Lifting with Colourful Sunflowers
Abstract
We show that a generalization of the DAG-like query-to-communication lifting theorem, when proven using sunflowers over non-binary alphabets, yields lower bounds on the monotone circuit complexity and proof complexity of natural functions and formulas that are better than previously known results obtained using the approximation method. These include an lower bound for the clique function up to , and an lower bound for a function in P.
Keywords and phrases:
lifting, sunflower, clique, colouring, monotone circuit, cutting planesFunding:
Susanna F. de Rezende: Supported by Knut and Alice Wallenberg grants KAW 2018.0371 and KAW 2021.0307, ELLIIT, and the Swedish Research Council grant 2021-05104.Copyright and License:
2012 ACM Subject Classification:
Theory of computation Communication complexity ; Theory of computation Proof complexity ; Theory of computation Circuit complexityAcknowledgements:
We are grateful to Lukáš Folwarczný who contributed to early stages of the work, to Bruno Pasqualotto Cavalar for dicussions on the topic, and to Noah Fleming, Duri Andrea Janett, Jakob Nordström, and Shuo Pang for allowing us to include parts of their lifting theorem in the full version of this article.Editors:
Srikanth SrinivasanSeries and Publisher:
Leibniz International Proceedings in Informatics, Schloss Dagstuhl – Leibniz-Zentrum für Informatik
1 Introduction
In 1985, Razborov [44] proved the first superpolynomial size lower bound for monotone Boolean circuits for a monotone function in NP, and, independently, Andreev [4] obtained exponential size lower bounds. Razborov’s result was for the perfect matching and the clique functions, and shortly after, Alon and Boppana [1] improved the lower bound for clique to exponential. These lower bounds introduced the so-called approximation method, which consists of showing that every gate computes a function close to a class of functions that cannot distinguish between the expected answers. The interpretation of close becomes looser in gates further away from the inputs. The classical combinatorial sunflower lemma is used to ensure that the class of functions computed by gates increases slowly, and therefore only contains the expected output function once the circuit size surpasses the bound we are set to prove.
The approximation method also found great success in proof complexity, after Krajíček [35, 36] introduced interpolation to proof complexity and Pudlák [40] showed it could be used to prove cutting planes lower bounds from lower bounds to a generalisation of monotone circuits called monotone real circuits. For a long time the only known method for proving lower bounds for monotone circuits and for cutting planes was via approximation method. Other methods like bottleneck counting were later shown to be equivalent to the approximation method for monotone circuits [48, 11, 33]. In contrast, lower bounds for proof systems such as resolution and polynomial calculus can be readily obtained from measuring width and degree respectively.
Not long after the approximation method was introduced, new and very influential techniques were developed to prove lower bounds for monotone formulas and later extended to capture tree-like cutting planes. Karchmer and Wigderson [34] proved superpolynomial formula size lower bounds for connectivity by establishing a relation between communication complexity and monotone circuit depth. Raz and McKenzie [43] introduced a new technique, now called lifting theorems, for obtaining communication lower bounds from query complexity lower bounds, and obtained separations between mon-NC and mon-P, and between levels of the mon-NC hierarchy. Their result was extended [12] to obtain lower bounds on the size of tree-like cutting planes proofs.
A decade ago, Göös, Pitassi, and Watson [24] brought to light the generality of the result of Raz and McKenzie [43] and reignited this line of work. A notable extension is the lifting theorem [22] for a model of DAG-like communication [45, 49] that corresponds to circuit size. These theorems, in their different flavours, have been instrumental in addressing many open questions in monotone circuit complexity, including: optimal lower bounds on the size of monotone Boolean formulas computing an explicit function in NP [39]; a complete picture of the relation between the mon-AC and mon-NC hierarchies [20]; a near optimal separation between monotone circuit and monotone formula size [19]; and an exponential separation between and mon-P [22, 26].
One criticism to the lifting technique is that the lower bounds obtained are for artificial functions and formulas. This is because the lower bounds are not for the same function whose query complexity is high, but for the composition of two functions. This criticism applies to most lower bounds obtained via lifting discussed above. Nevertheless, we can obtain lower bounds for natural functions and formulas if we can reduce them to their lifted counterparts. Furthermore, we can carry the reduction already within the communication complexity model, which is easier than reducing between circuits or proofs. This idea appears already in Raz and McKenzie’s work [43], where they lift the collision-finding relation – equivalent to the pigeonhole principle – and subsequently apply a reduction to obtain a depth lower bound for clique. More recent results in circuit complexity also combine lifting and reductions [38, 46, 18] (see also [17]), as do results in proof complexity [32]. Another issue is that bounds obtained through lifting are often weaker than those obtained through more direct means, because generally composition increases the size of a function more than its complexity. The question of minimising the overhead due to lifting is recurring in the area.
Following on the topic of the strength of lower bounds, it is very natural to ask how well these match the corresponding upper bounds, and to aim for truly exponential lower bounds of the form rather than only . Razborov’s result [44] is for two monotone functions on graphs: lower bound for perfect matching and lower bound for -clique, for . Shortly after, Alon and Boppana [1, 53] extended the result on clique to for , and Amano and Maruoka [3] provided lower-order improvements. More recently, Cavalar et al. [15] showed a stronger result of for .
Besides clique, if we consider lower bounds on any function in NP, Andreev [4] proved exponential lower bounds of the form . Alon and Boppana [1], Andreev [5], and Harnik and Raz [28] successively improved the bound to , and also recently Cavalar et al. [15] proved a lower bound of the form .
