Amortized Closure and Its Applications in Lifting for Resolution over Parities
Abstract
The notion of closure of a set of linear forms, first introduced by Efremenko, Garlik, and Itsykson [14], has proven instrumental in proving lower bounds on the sizes of regular and bounded-depth refutations [14, 3]. In this work, we present amortized closure, an enhancement that retains the properties of original closure [14] but offers tighter control on its growth. Specifically, adding a new linear form increases the amortized closure by at most one. We explore two applications that highlight the power of this new concept.
Utilizing our newly defined amortized closure, we extend and provide a succinct and elegant proof of the recent lifting theorem by Chattopadhyay and Dvorak [10]. Namely we show that for an unsatisfiable CNF formula and a 1-stifling gadget , if the lifted formula has a tree-like refutation of size and width , then has a resolution refutation of depth and width . The original theorem by Chattopadhyay and Dvorak [10] applies only to the more restrictive class of strongly stifling gadgets.
As a more significant application of amortized closure, we show improved lower bounds for bounded-depth , extending the depth beyond that of Alekseev and Itsykson [3]. Our result establishes an exponential lower bound for depth- refutations of lifted Tseitin formulas, a notable improvement over the existing depth- lower bound.
Keywords and phrases:
lifting, resolution over parities, closure of linear forms, lower bounds, width, depth, size vs depth tradeoffCopyright and License:
2012 ACM Subject Classification:
Theory of computation Proof complexityAcknowledgements:
The authors thank Yaroslav Alekseev and Alexander Knop for fruitful discussions.Funding:
Supported by European Research Council Grant No. 949707.Editors:
Srikanth SrinivasanSeries and Publisher:
Leibniz International Proceedings in Informatics, Schloss Dagstuhl – Leibniz-Zentrum für Informatik
1 Introduction
Propositional proof complexity investigates proof systems for the language of unsatisfiable CNF formulas, denoted as . The fundamental question of whether the complexity classes and are distinct is equivalent to asking whether there exists a proof system that can provide polynomial-size proofs for all formulas in [12]. A central focus in proof complexity is establishing superpolynomial lower bounds on proof sizes for specific proof systems; a direction often referred to as Cook’s program, which aims to separate and .
While many exponential-size lower bounds are known for weak proof systems, we lack superpolynomial lower bounds for Frege systems, which include standard propositional proof systems from logic textbooks. A Frege derivation is a sequence of Boolean formulas; each of them is either an axiom or is obtained from the previous by a set of sound and implicationally complete inference rules. Proving Frege lower bounds is often compared to proving Boolean formula/circuit lower bounds for explicit Boolean functions, and both seem intractable. However, progress has been made in restricted settings. An exponential lower bound for constant-depth circuits computing parity was proven in the 1980s [16, 1]. Ajtai later used a similar approach to prove a superpolynomial lower bound for bounded-depth Frege systems [2]. Razborov and Smolenski proved lower bounds for constant-depth circuits with , , , and gates in 1987 [23, 21]. The analogous problem of proving a lower bound for constant-depth Frege systems using , , and gates (denoted ) is open for all .
This paper is devoted to the study of the propositional proof system resolution over parities () [19], which is a subsystem of . This system extends resolution by incorporating linear algebra over . The proof lines in this proof system are linear clauses, disjunctions of -linear equations; or, equivalently, linear clauses can be treated as negations of -linear systems. A refutation of an unsatisfiable CNF formula is a sequence of linear clauses such that the last linear clause in this sequence is an empty clause (i.e., constant false), and every other linear clause is obtained from the previous clauses by the resolution rule or by the weakening rule. The resolution rule allows resolve by a linear form, i.e. allows to derive from and . The weakening rule allows the deriving of any linear clause that semantically follows from the given. Establishing superpolynomial lower bounds on the size of refutations remains a significant open challenge, representing a crucial step toward proving lower bounds for the more general proof system .
1.1 Lifting
Lifting is a highly effective technique for establishing lower bounds by transferring them from weaker to stronger computational models. Recent developments in lifting for fragments of offer promising avenues toward proving a superpolynomial lower bound for general . The most relevant lifting results pertaining to are briefly described below.
Chattopadhyay, Mande, Sanyal, and Sherif [11] developed a universal lifting technique for parity decision trees via -stifling gadgets, which are characterized by the following property: a gadget is -stifling if, for any index and any target bit , there exists an assignment such that any agreeing with on all but th position yields . Their result demonstrates that if a function (or relation) requires query complexity , then for any -stifling gadget , the lifted function (or relation) requires parity decision trees of size at least . In the proof complexity settings, this result implies that if a formula requires resolution depth , then for any -stifling gadget , the lifted formula requires tree-like size at least [11]. Independently, Beame and Koroth [5] obtained similar results. Recently, Podolskii and Shekhovostov [20] and Byramji and Impagliazzo [9] extended the results of [11] to randomized parity decision trees.
Two notions of regular – top-regular and bottom-regular – are defined analogously to regular resolution, inheriting its key restrictions [14]. Both variants are strictly more powerful than tree-like . Efremenko, Garlik, and Itsykson [14] established exponential lower bounds on the size of bottom-regular refutations. Later, Bhattacharya, Chattopadhyay, and Dvorak [7] applied lifting techniques to show that bottom-regular does not simulate classical resolution. Subsequently, Alekseev and Itsykson [3] introduced a more general lifting method that transforms formulas with large resolution depth into ones requiring exponential-size bottom-regular refutations.
Alekseev and Itsykson [3] applied their lifting technique to establish the first size lower bounds that apply to general , presenting a strong size–depth tradeoff: any refutation of the lifted Tseitin formula must either have exponential size or depth at least , where is the number of variables. This result subsumes lower bounds for both bottom-regular and top-regular .
The lifting techniques of Bhattacharya, Chattopadhyay, and Dvorak [7] and Alekseev and Itsykson [3] rely heavily on the concept of closure of a set of linear forms in lifted variables, initially defined by Efremenko, Garlik, and Itsykson [14]. The closure captures the most essential unlifted variables for these linear forms. Based on this, Alekseev and Itsykson [3] developed a game-based lifting technique, which they demonstrated by the following simple and elegant example:
Theorem 1 ([3]).
If a CNF formula requires resolution width , then for every -stifling gadget , the formula requires width .
The proof of Theorem 1 proceeds by an explicit transformation of strategies, converting winning strategies from Atserias and Dalmau’s [4] resolution-width games into winning strategies for games characterizing the width [18].
Chattopadhyay and Dvorak [10] recently established the following lifting theorem.
Theorem 2 ([10]).
If every resolution refutation of a CNF formula of width at most requires depth at least , then for every strongly stifling gadget , any tree-like refutation of the formula of width at most has size at least .
