Abstract 1 Introduction 2 Preliminaries 3 Complexity of sat(𝒌-DQBFdnfd) 5 Complexity of sat(𝒌-DQBFcnf) 6 Conclusions and Future Work References Appendix A Additional Background Appendix B Omitted Proofs

Fine-Grained Complexity Analysis of Dependency Quantified Boolean Formulas

Che Cheng ORCID Graduate Institute of Electronics Engineering, National Taiwan University, Taipei, Taiwan Long-Hin Fung ORCID Department of Computer Science and Information Engineering, National Taiwan University, Taipei, Taiwan Jie-Hong Roland Jiang ORCID Department of Electrical Engineering, National Taiwan University, Taipei, Taiwan Friedrich Slivovsky ORCID Department of Computer Science, University of Liverpool, UK Tony Tan ORCID Department of Computer Science, University of Liverpool, UK
Abstract

Dependency Quantified Boolean Formulas (DQBF) extend Quantified Boolean Formulas by allowing each existential variable to depend on an explicitly specified subset of the universal variables. The satisfiability problem for DQBF is NEXP-complete in general, with only a few tractable fragments known to date. We investigate the complexity of DQBF with k existential variables (k-DQBF) under structural restrictions on the matrix – specifically, when it is in Conjunctive Normal Form (CNF) or Disjunctive Normal Form (DNF) – as well as under constraints on the dependency sets. For DNF matrices, we obtain a clear classification: 2-DQBF is PSPACE-complete, while 3-DQBF is NEXP-hard, even with disjoint dependencies. For CNF matrices, the picture is more nuanced: we show that the complexity of k-DQBF ranges from NL-complete for 2-DQBF with disjoint dependencies to NEXP-complete for 6-DQBF with arbitrary dependencies.

Keywords and phrases:
Dependency quantified Boolean formulas, complexity, completeness, conjunctive normal form, disjunctive normal form
Copyright and License:
[Uncaptioned image] © Che Cheng, Long-Hin Fung, Jie-Hong Roland Jiang, Friedrich Slivovsky, and Tony Tan; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Problems, reductions and completeness
Funding:
We would like to acknowledge the generous support of Royal Society International Exchange Grant no. EC\R3\233183, the National Science and Technology Council of Taiwan under grant NSTC 111-2923-E-002-013-MY3, and the NTU Center of Data Intelligence: Technologies, Applications, and Systems under grant NTU-113L900903.
Editors:
Jeremias Berg and Jakob Nordström

1 Introduction

Propositional satisfiability (SAT) solving has made significant progress over the past 30 years [4, 10]. Thanks to clever algorithms and highly optimised solvers, SAT has become a powerful tool for solving hard combinatorial problems in many areas, including verification, planning, and artificial intelligence [5]. Modern solvers can handle very large formulas efficiently, making SAT a practical choice in many settings.

However, for problems beyond NP, such as variants of reactive synthesis, direct encodings in propositional logic often grow exponentially with the input and quickly become too large to fit in memory. This has led to growing interest in more expressive logics, such as Quantified Boolean Formulas (QBF) and Dependency Quantified Boolean Formulas (DQBF) [17]. DQBF extends QBF by allowing explicit control over the dependency sets: each existential variable can be assigned its own set of universal variables it depends on. A model of a DQBF assigns to each existential variable a Skolem function that maps assignments of its dependency set to truth values. From a game-theoretic point of view, a DQBF model is a collection of sets of local strategies – one set for each existential variable – that may observe only part of the universal assignment. This makes DQBF more succinct than QBF and particularly well-suited for applications such as synthesis and verification, where components often make decisions based on partial information. Unfortunately, this added expressiveness comes at a cost: DQBF satisfiability is NEXP-complete, and only a few tractable fragments are known [7, 8, 6, 18, 15]. One notable tractable case involves CNF matrices with dependency sets that are either pairwise disjoint or identical; such formulas can be rewritten into satisfiability-equivalent Σ3-QBFs [18].

Building on these ideas, we apply similar restrictions on the dependency sets to refine a recent classification of the complexity of DQBF with k existential variables (k-DQBF) [14]. For DNF matrices, this restriction has no effect, since the proofs in [14] for the PSPACE-hardness of 2-DQBF and NEXP-hardness of 3-DQBF can be carried over to formulas with pairwise disjoint dependency sets.

For CNF matrices, the situation is more subtle. For k3 and even non-constant k with disjoint dependencies, we extend the strategy of [18] to split clauses containing variables with incomparable dependency sets, but instead of reducing it to a QBF, we directly construct an NP algorithm to establish the NP membership. This technique can be extended to the case where any two dependency sets are either disjoint or comparable, and the size blow-up remains polynomial for constant k. The resulting DQBF only has existential variables with empty dependency sets, and its satisfiability can be checked in NP.

When arbitrary dependencies are allowed in CNF matrices, we prove that 3-DQBF is Π2P-hard. Further, a variant of Tseitin transformation lets us convert a k-DQBF with an arbitrary matrix into a (k+3)-DQBF with CNF matrix, yielding PSPACE-hardness of 5-DQBF and NEXP-hardness of 6-DQBF with CNF matrices.

As for the satisfiability problem of 2-DQBF, [13] shows that it reduces to detecting contradicting cycles in a succinctly represented implication graph, making it PSPACE-complete. For CNF matrices and disjoint dependencies, we show that the fully expanded graph has a simple structure, allowing satisfiability tests in NL. Consequently, the satisfiability of 2-DQBF with CNF matrices and unrestricted dependencies is in coNP – one can guess an assignment to the shared universal variables and solve the resulting instance with disjoint dependencies in NL. We also prove the NL- and coNP-hardness of the two problems via a reduction from 2-SAT and 3-DNF tautology, respectively.

Our results, summarised in Table 1, help map out the complexity of natural fragments of DQBF and show how both the formula structure and dependency restrictions play a key role in determining tractability.

Table 1: Summary of the complexity results.
k k-DQBFcnfd k-DQBFcnfde
k-DQBFcnfdec,
k-DQBFcnfds
k-DQBFcnf k-DQBFdnfd
1
L
(Theorem 19)
coNP-c
(Theorem 4)
2
NL-c
(Theorem 8)
NL-c
(Corollary 17)
NL-c
(Corollary 17)
coNP-c
(Theorem 20)
PSPACE-c
(Theorem 4)
3,4
NP-c
(Theorem 14)
NP-c
(Corollary 17)
NP-c
(Corollary 17)
Π2P-h
(Theorem 21)
NEXP-c
(Theorem 4)
5
PSPACE-h
(Theorem 23)
6+
NEXP-c
(Theorem 23)
Non-const. Σ3P-c [18] NEXP-c [18]
  • Note: “-c” denotes “-complete”, “-h” denotes “-hard”, and “non-const.” denotes “non-constant.”

2 Preliminaries

In this section, we define the notation used throughout this paper and recall the necessary technical background. All logarithms have base 2. For a positive integer m, [m] denotes the set of integers {1,,m}.

Boolean values True and False are denoted by and , respectively. Boolean connectives , , ¬, , , and are interpreted as usual. A literal is a Boolean variable v or its negation ¬v. We write var(v)=var(¬v)=v for the variable of a literal and sgn(v)= and sgn(¬v)= to denote its sign. We also write v and v to denote the literals v and ¬v, respectively.

A clause is a disjunction of literals, and a cube is a conjunction of literals. A Boolean formula φ is in conjunctive normal form (CNF) if it is a conjunction of clauses and in disjunctive normal form (DNF) if it is a disjunction of cubes. We view a clause or a cube as a set of literals and a formula in CNF (respectively, DNF) as a set of clauses (respectively, cubes) whenever appropriate. We sometimes write a clause in the form of QC, where Q is a cube and C is a clause, and similarly a DNF formula in the form of φψ, where φ is in CNF and ψ is in DNF.