It is also of significant interest to prove lower bounds for functions in P, showing that monotone circuits are weaker than circuits with negations. The first such separation is Razborov’s superpolynomial bound on the matching function, and Tardos [52] proved the first exponential separation of the form . This latter result follows from the exponential lower bound for the clique–colouring function [1] and an upper bound Tardos proved for a monotone function extending clique–colouring. The more recent lower bounds of Harnik and Raz and Cavalar et al. apply to functions that are not known to be in P.
The breakthrough that allowed Cavalar et al. to prove lower bounds beyond was the robust sunflower lemma [47, 42, 2]. This improved sunflower lemma was also used to improve the parameters in the lifting theorem [37]. Indeed, the lifting overhead was reduced to the point that bounds obtainable by lifting could match those obtained via the approximation method. However, to our knowledge, this has not been applied to get better bounds in circuit or proof complexity.
1.1 Our results
In this paper we go one step further and use lifting to prove even better lower bounds than those currently known using the approximation method. We do so by generalising the lifting theorem to non-binary alphabets, using what we call colourful sunflowers (simply sunflowers over a larger alphabet). This allows us to obtain smaller lifted problems than what we would through a binary alphabet. We then reduce this lifted problem to the clique–colouring and related functions. This gives us better lower bounds on the size of monotone circuits and cutting planes proofs.
Clique–colouring
We begin with the monotone circuit complexity of the clique function, which distinguishes graphs containing a -clique from graphs that do not. In fact we consider the clique–colouring partial function, which distinguishes -vertex graphs containing a -clique from graphs that are -colourable, for . Since the clique function extends the clique–colouring function, it is at least as hard to compute.
The best lower bound to date for the clique–colouring function was for .
Theorem 1 ([1]).
Given satisfying , , it holds that any monotone Boolean circuit computing must have size
| (1) |
A better bound for was also known for the clique function, but not for the clique–colouring function.
Theorem 2 ([15]).
Given satisfying , it holds that any monotone Boolean circuit computing -clique must have size
| (2) |
We obtain a bound for for the clique–colouring function, improving on both results
Theorem 3 (Clique-colouring).
There exists a universal constant such that given any satisfying , it holds that any monotone Boolean circuit computing must have size
| (3) |
If we assume for a constant , then we can get a slightly better lower bound: any monotone Boolean circuit computing must have size
| (4) |
Note that we get tight lower bound even for large gap, that is, for any and , for any constants . Even if and , we obtain a superpolynomial lower bound. Finally, observe that the largest lower bound we can get is , where we recall that is the number of vertices in the input graph, and the number of variables in the function is .
Colouring–cocolouring
Since a partition of a graph into cliques contains a clique of size at least , an even more specific task than clique–colouring is distinguishing -colourable graphs from -purely-cocolourable graphs. We state the result in terms of monotone real circuits, since that is needed to prove cutting planes lower bounds.
Theorem 4 ([30]).
For , every monotone function that distinguishes -vertex graphs with from graphs with has monotone real circuit complexity .
We get a stronger lower bound, but only for .
Theorem 5 (Colouring-cocolouring).
Every monotone function that distinguishes -vertex graphs with from graphs with has monotone real circuit complexity .
We believe this result is not tight and that there should be a lower bound of . We can, however, get a tight lower bound in a non-balanced parameter regime.
Theorem 6.
For , every monotone function that distinguishes -vertex graphs with from graphs with has monotone real circuit complexity .
Bit pigeonhole principle
Turning to proof complexity, we consider the complexity of refuting the bit pigeonhole principle in the cutting planes proof system, where proofs manipulate linear inequalities. The bit pigeonhole principle formula for falsely asserts that there are distinct binary strings of length . If , we refer to this formula as a weak bit pigeonhole principle formula. Hrubeš and Pudlák [30] provided the first cutting planes lower bound for , which prior to this work was the best bound known for pigeonhole principle. Note that their result works also for the weak version.
Theorem 7 ([30]).
Every cutting planes refutation of the weak bit pigeonhole principle , , has size .
Our result is only for the bit pigeonhole principle (not weak), but we obtain a better bound.
Theorem 8 (Bit pigeonhole principle).
Every cutting planes refutation of the bit pigeonhole principle has size .
Separation between monotone and non-monotone Boolean circuits
We also obtain the best known separation between monotone Boolean circuits and non-monotone Boolean circuits.
Theorem 9 ([1, 52]).
There exists a monotone function such that any monotone circuit computing is of size at least .
Using the result of [52] that there exists a total monotone function in P that extends the partial clique-colouring function and our lower bound for the clique-colouring, we immediately obtain that there exists a monotone function over variables such that any monotone circuit computing is of size at least . We can, furthermore, obtain an even better separation by considering a function obtained by restricting most of the edges of the input graph. By doing this, the lower bound for clique-colouring still applies, but the number of variables is reduced considerably and we get the following result.
Theorem 10 (Monotone vs non-monotone).
There exists a monotone function such that any monotone circuit computing is of size at least .
1.2 Technical contribution
The main technical contribution is to show that we can obtain better parameters by proving a generalised lifting theorem over large alphabets. We prove the lifting theorem following the same high-level structure as many others before. The proof consists of two key lemmas, a full range lemma and a triangle lemma, and a simulation procedure that relies on these two lemmas. The triangle lemma and the simulation procedure only change minimally, and the full range lemma follows from the sunflower lemma after adapting the probability distributions appropriately.
Once the lifting theorem is in place, we define a -CSP version of the graph pigeonhole principle. That is, we encode that elements can be coloured with colours without repetitions, each element having a pool of constantly many available colours. We show how clique–colouring reduces to this lifted CSP using a similar reduction to previous works [43, 18].
