A Lower Bound for -DNF Resolution on Random CNF Formulas via Expansion
Abstract
Random -CNF formulas are one of the few candidates that are expected to be hard for proof systems and SAT algotirhms. Assume we sample clauses over variables. Here, the main complexity parameter is clause density, . For a fixed , there exists a satisfiability threshold such that for a formula is unsatisfiable with high probability. and for it is satisfiable with high probability. Near satisfiability threshold, there are various lower bounds for algorithms and proof systems [12, 13, 5, 22, 34, 25, 20, 37], and for high-density regimes, there exist upper bounds [19, 29, 1, 23].
One of the frontiers in the direction of proving lower bounds on these formulas is the -DNF Resolution proof system (aka ). There are several known results for [35, 3], that are applicable only for density regime near the threshold. In this paper, we show the first lower bound that is applicable in higher-density regimes. Our results work for slightly larger .
Keywords and phrases:
proof complexity, random CNFsCopyright and License:
2012 ACM Subject Classification:
Theory of computation Proof complexityAcknowledgements:
The authors would like to thank Edward Hirsch for comments on the draft, as well as the anonymous reviewers.Funding:
This work was supported by the Swiss State Secretariat for Education, Research and Innovation (SERI) under contract number MB22.00026.Editors:
Srikanth SrinivasanSeries and Publisher:
Leibniz International Proceedings in Informatics, Schloss Dagstuhl – Leibniz-Zentrum für Informatik
1 Introduction
Proof complexity studies whether there are efficient certificates for the unsatisfiability of boolean formulas. While satisfiability is easy to certify (one could consider a satisfying assignment if it exists), the question whether there exist polynomial-size proofs of unsatisfiability for every boolean formula remains a huge open problem in complexity theory. The non-existence of such proofs in any proof system would separate the classes and . According to Cook’s program, the idea is to prove lower bounds for stronger and stronger proof systems, so eventually we would be able to do it in a general case.
One of the difficulties with implementing this plan is the shortage of candidates for hard families of formulas. The intuition here is that any unsatisfiable example a person could invent is most likely accompanied with some natural reasons for its unsatisfiability (e.g. it is not hard to argue in natural language that Pigeonhole Principle or Tseitin formulas are unsatisfiable). One can formalize these reasons to try and produce an efficient proof in some proof system. The same intuition suggests to look at distributions of formulas for the hard candidates. As of now, there are three known distribution-based options:
-
random -CNFs;
-
pseudorandom generators (aka proof complexity generators);
-
clique formulas.
In this work, we focus on the first one. Random -CNF formulas are an important and popular object in various areas of the complexity theory. These formulas are generated as a random subset of clauses over variables.
Definition 1.
Let denote the distribution of random -CNF on variables obtained by sampling clauses of width (out of the possible clauses) uniformly at random with replacement.
We denote a clause density by .
It is a well-known fact that such formulas are unsatisfiable with high probability (whp), if is large enough.
Lemma 2 (Chvátal–Szemerédi, [15]).
For any whp is unsatisfiable if .
In other words, for each there is a density threshold such that if then whp the formula is unsatisfiable and if then whp the formula is satisfiable.
The mystery of density.
A common belief is that solving the satisfiability problem for random -CNF formulas near the density threshold is hard. At the same time if we sample too many clauses, say , then whp our formula will contain a local contradiction, i.e. there will be a subformula on small number of variables that is unsatisfiable and even tree-like Resolution may efficiently certify it. Even for SAT solvers clause density helps to reduce the running time, in particular, the running time of ordered procedure is upper bounded by [11]. And yet there is a certain gap between the satisfiability threshold and the density increase that is noticeable by the proof systems in the sense that it reduces the size of the proof. An exciting recent line of work [6, 32, 1, 23] provides strong refutation algorithms for random and semi-random CNFs for certain high-density regimes. Such algorithms found their applications in combinatorics and coding theory [7, 26]. Exploring different density regimes in various proof system thus seems crucial.
Feige’s conjecture [18] states: no polynomial time algorithm may prove whp the unsatisfiability of a random -CNF formula with arbitrary large constant clause density. This assumption of hardness on average implies the inapproximability of many NP-hard problems, such as vertex covering, DNF PAC learning, etc.
The sequence of papers that starts with the classical lower bounds by Chvátal and Szemerédi [15] shows the hardness of random -CNF formulas in Resolution for various regimes of density. In [15] the authors show that for any fixed there is a constant such that random -SAT requires length with high probabilty. But decays doubly-exponentially as increases and lower bound becomes trivial when . Later lower bounds by Ben-Sasson–Wigderson [14] and by Beame et al [11] reduced the decay in to polynomial in . Later Ben-Sasson [12] improved the polynomial in the dependency on . Similar type of dependencies on the density is known also for several other proof systems: Polynomial Calculus [13, 5], Sum-of-Squares [22]. proof system is a notable exception, and we have lower bounds only for density near the satisfiability threshold.
From the proof complexity point of view, random -CNFs are one of the most promising candidates to be hard for any proof system. We know many lower bounds for random formulas even in powerful proof systems like Sum-of-Squares. Such lower bounds are out of reach for other candidates like PRG formulas [4, 33] or Clique formulas [8, 31, 17]. We mention known results for random formulas in Section 1.1.
1.1 Prior Results
The following table summarizes known facts about the complexity of random -CNFs in different
proof systems.
| Proof system | Polynomial upper bound | Lower bound |
|---|---|---|
| Resolution | [11] | [12] |
| Polynomial Calculus | [13] [5] | |
| Sum-of-Squares | , [6, 32, 1, 23] | [22], [34], [27] |
| Cutting Planes | [25], [20], [37] | |
| -Frege | , [19], [29] | |
| [9] [3] [35] |
To clarify the comparison of these results, let us note here than Resolution is a strictly weaker system than all the others present in the table. models every other system present in the table, expect Sum-of-Squares, for which their relationship is not known. Everything else is not comparable (depending on the specific field for algebraic systems).
