Avoiding Range via Turan-Type Bounds
Abstract
Given a circuit from a circuit class , with , finding a such that , , is the range avoidance problem (denoted by -Avoid). Deterministic polynomial time algorithms (even with access to oracles) solving this problem are known to imply explicit constructions of various pseudorandom objects like hard Boolean functions, linear codes, PRGs etc.
Deterministic polynomial time algorithms are known for -Avoid when , and for -Avoid when , where is the class of circuits with bounded fan-in which have constant depth and the output depends on at most of the input bits. On the other hand, it is also known that -Avoid when is at least as hard as explicit construction of rigid matrices. In fact, algorithms for solving range avoidance for even circuits imply new circuit lower bounds.
In this paper, we propose a new approach to solving the range avoidance problem via hypergraphs. We formulate the problem in terms of Turan-type problems in hypergraphs of the following kind: for a fixed -uniform hypergraph , what is the maximum number of edges that can exist in , which does not have a sub-hypergraph isomorphic to ? We show the following:
-
We first demonstrate the applicability of this approach by showing alternate proofs of some of the known results for the range avoidance problem using this framework.
-
We then use our approach to show (using several different hypergraph structures for which Turan-type bounds are known in the literature) that there is a constant such that Monotone--Avoid can be solved in deterministic polynomial time when .
-
To improve the stretch constraint to linear, more precisely, to , we show a new Turan-type theorem for a hypergraph structure (which we call the loose -cycles). More specifically, we prove that any connected 3-uniform linear hypergraph with edges must contain a loose cycle. This may be of independent interest.
-
Using this, we show that Monotone--Avoid can be solved in deterministic polynomial time when , thus improving the known bounds of -Avoid for the case of monotone circuits. In contrast, we note that efficient algorithms for solving Monotone--Avoid, already imply explicit constructions for rigid matrices.
-
We also generalise our argument to solve the special case of range avoidance for where each output function computed by the circuit is the majority function on its inputs, where .
Keywords and phrases:
circuit lower bounds, explicit constructions, range avoidance, linear hypergraphs, Turán number of hypergraphsCategory:
RANDOMFunding:
Neha Kuntewar: This work was supported by Prime Minister’s Research Fellowship, Govt. of India.Copyright and License:
2012 ACM Subject Classification:
Theory of computation Circuit complexityAcknowledgements:
The authors would like to thank the anonymous reviewers for their insightful comments, which led to improvement in the presentation of the paper.Editors:
Alina Ene and Eshan ChattopadhyaySeries and Publisher:
Leibniz International Proceedings in Informatics, Schloss Dagstuhl – Leibniz-Zentrum für Informatik
1 Introduction
Let be a Boolean circuit with gates, with . The range of the function represented by the circuit : . Clearly, such that . The range avoidance problem (denoted by Avoid) asks, given a circuit , with , find a .
The Avoid problem (introduced by [14]) has been shown to have connections to some of the central research questions in circuit lower bounds and pseudorandomness. In particular, even an algorithm for Avoid is known to imply new circuit lower bounds [15] and new constructions of many other pseudorandom objects [15].
On the algorithms side, Avoid has a trivial algorithm. Indeed, given a circuit with , choose and use the oracle to check if such that . Since , there are at least fraction of s which are outside , and hence the algorithm succeeds with at least probability. Designing a deterministic polynomial time algorithm, with access to an oracle ( algorithm) to solve Avoid is a central open problem. Recently, [2] obtained the first single-valued algorithm for Avoid which works infinitely often. Subsequently, [17] gave an improved algorithm that works for all , thus establishing explicit functions in requiring maximum circuit complexity. [2] showed an unconditional zero-error pseudodeterministic algorithm with an oracle and one bit of advice that solves Avoid for infinitely many inputs. These results imply pseudo-deterministic constructions for Ramsey graphs, rigid matrices, pseudo-random generators etc.(See [2]). [11] shows that if there is a deterministic polynomial time algorithm for Avoid then either or there does not exist JLS secure .
Given the central nature of the problem, it is also meaningful to consider simpler versions first: consider -Avoid to be the restricted version of Avoid where the circuit is guaranteed to be from the class . For which classes of circuits do we have an efficient (or ) algorithm for -Avoid? On this frontier, Ren, Santhanam and Wang [18] showed that an algorithm for -Avoid implies breakthrough lower bounds even when is restricted to weaker circuit models such as and circuits. To go down even further, for every constant , consider the restricted class of circuits where the depth of the circuit is constant and each output bit depends on at most of the input bits. In a surprising result, Ren, Santhanam and Wang [18] showed that an algorithm for -Avoid implies algorithms for -Avoid. Additionally, this will also imply new circuit lower bounds - that there is a family of functions in that requires circuits of depth at least .