We say that two sets of clauses A and B are variable-disjoint if for any clause C1A and C2B, C1 and C2 do not share a common variable. For variable-disjoint sets A and B, we write A×B to denote the set of clauses {(C1C2)|C1A,C2B}. We generalise this notion to A1×A2××An for pairwise variable-disjoint sets A1,,An.

We write v¯=(v1,,vn) to denote a vector of n Boolean variables with |v¯|n denoting its length.111To avoid clutter, we always assume a vector of variables v¯=(v1,,vn) do not contain duplicate entries, which can be viewed as a set {v1,,vn}. We will thus use set-theoretic operations on such vectors as on sets. An assignment on v¯ is a function from v¯ to {,}. We often identify an assignment on v¯ with a vector a¯=(a1,,an){,}n, denoted a¯v¯, which maps each vi to ai. When v¯u¯, we write a¯u¯(v¯) to denote the vector of Boolean values (a¯u¯(v))vv¯. When v¯ is clear from the context, we will simply write a¯ instead of a¯v¯.

Two assignments a¯u¯ and b¯v¯ are consistent, denoted by a¯u¯b¯v¯, if a¯u¯(v)=b¯v¯(v) for every vu¯v¯. When a¯u¯ and b¯v¯ are consistent, we write (a¯u¯,b¯v¯) to denote the union a¯u¯b¯v¯. Given a Boolean formula ϕ over the variables u¯,v¯ and an assignment a¯v¯, we denote by ϕ[a¯v¯] the induced formula over the variables u¯ obtained by assigning the variables in v¯ with Boolean values according to the assignment a¯v¯.

For a positive integer m and a vector of variables u¯ of length n>logm, by abuse of notation, we write u¯=m to denote the cube i[n]uiai, where (a1,,an) is the n-bit binary representation of m.

2.1 DQBF and Its Subclasses

We consider Dependency Quantified Boolean Formulas (DQBF) of the form

Φ=x¯,y1(D1),,yk(Dk).φ, (1)

where x¯=(x1,,xn), Dix¯ is the dependency set of the existential variable yi for every i[k], and φ is a quantifier-free Boolean formula over the variables x¯y¯ called the matrix of Φ. We write dep(v)Di if v=yi and dep(v){xi} if v=xi. We extend this notation to literals and clauses by letting dep()dep(var()) for a literal and dep(C)Cdep() for a clause C.

We say that Φ is satisfiable if for every i[k] there is a Boolean formula fi using only variables in Di such that by replacing each yi with fi, the formula φ becomes a tautology. In this case, we call the sequence f1,,fk a model of Φ and refer to each individual fi as a Skolem function for yi.

We define the subclasses k-DQBFβα of DQBF, where k1 indicates the number of existential variables, α{d,de,dec,ds} indicates the condition on the dependency sets, and β{cnf,dnf} indicates the form of the matrix.

For the dependency set annotation α, we define:

DQBFd

For every ij, DiDj=,

DQBFde

For every ij, DiDj= or Di=Dj,

DQBFdec

For every ij with |Di||Dj|, DiDj=, Di=Dj, or Dj=x¯, and

DQBFds

For every ij with |Di||Dj|, DiDj= or DiDj.

The letters d, e, c, and s denote disjoint, equal, complete, and subset, respectively. Note that the dependency sets of a DQBFds formula form a laminar set family. The classification of different dependency structures is inspired by [18], but we specify the condition that the formula is in CNF explicitly in our notation. That is, DQBFde and DQBFdec in [18] correspond to DQBFcnfde and DQBFcnfdec in our notation, respectively.

Note that DQBFdDQBFdeDQBFdecDQBFds. The first two inclusions are trivial, and the last one comes from the observation that both Di=Dj and Dj=x¯ are special cases of DiDj.

When k, α, or β is missing, it means that the corresponding restriction is dropped. For instance, 3-DQBFdnf denotes the class of DQBF with 3 existential variables, arbitrary dependency structure, and matrix in DNF, while DQBFd denotes the class of DQBF with the dependency structure specified by d and an arbitrary Boolean formula as the matrix. We denote by sat(k-DQBFβα) the satisfiability problem for the class k-DQBFβα.

 Remark 1.

For every α{d,de,dec,ds} and β{cnf,dnf}, checking whether a DQBF formula Φ is in the class DQBFβα can be done deterministically in space logarithmic in the length of Φ. To do so, we iterate through all the variables to check whether it satisfies the conditions set by α. In each iteration, it suffices to store O(1) number of indices of the variables, which requires only logarithmic space.

2.2 Manipulation of DQBFcnf

We recall two operations for manipulating DQBFcnf formulas, namely universal reduction [3, 12] and resolution-based variable elimination [20].

Lemma 2 (Universal reduction [3, 12]).

Let Φ=x¯,y1(D1),,yk(Dk).φ be a DQBFcnf formula, Cφ be a clause, C be a universal literal, and let CC{}. If dep(C), then Φ is equisatisfiable to

Φx¯,y1(D1),,yk(Dk).φ{C}{C}.

Using universal reduction, we assume that i[k]Di=x¯ for every DQBFcnf formula, since any universal variable not in i[k]Di can be universally-reduced from every clause.

For variable elimination by resolution, we only need a weaker version, which is sufficient for our purpose.

Lemma 3 (Variable elimination by resolution [20]).

Let Φ=x¯,y1(D1),,yk(Dk).φ be a DQBFcnf formula. We partition φ into three sets:

  • φy1{Cφ|y1C},

  • φ¬y1{Cφ|¬y1C}, and

  • φφ(φy1φ¬y1).

If for every Cφy1 we have dep(C)dep(y1), or for every Cφ¬y1 we have dep(C)dep(y1), then Φ is equisatisfiable to

x¯,y2(D2),,yk(Dk).φ{Cy1C|Cφy1,Cφ¬y1},

where CvC denotes the resolution of C and C w.r.t. the pivot v, i.e., CvC=(C{v})(C{¬v}).

The intuition is that y1 can “see” every assignment that may force it to be assigned to (respectively, ), and thus if all resolvents are satisfied, then there must be a Skolem function for y1 that satisfies the clauses in φy1φ¬y1. Note that the number of clauses after removing y1 is at most |φ|2.

2.3 Universal Expansion of 𝒌-DQBF

Consider a k-DQBF formula Φx¯,y1(D1),,yk(Dk).φ. Let y¯=(y1,,yk). Given an assignment a¯ on x¯ and b¯ on y¯, for every i[k], let a¯i be the restriction of a¯ to Di and bi be the restriction of b¯ to yi. We can expand Φ into an equisatisfiable k-CNF formula exp(Φ) by instantiating each yi into exponentially many instantiated variables of the form Yi,a¯i [2, 6, 12]. Formally,

exp(Φ)(a¯,b¯):φ[a¯,b¯]=𝒞a¯,b¯,

where 𝒞a¯,b¯i[k]Yi,a¯ibi. Intuitively, in the expansion exp(Φ), the Boolean variable Yi,a¯i represents the value of a candidate Skolem function fi(a¯i) for yi. The universal expansion shows that the satisfiability of Φ can be reduced to a Boolean satisfiability problem (with exponential blow-up). Moreover, if the assignment (a¯,b¯) falsifies the matrix φ, then a satisfying assignment of exp(Φ) must assign Yi,a¯i to ¬bi for some i[k].