Chattopadhyay and Dvorak [10] uncovered a striking application of this theorem: a supercritical tradeoff for tree-like refutations. This shows that a slight narrowing of width can force a double exponential blow-up in refutation size. Specifically, for a sufficiently small width, the tree-like refutation size can exceed its worst-case upper bound observed in the unrestricted case. This tradeoff is obtained by a straightforward application of Theorem 2 alongside Razborov’s corresponding tree-like resolution result [22].
Strongly stifling gadgets constitute a more restricted class compared to -stifling gadgets, meaning that Theorem 2 extends Theorem 1 and the results of [11] but only for this smaller class of gadgets. Establishing Theorem 2 requires a technically demanding proof, primarily due to the explicit transformation that directly converts a tree-like refutation of the lifted formula into a tree-like resolution refutation of the base formula. The proof of Theorem 2 largely mirrors the approach outlined in [11]. However, in the case of bounded width, Chattopadhyay and Dvorak diverge by utilizing forgetting parity decision trees instead of standard parity decision trees. These forgetting trees incorporate forgetting nodes that correspond to weakening rules. The most challenging aspect involves handling these forgetting nodes, for which the authors restrict themselves to strongly stifling gadgets to facilitate the analysis.
1.2 Our contributions
In this work, we contribute to the lifting technique. Namely, we develop the notion of amortized closure of a set of linear forms. This new concept retains all the desirable properties of plain closure but additionally guarantees that the amortized closure increases by at most one when a single linear form is added to the set. The construction of this amortized closure and the proof of its properties (Theorem 7) constitute the main technical contribution of our work. We give two nice applications to demonstrate this new concept’s power. We believe amortized closure is of independent interest and will find further applications in lifting theorems in proof complexity and Boolean complexity.
As a first application, we prove the following theorem, which extends Theorem 2 to the entire class of 1-stifling gadgets, thereby also generalizing Theorem 1 and the mentioned result from [11].
Theorem 3 (Theorem 37).
Let be an unsatisfiable CNF formula and be a 1-stiffling gadget. Assume that has a tree-like refutation of width and size . Then has a resolution refutation of width and depth .
We present a concise and elegant proof of Theorem 3, adapting Alekseev and Itsykson’s game approach [3] from Theorem 1 to amortized closure.
As a second and more significant application, we improve depth in the lower bound for bounded-depth refutations established by Alekseev and Itsykson [3]. Specifically, the following theorem implies an exponential lower bound for depth- refutations of lifted Tseitin formulas, where is the number of variables and is a constant.
Theorem 4 (Informal restatement of Corollary 43).
Let be an unsatisfiable Tseitin formula based on a -regular expander with vertices lifted by the 5-input majority gadget. Then, is a CNF formula with variables and size such that any refutation of has either size at least or depth at least .
Although the first application is less significant, we present it first in the introduction as it offers a clear and natural motivation for introducing the concept of amortized closure. Namely, we begin by detailing the game-based approach of Alekseev and Itsykson [3], and then we explain why its direct application fails to establish Theorem 3, emphasizing the necessity of our amortized closure. Then, we present our main contribution, the amortized closure construction, and detail its essential properties. We conclude with the second application: we demonstrate how amortized closure helps to obtain an exponential lower bound for bounded-depth refutations for larger depths.
1.2.1 Bounded-width lifting
Here we present the proof idea of Theorem 3. We are going to apply the game approach that was used by Alekseev and Itsykson in the proof of Theorem 1. We start with definitions of some basic notions: lifting and closure.
Let be an unsatisfiable CNF. We call the set of variables unlifted. Let be an 1-stifling gadget. The lifted formula depends of variables , called lifted variables. The formula represents in CNF the result of the substitution .
Safe sets and closure
Consider the set of -linear forms in lifted variables and consider their coefficient matrix . The columns of can be splitted on blocks, where the th block corresponds to variables with first index . The set of linear forms is safe [14] if, among the columns of , one can find a basis that includes at most one column for each block. A crucial observation is that if a set of linear forms is safe, then any satisfiable linear system formed using the linear forms in for any assignment of the unlifted variables admits a solution that respects the assignment on the unlifted variables [7, 3]. Indeed, values of variables whose columns are not in the basis can be chosen arbitrarily. Since the gadget is 1-stifling, we can fix its value regardless of the value of the remaining basis variables.
However, is not necessary to be safe. A closure of is an inclusion-minimal set of blocks such that if we set zeros to all variables from these blocks, the set becomes safe. For the coefficient matrix, this operation corresponds to the removal of columns corresponding to these blocks. We will identify the closure with the corresponding set of unlifted variables. Bhattacharya, Chattopadhyay, and Dvorak noted that the closure contains all essential unlifted variables in the following sense: given a solution of a linear system in lifted variables, for any unlifted variable that lies outside a closure of the set of linear forms in , there exists another solution of such that the assignments induced by and on the unlifted variables differ precisely in the value assigned to .
The following properties of closure were proved by Efremeko, Garlik, and Itsykson [14].
-
(Uniqueness) Closure of the set of linear forms is unique, and it is denoted by ;
-
(Monotonicity) If , then ;
-
(Span invariance) If , then ;
-
(Size bound) .
Using the notion of closure, Alekseev and Itsykson [3] define the correspondence between linear systems over lifted variables and partial assignments for unlifted variables as follows:
-
A system of linear equations over lifted variables corresponds a partial assignment to unlifted variables if is defined on and has a solution such that induces on the unlifted variables an assignment that is consistent with , where denotes the system of linear forms that occur in . We also say that defines the correspondence between and .
This correspondence is not one-to-one; it is possible that one linear system corresponds to several partial assignments and vice versa.
An important property of this correspondence is that if corresponds and does not falsify any clause of , then does not contradict any clause of .
This correspondence is in the heart of the proof of Theorem 1 since it allows the transformation of a strategy in the game characterizing resolution width of to a strategy in the game characterizing width of .
Let us try to apply this approach directly to the following proposition.
Proposition 5.
If any resolution refutation of of width has depth at least , then for any 1-stifling gadget , any refutation of the formula of width has depth at least .
Proposition 5 is weaker than Theorem 3 since it says about depth instead of tree-like size. However, in this example, we highlight the problem, explain why the approach described above can not be applied directly, and identify the missing property of closure.
We proceed with the definition of games characterizing depth in bounded-width resolution and bounded-width .
A -game for resolution
Consider the following game based on an unsatisfiable CNF formula and a natural parameter . The game has two players: Prover and Adversary. Players save a partial assignment that is initially empty. For every move, Prover can either remove some value from or, if , Prover can choose a variable and ask Adversary for its value. Adversary chooses and extends the current assignment by . For every move, Adversary earns a coin. The game ends when falsifies a clause of . It is known that Adversary has a strategy in the -game that guarantees him to earn at least coins if and only if any resolution refutation of within width has depth at least [6].
