Abstract 1 Introduction 2 Approximating cliques 3 Robust clique numbers are upper bounded by robust sunflower numbers 4 The upper bound References

Hardness of Clique Approximation for Monotone Circuits

Jarosław Błasiok ORCID ETH Zurich, Switzerland Linus Meierhöfer ETH Zurich, Switzerland
Abstract

We consider a problem of approximating the size of the largest clique in a graph, using a monotone circuit. Concretely, we focus on distinguishing a random Erdős–Rényi graph 𝒢n,p, with p=n2α1 chosen st. with high probability it does not even contain an α-clique, from a random clique on β vertices (where αβ). Using the approximation method of Razborov, Alon and Boppana showed in their influential work in 1987 that as long as αβ<n1δ/logn, this problem requires a monotone circuit of size nΩ(δα), implying a lower bound of 2Ω~(n1/3) for the exact version of the problem Cliquek when kn2/3. Recently, Cavalar, Kumar, and Rossman improved their result by showing a tight lower bound nΩ(k), in a limited range kn1/3, implying a comparable 2Ω~(n1/3) lower bound after choosing the largest admissible k.

We combine the ideas of Cavalar, Kumar and Rossman with recent breakthrough results on sunflower conjecture by Alweiss, Lovett, Wu, and Zhang to show that as long as αβ<n1δ/logn, any monotone circuit rejecting 𝒢n,p graph while accepting a β-clique needs to have size at least nΩ(δ2α); this implies a stronger 2Ω~(n) lower bound for the unrestricted version of the problem.

We complement this result with a construction of an explicit monotone circuit of size O(nδ2α/2) which rejects 𝒢n,p, and accepts any graph containing β-clique whenever β>n1δ. In particular, those two theorems give a precise characterization of the smallest β-clique that can be distinguished from 𝒢n,1/2: when β>n/2Clogn, there is a polynomial-size circuit that solves it, while for β<n/2ω(logn) every circuit needs size nω(1).

Keywords and phrases:
circuit lower bounds, monotone circuits, sunflower conjecture
Copyright and License:
[Uncaptioned image] © Jarosław Błasiok and Linus Meierhöfer; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Circuit complexity
Related Version:
Full Version: https://arxiv.org/abs/2501.09545
Editors:
Srikanth Srinivasan

1 Introduction

Monotone circuits form a restricted computation model, where computation is performed by a directed acyclic graph, with input nodes (of in-degree 0) labeled by the input variables and internal nodes (gates) labeled or (computing logical and, or logical or respectively, of input wires). It is not difficult to see that every monotone function on n binary variables f:{0,1}n{0,1} (and only monotone functions), can be computed by such a circuit, and by a simple counting argument one can show that a random monotone function requires a monotone circuit of size 2Ω(n).

Remarkably, in contrast with more general Boolean circuits (where the negation gate ¬ is also allowed), since the breakthrough work of Razborov [19], there are known unconditional super-linear lower bounds for the size of monotone circuit computing explicit monotone functions. Concretely, Razborov showed that for any klog(n), the function Cliquek:{0,1}(n2){0,1} – interpreting its input as an adjecency matrix of a graph G, and outputting 1 if and only if said graph contains a clique on k vertices – requires a monotone circuit of size nΩ(k). Putting k=logn, this gives a quasipolynomial lower bound 2Ω(log2(n)); an analogous result for boolean circuits including negation would imply PNP and seems to be far beyond the reach of current techniques, almost 40 years later.

To prove his lower bound, Razborov used the sunflower lemma of Erdős and Rado [10], bringing it to the attention of the theoretical computer science community. In the highly influential follow-up work, Alon and Boppana [1] further utilized the approximation method introduced by Razborov. They showed a nΩ(k) lower bound for the Cliquek problem when kn2/3/logn – implying a 2Ω~(n1/3) lower bound at the optimal value of k=n2/3/logn – a result which has since become a landmark of circuit complexity. Interestingly and less commonly known, in the same paper, they also showed a stronger inapproximability result: Any monotone circuit that rejects every graph without even an α-clique and accepts every graph that has a β-clique (where αβ) needs to have a size at least nΩ(δα) as long as αβ<n1δ/logn. In fact, their result holds in the average case – they show that it is hard to reject a random (α1)-partite graph while accepting a clique on β random vertices.

Since then, several other techniques for showing monotone circuit lower bounds for specific problems have been introduced over almost four decades (e.g., [3, 4, 15, 11, 12, 7]), but the result of Alon and Boppana stood as essentially the best-known lower bound for the clique problem.

Very recently, the breakthrough result of Alweiss, Lovett, Wu, and Zhang [2] made a major step towards resolving the sunflower conjecture – conjecture about the “right” quantitative dependency in the sunflower lemma – and was followed in short succession by a sequence of further improvements [5, 17, 23, 14, 18]. Particularly noteworthy is the exposition by Rao [18], presenting not only the improved sunflower bounds but also the resolution of the Kahn-Kalai conjecture in just a few pages.

Following up on these results, Cavalar, Kumar, and Rossman [8], showed how to utilize the new sunflower bounds to prove the first 2Ω(n) lower bound for any explicit monotone function (improving the earlier 2Ω~(n1/3) lower bound), specifically for the Harnik-Raz function [13]. In the same paper, they also gave the first substantial improvement over the Alon-Boppana bound for the clique problem: they showed that as long as kn1/3δ the Cliquek problem requires nΩ(k) circuit size – a tight lower bound, but in a further restricted range of parameters; choosing the optimal kn1/3, this leads to the same 2Ω~(n1/3) lower bound for Clique. As it turns out, their result for the clique did not use the new sunflower bounds, and, in fact, it was unclear how to combine those techniques.

1.1 Our results

We prove a lower bound on the size of monotone circuits solving the promise problem GAPα,β(n).

Definition 1.

For integers n,α,β with α<β, define the promise problem GAPα,β(n), where the two promise subsets 𝒜, are defined as

𝒜:={G{0,1}(n2)|G does not contain an α-clique},

and

:={G{0,1}(n2)|G contains an β-clique}.

To prove a lower bound on GAPα,β(n), we introduce an associated strengthened distributional problem 𝒟(𝒯α,𝒯β+) to distinguish two graph distributions 𝒯α and 𝒯β+.

Definition 2.

For an integer n,α,β with αβ, let 𝒯β+ be a uniformly random distribution of isolated β-cliques on n vertices. Let 𝒯α𝒢n,p the Erdős–Rényi random graph distribution on n vertices with probability parameter p=n2/(α1).

The problem 𝒟(𝒯α,𝒯β+) is to distinguish those two distributions – i.e. given on input a graph G drawn either from 𝒯α or 𝒯β+ we want to reject with probability at least 2/3 in the former case and accept with probability at least 2/3 in the latter.

