Spectral Refutations of Semirandom -LIN over Larger Fields
Abstract
We study the problem of strongly refuting semirandom - instances: systems of -sparse inhomogeneous linear equations over a finite field . For the case of , this is the well-studied problem of refuting semirandom instances of -XOR, where the works of [18, 20] establish a tight trade-off between runtime and clause density for refutation: for any choice of a parameter , they give an -time algorithm to certify that there is no assignment that can satisfy more than -fraction of constraints in a semirandom -XOR instance, provided that the instance has constraints, and the work of [28] provides good evidence that this tight up to a factor via lower bounds for the Sum-of-Squares hierarchy. However, for larger fields, the only known results for this problem are established via black-box reductions to the case of , resulting in a gap between the current best upper and lower bounds.
In this paper, we give an algorithm for refuting semirandom - instances with the “correct” dependence on the field size . For any choice of a parameter , our algorithm runs in -time and strongly refutes semirandom - instances with at least constraints. We give good evidence that this dependence on the field size is optimal by proving a lower bound for the Sum-of-Squares hierarchy that matches this threshold up to a factor. Our results also extend beyond finite fields to the more general case of and arbitrary finite Abelian groups. Our key technical innovation is a generalization of the “ Kikuchi matrices” of [36, 18] to larger fields, and finite Abelian groups more generally.
Keywords and phrases:
Spectral Algorithms, CSP Refutation, Kikuchi MatricesCategory:
APPROXCopyright and License:
2012 ACM Subject Classification:
Theory of computation Approximation algorithms analysisFunding:
This material is based upon work supported by the National Science Foundation under Grant No. DMS-1926686.Editors:
Alina Ene and Eshan ChattopadhyaySeries and Publisher:
Leibniz International Proceedings in Informatics, Schloss Dagstuhl – Leibniz-Zentrum für Informatik
1 Introduction
A - instance over a finite field is a collection of -sparse -linear inhomogeneous equations in variables . That is, each equation has the form , where , , and . For worst-case instances, there has been a long line of work on developing algorithms for and proving hardness of determining the value, i.e., the maximum fraction of satisfiable constraints, of a - instance, with a special focus on the case of , where the - problem is commonly referred to as “-XOR”. For - instances with constraints, Håstad’s PCP [19] shows that for , it is NP-hard to decide if the instance has value (a random assignment is near-optimal) or (nearly satisfiable). On the algorithmic side, the work of [6] gives a PTAS for -XOR instances with constraints (“maximally dense” instances). And, assuming the exponential time hypothesis [21], the work of [15] gives an essentially tight “runtime vs. number of constraints” trade-off for worst-case instances. For the case of , the - problem is closely related to the Unique Games Conjecture [25], which conjectures that deciding if a - instance has value or is NP-hard when is sufficiently large as a function of .
Despite its worst-case hardness, there have been many works on designing algorithms for random -XOR instances. As random -XOR instances with constraints have value with high probability, the natural problem to consider is the task of (strong) refutation, where the algorithmic goal is to output a certificate that the value of the random instance is at most . This problem has been the focus of several works [16, 10, 2, 34], with the ultimate goal being to understand the trade-off between “runtime” and “number of constraints”. That is, given and a “time budget” of for a parameter (which may be super-constant, e.g., for constant ), how many constraints, as a function of and , are required to refute a random -XOR in time? This question was essentially answered by [34], which gives for any , an -time algorithm that, with high probability over a random instance, certifies that a random -XOR instance has maximum value at most if it has at least constraints. This trade-off between runtime and number of constraints is conjectured to be essentially optimal, with evidence coming in the form of lower bounds in various restricted computational models [17, 13, 35, 9, 32, 29, 7, 28]. More recently, there has been a flurry of work [1, 18, 20] on designing algorithms for -XOR in the harder semirandom model, where the “left-hand sides” of the equations are worst case, and only the “right-hand sides” are chosen at random. These works show that one can refute semirandom instances at the same runtime vs. number of constraints trade-off as shown in [34]. That is, semirandom instances are just as easy to refute as fully random ones.