It is immediate that colouring-cocolouring reduces to clique-colouring. We show a reduction in the other direction which gives us lower bounds for colouring-cocolouring. A known further reduction [30], unmodified, yields lower bounds on the size of cutting planes refutations of the bit pigeonhole principle.
To explain why we obtain better parameters, it is convenient to think in terms of the falsified constraint search relation. For a fixed CSP, this relation consists of pairs of an assignment to variables and a constraint falsified by that output. This relation is universal, in the sense that for every relation there exists a CSP whose search relation is .
To apply the lifting technique we start with the search relation of a CSP on variables and constraints of arity , which is hard according to some query complexity measure. Then we compose that relation with a function on variables, a gadget, and we obtain a search relation of a CSP on variables and constraints, which is hard according to a communication complexity measure. When we reduce the lifted relation to e.g. clique, the size of the graph depends on the size of the lifted CSP, while the size of the clique depends on the original number of variables. Therefore minimising the arity of the CSP, along with the number of variables of the gadget, results in the least overhead.
Often it is enough to lift a CSP with constant arity over the binary alphabet, and the exact constant might not be too important if it is overshadowed by the gadget size. However, lifting theorems obtained through sunflowers can be applied with small gadgets of size , and arity becomes more relevant. For example, we could lift the standard 3-CSP Boolean encoding of the pigeonhole principle and obtain lower bounds for the clique function that hold for cliques of size up to . Using a 2-CSP with a constant-sized alphabet, however, allows us to obtain lower bounds for cliques of size up to .
We remark that the work introducing lifting theorems [43] already proves a lifting theorem for a large alphabet, which is used to lift a 2-CSP over an alphabet of linear size, precisely with the goal of proving formula lower bounds for the clique function. However, subsequent works only considered the Boolean case.
2 Lifting Theorem
A communication problem is a relation . We refer to an input as Alice’s input, and to an input as Bob’s input. A DAG-like communication protocol computing a communication problem is a DAG where each node is identified with a set , with the following two properties. Each internal node is covered by its children. Each leaf is labelled with an element such that for all .
A subcube-DAG protocol has the additional property that all nodes are subcubes, a rectangle-DAG protocol has the property that all nodes are combinatorial rectangles, and a triangle-DAG protocol has the property that all nodes are combinatorial triangles.
We assume that the fan-out of a subcube-DAG is when , and that the fan-out of rectangle- and triangle-DAGs is .
The width of a subcube-DAG is the maximum width (or codimension) of any node, and the width of a relation is the minimum width of any subcube-DAG computing it. Width is equivalent to following variation of the standard query complexity game, also called Prover–Adversary game [41, 6]. A player may query a variable or forget the value of a variable. The player aims to minimise the number of values they remember. The answer to a query is given by an adversary who aims to maximise that number and may give different answers to the same query.
The indexing function is defined as . The composition of a relation and a function , which we call a gadget, is .
Theorem 11 (Lifting Theorem).
There exists a large enough absolute constant such that any and any relation , the size of any triangle-DAG protocol solving is at least
| (5) |
The theorem applies to rectangle-DAG protocols, which are a particular case of triangle-DAG protocols. It also holds that the communication complexity of is bounded below by the query complexity of .
The search problem of a CSP is the relation that, given an assignment returns a constraint falsified by . The relation is total if the CSP is unsatisfiable. In the context of a communication problem, we write to explicitly refer to the variable partition.
Corollary 12.
For any , any alphabet , any unsatisfiable CSP on -variables, and any , the size of any triangle-DAG protocol solving is at least .
We prove the lifting theorem following the proof of the same theorem over the binary alphabet by de Rezende et al. [16]. Their proof simplifies proof of Lovett et al. [37], which in turn builds upon many other lifting theorems [27, 25, 22]. The proof of the lifting theorem relies on two lemmas, the full range lemma and the triangle lemma. A procedure that extracts a subcube-DAG from a triangle-DAG completes the proof. We describe how the proof needs to be adapted to a larger alphabet next. Since many parts of the proof change minimally or not at all, we defer the full proof to the appendix.
2.1 Full Range Lemma
The full range lemma states that, given a rectangle comprised of a well-structured part and a large enough part, takes all possible values. Following Lovett et al. [37], we prove this lemma as a consequence of the robust sunflower lemma, adapting their proof to a larger alphabet. Note that we cannot use the self-contained proof of de Rezende et al., which would result in a gadget size of at least , while a gadget of size is enough for a proof based on the sunflower lemma. In fact we can use gadgets of variable size , depending on the width of the DAG we extract [23], assuming that . It is possible to remove the assumption with a more complex version of the full range lemma [37], but we do not require such small width.
We proceed to state the sunflower lemma. For a set , is the distribution where we pick an element from with probability . is the distribution where we pick a set where for all independently. is the distribution where we pick a string where for all independently.
The projection of an element to a subset of coordinates is . The projection of a set to a subset of coordinates is . The marginal distribution of a random variable over a set on a subset of coordinates is . We omit the projection symbol and write when it is clear from context.
A set system over is -spread if for all , it holds that
| (6) |
The following robust sunflower lemma appears was proven by Rao [42, Lemma 4], although with a different distribution on sets , and was reproven by Tao [51, Proposition 5] and Bell et al. [9, Theorem 3] in the exact form we need.
Lemma 13 ([42, 51, 9]).
There is a universal constant such that the following holds. Let , , . Let be a set system over such that:
-
1.
for all , ; and
-
2.
is -spread.
Then
| (7) |
Next we use the sunflower lemma to prove the full range lemma, using the same concepts and adapting the proof of Lovett et al. [37].
The min-entropy of a random variable over a finite set , is
| (8) |
We write in an abuse of notation, and note that .
A set has blockwise min-entropy with respect to a subset if for all it holds that . Equivalently, if for all and it holds that
| (9) |
If is omitted we assume .