Note that α is chosen so that 𝒟(𝒯α,𝒯β+) is associated with GAPα,β(n) as the probability that a graph drawn from 𝒯α contains a clique of size α is small – a simple union bound can be used to argue that PrG𝒯α[G contains α-clique]<1/4 for α4. As such, any circuit solving the problem GAPα,β can distinguish 𝒯α from 𝒯β+, and conversely, a lower bound for 𝒟(𝒯α,𝒯β+) implies a lower bound for GAPα,β.

Our main results are lower and upper bounds on the monotone complexity of 𝒟(𝒯α,𝒯β+), captured in the following two theorems.

Theorem 3.

Let αβ<n1δ/log(n). Then there exists no monotone circuit solving 𝒟(𝒯α,𝒯β+) with size less than nΩ(δ2α).

Theorem 4.

Let βn1δ. Then there exists a monotone circuit C on (n2) inputs, solving 𝒟(𝒯α,𝒯β+) with size(C)=𝒪(nδ2α/2).

We want to emphasize a special case of α=2log2n+1 (or, equivalently, the negative distribution 𝒯 being an Erdős–Rényi graph 𝒢n,p with p=1/2). In this case, according to Theorem 4, we can choose δ=1/logn to get a polynomial-size circuit, rejecting 𝒢n,p yet accepting a clique of size β=n/2Clogn. On the other hand, Theorem 3 states that if we wanted to reject 𝒢n,1/2 and accept a clique of size β, where β=n/2ω(logn), we would need a circuit of size nω(1).

As such, our two theorems provide a near-tight characterization of the power of polynomial-size monotone circuits to distinguish the 𝒢n,1/2 graph from a large clique.

Another interesting corollary of Theorem 3, is obtained by setting β=α, and taking α as large as possible while satisfying the restriction α2<n1δ/logn, in order to obtain a strongest possible lower bound for the clique problem.

Corollary 5.

For any kn1/2δ/log2n, the monotone complexity of the Cliquek is nΩ(δ2k). In particular monotone complexity of the Clique problem is 2Ω~(n).

Note that no truly exponential lower bounds for the monotone circuit size are known for any explicit monotone problem. A lower bound of 2Ω~(n) (where n is the size of the input) was shown for the arguably less-natural Harnik-Raz function [13] in [8], breaking the long-standing barrier of 2Ω~(n1/3) – and using the same breakthroughs in sunflower lemmas that are crucial in our improvement.

In our case, the input is an adjacency matrix of a graph on n vertices hence the input has m=Θ(n2) bits; our lower bound, in terms of the input size, is then 2Ω(m1/4) – the exponent is still by a factor of two worse than in the strongest known lower bound for any explicit monotone function.

Concurrent and independent work

Independently to our results, Suzanna de Rezende and Marc Vinyals proved a comparable monotone circuit lower bound 2Ω(n) for the clique problem [9]. Specifically, they show a lower bound of nΩ(k)for the problem of distinguishing a k+1-clique from a k-colorable graph as long as kn1/2ε. Their does not use the approximation method, instead leveraging a combinatorial reduction together with a new query-to-communication complexity lifting theorem, and known relationship between specific communication complexity lower bounds and monotone circuit lower bounds. Interestingly, the key step in their improved lifting theorem also leverged the [2] breakthrough in sunflower bounds.

1.2 Approximation method

Let us briefly recall the idea behind the approximation method for showing monotone circuit lower bounds, introduced by Razborov [19], and then utilized by [1, 8].

In order to show a lower bound for a size of a monotone circuit distinguishing two specific distributions 𝒯+ and 𝒯, we proceed by inductively (gate-by-gate) approximating any given circuit C by a simpler circuit C^ (from some class of simple circuits).

If we can show that

  1. 1.

    Every simple circuit fails to distinguish between 𝒯+ and 𝒯 – that is, for all simple C^, we have 𝔼x𝒯+C^(x)𝔼x𝒯C^(x)o(1).

  2. 2.

    In each gate, by applying the approximation, we introduce error at most δ on both positive and negative distribution.

That implies a lower bound Ω(δ1) for the size of the smallest monotone circuit C distinguishing those two distributions.

For the clique problem (say, distinguishing random 𝒢n,p graph which likely does not even have a clique of size α, from a uniformly random clique of size βα), following [19, 1, 8], the “simple” circuits we use to approximate a given circuit are just small DNF formulas, specifically conjunctions of clique indicators – that is circuits of form

i𝒦Ai,

where

𝒦Ai:={u,v}Aixuv.

Moreover, a circuit is simple if the size of each clique indicator is bounded by c (we will eventually choose c:=δα), and the number of clique indicators of each size c is appropriately bounded.

At a given gate, we wish to approximate a conjunction or a disjunction of two such simple circuits again by a simple circuit. By applying de Morgan laws in the conjunction case, we can transform the circuit again into DNF (without introducing any error).

Then, we repeat the following three steps, transforming the DNF obtained this way into a simple one.

  1. 1.

    We replace all conjunctions 𝒦Ai𝒦Aj by clique indicators 𝒦AiAj.

  2. 2.

    As long as there is a family of cliques on sets Ai1,Aik having a specific combinatorial structure, we replace all of them by a clique on the set C, where C is the intersection of Aij.

  3. 3.

    We remove all clique indicators 𝒦Ai for Ai larger than threshold c.

As it turns out, step 1 does not introduce any error on both the positive and negative distributions.

Step 3 can introduce error only on the positive distribution, which can be bounded by union bound – any given large clique indicator is unlikely to be satisfied by a large random clique. The number of those large clique indicators we discard is bounded (otherwise, we would have been able to apply step 2).

Finally, step 2 is the crux of the argument – we need to show that if the number of indicators of a given size is too large, then there always is a subset of those indicators that can be replaced by its intersection C (the core), without introducing too much error on the negative distribution (clearly we will not introduce any error on the positive distribution in this case).

In the Razborov’s proof and some presentations of the Alon-Boppana proof (see for example [16, Chapter 9]), one can focus on finding a sunflower consisting of many sets among the set system {Ai} (a sunflower is a family of sets for which all pairwise intersections are the same, see Section 1.3), and show that replacing a large sunflower by its core introduces only small error on the negative distribution. This, together with the Erdős-Rado result that any large enough family of bounded sets contains a large sunflower, gives an upper bound on the number of clique indicators of size for a “simple circuit” (one on which the step 2 can no longer be applied), and hence yields a complete proof of a monotone circuit lower bound for the clique problem. Specifically, going carefully through the calculations, one could show this way a lower bound nΩ(k) for the Cliquek problem whenever kn1/2δ, translating to a 2Ω~(n1/4) lower bound for the Clique problem after taking optimal k. 111In the actual Alon-Boppana paper, they used a slightly more general combinatorial structure than sunflowers: a sequence of distinct sets Ai1,Aik, together with a set CAt (not necessarily distinct from Ai1,Aik), s.t. all pairwise intersections AisAirC – and they replaced Ai1,Aik by C in step 2 here. Clearly any sunflower Ai1Aik with the core C=Aij satifies this property. By using this more general structure, they were able to show a lower bound nk for kn2/3 – matching the result one would get insisting on using a sunflower here if the sunflower conjecture was true; yet without having to prove this conjecture.