Complementing the above, [18] also exhibited algorithm for Avoid, when is restricted to De Morgan formulas of size with . At the low-end regime, [8] showed a polynomial time algorithm for class, where each output bit depends on at most input bits. They show a general template for obtaining algorithms for restricted classes via hitting set constructions. In particular, they give algorithms for circuits, de Morgan formulas, CNF or DNF, provided the stretch is large enough. En route, they also give a general method for obtaining the hitting set in polynomial time using the approximation degree of polynomials. Complementing this further, [6] designed deterministic polynomial time algorithms for all -Avoid for . For , which was the frontier beyond [8], this requires . They also showed the reason for the lack of progress for -Avoid by proving that a deterministic polynomial time algorithm for -Avoid, where would imply explicit construction of rigid matrices in deterministic polynomial time. This demonstrates the importance of the stretch function in the context of Avoid problem.
Our Results
In this paper, we propose a new approach to the range avoidance problem for circuits via Turan-type extremal problems in hypergraphs. For an circuit , for each function where , let denote the set of input variables that depends on. Let denote the hypergraph defined as follows: Let be the set of inputs in . For , define a hyperedge as . Thus the multiset has exactly elements, each of size at most . Let be the family of functions that appear in the circuit , and let be a labelling of the edges of the hypergraph with the corresponding function. Without loss of generality, by assigning colors to Boolean bits, say red for , and blue for , we can interpret these functions as functions from , which induces a color to the hyperedge given any -coloring of the vertices of the hypergraph. A -coloring of the hyperedges of is said to be a -coloring if there is a vertex coloring which induces this edge coloring via . With this notation, we state the following theorem, which essentially follows from the above definition (see section 3).
Theorem 1.
Let be a circuit and be the corresponding hypergraph and let be the labelling function. Suppose contains a sub-hypergraph and an edge-coloring of which is not a -coloring, where both the subhypergraph and the edge-coloring can be found in polynomial time. Then, there is a polynomial time algorithm to solve Avoid for .
The main idea of the above proof is that it suffices to identify a sub-hypergraph in such that there is an edge-coloring of which is not -coloring on . If we can ascertain the existence of a copy of ’ by extremal hypergraph theory, then it can be leveraged to solve the Avoid problem. In particular, this formulates range avoidance problem in terms of Turan-type extremal problems in hypergraphs of the following kind - for a fixed family of hypergraphs , what is the maximum number of edges that can exist in an -vertex hypergraph that avoids any member of the family as an (induced) subgraph? This is particularly well-studied for -uniform hypergraphs and is denoted by . Notice that the family may critically depend on the set of functions , and the mapping , and hence on the circuit . A natural question is, is there a family of hypergraphs that works for all circuits in the circuit class111We remark that while it may not be easy to find the hypergraph structure from the given circuit in general, for the important special cases of the problem mentioned in the previous discussion, just the exhaustive search based on the circuit structure will yield efficient algorithms to find the hypergraph structure. for which we are interested to solve Avoid problem.
We first demonstrate immediate, simple applications of this framework for designing algorithms for Avoid in restricted settings. As mentioned above, [8] designed a simple iterative algorithm for solving Avoid when the input is restricted to circuits where each output function depends on at most input bits. We show that the same special case can also be solved using our approach. Thus, as a warm-up, we derive an alternative proof of the following theorem (originally due to [8]) using our framework.
Theorem 2.
There is a deterministic polynomial time algorithm for -Avoid when . Using the same framework, there is a polynomial time algorithm for solving Andk, Or -Avoid, for a fixed .
As a second demonstration of our framework, we use tools from extremal graph theory to provide deterministic polynomial time algorithms for Avoid when contains only and functions that depend on exactly input bits. We remark that such powerful tools are not needed to solve this special case, as the iterative algorithmic idea due to [8] can be extended to this case as well. Nevertheless, we argue that it serves as a demonstration of our technique itself. We state both of these applications as the following proposition.
Proposition 3.
There is a deterministic polynomial time algorithm for -Avoid when . Using the same framework, there is a polynomial time algorithm for solving Andk, Or -Avoid, for a fixed .
