Abstract 1 Introduction 2 Preliminaries 3 Expanders 4 Random CNF Formulas and Linear Systems 5 Lower Bound 6 Application to Random Formulas References Appendix A Chernoff Bound Appendix B Graph Properties Appendix C Random Graph is an Expander Appendix D Proof of Lemma 11

A Lower Bound for k-DNF Resolution on Random CNF Formulas via Expansion

Anastasia Sofronova ORCID École Polytechnique Fédérale de Lausanne, Switzerland Dmitry Sokolov ORCID École Polytechnique Fédérale de Lausanne, Switzerland
Abstract

Random Δ-CNF formulas are one of the few candidates that are expected to be hard for proof systems and SAT algotirhms. Assume we sample m clauses over n variables. Here, the main complexity parameter is clause density, χmn. For a fixed Δ, there exists a satisfiability threshold cΔ such that for χ>cΔ a formula is unsatisfiable with high probability. and for χ<cΔ it is satisfiable with high probability. Near satisfiability threshold, there are various lower bounds for algorithms and proof systems [12, 13, 5, 22, 34, 25, 20, 37], and for high-density regimes, there exist upper bounds [19, 29, 1, 23].

One of the frontiers in the direction of proving lower bounds on these formulas is the k-DNF Resolution proof system (aka Res(k)). There are several known results for k=𝒪(lognloglogn) [35, 3], that are applicable only for density regime near the threshold. In this paper, we show the first Res(k) lower bound that is applicable in higher-density regimes. Our results work for slightly larger k=𝒪(logn).

Keywords and phrases:
proof complexity, random CNFs
Copyright and License:
[Uncaptioned image] © Anastasia Sofronova and Dmitry Sokolov; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Proof complexity
Related Version:
Full Version: https://eccc.weizmann.ac.il/report/2022/054/
Acknowledgements:
The authors would like to thank Edward Hirsch for comments on the draft, as well as the anonymous reviewers.
Funding:
This work was supported by the Swiss State Secretariat for Education, Research and Innovation (SERI) under contract number MB22.00026.
Editors:
Srikanth Srinivasan

1 Introduction

Proof complexity studies whether there are efficient certificates for the unsatisfiability of boolean formulas. While satisfiability is easy to certify (one could consider a satisfying assignment if it exists), the question whether there exist polynomial-size proofs of unsatisfiability for every boolean formula remains a huge open problem in complexity theory. The non-existence of such proofs in any proof system would separate the classes 𝖭𝖯 and 𝖼𝗈𝖭𝖯. According to Cook’s program, the idea is to prove lower bounds for stronger and stronger proof systems, so eventually we would be able to do it in a general case.

One of the difficulties with implementing this plan is the shortage of candidates for hard families of formulas. The intuition here is that any unsatisfiable example a person could invent is most likely accompanied with some natural reasons for its unsatisfiability (e.g. it is not hard to argue in natural language that Pigeonhole Principle or Tseitin formulas are unsatisfiable). One can formalize these reasons to try and produce an efficient proof in some proof system. The same intuition suggests to look at distributions of formulas for the hard candidates. As of now, there are three known distribution-based options:

  • random Δ-CNFs;

  • pseudorandom generators (aka proof complexity generators);

  • clique formulas.

In this work, we focus on the first one. Random Δ-CNF formulas are an important and popular object in various areas of the complexity theory. These formulas are generated as a random subset of m clauses over n variables.

Definition 1.

Let φ(m,n,Δ) denote the distribution of random Δ-CNF on n variables obtained by sampling m clauses of width Δ (out of the (nΔ)2Δ possible clauses) uniformly at random with replacement.

We denote a clause density by χmn.

It is a well-known fact that such formulas are unsatisfiable with high probability (whp), if m is large enough.

Lemma 2 (Chvátal–Szemerédi, [15]).

For any Δ3 whp φφ(m,n,Δ) is unsatisfiable if mln22Δn.

In other words, for each Δ there is a density threshold cΔ such that if χ>cΔ then whp the formula is unsatisfiable and if χ<cΔ then whp the formula is satisfiable.

The mystery of density.

A common belief is that solving the satisfiability problem for random Δ-CNF formulas near the density threshold is hard. At the same time if we sample too many clauses, say mnΔ1, then whp our formula will contain a local contradiction, i.e. there will be a subformula on small number of variables that is unsatisfiable and even tree-like Resolution may efficiently certify it. Even for SAT solvers clause density helps to reduce the running time, in particular, the running time of ordered DLL procedure is upper bounded by exp(𝒪(nχ1/(Δ2))) [11]. And yet there is a certain gap between the satisfiability threshold and the density increase that is noticeable by the proof systems in the sense that it reduces the size of the proof. An exciting recent line of work [6, 32, 1, 23] provides strong refutation algorithms for random and semi-random CNFs for certain high-density regimes. Such algorithms found their applications in combinatorics and coding theory [7, 26]. Exploring different density regimes in various proof system thus seems crucial.

Feige’s conjecture [18] states: no polynomial time algorithm may prove whp the unsatisfiability of a random 𝒪(1)-CNF formula with arbitrary large constant clause density. This assumption of hardness on average implies the inapproximability of many NP-hard problems, such as vertex covering, DNF PAC learning, etc.

The sequence of papers that starts with the classical lower bounds by Chvátal and Szemerédi [15] shows the hardness of random Δ-CNF formulas in Resolution for various regimes of density. In [15] the authors show that for any fixed χ2Δln2 there is a constant κ(χ) such that random k-SAT requires length exp(κ(χ)n) with high probabilty. But κ decays doubly-exponentially as χ increases and lower bound becomes trivial when mnlog1/4n. Later lower bounds by Ben-Sasson–Wigderson [14] and by Beame et al [11] reduced the decay in κ to polynomial in χ. Later Ben-Sasson [12] improved the polynomial in the dependency on χ. Similar type of dependencies on the density is known also for several other proof systems: Polynomial Calculus [13, 5], Sum-of-Squares [22]. Res(k) proof system is a notable exception, and we have lower bounds only for density near the satisfiability threshold.

From the proof complexity point of view, random Δ-CNFs are one of the most promising candidates to be hard for any proof system. We know many lower bounds for random formulas even in powerful proof systems like Sum-of-Squares. Such lower bounds are out of reach for other candidates like PRG formulas [4, 33] or Clique formulas [8, 31, 17]. We mention known results for random formulas in Section 1.1.

1.1 Prior Results

The following table summarizes known facts about the complexity of random Δ-CNFs in different proof systems.

Proof system Polynomial upper bound Lower bound 2nε
Resolution m>nΔ1logΔ2n [11] m<nΔ2o(1) [12]
Polynomial Calculus m=𝒪(n),Δ3 [13] m=𝗉𝗈𝗅𝗒(n),Δ=3 [5]
Sum-of-Squares Δ=k,m=𝒪~(nk2), [6, 32, 1, 23] m=𝗉𝗈𝗅𝗒(n),Δ=𝒪(1) [22], [34], [27]
Cutting Planes m=𝗉𝗈𝗅𝗒(n),Δ=Ω(logn) [25], [20], [37]
𝖳𝖢0-Frege Δ=3, m>n1.4 [19], [29] ×
Res(k) m=𝒪(n),Δ3,k=2 [9] m=𝒪(n),Δ3,k=𝒪(lognloglogn) [3] m=n7/6,Δ=𝒪(k2),k=𝒪(1) [35]

To clarify the comparison of these results, let us note here than Resolution is a strictly weaker system than all the others present in the table. 𝖳𝖢0 models every other system present in the table, expect Sum-of-Squares, for which their relationship is not known. Everything else is not comparable (depending on the specific field for algebraic systems).

The big long-standing open problem in proof complexity is to show 𝖠𝖢0-Frege lower bounds for random Δ-CNF formulas. Even for non-constant Δ and depth-2 Frege this problem seems to be out of reach for current techniques. The current frontier in this direction is Res(k) proof system that was introduced by Krajíček [28]. This is a subsystem of depth-2 Frege that uses k-DNF formulas as proof lines (see Section 2) rather than general DNF formulas that are used by depth-2 Frege. In fact, it would be enough to have a robust (i.e. stable under restrictions of formulas) lower bound for k=log1+εn to extend it to all k’s and, therefore, to depth-2 Frege using random restriction, so the gap between current state-of-the-art and this threshold might very well be breachable. Here by robust we mean a technique that is not tailored precisely to a specific unsatisfiable family, but that allows a certain degree of freedom in choosing a hard formula.

Known techniques.

All known techniques for proving lower bounds on the proof systems that are at least as powerful as Res(2) are based on the restriction argument. In other words we choose a random partial assignment to the variables from a carefully chosen distribution, hit the formula and the proof by this assignment in order to get an extremely structured proof and leave the restricted formula hard for such proofs. In particular, 𝖠𝖢0-Frege transforms into a resolution proof under large partial assignments (we should assign no(n) number of variables); this method is also known as switching lemma [2, 10, 24]. We do not know how to make such an assignment and keep random Δ-CNF formula hard for resolution. All known hardness results for refuting random formulas in Res(k) are trying to avoid this problem in different ways and require different properties of random formulas. The key tool is the Small Restriction Switching Lemma, which assigns εn number of variables and reduces a Res(k) proof to a Resolution proof.