The work of Cavalar, Kumar, and Rossman [8], introduced a notion of robust clique-sunflower, which abstracts exactly the property needed to bound the error introduced on the negative distribution 𝒢n,p by replacing the robust clique sunflower by its core. They showed better quantitative bounds on the size of the set system needed to contain such a robust clique sunflower and were able to deduce a lower bound nΩ~(k) for kn1/3δ – matching the same 2Ω~(n1/3) for the clique problem when picking largest admissible k.

1.3 Sunflowers, robust sunflowers and robust clique sunflowers

We define the robust clique sunflower (after [8]) – a notion abstracting the main property of combinatorial sunflowers used to obtain a monotone lower bound for the Cliquek problem, where the negative distribution is 𝒢n,p. This property ensures that for a DNF formula

i𝒦Ai

if some of those sets Ai form a robust clique sunflower, we can replace them by a single clique indicator on the common intersection C while introducing only a small error on the negative distribution (and no error on the positive distribution).

Definition 6 (Robust clique sunflower).

A family of sets 𝒮2[n] is an (p,ε)-robust clique sunflower (with core C=S𝒮S), if

PrG(S𝒮,KSGKC)1ε,

where G is a random Erdős–Rényi graph 𝒢n,p sampled by including each edge independently with probability p, and KS([n]2) is a clique on vertices S, i.e. KS:={{u,v}:u,vS,uv}.

This notion is intimately related to a similar notion of a robust sunflower, originally introduced in [20].

Definition 7 (Robust sunflower).

A family of sets 𝒮2[n] is an (p,ε)-robust sunflower (with core C=S𝒮S), if

PrW(S𝒮,SWC)1ε,

where W is a random subset of [n] chosen by including each element independently with probability p.

As it turns out, any large enough family of sets of size contains a robust sunflower or a robust clique sunflower. We introduce a notation for the dependence between the size of the family and the parameters of this sunflower.

Definition 8.

We define RB(,p,ε) to be the smallest number such that any -uniform222-uniform set system is just a family of subsets of a universe, each subset of size exactly . set system of size at least RB(,p,ε) contains a (p,ε)-robust sunflower.

Similarly, we define RCB(,p,ε) to be the smallest number such that any -uniform set system of size at least RCB(,p,ε) contains a (p,ε)-robust clique-sunflower.

Note that a family 𝒮2[n] is a robust clique sunflower (as in the Definition 6), if and only if the family of edge-sets {KS:S𝒮} is a robust sunflower. This observation implies a simple (yet unsatisfactory) bound

RCB(,p,ε)RB((2),p,ε). (1)

In Section 1.4 (for instance Theorem 14) we provide a quantitative statement for how the upper bounds on RCB can be translated into lower bounds for the Clique problem.

For completeness, let us discuss a way to reinterpret a result similar to the Alon-Boppana (with the negative distribution being 𝒢n,p instead of random (α1)-partite graph) in this framework, by deducing a bound on the robust clique sunflowers from the sunflower bound.

Definition 9 (k-Sunflower).

An family 𝒮2[n] of k sets is a k-sunflower (with a core C=S𝒮S), if all pairwise intersections of sets from 𝒮 are C, i.e. for all S1S2𝒮, we have S1S2=C.

What we call a k-sunflower is sometimes called in the literature a sunflower with k-petals. We chose a slightly more concise terminology.

A sunflower lemma [10] now says that for every and k, there is a finite number S(,k)!(k1) such that every -uniform set system of size at least S(,k) has a k-sunflower. Subsequent results, including the breakthrough by [2] and improvements [5, 17, 23, 14, 18] provide successively smaller upper bounds on S(,k), concluding with the best currently known bound

S(,k)O(klog). (2)

while the famous sunflower conjecture ([10]) stipulates that S(,k)O(k).

The following observation, similar in form to the core of the Razborov and Alon-Boppana results, is a simple way to connect sunflowers to robust clique sunflowers.

Lemma 10.

Every -uniform k-sunflower is an (p,exp(kp(2)))-robust clique sunflower. In particular RCB(,p,ε)S(,log(1/ε)p(2)).

Proof.

Consider a k-sunflower S1,Sk with core C. By the definition of sunflower the sets of edges KSiKC are disjoint, hence the indicator random variables Ri:=𝟏[KSiGKC] are independent. Since 𝔼Rip(2), the probability that all Ri are zero is at most (1p(2))kexp(kp(2)).

This, combined only with the classical upper bound S(,k)O(k) by Erdős-Rado yields an upper bound

RCB(,p,ε)O(1/p)3(log(1/ε)),

which can be used to recover nΩ(α) lower bound via the approximation method outlined in the previous section (see for instance Theorem 14).

Crucially for us, a bound on robust sunflower numbers is an essential part of the new, improved series of results on the bounds for sunflower numbers. Specifically, the following theorem was used to deduce those new bounds and is important for our application.

Theorem 11 ([2, 5, 18]).

The robust sunflower numbers are bounded as

RB(,p,ε)O(p1(log(1/ε)+log)).

This theorem fairly quickly implies the breakthrough upper bound on sunflower numbers (2). For our purposes, though, the sunflower consequence of Theorem 11 is less relevant, and we will leverage the existence of robust sunflowers directly.

In Section 3, we prove a much stronger reduction than (1), showing how robust sunflower bounds can be used to give bounds on robust clique-sunflowers, which leads to our main improvement.

Theorem 12.

For any 1, p(0,1) and ε(0,1) we have

RCB(,p,ε)RB(,p,ε/2),

where RCB(,p,ε) and RB(,p,ε) are defined as in Definition 8.

Combining the upper bound for robust sunflowers in Theorem 11 with our comparison theorem (Theorem 12), we get

Corollary 13.

The clique sunflower numbers are bounded as

RCB(,p,ε)O(p(log(1/ε)+log)).

This result is an improvement over a bound from [8, Lemma 3.2] of the same quantity. They directly showed an upper bound

RCB(,p,ε)p(2)O(log(1/ε)). (3)

As we will see later, reducing the O() factor down to O(log) allowed us to show a lower bound 2Ω~(n) for the clique problem as opposed to 2Ω~(n1/3) from [1, 8].