The component list of a vector is a set . The component list set system of a set is .
The following key observation relates sunflowers and min-entropy, showing that the concepts of blockwise min-entropy and spreadness are equivalent.
Claim 14 ([37]).
A set has blockwise min-entropy iff the component list set system of is -spread.
Claim 15 (Monotonicity).
For all , and it holds
| (10) |
Lemma 16 (Full Range Lemma).
Let be such that has block-wise min-entropy and .
Let be a large enough constant. If , and satisfy then there exists an such that for every , there exists a such that .
Proof.
Let be the component list set system of , which is -spread by Claim 14. Let . We can apply Lemma 13 with and get that:
| (11) |
Let be the indicator vector for . This implies:
| (12) |
Suppose, for the sake of contradiction, that for all there exists such that for all , . By counting:
| (13) | ||||
| (14) | ||||
| (15) | ||||
| (16) | ||||
| (17) |
where the first inequality is by our assumption on , the second inequality is by Claim 15, and the last inequality is by Equation 12. This contradicts the bound on .
In particular, the Full Range Lemma holds when and , which is the setting in which we apply it.
2.2 Triangle Lemma
The triangle lemma shows how to cover each triangle in the protocol with sets of well-structured rectangles plus error rows and columns. The proof of this lemma is largely oblivious of the exact shape of the columns, which only comes into play when we need to prove that the set of error columns is not too large. The only changes we need to make are to consider the set of columns as a subset of rather than , and the following calculation. For sets , the density of in is .
Claim 17.
Consider a collection of sets indexed by , with , and , with . If every set has density at most , then the density of the whole collection is at most .
Proof.
There are at most many choices of . Given a fixed , there are at most many choices of . By a union bound, the density of the union of all sets is at most .
2.3 Simulation
An informal sketch of how to extract a subcube-DAG from a triangle-DAG is as follows. We start at the root of the triangle-DAG, which corresponds to no queried variables. We can ensure this is the case only if the protocol is small with respect to the size of the error sets, which results in a small enough cumulative error. With the help of the triangle lemma, we traverse the triangle-DAG while maintaining a well-structured subset of the current triangle . If the block min-entropy of the well-structured subrectangle becomes larger with respect to a subset of variables that is different from the currently queried variables , then we do the following operation. First we forget all variables in , then we query all variables in . We use the full range lemma to guarantee that the answer to our queries is compatible with , and the answers themselves to choose which child of to follow in our traversal.
Again, nothing of substance changes when we use a larger alphabet. We rephrase the simulation to produce a subcube-DAG rather than a resolution refutation, reverting to the original formulation of DAG-like lifting [22]. This allows us to avoid syntactic issues with the negation of a term not being equivalent to a clause in multi-valued logic.
We provide a full proof in an appendix to the full version of this article.
2.4 Gadget Size
It is not possible to remove the linear dependence of the gadget size in terms of the alphabet size. We exhibit an explicit counterexample to lifting theorems with large alphabet and small gadgets.
Proposition 18.
There is a relation with width but such that if , then has a protocol of size .
Proof.
Let be defined as iff . On the one hand, the certificate complexity of the relation is , since every certificate must comprise at least coordinates where . Certificate complexity lower bounds width. On the other hand, if , then there exists an element that appears less than times in Bob’s input to . Hence a communication protocol is for Bob to simply announce that element, which gives a protocol of depth and size .
Note that this example does not rule out a sublinear dependence when , nor does it rule out an additive dependence.
3 Reductions
Let be a bipartite graph with uniform left degree . We assume is represented with an adjacency list (enforcing a fixed order on neighbours) and we denote the -th neighbour of as . The (functional) graph pigeonhole principle states that every left vertex maps to exactly one right vertex, and that the mapping is injective. We can encode this as a CSP, denoted , with variables for , with the intended meaning that if is mapped to its th neighbour. The constraints of the CSP express injectivity: for each pair and such that . Totality and functionality are implicit from the choice of variables.
Specialised to , the falsified constraint search problem is the relation containing if ; in other words, if there exists such that and the constraint is violated. Recall that if is unsatisfiable, then is a total search problem.
The monotone Karchmer–Wigderson game of a (partial) monotone Boolean function is a communication problem where Alice gets an input , Bob gets an input , and the set of correct outputs are coordinates such that . The monotone (real) circuit size complexity of is equivalent to the rectangle-DAG (resp. triangle-DAG) size complexity of [49, 31].
Lemma 19.
Let be a bipartite graph with and and uniform left degree . Then for any it holds that reduces to .
Proof.
We need to show that there exists a function mapping Alice’s input and a function mapping Bob’s input for to their respective inputs for .
Moreover, we need a function mapping from answers of to answers of such that it holds that
| (18) |
We start by defining and . Both functions output a grid graph on the vertex set ; however, outputs a graph containing a -clique and outputs a -colourable graph.
Alice’s input to are pointers for . Alice’s graph output by is defined as ; in other words, is precisely a clique of size over the vertices .
Bob’s input to are strings for . Bob’s graph output by is the maximal graph that admits the following -colouring: vertex is coloured for , that is, is coloured , where is the -th neighbour of in .
Finally, we define . It remains to argue that Equation 18 is satisfied. By definition of , we have that is an edge that belongs to Alice’s graph but not to Bob’s. We need to argue that is a valid answer to on input , that is, we must show that for and it holds that . By construction of Bob’s graph, , for and , and by construction of Alice’s graph, and . Together this implies that , as we wished to prove.
Given two graphs with and with , we define the function to be the function that receives as input a subset of edges of and outputs if is -colourable and if has a -clique. Observe that is a restriction of the function where all the edges in are set to and all the edges in neither nor are set to .
