contradictory claim that “the trivial exponential-size refutation of fits in a structure of much smaller size.”
Let be a formula over variables and with clauses. We start by defining the three building blocks of .
3.1 Modules for subderivations
We start by defining the formula which we refer to as a module. This formula is similar to , except that instead of a fixed we have blocks encoding potential axioms, and we do not enforce that the last block is the empty clause.
Module variables
For simplicity, let and be powers of . The variables of are partitioned into blocks: one special block, , corresponding to the derived clause; blocks, , corresponding to a purported derivation of ; and axiom blocks, , corresponding to the axioms, or initial clauses, of the derivation. Each block (of any type) contains the following variables.
-
literal variables , one for each literal , such that if and only if the clause in the block contains .
-
enabled variables that encode whether a block is enabled or not.
Moreover, blocks for some contain the following variables.
-
type variables with the intended meaning that if is derived from one of the axiom blocks through a weakening step, and if is derived from two previous blocks and .
-
axiom pointer , encoded with Boolean variables, indicating, in the case where , what axiom is a weakening of.
-
resolved variable , encoded with Boolean variables, indicating, in the case where , which variable was resolved on to derive .
-
derived pointers encoded with Boolean variables each. These variables indicate, in the case where , which blocks were used to derive .
Module axioms
The idea is that the axioms enforce that the blocks encode a valid derivation of the clause at from the clauses at . For all for , and , we include axioms encoding that the clauses used to derive come before in the ordering.
| (1) | ||||
| Moreover, for we have the following axioms | ||||
| (2) | ||||
| (3) | ||||
| (4) | ||||
| (5) | ||||
| encoding that the blocks used to derive are enabled and that the resolution step is sound. Finally, for we include axioms | ||||
| (6) | ||||
| (7) | ||||
encoding that if is a weakening of an axiom , then is enabled and contains all literal in .
3.2 Shrinking graph-PHP formula for blocks
We now define the graph-PHP formula over blocks that will be necessary to reduce the size of the final formula. Given , with , and given a bipartite graph with uniform left degree , we define the formula which encodes the statement, which is contradictory when , that there is a subset of edges of that define an injective map from blocks to blocks. We assume for simplicity that is a power of .
Shrinking variables
The variables are partitioned into blocks and . For every block we have the same literal and enabled variables as before:
-
literal variables , one for each literal .
-
enabled variables .
For blocks we also have funnel pointer variables.
-
funnel variables for indicating whether block is mapped to its th neighbor.
Shrinking axioms
We have axioms encoding the following two statements.
-
If is enabled, it is mapped to at least one of its neighbor; that is, for and we have the axiom
(8) -
If is mapped to its th neighbor, say block , then is enabled and its assignment is exactly the assignment of . This is, for , and for , if and is the the neighbor of , we have the axioms
(9) (10)
3.3 Shortcut graph PHP formula for blocks
Let , with , and assume for simplicity that and are a power of . Given a circuit of size encoding the neighbor function of a bipartite graph with uniform left degree , we define the auxiliary formula which encodes the statement, which is contradictory when , that there is an injective map from blocks to blocks.
We start by considering circuits for , where the is obtained by fixing the second part of the input of to be . Note that such a computes the th neighbor of the input vertex. We first define a formula that encodes the circuit .
Circuit variables
The circuit variables consist of the following: input variables for ; gate variables for ; and output variables for .
Circuit axioms
The circuit axioms encode that the circuit computes correctly. For every gate in , we have one of the following constraints depending on whether is a NOT, AND or OR gate.
| If is a NOT gate | |||||
| where is the input gate of . | (11) | ||||
| If is an AND gate | |||||
| where are the input gates of . | (12) | ||||
| If is an OR gate | |||||
| where are the input gates of . | (13) | ||||
Moreover, if corresponds to the th input gate then , and if corresponds to the th output gate we have . Note that each of these constraints can be encoded by at most clauses, each of width at most .
We are now ready to define the auxiliary formula .
Shortcut variables
The variables are partitioned into blocks . For every block for we have
-
literal variables , one for each literal ;
-
enabled variables ; and
-
circuit variables for we have for , for , and for .