  • In [35] the authors use the fact that for Δk2 it is possible to use the uniform distribution on a certain set of partial restrictions and keep the restricted formula hard for Resolution. This result holds in case of clause density at most χ=n1/6 and k an absolute constant. This lower bound is not uniform in terms of choice of the proof system. In other words, if we want to state that “there is a distribution on formulas that is hard for Res(k) proof systems for all constant k”, we would need to purge the dependence between Δ and k.

  • Alekhnovich in [3] shows the solution for this problem. The distribution over partial assignments makes use of the structure of the dependency graph of the formula, but for the analysis it was required that this graph has low right degree of all vertices (in other words, any variable should appear in constant number of clauses). This requirement may be achieved only in case of constant clause density of a random formula. k in this setup is allowed to be at most 𝒪(lognloglogn).

Both papers in addition require the dependency graph be an expander, which is a standard property for the analysis of hardness (that is almost “necessary”, since we have to argue that there are no local unsatisfiable subformulas).

Another relevant work is Razborov’s improved small-set switching lemma [33]. Though it builds on an improved technique from [35], the formulas considered (pseudorandom generators) are quite different, so it is not clear if this result is directly comparable with ours.

1.2 Our Results

We suggest a new technique that helps us to extend and unify both mentioned lower bounds. Our results use only the fact that the dependency graph of a formula is a good enough expander. More formally, we show the following in Section 5.

Theorem 3.

Let φ be a Δ-CNF formula such that its dependency graph G is an (r,Δ,0.95Δ)-boundary expander. Then for any δ>0 if:

nδ(n0.4r)20k2=o(r/k)

then any Res(k) proof of φ has size at least 2nδ.

In Section 6 we show the following corollaries:

  • an exponential lower bound for any constant k, Δ=𝒪(1) in case m=𝗉𝗈𝗅𝗒(n) (improvement of the result of Segerlind, Buss, Impagliazzo [35]);

  • an exponential lower bound for k=𝒪(logn), Δ=𝒪(1) in case m=𝒪(n) (improvement of the result of Alekhnovich [3]).

We would like to emphasize that this result is the first that provides a lower bound on the Res(k) proofs for the constant Δ independent on k and polynomially large clause density m=𝗉𝗈𝗅𝗒(n).

As a weakness of our results, we should mention the fact that the constant Δ should be big enough for the dependency graph of the formula to be an expander with good parameters. Naive computations say that Δ100 is enough (see Section C). We did not try to optimize this constant, since we do not see the way to achieve the best possible value 3 (like in [3]).

We describe our technique below.

Our technique.

We follow the ideas of random restriction technique [35, 3].

  1. 1.

    Given a Δ-CNF formula φ on n variables and m clauses, we assume that a dependency graph (clauses–variables) is a good enough expander (this holds with probability 1o(1) for random formulas).

  2. 2.

    For the sake of contradiction assume that there is a small Res(k)-proof π of φ. We would like to create a partial assignment ρ such that:

    • φ|ρ is hard for Resolution (i.e. dependency graph of the restricted formula is still an expander graph);

    • π|ρ transforms into a small Resolution proof.

In this general plan we replace Resolution proof system by a proof system based on the DNF-trees (see Section 5.2) and we prove that expansion properties of φ|ρ also imply a lower bound on the proof system based on these trees (see Section 5.3). We believe that this is a more natural object to consider when proving lower bounds of random CNF formulas.

The most challenging part in this strategy is the choice of ρ and proof of its required properties. In [3, 35] the authors proposed to choose ρ randomly and to prove the following dichotomy to show the required properties of ρ. Here, a hitting set for a collection {S1,,Sl}, Si𝒰 is a set S𝒰 that intersects each Si:

  • either the terms of k-DNF have a big minimal hitting set (aka covering number), and this line of the proof can be easily killed (satisfied) by a random restriction; so this k-DNF can be simplified to a trivial decision tree;

  • or this hitting set is small, and in this case the line can be transformed into a decision tree plus a collection of (k1)-DNFs.

Note that since our goal is to transform k-DNFs into some decision trees, we have to assign at least εn variables (the so-called Tribes function with certain parameters is a canonical example of a function that can be represented as k-DNF and is resistent to simplification under small restrictions [30]). If Δ is a fixed constant and we choose ρ of proper size uniformly at random whp we violate at least one clause. Hence ρ should respect constraints of φ.

Alekhnovich in [3] proposed the solution for the considered problem. With an assignment ρ he associates a subformula of φ and chooses an assignment uniformly at random among assignments that satisfy this subformula (so-called closure in terms of bipartite dependency graph on clauses and variables, see Sections 3, 4). Note that in [35] these issues did not arise, since the degree of the dependency graph was large enough.

Unfortunately, we cannot deal with the closure proposed in [3] since the analysis in that paper is based on the fact that clause density is a universal constant. Instead, we use individual closure that satisfies some additional properties in comparison to closure used in [3]. We pick ρ from a distribution that satisfies a subformula of φ based on individual closure.

The main technical advantage of individual closure is that it is robust enough to allow us to perform induction on its size even after restricting to certain subgraphs of the expander. In other words, while in [3] the parameter that gets reduced after applying the assignment is the width of the DNFs used in the proof, we instead reduce the sizes of individual closures of the terms of such DNFs. This is, arguably, a more natural measure when it comes to expander graphs, so this allows us more slack in the density of the formula. The properties of individual closure may be, therefore, of independent interest. While we are not aware whether this exact definition has already been introduced elsewhere among the huge variety of different expander closures, to the best of our knowledge, the use of its specific properties is new.

We also have to change the dichotomy, since the covering number does not help us to analyse probabilities in case of large clause density of formula. Here we introduce closure covering number that is based on generalization of hitting set notion. The new dichotomy is the following:

  • either “individual closures” of terms of k-DNF have a big minimal hitting set, and this line can be easily killed by a random restriction;

  • or this hitting set is small, and in this case the line can be transformed into a decision tree plus a collection of k-DNFs, but with smaller individual closures.

By using induction on sizes of individual closures we step by step show that π|ρ can be represented as a sequence of DNF-trees. We do not extract a Resolution proof from this argument, dealing with the directed acyclic graph (dag) of Res(k) proof instead (though we believe that our argument can be rephrased in terms of Resolution proofs). By working directly with Res(k) proofs, we shed some light on the internal mechanism of how they behave under random restrictions. We believe this to be a step to future generalizations and to finding a method to argue about hardness in Res(k) without appealing to Resolution.

1.3 The Outline

In Section 3 we give definitions for expander graphs and a notion of the individual closure, and show the required properties of it. In Section 4 we consider random CNF formulas and random linear systems. We give the criteria that some partial assignments are “independent” which is the key technical tool for the proof of the main result. In Section 5 we focus on the proof of the main Theorem, and we also prove a “Restriction Lemma” that is a translation of our notion of independency into the language of probabilities. In Section 6 we show several applications of the main Theorem for random CNF formulas.

2 Preliminaries

Let x be a propositional variable, i.e., a variable that ranges over the set {0,1}. A literal of x is either x (denoted sometimes as x1) or ¬x (denoted sometimes as x0). A clause Cx1c1x2c2xkck is a disjunction of literals where c1,c2,,ck{0,1}. A CNF formula φC1Cm is a conjunction of clauses. A term is a conjunction of literals. A DNF formula φt1tm is a disjunction of terms.

Let X be a set of propositional variables. A partial assignment or a restriction is a mapping ρ:X{0,1,}. We let supp(ρ)ρ1({0,1}) denote the set of assigned variables. The restriction of a function f (or a formula φ) by ρ, denoted f|ρ (respectively, φ|ρ), is the Boolean function (propositional formula) obtained from f (respectively, from φ) by setting the value of each xisupp(ρ) to ρ(xi) and leaving each xisupp(ρ) unassigned.

We say that two partial assignments ρ,ρ are consistent iff for any xsupp(ρ)supp(ρ) the following holds ρ(x)=ρ(x). In addition, if supp(ρ)supp(ρ) then we use the notation ρρ. We refer to ρ as a partial assignment on a set of variables J if supp(ρ)=J.

𝒌-DNF Resolution.

In this paper we focus on classical generalization of the Resolution proof system, so-called k-DNF Resolution aka Res(k) [28].

A proof system Res(k) operates with DNFs of width k (or k-DNFs). Here a width of the term is the number of literals in the term, and the width of a DNF is the maximal width of its terms. A Res(k)-proof π of an unsatisfiable CNF formula φ is a sequence of k-DNFs πC1,,Cs such that Cs= is an empty formula. Each Ci either comes from the original formula φ or is inferred from the previous ones using one of the rules (here l and li are literals):

Weakening:

FF;

And-introduction:

F1,,FwF(i=0wi);

And-elimination:

F(i=0wi)Fi;

Cut:

F(i=0wi),G(i=0w¬i)FG.