3 Complexity of sat(𝒌-DQBFdnfd)

Having defined the various subclasses of DQBF, we can refine previous results by stating them more precisely. In this section, we consider the case where the matrix is in DNF.

By combining the DNF version of Tseitin transformation [9, Proposition 1] and the results in [14], we can show that restricting to DNF matrix and pairwise-disjoint dependency sets does not affect the complexity of sat(k-DQBF).

Theorem 4.

sat(k-DQBFdnfd) is coNP-, PSPACE-, and NEXP-complete when k=1, k=2, and k3, respectively.

See the appendix for the detailed proof. Since k-DQBFdnfdk-DQBFdnfdek-DQBFdnfdeck-DQBFdnfdsk-DQBFdnfk-DQBF, we have the following corollary:

Corollary 5.

sat(k-DQBFdnfα) and sat(k-DQBFdnf) is coNP-, PSPACE-, and NEXP-complete when k=1, k=2, and k3, respectively, for every α{de,dec,ds}.

4 Complexity of sat(𝒌-DQBFcnf𝜶)

In this section, we consider the complexity of sat(k-DQBFcnfα) and sat(DQBFcnfα), with a focus on the case where α=d. We first prove an important property of the expansion of DQBFcnfd formulas in Section 4.1 Then, in Sections 4.2 and 4.3 we show that sat(k-DQBFcnfd) is of the same complexity as k-SAT for k2,222There is no dependency structure for k=1. and that sat(DQBFcnfd) is of the same complexity as SAT. This shows that, in stark contrast to the DNF case in the previous section, with pairwise disjoint dependency sets and with CNF matrix, the exponential gap between SAT and DQBF disappears. Finally, we discuss other dependency structures in Section 4.4.

4.1 Universal Expansion of DQBFcnfd

In this section, we show a useful property of the expansion of DQBFcnfd formulas. We fix a k-DQBFcnfd formula:

Φ=x¯,y1(D1),,yk(Dk).j[m]Cj. (2)

Let y¯=(y1,,yk). Given an assignment a¯ on x¯ and b¯ on y¯, for every i[k], let a¯i be the restriction of a¯ to Di and bi be the restriction of b¯ to yi.

Recall that for a DQBF formula Φ, each instantiated clause in exp(Φ) corresponds to a falsifying assignment of the matrix of Φ. For a formula in CNF, the set of falsifying assignments can be represented by the union of the set of falsifying assignments of each individual clause. This allows us to represent the instantiated clauses in exp(Φ) as the union of polynomially many sets when Φ is a DQBFcnfd formula. Moreover, the disjoint dependency structure allows us to further represent each of these sets as the Cartesian product of variable-disjoint sets of instantiated literals. To formally state the property, we first define some notation.

For a clause Cj in Φ, we write Cji(Φ) to denote the subset of Cj within yi’s dependency set, i,j(Φ) the set of instantiated literals Yi,a¯ibi where the assignment (a¯i,bi) falsifies Cji, and j(Φ) the set of instantiated clauses 𝒞a¯,b¯ where (a¯,b¯) falsifies ¬Cj. We now formally define these sets.

Definition 6.

Let Φ be a k-DQBFcnfd formula as in (2). For every j[m] and i[k], we define the sets Cji(Φ), i,j(Φ) and j(Φ):

  • Cji(Φ){Cj|var()Di{yi}}.

  • i,j(Φ){Yi,a¯ibi|(a¯i,bi)¬Cji}.

  • j(Φ){𝒞a¯,b¯|(a¯,b¯)¬Cj}.

When Φ is clear from the context, we simply write Cji, i,j and j.

We remark that (a¯,b¯)¬Cj if and only if (a¯,b¯) falsifies Cj, and similarly (a¯i,bi)¬Cji if and only if (a¯i,bi) falsifies Cji. Note also that exp(Φ)=j[m]CjC and that the sets 1,j,,k,j are pairwise variable-disjoint.

We now state the property formally.

Lemma 7.

Let Φ be as in Equation 2. For every j[m], j=1,j××k,j.

Proof.

We fix an arbitrary j[m]. We first prove the “” direction. Let 𝒞a¯,b¯ be a clause in j. That is, (a¯,b¯) is an assignment that falsifies Cj. Let a¯i be the restriction of a¯ on Di and bi be the restriction of b¯ on yi, for every i[k]. By definition, 𝒞a¯,b¯=i[k]Yi,a¯ibi. Since (a¯,b¯) falsifies Cj, it is consistent with the cube ¬Cj. Hence, for every i[k], each a¯i,bi is consistent with the cube ¬Cji. By definition, the literal Yi,a¯ibi belongs to i,j, for every i[k].

Next, we prove the “” direction. Let C(L1Lk)1,j××k,j. By definition, for every i[k], there is assignment (a¯i,bi) such that Li is the literal Yi,a¯ibi and (a¯i,bi) is consistent with the cube ¬Cji. Due to the disjointness of the dependency sets, all the assignments (a¯i,bi)’s are pairwise consistent. Let (a¯,b¯) be their union i[k](a¯i,bi).333Note that, as stated in Section 2.2, we assume that i[k]Di=x¯. Since each (a¯i,bi) is consistent with ¬Cji, (a¯,b¯) is consistent with all of ¬Cj1,,¬Cjk. Therefore, (a¯,b¯) is a falsifying assignment of Cj. By definition, the clause 𝒞a¯,b¯=i[k]Yi,a¯ibi is in j.

4.2 𝟐-DQBFcnfd

In this section we will show that sat(2-DQBFcnfd) is NL-complete, as stated formally in Theorem 8.

Theorem 8.

sat(2-DQBFcnfd) is NL-complete.

Before we proceed to the formal proof, we first review some notation and terminology. Recall that the expansion of a 2-DQBF formula (even when the matrix is in an arbitrary form) is a 2-CNF formula, which can be viewed as a directed graph, called the implication graph (of the 2-CNF formula) [1]. The vertices in the implication graph are the literals, and for every clause () in the formula, there are two edges, (¬) and (¬).

The following notion of a disimplex will be useful.

Definition 9 (Disimplex [11]).

Given two sets of vertices 𝒜,, the disimplex from 𝒜 to is the directed graph K(𝒜,)(𝒜,𝒜×).

In other words, a disimplex K(𝒜,) is a complete directed bipartite graph where all the edges are oriented from 𝒜 to .

The rest of this subsection is devoted to the proof of Theorem 8. For the rest of this subsection, we fix a 2-DQBFcnfd formula Φ=z¯1,z¯2,y1(z¯1),y2(z¯2).j[m]Cj. We will simply write Cji, i,j and j to denote the sets Cji(Φ), i,j(Φ) and j(Φ) defined in Definition 6. For a set of literals, we denote by ^ the set of negated literals in , i.e., ^{¬L|L}.

We first show that the implication graph of exp(Φ) is a finite union of disimplices, and that the length of any shortest path between two vertices is bounded above by 2m.

Lemma 10.

Let G=(𝒱,) be the implication graph of exp(Φ). The set of edges can be represented as

=j[m](^1,j×2,j)(^2,j×1,j),

which is the union of the edge sets of m pairs of disimplices. Moreover, for every two vertices L,L𝒱, if L is reachable from L, then there exists a path from L to L of length at most 2m.

Proof.

By definition,

={(¬Y1,z¯1b1,Y2,z¯2b2),(¬Y2,z¯2b2,Y1,z¯1b1)|φ[a¯1z¯1,a¯2z¯2,b1y1,b2y2]=}.

Since any assignment that falsifies φ must falsify some clause Cj in φ, we have

=j[m]𝒞a¯,b¯j{(¬Y1,z¯1b1,Y2,z¯2b2),(¬Y2,z¯2b2,Y1,z¯1b1)}.