These latter variables are meant to encode the circuits necessary to compute the neighbor function of the graph .
Shortcut axioms
For , we include the circuit axioms for the circuit variables of , encoding that the computation is correct.
Moreover, for all we have axioms encoding that the input to each of the circuits of block is given by the polarity of literal variables (starting at ); and that one of these circuits outputs the index . That is, for we have
| (14) | ||||
| (15) | ||||
where is shorthand for the fact that the output variables generate the binary encoding of . Note that (14) is the only place where appears.
3.4 Final formula
Given a CNF formula over variables with clauses, and an integer , we can now explain how to put these building blocks together to construct .
Let , , and . We consider copies of the module arranged in layers, copies per layer. For every block appearing in , we denote by the th copy of the block in layer .
Root axioms
We refer to the block as the root block. This first group of axioms consists of the unit clause and the unit clauses:
| (16) |
enforcing the root to be enabled and to contain the empty clause.
Formula axioms
For , let be the th clause of . We need to encode that the final -blocks in the last layer of modules are actually weakening of clauses in . Therefore, for , and , we include pointer variables and, for each and each literal in , the axioms encoding
| (17) |
Layer axioms
We would like to encode that the only variables resolved on in modules in layer are . We therefore include, for all , , , and , the axioms
| (18) | |||
| (19) |
encoding that all blocks in the module contain the same literals as the final derived clause , except possibly for the literals over variables that could have been resolved over in this module. Moreover, for , if is enabled we want that for every , either or appears as a literal in , that is
| (20) |
Connection axioms
Now, let be a bipartite unique-neighbor expander with , and uniform left degree given by Lemma 7 when the value of parameter is assigned to . Moreover, let be a circuit computing the neighbor function of a bipartite unique-neighbor expander with , and uniform left degree given by Lemma 7.
In order to connect the different modules we use the other two formulas. For each , we consider copies of , arranged in layer . Again, for every block appearing in the formula, we denote by the th copy of the block in layer . Moreover, between two consecutive layers, we introduce a copy of the formula , and for each block in we denote by the copy that appears after layer .
To connect the blocks in these different formulas we include the following extra axioms.
-
Connecting to . For all and
(21) (22) -
Connecting to . For all and
(23) (24) -
Connecting to . For all and ,
(25) (26)
Extension variables and axioms
Finally, in order for the upper bound to go through, we need to include some extension variables encoding that certain sets of literals are not present in a block.
For each block in each copy of and of we include extension variables encoding whether subsets of literals are not present in the block. That is, for and for each block appearing in any of the copies of or of in layer , we have
-
extension literal variables for each and , with the intended meaning is that if and only if the block is enabled and the clause in the block does not contain any of the literals .
To enforce the intended meaning of the extension variables, we have, for each and , clauses encoding the following constraint
| (27) |
where .
This concludes the presentation of the formula . As we mentioned, the algorithm that outputs our formula is randomized. However, as clear from the construction presented, the only the randomness needed is for constructing the expander graph and the circuits computing the neighbor functions of the expander graph .
4 Upper bound
In this section, we prove the upper bound in Theorem 2, namely we show that if is a satisfiable formula on variables, there is a tree-like Res() refutation of of size at most . Before presenting the formal proof, we introduce some notation and provide a brief description of the strategy and the intuition behind it.
We view clauses and conjunctions as functions, that is, given a clause on literals over variables , we say that for if falsifies all literals in , and otherwise. Similarly, given a conjunction we say that if satisfies all literals in , and otherwise.
Let be a CNF formula on variables. The relation is defined by
| (28) |
We view this relation as a search problem: given as input, find an such that , i.e., such that falsifies . We refer to this relation as the falsified clause search problem.
Definition 8.
Let be an unsatisfiable CNF formula on variables. A -decision tree solving is given by a rooted binary tree such that:
-
Non-leaf nodes. Each non-leaf node in the tree has two children – the -child and the -child – and is associated with a conjunction of at most Boolean literals over the variables of .