We now demonstrate the main application of this framework. Towards describing the setting of our application, we study the complexity of Avoid in the restricted case of when the circuit is monotone. A first observation is that by applying De Morgan’s law we can reduce the Avoid (when ) in polynomial time to -Avoid where is restricted to monotone circuits, where reduction preserves the depth of the circuit and at most doubles the size of the circuit. Hence, solving Avoid even for monotone circuits implies breakthrough circuit lower bounds. We provide the details of the following proposition in the full version [16].
Proposition 4.
If , Avoid reduces to Monotone-Avoid in polynomial time.
Therefore, we can restrict our attention to solving the range avoidance problem for the monotone circuits. We also observe the following corollary for the case of circuits, which are the current boundary for polynomial time algorithms solving Avoid. For any , if , -Avoid reduces to Monotone--Avoid in deterministic polynomial time. In particular, when , -Avoid reduces to Monotone--Avoid in deterministic polynomial time. In the remaining part of the paper, we use the framework in Theorem 1 to show polynomial time algorithms for Monotone--Avoid and related problems.
Deterministic Polynomial Time Algorithm for Monotone--Avoid with Quadratic stretch
We now show the main technical application of the framework in the case when contains only MAJ function on inputs, with the additional constraint that two functions should depend on at most one common input variable. As per the above formulation, this makes the hypergraph to be linear and -uniform. In the setting of -uniform linear hypergraphs, using Turan-type results for specifically designed graphs in , we can use Theorem 1 for deriving polynomial time algorithms for solving Avoid for specific classes of circuits.
Turan-type extremal problems for hypergraphs were introduced by [1] and bounds are known (see [12] for a survey) for for a few hypergraphs . Bounds are known for when is a grid [5], wickets [19], Fano plane [13] (see section 2 for a brief overview of Turan-type extremal problems, and exact definition of these hypergraphs). We exhibit several different fixed hypergraphs and use them to provide different proofs of the following algorithmic upper bound
Theorem 5.
Monotone--Avoid when for any constant can be solved in deterministic polynomial time.
Our proof relies on a reduction of the problem to a more restricted case of Monotone--Avoid where each individual output function is the majority of three input bits. We call this version -Avoid. Notice that for any two functions, there can be at most two input bits that both of them can depend on. By using a combinatorial argument on the circuit, we show how to reduce -Avoid to the case where two functions can depend on at most one common input. We denote this version as One-Intersect-MAJ3-Avoid. As mentioned above, using Theorem 1 along with the fact that is -uniform, and , we design polynomial time algorithms for One-Intersect-MAJ3-Avoid where each function is majority on three inputs and two different functions depend on at most one common input bit. We exhibit several different hypergraphs - wickets (Lemma 18), grid (Lemma 20), and several other structures -cage, weak Fano plane, -butterfly, -odd kite (see full version [16]) which can be also used to derive polynomial time algorithms for One-Intersect-MAJ3-Avoid. Extremal bounds are known for only when is a weak Fano plane, grid and the wicket. The best known bounds for among these are when is the hypergraph called a wicket (see Section 2 for a definition), and hence we use it in the proof of Theorem 5.
Observing that the above reduction to the monotone case also doubles the number of input bits on which each function depends, for -Avoid with , this implies a reduction to Mon--Avoid. We use Theorem 1, with as the grid (see (Lemma 20)), we show that:
Theorem 6.
There is a deterministic polynomial time algorithm for One-Intersect--Avoid when .
However, unlike the case when , it is unclear how to reduce Monotone--Avoid to -Avoid, and then further to -Avoid. Indeed, designing polynomial time algorithms for Monotone--Avoid itself with already leads to explicit construction of rigid matrices[6], which is an important problem in the area.
Deterministic Polynomial Time Algorithm for Monotone--Avoid with Linear Stretch
Deterministic polynomial time algorithms are known[6] for -Avoid when and as mentioned above, improving the stretch constraint to would imply explicit construction of rigid matrices. We next aim to improve the stretch requirement in the above theorem to linear (in fact, to just ), thus improving the known bounds for the case of Monotone--Avoid.
Towards this, notice that the above argument for Theorem 5 uses the bounds for the Turan number from the literature in a black-box manner. In fact, the quadratic constraints on the stretch function that we have imposed in Theorem 5 can be relaxed by using stricter variants of the power-bound conjecture in the context of Turan numbers of linear hypergraphs. In particular, [7] conjectures that there exists an such that any linear hypergraph on vertices having more than edges must contain a -hypergraph222A -hypergraph in this context is a -uniform linear hypergraph which has edges spanning vertices. as a subgraph. The specific hypergraph of wicket is an example of a -hypergraph. However, there are -hypergraphs which are not suitable for our purpose. Hence, we need a stronger variant of this conjecture, which insists on having a wicket as a subgraph instead of just -subgraphs.