By Lemma 7, we have j={(L1L2)|L11,j,L22,j} for every j[m]. Therefore,

=j[m](^1,j×2,j)(^2,j×1,j).

For the second part of the proof, assume, for the sake of contradiction, that P=(L0,,Ln) is a shortest path from L to L with n>2m. Then, by the pigeonhole principle, there must be some 0i1<i2<n such that (Li1,Li1+1) and (Li2,Li2+1) belongs to the same disimplex K, and thus (Li1,Li2+1)K. We can then construct a shorter path P=(L0,,Li1,Li2+1,,Ln) from L to L, which contradicts with the assumption that P is a shortest path.

Proof of Theorem 8.

For the NL membership, we devise an algorithm by checking the unsatisfiability of exp(Φ) directly on these disimplices. We present an NL algorithm that checks the unsatisfiability of exp(Φ) by looking for cycles containing both an instantiated literal and its negation in the implication graph G=(𝒱,) of exp(Φ).444Recall that a 2-SAT formula φ is unsatisfiable if and only if there is a cycle containing both a literal and its negation in the implication graph of φ.

A naïve idea is to first non-deterministically guess a literal L and the paths P from L to ¬L and P from ¬L to L. However, since |𝒱| is exponential in |x¯|, representing a literal L𝒱 takes linear space. We instead make use of Lemma 10 and guess the disimplex each edge of P,P belongs in, denoted by the sequences (K(𝒜1,1),,K(𝒜n,n)) and (K(𝒜1,1),,K(𝒜n,n)) with n,n[2m], where each 𝒜, is of the form i,j or ^i,j. We then check if

  • for every step j[n1], whether there exists some Ljj𝒜j+1,

  • for every step j[n1], whether there exists some Ljj𝒜j+1, and

  • whether there exists some L0𝒜1^n𝒜^1n.

We reject if one of the checks fails, and accept if all checks succeed. In the latter case, there are paths P=(L0,L1,,Ln1,¬L0) and P=(¬L0,L1,L2,,Ln1,L0).

In particular, i,ji,j is non-empty if and only if i=i and Cji and Cji are consistent. The consistency check can be done by keeping two pointers to the position in the clause using log(|x¯|+2) bits per pointer. This can easily be generalised to check the intersection of any constant number of i,j’s. For ^i,j, simply replace Cji with the clause C^ji with the sign of yi flipped if a literal of yi is present, i.e.,

C^ji(Cji{yi,¬yi})(¬Cji{yi,¬yi}).

For the hardness proof, we provide a reduction from 2-SAT to 2-DQBFcnfd. Let φ=j[m](j,1j,2) be a 2-CNF formula over the variables x¯=(x1,,xn). The idea is to encode the assignment of x¯ with a function f:[n]{,} where f(i) represents the assignment of xi.

In the following, for a literal , let ind() denote the index i where xi=var(). We construct the 2-DQBFcnfd formula

Ψu¯1,u¯2,y1(u¯1),y2(u¯2).ψ,

where u¯1 and u¯2 have length O(logn) for representing the variables in x¯ and ψ is a CNF formula that states the following.

  • ((u¯1=i)(u¯2=i))(y1y2) for every i[n].

  • ((u¯1=ind(j,1))(u¯2=ind(j,2)))((y1sgn(j,1))(y2sgn(j,2))) for every j[m].

The first item states that the Skolem functions for y1 and y2 must be the same. The second item implies that a¯x¯ is a satisfying assignment of φ if and only if the function fa¯ is a Skolem function for Ψ by encoding the assignment a¯x¯ as a function fa¯:[n]{,}, where fa¯(i)=a¯x¯(xi).

4.3 𝒌-DQBFcnfd: 𝒌𝟑 and Non-Constant 𝒌

For k3 and even arbitrary DQBFcnfd, we show that it is NP-complete. Let Φ be as in Equation 2. To show the NP membership, we first show that for every j[m], some yi is responsible for satisfying all the clauses in j.

Lemma 11.

Let Φ be as in Equation 2 and let Y¯ be the vector of variables in exp(Φ). For every j[m] and every assignment a¯ on Y¯, a¯ satisfies the CNF formula 𝒞j𝒞 if and only if a¯ satisfies the cube Li,jL for some i[k].

Proof.

We first prove the “if” direction. Let a¯ be an assignment on Y¯. If a¯ satisfies the cube Li,jL, then, for every clause 𝒞𝔧, by Lemma 7, there exists some Li,j𝒞 that is satisfied by a¯. Thus, 𝒞 is satisfied by L.

For the “only if” direction, assume that a¯ does not satisfy the cube Li,jL for every i[k]. That is, for every i[k], there exists some Lii,j such that a¯(var(Li))sgn(Li). It follows that the clause (i[k]Li)j is falsified by a¯, and thus a¯ does not satisfy 𝒞j𝒞.

 Remark 12.

Recall that exp(Φ)=j[m]𝒞j𝒞. Thus, Lemma 11 can be reformulated as follows. For every assignment a¯Y¯, a¯Y¯ satisfies exp(Φ) if and only if there is a function ξ:[m][k] such that for every j[m], a¯Y¯ satisfies the cube Lξ(j),jL. Intuitively, the function ξ is the mapping that maps index j to index i in the statement in Lemma 11. This formulation will be useful later on.

The next lemma shows the NP membership of sat(DQBFcnfd).

Lemma 13.

sat(DQBFcnfd) is in NP.

Proof.

Consider a DQBFcnfd formula:

Φ=z¯1,,z¯k,y1(z¯1),,yk(z¯k).j[m]Cj

with k existential variables and m clauses.

By the reformulation of Lemma 11 in Remark 12, an assignment a¯ on Y¯ satisfies exp(Φ) if and only if there exists a mapping ξ:[m][k] such that a¯Y¯ satisfies j[m]Lξ(j),jL, or equivalently, if there exists a partition {Si}i[k] of [m] such that for each i[k], the following QBF Φi is satisfiable:

Φi=z¯i,yi.jSiCji.

Note that since Φi contains only one existential variable and it depends on all universal variables, checking the satisfiability of Φi is in P using Lemma 3.555In fact, it is in L, as shown later in Theorem 19. An NP algorithm guesses the partition {Si}i[k] and verifies that Φi is satisfiable for every i[k].

Theorem 14.

sat(k-DQBFcnfd) for every k3 and sat(DQBFcnfd) are NP-complete.

Proof.

By Lemma 13, sat(DQBFcnfd) is in NP. Since k-DQBFcnfdDQBFcnfd, sat(k-DQBFcnfd) is also in NP for every constant k.

For the NP-hardness, a reduction from 3-SAT to 3-DQBFcnfd can be done analogous to that of Theorem 8. A complete proof can be found in Section B.2. Since adding more existential variables only increases the complexity, sat(k-DQBFcnfd) for every k3 and sat(DQBFcnfd) are also NP-hard.

4.4 𝒌-DQBFcnf𝜶: Different Dependency Structure

It has been shown in [18] that sat(DQBFcnfde) is Σ3P-complete and sat(DQBFcnfdec) is NEXP-complete. Since DQBFcnfdecDQBFcnfdsDQBF and sat(DQBF) is also NEXP-complete, we know sat(DQBFcnfds) is NEXP-complete. In this section, we show a surprising result that, when k is a constant, sat(k-DQBFcnfα) has the same complexity as k-SAT and sat(k-DQBFcnfd) for every α{de,dec,ds}. Since k-DQBFcnfdk-DQBFcnfdek-DQBFcnfdeck-DQBFcnfds, it suffices to show the results for sat(k-DQBFcnfds).