Let be a bipartite graph with . We define the graphs and to be -partite graphs with vertex set , each with vertices, and edge sets
| (19) | |||
| (20) |
Note that, if has left degree at most , then for each , there are at most different ’s such that . Therefore, the graph has at most edges.
Lemma 20.
Let be a bipartite graph with and and uniform left degree . For any it holds that reduces to .
Proof.
The proof is exactly the same as for Lemma 19, with the only difference that some of the edges do not need to be defined by the reductions and . Note that the edges not in either nor are always set to in Alice’s graph, and the edges in are always set to in Bob’s graph, so these edges are never a solution output by .
Observation 21.
Let be such that . We have that reduces to .
Lemma 22.
Let be such that . It holds that reduces to .
Proof.
We define functions such that maps -colourable to -colourable graphs and maps graphs containing a -clique to graphs whose complement is -colourable.
Suppose Alice’s input for is the graph and Bob’s input is . The graphs output by the functions are defined on vertex set as follows.
Let be a proper -colouring of . Bob’s graph output by is the maximal graph that admits the following -colouring: vertex is coloured with colour . Since this graph admits an -colouring it is a valid input for Bob for .
Let be a set of vertices such that is a clique. Alice’s graph output by contains edges . Note that this graph is formed by disjoint cliques and, therefore, it is a valid input for Alice for .
Finally, we define the function mapping outputs of to outputs of . It remains to argue that valid answers are mapped to valid answers. Let be an edge present in Alice’s graph and absent in Bob’s graph. By Alice’s construction, either or . By Bob’s construction, if and then and thus there is an edge between and . It must therefore be the case that , which implies that and that . We conclude that is a valid answer for .
Lemma 23.
Let be such that and . It holds that reduces to .
Proof.
Given the symmetry of , it is enough to reduce to .
The reduction is given by functions such that maps a -colourable graph into an -colourable graph, and maps a graph whose complement is -colourable into a graph whose complement is -colourable.
Suppose Alice’s input for is the graph and Bob’s input is . The graphs output by the functions are defined on vertex set as follows. Alice’s graph has edges , and admits the colouring . Bob’s graph has edges . Since its complement consists of independent copies of the complement of , it is -colourable.
Finally, we map outputs according to the function . To show that the reduction is correct, we observe that if is not present in Bob’s graph, then it must be the case that and , while if is present in Alice’s graph, then it must be that .
The CSP for pigeons and holes is defined over binary variables and has a constraint expressing , expanded into CNF, for each .
Lemma 24 ([30]).
Let be such that . Partition the inputs of , where is the first variables and is the last variables of each pigeon. Then and are equivalent.
Proof.
There is a direct correspondence between problems. An instance of the communication problem can be viewed as two colourings of a graph on vertices: the first one is a colouring with colours, and the second with colours. Bob’s graph can be constructed by taking the maximal graph respecting the -colouring; and Alice’s graph can be constructed by taking the minimal graph such that the -colouring is a valid cocolouring. An edge present in Alice’s graph and missing in Bob’s corresponds precisely to two rows of their input which are the same.
The other direction is similar. Let be a colouring of Bob’s graph, and be a cocolouring of Alice’s graph. Alice and Bob can create a matrix with rows such that Alice’s (resp. Bob’s) part of row is (resp. ) written in binary. Two rows that are the same correspond precisely to an edge present in Alice’s graph and missing in Bob’s.
4 Applications
In this section, we prove the theorems stated in the introduction, which are all obtained via an application of the lifting theorem to the CSP for an appropriate expander graph , and the appropriate reduction from Section 3.
To obtain a width lower bound we need the bipartite graph , over which is defined, to be a good vertex expander as per the following definition. A -bipartite expander graph is a bipartite graph with , , with every vertex in having degree at most , and where for every subset such that , the neighbourhood of , denoted , satisfies . A standard calculation [29] shows that random graphs are good expanders. We record two different parameter regimes that we use in our applications.
The first family of expander graphs have constant degree, and are fairly balanced.
Lemma 25.
Let be such that . Then there exists and such that with high probability a random graph is an -bipartite expander graph.
The second family has logarithmic degree and can be very unbalanced.
Lemma 26.
Let be such that , and . With high probability a random graph is an -bipartite expander graph.
We can easily obtain a width lower bound for refuting from known width lower bounds on the -encoding of the graph pigeonhole principle [10] at the cost of a linear factor in the degree of the graph. We prefer, however, to prove the lower bound directly and avoid such loss.
Let be a bipartite graph. A collection of matchings is an -online matching if ; is closed under taking subsets; and if for each matching such that , and for each not covered by there exists such that .
Lemma 27 ([21]).
If is an -bipartite expander graph, then it has an -online matching.
Since online matchings correspond precisely to adversary strategies in the Prover–Adversary games, we obtain the following, slightly tighter, lower bound. The upper bound is given by a Prover strategy that queries any left vertices.
Theorem 28.
If is an -bipartite expander graph then
We can now apply our lifting theorem (Theorem 11) to for an appropriate and obtain the following result.
Theorem 3 (Clique-colouring). [Restated, see original statement.]
There exists a universal constant such that given any satisfying , it holds that any monotone Boolean circuit computing must have size
| (3) |
If we assume for a constant , then we can get a slightly better lower bound: any monotone Boolean circuit computing must have size
| (4) |
Proof.
For the first part, let be an -bipartite expander graph for and . By Theorem 28, we have that . Applying Theorem 11 we conclude that there exists a large enough absolute constant such that any triangle-DAG protocol solving requires size
| (21) |
Finally, the result follows from the reduction to clique-colouring given by Lemma 19, where we note that .