Thus, for the Boolean case of , we have a near-complete understanding: for any choice of the parameter , if the number of constraints in the semirandom -XOR instance is at least , then the algorithm of [1, 18, 20] can refute the instance in time, and if the number of constraints is smaller than , the lower bound of, e.g., [28] provides good evidence that there is no algorithm to refute in time, even for random instances.
What can we say about semirandom -LIN over finite fields ? There is a simple reduction to the Boolean case (see Appendix B in [2]) that loses an factor in the number of constraints. That is, the reduction gives an algorithm to refute such instances with at least constraints. On the side of lower bounds, the work [28] establishes the same lower bound as in the case of , i.e., with no field-dependent factor. Thus, for e.g., with , there a large gap between the upper and lower bounds.
Understanding the optimal dependence on the field size for refuting semirandom -LIN instances has many potential applications. One immediate application is obtaining better attacks on the (sparse) learning parity with noise (LPN) assumption commonly used in cryptography. The -sparse LPN assumption111The phrase “sparse LPN” sometimes refers to the case when the secret is sparse. Here, we mean that the equations are sparse. is the distinguishing variant of the refutation problem for - – the “dense” LPN assumption removes the sparsity requirement on the equations – and is considered a foundational assumption in cryptography. While many cryptographic applications only use this assumption over the field [5], many applications such as constructing indistinguishability obfuscation [22, 23, 33] and others [12, 11] require fields of much larger (even superpolynomial) size.
As another application, one could hope to prove stronger lower bounds for information-theoretic private information retrieval (PIR) schemes. Recent work of [4] has led to a flurry of improvements in lower bounds for binary locally decodable [4, 8, 24] and locally correctable codes [26, 37, 3, 27] by establishing a connection between these lower bounds and refuting “semirandom-like” instances of -LIN over . While these results can be extended to larger, constant-sized alphabets (see, e.g., Appendix A in [4]), information-theoretic PIR schemes are essentially equivalent to locally decodable codes over alphabets of size. Thus, the large loss in above prevents the approach of [4] from being able to prove stronger PIR lower bounds.
1.1 Our results
In this paper, we investigate the dependence on the field size in the number of constraints required to refute semirandom - instances. As our main results, we give both an algorithm and a matching Sum-of-Squares lower bound with the “correct” polynomial dependence on the field size .
Before stating our main results, we formally define semirandom -LIN instances.
Definition 1 ((Semirandom) -LIN over ).
An instance of - is , where is a set of -sparse vectors222A vector is -sparse if . in and for all . We view as representing the system of linear equations with variables specified by for each . The value of the instance, which we denote by , is the maximum over of the fraction of constraints satisfied by . That is, .
An instance of -LIN is random if is a random subset of -sparse vectors and each is drawn independently and uniformly from . An instance of -LIN is semirandom if each is drawn independently and uniformly from (but may be arbitrary).
The first main result of this paper gives a refutation algorithm for semirandom - for any field .
Theorem 2 (Tight refutation of semirandom -).
Fix . There is an algorithm that takes as input a - instance in variables and outputs a number in time with the following two guarantees:
-
(1)
for every instance ;
-
(2)
If and is drawn from the semirandom distribution described in Definition 1, then with probability over the draw of the semirandom instance, i.e., the randomness of , it holds that .
As a byproduct of the analysis of Theorem 2, we also establish an extremal combinatorics statement on the existence of short linear dependencies in any sufficiently dense collection of -sparse vectors over a finite field .
Theorem 3 (Short linear dependencies in -sparse vectors over ).
Let be a set of -sparse vectors in with . Then, there exists a set with and non-zero coefficients in such that:
That is, is a linearly dependent subset of .
Theorem 3 is a generalization of the hypergraph Moore bound, or Feige’s conjecture on the existence of short even covers in hypergraphs [14] (first proven in [18] for the case of ) to arbitrary finite fields. The hypergraph Moore bound establishes a rate vs. distance trade-off for binary LDPC codes (see [30]). One can similarly view Theorem 3 as establishing such a trade-off for LDPC codes over general finite fields.