The big long-standing open problem in proof complexity is to show -Frege lower bounds for random -CNF formulas. Even for non-constant and depth- Frege this problem seems to be out of reach for current techniques. The current frontier in this direction is proof system that was introduced by Krajíček [28]. This is a subsystem of depth- Frege that uses -DNF formulas as proof lines (see Section 2) rather than general DNF formulas that are used by depth- Frege. In fact, it would be enough to have a robust (i.e. stable under restrictions of formulas) lower bound for to extend it to all ’s and, therefore, to depth- Frege using random restriction, so the gap between current state-of-the-art and this threshold might very well be breachable. Here by robust we mean a technique that is not tailored precisely to a specific unsatisfiable family, but that allows a certain degree of freedom in choosing a hard formula.
Known techniques.
All known techniques for proving lower bounds on the proof systems that are at least as powerful as are based on the restriction argument. In other words we choose a random partial assignment to the variables from a carefully chosen distribution, hit the formula and the proof by this assignment in order to get an extremely structured proof and leave the restricted formula hard for such proofs. In particular, -Frege transforms into a resolution proof under large partial assignments (we should assign number of variables); this method is also known as switching lemma [2, 10, 24]. We do not know how to make such an assignment and keep random -CNF formula hard for resolution. All known hardness results for refuting random formulas in are trying to avoid this problem in different ways and require different properties of random formulas. The key tool is the Small Restriction Switching Lemma, which assigns number of variables and reduces a proof to a Resolution proof.
-
In [35] the authors use the fact that for it is possible to use the uniform distribution on a certain set of partial restrictions and keep the restricted formula hard for Resolution. This result holds in case of clause density at most and an absolute constant. This lower bound is not uniform in terms of choice of the proof system. In other words, if we want to state that “there is a distribution on formulas that is hard for proof systems for all constant ”, we would need to purge the dependence between and .
-
Alekhnovich in [3] shows the solution for this problem. The distribution over partial assignments makes use of the structure of the dependency graph of the formula, but for the analysis it was required that this graph has low right degree of all vertices (in other words, any variable should appear in constant number of clauses). This requirement may be achieved only in case of constant clause density of a random formula. in this setup is allowed to be at most .
Both papers in addition require the dependency graph be an expander, which is a standard property for the analysis of hardness (that is almost “necessary”, since we have to argue that there are no local unsatisfiable subformulas).
1.2 Our Results
We suggest a new technique that helps us to extend and unify both mentioned lower bounds. Our results use only the fact that the dependency graph of a formula is a good enough expander. More formally, we show the following in Section 5.
Theorem 3.
Let be a -CNF formula such that its dependency graph is an -boundary expander. Then for any if:
then any proof of has size at least .
In Section 6 we show the following corollaries:
We would like to emphasize that this result is the first that provides a lower bound on the proofs for the constant independent on and polynomially large clause density .
As a weakness of our results, we should mention the fact that the constant should be big enough for the dependency graph of the formula to be an expander with good parameters. Naive computations say that is enough (see Section C). We did not try to optimize this constant, since we do not see the way to achieve the best possible value (like in [3]).
We describe our technique below.
Our technique.
-
1.
Given a -CNF formula on variables and clauses, we assume that a dependency graph (clauses–variables) is a good enough expander (this holds with probability for random formulas).
-
2.
For the sake of contradiction assume that there is a small -proof of . We would like to create a partial assignment such that:
-
is hard for Resolution (i.e. dependency graph of the restricted formula is still an expander graph);
-
transforms into a small Resolution proof.
-
In this general plan we replace Resolution proof system by a proof system based on the DNF-trees (see Section 5.2) and we prove that expansion properties of also imply a lower bound on the proof system based on these trees (see Section 5.3). We believe that this is a more natural object to consider when proving lower bounds of random CNF formulas.
The most challenging part in this strategy is the choice of and proof of its required properties. In [3, 35] the authors proposed to choose randomly and to prove the following dichotomy to show the required properties of . Here, a hitting set for a collection , is a set that intersects each :
-
either the terms of -DNF have a big minimal hitting set (aka covering number), and this line of the proof can be easily killed (satisfied) by a random restriction; so this -DNF can be simplified to a trivial decision tree;
-
or this hitting set is small, and in this case the line can be transformed into a decision tree plus a collection of -DNFs.
Note that since our goal is to transform -DNFs into some decision trees, we have to assign at least variables (the so-called function with certain parameters is a canonical example of a function that can be represented as -DNF and is resistent to simplification under small restrictions [30]). If is a fixed constant and we choose of proper size uniformly at random whp we violate at least one clause. Hence should respect constraints of .
Alekhnovich in [3] proposed the solution for the considered problem. With an assignment he associates a subformula of and chooses an assignment uniformly at random among assignments that satisfy this subformula (so-called closure in terms of bipartite dependency graph on clauses and variables, see Sections 3, 4). Note that in [35] these issues did not arise, since the degree of the dependency graph was large enough.
Unfortunately, we cannot deal with the closure proposed in [3] since the analysis in that paper is based on the fact that clause density is a universal constant. Instead, we use individual closure that satisfies some additional properties in comparison to closure used in [3]. We pick from a distribution that satisfies a subformula of based on individual closure.
The main technical advantage of individual closure is that it is robust enough to allow us to perform induction on its size even after restricting to certain subgraphs of the expander. In other words, while in [3] the parameter that gets reduced after applying the assignment is the width of the DNFs used in the proof, we instead reduce the sizes of individual closures of the terms of such DNFs. This is, arguably, a more natural measure when it comes to expander graphs, so this allows us more slack in the density of the formula. The properties of individual closure may be, therefore, of independent interest. While we are not aware whether this exact definition has already been introduced elsewhere among the huge variety of different expander closures, to the best of our knowledge, the use of its specific properties is new.
We also have to change the dichotomy, since the covering number does not help us to analyse probabilities in case of large clause density of formula. Here we introduce closure covering number that is based on generalization of hitting set notion. The new dichotomy is the following:
-
either “individual closures” of terms of -DNF have a big minimal hitting set, and this line can be easily killed by a random restriction;
-
or this hitting set is small, and in this case the line can be transformed into a decision tree plus a collection of -DNFs, but with smaller individual closures.
By using induction on sizes of individual closures we step by step show that can be represented as a sequence of DNF-trees. We do not extract a Resolution proof from this argument, dealing with the directed acyclic graph (dag) of proof instead (though we believe that our argument can be rephrased in terms of Resolution proofs). By working directly with proofs, we shed some light on the internal mechanism of how they behave under random restrictions. We believe this to be a step to future generalizations and to finding a method to argue about hardness in without appealing to Resolution.