-
Paths. Given an assignment we can follow a path from the root to a leaf by starting at the root and moving to the -child. Denote by be the leaf reached when following this path for .
-
Leaf nodes. Each leaf node is labeled with the index to a clause in that satisfies the following statement: for all assignments such that it holds that , i.e., it holds that falsifies .
The size of a -decision tree is the number of nodes in the graph.
We describe a -decision tree of size solving the falsified clause search problem on and, by the classical equivalence between -decision trees and tree-like Res() [38], the desired upper bound follows.
4.1 Intuition
The proof follows the general strategy of the upper bound proof for as presented in, e.g., [18]. Recall that the formula is organized as a grid of modules with layers and modules per layer, and is the degree of the expander graph encoded in the subformulas of .
Given a block of , we refer to the clause encoded by the variables to be the clause at block .
We start by explaining how to define a decision tree (that is, a -decision tree) that solves when is satisfiable. The only problem with this upper bound is that it will be too large. We later explain how -decision trees can use the shortcuts of to yield a better upper bound.
Let be a satisfying assignment of . Starting at root block , we can query the enabled variable and, one by one, all literal variables that satisfies. Either we have found a falsified clause (one of the root axioms) or we have that the root block is enabled and has a clause with no literals, which therefore is falsified by . The goal is to move down the blocks of until we reach the axiom blocks at the last layer, all the while keeping the invariant that the block we are at is enabled and contains a clause that is falsified by . In this process, we either find a non-sound step, which immediately gives us a falsified clause of , or the path reaches an axiom block at the last layer. If we reach an axiom block at the last layer while keeping the invariant, we can easily find a falsified clause of . Indeed, since falsifies the clause at block but satisfies all clauses of , one of the axioms of encoding that the clause at must be a weakening of some clause in will be falsified.
As mentioned, this strategy works, but the decision tree obtained is too large: the size corresponds to roughly the number of possible root-to-axiom paths that maintain the invariant. In order to obtain a better upper bound, we make use of the shortcut variables and the extension variables. The idea is to move down layer by layer of , skipping modules entirely. We later define these special root-to-axiom paths that skip modules. The advantage is that there are much fewer such paths, roughly , and we have included extension variables so that -decision trees can realize this upper bound.
4.2 Formal proof
Let be a satisfying assignment of and let be all literals or that satisfies. Given , , we denote by the projection of to indices in the interval . The upper bound proceeds in rounds, starting at round until round . At the beginning of round we are at a node of the -decision tree which is labeled by some block for some and the queries leading to determine that the following invariant holds: “ is enabled and the clause at block is falsified by ”. More formally, the invariant is that the queries leading up to node enforce that and that for each . At each round , we define a subtree of the -decision tree: some of the leaves of this subtree correspond to leaves of the -decision tree since we can already identify a clause in that is falsified by all assignments (to the variables of ) that are compatible with the queries leading to this leaf. Other leaves of the subtree we refer to as open nodes, and they are labeled by some which we argue satisfies the invariant.
Before starting round , we define and query the enabled variable and, one by one, each literal variable for . Either we have identified a falsified clause of (one of the root axioms) or we now have that block satisfies the invariant. We now start round .
Suppose we are at round , at a node labeled by for some and that satisfies the invariant. For , let . Given a block that is either for some or for some , we define the -term
| (29) |
We start by querying and, while the answers to the queries so far are all , we continue querying . Note that this defines a depth- tree with leaves: there is one leaf for every corresponding to an answer to the query , and one leaf corresponding to all answers being . We argue that in all but of these nodes, we can easily (in size) find a clause of that is falsified. In each of the other cases, we either find a falsified clause of or we reach a single node where the invariant is satisfied for some block and we move to round .
Case 1: Queries are all
Let be the node where all the queries for are . We show that the subtree rooted at ends in closed leaves and is of size at most . The idea is that, unless we find a falsified clause of , we have that for every , either is not enabled, or the clause at is satisfied by . Then, since falsifies the clause at and the module encodes that we can derive the clause at from the clauses at the enabled ’s, there is a falsified clause of in the copy of .