The size of the proof π is s. In fact, more naturally one can define the size of the proof as a sum of sizes of Ci, but all our results holds also for our definition (that is stronger in terms of lower bounds).

3 Expanders

We use the following notation: NG(S) is the set of neighbours of the set of vertices S in the graph G, G(S) is the set of unique neighbours of the set of vertices S in the graph G. A vertex v is a unique neighbour of a set S iff there is exactly one edge between v and S. We omit the index G if the graph is evident from the context. Note that in general, for a vertex v, G(v) is not necessarily equal to NG(v), because there could be parallel edges.

A bipartite graph G(L,R,E) is an (r,Δ,c)-expander if all vertices uL have degree at most Δ and for all sets SL, |S|r, it holds that |N(S)|c|S|. Similarly, G(L,R,E) is an (r,Δ,c)-boundary expander if all vertices uL have degree at most Δ and for all sets SL, |S|r, it holds that |(S)|c|S|. In this context, a simple but useful observation is that

|N(S)||(S)|+Δ|S||(S)|2=Δ|S|+|(S)|2,

since all non-unique neighbours have at least two incident edges. This implies that if a graph G is an (r,Δ,(1ε)Δ)-expander then it is also an (r,Δ,(12ε)Δ)-boundary expander.

The next Lemma is well known in the literature. In this form it was used in [21].

Lemma 4.

Let G=(L,R,E) be an (r,Δ,c)-boundary expander. Let SL be a set of vertices, |S|r. Then there exists an enumeration S={s1,s2,,s|S|} and a partition iRi=N(S) such that:

  • Ri=N(si)(j=1i1N(sj));

  • |(si)Ri|c.

Proof.

Since |S|r it holds that |(S)|c|S| and there is a vertex s|S|S such that

|(s|S|)(j=1i1N(sj))|c.

Hence we can set R|S| as desired, and repeat the process for S{s|S|}.

Since papers [5, 4] a “closure” operation is widely used in proof complexity. In this paper we start with definition from [5] and show some additional properties of it. To emphasize the difference, we call it individual closure.

Let G(L,R,E) denote a bipartite graph of left degree at most Δ. We say that a vertex vL is ν-captured by a set JR iff |N(v)J|Δν. Let IClGν(J)L be the smallest set of vertices that are ν-captured by N(IClGν(J))J. We also can define the set IClGν(J) inductively: IClGν(J) may be considered as a maximal sequence of distinct vertices {v1,v2,v3,,vi,} such that vi is ν-captured by Jj=1i1N(vj). We denote by ExtGν(J)JN(IClGν(J)) the extension of J.

 Remark 5.

IClGν(J) is unique and well-defined.

Proof.

Fix some set J. Let V{v1,v2,v3,,vi,,v|V|} and U{u1,u2,u3,,ui,,u|U|} be two sequences that satisfy the required properties. For the sake of contradiction assume that UV. Pick the first vertex ujU that does not appear in V. But |N(uj)(Jk=1j1N(uk))|Δν and by the choice of uj: |N(uj)(JvVN(v))|Δν. Hence we can extend V by uj, which contradicts with the maximality.

Lemma 6.

Let c>ν0. Suppose that G is an (r,Δ,c)-boundary expander and that JR has size |J|<(cν)r. Then |IClν(J)||J|cν.

Proof.

Let V{v1,v2,v3,,v} be a sequence of vertices from L that generates IClν(J). If >r then S{v1,v2,,vr} otherwise SV.

Note that (S)i=1|S|(N(vi)N(j=1i1vj)). Hence:

|(S)J| i=1|S||N(vi)(N(j=1i1vj)J)|
i=1|S|ν
ν|S|.

Since |S|r by definition, the expansion property of the graph guarantees that |(S)J|c|S||J|. Altogether |S||J|cν<r and the conclusion follows.

Suppose JR is not too large. Then Lemma 6 shows that the individual closure of J is not much larger. Thus, after removing the closure and its neighbourhood from the graph, we are still left with a decent expander. The following lemma makes this intuition precise.

Lemma 7.

Let G(L,R,E) be an (r,Δ,c)-boundary expander and J1,J2,,JR. Then the graph G(i=1(Extνi(Ji)IClνi(Ji))) is an (r,Δ,ci=1(Δνi))-boundary expander.

Proof.

Consider a vertex vL and suppose that vL(i=1IClνi(Ji)). By definition of individual closure for all i[]: |N(v)Extνi(Ji)|<Δνi. Hence:

|N(v)(i=1Extνi(Ji))|<i=1(Δνi).

Hence for any SL(i=1IClνi(Ji)) of size at most r:

|(S)(i=1Extνi(Ji))|c|S|i=1(Δνi)|S|.

We also need a technical definition for a graph G(L,R,E) that is (r,Δ,c)-boundary expander. We say that a pair (S,T) where SL and TR is ζ-reasonable iff (LS,R(TN(S)),E) is an (r,Δ,ζ)-boundary expander.

 Remark 8.

A partial case of Lemma 7 may be reformulated as follows.

Let G(L,R,E) be an (r,Δ,c)-boundary expander and JR. Then a pair (IClν(J),Extν(J)) is (c(Δν))-reasonable.

The following property of individual closure is crucial for our purpose. On the one hand, it is trivial, on the other hand, it is unexpected, since for other definitions of closure (for example [16, 36]) it works in a completely opposite way.

Lemma 9.

Let G(L,R,E) be a bipartite graph with left degree at most Δ and G(L,R,E) be a subgraph of G. For any set JR and any ν the following holds.

  1. 1.

    IClGν(JR)IClGν(J).

  2. 2.

    If JJ then IClGν(J)IClGν(J).

Proof.

Let {v1,v2,v3,,vi,} be the sequence that generates IClGν(JR). Note that |NG(vi)(JNG(j=1i1vj)|Δν hence |NG(vi)(JNG(j=1i1vj)|Δν. So by induction on i we conclude that all elements viIClGν(J).

The second property follows from the similar argument. Let {v1,v2,v3,,vi,} be the sequence that generates IClGν(J). Note that |NG(vi)(JNG(j=1i1vj)|Δν hence |NG(vi)(JNG(j=1i1vj)|Δν. So by induction on i we conclude that all elements viIClGν(J).

Let G(L,R,E) be an (r,Δ,c)-boundary expander and J,JR. We say that J,J are 𝝂-closure-independent, if

(Extν(J)Extν(J))=.

For a collection of sets 𝒯{T1,,T} we say that a closure covering number (denoted as clvν(𝒯)) is the least size of a hitting set for the collection of sets {Extν(Ti)}i[], i.e. the least size of a set HR such that for all i[] if Extν(Ti) is nonempty then there is hH such that hExtν(Ti).

4 Random CNF Formulas and Linear Systems

Let φ be a formula in variables from a set X. With this formula, we associate a bipartite dependency graph Gφ(L,R,E) where L corresponds to the set of clauses of φ (and we identify these two sets), R corresponds to the set of variables (and we also identify these two sets) and (u,v)E iff clause u contains a variable v or its negation.

We consider random CNFs as in Definition 1. In Appendix C we present some classical computations that show that randomly sampled graph is a good enough expander (see also [38]).

Let φ be a CNF formula on n variables with m clauses. We define a system of linear equations Aφ over 𝔽2. Let Cx1a1xwaw be a clause from φ. We add to Aφ the equation x1++xw=1+(1a1)++(1aw). We do this for every clause Cφ.

We identify the linear system A and its standard encoding in CNF. Note that φ is a subformula of Aφ, so a lower bound on the length of a refutation for Aφ implies a lower bound for φ as well.

Let A be a linear system over boolean variables from the set X. Suppose that the equations are labeled by the elements of a set Y. Let AI denote a subsystem of A on equations labeled by the set IY. For a partial assignment ρ by A|ρ we denote a system over variables Xsupp(ρ) that is obtained from A by an application of ρ. We remove all the equations that are satisfied by ρ.

By analogy with dependency graph of a formula φ we define a dependency graph of a linear system A.

Definition 10.

Let GA(L,R,E) be a bipartite graph where the left part L corresponds to equations of A, and the right part R to its variables. We draw an edge (,r) iff r appears in where r is a variable and is an equation.

Note that Gφ and GAφ are identical.

4.1 Locally Consistent Assignments

Let A be a linear system based on a graph G(L,R,E) that is an (r,Δ,c)-expander. We say that a partial assignment σ is locally consistent iff there is ζ>0 and a ζ-reasonable pair (S,T) such that:

  • supp(σ)TN(S);

  • the system AS|σ is satisfiable.

The next Lemma is an analog of similar statement from [3]. But since we change the definition of a locally consistent assignment we provide a proof in Appendix D.

Lemma 11.

Let A be a linear system based on a graph G(L,R,E) that is an (r,Δ,c)-expander. If σ is a locally consistent assignment, then for any I of size at most r the system AI|σ is satisfiable.

The following lemma gives us a useful characterisation of locally consistent assignments.

Lemma 12.

Let A be a linear system based on a graph G(L,R,E) that is an (r,Δ,c)-expander, JR and σ be an assignment on a subset of J.