1.3 The Outline
In Section 3 we give definitions for expander graphs and a notion of the individual closure, and show the required properties of it. In Section 4 we consider random CNF formulas and random linear systems. We give the criteria that some partial assignments are “independent” which is the key technical tool for the proof of the main result. In Section 5 we focus on the proof of the main Theorem, and we also prove a “Restriction Lemma” that is a translation of our notion of independency into the language of probabilities. In Section 6 we show several applications of the main Theorem for random CNF formulas.
2 Preliminaries
Let be a propositional variable, i.e., a variable that ranges over the set . A literal of is either (denoted sometimes as ) or (denoted sometimes as ). A clause is a disjunction of literals where . A CNF formula is a conjunction of clauses. A term is a conjunction of literals. A DNF formula is a disjunction of terms.
Let be a set of propositional variables. A partial assignment or a restriction is a mapping . We let denote the set of assigned variables. The restriction of a function (or a formula ) by , denoted (respectively, ), is the Boolean function (propositional formula) obtained from (respectively, from ) by setting the value of each to and leaving each unassigned.
We say that two partial assignments are consistent iff for any the following holds . In addition, if then we use the notation . We refer to as a partial assignment on a set of variables if .
-DNF Resolution.
In this paper we focus on classical generalization of the Resolution proof system, so-called -DNF Resolution aka [28].
A proof system operates with DNFs of width (or -DNFs). Here a width of the term is the number of literals in the term, and the width of a DNF is the maximal width of its terms. A -proof of an unsatisfiable CNF formula is a sequence of -DNFs such that is an empty formula. Each either comes from the original formula or is inferred from the previous ones using one of the rules (here and are literals):
- Weakening:
-
;
- And-introduction:
-
;
- And-elimination:
-
;
- Cut:
-
.
The size of the proof is . In fact, more naturally one can define the size of the proof as a sum of sizes of , but all our results holds also for our definition (that is stronger in terms of lower bounds).
3 Expanders
We use the following notation: is the set of neighbours of the set of vertices in the graph , is the set of unique neighbours of the set of vertices in the graph . A vertex is a unique neighbour of a set iff there is exactly one edge between and . We omit the index if the graph is evident from the context. Note that in general, for a vertex , is not necessarily equal to , because there could be parallel edges.
A bipartite graph is an -expander if all vertices have degree at most and for all sets , , it holds that . Similarly, is an -boundary expander if all vertices have degree at most and for all sets , , it holds that . In this context, a simple but useful observation is that
since all non-unique neighbours have at least two incident edges. This implies that if a graph is an -expander then it is also an -boundary expander.
The next Lemma is well known in the literature. In this form it was used in [21].
Lemma 4.
Let be an -boundary expander. Let be a set of vertices, . Then there exists an enumeration and a partition such that:
-
;
-
.
Proof.
Since it holds that and there is a vertex such that
Hence we can set as desired, and repeat the process for .
Since papers [5, 4] a “closure” operation is widely used in proof complexity. In this paper we start with definition from [5] and show some additional properties of it. To emphasize the difference, we call it individual closure.
Let denote a bipartite graph of left degree at most . We say that a vertex is -captured by a set iff . Let be the smallest set of vertices that are -captured by . We also can define the set inductively: may be considered as a maximal sequence of distinct vertices such that is -captured by . We denote by the extension of .
Remark 5.
is unique and well-defined.
Proof.
Fix some set . Let and be two sequences that satisfy the required properties. For the sake of contradiction assume that . Pick the first vertex that does not appear in . But and by the choice of : . Hence we can extend by , which contradicts with the maximality.
Lemma 6.
Let . Suppose that is an -boundary expander and that has size . Then .
Proof.
Let be a sequence of vertices from that generates . If then otherwise .
Note that . Hence:
Since by definition, the expansion property of the graph guarantees that . Altogether and the conclusion follows.
Suppose is not too large. Then Lemma 6 shows that the individual closure of is not much larger. Thus, after removing the closure and its neighbourhood from the graph, we are still left with a decent expander. The following lemma makes this intuition precise.
Lemma 7.
Let be an -boundary expander and . Then the graph is an -boundary expander.
Proof.
Consider a vertex and suppose that . By definition of individual closure for all : . Hence:
Hence for any of size at most :
We also need a technical definition for a graph that is -boundary expander. We say that a pair where and is -reasonable iff is an -boundary expander.
Remark 8.
A partial case of Lemma 7 may be reformulated as follows.
Let be an -boundary expander and . Then a pair is -reasonable.
The following property of individual closure is crucial for our purpose. On the one hand, it is trivial, on the other hand, it is unexpected, since for other definitions of closure (for example [16, 36]) it works in a completely opposite way.
Lemma 9.
Let be a bipartite graph with left degree at most and be a subgraph of . For any set and any the following holds.
-
1.
.
-
2.
If then .
Proof.
Let be the sequence that generates . Note that hence . So by induction on we conclude that all elements .
The second property follows from the similar argument. Let be the sequence that generates . Note that hence . So by induction on we conclude that all elements .
Let be an -boundary expander and . We say that are -closure-independent, if
For a collection of sets we say that a closure covering number (denoted as ) is the least size of a hitting set for the collection of sets , i.e. the least size of a set such that for all if is nonempty then there is such that .
4 Random CNF Formulas and Linear Systems
Let be a formula in variables from a set . With this formula, we associate a bipartite dependency graph where corresponds to the set of clauses of (and we identify these two sets), corresponds to the set of variables (and we also identify these two sets) and iff clause contains a variable or its negation.
We consider random CNFs as in Definition 1. In Appendix C we present some classical computations that show that randomly sampled graph is a good enough expander (see also [38]).
Let be a CNF formula on variables with clauses. We define a system of linear equations over . Let be a clause from . We add to the equation . We do this for every clause .
We identify the linear system and its standard encoding in CNF. Note that is a subformula of , so a lower bound on the length of a refutation for implies a lower bound for as well.
Let be a linear system over boolean variables from the set . Suppose that the equations are labeled by the elements of a set . Let denote a subsystem of on equations labeled by the set . For a partial assignment by we denote a system over variables that is obtained from by an application of . We remove all the equations that are satisfied by .
By analogy with dependency graph of a formula we define a dependency graph of a linear system .