To find a falsified clause of we proceed as follows. Given , we query until we get the an answer . Let be such that . If , then we falsify one of the extension axioms. If we query and for . If or , then we falsify one of the extension axioms. Otherwise, we query to determine whether the clause is derived or whether it is a weakening of an axiom.
If is derived, we query to determine what variable is resolved on at this clause. Let and let if (i.e., ) and if . We query the pointer variables to the -child and let . If then we falsify one of the module axioms. Let . We now query and for . If or , then we falsify one of the module axioms. We now query for until we get an answer . It cannot be that all answers are because (since ). Let be such that . We have that and for all and . This contradicts one of the extension axioms.
Now, if is a weakening of an axiom, we query the pointer to obtain the index of which is supposedly a weakening of. We query, one by one, and for . If or if , we falsify either axiom (6) or axiom (7) encoding that this is indeed a weakening of an axiom. Finally, if and for all , , then, similarly to the previous case, we contradict one of the extensions axioms since .
Case 2: Query is for some
Let be the node corresponding to answer for , for . We start by querying : if it is falsified we immediately contradict one of the extension axioms. We then query all variables for . If any of these returns , then we either contradict an extension axiom or layer axiom (18) (the latter due to the invariant). We query for all such that . If for some such we have that , then we contradict layer axiom (20).
In preparation for the next steps, we query, for , the variables and for all . If either or , we contradict one of the connection axioms. Now, let be such that for all . Note that . We consider two cases.
- Case 2.1: There exists a such that circuit .
-
Let . We query and for . If or , then we falsify one of the connection axioms. Otherwise, we query until one of the queries returns . If they all return , then we contradict the shrinking axiom (8). Let be the node where for and let block be the th neighbor of block . At we query and for . If or , then we falsify one of the shrinking axioms (9)-(10). Finally, let . We query and for . If or , then we falsify one of the connection axioms. Otherwise, satisfies the invariant and we move on to round .
- Case 2.2: For all it holds that circuit .
-
In this case, it is enough to query variables of the copy of the formula to find a contradiction. Indeed, we can query all circuit variables in in topological order, starting from the inputs. If the input to the circuit is not , then we have falsified the axiom that define the input of the circuit. If there is any incorrect computation, we immediately find a circuit axiom that is falsified. If the output does not correspond to the output gates, we also immediately falsify the axioms defining the output of the circuit. Finally, if everything is correct so far, then we are falsifying axiom (15).
After rounds, we reach a block at last layer. We repeat most of the round once more until we reach in the last row of the module. Here the decision tree queries the pointer and which encodes a clause in that is supposedly a weakening of. In this way, we obtain a subtree with open nodes, one for each clause of . At each of these nodes, we construct a subtree of size that checks the clause axioms for the corresponding clause of , which will necessarily lead to contradiction since the assignment satisfies . This completes the description of the -decision tree since there are no more open nodes.
Note that, every node labeled by a that satisfies the invariant at round , is the root of a subtree of size , with only open leaves that are labeled by some that satisfy the invariant at round . This implies that the number of leaves of the tree is at most
| (30) |
Therefore, the size of the tree is at most which is for our range of . This concludes the upper bound.
5 Lower bound
It remains to prove the lower bound in Theorem 2, namely show that if is an unsatisfiable formula on variables, any tree-like Res() refutation of requires size at least . The crucial step consists in exhibiting the following lower bound for the width of a Resolution refutation of .
| (31) |
where . Indeed, a tree-like Res() size lower bound follows from the size-width relation implicit in [29], and proven in [30].
Lemma 9 ([30]).
Let be a CNF formula of width , such that exists a tree-like Res() refutation of size , then has a resolution refutation of width .
If we assume that (31) holds, then for any such that , since the width of is , we have that any refutation of requires size .