We start with sat(2-DQBFcnfds).

Theorem 15.

sat(2-DQBFcnfds) is NL-complete.

Proof.

Since 2-DQBFcnfds2-DQBFcnfd, the hardness follows from Theorem 8. For NL membership, consider a 2-DQBFcnfds formula Φx¯,y1(D1),y2(D2).φ. First, we check whether D1 and D2 are disjoint using only logarithmic space. (See Remark 1.) If D1 and D2 are disjoint, we use the algorithm from Theorem 8 to determine its satisfiability. Otherwise, without loss of generality, we may assume that D1D2. We will show that this case can be decided in deterministic logarithmic space. Indeed, in this case Φ is a standard QBF and we can perform a level-ordered Q-resolution proof [16]. Since there are only two existential variables, any proof uses at most four clauses, and we can simply iterate through all 4-tuples of clause indices and check whether Q-resolution can be performed.

In the following, we give an alternative proof that works directly on the semantics of QBF. To ease notation, we write z¯1D1, z¯2D2D1, and z¯3x¯D2. Note that Φ is equivalent to a QBF

Ψ=z¯1,y1,z¯2,y2,z¯3.φ=z¯1,y1,z¯2.(z¯3.φ[y2])(z¯3.φ[y2])=z¯1.(z¯2.(z¯3.φ[(y1,y2)])(z¯3.φ[(y1,y2)]))(z¯2.(z¯3.φ[(y1,y2)])(z¯3.φ[(y1,y2)])),

which is false if and only if there are assignments a¯z¯1, b¯z¯2, and c¯z¯2 such that

z¯3.φ[(y1,y2,a¯z¯1,b¯z¯2)]z¯3.φ[(y1,y2,a¯z¯1,b¯z¯2)]z¯3.φ[(y1,y2,a¯z¯1,c¯z¯2)]
z¯3.φ[(y1,y2,a¯z¯1,c¯z¯2)]

is false. Since each of the four disjuncts is still in CNF, the formula is false if and only if each disjunct has a falsified clause. This is equivalent to finding four clauses C1,C2,C3,C4φ such that

  • the clauses C1,C2,C3,C4 are consistent on the variables in z¯1,

  • the clauses C1,C2 are consistent on the variables in z¯2,

  • the clauses C3,C4 are consistent on the variables in z¯2, and

  • ¬C1, ¬C2, ¬C3, and ¬C4 are consistent with ¬y1¬y2, ¬y1y2, y1¬y2, and y1y2, respectively.

To find such clauses, we can iterate through all 4-tuples of clause indices and check whether the properties hold.

Next, we show that for every k3, sat(k-DQBFcnfds) is NP-complete, just like k-SAT.

Theorem 16.

For every constant k3, sat(k-DQBFcnfds) is NP-complete.

Before we present the proof of Theorem 16, we note that since k-DQBFcnfdek-DQBFcnfdeck-DQBFcnfds, we obtain the following results as a corollary of Theorems 8, 14, 15, and 16.

Corollary 17.

sat(k-DQBFcnfde) and sat(k-DQBFcnfdec) are NL-complete when k=2 and NP-complete when k3.

The rest of this section is devoted to the proof of Theorem 16.

Proof of Theorem 16.

We will consider the membership proof. The hardness follows from Theorem 14. We fix a k-DQBFcnfds formula:

Φx¯,y1(D1),,yk(Dk).j[m]Cj. (3)

Without loss of generality, we may assume that no existential variable has an empty dependency set, since our NP algorithm can guess an assignment to such variables at the outset. By Lemma 2, we may also assume that every universal variable appears in some dependency set. We say that a dependency set Di is maximal if there is no j where DiDj. An existential variable yi is maximal if its dependency set is maximal.

To decide the satisfiability of Φ, our algorithm works by recursion on the number of existential variables. The base case is when there is only one existential variable. This case can be decided in polynomial time and, in fact, in deterministic logspace. See, e.g., Theorem 19.

For the induction step, we pick a maximal variable yt. There are two cases.

Case 1: 𝑫𝒕=𝒙¯.

We apply Lemma 3 and eliminate yt, resulting in a formula with one less existential variable and O(m2) clauses. We then proceed recursively.

Case 2: 𝑫𝒕𝒙¯.

We deal with this case by generalising the technique in Lemma 13.

Let {i1,,ip}={i|DiDt} and {i1,,iq}={i|DiDt=}. For each j[m], we partition Cj into two clauses:

Cj+t {|dep()Dt}
Cjt CjCj+t

Intuitively, Cj+t is the subclause of Cj that includes all the literals with dependency sets inside Dt. On the other hand, Cjt is the subclause that contains the rest of the literals. Due to the laminar structure of the dependency sets and that yt is a maximal variable, Cjt={|dep()Dt=}.

For a function ξ:[m]{+t,t}, we define two formulas:

Φ+t,ξ x¯,yi1(Di1),,yip(Dip).j:ξ(j)=+tCj+t
Φt,ξ x¯,yi1(Di1),,yiq(Diq).j:ξ(j)=tCjt

We have the following lemma.

Lemma 18.

Φ is satisfiable if and only if there is a function ξ:[m]{+t,t} such that Φ+t,ξ and Φt,ξ are both satisfiable.

Note that guessing ξ requires m bits. The algorithm guesses the function ξ and verifies recursively that both Φ+t,ξ and Φt,ξ are satisfiable. Since the algorithm terminates after k steps, and k is a constant, and the number of clauses constructed in each recursive step is at most quadratically many, each step can be done in polynomial time.

The proof of Lemma 18 is a generalisation of Lemma 11. Let Y¯ be the vector of variables in the expansion exp(Φ). We can show that an assignment a¯ on Y¯ satisfies exp(Φ) if and only if it satisfies exp(Φ+t,ξ) and exp(Φt,ξ) for some function ξ. A detailed proof can be found in the appendix.

5 Complexity of sat(𝒌-DQBFcnf)

In this section, we remove the constraint on the dependency structure and consider k-DQBFcnf. The case k=1 can be solved very efficiently.

Theorem 19.

sat(1-DQBFcnf) is in L.

Proof.

Let Φ=z¯1,z¯2,y(z¯1).j[m]Cj. Similar to the proof of Theorem 15, to show unsatisfiability, it suffices to find C1,C2φ such that

  • C1,C2 are consistent on the variables in z¯1, and

  • ¬C1 and ¬C2 are consistent with ¬y and y, respectively.

The correctness follows from the same reasoning.

Next, we consider the case where k=2.

Theorem 20.

sat(2-DQBFcnf) is coNP-complete.

Proof.

For membership, we give an NP algorithm for checking unsatisfiability. Let Φx¯,y1(D1),y2(D2).φ be be a 2-DQBFcnf formula. Let z¯=D1D2. Note that for every assignment a¯ on z¯, the induced formula Φ[a¯] is a 2-DQBFcnfd formula, the satisfiability of which can be decided in polynomial time by Theorem 8. Therefore, to decide whether Φ is unsatisfiable, we can guess an assignment a¯ on z¯ and accept if and only if Φ[a¯] is not satisfiable.

For hardness, we provide a reduction from the 3-DNF tautology problem to sat(2-DQBFcnf). Let φ=j[m]Qj be a 3-DNF formula over the variables x¯=(x1,,xn), where each Qj=(j,1j,2j,3) is a 3-literal cube. We construct the following 2-DQBFcnf formula:

Ψ=x¯,u¯1,u¯2,y1(x¯,u¯1),y2(x¯,u¯2).ψ1ψ2ψ3ψ4,

where u¯1,u¯2 have length O(logm) for representing the numbers in [m] and ψ1,,ψ4 are as follows.