Definition 10.
Let be a bipartite graph where the left part corresponds to equations of , and the right part to its variables. We draw an edge iff appears in where is a variable and is an equation.
Note that and are identical.
4.1 Locally Consistent Assignments
Let be a linear system based on a graph that is an -expander. We say that a partial assignment is locally consistent iff there is and a -reasonable pair such that:
-
;
-
the system is satisfiable.
The next Lemma is an analog of similar statement from [3]. But since we change the definition of a locally consistent assignment we provide a proof in Appendix D.
Lemma 11.
Let be a linear system based on a graph that is an -expander. If is a locally consistent assignment, then for any of size at most the system is satisfiable.
The following lemma gives us a useful characterisation of locally consistent assignments.
Lemma 12.
Let be a linear system based on a graph that is an -expander, and be an assignment on a subset of .
-
1.
If the assignment is locally consistent, then is satisfiable for all positive such that .
-
2.
If the system is satisfiable for some positive such that and , then the assignment is locally consistent.
Proof.
For the second statement note that a pair is -reasonable by Lemma 7. The statement follows from definition of local consistency.
Lemma 13 (Alekhnovich [3]).
Let be the set of variables. Let be partial assignment uniformly distributed on an affine subspace . Then for every term in variables either or .
4.2 Random Restrictions
Definition 14.
Let be a linear system, be an -expander and . We denote a uniform distribution over all locally consistent partial assignments with support as .
We define a distribution on partial assignments as follows:
-
create a set by adding each element of into uniformly at random with probability ;
-
pick an assignment from .
We omit the graph if it is clear from the context.
The following Lemma is a very powerful technical tool that helps to establish that some parts of random restrictions in the considered distributions may be chosen independently.
Lemma 15.
Let be a linear system based on a graph that is -boundary expander where for some positive .
Let be a set of size less than . Consider two sets that are -closure independent. If are the locally consistent assignments on and is a locally consistent assignment on , then:
Proof.
Consider an arbitrary assignment such that . Note that by Lemma 12 is locally consistent iff is satisfiable.
Fix an arbitrary locally consistent assignment on . Since it is locally consistent, is satisfiable. Moreover any extension of to the is locally consistent iff is satisfiable. Hence the number of such extensions depends only on the number of linearly independent equations in and in and does not depends on the values that we assign in .
This means that under the condition the assignment is generated uniformly at random among partial assignments that leave linear system satisfiable. Since these conditions are linear, we also may think that under condition the assignment is generated in the following way: pick a total extension of that satisfies uniformly at random, and then project in onto .
Considering the above properties and noticing that is also a linear constraint, we may compute the required probability:
where is the number of solutions. We have already shown that the denominator is independent of the exact values that we assign in , hence to conclude the proof it is enough to show that numerator is also independent of and . To do it we show that the system is satisfiable and hence number of solutions depends only on sizes of and .
By Lemma 4 there is an enumeration of vertices in and a sequence such that:
-
;
-
.
By Lemma 6 , hence by Lemma 11 system is satisfiable, hence there is an assignment on that is an extension of and satisfies . By Remark 8 (by Lemma 7) is -reasonable and hence is locally consistent. By the similar argument we can pick as assignment that is locally consistent extension of on . By induction on we create an assignment such that:
-
;
-
is consistent with ;
-
is satisfied by .
Suppose we have already done this for all . Let us consider the following cases.
-
1.
. In this case assigns all variables in and assigns all variables wrt to . By induction hypothesis is consistent with , hence by construction of the assignment assigns all variables in wrt to and hence it satisfies since satisfies it.
-
2.
. Similar to the previous case (we should consider instead of ).
-
3.
. By definition of individual closure can assign at most variables in , the same holds for . Hence and together assign at most variables, which is strictly less than and there is a variable in that is unassigned by and we can use it to satisfy the equation . Hence we can find an assignment that respects and satisfies . Here we use the fact that and are closure independent and hence and are disjoint.
The assignment satisfies by construction. Hence is independent of the choice of and the statement holds.
Corollary 16.
Let be a linear system based on a graph that is -boundary expander where for some positive .
Let be a set of size less than . Consider two sets that are -closure independent. If is a locally consistent assignment on and is a locally consistent assignment on then:
Proof.
Follows from Lemma 15 and observation that can be obtained from by averaging over all locally consistent .
5 Lower Bound
In this section we give a proof of the main technical Theorem.
Theorem 17 (Reformulation of Theorem 3).
Let be a linear system such that is an -boundary expander where . Then for any if:
then any proof of has size at least .
Following the plan presented in the introduction, we want to hit the proof by an assignment and transform it into a “resolution” (in fact, a structure we call “DNF-tree”, which will be defined later) proof. We do it in several steps.
-
We start with the technical tool: “Restriction Lemma”, Section 5.1 . It states that a -DNF that contains a lot of independent terms (here we use the definition of closure-independent terms) can be easily killed by an assignment from an appropriate distribution. It is our crucial technical tool.
-
In Section 5.3.2 we describe a transformation of -proof into DNF-tree proof of . During this process, we give up on some DNFs that appear in the middle steps of transformation (we call them broken branches).
-
In Section 5.3.3 we choose a proper partial assignment and use our Restriction Lemma to get rid of all broken branches. That concludes the transformation of into DNF-tree proof of . Moreover, all DNF-trees in this proof will have small height.
-
In the last step (Section 5.3.5) we give a direct proof of the lower bound on the height of DNF-trees.
Recall that the plan in the introduction required to prove the dichotomy for -DNFs (size of hitting set vs. probability of being killed by random restriction). The essential part of this dichotomy is “Restriction Lemma”, that we prove by using Lemma 15.
We deal with linear systems based on the expander graphs and we associate variables with the vertices of the right part of the graph. Hence we can define closure-independent terms and a closure covering number of a collection of terms in a natural way.
Let us start the realization of our plan.
5.1 Restriction vs. Closure Covering Number
We start with a technical lemma. It gives a way to translate a knowledge that some terms are closure-independent to the language of probabilities.
We call the term locally consistent if the corresponding partial assignment (that is, the minimal partial assignment satisfying the term) is locally consistent. We denote as a set of variables of the term .
Lemma 18.