  1. 1.

    If the assignment σ is locally consistent, then AIClν(J)|σ is satisfiable for all positive ν<c such that |J|<(cν)r.

  2. 2.

    If the system AIClν(J)|σ is satisfiable for some positive ν<c such that |J|<(cν)r and c>(Δν), then the assignment σ is locally consistent.

Proof.

Note that if |J|<(cν)r, then by Lemma 6 |IClν(J)|r and the first statement follows from Lemma 11.

For the second statement note that a pair (IClν(J),Extν(J)) is c(Δν)-reasonable by Lemma 7. The statement follows from definition of local consistency.

Lemma 13 (Alekhnovich [3]).

Let Y be the set of variables. Let ρ be partial assignment uniformly distributed on an affine subspace A{0,1}Y. Then for every term t in Y variables either Pr[t|ρ=1]=0 or Pr[t|ρ=1]12|t|.

4.2 Random Restrictions

Definition 14.

Let A be a linear system, GA(L,R,E) be an (r,Δ,c)-expander and TR. We denote a uniform distribution over all locally consistent partial assignments with support T as 𝔘TG.

We define a distribution 𝔘p,ν on partial assignments as follows:

  • create a set JR by adding each element of R into J uniformly at random with probability p;

  • pick an assignment from 𝔘Extν(J)G.

We omit the graph if it is clear from the context.

The following Lemma is a very powerful technical tool that helps to establish that some parts of random restrictions in the considered distributions may be chosen independently.

Lemma 15.

Let A be a linear system based on a graph G(L,R,E) that is (r,Δ,c)-boundary expander where c>2(Δν) for some positive ν<c.

Let JR be a set of size less than (cν)r. Consider two sets S,TJ that are ν-closure independent. If σ,σ are the locally consistent assignments on S and κ is a locally consistent assignment on T, then:

Prρ𝔘J[κρσρ]=Prρ𝔘J[κρσρ].
Proof.

Consider an arbitrary assignment σ such that supp(σ)J. Note that by Lemma 12 σ is locally consistent iff AIClν(J)|σ is satisfiable.

Fix an arbitrary locally consistent assignment η on S. Since it is locally consistent, AIClν(J)|η is satisfiable. Moreover any extension of ηη to the supp(ρ)=J is locally consistent iff AIClν(J)|η is satisfiable. Hence the number of such extensions depends only on the number of linearly independent equations in AIClν(J)|η and in AIClν(J)|η and does not depends on the values that we assign in η.

This means that under the condition ηρ the assignment ρ is generated uniformly at random among partial assignments that leave linear system AIClν(J)|η satisfiable. Since these conditions are linear, we also may think that under condition ηρ the assignment ρ is generated in the following way: pick a total extension of η that satisfies AIClν(J)|η uniformly at random, and then project in onto supp(ρ).

Considering the above properties and noticing that κρ is also a linear constraint, we may compute the required probability:

Prρ𝔘J[κρηρ]=sol(AIClν(J)|ηκ)sol(AIClν(J)|η),

where sol is the number of solutions. We have already shown that the denominator is independent of the exact values that we assign in η, hence to conclude the proof it is enough to show that numerator is also independent of η and κ. To do it we show that the system AIClν(J)|ηκ is satisfiable and hence number of solutions depends only on sizes of η and κ.

By Lemma 4 there is an enumeration H{v1,,v|H|} of vertices in IClν(J) and a sequence Ri such that:

  • Ri=N(vi)(j=1i1N(vj));

  • |(vi)Ri|c.

By Lemma 6 |IClν(S)|r, hence by Lemma 11 system AIClν(S)|η is satisfiable, hence there is an assignment η on Extν(S) that is an extension of η and satisfies AIClν(S)|η. By Remark 8 (by Lemma 7) (IClν(S),Extν(S)) is (c(Δν))-reasonable and hence η is locally consistent. By the similar argument we can pick as assignment κ that is locally consistent extension of κ on Extν(T). By induction on i[|IClν(J)|] we create an assignment βi such that:

  • supp(βi)=Ri;

  • βi is consistent with ηκ;

  • Avi is satisfied by j=1iβi.

Suppose we have already done this for all j[i1]. Let us consider the following cases.

  1. 1.

    viIClν(S). In this case η assigns all variables in RiN(vi) and βi assigns all variables wrt to η. By induction hypothesis βj is consistent with η, hence by construction of Ri the assignment j=1iβi assigns all variables in N(vi) wrt to η and hence it satisfies Avi since η satisfies it.

  2. 2.

    viIClν(T). Similar to the previous case (we should consider κ instead of η).

  3. 3.

    vi(IClν(S)IClν(T)). By definition of individual closure η can assign at most Δν variables in N(vi), the same holds for κ. Hence η and κ together assign at most 2(Δν) variables, which is strictly less than c|(vi)Ri| and there is a variable in (vi)Ri that is unassigned by κη and we can use it to satisfy the equation Avi. Hence we can find an assignment βi that respects κη and satisfies Avi. Here we use the fact that S and T are closure independent and hence κ and η are disjoint.

The assignment i[|IClν(J)|]βi satisfies AIClν(J)|κη by construction. Hence Prρ𝔘J[κρηρ] is independent of the choice of η and the statement holds.

Corollary 16.

Let A be a linear system based on a graph G(L,R,E) that is (r,Δ,c)-boundary expander where c>2(Δν) for some positive ν<c.

Let JR be a set of size less than (cν)r. Consider two sets S,TJ that are ν-closure independent. If σ is a locally consistent assignment on S and κ is a locally consistent assignment on T then:

Prρ𝔘J[κρσρ]=Prρ𝔘J[κρ].
Proof.

Follows from Lemma 15 and observation that Prρ𝔘J[κρ] can be obtained from Prρ𝔘J[κρσρ] by averaging over all locally consistent σρ.

5 Lower Bound

In this section we give a proof of the main technical Theorem.

Theorem 17 (Reformulation of Theorem 3).

Let A be a linear system such that GA is an (r,Δ,(1ε)Δ)-boundary expander where ε=0.05. Then for any δ>0 if:

nδ(n8εr)k2/ε=o(r/k)

then any Res(k) proof of A has size at least 2nδ.

Following the plan presented in the introduction, we want to hit the proof by an assignment ρ and transform it into a “resolution” (in fact, a structure we call “DNF-tree”, which will be defined later) proof. We do it in several steps.

  • We start with the technical tool: “Restriction Lemma”, Section 5.1 . It states that a k-DNF that contains a lot of independent terms (here we use the definition of closure-independent terms) can be easily killed by an assignment from an appropriate distribution. It is our crucial technical tool.

  • In Section 5.2, we give the definition of DNF-trees. We then continue with the assumption that we have a short Res(k)-proof π of the system A and give a detailed plan of its transformation to a sequence of DNF-trees in Section 5.3.1.

  • In Section 5.3.2 we describe a transformation of Res(k)-proof into DNF-tree proof of A. During this process, we give up on some DNFs that appear in the middle steps of transformation (we call them broken branches).

  • In Section 5.3.3 we choose a proper partial assignment and use our Restriction Lemma to get rid of all broken branches. That concludes the transformation of π into DNF-tree proof of Aρ. Moreover, all DNF-trees in this proof will have small height.

  • In the last step (Section 5.3.5) we give a direct proof of the lower bound on the height of DNF-trees.

Recall that the plan in the introduction required to prove the dichotomy for k-DNFs (size of hitting set vs. probability of being killed by random restriction). The essential part of this dichotomy is “Restriction Lemma”, that we prove by using Lemma 15.

We deal with linear systems based on the expander graphs and we associate variables with the vertices of the right part of the graph. Hence we can define closure-independent terms and a closure covering number of a collection of terms in a natural way.

Let us start the realization of our plan.

5.1 Restriction vs. Closure Covering Number

We start with a technical lemma. It gives a way to translate a knowledge that some terms are closure-independent to the language of probabilities.

We call the term locally consistent if the corresponding partial assignment (that is, the minimal partial assignment satisfying the term) is locally consistent. We denote as vars(t) a set of variables of the term t.

Lemma 18.

Let A be a linear system such that GA(L,R,E) is an (r,Δ,c)-boundary expander where c>2(Δν) for some positive ν<c. Let JR be a set of size less than (cν)r. If T{t1,,t} is a sequence of locally consistent terms such that for any i:

  • vars(ti)J;

  • vars(ti) is ν-closure-independent of j=1i1vars(tj);

then:

Prρ𝔘J[i[]:tiρ1](112k)|T|.
Proof.

We argue by induction on a number of terms that:

Prρ𝔘J[(j=1itj)|ρ=0](112k)i.

For i we get the statement of the Lemma.

The base of induction follows from Lemma 13 since t1 is locally consistent (and by Lemma 11 the probability that it is mapped to 1 by ρ is not zero): Pr[t1|ρ=0](112k). Now suppose we proved the statement for the collection {t1,,ti1}. Let us now do the induction step for term ti.