In order to prove Theorem 12 we show that any (p,ε/2)-robust sunflower is an (p,ε)-robust clique sunflower. This statement is easier to interpret for sunflowers with empty core: given a uniform family of sets 2[n] (with empty common intersection), if we are very likely to cover one of those sets while sampling vertices of [n] independently at random with probability p, we are also very likely to cover one of those with a clique, when sampling edges of ([n]2) independently with probability p.

As it turns out, one can set up specific stochastic processes {YS}S, and {YS}S associated with both of those experiments – the expected supremum of these processes will be directly connected (respectively) with the probability of covering one of the sets of S by a random set (with the inclusion probability p), or the probability of covering one of the cliques on the vertices of S by a random graph (with edge probability p). The central technical part of the proof is the comparison lemma stating that 𝔼supSYS𝔼supSYS – theorems of that form appeared in the literature on the theory of stochastic processes (most well known is the Slepian lemma, or Gaussian comparison principle [22, Corollary 2.10.12]). Even though we could not apply any of the known comparison lemmas black-box, we adapt the ideas that were used in [21] to show a comparison lemma for coordinate-wise contractions of canonical Bernoulli processes, and we show the desired inequality for our two specific stochastic processes in question.

1.4 Lower bounds for monotone circuits depending on sunflower bounds

We carry over the high-level structure of the proof outlined in Section 1.2 in more detail in Section 2. This part of the proof is technically very similar to known results applying the approximation method (for example [19, 1, 8]). However, in contrast with many of the previous work, we made an effort to provide a statement of the lower bound theorem parameterized by the robust clique sunflower numbers RCB(,p,ε) – which, in turn, can be upper bounded in several ways by the robust sunflower numbers RB(,p,ε), or sunflower numbers S(,k) as discussed in Section 1.3.

Making these dependencies explicit instead of choosing optimal values of relevant parameters ahead of time based on currently best-known bounds on sunflower numbers makes the interplay between sunflower-like combinatorial statements and monotone lower bounds for the clique problem much clearer.

Moreover, our analysis allows us to show the inapproximability results (Theorem 3) – i.e., hardness of distinguishing a random clique of size β, from a random graph 𝒢n,p which is unlikely to even have a clique of size α for α<β.

The analysis of [19, 8] focused on the exact case, i.e., β=α; whereas in [19, 1], the negative distribution was chosen to be a random complete (β1)-partite graph. However, this choice was not crucial in their reasoning – only simple modifications are needed to adapt their proofs to the 𝒢n,p being the negative distribution.

As we have been made aware recently, an even more general statement can be found [6, Theorem 5.6.4] – the following theorem can be deduced as a corollary of their more general framework, by a concrete instantiation of their notion of the notion of abstract sunflower to denote the robust clique sunflower.

Theorem 14.

Fix some cn and take p:=n2α1. If for every 2c, we have

(β/n)RCB(,p,ε)1/γo(1)

then the size of any monotone circuit C distinguishing 𝒯α and 𝒯β+ satisfies

size(C)Ω(min{γc,n2c/ε}).

In particular, choosing ε=n4c, if for all 2c we have

(β/n)RCB(,p,n4c)1/<nδ

then the monotone complexity of distinguishing 𝒯α and 𝒯β+ is Ω(nδc).

It is instructive to see how to essentially recover the Alon-Boppana bounds from Theorem 14, using a simple lemma stating that large enough sunflowers are robust clique sunflowers (Lemma 10) together with the new bounds on the sunflower numbers (2). In this case, we have an upper bound on the

RCB(,p,ε)1/p2(log(1/ε)+log)nO(c2α)clogn,

so taking c:=O(δα) for a small constant δ, such that RCB(,p,ε)1/nδαlogn, we end up with a complexity lower bound nΩ(δc)=nΩ(α), as long as

αβlognn12δ,

recovering [1, Theorem 3.11]. Setting α=β, gives a lower bound of form nΩ(α) as long as αn2/3δ.

In a similar vein, plugging in the upper bound (3) for RCB(,p,ε) (originally shown in [8, Lemma 3.2]), yields the lower bound nΩ(α), as long as α2βn1δ/logn, and again choosing α=β yields an nΩ(α) for αn1/3δ, recovering their [8, Theorem 3.23].

Finally, Theorem 14 together with our new bounds for the robust clique numbers (Corollary 13) directly imply the lower bound claimed in Theorem 3.

2 Approximating cliques

In this chapter, we will give an extended version of the approximation method (showing Theorem 14) and take advantage of our improved robust clique sunflower bound to strengthen the lower bound for Cliquek to nΩ(k) if kn1/2δ.

2.1 Abstract approximation method

For the sake of abstraction, we describe a general inductive procedure of converting any monotone circuit C computing a distributional decision problem 𝒟(𝒯,𝒯+), gate by gate, into an approximation circuit C^𝒜 from a set of approximation circuits 𝒜. This procedure depends on a pair of “compression” functions 𝒫,𝒫:𝒜×𝒜𝒜. The error introduced by the conversion, with respect to the distributions 𝒯+ and 𝒯, will depend solely on 𝒫.

Definition 15.

For any monotone circuit C and a pair of compression functions 𝒫=(𝒫,𝒫) with 𝒫,𝒫:𝒜×𝒜𝒜 define C^𝒜 as the result of the following procedure.

  1. 1.

    Input variables: Let C=xi be an input variable. Define

    C^=C=xi.
  2. 2.

    -gate: Assume C=C0^C1^. Define

    C^=𝒫(C^0,C^1).
  3. 3.

    -gate: Assume C=C0^C1^. Define

    C^=𝒫(C^0,C^1).

Depending on the choice of 𝒫, C^ can be very different from C. For the sake of analysis, we are interested in the maximum error that a single transformation step can introduce on either distribution.

Definition 16.

Let (𝒫) be the image of 𝒫 and define the positive approximation error

ζ𝒫+=max{,}maxC0^,C1^(𝒫){PrG𝒯+[(C0^C1^)=1 and 𝒫(C0^C1^)]=0}

and the negative approximation error

ζ𝒫=max{,}maxC0^,C1^(𝒫){PrG𝒯[(C0^C1^)=0 and 𝒫(C0^C1^)]=1}

We can also formalize the earlier intuition about proving circuit size lower bounds using the relative and absolute approximation errors.

Definition 17.

We say that a circuit C distinguishes distributions 𝒯+ and 𝒯 if 𝔼X𝒯+[C(X)]𝔼X𝒯[C(X)]2/3.

We say that a circuit is 𝒫-simple if it is in the image of the compression function 𝒫.

Lemma 18.

If every 𝒫-simple circuit C^ satisfies 𝔼X𝒯+[C^(X)]𝔼X𝒯[C^(X)]1/3, then every circuit C distinguishing 𝒯+ and 𝒯 has

size(C)Ω(min(1/ζ𝒫+,1/ζ𝒫)).
Proof.