The key technical innovation in our proofs of Theorems 2 and 3 is the introduction of a new Kikuchi matrix for any finite field (Definition 10). Our Kikuchi matrices are a generalization of the “ Kikuchi matrices” of [36, 18] to other fields, and finite Abelian groups more generally. As we point out after Definition 10, the natural generalization of the Kikuchi matrix is not sufficient, and we have to add an additional condition to the matrix to make the analysis work (see Remark 11).
In our second main result, we prove a Sum-of-Squares lower bound for refuting - instances that nearly matches the threshold in Theorem 2.
Theorem 4 (Sum-of-Squares lower bounds for refuting random -LIN, informal).
Fix and . Let be a random - instance . Then, with large probability over the draw of , it holds that
-
(1)
;
-
(2)
The degree- Sum-of-Squares relaxation for - fails to refute .
The threshold in Theorem 4 matches the threshold in Theorem 2 up to the “lower order” factor. However, it has a one limitation: the degree of the Sum-of-Squares relaxation can only be at most , rather than the whole of range of to . That is, Theorem 4 can only give a subexponential-time lower bound of for the Sum-of-Squares algorithm when . It turns out that this is nearly necessary, as there is a very simple refutation algorithm, implementable within degree Sum-of-Squares, that out-performs the algorithm in Theorem 2 when is very large.
Theorem 5 (Simple refutation algorithm).
Fix . There is an algorithm that takes as input a - instance in variables and outputs a number in time with the following two guarantees:
-
(1)
for every instance ;
-
(2)
If and is drawn from the fully random distribution described in Definition 1, then with probability over the draw of the random instance, it holds that ;
-
(3)
If and is drawn from the semirandom distribution described in Definition 1, then with probability over the draw of the semirandom instance, i.e., the randomness of , it holds that .
Theorem 5 is nearly identical to Theorem 2: the main difference is that, ignoring the lower order term, the “constraint threshold” is now instead of , and this is smaller when . As this algorithm is “captured” by the Sum-of-Squares hierarchy, the Sum-of-Squares lower bound in Theorem 4 is false when . Thus, the range of where the lower bound in Theorem 4 holds is nearly tight: we show it holds for , and it is false for .
We also extend our refutation result for - to - for composite , and more generally to any finite Abelian group . Below, we define the natural extension of Definition 1 to Abelian groups, and then state our generalization of Theorem 2 to this setting. Recall that by the fundamental theorem of finite Abelian groups, any finite Abelian group is isomorphic to for some .
Definition 6 ((Semirandom) -LIN over an Abelian group ).
Let for some . An instance of - is , where is a set of -sparse vectors in and for all . We view as representing the system of linear equations with variables specified by for each . Note that the inner product notation here represents where the multiplication is direct product multiplication over each . The value of the instance, which we denote by , is the maximum over of the fraction of constraints satisfied by . That is, .
An instance of -LIN is random if is a random subset of -sparse vectors and each is drawn independently and uniformly from .
An instance of -LIN is semirandom if each is drawn independently and uniformly from (but may be arbitrary).
Definition 6 allows each equation to have coefficients on the variables, which was natural in the case of finite fields (Definition 1), but may appear strange in the case of a general finite Abelian group, where it is perhaps more natural to only have coefficients that are . However, because we are working with semirandom instances, the “left-hand sides” of the equations are arbitrary, and so semirandom instances “capture” the special case where the coefficients are all . We choose this perhaps nonstandard definition because it is more general; it seamlessly captures both the case of a finite field or a ring , where coefficients are natural, and also a finite Abelian group.
Our final result generalizes Theorem 2 to the case of -.
Theorem 7 (Tight refutation of semirandom -).
Fix . There is an algorithm that takes as input a - instance in variables and outputs a number in time with the following two guarantees:
-
(1)
for every instance ;
-
(2)
If and is drawn from the semirandom distribution described in Definition 6, then with probability over the draw of the semirandom instance, i.e., the randomness of , it holds that .