We can consider a locally consistent assignment σ such that:

  • supp(σ)=ti,

  • ti|σ=1,

since ti is locally consistent. If ρ is consistent with σ then ti is mapped to 1 by ρ hence Prρ𝔘J[ti|ρ=1]=Prρ𝔘J[σρ].

Let Si be an event that (j=1itj)|ρ=0. And let 𝔘i be the distribution 𝔘J conditioned on Si.

Prρ𝔘J[Si] Prρ𝔘J[Si1]Prρ𝔘J[ti|ρ=0Si1]
(112k)i1Prρ𝔘J[ti|ρ=0Si1] by induction hyp.
(112k)i1(1Prρ𝔘J[ti|ρ=1Si1]) ρ assigns all variables in ti
(112k)i1(1Prρ𝔘J[σρSi1])
(112k)i1(1𝔼κ𝔘i1[Prρ𝔘J[σρκρ]])
(112k)i1(1𝔼κ𝔘i1[Prρ𝔘J[σρ]]) by Corollary 16
(112k)i1(1Prρ𝔘J[σρ]).

We can use Corollary 16 since ivars(ti)J and the support of all assignment does not exceed (cν)r, moreover κ is taken over locally consistent assignments since 𝔘J is a distribution over locally consistent assignments.

It remains to show that Prρ𝔘J[σρ]12k. Note that ρ is consistent with σ iff ρ maps ti to 1. Hence by Lemma 13 Prρ𝔘J[σρ]=Prρ𝔘J[ti|ρ=1]12|ti|12k.

5.2 Tree and DNF

In this section we describe a technical structure that is a mix of DNF and decision tree. Let A be a linear system based on the (r,Δ,c)-expander graph.

Definition 19.

A DNF-tree is a rooted binary tree such that:

  • every internal node is labelled with a variable;

  • the edges leaving this node correspond to whether the variable is set to 0 or 1;

  • the leaves are labelled either with constant from {0,1} or with DNF-formulas.

As usual, we assume that on every given path no variable appears more than once. Then every path from the root to a leaf may be viewed as a partial assignment, and this assignment, in turn, will be sometimes identified with the corresponding leaf.

For a DNF-tree T, we denote the set of paths (partial assignments) that lead from the root to a leaf as BrT. We also denote the set of paths leading to some leaf labelled by a{0,1} as BrTa. Finally, we denote the set of paths (partial assignments) that lead from the root to a leaf labelled by a non-trivial formula by BrT. We say that a DNF-tree T strongly represents a DNF formula D if for every πBrT0 and for all tD, t|π=0 and for every πBrT1, there exists tD such that t|π=1.

Consider a DNF-tree T and a partial assignment ρ. An application of ρ to T denoted by T|ρ is defined in a natural way by induction from leaves to root:

  • if is a leaf marked by 0 or 1 then |ρ;

  • if is a leaf marked by DNF D then |ρ is also a single vertex marked by D|ρ (note that if some term in D is mapped to 1 by ρ then D|ρ=1 or if all terms are mapped to 0 then D|ρ=0);

  • if T is a tree with the root marked by a variable x and two children T0 and T1 then:

    • if xsupp(ρ) then T|ρ is a tree with a root marked by x and two children T0|ρ and T1|ρ;

    • if xsupp(ρ) then T|ρTρ(x)|ρ.

5.3 Proof of Theorem 17

Fix some parameters:

  • ζi(1iε)Δ are various expansion parameters of graphs that appear in the proof;

  • pεrn.

Let π{D1,D2,,Ds} be a Res(k) proof of A of size at most 2nδ.

5.3.1 Plan of the Proof

We say that a partial assignment σ is ν-closed wrt G iff there is a set Jσ such that supp(σ)=ExtGν(Jσ). For a collection of ν-closed partial assignments σ1,σ2,,σ we define a graph Gσ1,σ2,,σ(Li=1IClGν(Jσi),Ri=1ExtGν(Jσi),E).

Let us say that a DNF-tree T is closed (wrt a system A) iff for every branch σ the assignment σ is ζ2-closed wrt GA.

In this section, when we deal with locally consistent assignments wrt to a linear system A based on a graph G, we omit the mention of A, as it is fixed. We refer to such assignments as locally consistent wrt to a graph G.

We think of π as a sequence of closed DNF-trees {T11,T21,,Ts1} where Ti1 is a tree that consists of single node marked by the formula Di.

We make kε iterations of modification of these trees. On i-th iteration we create a collection {T1i+1,T2i+1,,Tsi+1}. We also divide branches into three groups:

  • Bji+1BrTji+1 is a collection of broken branches that we create during our process;

  • σBrTji+1 that are locally inconsistent wrt G are dead branches;

  • all other branches are alive.

For all j[s] the set Bj1 is empty.

We maintain an upper bound of the height of the trees and the correctness property, i.e.

  • Tji strongly represents Dj,

  • moreover each branch σBrTji is marked by Dj|σ (it can possibly turn to a constant after applying the restriction).

After kε iterations we stop modifications and try to find a set of variables JR and some ζ2-closed partial assignment ρ on ExtGζ2(J) that helps to achieve an additional property for each branch σ of tree Tji:

  • if σBji then:

    • either σ is inconsistent with ρ,

    • or there is a term tDj such that t|σρ=1;

  • if σ is alive then it is marked by a constant or by a collection of locally inconsistent terms wrt Gσ,ρ (or in other words G without (IClGζ2(Jσ)IClGζ2(J),ExtGζ2(Jσ)ExtGζ2(J))).

We say that a tree that satisfies all required properties is perfect. In section 5.3.5 we show the lower bound on the height of trees in the collection of perfect trees that corresponds to the proof of A|ρ.

5.3.2 From 𝐑𝐞𝐬(𝒌) to Perfect DNF-trees

Let us fix some parameters:

  • di2nδ(8p)(i1)k is an upper bound on the sizes of sets Jσ for branches σ that appear in the trees Tji. Here Jσ is defined as in the beginning of 5.3.1;

  • sis2di/ε is an upper bound on the total number on branches in these trees;

  • binδ(8p)ik is a threshold for coverings.

Here i is the number of the iteration, and is in the range [1,kε].

Now we describe a construction of {T1i+1,T2i+1,,Tsi+1} from {T1i,T2i,,Tsi}. Suppose that before i-th iteration we have a sequence {T1i,T2i,,Tsi} of correct DNF-trees. Let TTji. Consider a branch σBrT. If σBrT then it is marked by Dj|σ, so let Fσ be a DNF formula that consists of terms of Dj|σ that are locally consistent wrt Gσ.

There are four cases:

  • Branch σBja for some ai or dead. We do not modify σ.

  • Branch σ is marked by a constant. We do not modify σ.

  • clvGσζ4(Fσ)bi. Let C be the set of variables on which the value of clvGσζ4(Fσ) is achieved. We add a full binary tree that splits over all variables from

    ExtGζ2(JσC)ExtGζ2(Jσ)

    (see fig. 1). We mark the new leaves by the appropriately restricted DNF formulas and a set JσC. Note that |JσC|2nδ(8p)(i1)k+nδ(8p)ik2nδ(8p)ik=di+1. The height of these branches is |ExtGζ2(JσC)|. By Lemma 6, |IClGζ2(JσC)|di+12ε, so it follows that |ExtGζ2(JσC)|di+1ε.

  • clvGσζ4(Fσ)>bi. We put σ into Bji+1.

We say that Tji+1T. We satisfy the correctness property by construction.

Figure 1: Modification of a branch.

5.3.3 Perfectness. Broken Branches

We pick an assignment ρ from distribution 𝔘p,ζ2. By construction, this assignment is ζ2-closed, and the witness of this property is JρJ, where J is a set from the algorithm that generates this assignment.

Note that by Chernoff bound:

Pr[|J|2pn]exp[43pn]exp[43εr].

So we assume that |J|<2pn.

Consider some branch σBji that is consistent with ρ. Note that:

  • Gσ is a dependency graph of A|σ;

  • Gσ is the (r,Δ,ζ3)-boundary expanders by Lemma 7.

Let us remind that Fσ consists of locally consistent (wrt graph Gσ) terms of the label of branch σBji.

We want to show that if clvGσζ4(Fσ)>bi then ρ satisfies Fσ whp.

Since σBji then clvGσζ4(F)>bi. We apply Lemma 27 for graph Gσ, a collection of terms Fσ, and cζ3 and νζ4 and get a sequence of terms T{t1,,ta} from F such that:

  • for any ja, vars(tj) is ζ4-closure independent of e=1j1vars(te);

  • a1(1+1ε)kbi>ε2kbi.

The set J contains the set tj with probability at least p|tj|pk. And since for any j,j[a]: tjtj= we can apply Chernoff bound and say:

Pr[J contains less than 12ε2kbipk terms of T ] exp[1812ε2kbipk]
exp[1812ε2knδ(8p)ikpk]
exp[1812ε8k2knδ(8p)(i1)k]
exp[1812ε28k2klogsi]
(1si)4k.

Consider some J that contains at least ε4kbipk terms of T. Let T{t1,,ta} be a subsequence of T that consists of terms that are subsets of J. Note that for any ja, vars(tj) and e=1j1vars(te) are ζ4-closure-independent wrt Gσ. See fig. 2.