A -game for
Consider an extension of the previous game. This game is also based on a CNF formula and a natural parameter . Now, the players, Prover and Adversary, save a linear system in variables of that is initially empty (i.e. constant true). On every move, Prover can either replace on its semantical implication or, if the rank of is less than , Prover can choose a linear form and ask Adversary for its value. Adversary chooses and adds the equation to . Adversary earns a coin for every move. The game ends when contradicts a clause of . Similarly, one can show Adversary has a strategy in the game that guarantees him to earn at least coins if and only if any refutation of within width has depth at least .
Let us try to prove Proposition 5 using these games. Since any resolution refutation of of width at most requires depth at least , there is an Adversary’s strategy in the first -game that guarantees him to earn at least coins. Using this strategy, we try to construct an Adversary’s strategy in the second -game that will also guarantee the Adversary to earn at least coins. It will imply that any refutation of within width requires depth at least .
We will describe an Adversary’s strategy in the second -game using the known Adversary’s strategy in the first -game. Describing Adversary’s strategy in the second game, we play in parallel in the first game, making moves instead of Prover and using the Adversary’s strategy in the first game. We maintain the following invariant: the current system in the second game corresponds to the current partial assignment in the first game. While this invariant holds, if does not falsify any clause of , then does not contradict any clause of .
If Prover in the second game changes to its semantical corollary , then playing for the Prover in the first game, we restrict to in the first game. Notice that since semantically follows from , , hence .
If Prover in the second game asks the value of a linear form , we consider two cases.
-
First case: . Let be the solution of that defines the correspondence between and . Adversary chooses the value and does nothing in the first game. It is easy to see that also defines the correspondence between and ; hence, the invariant still holds.
-
Second case: . In this case, we, playing by Prover in the first game, prolong to variables from (recall that we identify elements of closure with unlifted variables) by asking them one by one. Since we extend to variables out of , for the new value of , there is a solution of such that induces an assignment on unlifted variables consistent with . Adversary chooses the value . Now defines the correspondence between and ; hence, the invariant still holds.
Unfortunately, this strategy does not allow us to estimate the number of coins that the Adversary earns in the second game. The problem is that the closure can increase significantly in one step. At this moment, we have spent many coins in the first game while earning only one coin in the second one. Theoretically, it is possible, for example, that on each odd step, Prover in the second game decreases on and on each even step increases by . Then, the Adversary in the second game will earn 1 coin for each pair of two consequent steps while spending coins in the first game.
To solve this issue, we define the amortized closure that has all properties of and also can be increased by at most one by adding a linear form. Using amortized closure in the strategy above instead of plain closure, we can guarantee that every time we spend a coin in the first game, we earn a coin in the second game. Hence, the strategy will guarantee to earn at least coins, and we will prove Proposition 5.
1.2.2 Amortized closure
Before defining amortized closure, consider an example where the closure increases more than by one by adding just one linear form.
Example 6.
Let and . Consider linear forms: . The coefficient matrix of is the following:
-
We claim that . Indeed, the submatrix of formed by the first three rows contains a basis from the columns , and . Hence, is safe and, thus, .
-
Let us show that . Indeed, if we remove both the second and third blocks, the resulting matrix will have the basis consisting of only column . The rank of is , which is greater than the number of blocks. If we remove only the second or only the third block, the rank of the obtained matrix will be , which is also greater than the number of remaining blocks. Hence, .
Let be a finite linearly ordered set. We can extend this order to the set of all subsets of as follows: for subsets , we say that is less than if the largest element in the symmetric difference belongs to . In our case, we take , equipped with the natural order. This induces a total order on the subsets of . While the specific linear order on is not essential, using the natural order has a convenient consequence: the resulting order corresponds to comparing the binary representations of subsets: for each subset , associate the integer . Then if and only if this sum for is less than or equal to that for .
Let be a set of linear forms with coefficient matrix . We say that a subset of blocks is coverable with respect to if one can choose linearly independent columns from the matrix such that every block from contains one chosen column. An amortized closure of is the -maximal subset of that is coverable with respect to . We denote the amortized closure of by .
Let us clarify why we use the term amortized. The sequence is monotonic, but the difference between consecutive terms can be large. In contrast, as we will see later, the amortized closure sequence is also monotonic, yet each step differs from the previous by at most one element. Moreover, each term in this sequence contains the corresponding term of the original closure sequence. The amortized closure anticipates future growth by including certain elements early, thus avoiding sudden increases in size.
In Example 6, and .
The uniqueness of amortized closure trivially follows from the definition. We establish other properties in the following theorem:
Theorem 7.
Since the amortized closure contains the plain closure, the amortized closure also contains all essential unlifted variables, i.e. linear systems do not restrict values of unlifted variables out of the amortized closure. The most technically involved part is the proof of Lipschitz continuity of amortized closure.
1.2.3 Lower bound for depth-
Alekseev and Itsykson [3] have recently proved that every refutation of lifted Tseitin formulas either has size at least or depth at least , where is the number of variables. Our Theorem 4 is the improvement of this result, and its proof is basically built on the proof by Alekseev and Itsykson [3]. To explain our contribution, we start by presenting the idea of the former result. This tradeoff was proved for the lifted formulas , where is a -stifling gadget (for example, can be the -input majority for ; see Section 3.2 for definition) and satisfies rather strong conditions. Namely, there exists a set of partial assignments to variables of and integer numbers and such that the following conditions hold.
-
1.
Any assignment from does not falsify a clause of .
-
2.
For any assignment , for any , .
-
3.
Any refutation of satisfies the following random-walk property.
-
We say that a linear clause in the lifted variables is -good if the system corresponds to some assignment from ; i.e. there exists a solution of that induces on an assignment from , where denotes the set of linear forms that appear in .
-
Consider arbitrary -good clause from such that . Let correspond to . Let be a random solution of among all solutions inducing the partial assignment on unlifted variables. We make steps in starting in , and on each step, we move from the current linear clause to a premise of the rule falsified by (we count only steps corresponding to resolution rules and do not count weakening rules). Then, with probability at least , this walk finishes in an -good clause.
-
Fortunately, Tseitin formulas meet these conditions for appropriate , and [3].
Assume that there is a refutation of of size less than , where is some parameter. The following argument was used in [3] to prove that has a large depth. Let be the empty clause from a ; is -good for trivial reasons. By the random-walk property on the distance from , there is an -good clause . If , then by the random walk property on the distance from , there is an -good clause , and so on. Let we finish this process at -good clause such that . Then we get that the depth of is at least . We have to show that can be sufficiently large, for this we have to use that the size of is less than .
To bound from below, Alekseev and Itsykson [3] estimate the rank of in comparison to the rank . Namely, the size upper bound on together with the random-walk property imply that one can choose such that . Since the estimated value of the rank can be increased in at least times by one step, in this approach . The total depth that can be achieved by this approach is at most .