Specifically, in the case of wickets, which we critically use in our argument for Theorem 5, [4, 19] conjectured that the Turan number for -uniform hypergraphs avoiding wickets is , and this will directly improve the constraint on as for Theorem 5 as well.
To go beyond the limitations posed by the above structures for which Turan number bounds are classically studied, we define a new notion of cycles called -cycles in -uniform linear hypergraphs. We first show a new Turan-type theorem for such cycles for connected hypergraphs, which might be of independent interest.
Theorem 7.
Any connected 3-uniform linear hypergraph with edges must contain a loose cycle.
In the context of One-Intersect-MAJ3-Avoid where , using the above theorem, we show that the corresponding hypergraph contains a loose cycle. Using the framework of Theorem 1, where we show (Lemma 26) there exists an edge-coloring of which is not MAJ-coloring. In addition, we note that although the cycle is not of fixed size, we can find it in in polynomial time. This gives us the following theorem.
Theorem 8 (Main Theorem).
For , Monotone--Avoid can be solved in deterministic polynomial time.
Thus, while the applicability of Theorem 1 seems to impose constraints such as -uniformity and one-intersection to the cases of Avoid that they can be used to solve, the above theorem indicates that along with other combinatorial reductions to such special cases, it can still lead to useful bounds for the more general problem.
2 Preliminaries
We study the range avoidance problem for restricted circuit classes. -Avoid is the following problem: Given a multi-output circuit such that where each output function can be computed by a circuit in class , find a which is outside the range of .
Hypergraphs
We collect the preliminaries from the theory of hypergraphs that we use in the paper. We will work with hypergraphs where . A hypergraph is linear if two edges intersect in at most one vertex - , . A hypergraph is said to be -uniform if every edge has exactly elements from - . We will be working with -uniform linear hypergraphs, and in particular with . We will define some of the hypergraphs that are used in the paper.
A grid in a hypergraph is a set of vertices such that there are edges , corresponding to the vertices in the rows and columns respectively, when the vertices are arranged in the row-major order (See Figure 1(a)). A particular special hypergraph (for ) is called a wicket is the grid with one edge removed (See Figure 1(b)).
A Berge path is defined as where each edge contains vertices . A Berge path is said to be even if is even and odd otherwise. We say a hypergraph is connected if there exists a Berge path between any two pairs of vertices.
Turan-type Problems in Hypergraphs
One of the classical extremal Turan-type problems introduced in the context of hypergraphs by [1] is the following: for a fixed set of -uniform hypergraphs , what is the maximum number of edges that a -uniform linear hypergraph can have, if it does not contain a subgraph isomorphic to any of the hypergraphs in the collection of hypergraphs. This number is denoted by . The Turan density of is denoted by . It is known that a -uniform hypergraph has (also called degenerate) if and only if it is -partite.
The special -uniform hypergraph called wicket, denoted by (see figure 1(b)), forms an important step in our argument. We will need the following result about 3-uniform linear hypergraphs due to Solymosi [19].
Proposition 9 ([19]).
If a -uniform linear hypergraph does not contain a wicket, then the number of hyperedges is bounded by .
A slightly weaker result was proven by [10] where they showed that . Another standard hypergraph that we will be using is the Fano plane. A Fano plane is a -uniform linear hypergarph which is isomorphic to the hypergraph with vertex set and edge set . The following result shows a bound on .
Proposition 10 ([13]).
If a -uniform linear hypergraph contains more than then it must contain a Fano plane as a sub-hypergraph.
Coming to -uniform hypergraphs, we use the following result about grid , which exhibits a bound for .
Proposition 11 ([5]).
Let be a -uniform linear hypergraph with edges. Then contains a grid as a sub-hypergraph.
Cycles in Hypergraphs
Various notions of cycles have been explored in the hypergraph setting. [3] consider the notion of linear cycles of length (denoted by ) which is defined as set of edges such that each pair of adjacent edges (modulo ) intersect in exactly one vertex and each pair of non-adjacent edges are disjoint. [3] show that and . Another notion of cycles which is well-studied is that of Berge cycle of length , denoted by which consists of distinct edges such that each hyperedge contains vertices where and the edge contains vertices where are distinct vertices. [9] show that and .