Let be a linear system such that is an -boundary expander where for some positive . Let be a set of size less than . If is a sequence of locally consistent terms such that for any :
-
;
-
is -closure-independent of ;
then:
Proof.
We argue by induction on a number of terms that:
For we get the statement of the Lemma.
The base of induction follows from Lemma 13 since is locally consistent (and by Lemma 11 the probability that it is mapped to by is not zero): . Now suppose we proved the statement for the collection . Let us now do the induction step for term .
We can consider a locally consistent assignment such that:
-
,
-
,
since is locally consistent. If is consistent with then is mapped to by hence .
Let be an event that . And let be the distribution conditioned on .
| by induction hyp. | ||||
| assigns all variables in | ||||
| by Corollary 16 | ||||
We can use Corollary 16 since and the support of all assignment does not exceed , moreover is taken over locally consistent assignments since is a distribution over locally consistent assignments.
It remains to show that . Note that is consistent with iff maps to . Hence by Lemma 13 .
5.2 Tree and DNF
In this section we describe a technical structure that is a mix of DNF and decision tree. Let be a linear system based on the -expander graph.
Definition 19.
A DNF-tree is a rooted binary tree such that:
-
every internal node is labelled with a variable;
-
the edges leaving this node correspond to whether the variable is set to or ;
-
the leaves are labelled either with constant from or with DNF-formulas.
As usual, we assume that on every given path no variable appears more than once. Then every path from the root to a leaf may be viewed as a partial assignment, and this assignment, in turn, will be sometimes identified with the corresponding leaf.
For a DNF-tree , we denote the set of paths (partial assignments) that lead from the root to a leaf as . We also denote the set of paths leading to some leaf labelled by as . Finally, we denote the set of paths (partial assignments) that lead from the root to a leaf labelled by a non-trivial formula by . We say that a DNF-tree strongly represents a DNF formula if for every and for all , and for every , there exists such that .
Consider a DNF-tree and a partial assignment . An application of to denoted by is defined in a natural way by induction from leaves to root:
-
if is a leaf marked by or then ;
-
if is a leaf marked by DNF then is also a single vertex marked by (note that if some term in is mapped to by then or if all terms are mapped to then );
-
if is a tree with the root marked by a variable and two children and then:
-
–
if then is a tree with a root marked by and two children and ;
-
–
if then .
-
–
5.3 Proof of Theorem 17
Fix some parameters:
-
are various expansion parameters of graphs that appear in the proof;
-
.
Let be a proof of of size at most .
5.3.1 Plan of the Proof
We say that a partial assignment is -closed wrt iff there is a set such that . For a collection of -closed partial assignments we define a graph .
Let us say that a DNF-tree is closed (wrt a system ) iff for every branch the assignment is -closed wrt .
In this section, when we deal with locally consistent assignments wrt to a linear system based on a graph , we omit the mention of , as it is fixed. We refer to such assignments as locally consistent wrt to a graph .
We think of as a sequence of closed DNF-trees where is a tree that consists of single node marked by the formula .
We make iterations of modification of these trees. On -th iteration we create a collection . We also divide branches into three groups:
-
is a collection of broken branches that we create during our process;
-
that are locally inconsistent wrt are dead branches;
-
all other branches are alive.
For all the set is empty.
We maintain an upper bound of the height of the trees and the correctness property, i.e.
-
strongly represents ,
-
moreover each branch is marked by (it can possibly turn to a constant after applying the restriction).
After iterations we stop modifications and try to find a set of variables and some -closed partial assignment on that helps to achieve an additional property for each branch of tree :
-
if then:
-
–
either is inconsistent with ,
-
–
or there is a term such that ;
-
–
-
if is alive then it is marked by a constant or by a collection of locally inconsistent terms wrt (or in other words without ).
We say that a tree that satisfies all required properties is perfect. In section 5.3.5 we show the lower bound on the height of trees in the collection of perfect trees that corresponds to the proof of .
5.3.2 From to Perfect DNF-trees
Let us fix some parameters:
-
is an upper bound on the sizes of sets for branches that appear in the trees . Here is defined as in the beginning of 5.3.1;
-
is an upper bound on the total number on branches in these trees;
-
is a threshold for coverings.
Here is the number of the iteration, and is in the range .
Now we describe a construction of from . Suppose that before -th iteration we have a sequence of correct DNF-trees. Let . Consider a branch . If then it is marked by , so let be a DNF formula that consists of terms of that are locally consistent wrt .
There are four cases:
-
Branch for some or dead. We do not modify .
-
Branch is marked by a constant. We do not modify .
-
. Let be the set of variables on which the value of is achieved. We add a full binary tree that splits over all variables from
(see fig. 1). We mark the new leaves by the appropriately restricted DNF formulas and a set . Note that |. The height of these branches is . By Lemma 6, , so it follows that .
-
. We put into .
We say that . We satisfy the correctness property by construction.
5.3.3 Perfectness. Broken Branches
We pick an assignment from distribution . By construction, this assignment is -closed, and the witness of this property is , where is a set from the algorithm that generates this assignment.
Note that by Chernoff bound:
So we assume that .
Consider some branch that is consistent with . Note that:
-
is a dependency graph of ;
-
is the -boundary expanders by Lemma 7.
Let us remind that consists of locally consistent (wrt graph ) terms of the label of branch .
We want to show that if then satisfies whp.
Since then . We apply Lemma 27 for graph , a collection of terms , and and and get a sequence of terms from such that:
-
for any , is -closure independent of ;
-
.
The set contains the set with probability at least . And since for any : we can apply Chernoff bound and say:
Consider some that contains at least terms of . Let be a subsequence of that consists of terms that are subsets of . Note that for any , and are -closure-independent wrt . See fig. 2.
To estimate probability that we satisfy at least one term from we want to use Lemma 18. In order to do that, let us make the following observation.
Remark 20.
A pair is -reasonable wrt .
Proof.
Note that . Hence if we erase the pair from , the resulting graph will be and the statement follows from Lemma 7.
Let . For fixed , assuming that is consistent with , we may think that is taken from and the Remark 20 states that it is a locally consistent assignment wrt , which gives us an access to Lemma 18. So we apply Lemma 18 with the following parameters: a graph , and a collection . Here we use an assumption that and hence is at most by Lemma 6. We conclude that probability that does not satisfy any term from is at most:
Probability of Fail.