ψ1 (u¯1=1)y1
ψ2 j[m1](((u¯1=j+1)(u¯2=j))(y2y1))
ψ3 ((u¯1=1)(u¯2=m))(y2¬y1)
ψ4 j[m]i[3](((u¯1=j)(u¯2=j)¬j,i)(y1y2))

We claim that φ is a tautology if and only if Ψ is satisfiable. To see this, we fix an arbitrary assignment a¯ on x¯ and consider the induced formula Ψ[a¯]. Note that Ψ[a¯] is a 2-DQBFcnfd formula with universal variables u¯1,u¯2. Since |u¯1|=|u¯2|=logm, the expansion exp(Ψ[a¯]) is a 2-CNF formula with 2m variables Y1,1,,Y1,m,Y2,1,,Y2,m. Here we abuse the notation and write Yi,j instead of Yi,a¯ where a¯ is the binary representation of j.

It can be easily verified that the implication graph Ga¯ of the expansion exp(Ψ[a¯]) is as shown in Figure 1, where a dashed edge ¬Qj is present if and only if a¯ falsifies the cube Qj. Indeed, ψ1 states that the edge ¬Y1,1Y1,1 is present. ψ2 states that the edges Y2,iY1,i+1 and ¬Y1,i+1¬Y2,i are present for every i[m1]. ψ3 states that the edges Y2,m¬Y1,1 and Y1,1¬Y2,m are present. Finally, ψ4 states that the dashed edges Y1,j¬QjY2,j and Y1,j¬QjY2,j are present if a¯x¯ falsifies Qj, for every j[m]. This implies that a¯x¯ falsifies all cubes in φ if and only if there exists a cycle in Ga¯. Since a cycle in Ga¯ (if exists) contains contradicting literals, a¯x¯ falsifies all cubes in φ if and only if Ψ[a¯] is not satisfiable. Since the assignment a¯ is arbitrary, φ is a tautology if and only if Ψ is satisfiable.

Figure 1: The implication graph Ga¯. Each dashed edge ¬Qi is present if and only if a¯x¯ falsifies Qi.

Next, we consider k-DQBFcnf. Note that 3-DQBFcnf subsumes both 3-DQBFcnfd and 2-DQBFcnf. Thus, sat(3-DQBFcnf) is is both NP-hard and coNP-hard. We improve these results by showing that it is Π2P-hard.

Theorem 21.

sat(3-DQBFcnf) is Π2P-hard.

Proof.

We show this by reduction from Π2-QBF in 3-CNF. The reduction is similar to the one in Theorem 14, except that the existential variables are allowed to depend on common variables, thereby enabling the encoding of a two-level QBF.

Let φ=z¯,x¯.j[m](j,1j,2j,3) be a Π2-QBF in 3-CNF. Let x¯=(x1,,xn) and for a literal , let ind() denote the index i where xi=var().

We construct the following 3-DQBFcnf formula:

Ψz¯,u¯1,u¯2,u¯3,y1(z¯,u¯1),y2(z¯,u¯2),y3(z¯,u¯3).ψ1ψ2ψ3,

where u¯1,u¯2,u¯3 have length logn for representing the variables in x¯ and each ψ1,ψ2,ψ3 is the following CNF formula:

ψ1 i[n](((u¯1=i)(u¯2=i))(y1y2))
ψ2 i[n](((u¯1=i)(u¯3=i))(y1y3))
ψ3 j[m]((σj,1σj,2σj,3)(τj,1τj,2τj,3)),

where for every i[3], σj,i and τj,i are defined as

(σj,i,τj,i)={(u¯i=ind(j,i),yisgn(j,i))if var(j,i) is existential in φ(,j,i)otherwise.

The intuition is that a vector of Skolem functions f1,,fn for x¯ in φ can be encoded as a single function g:{,}|z¯|×[n]{,}, which then corresponds to a Skolem function for each yi in Ψ. The formulas ψ1 and ψ2 state that for every Skolem functions (g1,g2,g3) for Ψ, all functions g1,g2,g3 must be the same. Then, ψ3 states that the Skolem functions f1,,fn for φ (if exists) must satisfies all the clauses C1,,Cm. Therefore, φ is a true QBF if and only if Ψ is satisfiable.

We next show a Tseitin-like transformation that requires only three additional existential variables. This is in contrast with the standard Tseitin transformation that requires as many existential variables as the length of the input formula. Our new Tseitin-like transformation leads to new hardness results for sat(5-DQBFcnf) and sat(6-DQBFcnf).

Lemma 22 (Reformulated Tseitin Transformation).

Given a k-DQBF formula, we can construct in polynomial time an equisatisfiable (k+3)-DQBFcnf formula.

Proof.

Let Φ=x¯,y1(z¯1),,yk(z¯k).φ be a k-DQBF formula where φ is a circuit with gates g1,,gm. We assume, without loss of generality, that

gi={xifor every 1inyinfor every n+1in+kfi(gli,gri)for every n+k+1im,

where li,ri[i1] are the indices of the two fan-ins of the gate gi implementing the Boolean function fi, and that gm corresponds to the primary output of the circuit.

We construct the (k+3)-DQBFcnf formula

Ψx¯,u¯1,u¯2,u¯3,y1(z¯1),,yk(z¯k),t1(x¯,u¯1),t2(x¯,u¯2),t3(x¯,u¯3).ψ,

where u¯1,u¯2,u¯3 have length logm for representing the numbers in [m] and ψ is a CNF formula with clauses encoding

  • ((u¯1=i)(u¯2=i))(t1t2) for every i[m],

  • ((u¯1=i)(u¯3=i))(t1t3) for every i[m],

  • (u¯1=i)(t1xi) for every i[n],

  • (u¯1=n+i)(t1yi) for every i[k],

  • ((u¯1=i)(u¯2=li)(u¯3=ri))(t1fi(t2,t3)) for every n+k+1im,

  • (u¯1=m)t1.

The intuitive meaning is as follows. The first two items state that the Skolem functions for t1,t2,t3 must be the same. The next three state that the Skolem function g for t1 encodes the values of the gates, where g(x¯,u¯1) is the value of gate j when u¯1 is the binary representation of j. The last item encodes that the output of the circuit must be true. The correctness proof is routine and hence omitted.

In particular, by combining Lemma 22 with the fact that sat(2-DQBF) and sat(3-DQBF) are PSPACE-complete and NEXP-complete [14], we establish the hardness of sat(5-DQBFcnf) and sat(6-DQBFcnf).

Theorem 23.

sat(5-DQBFcnf) is PSPACE-hard and sat(6-DQBFcnf) is NEXP-complete.

6 Conclusions and Future Work

While sat(k-DQBFdnfd) is as hard as sat(k-DQBF), we observe a range of differing complexity results in the CNF case. For the case of sat(k-DQBFcnfd), we show that it is in fact as easy as k-SAT – exponentially easier than sat(k-DQBF). Generalising the results in [18], we also show that sat(DQBFcnfd) is NP-complete and that sat(k-DQBFcnfα) has the same complexity as k-SAT for α{d,de,dec,ds}. For the case of k-DQBFcnf, we show that it is only coNP-complete when k=2 (whereas sat(2-DQBF) is PSPACE-complete) and of the same NEXP-complete complexity as sat(DQBF) when k6. These results show that, when parametrising DQBF with the number of existential variables, it is more natural to consider DNF as the normal form for the matrix, analogous to how CNF is considered the standard form for SAT.

The exact complexity of sat(k-DQBFcnf) is yet to be discovered for k=3, 4, and 5. In particular, the best-known membership result is still that they are in NEXP. We leave this for future work.