Our improvement
Instead of estimating rank, we suggest estimating the size of the amortized closure . We prove the following lemma.
Lemma 8 (Lemma 38).
Let and be two linear systems in the lifted variables . Let be a partial assignment defined on . Let consist of all solutions of such that extends . Assume that . Let be a random element of . Then .
Lemma 8, the upper bound and the random-walk property imply that on the distance from one can find an -good such that . So we can achieve and depth at least . This is sufficient to establish Theorem 4.
Notice that there is a potential way to improve by improving the upper bound on in the random-walk property and taking smaller .
1.3 Discussion about closures
The concept of closure proves helpful when addressing problems with an underlying lifted structure. In such cases, the closure of a set of linear forms effectively captures the most essential unlifted variables. Furthermore, when the lifting involves a 1-stifling gadget, the set of linear forms imposes no constraints on variables outside the closure.
Plain closure is monotone but not necessarily Lipschitz. Amortized closure, containing plain closure, is both monotone and Lipschitz. For the best results, using both is recommended: plain closure more accurately identifies essential unlifted variables, while amortized closure allows for more convenient estimations.
While (as shown by [11]) closure is not required for parity decision trees (i.e., for tree-like ), where essential unlifted variables can be captured iteratively along a path, closure (both plain and amortized) provides a key advantage in dag-like proofs: path-independence. This invariance is why closure is necessary for lower bounds in regular and bounded-depth . Furthermore, our first application shows that even for tree-like in bounded-width settings, amortized closure can give better results, as in our case, it applies to a broader class of gadgets.
A limitation of using closure is that variables within the closure are not necessarily indeed constrained by the linear forms. It seems to be one of the primary obstacles preventing us from applying a bottleneck argument to unrestricted .
1.4 Further research
We identify the following questions as interesting directions for further investigation.
-
Prove a supercritical tradeoff between the size and depth of dag-like refutations. Specifically, provide an example of a family of formulas with a polynomial-size refutation, yet every such refutation has a depth that exceeds the number of variables. While numerous supercritical tradeoffs between the size and depth exist for resolution [15, 8, 13, 17], all use the width-size relationship, which remains unknown for . Thus, the question requires some additional ideas.
-
Prove a superpolynomial lower bound for refutations of depth for some . As we noticed above, improving the success probability in the random-walk theorem from [3] is sufficient for further depth improvement.
-
Prove a lifting theorem that translates lower bounds on resolution width to lower bounds on the size of refutations with depth at most . The lifted Tseitin formula is the only known example of a lower bound for bounded-depth . Such a lifting theorem will provide a method for generating many such examples.
2 Closure and amortized closure
In this section, we give preliminaries about closure, provide a definition of amortized closure, and prove its main properties.
Throughout the paper, we use the notation to denote the span of the set of vectors from some vector space.
2.1 Safe and dangerous sets of linear forms
We consider the set of propositional variables . The variables from are divided into blocks by the value of the first index. The variables form the th block, for .
Consider sets of linear forms using variables from over the field . The support of a linear form is the set of blocks of variables that appear in with non-zero coefficients. We denote the support by . The support of a set of linear forms is the union of the supports of all linear forms in this set. We denote it by . We say that a linearly independent set of linear forms is dangerous if . We say that a set of linear forms is safe if does not contain a dangerous set. If is linearly dependent but contains a dangerous set, instead of saying that is dangerous, we say it is not safe.
Every linear form corresponds to a vector of its coefficients indexed by the variables from the set . Given a list of linear forms , one may consider their coefficient matrix of size in which the -th row coincides with the coefficient vector of .
Theorem 9 ([14]).
Let be linearly independent linear forms and let be their coefficient matrix. Then, the following conditions are equivalent.
-
(1)
The set of linear forms is safe.
-
(2)
One can choose blocks and one variable from each of these blocks such that the columns of corresponding to the chosen variables are linearly independent. (Since the chosen set of columns forms the basis.)
2.2 Closure
Let be a set of blocks; for a linear form we denote by a linear form obtained from by substituting for all variables with support in . For a set of linear forms we will use the notation .
A closure of a set of linear forms is any inclusion-wise minimal set such that is safe.
Lemma 10 (Uniqueness [14]).
For any , its closure is unique.
We denote the closure of by .
Lemma 11 (Monotonicity [14]).
If , then .
Lemma 12 (Span invariance [14]).
.
Lemma 13 (Size bound [14]).
, and hence .
A set of linear forms is minimally dangerous if it is dangerous, and does not contain a dangerous set with strictly smaller support than the support of . Recall that a dangerous set is necessarily linearly independent.
Consider the following algorithm:
Algorithm 14.
Input: a set of linear forms .
-
1.
;
-
2.
While contains dangerous sets:
-
(a)
Find a minimally dangerous set in . Let be its support.
-
(b)
.
-
(a)
-
3.
Return .
Corollary 16.
If contains a minimally dangerous set with support , then .
2.3 Coverable sets
Let be sets of vectors from some linear space over a field .
We say that a subset is coverable with respect to if for every there is such the set is linearly independent.
The following extension of the well-known Hall’s matching theorem was proved by Welsh in 1971.
Theorem 17 ([24]).
A set is coverable with respect to if and only if for every the dimension of is at least .
We consider the following order on the subsets of : for any , , if and only if . We also define the strict order , if and only if and . In other words, we can say that is less than if the largest element in the symmetric difference belongs to .
The order plays a central role in the following theorem, which is proved in Subsection 2.5.
Theorem 18.
Let and be vector spaces over a field let be such that and . Let denote the projection from to . Let be sets of vectors from . Let for every , .
Let be -maximal coverable set with respect to . Let be -maximal coverable set with respect to . Then and .
2.4 Amortized closure and its properties
Let be the set of propositional variables and be a set of -linear forms with variables from . Consider a coefficient matrix of : its columns correspond to , and for all th row is the coefficient vector of . For every , let consist of matrix columns corresponding to variables with support .
An amortized closure of , denoted by , is the -maximal subset of that is coverable with respect to . It is easy to see that does not depend on the permutation of rows in the coefficient matrix of .
In the rest of the subsection, we prove the properties of amortized closure (i.e., Theorem 7).
Lemma 19 (Size bound).
.
Proof.
is at most the rank of a coefficient matrix of that equals .
Lemma 20 (Span invariance).
If , then .
Proof.
It is well-known that for every finite set of vectors from some linear space over and for every basis of one can obtain this basis from by a sequence of the following to operations: 1) adding one vector to another; 2) removing zero.
Since , we can choose the common basis in them. Thus, it is sufficient to verify that and . Both these properties straightforwardly follow from the definition of amortized closure.
Theorem 21 (Lipschitz continuity).
and .
Proof.
This theorem follows from Theorem 18; we proceed with a formal verification.