We fail the process in two cases:
-
is too large and we cannot use our lemmas for expander graphs. That happens with probability ;
-
does not map to any term in some branch . That happens with probability at most (either does not cover enough terms or does not satisfy at least one of covered terms). To conclude the counting, note that .
Hence whp our transformation satisfies perfectness for branches from all sets .
5.3.4 Perfectness. Alive Branches
This is the place where we use the properties of individual closure. Let us consider some that is marked by a DNF and an arbitrary locally consistent term . Note that . Let be the set of variables on which the value of is achieved. At this iteration we split according to the variables in some set . Consider an assignment to the variables of . Note that by the definition of closure covering and Lemma 9. Again note that by Lemma 9. Hence for any term that corresponds to some branch and survives after -th iteration we note that is strictly less than where is term in that generates after application of our transformation of the trees.
Note that for any term that appears in the original proof by Lemma 6. Hence after iterations for any locally consistent term : , or in other words it is mapped to a constant and the desired statement follows.
5.3.5 Lower Bound on Height
Now we have a sequence of perfect trees and we want to show non-existence of such sequence. We say that a branch has survived iff is consistent with and is locally consistent.
Remark 21.
In fact, one can extract a resolution proof of of small enough width from these trees, but it requires much more technical work and accuracy. And we believe that the direct proof of the height lower bound is more useful for future generalizations.
Let . Note that strongly represents by construction. We consider a dag of the proof . Starting from the vertex in this dag, we trace the path to the initial clause. In the node we maintain a partial assignment such that:
-
;
-
have survived.
Tree is a tree that consists of a single node marked by and we take .
Consider a node of the dag of . Assume that is derived from . We have an assignment that satisfies the required properties. Our goal is to find a branch among branches of trees that also satisfies the required properties. We will do it by increasing step by step. On each step we will have a closed assignment and a set such that:
-
and are consistent;
-
;
-
satisfies ;
-
.
Note that assignment is closed. Hence the set satisfies the required properties, and in the beginning is well-defined. Now we apply the following procedure to the assignment .
Note that height of the trees is at most and hence has size by construction and Lemma 6.
We have to show the existence of and that we stop on some iteration. We start with the existence. Fix some iteration of the inner loop. Note that and which by Lemma 7 implies that is an -expander. Moreover is a dependency graph of . Hence by Lemma 11 there is a total assignment that satisfies . Let be a restriction of on .
Now we want to show that we stop after some iteration. Note that:
-
and are consistent (by construction);
-
is an extension of (by construction);
-
satisfies (by construction);
-
For any of size at most : is satisfiable (by Lemma 11).
For the sake of contradiction, assume that on each iteration of outer loop we found some leaf from . Consider three cases.
-
is obtained by using weakening or And-elimination rule from . Assignment maps some term of to and hence it is also maps some term of to .
-
is obtained by using And-introduction . If maps some term to , then is also mapped to . If maps all to then is also mapped to .
-
is obtained by using cut rule . Note that maps some term to and some term , hence maps some term in to .
In all cases we conclude that maps some term to . But note that a pair is -reasonable by Lemma 7, hence is the witness of local satisfiability of . That contradicts with the choice of branch , since any term of is mapped by either to constant or to locally inconsistent term, and is an extension of .
Our algorithm returns some triple . We define . Note that hence does not violate any initial clause and .
By tracing the path in we reach a tree that strongly represents an initial clause . We have a branch such that:
-
and are consistent;
-
, which implies that violates ;
-
does not violate any initial clause.
That is a contradiction.
6 Application to Random Formulas
Theorem 22.
Let , be arbitrary constants. If where , then there are constants such that whp any proof of has size at least where .
Proof.
Applying Theorem 28, we conclude that the dependency graph of our formula is an -boundary expander, where for some constant that depends only on and .
Note that:
where the last inequality holds by the choice of . The statement follows from Theorem 17.
Theorem 23.
For any there is such that if where , then there are constants such that whp any proof of has size at least where .
Proof.
Applying Theorem 29 we conclude that there is such that dependency graph of our formula is an -boundary expander where for some constant that depends only on and .
Note that:
where the last inequality holds by the choice of . The statement follows from Theorem 17.
Theorem 24.
For any there is such that if where , then for any constant there is constant such that whp any proof of has size at least .
Proof.
Applying Theorem 30 we can choose any constant and that depends only on such that dependency graph of our formula is an -boundary expander where .
Note that:
where the last inequality holds by the choice of . The statement follows from Theorem 17.
Theorem 25.
For any there are such that if where and , then whp any proof of has size at least where .
Proof.
Applying Theorem 31 we conclude that dependency graph of our formula is an -boundary expander where for some constant that depends only on .
Note that:
where the last inequality holds by the choice of . The statement follows from Theorem 17.
References
- [1] Jackson Abascal, Venkatesan Guruswami, and Pravesh K. Kothari. Strongly refuting all semi-random boolean csps. In Dániel Marx, editor, Proceedings of the 2021 ACM-SIAM Symposium on Discrete Algorithms, SODA 2021, Virtual Conference, January 10 - 13, 2021, pages 454–472. SIAM, 2021. doi:10.1137/1.9781611976465.28.
- [2] Miklós Ajtai. The complexity of the pigeonhole principle. Combinatorica, 14(4):417–433, 1994. doi:10.1007/BF01302964.
- [3] Michael Alekhnovich. Lower bounds for k-dnf resolution on random 3-cnfs. Comput. Complex., 20(4):597–614, 2011. doi:10.1007/s00037-011-0026-0.
- [4] Michael Alekhnovich, Eli Ben-Sasson, Alexander A. Razborov, and Avi Wigderson. Pseudorandom generators in propositional proof complexity. SIAM J. Comput., 34(1):67–88, 2004. doi:10.1137/S0097539701389944.
- [5] Michael Alekhnovich and Alexander A. Razborov. Lower bounds for polynomial calculus: Non-binomial case. Proceedings of the Steklov Institute of Mathematics, 242:18–35, 2003. Available at http://people.cs.uchicago.edu/˜razborov/files/misha.pdf. Preliminary version in FOCS ’01.