The proof of Theorem 7 encounters additional technical difficulties compared to Theorem 2, arising from zero divisors in for composite . Roughly, this allows a semirandom instance to embed equations within a subgroup of , by, e.g., choosing only equations where the coefficients are divisible by some integer , and handling this issue requires an additional step and an extra factor .
2 Preliminaries
2.1 Basic notation
We let denote the set . For two subsets , we let denote the symmetric difference of and , i.e., . For a natural number , we let be the collection of subsets of of size exactly .
For a rectangular matrix , we let denote the spectral norm of .
For a vector , we let and . For a field with , we let denote the trace map of over .
For a matrix , we let be the trace of , i.e., . This should not be confused with the trace map for field elements, which we denote by . For two vectors we define the following inner product:
2.2 Fourier analysis
Let be an Abelian group isomorphic to via the isomorphism . For , we let . For , we define
These functions form a Fourier basis for , as shown in [31]. This extends to a Fourier basis for as follows. For , we define
For a function , we have that for each ,
where .
For the special case of functions with , we note that the standard Fourier basis is simply
2.3 Binomial coefficient inequalities
In this section, we state and prove the following fact about binomial coefficients that we will use.
Proposition 8.
Let be positive integers with . Let be constant and be asymptotically large with . Then,
Proof.
We have that
Using that finishes the proof of the first equation.
We also have that
and this is since and is constant.
3 Spectral Algorithms for Refuting Semirandom - for Even
As our proof overview, we will give a complete proof of Theorem 2 in the case when is even. As in [18, 20], the proof is substantially simpler in the case of even . We will assume familiarity with the notation and conventions defined in Section 2.
Our refutation algorithm for semirandom -LIN roughly follows the framework established in [18, 20]. The main technical tool we use is a generalization of the Kikuchi matrix of [36] for to arbitrary finite fields . Analyzing the spectral norm of this matrix requires a more complicated trace moment calculation as compared to the case of , and requires a careful choice of the Kikuchi matrix (see Remark 11).
We let and denote a primitive -th root of unity in .
3.1 Step 1: Expressing a - instance as a polynomial in
As the first step in the proof, we make the following observation, which shows that we can express the fraction of constraints satisfied by an assignment as a polynomial in variables in .
Observation 9.
For a - instance , let denote the fraction of constraints satisfied by an assignment . Then, we can express as a polynomial in . That is,
Proof.
Recall that a constraint in takes the form for , where are the variables. The indicator variable for this event is simply:
where . Indeed, if , then for all . If , i.e., it is some , then . Hence, it follows that
which finishes the proof.
3.2 Step 2: Expressing as a quadratic form on a Kikuchi matrix
In light of ˜9, it thus remains to find a certificate that bounds . We do this by generalizing the analysis of [18] and constructing a Kikuchi matrix whose spectral norm provides a certificate bounding the maximum value of .
Definition 10.
(Even-arity Kikuchi matrix over ). Let be a parameter,333Note that it suffices to prove Theorem 2 for in this range. and let . For each -sparse vector and , we define a matrix as follows. First, we identify with the set of -sparse vectors in . Then, for -sparse vectors , we let
where we say if and .
Let be a polynomial defined by a set of -sparse vectors from and complex coefficients . We define the level- Kikuchi matrix for this polynomial to be . We refer to the graph (with complex weights) defined by the underlying adjacency matrix as the Kikuchi graph.
Remark 11.
Our Kikuchi matrix in Definition 10 has an additional condition that . A perhaps more natural generalization of the Kikuchi matrix of [36, 18] would be the matrix where this condition is removed, i.e., we only require that . As we shall see, when we do the trace moment calculation at the end of Section 3.3, it is crucial that for any and , there is at most one such that for some . That is, the number of edges adjacent to “coming from” a constraint is at most . If this uniqueness of did not hold, we would lose an additional factor of in the number of constraints that we require in Theorem 2. This is a substantial increase, as e.g., this would increase the number of constraints when to when the correct dependence is . The condition that implies uniqueness of above, and without this condition we could have a with , in which case for an -sparse vector in for all .