We present the proof of the width lower bound in the full version of this paper. The main idea, following in [18], is to reduce some pigeonhole principle formulas, for which we do have width lower bounds, to . In our case, however, we need to extend this notion of reduction to allow reducing a collection of formulas to a single formula. We note that using such generalized reductions would lead to an improvement in parameters in [18] (matching those of [6]). We use this framework to reduce a large collection of suitable variants of pigeonhole principles – too large to obtain any non-trivial result via the vanilla reduction – to . The width lower bound for then follows from width lower bounds for the different variants of pigeonhole principle.
6 Concluding remarks
In this work, we prove that automating tree-like -DNF resolution in time is rETH-hard. This implies that, assuming rETH, the automating algorithm proposed by Atserias and Bonet [4] is optimal up to an in the exponent. A natural open problem is whether a similar result can be obtained under ETH. If we maintain the overall structure of our argument, obtaining the derandomization would be equivalent to designing a deterministic poly-time algorithm able to construct constant-degree polynomially unbalanced expander graphs. This question has been extensively studied in the area of pseudorandomness and remains an outstanding open problem. It worth mentioning that, for our application, we are allowed to relax the condition classically imposed on the size of the sets of vertices that expand, and in particular we may assume it to be polylogarithmic in the number of vertices.
Numerous intriguing unresolved problems involve automatability. We just focus on some of the ones most relevant to this work. As mentioned in the introduction, one of the frontiers of automatability results lies in understanding tree-like proof systems. It is highly plausible that the vast majority of tree-like proof systems are as hard to automate as their DAG-like counterparts. Nevertheless, many (weak) tree-like proof systems are unable to establish the upper bound needed to prove non-automatability results by the now standard techniques. Can we bypass this obstacle for concrete proof systems such as tree-like (resolution over linear equations mod 2) or tree-like cutting planes and obtain a non-automatability result which is stronger than what we know for tree-like resolution?
Very few non-trivial automating algorithm are known when automatability is defined with respect to size. However, there exist alternative definitions for automatability where the size parameter is substituted, for example, by degree or width, and in those cases there are some automating algorithms [13, 9, 32, 35]. Are these algorithms optimal? Partial results can be derived from [6].
References
- [1] Michael Alekhnovich, Sam Buss, Shlomo Moran, and Toniann Pitassi. Minimum propositional proof length is NP-hard to linearly approximate. Journal of Symbolic Logic, 66(1):171–191, 2001. doi:10.2307/2694916.
- [2] Michael Alekhnovich and Alexander A. Razborov. Resolution is not automatizable unless W[P] is tractable. SIAM Journal on Computing, 38(4):1347–1363, 2008. Preliminary version in FOCS ’01. doi:10.1137/06066850X.
- [3] Noel Arteche, Gaia Carenini, and Matthew Gray. Quantum automating -Frege is LWE-hard. In Proceedings of the 39th Computational Complexity Conference (CCC ’24), volume 300 of Leibniz International Proceedings in Informatics (LIPIcs), pages 15:1–15:25, July 2024. doi:10.4230/LIPIcs.CCC.2024.15.
- [4] Albert Atserias and María Luisa Bonet. On the automatizability of resolution and related propositional proof systems. Technical Report TR02-010, Electronic Colloquium on Computational Complexity (ECCC), 2002. URL: https://eccc.weizmann.ac.il/report/2002/010/.
- [5] Albert Atserias and María Luisa Bonet. On the automatizability of resolution and related propositional proof systems. Information and Computation, 189(2):182–201, March 2004. Preliminary version in CSL ’02. doi:10.1016/j.ic.2003.10.004.
- [6] Albert Atserias and Moritz Müller. Automating resolution is NP-hard. Journal of the ACM, 67(5), 2020. Preliminary version in FOCS ’19. doi:10.1145/3409472.
- [7] Paul Beame and Toniann Pitassi. Simplified and improved resolution lower bounds. In Proceedings of the 37th Annual IEEE Symposium on Foundations of Computer Science (FOCS ’96), pages 274–282, October 1996. doi:10.1109/SFCS.1996.548486.
- [8] Zoë Bell. Automating regular or ordered resolution is NP-hard. Technical Report TR20-105, Electronic Colloquium on Computational Complexity (ECCC), 2020. URL: https://eccc.weizmann.ac.il/report/2020/105/.