References

  • [1] Bengt Aspvall, Michael F. Plass, and Robert Endre Tarjan. A linear-time algorithm for testing the truth of certain quantified Boolean formulas. Inf. Process. Lett., 8(3):121–123, 1979. doi:10.1016/0020-0190(79)90002-4.
  • [2] V. Balabanov and J.-H. R. Jiang. Reducing satisfiability and reachability to DQBF. In QBF Workshop, 2015.
  • [3] Valeriy Balabanov, Hui-Ju Katherine Chiang, and Jie-Hong R. Jiang. Henkin quantifiers and Boolean formulae: A certification perspective of DQBF. Theoretical Computer Science, 523:86–100, 2014. doi:10.1016/j.tcs.2013.12.020.
  • [4] Armin Biere, Mathias Fleury, Nils Froleyks, and Marijn J. H. Heule. The SAT museum. In Matti Järvisalo and Daniel Le Berre, editors, Proceedings of the 14th International Workshop on Pragmatics of SAT, volume 3545, pages 72–87. CEUR-WS.org, 2023. URL: https://ceur-ws.org/Vol-3545/paper6.pdf.
  • [5] Armin Biere, Marijn Heule, Hans van Maaren, and Toby Walsh, editors. Handbook of Satisfiability, volume 185. IOS Press, 2009.
  • [6] Uwe Bubeck. Model-Based Transformations for Quantified Boolean Formulas. PhD thesis, University of Paderborn, 2010.
  • [7] Uwe Bubeck and Hans Kleine Büning. Dependency quantified Horn formulas: Models and complexity. In Armin Biere and Carla P. Gomes, editors, Proceedings of the International Conference on Theory and Applications of Satisfiability Testing - SAT 2006, 9th International Conference, Seattle, WA, USA, August 12-15, 2006, Proceedings, volume 4121, pages 198–211. Springer, 2006. doi:10.1007/11814948_21.
  • [8] Uwe Bubeck and Hans Kleine Büning. Rewriting (dependency-)quantified 2-CNF with arbitrary free literals into existential 2-HORN. In Ofer Strichman and Stefan Szeider, editors, Proceedings of the International Conference on Theory and Applications of Satisfiability Testing - SAT 2010, 13th International Conference, volume 6175, pages 58–70. Springer, 2010. doi:10.1007/978-3-642-14186-7_7.
  • [9] Fa-Hsun Chen, Shen-Chang Huang, Yu-Cheng Lu, and Tony Tan. Reducing NEXP-complete problems to DQBF. In Alberto Griggio and Neha Rungta, editors, Proceedings of the 22nd Conference on Formal Methods in Computer-Aided Design, pages 199–204, 2022. doi:10.34727/2022/isbn.978-3-85448-053-2_26.
  • [10] Johannes Klaus Fichte, Daniel Le Berre, Markus Hecher, and Stefan Szeider. The silent (r)evolution of SAT. Commun. ACM, 66(6):64–72, 2023. doi:10.1145/3560469.
  • [11] Ana Paulina Figueroa and Bernardo Llano. An infinite family of self-diclique digraphs. Appl. Math. Lett., 23(5):630–632, 2010. doi:10.1016/j.aml.2010.01.026.
  • [12] Andreas Fröhlich, Gergely Kovásznai, Armin Biere, and Helmut Veith. iDQ: Instantiation-based DQBF solving. In Proceedings of the Fifth Pragmatics of SAT workshop, volume 27, pages 103–116, 2014. doi:10.29007/1s5k.
  • [13] Long-Hin Fung, Che Cheng, Yu-Wei Fan, Tony Tan, and Jie-Hong Roland Jiang. 2-DQBF solving and certification via property-directed reachability analysis. In Proceedings of the Conference on Formal Methods in Computer-Aided Design, pages 197–207. IEEE, 2024. doi:10.34727/2024/isbn.978-3-85448-065-5_25.
  • [14] Long-Hin Fung and Tony Tan. On the complexity of k-DQBF. In Proceedings of the International Conference on Theory and Applications of Satisfiability Testing, volume 271, pages 10:1–10:15. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2023. doi:10.4230/LIPIcs.SAT.2023.10.
  • [15] Robert Ganian, Tomás Peitl, Friedrich Slivovsky, and Stefan Szeider. Fixed-parameter tractability of dependency QBF with structural parameters. In Diego Calvanese, Esra Erdem, and Michael Thielscher, editors, Proceedings of the 17th International Conference on Principles of Knowledge Representation and Reasoning, KR 2020, Rhodes, Greece, September 12-18, 2020, pages 392–402, 2020. doi:10.24963/kr.2020/40.
  • [16] Mikolás Janota and João Marques-Silva. Expansion-based QBF solving versus Q-resolution. Theor. Comput. Sci., 577(C):25–42, 2015. doi:10.1016/j.tcs.2015.01.048.
  • [17] G. Peterson, J. Reif, and S. Azhar. Lower bounds for multiplayer noncooperative games of incomplete information. Computers & Mathematics with Applications, 41(7):957–992, 2001. doi:10.1016/S0898-1221(00)00333-3.
  • [18] Christoph Scholl, Jie-Hong Roland Jiang, Ralf Wimmer, and Aile Ge-Ernst. A PSPACE subclass of dependency quantifed Boolean formulas and its effective solving. In Proceedings of the AAAI Conference on Artificial Intelligence, pages 1584–1591. AAAI Press, 2019. doi:10.1609/aaai.v33i01.33011584.
  • [19] G. Tseitin. On the complexity of derivation in propositional calculus. In Studies in Constructive Mathematics and Mathematical Logic, Part II, 1968.
  • [20] Ralf Wimmer, Karina Gitina, Jennifer Nist, Christoph Scholl, and Bernd Becker. Preprocessing for DQBF. In Marijn Heule and Sean A. Weaver, editors, Proceedings of the International Conference on Theory and Applications of Satisfiability Testing, volume 9340, pages 173–190, Cham, 2015. Springer International Publishing. doi:10.1007/978-3-319-24318-4_13.
  • [21] Lintao Zhang. Solving QBF with combined conjunctive and disjunctive normal form. In Proceedings of the 21st National Conference on Artificial Intelligence, pages 143–150. AAAI Press, 2006. URL: http://www.aaai.org/Library/AAAI/2006/aaai06-023.php.

Appendix A Additional Background

We provide additional background knowledge in this section.

A.1 Tseitin Transformation

Tseitin transformation is a standard technique to turn an arbitrary Boolean satisfiability problem into an equisatisfiable one in 3-CNF form [19]. It can be directly lifted to QBF and DQBF by allowing the Tseitin variables to depend on every universal variable.

Given a DQBF

Φ=x¯,y1(z¯1),,yk(z¯k).φ,

where φ is a circuit with gates g1,,gm, we assume, without loss of generality, that

gi={xifor every 1inyinfor every n+1in+kfi(gli,gri)for every n+k+1im,

where li,ri[i1] are the indices of the two fanins of the gate gi implementing the Boolean function fi.

The core idea of Tseitin transformation is that we can introduce a fresh variable ti for every gate gi and encode locally the relation between the inputs and the output of the gate. The formula ψG encoding these constraints is a CNF formula encoding

  • tixi for every 1in,

  • tiyin for every n+1in+k, and

  • tifi(tli,tri) for every n+k+1im.

We then have Φ is equisatisfiable to

Ψ1x¯,y1(z¯1),,yk(z¯k),t¯(x¯).ψGtm.

To transform it to DNF form, as noted in [9], Φ is equisatisfiable to

Ψ2x¯,t¯,y1(z¯1),,yk(z¯k).ψGtm.