The transformation of C into C^ introduces at most ζ+ error on 𝒯+ and ζ error on 𝒯 per gate. As C distinguishes the distributions, but 𝔼X𝒯+[C^(X)]𝔼X𝒯[C^(X)]1/3, the error of the 𝒫-transformation must match the absolute error of the 𝒫-simple circuit C^, so the theorem follows.

2.2 Proving clique lower bounds

In the following, we will specialize the definition of the approximation circuits 𝒜 and the compression functions (𝒫,𝒫) to prove the lower bounds on 𝒟(𝒯α,𝒯β+).

Definition 19.

Let A[n] be a subset of vertices. Let 𝒦A be the clique indicator function on A, such that 𝒦A(G)=1KAG. For any family of subsets of [n], {A1,,Am}, define the associated approximation circuit as

A=i=1m𝒦Ai

Let 𝒜 be the set of all approximation circuits.

We will often freely switch between the formal definition of an approximator as a Boolean circuit A=i=1m𝒦Ai and its representation as a set system over the universe of graph vertices A={A1,,Am}22[n].

Definition 20.

For an “inner-compression” function τ:𝒜𝒜, define 𝒫=(𝒫,𝒫) with

𝒫(iu𝒦Xi,jv𝒦Yi)=τ(iujv𝒦XiYj)
𝒫(iu𝒦Xi,jv𝒦Yi)=τ(iu𝒦Xijv𝒦Yi)

We observe that for the identity τ=id, 𝒫 introduces no error on the graph distributions 𝒯α and 𝒯β+. Indeed, the positive distribution is supported on the β cliques. A β-clique G contains both cliques KXi and KYj if and only if it contains a clique KXiYi. On the other hand, on the negative distribution, transforming a conjunction KXiKXj into the clique indicator KXiYj can only reject more instances. Thus, the error only depends on the choice of τ. For constructing such τ, we will use the robust clique sunflowers.

2.3 Robust closures

For a DNF formula A:=i=1m𝒦Ai we define clp,ε(A) to be a formula obtained from A by repeatedly replacing any (p,ε)-robust clique sunflower Ai1,Aik by its core C:=jAij, as long as there is such a robust clique sunflower, interleaved with removing all sets Aj, s.t. AiAj for some Ai. The trimc(A) will be a circuit obtained from A by removing all sets |Ai|>c.

Finally, we will choose the inner compression function (used in Definition 20) as

τ(A):=trimc(clp,ε(A)).

We say that a circuit A is (p,ε)-closed, if there are no (p,ε)-robust sunflowrers among the sets A1,Am. The bound on the number of sets Aj of a given size for an (p,ε)-closed circuit is a direct consequence of the definition of a closed circuit and the RCB numbers.

Fact 21.

The number l(A) of clique indicators Ai of size l of in a (p,ϵ)-closed circuit A is bounded by

l(A)<RCB(,p,ε).

2.4 The lower bound

A crucial property that we will exploit both in the analysis of the approximator as well as in the construction of an explicit algorithm solving 𝒟(𝒯α,𝒯β+) is that the positive test distribution 𝒯β+ is “well-spread” in a sense that it is unlikely for a large clique-indicator to accept many instances of 𝒯β+.

Lemma 22.

For a clique KB with |B|=,

𝔼G𝒯β+[𝒦B(G)]<(β/n).
Proof.

A graph G, sampled from G𝒯β+ is an isolated β-clique A on n vertices. Thus KB(G)=1 if and only if BA such that

PrG𝒯β+[𝒦B(G)=1]=PrKA(nβ)[BA]=(nββ)(nβ)(β/n).

This lemma, together with a bound on the number of clique indicators of each size (Fact 21), allows us to easily show that any 𝒫-simple circuit cannot distinguish 𝒯α+ from 𝒯β – either a circuit like that trivially accepts every output (and hence makes a large error on the negative distribution), or it accepts only small fraction of inputs from the positive distribution.

Lemma 23.

If C^1 is an approximator obtained by the compression function 𝒫, then

𝔼G𝒯β+[C^(G)]l=2c(β/n)lRCB(l,ϵ,p).
Proof.

The proof is a simple application of a union bound. If G𝒯β+ and C^(G)=1, then there must exist some term 𝒦Ai of C^ with KAiG. By Fact 21 there are at most l(f) terms of size l (for all lc) and by Lemma 22 for every term of size l the probability that it accepts a positive instance is at most (β/n)l. Thus

PrG𝒯β+[C^(G)=1]l=2c(β/n)ll(f)l=2c(β/n)lRCB(l,ϵ,p).

Single-step Approximation Errors

We give bounds on the single-step approximation errors ζ+ and ζ, induced by 𝒫.

Lemma 24.

The single-step error introduced on the positive distribution is bounded as follows

ζ𝒫+l=c2c(β/n)lRCB(l,ϵ,p).
Proof.

If we have for some G𝒯β+ that C(G)=1 but τ(C)(G)=0, then there was some term 𝒦Ai of clp,ε(C) of size larger than c with 𝒦A(G)=1, which was discarded during the trimming process.

We can union bound the probability of this happening, in a similar way as Lemma 23, using the upper bound M(clp,ε(C))RCB(,p,ε) (Fact 21) on the number of terms of a given size , and the upper bound on the probability that a given term of size accepts the positive distribution (Lemma 22).

We also notice that for a fixed closure factor, the negative approximation error is bounded by the probability bound given by the robust clique-sunflower.

Lemma 25.

The single-step error introduced on the negative distribution is bounded as

ζ𝒫ϵn2c.
Proof.

Note that while applying clp,ε(A) operation, each set S[n] of size at most 2c can be added as a core of some robust clique sunflower at most once, as the core is always a strict subset of the sunflower indicators. Hence, we will repeat the process of replacing a robust sunflower by its core at most n2c times, in each step introducing error at most ε on the negative distribution (by the definition of robust clique sunflower).

Complexity

By the results of the last sections, we can proceed to prove a quantified condition on the existence of a monotone circuit lower complexity bound on 𝒟(𝒯β+,𝒯α), depending on the robust-clique sunflower bound RCB(l,ϵ,p). The proof will follow by a simple application of Lemma 18 together with bounds on the error introduced in each step of the process, established in the previous section. We recall the statement of the theorem from Section 1.4.

Theorem 14. [Restated, see original statement.]

Fix some cn and take p:=n2α1. If for every 2c, we have

(β/n)RCB(,p,ε)1/γo(1)

then the size of any monotone circuit C distinguishing 𝒯α and 𝒯β+ satisfies

size(C)Ω(min{γc,n2c/ε}).

In particular, choosing ε=n4c, if for all 2c we have

(β/n)RCB(,p,n4c)1/<nδ

then the monotone complexity of distinguishing 𝒯α and 𝒯β+ is Ω(nδc).