Remark 12.
We note that in Definition 10, we have . The reason we use the above definition with two parameters and is that it will be more convenient when counting walks in the matrix , as it makes explicit the choice of and . Note that in , there could exist and with for some , and we need to count these terms separately.
Observation 13.
The Kikuchi matrix is always Hermitian.
Proof.
To see this note that , , and is commutative.
The following observation shows that we can express as a quadratic form on the matrix defined in Definition 10. Thus, bounds .
Observation 14.
For define as follows. For each -sparse , we set . Then
where .
Proof.
For each and , the term appears once for each pair of vertices with . Let us now argue that the number of such pairs is exactly . We will count the number of pairs by first specifying and , and then by specifying for each (and same for ). We first require that , which in turn means that has intersection exactly with and likewise for . Thus, we can pay to count the number of ways to split into two equal parts. Second, we need to specify , which is equal to , which is choices. Finally, we need to specify for each and for each . For each , we set , and for each , we can set to be any element in . Note that specifying then determines , so we have choices. This finishes the proof.
Next, we compute the average degree (or number of non-zero entries) in a row/column in .
Observation 15.
For with , we define the graph degree as normal:
Then .
Proof.
Each contributes to the total degree, so the average degree is . We then have:
where the last inequality follows from Proposition 8.
3.3 Step 3: Bounding the spectral norm of via the trace moment method
The following spectral norm bound now implies Theorem 2.
Lemma 16.
Let be the level- Kikuchi matrix over defined in Definition 10 for the -LIN instance . Let be the diagonal matrix where and . Suppose that the ’s are drawn independently and uniformly from , i.e., the instance is semirandom (Definition 1). Then, with probability , it holds that
We postpone the proof of Lemma 16 to the end of this section, and now finish the proof of Theorem 2.
Proof of Theorem 2 from Lemma 16.
Let be the input to the algorithm. Given , the algorithm constructs the matrix and computes , where . It remains to argue that this quantity has the desired properties.
Let be the polynomial defined in ˜9. For each , letting be the vector defined in ˜14, we have
where we use that since for all , and that . Hence,
To prove Item 2, we observe that by Lemma 16, if is semirandom, then with high probability over the draw of the ’s, it holds that
From ˜15, we have . Hence, if we have that for a sufficiently large constant , then with probability . This proves Item 2.
It remains to prove Lemma 16, which we do using the trace moment method.
Proof of Lemma 16.
By ˜13, we have that for any positive integer . Because the ’s are drawn independently from , the matrix is a random matrix. By Markov’s inequality,
We note this event is the same as , and for we have . This immediately gives us that with probability , . We then have that
Let us now make the following observation. Let be a term in the above sum. Fix , and let denote the set of such that . We observe that if for some , , then . Indeed, this is because is independent for each , and so , and
Then, since is uniform from , it follows that if , and if . This motivates the following definition.
Definition 17 (Trivially closed sequence).
Let . We say that is trivially closed with respect to if it holds that . We say that the sequence is trivially closed if it is trivially closed with respect to all .
With the above definition in hand, we have shown that
The following lemma yields the desired bound on .
Lemma 18.
.
With Lemma 18, we thus have the desired bound . Taking to be for a sufficiently large constant and applying Markov’s inequality finishes the proof.
Proof of Lemma 18.
We bound the sum as follows. First, we observe that for a trivially closed sequence , we have
where we define . Thus, the sum that we wish to bound in Lemma 18 simply counts the total weight of “trivially closed walks” (where ) in the Kikuchi graph , where the weight of a walk is simply .
Let us now bound this total weight by encoding a walk as follows.
-
First, we write down the start vertex .
-
For , we let be if for some . In this case, we say that the edge is “old”. Otherwise , and we say that the edge is “new”.