Let us denote and . Consider the coefficient matrix of the set of linear forms of . The coefficient matrix of the set of linear forms is obtained from by removing the last row.
We choose . Let and , identified with the subspace of , where the last coordinate is zero. Thus if , then ; let denote the projection from to .
Let for consist of columns of the coefficient matrix of corresponding to variables with support . Then for all , the set consists of columns of the coefficient matrix of the set , corresponding to variables whose support is exactly . We apply Theorem 18 with and , yielding and .
Corollary 22 (Monotonicity).
If , then .
Proof.
2.4.1 Relation between closures
Now we prove item 5 of Theorem 7. To compare plain and amortized closures, we establish Lemma 24, the analogue of Corollary 16.
We call a subset important for a set of linear forms if there exists a safe linearly independent set of linear forms with support such that .
Proposition 23.
If contains a minimal dangerous set with support , then is important.
Proof.
Let be a minimal dangerous set with support . The minimality implies that the set is safe. The support of equals , since if it is less than , this set would be dangerous. Hence, is important.
Lemma 24.
Let be important for . Then .
Proof.
Since is important, there exists a linearly independent and safe set with support , where . Let us choose a basis in that contains . Since , , hence, by Lemma 20, and . So it is sufficient to show that .
Let , for , be the set of columns of the coefficient matrix of , corresponding to variables with support . Our first goal is to show that is coverable w.r.t. .
Consider the coefficient matrix of . Since is safe and linearly independent, Theorem 9 implies that for every , one can choose a column of corresponding to a variable with support such that all these columns are linearly independent. is a submatrix of the coefficient matrix of . Let for , be the column in corresponding to . The set is also linearly independent since for all , is the prefix of . Notice that all columns of corresponding to variables with support out of have zeros in the first coordinates, hence for all , does not belong to the linear span of all columns of with support out of . Since the coefficient matrix of is obtained from the coefficient matrix of by substitution zero to all variables with support from , for every there is such that the set is linearly independent. Thus, the set is linearly independent, thus is coverable w.r.t. .
For all , let if and otherwise. Since is coverable w.r.t. , is coverable w.r.t. . By the definition, is -maximal subset of that is coverable w.r.t. . Hence, . We know that . Thus, . Since is coverable w.r.t. , we get .
Lemma 25.
If , then .
Proof.
Consider the execution of Algorithm 14 on . Let be the minimally dangerous sets found by the algorithm. Then .
By Proposition 23, is important for , hence it is important for . Then, by Lemma 24, . By Proposition 23, is important for , hence it is important for . Then, by Lemma 24, . Continue this reasoning times we get that .
Lemma 26.
.
Proof.
Follows from Lemma 25 applied to .
Our immediate goal is to show that if adding a linear form increases the plain closure, it does not affect the amortized closure. We begin by proving this in the special case where the closure of the initial set is empty.
Lemma 27.
If is safe and for a linear form , is not safe, then .
Proof.
Since is not safe, contains a minimally dangerous set with support of size . Assume that contains the maximal possible number of elements from . It is easy to see that the number of such elements should be . Indeed, this number should be less than since is safe; if contains two elements from , we can change one of them to their sums, and this increases the number of elements from . Let and . Since is safe, the support of the set is also . Hence, is important, thus
The following lemma extends Lemma 27 to the general case.
Lemma 28.
If , then .
Proof.
Consider the execution of Algorithm 14 on . Let be the minimally dangerous sets found by the algorithm. Then . Notice that we can construct the closure of using the algorithm starting from the same sets . By multiple applications of Lemma 16, we get that . By the definition of closure, is safe; since , the set of linear forms is not safe. By Lemma 27, .
By Lemma 25 we get and .
Finally,
2.5 Proof of Theorem 18
Proof of Theorem 18.
For every we choose such that the set is linearly independent. For we denote . For every we choose such that the set is linearly independent. Let for , be an element of such that .
Notice that the set is also linearly independent, hence is coverable with respect to . By maximality of , . If , then the theorem holds; hence, assume that (strictly less). Let us denote .
The theorem holds if . So, we assume that .
Claim 29.
is coverable with respect to .
Proof.
We will maintain the set of vectors that satisfies the following properties:
-
1.
If and , then ;
-
2.
;
-
3.
If and , then either , or ;
-
4.
The inequality holds, where for all , .
Initially assume that for all and , and . In other words the set initially equals . It is easy to verify that all properties above are satisfied.
While the set of vectors is not linearly independent, we apply to this set some operation that will guarantee the satisfaction of all properties. We describe this operation below.
Since , we also have that . Since is not linearly independent, . Thus, there exists a unique non-empty set and non-zero elements such that ; and, thus, .
We claim that for all , . Indeed, assume that for some , , Then contains whose dimension is at least , thus is coverable with respect to , but ; contradiction with the maximality of .
It is impossible to have for all since all are linearly independent. Thus, there exists such that . Since , , by the dimension argument we get that the set is linearly independent. Let us change values (and, correspondingly, ). Note that , hence all the properties are satisfied for new values of .
We can’t apply this operation infinitely since the value is decreased on every step. Hence, at some moment, we can’t apply the operation, which means that is linearly independent and, thus, is coverable with respect to .
Consider the set . Since , .
If , the set is linearly independent, we get a contradiction with maximality of since . Thus, . Let us fix some such that is in the span of for . In this case is linearly independent, thus is coverable with respect to .
Claim 30.
Proof.
The set is coverable with respect to . Since is the maximal coverable, . It implies that .
Claim 31.
Proof.
Assume that . By Claim 29 the set is coverable with respect to . Then . Since , . Let . It is straightforward that . By the definition of we get that , but the set is linearly independent since it is a subset of . This contradicts the maximality of .
The last two claims imply .
Claim 29 implies that . If , then . Let .
Let . The set is coverable with respect to since is linearly independent. The set is coverable with respect to since for are linearly independent and . The sets and are not coverable with respect to since it would contradict maximality of . The following lemma (Lemma 32) implies that such a situation is impossible. We get a contradiction with our assumption that the theorem does not hold.
Lemma 32.
Let , and be different elements from . Assume that is coverable with respect to but and are not coverable. Then is not coverable.
Proof.
Asume for a sake of contradiction that is coverable.
For any set we will use the notation .
By Theorem 17 since is not coverable, there exists such that . Since and are coverable, both and belong . Let us denote .
Since is coverable, . Since is coverable, . But we know that , hence . The last equality implies that and .
Analogously using that is not coverable we get that there exists such that . This equality implies that and .
By our assumption, the set is coverable. So, we may estimate
and get a contradiction. In the first equality, we explore that . In the second equality we explore that . In the third equality we use that . In the last inequality we used the known values of and and that is coverable.