Proof.

This statement follows directly from Lemma 18. First, note that by Lemma 23 any 𝒫-simple circuit either accepts all negative instances or accepts a positive instance with probability

2c(β/n)RCB(,p,ε)2cγO(γ2)o(1).

hence a 𝒫-simple circuit cannot distinguish it 𝒯α from 𝒯β+.

The error ζ𝒫εn2c was shown as Lemma 25. For the ζ𝒫+ we can use Lemma 24, to obtain a bound

ζ𝒫+=c+12c(β/n)RCB(,p,ε)=c+1γO(γc).

With those two bounds, we can now directly apply Lemma 18 to deduce the first part of the theorem. The second part follows by choosing ε:=n4c, γ:=nδ, and simple algebraic manipulations.

We can now deduce Theorem 3 directly from this more general statement and the new upper bound on the RCB (Corollary 13).

Proof of Theorem 3.

By Corollary 13, taking ε=n4c, for 2c we have

RCB(,p,ε)1/p(log(1/ε)+log)n4cα1clogn,

hence if we pick c:=δ(α1)/8, we will have

βRCB(,p,ε)1/αβnδ/2logn.

Now, when αβn1δ/logn, this yields

βRCB(,p,ε)1/n1δ/2,

and finally, applying Theorem 14, we get a lower bound of form

Ω(nδc/2)Ω(nδ2α/16)nΩ(δ2α).

3 Robust clique numbers are upper bounded by robust sunflower numbers

In this section, we will show a reduction, proving that any robust sunflower bound implies a corresponding robust-clique-sunflower bound with slightly different parameters. For our convenience, let us recall the statement of the theorem.

Theorem 12. [Restated, see original statement.]

For any 1, p(0,1) and ε(0,1) we have

RCB(,p,ε)RB(,p,ε/2),

where RCB(,p,ε) and RB(,p,ε) are defined as in Definition 8.

The main technical lemma towards Theorem 12 is a comparison principle for a concrete pair of stochastic processes. The proof of this result has been inspired by [21]. Before we state the comparison lemma, let us provide a necessary definition.

Definition 26.

We say that ϕ:([n]k)([n]×[n]k) is a proper lifting if for every iS, we have |ϕ(S)({i}×[n])|=.

Note that since the image of any set under the proper lifting has exactly k elements, and it has exactly elements in each of the k rows corresponding to elements of S, we have for every iS, that ϕ(S)({i}×[n])=. The canonical examples of proper liftings to have in mind are ϕ(S):=S×S or ϕ(S):=S×[], although we will need a slightly more complicated one in the proof of Theorem 12.

The following comparison lemma shows that among the specific class of the stochastic processes associated with a lifting ϕ, the smallest process is associated with the lifting ϕ(S)=S×[].

Lemma 27.

Let be a k-uniform family of subsets of [n], and random variables {Ai,j}i[n],j[],{A~i,j}i,j[n] be independent and identically distributed.

If ϕ is any proper lifting (as in Definition 26), then

𝔼supS(i,j)S×[]Ai,j𝔼supS(i,j)ϕ(S)A~i,j. (4)

We will prove this lemma later in Section 3.1. Before we do, let us see how it implies Theorem 12. More concretely, we will show that every (p,ε/2)-robust sunflower is also an (p,ε)-robust clique sunflower, and Theorem 12 will be a direct corollary.

It is easier to gain the intuition of how to prove a statement of this form from Lemma 27 if we consider a special case of a robust sunflower 𝒮 with an empty core C – in this case, we would apply Lemma 27 with proper lifting ϕ(S):=S×S, and Ai,j being independent {0,1} valued random variables with 𝔼Ai,j=p. The i-th row of a matrix A has a sum equal to independently with probability p. Therefore, by the robust sunflower definition, with high probability there exists a square of form S×[] with sum 2 – this implies that the expected supremum over sums over S×[] as in the left-hand side of (4) is very close to 2, and hence also expected supremum over all sums over S×S for S (by the aforementioned lemma). We can deduce that with high probability there is a square S×S in the matrix A~ with sum 2 – a statement corresponding to the fact that some clique KS is covered by a random 𝒢n,p graph.

The handling of the more general case, where the core C is not necessarily empty, is only slightly more technical.

Lemma 28.

If -uniform family 𝒮2[n] is a (p,ε/2)-robust sunflower, it is also a (p,ε)-robust clique sunflower.

Proof.

Consider a matrix A{0,1}n×, and A~{0,1}n×n, with independent entries, each equal to 1 with probability p. We can treat the part of the matrix A~ below the diagonal (i.e., A~i,j for j<i) as determining the adjacency matrix for a random graph G (sampled according to the Erdős–Rényi distribution 𝒢n,p).

Let us assume without loss of generality that C=[k] for some k. We can look at a k-uniform family 𝒮:={SC:S𝒮}. Consider also the set W of all indices such that the corresponding row in the matrix A is all-one: W:={i:jAi,j=}. Note that each element in W is included independently with probability p. Since 𝒮 is a robust sunflower with the core C, directly by definition of robust sunflower with probability at least 1ε, there is a set S𝒮 covered by W, i.e.

i,jS×[]Aij=k.

This means that with probability 1ε/21ε/(k), the value of

supS𝒮i,jS×[]Aij=k,

and therefore

𝔼supi,jS×[]Aij(1ε/k)k=kε.

We will now apply Lemma 27 to a family 𝒮 together with a lifting function ϕ(S):=S×([k]S) to deduce

𝔼supS𝒮i,jϕ(S)A~ijkε. (5)

On the other hand, denoting by 1p0 the probability that there exists S𝒮, s.t. all entries of A~ij over (i,j)ϕ(S) are 1 we have

𝔼supS𝒮i,jϕ(S)A~ij(1p0)k+p0(k1)=kp0, (6)

and combining (5) and (6), we get p0ε.

Finally, as discussed above, if we consider a graph G on [n], where the edge {i,j}G for j<i if A~i,j=1, this graph has exactly the distribution of 𝒢n,p. Moreover, when there exists S𝒮, s.t. all entries A~i,j=1 for iS,jSC, then, in particular, the clique KSC is contained in the graph GKC. Indeed, all edges within C are already contained in KC, and A~i,j=1 for iS,jSC implies that all edges between S and SC are present in G (since C consists of the first |C| elements of [n]).

The probability of this happening is 1p01ε, as desired, finishing the proof that 𝒮 is indeed a robust-clique-sunflower.

Proof of Theorem 12.

This theorem follows as a direct corollary of Lemma 28 and relevant definitions.

Indeed, every -uniform family of size at least RB(p,ε/2) contains a (p,ε/2)-robust sunflower, which by Lemma 28 is (p,ε)-robust clique sunflower.