-
For , if is then we encode by writing down the smallest such that . We note that we do not need to specify the element , as for any vertex , there is at most one and one such that . As pointed out in Remark 11, this crucially saves us a factor of in the total number of constraints that we require.
-
For , if is then we encode by writing down an integer in that specifies the edge we take to move to from (we associate to the edges adjacent to with an arbitrary fixed map).
With the above encoding, we can now bound the total weight of all trivially closed walks as follows. First, let us consider the total weight of walks for some fixed choice of . We have choices for the start vertex . For each where , we have choices for , and we multiply by a weight of . For each where , we have at most choices for the index , and we multiply by a weight of . Hence, the total weight for a specific is at most , where is the number of such that .
Finally, we observe that any trivially closed walk must have . Hence, after summing over all , we have the final bound of , which finishes the proof.
References
- [1] Jackson Abascal, Venkatesan Guruswami, and Pravesh K. Kothari. Strongly refuting all semi-random Boolean CSPs. In Proceedings of the 2021 ACM-SIAM Symposium on Discrete Algorithms, SODA 2021, Virtual Conference, January 10 – 13, 2021, pages 454–472. SIAM, 2021. doi:10.1137/1.9781611976465.28.
- [2] Sarah R. Allen, Ryan O’Donnell, and David Witmer. How to Refute a Random CSP. In IEEE 56th Annual Symposium on Foundations of Computer Science, FOCS 2015, Berkeley, CA, USA, 17-20 October, 2015, pages 689–708. IEEE Computer Society, 2015. doi:10.1109/FOCS.2015.48.
- [3] Omar Alrabiah and Venkatesan Guruswami. Near-tight bounds for 3-query locally correctable binary linear codes via rainbow cycles. In 65th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2024, Chicago, IL, USA, October 27-30, 2024. IEEE, 2024. doi:10.1109/FOCS61266.2024.00112.
- [4] Omar Alrabiah, Venkatesan Guruswami, Pravesh K. Kothari, and Peter Manohar. A near-cubic lower bound for 3-query locally decodable codes from semirandom CSP refutation. In Proceedings of the 55th Annual ACM Symposium on Theory of Computing, STOC 2023, Orlando, FL, USA, June 20-23, 2023, pages 1438–1448. ACM, 2023. doi:10.1145/3564246.3585143.
- [5] Benny Applebaum, Boaz Barak, and Avi Wigderson. Public-key cryptography from different assumptions. In Proceedings of the 42nd ACM Symposium on Theory of Computing, STOC 2010, Cambridge, Massachusetts, USA, 5-8 June 2010, pages 171–180. ACM, 2010. doi:10.1145/1806689.1806715.
- [6] Sanjeev Arora, David R. Karger, and Marek Karpinski. Polynomial time approximation schemes for dense instances of NP-hard problems. In Proceedings of the Twenty-Seventh Annual ACM Symposium on Theory of Computing, 29 May-1 June 1995, Las Vegas, Nevada, USA, pages 284–293. ACM, 1995. doi:10.1145/225058.225140.
- [7] Boaz Barak, Siu On Chan, and Pravesh K. Kothari. Sum of Squares Lower Bounds from Pairwise Independence. In Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, STOC 2015, Portland, OR, USA, June 14-17, 2015, pages 97–106. ACM, 2015. doi:10.1145/2746539.2746625.
- [8] Arpon Basu, Jun-Ting Hsieh, Pravesh Kothari, and Andrew Lin. Improved lower bounds for all odd-query locally decodable codes. Electron. Colloquium Comput. Complex., pages TR24–189, 2024. URL: https://eccc.weizmann.ac.il/report/2024/189.
- [9] Siavosh Benabbas, Konstantinos Georgiou, Avner Magen, and Madhur Tulsiani. SDP gaps from pairwise independence. Theory of Computing, 8(1):269–289, 2012. doi:10.4086/TOC.2012.V008A012.
- [10] Amin Coja-Oghlan, Andreas Goerdt, and André Lanka. Strong refutation heuristics for random -SAT. Combinatorics, Probability & Computing, 16(1):5, 2007.