The second part is similar, but we choose to be an -bipartite expander graph for and . The result follows, as before, by applying the lifting theorem (Theorem 11) to the width lower bound (Theorem 28) and using the reduction to clique-colouring (Lemma 19).
We are now ready to prove Theorem 6, restated below.
Theorem 6. [Restated, see original statement.]
For , every monotone function that distinguishes -vertex graphs with from graphs with has monotone real circuit complexity .
We actually prove a slightly more general statement that we use later on.
Theorem 29.
There exists an absolute constant such that any monotone real circuit computing has size at least
Proof.
It follows from Lemma 22, by setting and , that there is a reduction from to . By renaming we get that the latter is equivalent to .
By Theorem 3, this implies that any monotone real circuit computing must have size at least
| (22) |
for some universal constants and .
Theorem 5 (Colouring-cocolouring). [Restated, see original statement.]
Every monotone function that distinguishes -vertex graphs with from graphs with has monotone real circuit complexity .
Proof.
As argued in the proof above, we have that any monotone real circuit computing requires size
| (23) |
for . Setting and applying Lemma 23, and setting for , we conclude that any monotone real circuit computing requires size . Substituting , gives us the stated bound.
To formally state Theorem 8 we need to define the cutting planes proof system. We choose to define the semantic version, which is simpler and stronger than the syntactic one. A semantic cutting planes refutation of a CSP given by a set of linear inequalities is a sequence of linear inequalities where is either identical to some , or is semantically implied by and with . In the proof below, we use the fact that, given a cutting planes refutation of a CSP of length , there exists a triangle-DAG protocol of size computing for any partition [49, 31].
Theorem 8 (Bit pigeonhole principle). [Restated, see original statement.]
Every cutting planes refutation of the bit pigeonhole principle has size .
Proof.
Immediate from Theorem 29, Lemma 24, and the correspondence between the size of cutting planes proofs and triangle-DAGs.
Finally, we prove Theorem 10, which requires a slightly more careful argument than that in the proof of Theorem 3.
Theorem 10 (Monotone vs non-monotone). [Restated, see original statement.]
There exists a monotone function such that any monotone circuit computing is of size at least .
We define the graphs and to be -partite graphs with vertex set , where , and edge sets
| (24) | |||
| (25) |
Note that, if has left degree at most , then for each , there are at most different ’s such that there exists with . Therefore, the graph has at most edges.
Proof of Theorem 10.
Let be a -bipartite expander graph given by Lemma 25, with and . For any the following holds.
Let and be the graphs defined for Lemma 20. Note that the graph has at most edges, so the function has inputs. By Theorem 11 applied to , and using the reduction in Lemma 20, we conclude that any monotone circuit computing requires size at least
| (26) |
for a large enough constant .
By choosing , for large enough constant , we have that
| (27) |
Now let be the total monotone function in P that extends for given by Tardos [52]. Consider the function that is obtained from by setting all edges in to and all edges not in either nor to . Note that this function computes . Moreover, since it is a restriction of a function in P, it follows that . This concludes the proof.
5 Concluding Remarks
While the lower bounds we proved are better than what is currently known via the approximation method, we believe that it is possible to prove matching bounds with the approximation method. Both methods have common traits: the procedure in which we identify error rectangles in a triangle-DAG by traversing its nodes from the leaves is not too unlike the procedure in which we identify error functions in a monotone circuit, and the best bounds for both are obtained using sunflower lemma. It might even be possible to prove that lifting is a particular instantiation of the approximation method. The advantage of our approach is that once the lifting theorem is established, we can apply it as a black box and obtain new lower bounds by simply proving reductions in the communication world.
The lower bounds in this paper have been known, and presented in various occasions, since 2021. Since then, some of the results have been obtained with the approximation method. A very recent paper independently obtained the same bound for clique-colouring using the approximation method and sunflowers [13]. A bottleneck counting approach (which is the same as approximation method) was used to directly prove a nearly optimal cutting planes lower bound for a different formula [50]. Extending the bottleneck counting argument, another very recent paper independently obtained the same bound for cutting planes proofs of the bit pigeonhole principle [8], even in the weak setting. It may also be possible to obtain an lower bound for a monotone function in P using the approximation method [14], albeit for a different function.
References
- [1] N. Alon and R. B. Boppana. The monotone circuit complexity of Boolean functions. Combinatorica, 7:1–22, 1987. doi:10.1007/BF02579196.
- [2] Ryan Alweiss, Shachar Lovett, Kewen Wu, and Jiapeng Zhang. Improved bounds for the sunflower lemma. In Konstantin Makarychev, Yury Makarychev, Madhur Tulsiani, Gautam Kamath, and Julia Chuzhoy, editors, Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, STOC 2020, Chicago, IL, USA, June 22-26, 2020, pages 624–630. ACM, 2020. doi:10.1145/3357713.3384234.
- [3] Kazuyuki Amano and Akira Maruoka. The potential of the approximation method. SIAM Journal on Computing, 33(2):433–447, January 2004. Preliminary version in FOCS ’96. doi:10.1137/s009753970138445x.
- [4] A. E. Andreev. On a method for obtaining lower bounds for the complexity of individual monotone functions. Sov. Math., Dokl., 31:530–534, 1985.
- [5] A. E. Andreev. A method for obtaining efficient lower bounds for monotone complexity. Algebra Logic, 26(1):1–18, 1987. doi:10.1007/BF01978380.
- [6] Albert Atserias and Víctor Dalmau. A combinatorial characterization of resolution width. J. Comput. Syst. Sci., 74(3):323–334, 2008. doi:10.1016/j.jcss.2007.06.025.