Figure 2: Graph G and sets (proportions may be incorrect).

To estimate probability that we satisfy at least one term from T we want to use Lemma 18. In order to do that, let us make the following observation.

 Remark 20.

A pair (IClGζ2(J),supp(ρ)) is ζ5-reasonable wrt Gσ.

Proof.

Note that Gσ=(LIClGζ2(Jσ),RExtGζ2(Jσ),E). Hence if we erase the pair (IClGζ2(J),supp(ρ)) from Gσ, the resulting graph will be Gσ,ρ and the statement follows from Lemma 7.

Let Gσ(Lσ,Rσ,E). For fixed J, assuming that ρ is consistent with σ, we may think that ρ is taken from 𝔘ExtGζ2(J)Rσ and the Remark 20 states that it is a locally consistent assignment wrt Gσ, which gives us an access to Lemma 18. So we apply Lemma 18 with the following parameters: a graph Gσ, Jsupp(ρ)Rσ and a collection T. Here we use an assumption that |J|<2εr and hence |supp(ρ)| is at most (1+Δ1εΔ)2εr2.1rεΔr by Lemma 6. We conclude that probability that ρ does not satisfy any term from T is at most:

(112k)ε4kbi+1pk exp[ε4k2kbi+1pk]
exp[ε4k2knδ(8p)ikpk]
exp[ε28k8k2klogsi]
(1si)4k.
Probability of Fail.

We fail the process in two cases:

  • J is too large and we cannot use our lemmas for expander graphs. That happens with probability exp[43εr];

  • ρ does not map to 1 any term in some branch σBji. That happens with probability at most i[k/ε]|j=1sBji|2(1si)4k (either J does not cover enough terms or ρ does not satisfy at least one of covered terms). To conclude the counting, note that |j=1sBji|si.

Hence whp our transformation satisfies perfectness for branches from all sets Bji.

5.3.4 Perfectness. Alive Branches

This is the place where we use the properties of individual closure. Let us consider some σBrTjiBji that is marked by a DNF D and an arbitrary locally consistent term tD. Note that clvGσζ2(D)bi. Let C be the set of variables on which the value of clvGσζ2(D) is achieved. At this iteration we split according to the variables in some set SC. Consider an assignment σ to the variables of S. Note that |ExtGσζ4(t|σ)||ExtGσζ4(t)|1 by the definition of closure covering and Lemma 9. Again note that |ExtGσσζ4(t|σ)||ExtGσζ4(t|σ)| by Lemma 9. Hence for any term t that corresponds to some branch σBrTjiBji and survives after i+1-th iteration we note that |ExtGσζ4(t)| is strictly less than |ExtGσζ4(t)| where t is term in σBrTji that generates t after application of our transformation of the trees.

Note that for any term t′′ that appears in the original proof |ExtGζ4(t′′)|(1+13ε)kkε by Lemma 6. Hence after kε iterations for any locally consistent term t: |ExtGσζ4(t)|=0, or in other words it is mapped to a constant and the desired statement follows.

5.3.5 Lower Bound on Height

Now we have a sequence of perfect trees {T1k/ε+1,T2k/ε+1,,Tsk/ε+1} and we want to show non-existence of such sequence. We say that a branch σBrTjk/ε+1 has survived iff σ is consistent with ρ and σρ is locally consistent.

 Remark 21.

In fact, one can extract a resolution proof of A|ρ of small enough width from these trees, but it requires much more technical work and accuracy. And we believe that the direct proof of the height lower bound is more useful for future generalizations.

Let TjTjk/ε+1. Note that Tj strongly represents Dj|ρ by construction. We consider a dag of the proof π. Starting from the vertex s in this dag, we trace the path p to the initial clause. In the node vp we maintain a partial assignment κv such that:

  • κvBrTvBrTv0;

  • κv have survived.

Tree Ts is a tree that consists of a single node marked by 0 and we take κs.

Consider a node v of the dag of π. Assume that Dv is derived from Di1,,Dik. We have an assignment κv that satisfies the required properties. Our goal is to find a branch among branches of trees Ti1,,Tik that also satisfies the required properties. We will do it by increasing κv step by step. On each step we will have a closed assignment κκv and a set Jκ such that:

  • κ and ρ are consistent;

  • supp(κ)=ExtGζ2(Jκ);

  • κ satisfies AIClGζ2(Jκ);

  • |supp(κ)|=o(r).

Note that assignment κvBrTv is closed. Hence the set Jκv satisfies the required properties, and in the beginning κ is well-defined. Now we apply the following procedure to the assignment κ.

Algorithm 1 Branch search.

Note that height of the trees is at most dk/ε+1ε=2εnδ(8p)k2/ε=o(r/k) and hence κ has size o(r) by construction and Lemma 6.

We have to show the existence of η and that we stop on some iteration. We start with the existence. Fix some iteration of the inner loop. Note that supp(κ)=ExtGζ2(Jκ) and supp(ρ)=ExtGζ2(Jρ) which by Lemma 7 implies that Gσ,ρ is an (r,Δ,ζ5)-expander. Moreover Gσ,ρ is a dependency graph of A|κρ. Hence by Lemma 11 there is a total assignment η that satisfies AIClGζ2(Jκ{x})IClGζ2(Jκ)|κρ. Let η be a restriction of η on ExtGζ2(Jκ{x})ExtGζ2(Jκ).

Now we want to show that we stop after some iteration. Note that:

  • κ and ρ are consistent (by construction);

  • κ is an extension of κv (by construction);

  • κρ satisfies AIClGζ2(Jκ)IClGζ2(Jρ) (by construction);

  • For any I of size at most r: AI|ρκ is satisfiable (by Lemma 11).

For the sake of contradiction, assume that on each iteration of outer loop we found some leaf from BrTij1. Consider three cases.

  • Dv is obtained by using weakening or And-elimination rule from Di1. Assignment κρ maps some term of Di1 to 1 and hence it is also maps some term of Dv to 1.

  • Dv is obtained by using And-introduction F1,,FwF(i=0wi). If κρ maps some term tF to 1, then tDv is also mapped to 1. If κρ maps all j to 1 then (i=0wi)Dv is also mapped to 1.

  • Dv is obtained by using cut rule F(i=0wi),G(i=0w¬i)FG. Note that κρ maps some term tF(i=0wi) to 1 and some term tG(i=0w¬i), hence κρ maps some term in FG=Dv to 1.

In all cases we conclude that κρ maps some term tDv to 1. But note that a pair (IClGζ2(Jκ)IClGζ2(Jρ),ExtGζ2(Jκ)ExtGζ2(Jρ)) is ζ5-reasonable by Lemma 7, hence κρ is the witness of local satisfiability of t. That contradicts with the choice of branch κv, since any term of Dv is mapped by κv either to constant 0 or to locally inconsistent term, and κρ is an extension of κv.

Our algorithm returns some triple (ij,u,κ). We define κiju. Note that κijκ hence κijρ does not violate any initial clause and κijBrTij0BrTij.

By tracing the path in π we reach a tree T that strongly represents an initial clause D. We have a branch κBrT such that:

  • κ and ρ are consistent;

  • κBrTBrT0, which implies that κ violates D;

  • κρ does not violate any initial clause.

That is a contradiction.

6 Application to Random Formulas

Theorem 22.

Let Δ>120, η>0 be arbitrary constants. If φφ(m,n,Δ) where mηn, then there are constants δ,ν>0 such that whp any Res(k) proof of φ has size at least 2nδ where kνlogn.

Proof.

Applying Theorem 28, we conclude that the dependency graph of our formula is an (r,Δ,0.95Δ)-boundary expander, where rδn for some constant δ that depends only on η and Δ.

Note that:

nδ(n8εr)k2/ε=nδ(18εδ)ν2logn/εnδnν2log(1/8εδ)/ε=o(r/k)

where the last inequality holds by the choice of ν. The statement follows from Theorem 17.

Theorem 23.

For any h>0 there is Δ>0 such that if φφ(m,n,Δ) where mnloghn, then there are constants δ,ν>0 such that whp any Res(k) proof of φ has size at least 2nδ where kνlognloglogn.

Proof.

Applying Theorem 29 we conclude that there is Δ>0 such that dependency graph of our formula is an (r,Δ,0.95Δ)-boundary expander where rn/logn for some constant that depends only on h and Δ.

Note that:

nδ(n8εr)k2/ε=nδ(logn8ε)ν2logn/εloglognnδnν2log(1/8ε)/ε=o(r/k)

where the last inequality holds by the choice of ν. The statement follows from Theorem 17.

Theorem 24.

For any h>0 there is Δ>0 such that if φφ(m,n,Δ) where mnh, then for any constant k there is constant δ>0 such that whp any Res(k) proof of φ has size at least 2nδ.

Proof.

Applying Theorem 30 we can choose any constant δ>0 and Δ>0 that depends only on δ such that dependency graph of our formula is an (r,Δ,0.95Δ)-boundary expander where rn1δ.