- [11] Henry Corrigan-Gibbs, Alexandra Henzinger, Yael Kalai, and Vinod Vaikuntanathan. Somewhat homomorphic encryption from linear homomorphism and sparse LPN. IACR Cryptol. ePrint Arch., page 1760, 2024. URL: https://eprint.iacr.org/2024/1760.
- [12] Quang Dao, Yuval Ishai, Aayush Jain, and Huijia Lin. Multi-party homomorphic secret sharing and sublinear MPC from sparse LPN. In Advances in Cryptology – CRYPTO 2023 – 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part II, volume 14082 of Lecture Notes in Computer Science, pages 315–348. Springer, 2023. doi:10.1007/978-3-031-38545-2_11.
- [13] Uriel Feige. Relations between average case complexity and approximation complexity. In Proceedings of the thiry-fourth annual ACM symposium on Theory of computing, pages 534–543, 2002. doi:10.1145/509907.509985.
- [14] Uriel Feige. Small linear dependencies for binary vectors of low weight. In Building Bridges: Between Mathematics and Computer Science, pages 283–307. Springer, 2008.
- [15] Dimitris Fotakis, Michael Lampis, and Vangelis Th. Paschos. Sub-exponential Approximation Schemes for CSPs: From Dense to Almost Sparse. In 33rd Symposium on Theoretical Aspects of Computer Science, STACS 2016, February 17-20, 2016, Orléans, France, volume 47 of LIPIcs, pages 37:1–37:14. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2016. doi:10.4230/LIPICS.STACS.2016.37.
- [16] Andreas Goerdt and André Lanka. Recognizing more random unsatisfiable 3-sat instances efficiently. Electron. Notes Discret. Math., 16:21–46, 2003. doi:10.1016/S1571-0653(04)00461-5.
- [17] Dima Grigoriev. Linear lower bound on degrees of positivstellensatz calculus proofs for the parity. Theoretical Computer Science, 259(1):613–622, 2001. doi:10.1016/S0304-3975(00)00157-2.
- [18] Venkatesan Guruswami, Pravesh K. Kothari, and Peter Manohar. Algorithms and certificates for Boolean CSP refutation: smoothed is no harder than random. In STOC ’22: 54th Annual ACM SIGACT Symposium on Theory of Computing, Rome, Italy, June 20 – 24, 2022, pages 678–689. ACM, 2022. doi:10.1145/3519935.3519955.
- [19] Johan Håstad. Some optimal inapproximability results. Journal of the ACM (JACM), 48(4):798–859, 2001. doi:10.1145/502090.502098.
- [20] Jun-Ting Hsieh, Pravesh K. Kothari, and Sidhanth Mohanty. A simple and sharper proof of the hypergraph Moore bound. In Proceedings of the 2023 ACM-SIAM Symposium on Discrete Algorithms, SODA 2023, Florence, Italy, January 22-25, 2023, pages 2324–2344. SIAM, 2023. doi:10.1137/1.9781611977554.CH89.
- [21] Russell Impagliazzo and Ramamohan Paturi. On the Complexity of k-SAT. J. Comput. Syst. Sci., 62(2):367–375, 2001. doi:10.1006/JCSS.2000.1727.
- [22] Aayush Jain, Huijia Lin, and Amit Sahai. Indistinguishability obfuscation from well-founded assumptions. In STOC ’21: 53rd Annual ACM SIGACT Symposium on Theory of Computing, Virtual Event, Italy, June 21-25, 2021, pages 60–73. ACM, 2021. doi:10.1145/3406325.3451093.
- [23] Aayush Jain, Huijia Lin, and Amit Sahai. Indistinguishability obfuscation from LPN over , DLIN, and PRGs in NC0. In Advances in Cryptology – EUROCRYPT 2022 – 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 – June 3, 2022, Proceedings, Part I, volume 13275 of Lecture Notes in Computer Science, pages 670–699. Springer, 2022. doi:10.1007/978-3-031-06944-4_23.