- [6] Sarah R. Allen, Ryan O’Donnell, and David Witmer. How to refute a random CSP. In Venkatesan Guruswami, editor, IEEE 56th Annual Symposium on Foundations of Computer Science, FOCS 2015, Berkeley, CA, USA, 17-20 October, 2015, pages 689–708. IEEE Computer Society, 2015. doi:10.1109/FOCS.2015.48.
- [7] Omar Alrabiah, Venkatesan Guruswami, Pravesh K. Kothari, and Peter Manohar. A near-cubic lower bound for 3-query locally decodable codes from semirandom CSP refutation. In Barna Saha and Rocco A. Servedio, editors, Proceedings of the 55th Annual ACM Symposium on Theory of Computing, STOC 2023, Orlando, FL, USA, June 20-23, 2023, pages 1438–1448. ACM, 2023. doi:10.1145/3564246.3585143.
- [8] Albert Atserias, Ilario Bonacina, Susanna F. de Rezende, Massimo Lauria, Jakob Nordström, and Alexander A. Razborov. Clique is hard on average for regular resolution. In Ilias Diakonikolas, David Kempe, and Monika Henzinger, editors, Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2018, Los Angeles, CA, USA, June 25-29, 2018, pages 866–877. ACM, 2018. doi:10.1145/3188745.3188856.
- [9] Albert Atserias, Maria Luisa Bonet, and Juan Luis Esteban. Lower bounds for the weak pigeonhole principle and random formulas beyond resolution. Inf. Comput., 176(2):136–152, 2002. doi:10.1006/inco.2002.3114.
- [10] Paul Beame, Russell Impagliazzo, Jan Krajícek, Toniann Pitassi, and Pavel Pudlák. Lower bound on hilbert’s nullstellensatz and propositional proofs. In 35th Annual Symposium on Foundations of Computer Science, Santa Fe, New Mexico, USA, 20-22 November 1994, pages 794–806, 1994. doi:10.1109/SFCS.1994.365714.
- [11] Paul Beame, Richard M. Karp, Toniann Pitassi, and Michael E. Saks. The efficiency of resolution and davis–putnam procedures. SIAM J. Comput., 31(4):1048–1075, 2002. doi:10.1137/S0097539700369156.
- [12] Eli Ben-Sasson. Expansion in proof complexity. PhD thesis, Hebrew University of Jerusalem, Israel, 2001. URL: https://huji-primo.hosted.exlibrisgroup.com/permalink/f/13ns5ae/972HUJI_ALMA21159933340003701.
- [13] Eli Ben-Sasson and Russell Impagliazzo. Random cnf’s are hard for the polynomial calculus. In 40th Annual Symposium on Foundations of Computer Science, FOCS ’99, 17-18 October, 1999, New York, NY, USA, pages 415–421. IEEE Computer Society, 1999. doi:10.1109/SFFCS.1999.814613.
- [14] Eli Ben-Sasson and Avi Wigderson. Short proofs are narrow – resolution made simple. J. ACM, 48(2):149–169, 2001. doi:10.1145/375827.375835.
- [15] Vašek Chvátal and Endre Szemerédi. Many hard examples for resolution. J. ACM, 35(4):759–768, October 1988. doi:10.1145/48014.48016.
- [16] Susanna F. de Rezende, Jakob Nordström, Kilian Risse, and Dmitry Sokolov. Exponential resolution lower bounds for weak pigeonhole principle and perfect matching formulas over sparse graphs. CoRR, abs/1912.00534, 2019. arXiv:1912.00534.
- [17] Susanna F. de Rezende, Aaron Potechin, and Kilian Risse. Clique is hard on average for unary sherali-adams. In 64th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2023, Santa Cruz, CA, USA, November 6-9, 2023, pages 12–25. IEEE, 2023. doi:10.1109/FOCS57990.2023.00008.
- [18] Uriel Feige. Relations between average case complexity and approximation complexity. In Proceedings of the 17th Annual IEEE Conference on Computational Complexity, Montréal, Québec, Canada, May 21-24, 2002, page 5. IEEE Computer Society, 2002. doi:10.1109/CCC.2002.10006.
- [19] Uriel Feige, Jeong Han Kim, and Eran Ofek. Witnesses for non-satisfiability of dense random 3cnf formulas. In 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2006), 21-24 October 2006, Berkeley, California, USA, Proceedings, pages 497–508. IEEE Computer Society, 2006. doi:10.1109/FOCS.2006.78.
- [20] Noah Fleming, Denis Pankratov, Toniann Pitassi, and Robert Robere. Random (log n)-cnfs are hard for cutting planes. In Chris Umans, editor, 58th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2017, Berkeley, CA, USA, October 15-17, 2017, pages 109–120. IEEE Computer Society, 2017. doi:10.1109/FOCS.2017.19.
- [21] Konstantinos Georgiou, Avner Magen, and Madhur Tulsiani. Optimal sherali-adams gaps from pairwise independence. In Irit Dinur, Klaus Jansen, Joseph Naor, and José Rolim, editors, Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, pages 125–139, Berlin, Heidelberg, 2009. Springer Berlin Heidelberg. doi:10.1007/978-3-642-03685-9_10.
- [22] Dima Grigoriev. Linear lower bound on degrees of positivstellensatz calculus proofs for the parity. Theoretical Computer Science, 259(1):613–622, 2001. doi:10.1016/S0304-3975(00)00157-2.
- [23] Venkatesan Guruswami, Pravesh K. Kothari, and Peter Manohar. Algorithms and certificates for boolean CSP refutation: smoothed is no harder than random. In Stefano Leonardi and Anupam Gupta, editors, STOC ’22: 54th Annual ACM SIGACT Symposium on Theory of Computing, Rome, Italy, June 20 - 24, 2022, pages 678–689. ACM, 2022. doi:10.1145/3519935.3519955.
- [24] Johan Håstad. On small-depth frege proofs for tseitin for grids. J. ACM, 68(1):1:1–1:31, 2021. doi:10.1145/3425606.
- [25] Pavel Hrubes and Pavel Pudlák. Random formulas, monotone circuits, and interpolation. In Chris Umans, editor, 58th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2017, Berkeley, CA, USA, October 15-17, 2017, pages 121–131. IEEE Computer Society, 2017. doi:10.1109/FOCS.2017.20.