3.1 Proof of Lemma 27

We will prove this statement by induction. Specifically, let us define Bt:=[t]×[n], and B¯t:=([n][t])×[n] (so that BtB¯t forms a partition of [n]×[n] into the first t rows, and the remaining nt rows).

Take ϕt:([n]k)([n]×[n]k) defined as ϕt(S):=((S×[])Bt)(ϕ(S)B¯t) – i.e. on the first t rows ϕt agrees with S×[], and on the remaining nt rows it agrees with ϕ(S). Note that ϕt(S) has always k elements, and moreover ϕ0(S)=S×[l], and ϕn(S)=ϕ(S). As such, it is enough to show that for any t we have

𝔼supS(i,j)ϕt+1(S)A~i,j𝔼supS(i,j)ϕt(S)Ai,j, (7)

where {Aij} and {A~ij} are two collections of independent and identically distributed random variables (with the same distribution).

In order to prove this statement, we will consider a coupling where Ai,j=A~i,j for all it+1. Let us now condition on all variables Ai,j for it+1 – we will show that for a fixed values of all those other variables, the desired inequality between expectation still holds, where expectation is only taken over the variables At+1,j,A~t+1,j.

Concretely, for any given S, we can decompose:

(i,j)ϕt(S)Ai,j=(i,j)ϕt(S),it+1Ai,j+j:(t+1,j)ϕt(S)At+1,j,

and similarly for ϕt. Note that when it+1 the pair (i,j)ϕt(S) if and only if (i,j)ϕt+1(S), so if we denote

a(S):=(i,j)ϕt(S)it+1Ai,j,

and by p0(S):={j:(t+1,j)ϕt(S)}, and similarly p1(S):={j:(t+1,j)ϕt+1(S)}, we have

(i,j)ϕt(S)Ai,j=a(S)+jp0(S)At+1,j,

and

(i,j)ϕt+1(S)A~i,j=a(S)+jp1(S)A~t+1,j,

since A~i,j=Ai,j for it+1.

Finally, notice that if tS, |p0(S)|= and p1(S)=[], whereas if tS, we have p0(S)=p1(S)=. To finish the induction, we only need to show the following claim.

Claim 29.

Consider a finite sequence of pairs (S1,a1),(S2,a2),(Sm,am), where Si[n], ai and |Si| is either or 0.

Let 𝒟 be a distribution over , and let A1,An and A~1,A~n be two sequences of independent random variables distributed according to 𝒟. Moreover, let b0=max{ai:Si=} and b1=max{ai:Si}. Then

𝔼supim(ai+jSiAj)𝔼max(b1+i[]A~i,b0).
Proof.

If all sets Si are empty, the statement is trivial. Let i0 be an index s.t. Si0= and ai0=b0, and similarly let i1 be an index such that Si1, and ai1=b1. Consider any permutation π:[n][n], s.t. π(Si1)=[]. We can extend the sequence A~i to n variables {A~i}in, and consider a coupling between A and A~, given by Ai:=A~π(i). Clearly, under this coupling, both marginal distributions of {Ai}in and {A~i}i are the right ones, all we need to show is that for any given realization of the joint process we have

supim(ai+jSiAj)max(b1+ilA~i,b0).

Indeed, by construction, we have

supim(ai+jSiAj) =supim(ai+jSiA~π(j))
supi{i0,i1}(ai+jSiA~π(j))=max(b1+ilA~i,b0).

This lemma completes the proof of the inequality (7), and we can conclude the proof of Lemma 27, by chaining the inequalities (7) across all t, since ϕ0(S)=ϕ(S) and ϕn(S)=S×[].

4 The upper bound

We now turn towards the upper monotone complexity bound for 𝒟(𝒯α,𝒯β+) where we will construct an explicit circuit 𝒞 for distinguishing 𝒯β+ and 𝒯α.

A useful subroutine that can be implemented using monotone boolean circuits is the ability to “sort” the input in polynomial size, as a sorting network on a boolean input can be easily used to construct a monotone boolean sorting circuit. 333For this, note that a sorting network essentially is a sequence of binary operations on the input, swapping two inputs if they are out of order. A swap of two booleans x, y can be trivially implemented by an AND=min{x,y} and an OR=max{x,y} gate. This also implies that monotone circuits can implement the threshold function Tτ, which accepts the input if there are at least τ input variables set to 1, simply wiring the output to the τ-th output of the sorting network.

In order to distinguish Tα and Tβ+, we will take a random family of subsets of size l, and accept the graph if the number of covered clique indicators on those subsets exceeds some threshold τ – by wiring the outputs of clique indicators to the inputs of the threshold function Tτ.

Probabilities of including a random clique in 𝓣𝜷+ and 𝓣𝜶

𝒯β+ and 𝒯α have an important distinctive property that we will use for constructing 𝒞n.

Lemma 30.

For a clique indicator 𝒦A with |A|=l, the probability of clique inclusion is

PrG𝒯β+[𝒦A(G)=1]=(β/n)l

and

PrG𝒯α[𝒦A(G)=1]=p(l2)=(n2/α1)(l2)
Proof.

The first equation has already been proven in Lemma 22. The second equation follows trivially from the definition of 𝒢n,p – each of the (l2) edges of A is present in G independently with probability p.

The interesting property is that, for the right choice of parameters, the “clique-probability” KA is noticeably larger on 𝒯β+ than on 𝒯α. Take, for instance p:=PrG𝒯α(𝒦A(G)=1) and q:=PrG𝒯β+(𝒦A(G)=1), if we can pick the size of the clique l such that q>10p, we will be able to construct a circuit of size Ω(1/q) that accepts 𝒯β+ and rejects 𝒯α, by looking at randomly placed m=Ω(1/q) clique indicators, accepting the input if at least 9mp of those clique indicators are accepting on G.

An explicit circuit

The probabilistic 444 We construct an explicit probabilistic circuit here. However, the easy direction in the Yaos Principle [24] also directly implies a deterministic upper bound for the distributional problem. monotone circuit 𝒞n for an n-boolean input is defined by the following construction. For parameters m,l,τ

  1. 1.

    Choose m l-element subsets A1,,Am[n] independent uniformly at random and connect the associated clique indicators KA1,,KAm to the input.

  2. 2.

    Connect the output of the clique indicators to the threshold function Tτm.

  3. 3.

    Connect the output of Tτm to the output of 𝒞n.

The size of the entire circuit like that is O(mlogm). We would like to see how to chose m and l in order for the circuit to reject 𝒯α and accept 𝒯β+ with probability 3/4.

We will use the following well-known fact to analyze the above circuit construction.

Fact 31.

Let X1,Xm be Bernoulli random variables with 𝔼Xip (not necessarily independent). Then 𝔼Xipm, and by Markov Inequality, Pr(Xi>4pm)1/4.