- [24] Oliver Janzer and Peter Manohar. A lower bound for odd query locally decodable codes from bipartite kikuchi graphs. Electron. Colloquium Comput. Complex., pages TR24–187, 2024. URL: https://eccc.weizmann.ac.il/report/2024/187.
- [25] Subhash Khot. On the power of unique 2-prover 1-round games. In Proceedings on 34th Annual ACM Symposium on Theory of Computing, May 19-21, 2002, Montréal, Québec, Canada, pages 767–775. ACM, 2002. doi:10.1145/509907.510017.
- [26] Pravesh K. Kothari and Peter Manohar. An exponential lower bound for linear 3-query locally correctable codes. In Proceedings of the 56th Annual ACM Symposium on Theory of Computing, STOC 2024, Vancouver, BC, Canada, June 24-28, 2024, pages 776–787. ACM, 2024. doi:10.1145/3618260.3649640.
- [27] Pravesh K. Kothari and Peter Manohar. Exponential lower bounds for smooth 3-lccs and sharp bounds for designs. In 65th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2024, Chicago, IL, USA, October 27-30, 2024. IEEE, 2024. doi:10.1109/FOCS61266.2024.00110.
- [28] Pravesh K. Kothari, Ryuhei Mori, Ryan O’Donnell, and David Witmer. Sum of squares lower bounds for refuting any CSP. In Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2017, Montreal, QC, Canada, June 19-23, 2017, pages 132–145. ACM, 2017. doi:10.1145/3055399.3055485.
- [29] Ryuhei Mori and David Witmer. Lower Bounds for CSP Refutation by SDP Hierarchies. In Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, APPROX/RANDOM 2016, September 7-9, 2016, Paris, France, volume 60 of LIPIcs, pages 41:1–41:30, 2016. doi:10.4230/LIPICS.APPROX-RANDOM.2016.41.
- [30] Assaf Naor and Jacques Verstraëte. Parity check matrices and product representations of squares. Combinatorica, 28(2):163–185, 2008. doi:10.1007/S00493-008-2195-2.
- [31] Ryan O’Donnell. Analysis of boolean functions. Cambridge University Press, 2014.
- [32] Ryan O’Donnell and David Witmer. Goldreich’s PRG: evidence for near-optimal polynomial stretch. In 2014 IEEE 29th Conference on Computational Complexity (CCC), pages 1–12. IEEE, 2014. doi:10.1109/CCC.2014.9.
- [33] Seyoon Ragavan, Neekon Vafa, and Vinod Vaikuntanathan. Indistinguishability obfuscation from bilinear maps and LPN variants. In Theory of Cryptography – 22nd International Conference, TCC 2024, Milan, Italy, December 2-6, 2024, Proceedings, Part IV, volume 15367 of Lecture Notes in Computer Science, pages 3–36. Springer, 2024. doi:10.1007/978-3-031-78023-3_1.
- [34] Prasad Raghavendra, Satish Rao, and Tselil Schramm. Strongly refuting random CSPs below the spectral threshold. In Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2017, Montreal, QC, Canada, June 19-23, 2017, pages 121–131. ACM, 2017. doi:10.1145/3055399.3055417.
- [35] Grant Schoenebeck. Linear level lasserre lower bounds for certain k-csps. In 49th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2008, October 25-28, 2008, Philadelphia, PA, USA, pages 593–602. IEEE Computer Society, 2008. doi:10.1109/FOCS.2008.74.
- [36] Alexander S. Wein, Ahmed El Alaoui, and Cristopher Moore. The Kikuchi Hierarchy and Tensor PCA. In 60th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2019, Baltimore, Maryland, USA, November 9-12, 2019, pages 1446–1468. IEEE Computer Society, 2019. doi:10.1109/FOCS.2019.000-2.
- [37] Tal Yankovitz. A stronger bound for linear 3-lcc. In 65th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2024, Chicago, IL, USA, October 27-30, 2024. IEEE, 2024. doi:10.1109/FOCS61266.2024.00109.