- [9] Eli Ben-Sasson and Avi Wigderson. Short proofs are narrow—resolution made simple. Journal of the ACM, 48(2):149–169, 2001. doi:10.1145/375827.375835.
- [10] John Adrian Bondy and Uppaluri Siva Ramachandra Murty. Graph theory. Springer, 2008.
- [11] María Luisa Bonet, Carlos Domingo, Ricard Gavaldà, Alexis Maciel, and Toniann Pitassi. Non-automatizability of bounded-depth Frege proofs. Computational Complexity, 13(1-2):47–68, December 2004. Preliminary version in CCC ’99. doi:10.1007/s00037-004-0183-5.
- [12] María Luisa Bonet, Toniann Pitassi, and Ran Raz. On interpolation and automatization for Frege systems. SIAM Journal on Computing, 29(6):1939–1967, 2000. Preliminary version in FOCS ’97. doi:10.1137/S0097539798353230.
- [13] Matthew Clegg, Jeff Edmonds, and Russell Impagliazzo. Using the Groebner basis algorithm to find proofs of unsatisfiability. In Proceedings of the 28th Annual ACM Symposium on Theory of Computing (STOC 96), pages 174–183, 1996. doi:10.1145/237814.237860.
- [14] Martin Davis, George Logemann, and Donald Loveland. A machine program for theorem proving. Communications of the ACM, 5(7):394–397, July 1962. doi:10.1145/368273.368557.
- [15] Martin Davis and Hilary Putnam. A computing procedure for quantification theory. Journal of the ACM, 7(3):201–215, 1960. doi:10.1145/321033.321034.
- [16] Susanna F. de Rezende. Automating tree-like resolution in time is ETH-hard. In Proceedings of the 11th Latin and American Algorithms, Graphs and Optimization Symposium (LAGOS ’21), May 2021. doi:10.1016/j.procs.2021.11.021.
- [17] Susanna F. de Rezende. Automating tree-like resolution in time is ETH-hard. Technical Report TR21-033, Electronic Colloquium on Computational Complexity (ECCC), 2021. URL: https://eccc.weizmann.ac.il/report/2021/033/.
- [18] Susanna F. de Rezende, Mika Göös, Jakob Nordström, Toniann Pitassi, Robert Robere, and Dmitry Sokolov. Automating algebraic proof systems is NP-hard. In Proceedings of the 53rd Annual ACM Symposium on Theory of Computing (STOC ’21), June 2021. doi:10.1145/3406325.3451080.
- [19] Holger Dell, Thore Husfeldt, Dániel Marx, Nina Taslaman, and Martin Wahlén. Exponential time complexity of the permanent and the Tutte polynomial. ACM Trans. Algorithms, 10(4):21:1–21:32, August 2014. doi:10.1145/2635812.
- [20] Kord Eickmeyer, Martin Grohe, and Magdalena Grüber. Approximation of natural W[P]-complete minimisation problems is hard. In Proceedings of the 23rd Annual IEEE Conference on Computational Complexity (CCC ’08), pages 8–18, June 2008. doi:10.1109/CCC.2008.24.
- [21] Nicola Galesi and Massimo Lauria. On the automatizability of polynomial calculus. Theory of Computing Systems, 47(2):491–506, 2010. doi:10.1007/s00224-009-9195-5.
- [22] Michal Garlík. Failure of feasible disjunction property for -dnf resolution and NP-hardness of automating it. In Proceedings of the 39th Computational Complexity Conference (CCC ’24), volume 300 of Leibniz International Proceedings in Informatics (LIPIcs), pages 33:1–33:23, July 2024. doi:10.4230/LIPIcs.CCC.2024.33.
- [23] Mika Göös, Sajin Koroth, Ian Mertz, and Toniann Pitassi. Automating cutting planes is NP-hard. In Proceedings of the 52nd Annual ACM Symposium on Theory of Computing (STOC ’20), pages 68–77, June 2020. doi:10.1145/3357713.3384248.