3 Preliminary knowledge on resolution over parities and lifting
3.1 Resolution and resolution over parities
Here and after, all scalars are from the field . Let be a set of variables that take values in . A linear form in variables from is a homogeneous linear polynomial over in variables from or, in other words, a polynomial , where is a variable and for all . A linear equation is an equality , where is a linear form and .
A linear clause is a disjunction of linear equations: . Notice that over a linear clause may be represented as the negation of a linear system: .
For a linear clause we denote by the set of linear forms that appear in ; i.e. . The same notation we use for linear systems: if is a -linear system, denotes the set of all linear forms from .
Let be an unsatisfiable CNF formula. A refutation of in the proof system [19] is a sequence of linear clauses such that is the empty clause (i.e., identically false) and for every the clause is either a clause of or is obtained from previous clauses by one of the following inference rules:
-
Resolution rule allows us to derive from linear clauses and the linear clause .
-
Weakening rule allows us to derive from a linear clause an arbitrary linear clause in the variables of that semantically follows from (i.e., any assignment satisfying also satisfies ).
The width (sometimes the term rank is used for the same notion) of a refutation is the maximal rank of the negation of a linear clause from the refutation.
A refutation of is a tree-like if it can be arranged as a tree, where leaves correspond clauses of and any clause in the interior node is obtained by a rule from the clauses in its children.
The depth of a refutation is the maximal number of resolution rules applied on a path between a clause of the initial formula and the empty clause.
A resolution refutation of a formula is a special case of a refutation, where all linear clauses are plain (i.e., disjunctions of literals). For resolution refutations, we also use the notions of width and depth that correspond to the same notions in refutations.
3.2 Lifting of formulas via gadget
For every CNF formula with variables and every Boolean function we define a CNF formula with variables representing (i.e. we substitute to every variable of the function applied to fresh variables). Let , where is a clause for all . For every we denote by the cannonical CNF formula representing which has variables in every clause and by the cannonical CNF formula representing which has variables in every clause. Let , where is a literal. Then we denote by a CNF formula that represents as follows: consists of all clauses of the form , where is a clause of for all . And .
We refer to as a formula lifted with a gadget . We refer to the set as a set of unlifted variables and to the set as a set of lifted variables.
Sometimes, we will identify subsets of with corresponding subsets of . It is especially convenient to use such correspondence for the notions of support, closure, and amortized closure. So, we will assume that the support and the (amortized) closure of the set of linear forms over lifted variables is the set of unlifted variables.
A partial assignment to the set of variables is called block-respectful if, for every , either assigns values to all variables with support or does not assign values to any of them.
Suppose that is a block-respectful partial assignment. Then we define by the partial assignment on the set of variables such that (here we assume that if the right-hand side is undefined, then the left-hand side is also undefined).
Let . A gadget (i.e. Boolean function) is called -stifling [11] if for every of size for every there exists such that for every if and agree on set of indices , then .
Lemma 33 ([7, 3]).
Let be a satisfiable linear system in the lifted variables . Let be a -stifling gadget. Suppose
-
is a full assignment to lifted variables satisfying .
-
is a full assignment to unlifted variables such that .
Then there exists a full assignment to the lifted variables such that satisfies and
Lemma 34 ([3]).
Let be a satisfiable linear system in the lifted variables . Let be a -stifling gadget. Suppose there exists a full assignment to lifted variables satisfying such that does not falsify any clause of . Then, does not contradict any clause of .
4 Bounded-width lifting theorem
In this section, we present our first application of amortized closure. Namely, we give an easy proof of the lifting theorem that extends Theorem 2 recently obtained by Chattopadhyay and Dvorak [10]. In Subsection 4.1, we define bounded-width games characterizing resolution depth and tree-like size. In Subsection 4.2, we state and prove our lifting theorem.
4.1 Bounded-width games for resolution and resolution over parities
Consider the following bounded-width Prover-Adversary game [6, 15]. The game is defined for an unsatisfiable CNF formula and integer parameter . During the game, players save a partial assignment . Initially, is empty. Every her move, Prover has several possibilities: 1) Forget: change to if ; 2) Query: if , Prover can choose a variable not from domain of and Adversary chooses and changes . For every move, Adversary earns a coin. The game ends if falsifies a clause of .
Lemma 35 (Lemma 6 from [6]).
An unsatisfiable CNF formula has resolution refutation of width and depth if and only if Prover has a strategy in the game for with the parameter that guarantees that Adversary earns at most coins for any his behavior.
Now, we introduce a bounded-width -Prover-Delayer game. This game is also defined on an unsatisfiable formula and a parameter . The players save a linear system , which is initially empty. Prover has several possibilities for every her move: 1) Forget: change the system to any system such that semantically implies . 2)Query: if , Prover can choose a linear form . Delayer can either choose a value and change to or report , in the second case Prover chooses by herself and update to . Delayer earns a coin for each answer . The game ends if the system contradicts a clause of .
Lemma 36.
If Delayer has a strategy in the game defined for an unsatisfiable formula with parameter that guarantees him to earn at least coins, then the size of any tree-like refutation of of width at most has size at least .
Proof.
Consider a tree-like refutation of with width at most . For a node of the proof tree, we denote by a linear clause that labels . Based on Delayer’s strategy, we define a random path from the root to a leaf of . We start a path in the root of the proof tree that corresponds to an empty clause. To define a path we will play the bounded-width game on the formula . The linear system in the game always equals the negation of the current clause. At the root, we have the empty linear system.
If a current node has only one child (i.e., it corresponds to the weakening rule), we move to this child . Since semantically implies , semantically implies . In the game, we change a linear system to its semantical implication . It is easy to see that .
Assume that results from the resolution rule applied to and , and is the resolved linear form. In this case and and . Prover asks for the value of the linear form . It is a legal step since . If Delayer answers , we choose at random. Otherwise, is the value chosen by Delayer. We move to . In the game, we first get a linear system and then change it to its semantical implication . With probability we finish the path in a leaf of the proof tree. is a clause of , and thus contradicts a clause of . By the property of Delayer’s strategy, Delayer earns at least coins at that moment. Thus, for every leaf, the probability that the path finishes in this leaf is at most . Hence the number of leaves in the proof tree is at least .
4.2 Proof of lifting theorem
Theorem 37.
Let be an unsatisfiable CNF formula and be a 1-stiffling gadget. Assume that has a tree-like refutation of rank and size . Then has a resolution refutation of width and depth .
Proof.
Proof by contradiction. Assume that does not have a resolution refutation of width and depth . Then, by Lemma 35, there is a strategy of Adversary in the first game for the formula and the parameter that guarantees him to earn at least coins. Using this strategy, we construct the strategy of Delayer in the second game for the formula and the parameter .
Let denote the current linear system in the second game; is a linear system in the lifted variables. Let denote the current partial assignment in the first game; it assigns values to unlifted variables. We maintain the following invariant: is defined on and has a solution such that coincides with on . Initially, is the empty system, is the empty assignment, and the invariant holds for any . Consider Prover’s different types of moves in the second game.