- [7] Paul Beame and Michael Whitmeyer. Multiparty communication complexity of collision finding. CoRR, abs/2411.07400, 2024. doi:10.48550/arXiv.2411.07400.
- [8] Paul Beame and Michael Whitmeyer. Multiparty communication complexity of collision-finding and cutting planes proofs of concise pigeonhole principles. Technical report, Electronic Colloquium on Computational Complexity (ECCC), 2025. URL: https://eccc.weizmann.ac.il/report/2025/057.
- [9] Tolson Bell, Suchakree Chueluecha, and Lutz Warnke. Note on sunflowers. Discret. Math., 344(7):112367, 2021. doi:10.1016/j.disc.2021.112367.
- [10] Eli Ben-Sasson and Avi Wigderson. Short proofs are narrow - resolution made simple. J. ACM, 48(2):149–169, 2001. doi:10.1145/375827.375835.
- [11] Christer Berg and Staffan Ulfberg. Symmetric approximation arguments for monotone lower bounds without sunflowers. Computational Complexity, 8(1):1–20, June 1999. doi:10.1007/s000370050017.
- [12] Maria Luisa Bonet, Juan Luis Esteban, Nicola Galesi, and Jan Johannsen. On the relative complexity of resolution refinements and cutting planes proof systems. SIAM J. Comput., 30(5):1462–1484, 2000. doi:10.1137/S0097539799352474.
- [13] Jarosław Błasiok and Linus Meierhöfer. Hardness of clique approximation for monotone circuits, 2025. doi:10.48550/arXiv.2501.09545.
- [14] Bruno Pasqualotto Cavalar. Private communication, 2025.
- [15] Bruno Pasqualotto Cavalar, Mrinal Kumar, and Benjamin Rossman. Monotone circuit lower bounds from robust sunflowers. Algorithmica, 84(12):3655–3685, 2022. doi:10.1007/s00453-022-01000-3.
- [16] Susanna F. de Rezende, Noah Fleming, Duri Andrea Janett, Jakob Nordström, and Shuo Pang. Truly supercritical trade-offs for resolution, cutting planes, monotone circuits, and weisfeiler-leman. Technical report, Electronic Colloquium on Computational Complexity (ECCC), 2024. URL: https://eccc.weizmann.ac.il/report/2024/185.
- [17] Susanna F. de Rezende, Mika Göös, and Robert Robere. Guest column: Proofs, circuits, and communication. ACM SIGACT News, 53(1):59–82, 2022. doi:10.1145/3532737.3532746.
- [18] Susanna F. de Rezende, Or Meir, Jakob Nordström, Toniann Pitassi, and Robert Robere. KRW composition theorems via lifting. Comput. Complex., 33(1):4, April 2024. Preliminary version in FOCS ’20. doi:10.1007/s00037-024-00250-7.
- [19] Susanna F. de Rezende, Or Meir, Jakob Nordstrom, Toniann Pitassi, Robert Robere, and Marc Vinyals. Lifting with simple gadgets and applications to circuit and proof complexity. In Proceedings of the 61st IEEE Annual Symposium on Foundations of Computer Science (FOCS ’20), November 2020. doi:10.1109/focs46700.2020.00011.
- [20] Susanna F. de Rezende, Jakob Nordström, and Marc Vinyals. How limited interaction hinders real communication (and what it means for proof and circuit complexity). In Proceedings of the 57th IEEE Annual Symposium on Foundations of Computer Science (FOCS ’16), October 2016. doi:10.1109/focs.2016.40.
- [21] Paul Feldman, Joel Friedman, and Nicholas Pippenger. Wide-sense nonblocking networks. SIAM J. Discret. Math., 1(2):158–173, 1988. doi:10.1137/0401018.
- [22] Ankit Garg, Mika Göös, Pritish Kamath, and Dmitry Sokolov. Monotone circuit lower bounds from resolution. Theory of Computing, 16(13):1–30, 2020. Preliminary version in STOC ’18. doi:10.4086/toc.2020.v016a013.
- [23] Mika Göös, Sajin Koroth, Ian Mertz, and Toniann Pitassi. Automating cutting planes is np-hard. In Konstantin Makarychev, Yury Makarychev, Madhur Tulsiani, Gautam Kamath, and Julia Chuzhoy, editors, Proccedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, STOC 2020, Chicago, IL, USA, June 22-26, 2020, pages 68–77. ACM, 2020. doi:10.1145/3357713.3384248.
- [24] Mika Göös, Toniann Pitassi, and Thomas Watson. Deterministic communication vs. partition number. SIAM J. Comput., 47(6):2435–2450, 2018. doi:10.1137/16M1059369.
- [25] Mika Göös, Toniann Pitassi, and Thomas Watson. Query-to-communication lifting for BPP. SIAM J. Comput., 49(4), 2020. doi:10.1137/17M115339X.
- [26] Mika Göös, Pritish Kamath, Robert Robere, and Dmitry Sokolov. Adventures in monotone complexity and TFNP. In Proceedings of the 10th Innovations in Theoretical Computer Science Conference (ITCS ’19), volume 124 of Leibniz International Proceedings in Informatics (LIPIcs), pages 38:1–38:19, January 2019. doi:10.4230/LIPIcs.ITCS.2019.38.
- [27] Mika Göös, Shachar Lovett, Raghu Meka, Thomas Watson, and David Zuckerman. Rectangles are nonnegative juntas. SIAM Journal on Computing, 45(5):1835–1869, October 2016. Preliminary version in STOC ’15. doi:10.1137/15M103145X.
- [28] Danny Harnik and Ran Raz. Higher lower bounds on monotone size. In F. Frances Yao and Eugene M. Luks, editors, Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, May 21-23, 2000, Portland, OR, USA, pages 378–387. ACM, 2000. doi:10.1145/335305.335349.