Note that:

nδ(n8εr)k2/ε=nδ(nδ8ε)k2/εnδnδk2log(1/8ε)/ε=o(r/k)

where the last inequality holds by the choice of δ. The statement follows from Theorem 17.

Theorem 25.

For any h>0 there are δ,ν>0 such that if φφ(m,n,Δ) where mnlogloghn and Δlogn, then whp any Res(k) proof of φ has size at least 2nδ where kνlognloglogn.

Proof.

Applying Theorem 31 we conclude that dependency graph of our formula is an (r,Δ,0.95Δ)-boundary expander where rn/logn for some constant that depends only on h.

Note that:

nδ(n8εr)k2/ε=nδ(logn8ε)ν2logn/εloglognnδnν2log(1/8ε)/ε=o(r/k)

where the last inequality holds by the choice of ν. The statement follows from Theorem 17.

References

  • [1] Jackson Abascal, Venkatesan Guruswami, and Pravesh K. Kothari. Strongly refuting all semi-random boolean csps. In Dániel Marx, editor, Proceedings of the 2021 ACM-SIAM Symposium on Discrete Algorithms, SODA 2021, Virtual Conference, January 10 - 13, 2021, pages 454–472. SIAM, 2021. doi:10.1137/1.9781611976465.28.
  • [2] Miklós Ajtai. The complexity of the pigeonhole principle. Combinatorica, 14(4):417–433, 1994. doi:10.1007/BF01302964.
  • [3] Michael Alekhnovich. Lower bounds for k-dnf resolution on random 3-cnfs. Comput. Complex., 20(4):597–614, 2011. doi:10.1007/s00037-011-0026-0.
  • [4] Michael Alekhnovich, Eli Ben-Sasson, Alexander A. Razborov, and Avi Wigderson. Pseudorandom generators in propositional proof complexity. SIAM J. Comput., 34(1):67–88, 2004. doi:10.1137/S0097539701389944.
  • [5] Michael Alekhnovich and Alexander A. Razborov. Lower bounds for polynomial calculus: Non-binomial case. Proceedings of the Steklov Institute of Mathematics, 242:18–35, 2003. Available at http://people.cs.uchicago.edu/˜razborov/files/misha.pdf. Preliminary version in FOCS ’01.
  • [6] Sarah R. Allen, Ryan O’Donnell, and David Witmer. How to refute a random CSP. In Venkatesan Guruswami, editor, IEEE 56th Annual Symposium on Foundations of Computer Science, FOCS 2015, Berkeley, CA, USA, 17-20 October, 2015, pages 689–708. IEEE Computer Society, 2015. doi:10.1109/FOCS.2015.48.
  • [7] Omar Alrabiah, Venkatesan Guruswami, Pravesh K. Kothari, and Peter Manohar. A near-cubic lower bound for 3-query locally decodable codes from semirandom CSP refutation. In Barna Saha and Rocco A. Servedio, editors, Proceedings of the 55th Annual ACM Symposium on Theory of Computing, STOC 2023, Orlando, FL, USA, June 20-23, 2023, pages 1438–1448. ACM, 2023. doi:10.1145/3564246.3585143.
  • [8] Albert Atserias, Ilario Bonacina, Susanna F. de Rezende, Massimo Lauria, Jakob Nordström, and Alexander A. Razborov. Clique is hard on average for regular resolution. In Ilias Diakonikolas, David Kempe, and Monika Henzinger, editors, Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2018, Los Angeles, CA, USA, June 25-29, 2018, pages 866–877. ACM, 2018. doi:10.1145/3188745.3188856.
  • [9] Albert Atserias, Maria Luisa Bonet, and Juan Luis Esteban. Lower bounds for the weak pigeonhole principle and random formulas beyond resolution. Inf. Comput., 176(2):136–152, 2002. doi:10.1006/inco.2002.3114.
  • [10] Paul Beame, Russell Impagliazzo, Jan Krajícek, Toniann Pitassi, and Pavel Pudlák. Lower bound on hilbert’s nullstellensatz and propositional proofs. In 35th Annual Symposium on Foundations of Computer Science, Santa Fe, New Mexico, USA, 20-22 November 1994, pages 794–806, 1994. doi:10.1109/SFCS.1994.365714.
  • [11] Paul Beame, Richard M. Karp, Toniann Pitassi, and Michael E. Saks. The efficiency of resolution and davis–putnam procedures. SIAM J. Comput., 31(4):1048–1075, 2002. doi:10.1137/S0097539700369156.
  • [12] Eli Ben-Sasson. Expansion in proof complexity. PhD thesis, Hebrew University of Jerusalem, Israel, 2001. URL: https://huji-primo.hosted.exlibrisgroup.com/permalink/f/13ns5ae/972HUJI_ALMA21159933340003701.
  • [13] Eli Ben-Sasson and Russell Impagliazzo. Random cnf’s are hard for the polynomial calculus. In 40th Annual Symposium on Foundations of Computer Science, FOCS ’99, 17-18 October, 1999, New York, NY, USA, pages 415–421. IEEE Computer Society, 1999. doi:10.1109/SFFCS.1999.814613.
  • [14] Eli Ben-Sasson and Avi Wigderson. Short proofs are narrow – resolution made simple. J. ACM, 48(2):149–169, 2001. doi:10.1145/375827.375835.
  • [15] Vašek Chvátal and Endre Szemerédi. Many hard examples for resolution. J. ACM, 35(4):759–768, October 1988. doi:10.1145/48014.48016.
  • [16] Susanna F. de Rezende, Jakob Nordström, Kilian Risse, and Dmitry Sokolov. Exponential resolution lower bounds for weak pigeonhole principle and perfect matching formulas over sparse graphs. CoRR, abs/1912.00534, 2019. arXiv:1912.00534.
  • [17] Susanna F. de Rezende, Aaron Potechin, and Kilian Risse. Clique is hard on average for unary sherali-adams. In 64th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2023, Santa Cruz, CA, USA, November 6-9, 2023, pages 12–25. IEEE, 2023. doi:10.1109/FOCS57990.2023.00008.
  • [18] Uriel Feige. Relations between average case complexity and approximation complexity. In Proceedings of the 17th Annual IEEE Conference on Computational Complexity, Montréal, Québec, Canada, May 21-24, 2002, page 5. IEEE Computer Society, 2002. doi:10.1109/CCC.2002.10006.
  • [19] Uriel Feige, Jeong Han Kim, and Eran Ofek. Witnesses for non-satisfiability of dense random 3cnf formulas. In 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2006), 21-24 October 2006, Berkeley, California, USA, Proceedings, pages 497–508. IEEE Computer Society, 2006. doi:10.1109/FOCS.2006.78.
  • [20] Noah Fleming, Denis Pankratov, Toniann Pitassi, and Robert Robere. Random Θ(log n)-cnfs are hard for cutting planes. In Chris Umans, editor, 58th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2017, Berkeley, CA, USA, October 15-17, 2017, pages 109–120. IEEE Computer Society, 2017. doi:10.1109/FOCS.2017.19.
  • [21] Konstantinos Georgiou, Avner Magen, and Madhur Tulsiani. Optimal sherali-adams gaps from pairwise independence. In Irit Dinur, Klaus Jansen, Joseph Naor, and José Rolim, editors, Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, pages 125–139, Berlin, Heidelberg, 2009. Springer Berlin Heidelberg. doi:10.1007/978-3-642-03685-9_10.
  • [22] Dima Grigoriev. Linear lower bound on degrees of positivstellensatz calculus proofs for the parity. Theoretical Computer Science, 259(1):613–622, 2001. doi:10.1016/S0304-3975(00)00157-2.
  • [23] Venkatesan Guruswami, Pravesh K. Kothari, and Peter Manohar. Algorithms and certificates for boolean CSP refutation: smoothed is no harder than random. In Stefano Leonardi and Anupam Gupta, editors, STOC ’22: 54th Annual ACM SIGACT Symposium on Theory of Computing, Rome, Italy, June 20 - 24, 2022, pages 678–689. ACM, 2022. doi:10.1145/3519935.3519955.
  • [24] Johan Håstad. On small-depth frege proofs for tseitin for grids. J. ACM, 68(1):1:1–1:31, 2021. doi:10.1145/3425606.
  • [25] Pavel Hrubes and Pavel Pudlák. Random formulas, monotone circuits, and interpolation. In Chris Umans, editor, 58th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2017, Berkeley, CA, USA, October 15-17, 2017, pages 121–131. IEEE Computer Society, 2017. doi:10.1109/FOCS.2017.20.
  • [26] Pravesh K. Kothari and Peter Manohar. An exponential lower bound for linear 3-query locally correctable codes. In Bojan Mohar, Igor Shinkar, and Ryan O’Donnell, editors, Proceedings of the 56th Annual ACM Symposium on Theory of Computing, STOC 2024, Vancouver, BC, Canada, June 24-28, 2024, pages 776–787. ACM, 2024. doi:10.1145/3618260.3649640.
  • [27] Pravesh K. Kothari, Ryuhei Mori, Ryan O’Donnell, and David Witmer. Sum of squares lower bounds for refuting any CSP. In Hamed Hatami, Pierre McKenzie, and Valerie King, editors, Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2017, Montreal, QC, Canada, June 19-23, 2017, pages 132–145. ACM, 2017. doi:10.1145/3055399.3055485.
  • [28] Jan Krajíček. On the weak pigeonhole principle. Fundamenta Mathematicae, 170:123–140, January 2001. doi:10.4064/fm170-1-8.
  • [29] Sebastian Müller and Iddo Tzameret. Short propositional refutations for dense random 3cnf formulas. Ann. Pure Appl. Log., 165(12):1864–1918, 2014. doi:10.1016/j.apal.2014.08.001.
  • [30] Ryan O’Donnell. Analysis of Boolean Functions. Cambridge University Press, 2014. doi:10.1017/CBO9781139814782.
  • [31] Shuo Pang. Large clique is hard on average for resolution. In Rahul Santhanam and Daniil Musatov, editors, Computer Science - Theory and Applications - 16th International Computer Science Symposium in Russia, CSR 2021, Sochi, Russia, June 28 - July 2, 2021, Proceedings, volume 12730 of Lecture Notes in Computer Science, pages 361–380. Springer, 2021. doi:10.1007/978-3-030-79416-3_22.
  • [32] Prasad Raghavendra, Satish Rao, and Tselil Schramm. Strongly refuting random csps below the spectral threshold. In Hamed Hatami, Pierre McKenzie, and Valerie King, editors, Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2017, Montreal, QC, Canada, June 19-23, 2017, pages 121–131. ACM, 2017. doi:10.1145/3055399.3055417.
  • [33] Alexander A. Razborov. Pseudorandom generators hard for k-dnf resolution and polynomial calculus resolution. Ann. of Math., 181:415–472, 2015. doi:10.4007/annals.2015.181.2.1.
  • [34] Grant Schoenebeck. Linear level lasserre lower bounds for certain k-csps. In 49th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2008, October 25-28, 2008, Philadelphia, PA, USA, pages 593–602. IEEE Computer Society, 2008. doi:10.1109/FOCS.2008.74.
  • [35] Nathan Segerlind, Samuel R. Buss, and Russell Impagliazzo. A switching lemma for small restrictions and lower bounds for k-dnf resolution. SIAM J. Comput., 33(5):1171–1200, 2004. doi:10.1137/S0097539703428555.
  • [36] Dmitry Sokolov. (semi)algebraic proofs over ±1 variables. In Konstantin Makarychev, Yury Makarychev, Madhur Tulsiani, Gautam Kamath, and Julia Chuzhoy, editors, Proccedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, STOC 2020, Chicago, IL, USA, June 22-26, 2020, pages 78–90. ACM, 2020. doi:10.1145/3357713.3384288.
  • [37] Dmitry Sokolov. Random (log n)-cnf are hard for cutting planes (again). In Bojan Mohar, Igor Shinkar, and Ryan O’Donnell, editors, Proceedings of the 56th Annual ACM Symposium on Theory of Computing, STOC 2024, Vancouver, BC, Canada, June 24-28, 2024, pages 2008–2015. ACM, 2024. doi:10.1145/3618260.3649636.
  • [38] Salil P. Vadhan. Pseudorandomness. Now Publishers Inc., Hanover, MA, USA, 2012.