First, assume that Prover makes a query and chooses a linear form .
-
1.
If . Delayer chooses equals the value of on . The values and remain unchanged.
- 2.
Now assume that Prover forgets, i.e. she changes to , where semantically implies . Then we restrict on the set of variables . Since , by Corollary 22 .
Assume that the invariant holds and does not falsify any clause of . By Lemma 26, , hence by Lemma 34, does not contradict a clause of .
In the first game, Adversary can earn at least coins. By the construction of the strategy, each time Adversary earns a coin, Delayer also earns a coin. Hence, Delayer, using the described strategy, can earn at least coins. And by Lemma 36, this contradicts the assumption of the theorem.
5 Lower bound for depth-
In this section, we describe how to prove an exponential lower for depth- . In Subsection 5.1, we present the key lemma utilizing the notion of amortized closure that we will use to improve the result by [3]. In Subsections 5.2 and 5.3, we describe how to modify the proof by [3] to improve it using the key lemma.
5.1 Key lemma
Lemma 38.
Let and be two linear systems in variables . Let be a partial assignment defined on . Let consist of all solutions of such that extends . Assume that . Let be a random element of . Then .
Proof.
By the definition of the closure, the set of linear form is safe. Hence, by Theorem 9, there exists a basis in the set of columns of the matrix of such that for every block, the basis contains at most one column corresponding to this block. Let be the set of variables corresponding to the basis elements. Since , the system is satisfiable. Hence, the system can be equivalently rewritten as the system of equations, each of them linearly expresses the corresponding variable from from variables . Let us denote this representation by .
A random solution of has the following structure: we take at random values of all variables , and, then the values of variables from are uniquely determined by the system . Thus, the following statement holds.
Claim 39.
Let be a satisfiable linear system in the variables . Then .
Let be the following linear system: .
Notice that the linear system is semantically equivalent to the system that is equivalent to the system .
The system sets variables from to constants and expresses the variables from from the variables . Let denote the linear system where we substitute for all variables from their expressions given by the system . So is a linear system in the variables .
Let be the maximal set of linearly independent equations from .
So we get, .
5.2 Random-walk theorem
The main technical tool used in [3] in proving the lower bound for bounded-depth is the random-walk theorem.
Let be a CNF formula and be a set consisting of partial assignments for variables of . We assume that has two properties:
-
is closed under restrictions: if for every for every , .
-
For every , does not falsify any clause of .
-games of Prover and Delayer with starting position
In this game, two players, Prover and Delayer, maintain a partial assignment for variables of that initially equals . On every move, Prover chooses a variable , and Delayer has two options:
-
Delayer can earn a white coin and reports . Then, Prover chooses a Boolean value of .
-
Delayer can earn a white coin and pay a black coin to choose a Boolean value of by himself.
The current assignment is updated: . The game ends when .
Delayer’s strategy is called linearly described if Delayer can see only the set of requested variables and he does not know the values of the variables chosen by Prover and even by himself before. When he chooses a value by himself, he chooses a -affine function from the values of previous variables, and the result of this function is used as a value chosen by Delayer. For a more detailed definition of linearly described strategies, we refer to [3].
Theorem 40 (Theorem 4.3 from [3]).
Let be an unsatisfiable CNF formula. Let be a set of partial assignments for such that is closed under restrictions and for any , does not falsify any clause of . Assume that in the -game, Delayer has a linearly described strategy with start position that guarantees him to earn white coins while paying at most black coins. Let be a 2-stifling gadget. Consider a refutation of .Let be a linear clause from this refutation. Assume that and there is a solution of such that extends . Let be the set of all full assigmnets such that satisfies and extends . Let be integer number such that . Consider a random full assignment and make steps in the refutation from according to : each time we go from a linear clause to its premise falsifying by , and we count only applications of resolution rules (if we reach an initial clause earlier than in steps, we stay there). Assume that we stop in a node labeled with a linear clause . Then with probability at least .
The only difference between Theorem 40 and Theorem 4.3 from [3] is that the inequality that was slightly stronger in Theorem 4.3 from [3]. It is easy to see that the proof from [3] works with the weaker inequality as well. This is because this inequality was only used to show that if a linear system has type , where consists of at most equations, then . Using the weaker inequality can be estimated as follows: .
5.3 Size vs depth tradeoff
Theorem 41 (cf. Theorem 8.1 from [3]).
Let be an unsatisfiable CNF formula. Let be a set of partial assignments for such that for any , does not falsify any clause of and is closed under restrictions (i.e., if and , then ). Assume that there are integers and such that for every such that , in the -game with start position there is a linearly described strategy of Delayer that guarantees him to earn at least white coins while paying at most black coins. Let be a 2-stifling gadget. Then any refutation of has either size at least or depth at least .
Proof.
We say that a linear clause in lifted variables is -good if there is a solution of such that .
Consider a refutation of and denote is by .
Claim 42.
Assume that contains an -good linear clause such that , where . Let denote the set of all -good clauses such that there is a path from to of length in the branching program associated with . Assume that for every , holds. Then, the size of the refutation is at least .
Proof.
Since is -good, there is a solution of such that . Let us denote . Then . By the conditions of the theorem, there is a linearly described strategy of Delayer in the -game with starting position that guarantees him to earn white coins while paying at most black coins.
Let be the set of all assignments such that satisfies and . Since , .
Consider a random assignment and make steps in the refutation from according to : each time we go from a linear clause to its premise falsifying by , and we count only applications of resolution rules. Notice that . Let be the linear clause at the end of the path. By Theorem 40, with probability at least , is -good. By Lemma 34, is not a clause of , hence, . Thus, .
If is a satisfiable linear system such that , then by Lemma 38, . Hence, the refutation contains at least clauses such that .
Let denote the empty clause from . If for every -good clause such that there is a path from to of length , , then by Claim 42, the size of the refutation is at least . Otherwise, there is an -good clause such that there is a path from to of length and . Let , then . We repeat the same reasoning more times for all from to maintaining invariant : if for every -good clause such that there is a path from to of length , , then by Claim 42, the size of is at least . Otherwise, there is an -good clause such that there is a path from to of length and .
So we get that either the size of refutation is at least or depth is at least the length of the path from to , from to , etc, from to which is at least .
Corollary 43 (cf. Corollary 8.3 from [3]).
Let be an unsatisfiable Tseitin formula based on a spectral -expander. Then, any refutation of has either size at least or depth at least .
In particular, if and is a constant, then is a formula with variables and of size . And any refutation of has either size at least or depth at least .
Proof.
References
- [1] M. Ajtai. -formulae on finite structures. Annals of Pure and Applied Logic, 24(1):1–48, 1983. doi:10.1016/0168-0072(83)90038-6.