- [29] Shlomo Hoory, Nathan Linial, and Avi Wigderson. Expander graphs and their applications. Bull. Am. Math. Soc., New Ser., 43(4):439–561, 2006. doi:10.1090/S0273-0979-06-01126-8.
- [30] Pavel Hrubes and Pavel Pudlák. Random formulas, monotone circuits, and interpolation. In Chris Umans, editor, 58th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2017, Berkeley, CA, USA, October 15-17, 2017, pages 121–131. IEEE Computer Society, 2017. doi:10.1109/FOCS.2017.20.
- [31] Pavel Hrubes and Pavel Pudlák. A note on monotone real circuits. Inf. Process. Lett., 131:15–19, 2018. doi:10.1016/j.ipl.2017.11.002.
- [32] Dmitry Itsykson and Artur Riazanov. Proof complexity of natural formulas via communication arguments. In Proceedings of the 36th Annual IEEE Conference on Computational Complexity (CCC ’21). Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2021. doi:10.4230/LIPICS.CCC.2021.3.
- [33] Stasys Jukna. Finite limits and monotone computations: the lower bounds criterion. In Proceedings of the 12th Annual IEEE Conference on Computational Complexity (CCC ’97), pages 302–313, 1997. doi:10.1109/ccc.1997.612325.
- [34] Mauricio Karchmer and Avi Wigderson. Monotone circuits for connectivity require super-logarithmic depth. SIAM J. Discret. Math., 3(2):255–265, 1990. doi:10.1137/0403021.
- [35] Jan Krajícek. Interpolation theorems, lower bounds for proof systems, and independence results for bounded arithmetic. J. Symb. Log., 62(2):457–486, 1997. doi:10.2307/2275541.
- [36] Jan Krajícek. Interpolation by a game. Math. Log. Q., 44:450–458, 1998. doi:10.1002/malq.19980440403.
- [37] Shachar Lovett, Raghu Meka, Ian Mertz, Toniann Pitassi, and Jiapeng Zhang. Lifting with sunflowers. In Mark Braverman, editor, 13th Innovations in Theoretical Computer Science Conference, ITCS 2022, January 31 - February 3, 2022, Berkeley, CA, USA, volume 215 of LIPIcs, pages 104:1–104:24. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2022. doi:10.4230/LIPIcs.ITCS.2022.104.
- [38] Igor Carboni Oliveira. Unconditional lower bounds in complexity theory. PhD thesis, Columbia University, USA, 2015. doi:10.7916/D8ZP45KT.
- [39] Toniann Pitassi and Robert Robere. Strongly exponential lower bounds for monotone computation. In Proceedings of the 49th Annual ACM Symposium on Theory of Computing (STOC ’17), pages 1246–1255, June 2017. doi:10.1145/3055399.3055478.
- [40] Pavel Pudlák. Lower bounds for resolution and cutting plane proofs and monotone computations. J. Symb. Log., 62(3):981–998, 1997. doi:10.2307/2275583.
- [41] Pavel Pudlák. Proofs as games. Am. Math. Mon., 107(6):541–550, 2000. URL: http://www.jstor.org/stable/2589349.
- [42] Anup Rao. Coding for Sunflowers. Discrete Anal., 2020:8, 2020. Id/No 2. doi:10.19086/da.11887.
- [43] Ran Raz and Pierre McKenzie. Separation of the monotone NC hierarchy. Comb., 19(3):403–435, 1999. doi:10.1007/s004930050062.
- [44] A. A. Razborov. Lower bounds for the monotone complexity of some Boolean functions. Sov. Math., Dokl., 31:354–357, 1985.
- [45] Alexander A. Razborov. Unprovability of lower bounds on circuit size in certain fragments of bounded arithmetic. Izvestiya: Mathematics, pages 205–227, February 1995. doi:10.1070/im1995v059n01abeh000009.
- [46] Robert Robere. Unified lower bounds for monotone computation. PhD thesis, University of Toronto, Canada, 2018. URL: http://hdl.handle.net/1807/92007.
- [47] Benjamin Rossman. The monotone complexity of k-clique on random graphs. SIAM J. Comput., 43(1):256–279, 2014. doi:10.1137/110839059.
- [48] Janos Simon and Shi-Chun Tsai. On the bottleneck counting argument. Theoretical Computer Science, 237(1–2):429–437, April 2000. Preliminary version in CCC ’97. doi:10.1016/s0304-3975(99)00321-7.
- [49] Dmitry Sokolov. Dag-like communication and its applications. In Proceedings of the 12th International Computer Science Symposium in Russia (CSR ’17), volume 10304 of Lecture Notes in Computer Science, pages 294–307. Springer, June 2017. doi:10.1007/978-3-319-58747-9_26.
- [50] Dmitry Sokolov. Random (log )-cnf are hard for cutting planes (again). In Proceedings of the 56th Annual ACM SIGACT Symposium on Theory of Computing (STOC ’24), pages 2008–2015, 2024. doi:10.1145/3618260.3649636.
- [51] Terence Tao. The sunflower lemma via shannon entropy, 2020. URL: https://terrytao.wordpress.com/2020/07/20/the-sunflower-lemma-via-shannon-entropy/.
- [52] Éva Tardos. The gap between monotone and non-monotone circuit complexity is exponential. Combinatorica, 8(1):141–142, March 1988. doi:10.1007/bf02122563.
- [53] Ingo Wegener. The complexity of Boolean functions. Wiley-Teubner, 1987. URL: http://ls2-www.cs.uni-dortmund.de/monographs/bluebook/.