Note that the matrix of the formula is in DNF form. In the context of QBF, it can be thought of as applying the Tseitin transformation on ¬φ and then negating the resulting existential formula [21]. We refer to this as the DNF version of Tseitin transformation.

Appendix B Omitted Proofs

We fill in the omitted proofs in the main text in this section.

B.1 Complexity of sat(𝒌-DQBFdnfd)

Proof of Theorem 4.

Since we are considering subclasses of k-DQBF, it suffices to show the hardness part.

First, observe that the DNF version of the Tseitin transformation (see Section A.1) preserves both the number of existential variables and the dependency structure. Therefore, we have that sat(k-DQBFdnfα) is as hard as sat(k-DQBFα) for every combination of α and k. In addition, observe that the formula constructed to show the PSPACE- and NEXP-hardness of sat(2-DQBF) and sat(3-DQBF) in [14, Theorems 4 and 5] are in fact 2-DQBFd and 3-DQBFd, respectively. Thus, we have sat(k-DQBFdnfd) is coNP-, PSPACE-, and NEXP-complete for k=1, k=2, and k3, respectively.

B.2 Hardness of sat(𝟑-DQBFcnfd)

Hardness Proof of Theorem 14.

Let φ=j[m](j,1j,2j,3) be a 3-CNF formula over the variables x¯=(xi)i[n]. We again write ind()i if var()=xi.

We construct the following 3-DQBFcnfd formula

Ψu¯1,u¯2,u¯3,y1(u¯1),y2(u¯2),y3(u¯3).ψ,

where u¯1, u¯2, and u¯3 are of length O(logn) for representing the variables in x¯ and ψ is a CNF formula that states the following.

  • (u¯1=i)(u¯2=i)(y1y2) for every i[n],

  • (u¯1=i)(u¯3=i)(y1y3) for every i[n], and

  • (u¯1=ind(j,1))(u¯2=ind(j,2))(u¯3=ind(j,3))(y1sgn(j,1))(y2sgn(j,2))(y3sgn(j,3)) for every j[m].

The first two items state that the Skolem functions for y1, y2, and y3 must be the same. The third item implies that a¯x¯ is a satisfying assignment of φ if and only if the function fa¯ is a Skolem function for Ψ by encoding a¯x¯ as a function fa¯:[n]{,}, where fa¯(i)=a¯x¯(xi).

B.3 Proof of Lemma 18

Recall that we fix a k-DQBFcnfds formula:

Φx¯,y1(D1),,yk(Dk).j[m]Cj. (4)

Let y¯=(y1,,yk). We recall some of the notation used in the main text.

  • yt is a maximal variable where Dtx¯.

  • {i1,,ip}={i|DiDt} and {i1,,iq}={i|DiDt=}.

  • For each j[m]:

    Cj+t {|dep()Dt}
    Cjt CjCj+t
  • For a function ξ:[m]{+t,t}, we define two formulas:

    Φ+t,ξ x¯,yi1(Di1),,yip(Dip).js.t.ξ(j)=+tCj+t
    Φt,ξ x¯,yi1(Di1),,yiq(Diq).js.t.ξ(j)=tCjt

Finally, we recall Lemma 18.

See 18

To prove Lemma 18, we will need additional notation and terminology. Let St{yi|DiDt}. Note that ytSt. To ease notation, we write Dtc:=x¯Dt and Stc:=y¯St. That is, Dtc is the complement of Dt w.r.t. x¯ and Stc is the complement of St w.r.t. y¯. In the following, we will drop the subscript t in Dt,St,Dtc,Stc and simply write D,S,Dc,Sc.

For an assignment (a¯D,b¯S), we define the clause cl(a¯D,b¯S):

cl(a¯D,b¯S)iSYi,a¯ibi,where eacha¯i=a¯D(Di)andbi=b¯S(yi).

Similarly, for an assignment (a¯Dc,b¯Sc), we define the clause cl(a¯Dc,b¯S(y)c):

cl(a¯Dc,b¯Sc)yiScYi,a¯ibi,where eacha¯i=a¯Dc(Di)andbi=b¯Sc(yi).

We now generalise Definition 6 to the laminar case.

Definition 24.

Let Φ be as in Equation 4. For every j[m], we define the sets:

+t,j(Φ) {cl(a¯D,b¯S)|(a¯D,b¯S)¬Cj+t}
t,j(Φ) {cl(a¯Dc,b¯Sc)|(a¯Dc,b¯Sc)¬Cjt}
j(Φ) {𝒞a¯,b¯|(a¯x¯,b¯y¯)¬Cj}

The following lemma is a generalisation of Lemma 7 to the laminar case.

Lemma 25.

Let Φ be as in Equation 4. Then, for every j[m], j=+t,j(Φ)×t,j(Φ).

Proof.

The proof is a straightforward generalisation of Lemma 7. For the sake of completeness, we present it here.

We fix an arbitrary j[m]. We first prove the “” direction. Let 𝒞a¯,b¯ be a clause in j. That is, (a¯x¯,b¯y¯) is an assignment that falsifies Cj. By definition, 𝒞a¯,b¯=i[k]Yi,a¯ibi. Since (a¯,b¯) falsifies Cj, it is consistent with the cube ¬Cj.

Let a¯t=a¯x¯(D) and b¯t=b¯y¯(S). Let a¯0=a¯x¯(Dc) and b¯0=b¯y¯(Sc). Both are consistent with the cubes ¬Cj+t and ¬Cjt, respectively. By definition, the clause cl(a¯tD,b¯tS) is in +t,j(Φ) and the clause cl(a¯tDc,b¯tSc) is in t,j(Φ). The inclusion follows since

𝒞a¯,b¯=cl(a¯tD,b¯tS)cl(a¯tDc,b¯tSc)

Next, we prove the “” direction. Let C+t,j(Φ)×t,j(Φ). Let CB1B2, where B1+t,j(Φ) and B2t,j(Φ). By definition,

  • there is assignment (a¯1D,b¯1S) such that B1 is the clause cl(a¯1D,b¯1S),

  • there is assignment (a¯2Dc,b¯2Sc) such that B2 is the clause cl(a¯2Dc,b¯2Sc).

Since the dependency sets of the variables in S are disjoint with the dependency sets of the variables in Sc , the assignments (a¯1D,b¯1S) and (a¯2Dc,b¯2Sc) are consistent. Let (a¯x¯,b¯y¯) be their union, which is consistent with ¬Cj+t¬Cjt. Therefore, (a¯x¯,b¯y¯) is a falsifying assignment of Cj. By definition, the clause 𝒞a¯,b¯=B1B2 and it is in j.

Now, Lemma 18 follows from the following lemma, which is the generalisation of Lemma 11.

Lemma 26.

Let Φ be as in Equation 4 and let Y¯ be the vector of variables in exp(Φ). For every assignment a¯Y¯, a¯Y¯ satisfies exp(Φ) if and only if it satisfies exp(Φ+t,ξ) and exp(Φt,ξ) for some function ξ:[m]{+t,t}.

Proof.

The proof is similar to Lemma 26. For completeness, we reprove it here. We observe that:

exp(Φ)= j[m]CjC
= j[m](C1,C2)+t,j(Φ)×t,j(Φ)C1C2

The second equality comes from Lemma 25. Thus, exp(Φ) is satisfiable iff there is a function ξ:[m]{+t,t} such that

(j:ξ(j)=+tC1+t,j(Φ)C1)(j:ξ(j)=tC2t,j(Φ)C2)

is satisfiable. The first part of the conjunction is precisely exp(Φ+t,ξ) and the second part is precisely exp(Φt,ξ).