- [2] Miklós Ajtai. The complexity of the pigeonhole principle. Combinatorica, 14(4):417–433, 1994. doi:10.1007/BF01302964.
- [3] Yaroslav Alekseev and Dmitry Itsykson. Lifting to bounded-depth and regular resolutions over parities via games. In Proceedings of the 57th Annual ACM Symposium on Theory of Computing (STOC ’25), June 23–27, 2025, Prague, Czechia. ACM, 2025. The full version is available as ECCC technical report TR24-128, Revision 1. doi:10.1145/3717823.3718150.
- [4] Albert Atserias and Víctor Dalmau. A combinatorial characterization of resolution width. Journal of Computer and System Sciences, 74(3):323–334, 2008. Computational Complexity 2003. doi:10.1016/j.jcss.2007.06.025.
- [5] Paul Beame and Sajin Koroth. On Disperser/Lifting Properties of the Index and Inner-Product Functions. In Yael Tauman Kalai, editor, 14th Innovations in Theoretical Computer Science Conference (ITCS 2023), volume 251 of Leibniz International Proceedings in Informatics (LIPIcs), pages 14:1–14:17, Dagstuhl, Germany, 2023. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.ITCS.2023.14.
- [6] Christoph Berkholz. On the complexity of finding narrow proofs. In 53rd Annual IEEE Symposium on Foundations of Computer Science, FOCS 2012, New Brunswick, NJ, USA, October 20-23, 2012, pages 351–360. IEEE Computer Society, 2012. doi:10.1109/FOCS.2012.48.
- [7] Sreejata Kishor Bhattacharya, Arkadev Chattopadhyay, and Pavel Dvorák. Exponential separation between powers of regular and general resolution over parities. In Rahul Santhanam, editor, 39th Computational Complexity Conference, CCC 2024, July 22-25, 2024, Ann Arbor, MI, USA, volume 300 of LIPIcs, pages 23:1–23:32. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2024. doi:10.4230/LIPICS.CCC.2024.23.
- [8] Sam Buss and Neil Thapen. A simple supercritical tradeoff between size and height in resolution. Electron. Colloquium Comput. Complex., TR24-001, 2024. URL: https://eccc.weizmann.ac.il/report/2024/001.
- [9] Farzan Byramji and Russell Impagliazzo. Lifting to randomized parity decision trees. Electron. Colloquium Comput. Complex., TR24-202, 2024. URL: https://eccc.weizmann.ac.il/report/2024/202.
- [10] Arkadev Chattopadhyay and Pavel Dvorak. Super-critical trade-offs in resolution over parities via lifting. In Srikanth Srinivasan, editor, 40th Computational Complexity Conference CCC 2025, August 05–08, 2025, Toronto, Canada, volume 339 of LIPIcs, 2025. Available as ECCC technical report TR24-132. URL: https://eccc.weizmann.ac.il/report/2024/132/.
- [11] Arkadev Chattopadhyay, Nikhil S. Mande, Swagato Sanyal, and Suhail Sherif. Lifting to parity decision trees via stifling. In Yael Tauman Kalai, editor, 14th Innovations in Theoretical Computer Science Conference, ITCS 2023, January 10-13, 2023, MIT, Cambridge, Massachusetts, USA, volume 251 of LIPIcs, pages 33:1–33:20. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2023. doi:10.4230/LIPICS.ITCS.2023.33.
- [12] Stephen A. Cook and Robert A. Reckhow. The relative efficiency of propositional proof systems. The Journal of Symbolic Logic, 44(1):36–50, March 1979. doi:10.2307/2273702.
- [13] Susanna F. de Rezende, Noah Fleming, Duri Andrea Janett, Jakob Nordström, and Shuo Pang. Truly supercritical trade-offs for resolution, cutting planes, monotone circuits, and weisfeiler-leman. Electron. Colloquium Comput. Complex., TR24-185, 2024. URL: https://eccc.weizmann.ac.il/report/2024/185.
- [14] Klim Efremenko, Michal Garlík, and Dmitry Itsykson. Lower bounds for regular resolution over parities. In Bojan Mohar, Igor Shinkar, and Ryan O’Donnell, editors, Proceedings of the 56th Annual ACM Symposium on Theory of Computing, STOC 2024, Vancouver, BC, Canada, June 24-28, 2024, pages 640–651. ACM, 2024. The full version is available as ECCC technical report TR23-187. doi:10.1145/3618260.3649652.
- [15] Noah Fleming, Toniann Pitassi, and Robert Robere. Extremely deep proofs. In Mark Braverman, editor, 13th Innovations in Theoretical Computer Science Conference, ITCS 2022, January 31 - February 3, 2022, Berkeley, CA, USA, volume 215 of LIPIcs, pages 70:1–70:23. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2022. doi:10.4230/LIPICS.ITCS.2022.70.
- [16] Merrick Furst, James B. Saxe, and Michael Sipser. Parity, circuits, and the polynomial-time hierarchy. 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981), pages 260–270, 1981. doi:10.1109/SFCS.1981.35.
- [17] Mika Göös, Gilbert Maystre, Kilian Risse, and Dmitry Sokolov. Supercritical tradeoffs for monotone circuits. Electron. Colloquium Comput. Complex., TR24-186, 2024. URL: https://eccc.weizmann.ac.il/report/2024/186.
- [18] Svyatoslav Gryaznov, Sergei Ovcharov, and Artur Riazanov. Resolution over linear equations: Combinatorial games for tree-like size and space. ACM Trans. Comput. Theory, July 2024. Just Accepted. doi:10.1145/3675415.
- [19] Dmitry Itsykson and Dmitry Sokolov. Resolution over linear equations modulo two. Ann. Pure Appl. Log., 171(1), 2020. doi:10.1016/J.APAL.2019.102722.
- [20] Vladimir Podolskii and Alexander Shekhovtsov. Randomized lifting to semi-structured communication complexity via linear diversity. Electron. Colloquium Comput. Complex., TR24-199, 2024. URL: https://eccc.weizmann.ac.il/report/2024/199.
- [21] A. A. Razborov. Lower bounds on the size of bounded depth circuits over a complete basis with logical addition. Mat. Zametki, 41:598–607, 1987.
- [22] Alexander A. Razborov. A new kind of tradeoffs in propositional proof complexity. J. ACM, 63(2):16:1–16:14, 2016. doi:10.1145/2858790.
- [23] Roman Smolensky. Algebraic methods in the theory of lower bounds for boolean circuit complexity. In Proceedings of the 19th Annual ACM Symposium on Theory of Computing, 1987, New York, New York, USA, pages 77–82, 1987. doi:10.1145/28395.28404.
- [24] D.J.A. Welsh. Generalized versions of Hall’s theorem. Journal of Combinatorial Theory, Series B, 10(2):95–101, 1971. doi:10.1016/0095-8956(71)90069-4.