On the other hand, if X1,Xm are independent Bernoulli random variables with 𝔼Xi5p, then as soon as m1/pδ, the Chebyshev inequality implies Pr(Xi4pm)O(δ2).

We will use Xi to be a clique indicator on random l vertices under the distribution 𝒯α, and Xi to be a clique indicator on random l vertices under 𝒯β+.

In what follows, we will discuss how to choose l in a way such that indeed 𝔼Xi5𝔼Xi, and take δ as a small constant to obtain a circuit distinguishing 𝒯α from 𝒯β+. For random variables Xi (defined as clique indicators on the negative distribution), we use only the Markov inequality, and we do not need to worry about the correlations between them.

Let us quickly discuss that indeed, on the positive distribution, the random variables Xi and Xj are indeed independent – that is the case since conditioned on any specific realization G of 𝒯β+ – i.e. G being a clique on random β vertices, the random variables Xi and Xj for ij are independent (since they are clique indicators on subsets of size l chosen independently at random), and have 𝔼[Xi|G]=𝔼[Xi] – the position of the original β vertices in a clique does not affect the probability that a random l vertices are the subset of those β vertices.

This fact gives a bound on the number of clique indicators needed to differentiate the graph distributions when the individual clique probabilities are sufficiently far apart.

Circuit Analysis

All we need to do now is to choose the parameter l in such a way that q5p, where p:=𝔼G𝒯α𝒦A(G) and q:=𝔼G𝒯+β𝒦A(G). The resulting circuit size will be of order O(1/q).

Proof of Theorem 4.

We consider circuit Cn constructed as discussed above, with the threshold τ:=9(β/n)l.

According to Lemma 30 and Fact 31 in order to make sure that the circuit indeed rejects 𝒯α and accepts 𝒯β+ for given αβ, we would like to pick the smallest l such that

(β/n)l5(n2α1)l2

leading to a circuit of size O((n2α1)l2). After a sequence of simple algebraic manipulations and taking

γ:=α12log(n/β)logn,

this condition is implied by

lγ+C/γ

for some universal constant C, since in this case we have l2γ2+2C. Taking l:=γ+C/γ, and observing that by assumption we have

log(n/β)lognδ

we obtain the circuit size

size(Cn)O(n2l2α1)O(n2γ2α1)O(nαδ2/2).

References

  • [1] N. Alon and R. B. Boppana. The monotone circuit complexity of boolean functions. Combinatorica 7, 1987.
  • [2] Ryan Alweiss, Shachar Lovett, Kewen Wu, and Jiapeng Zhang. Improved bounds for the sunflower lemma. Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, 2020.
  • [3] Aleksandr Egorovich Andreev. A method for obtaining lower bounds on the complexity of individual monotone functions. In Doklady Akademii Nauk, volume 282(5), pages 1033–1037. Russian Academy of Sciences, 1985.
  • [4] Alexander E Andreev. A method for obtaining efficient lower bounds for monotone complexity. Algebra and Logic, 26(1):1–18, 1987.
  • [5] Tolson Bell, Suchakree Chueluecha, and Lutz Warnke. Note on sunflowers. Discrete Mathematics, 344(7):112367, 2021. doi:10.1016/j.disc.2021.112367.
  • [6] Bruno Cavalar. Sunflower theorems in monotone circuit complexity. In Anais do XXXIV Concurso de Teses e Dissertações, pages 73–78, Porto Alegre, RS, Brasil, 2021. SBC. doi:10.5753/ctd.2021.15761.
  • [7] Bruno P. Cavalar and Igor C. Oliveira. Constant-depth circuits vs. monotone circuits. In Proceedings of the Conference on Proceedings of the 38th Computational Complexity Conference, CCC ’23, Dagstuhl, DEU, 2023. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.CCC.2023.29.
  • [8] Bruno Pasqualotto Cavalar, Mrinal Kumar, and Benjamin Rossman. Monotone circuit lower bounds from robust sunflowers. Algorithmica, 84(12):3655–3685, 2022. doi:10.1007/S00453-022-01000-3.
  • [9] Susanna de Rezende and Marc Vinyals. Lifting with colorful sunflowers. Unpublished manuscript, 2025.
  • [10] Paul Erdős and Richard Rado. Intersection theorems for systems of sets. Journal of the London Mathematical Society, 1960.
  • [11] Ankit Garg, Mika Göös, Pritish Kamath, and Dmitry Sokolov. Monotone circuit lower bounds from resolution. In Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, pages 902–911, 2018. doi:10.1145/3188745.3188838.
  • [12] Mika Göös, Pritish Kamath, Robert Robere, and Dmitry Sokolov. Adventures in monotone complexity and TFNP. In 10th Innovations in Theoretical Computer Science Conference (ITCS 2019), pages 38:1–38:19. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2019.
  • [13] Danny Harnik and Ran Raz. Higher lower bounds on monotone size. In Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, STOC ’00, pages 378–387, New York, NY, USA, 2000. Association for Computing Machinery. doi:10.1145/335305.335349.
  • [14] Lunjia Hu, 2021. URL: https://theorydish.blog/2021/05/19/entropy-estimation-via-
    two-chains-streamlining-the-proof-of-the-sunflower-lemma/
    .
  • [15] Stasys Jukna. Combinatorics of monotone computations. Combinatorica, 19(1):65–85, 1999. doi:10.1007/S004930050046.
  • [16] Stasys Jukna et al. Boolean function complexity: advances and frontiers, volume 27. Springer, 2012. doi:10.1007/978-3-642-24508-4.
  • [17] Anup Rao. Coding for Sunflowers. Discrete Analysis, February 2020. doi:10.19086/da.11887.
  • [18] Anup Rao. Sunflowers: from soil to oil. Bulletin of the American Mathematical Society, 60(1):29–38, 2023.
  • [19] Alexander Razborov. Lower bounds on the monotone complexity of some boolean function. In Soviet Math. Dokl., volume 31, pages 354–357, 1985.
  • [20] Benjamin Rossman. The monotone complexity of k-clique on random graphs. In 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, pages 193–201, 2010. doi:10.1109/FOCS.2010.26.
  • [21] Michel Talagrand. Regularity of Infinitely Divisible Processes. The Annals of Probability, 21(1):362–432, 1993. doi:10.1214/aop/1176989409.
  • [22] Michel Talagrand. Upper and lower bounds for stochastic processes, volume 60. Springer, 2014.
  • [23] Terrence Tao, 2020. URL: https://terrytao.wordpress.com/2020/07/20/the-sunflower-
    lemma-via-shannon-entropy/
    .
  • [24] Andrew Chi-Chin Yao. Probabilistic computations: Toward a unified measure of complexity. In 18th Annual Symposium on Foundations of Computer Science (sfcs 1977), pages 222–227. IEEE Computer Society, 1977.