- [24] Russell Impagliazzo and Ramamohan Paturi. On the complexity of -SAT. Journal of Computer and System Sciences, 62(2):367–375, March 2001. Preliminary version in CCC ’99. doi:10.1006/jcss.2000.1727.
- [25] Dmitry Itsykson and Artur Riazanov. Automating OBDD proofs is NP-hard. In Proceedings of the 47th International Symposium on Mathematical Foundations of Computer Science (MFCS ’22), volume 241 of Leibniz International Proceedings in Informatics (LIPIcs), pages 59:1–59:15, August 2022. doi:10.4230/LIPIcs.MFCS.2022.59.
- [26] Kazuo Iwama. Complexity of finding short resolution proofs. In Proceedings of the 22nd International Symposium on Mathematical Foundations of Computer Science (MFCS ’97), pages 309–318, 1997. doi:10.1007/BFb0029974.
- [27] Jan Krajíček. On the weak pigeonhole principle. Fundamenta Mathematicae, 170(1-3):123–140, 2001. doi:10.4064/fm170-1-8.
- [28] Jan Krajícek and Pavel Pudlák. Some consequences of cryptographical conjectures for S and EF. Information and Computation, 140(1):82–94, 1998. doi:10.1006/inco.1997.2674.
- [29] Jan Krajiček. Lower bounds to the size of constant-depth propositional proofs. The Journal of Symbolic Logic, 59(1):73–86, 1994. doi:10.2307/2275250.
- [30] Massimo Lauria. A note about -DNF resolution. Information Processing Letters, 137:33–39, September 2018. doi:10.1016/j.ipl.2018.04.014.
- [31] Ian Mertz, Toniann Pitassi, and Yuanhao Wei. Short proofs are hard to find. In Proceedings of the 46th International Colloquium on Automata, Languages, and Programming (ICALP ’19), pages 84:1–84:16, 2019. doi:10.4230/LIPIcs.ICALP.2019.84.
- [32] Ryan O’Donnell. SOS is not obviously automatizable, even approximately. In Proceedings of the 8th Innovations in Theoretical Computer Science Conference (ITCS), volume 67, pages 59:1–59:10. Schloss Dagstuhl, 2017. doi:10.4230/LIPIcs.ITCS.2017.59.
- [33] Theodoros Papamakarios. Depth- Frege systems are not automatable unless P=NP. In Proceedings of the 39th Computational Complexity Conference (CCC ’24), volume 300 of Leibniz International Proceedings in Informatics (LIPIcs), pages 22:1–22:17, July 2024. doi:10.4230/LIPIcs.CCC.2024.22.
- [34] Pavel Pudlák. On reducibility and symmetry of disjoint NP pairs. Theoretical Computer Science, 295:323–339, February 2003. doi:10.1016/S0304-3975(02)00411-5.
- [35] Prasad Raghavendra and Benjamin Weitz. On the bit complexity of sum-of-squares proofs. In Proceedings of the 44th International Colloquium on Automata, Languages, and Programming (ICALP), pages 80:1–80:13, 2017. doi:10.4230/LIPIcs.ICALP.2017.80.
- [36] Alexander A Razborov. On provably disjoint NP-pairs. Aarhus Universitet. Basic Research in Computer Science [BRICS], November 1994. doi:10.7146/brics.v1i36.21607.
- [37] John Alan Robinson. The generalized resolution principle. In Automation of Reasoning: 2: Classical Papers on Computational Logic 1967–1970, pages 135–151. Springer, 1968. doi:10.1007/978-3-642-81955-1_9.
- [38] Nathan Segerlind, Samuel R. Buss, and Russell Impagliazzo. A switching lemma for small restrictions and lower bounds for -DNF resolution. SIAM Journal on Computing, 33(5):1171–1200, 2004. Preliminary version in FOCS ’02. doi:10.1109/SFCS.2002.1181984.
- [39] Michael Sipser. The history and status of the p versus NP question. In Proceedings of the 24th Annual ACM Symposium on Theory of Computing (STOC ’92), 1992. doi:10.1145/129712.129771.