- [26] Pravesh K. Kothari and Peter Manohar. An exponential lower bound for linear 3-query locally correctable codes. In Bojan Mohar, Igor Shinkar, and Ryan O’Donnell, editors, Proceedings of the 56th Annual ACM Symposium on Theory of Computing, STOC 2024, Vancouver, BC, Canada, June 24-28, 2024, pages 776–787. ACM, 2024. doi:10.1145/3618260.3649640.
- [27] Pravesh K. Kothari, Ryuhei Mori, Ryan O’Donnell, and David Witmer. Sum of squares lower bounds for refuting any CSP. In Hamed Hatami, Pierre McKenzie, and Valerie King, editors, Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2017, Montreal, QC, Canada, June 19-23, 2017, pages 132–145. ACM, 2017. doi:10.1145/3055399.3055485.
- [28] Jan Krajíček. On the weak pigeonhole principle. Fundamenta Mathematicae, 170:123–140, January 2001. doi:10.4064/fm170-1-8.
- [29] Sebastian Müller and Iddo Tzameret. Short propositional refutations for dense random 3cnf formulas. Ann. Pure Appl. Log., 165(12):1864–1918, 2014. doi:10.1016/j.apal.2014.08.001.
- [30] Ryan O’Donnell. Analysis of Boolean Functions. Cambridge University Press, 2014. doi:10.1017/CBO9781139814782.
- [31] Shuo Pang. Large clique is hard on average for resolution. In Rahul Santhanam and Daniil Musatov, editors, Computer Science - Theory and Applications - 16th International Computer Science Symposium in Russia, CSR 2021, Sochi, Russia, June 28 - July 2, 2021, Proceedings, volume 12730 of Lecture Notes in Computer Science, pages 361–380. Springer, 2021. doi:10.1007/978-3-030-79416-3_22.
- [32] Prasad Raghavendra, Satish Rao, and Tselil Schramm. Strongly refuting random csps below the spectral threshold. In Hamed Hatami, Pierre McKenzie, and Valerie King, editors, Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2017, Montreal, QC, Canada, June 19-23, 2017, pages 121–131. ACM, 2017. doi:10.1145/3055399.3055417.
- [33] Alexander A. Razborov. Pseudorandom generators hard for k-dnf resolution and polynomial calculus resolution. Ann. of Math., 181:415–472, 2015. doi:10.4007/annals.2015.181.2.1.
- [34] Grant Schoenebeck. Linear level lasserre lower bounds for certain k-csps. In 49th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2008, October 25-28, 2008, Philadelphia, PA, USA, pages 593–602. IEEE Computer Society, 2008. doi:10.1109/FOCS.2008.74.
- [35] Nathan Segerlind, Samuel R. Buss, and Russell Impagliazzo. A switching lemma for small restrictions and lower bounds for k-dnf resolution. SIAM J. Comput., 33(5):1171–1200, 2004. doi:10.1137/S0097539703428555.
- [36] Dmitry Sokolov. (semi)algebraic proofs over 1 variables. In Konstantin Makarychev, Yury Makarychev, Madhur Tulsiani, Gautam Kamath, and Julia Chuzhoy, editors, Proccedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, STOC 2020, Chicago, IL, USA, June 22-26, 2020, pages 78–90. ACM, 2020. doi:10.1145/3357713.3384288.
- [37] Dmitry Sokolov. Random (log n)-cnf are hard for cutting planes (again). In Bojan Mohar, Igor Shinkar, and Ryan O’Donnell, editors, Proceedings of the 56th Annual ACM Symposium on Theory of Computing, STOC 2024, Vancouver, BC, Canada, June 24-28, 2024, pages 2008–2015. ACM, 2024. doi:10.1145/3618260.3649636.
- [38] Salil P. Vadhan. Pseudorandomness. Now Publishers Inc., Hanover, MA, USA, 2012.
Appendix A Chernoff Bound
Lemma 26 (Chernoff bound).
Let be independent random variables taking values in , and .
-
;
-
.
Appendix B Graph Properties
Lemma 27.
Let be an -boundary expander, be a collection of subsets of such that . Then for each it is possible to pick a sequence where:
-
for all there is such that ;
-
is -closure-independent of ;
-
.
Proof.
Let us start picking ’s in a greedy way. Suppose we picked terms for some , and we are not able to pick the term . This means that the set of vertices is a closure covering for .
hence .
Appendix C Random Graph is an Expander
For , we denote by the distribution over bipartite graphs with disjoint vertex sets and where the neighbourhood of a vertex is chosen by sampling a subset of size uniformly at random from .
Let be a randomly sampled graph from and . We estimate the probability that is not an -boundary expander for some parameter .
Let . We first estimate the probability that a set of size at most violates the boundary expansion. For brevity, let us write and . The probability that violates the boundary expansion can be bounded by:
Hence, the probability that is not a boundary expander can be bounded by
Now we can formulate some classical results about the existence of expander graphs.
Theorem 28.
Let , be arbitrary constants. If , there is a constant such that whp for a randomly sampled graph is an -boundary expander.
Proof.
Let and . Note that is not a boundary expander with probability at most:
And if we can choose to make sure that this sum is at most .
Theorem 29.
Let for some universal constant and . For any constant there is a constant such that whp for a randomly sampled graph is an -boundary expander.
Proof.
Let . Note that is not a boundary expander with probability at most:
And if this sum is .
Theorem 30.
Let for some universal constant and . For any constant there is a constant such that whp for a randomly sampled graph is an -boundary expander.
Proof.
Let . Note that is not a boundary expander with probability at most:
And if this sum is .
Theorem 31.
Let for some universal constant , . For any constant there is a constant such that whp for a randomly sampled graph is an -boundary expander where .
Proof.
Let . Note that is not a boundary expander with probability at most:
And if this sum is .
Appendix D Proof of Lemma 11
Lemma 32.
Let be a linear system based on a graph that is an -expander. If is a locally consistent assignment, then for any of size at most the system is satisfiable.
Proof.
Let a pair be a witness of the consistency of . So is a -reasonable pair for some . Let be an extension of on such that is satisfied (it exists since is satisfiable).
Pick an arbitrary set of size at most . Note that satisfies all constraints from . Let . Consider a graph obtained by removing a pair , that is -boundary expander. By Lemma 4 (applied to ) there is an enumeration and a partition such that:
-
;
-
.
For each we extend on by choosing an arbitrary assignment that satisfies constraint . Since there is at least one such assignment and we are done.