Appendix A Chernoff Bound

Lemma 26 (Chernoff bound).

Let X1,,Xn be independent random variables taking values in {0,1}, XXi and μ𝔼[X].

  • Pr[X(1δ)μ]exp[δ22μ];

  • Pr[X(1+δ)μ]exp[δ22+δμ].

Appendix B Graph Properties

Lemma 27.

Let G(L,R,E) be an (r,Δ,c)-boundary expander, 𝒮{S1,S2,,S} be a collection of subsets of R such that |Si|k. Then for each ν<c it is possible to pick a sequence {B1,,Bh} where:

  • for all i[h] there is j[] such that Bi=Sj;

  • Bi is ν-closure-independent of j=1i1Bj;

  • hmin(r/k,clv(𝒮)(1+Δcν)k).

Proof.

Let us start picking B’s in a greedy way. Suppose we picked i terms for some 0<i<r/k, and we are not able to pick the term i+1. This means that the set of vertices Extν(j<iBj) is a closure covering for 𝒮.

clv(𝒮) |Extν(j<iBj)|
(1+Δcν)|j<iBj|
(1+Δcν)ik,

hence iclv(𝒮)(1+Δcν)k.

Appendix C Random Graph is an Expander

For m,n,Δ, we denote by 𝔊(m,n,Δ) the distribution over bipartite graphs with disjoint vertex sets U{u1,,um} and V{v1,,vn} where the neighbourhood of a vertex uU is chosen by sampling a subset of size Δ uniformly at random from V.

Let G be a randomly sampled graph from 𝔊(m,n,Δ) and ε<1/2. We estimate the probability that G is not an (r,Δ,(1ε)Δ)-boundary expander for some parameter r.

Let G(U,V,E). We first estimate the probability that a set SU of size at most r violates the boundary expansion. For brevity, let us write s=|S| and c=(1ε2)Δ. The probability that S violates the boundary expansion can be bounded by:

Pr[|(S)|<(1ε)Δs] Pr[|N(S)<cs]
(ncs)((csΔ)(nΔ))s
(ncs)(csn)Δs
[(encs)c(csn)Δ]s

Hence, the probability that G is not a boundary expander can be bounded by

Pr[G is not an expander] s[r](ms)[(encs)c(csn)Δ]s
s[r](mes)s[(encs)c(csn)Δ]s
s[r][mes(encs)c(csn)Δ]s
s[r][e1+cms(csn)ε2Δ]s

Now we can formulate some classical results about the existence of expander graphs.

Theorem 28.

Let 12>ε>0, Δ>6/ε be arbitrary constants. If mηn, there is a constant δ>0 such that whp for rδn a randomly sampled graph G𝔊(m,n,Δ) is an (r,Δ,(1ε)Δ)-boundary expander.

Proof.

Let c(1ε2)Δ and δΔrn. Note that G is not a boundary expander with probability at most:

s[r][e1+cms(csn)ε2Δ]s s[r][e1+cηns(csn)ε2Δ]s
=s[r][e1+cηc(csn)ε2Δ1]s
s[r][e1+cηc(δ)ε2Δ1]s.

And if Δ>6/ε we can choose δ to make sure that this sum is at most 0.01.

Theorem 29.

Let mnloghn for some universal constant h and ε0.01. For any constant >0 there is a constant Δ>0 such that whp for rn/logn a randomly sampled graph G𝔊(m,n,Δ) is an (r,Δ,(1ε)Δ)-boundary expander.

Proof.

Let c(1ε2)Δ. Note that G is not a boundary expander with probability at most:

s[r][e1+cms(csn)ε2Δ]s =s[r][e1+cmcn(csn)ε2Δ1]s.
s[r][e1+ccloghn(Δlogn)ε2Δ1]s.

And if Δ>6(h+)ε this sum is o(1).

Theorem 30.

Let mnh for some universal constant h and ε0.01. For any constant δ>0 there is a constant Δ>0 such that whp for rn1δ a randomly sampled graph G𝔊(m,n,Δ) is an (r,Δ,(1ε)Δ)-boundary expander.

Proof.

Let c=(1ε2)Δ. Note that G is not a boundary expander with probability at most:

s[r][e1+cms(csn)ε2Δ]s s[r][e1+cnh(nδ/2)ε2Δ]s.

And if Δ>6hεδ this sum is o(1).

Theorem 31.

Let mnlogloghn for some universal constant h, ε0.01. For any constant δ>0 there is a constant >0 such that whp for rn/logn a randomly sampled graph G𝔊(m,n,Δ) is an (r,Δ,(1ε)Δ)-boundary expander where Δlogn.

Proof.

Let c=(1ε2)Δ. Note that G is not a boundary expander with probability at most:

s[r][e1+cms(csn)ε2Δ]s s[r][e1+cnlogloghn(log/2n)ε2Δ]s.

And if >6hε this sum is o(1).

Appendix D Proof of Lemma 11

Lemma 32.

Let A be a linear system based on a graph G(L,R,E) that is an (r,Δ,c)-expander. If σ is a locally consistent assignment, then for any I of size at most r the system AI|σ is satisfiable.

Proof.

Let a pair (S,T) be a witness of the consistency of σ. So (S,T) is a ζ-reasonable pair for some ζ>0. Let σ be an extension of σ on TN(S) such that AS|σ is satisfied (it exists since AS|σ is satisfiable).

Pick an arbitrary set I of size at most r. Note that σ satisfies all constraints from IS. Let IIS. Consider a graph G obtained by removing a pair (S,TN(S)), that is (r,Δ,ζ)-boundary expander. By Lemma 4 (applied to G) there is an enumeration I={v1,v2,,v|I|} and a partition iRi=NG(I) such that:

  • Ri=N(vi)(j=1i1N(vj));

  • |(vi)Ri|ζ.

For each i[|I|] we extend σ on Ri by choosing an arbitrary assignment that satisfies constraint Avi|σ. Since |(vi)Ri|>0 there is at least one such assignment and we are done.