-cycles and loose -cycles
We define a new notion of cycles called -cycles in -uniform linear hypergraphs. We define to be a relaxation of where such that , and . We call the -pair a -structure in the cycle. Alternatively, we can view using the lens of the Berge path. can be thought as where , , where and . If we relax the Berge paths to Berge walks (denoted by ) by allowing repetition of edges and vertices, we get a loose cycle. In section 4, we shall prove extremal bounds on this structure and use it to solve range avoidance for restricted circuit classes.
3 Range Avoidance for via Hypergraphs
In this section, we describe the main technical tool of the paper by formulating the range avoidance problem as a way of avoiding certain hypergraphs, leading to a Turan-type formulation of the problem.
We recall the notation from the introduction: for an circuit , let denote the hypergraph defined as follows: The set of vertices is . For , define a hyperedge as . Thus has exactly edges, each of size at most . Let be the family of functions that appear in the circuit , and let be a labelling of the edges of the hypergraph with the corresponding function. A -coloring of the hyperedges of , is said to be a -coloring if there is a vertex coloring which induces this edge coloring via . We argue the following:
Theorem 1. [Restated, see original statement.]
Let be a circuit and be the corresponding hypergraph and let be the labelling function. Suppose contains a sub-hypergraph and an edge-coloring of which is not a -coloring, where both the subhypergraph and the edge-coloring can be found in polynomial time. Then, there is a polynomial time algorithm to solve Avoid for .
Proof.
Let be the hypergraph corresponding to the circuit . Let be a sub-hypergraph of fixed size in . We note that since is of fixed size, we can exhaustively search for a copy of in in polynomial time. Let be an edge-coloring of which is not a -coloring. Let be the circuit corresponding to the hypergraph . Let be defined as follows:
where denotes that can take any value in . We will show that . Let be a function such that . For the sake of brevity, let . It suffices to show the following claim.
Claim 12.
if and only if is a valid -coloring.
Proof.
Notice that if and only if . This is equivalent to . Indeed, the latter equivalence can be obtained by setting such that and for all . Since has an edge coloring which is not a -coloring, by Claim 12 we obtain a which is outside .
3.1 Warm-up: Algorithm for -Avoid
As mentioned in the introduction, [8] described a polynomial time algorithm for solving the range avoidance problem for the circuit. In the following, we show an alternate proof of the same as an application of the framework described above.
Proposition 13.
There is a polynomial time algorithm for -Avoid when .
Proof.
Let be the given circuit. [8] observed that there are only four types of functions possible: And, Or, Parity and constant functions. We can check the type of function in polynomial time. Suppose there is a constant function in the circuit. Wlog, let this function be a constant zero function. Then, by setting the output of to and the other output bits arbitrarily, we get a string that is outside the range of the circuit.
Now we consider the other case when the circuit contains only gates, where inputs may be negated. We consider the graph corresponding to the circuit . Since , the graph corresponding to the circuit indeed contains a cycle . Furthermore, we can find this cycle in polynomial time. Thus, it suffices to obtain an edge-coloring of which is not a -coloring. We consider the following cases based on the function types of the edges participating in the cycle :
- Case 1:
-
Suppose each edge in computes a Parity of two inputs which may be negated. Consider an edge with endpoints . Consider the path starting at and ending at obtained by deleting from . Let color all the edges in to .
Let . Notice that setting the function to fixes the color of every other vertex to either or depending on the function. In particular, it fixes . This fixes the value of the function computed at , and hence the color of . Thus, flipping the color of would produce an edge-coloring that is not achievable. Therefore, the following coloring is not a -coloring.
- Case 2:
-
Suppose there exists an edge in which computes And or or of two inputs which may be negated. Let the cycle be . Consider the path obtained by deleting the edge from . Consider the following edge-coloring
Let and . We would like to show that by coloring the edges of according to , we end up fixing the colors of thus fixing the color of or we obtain an inconsistency. In the former case, flipping the color of we obtain an edge-coloring which is not a -coloring.
It suffices to show that fixes the color of or we obtain an inconsistent coloring for . We prove this by induction on the length of the path. For the base case, wlog let And. According to our , we color to , which fixes the color of both vertices incident on . By induction hypothesis, let fix the colors of all vertices participating in the path for . In the other case, when the coloring is inconsistent, we are already done. Thus, we would like to argue that fixes the other endpoint of where . Notice that, since one input feeding into is already fixed gives a way to fix the other input to by setting the color of appropriately or we get an inconsistency at this stage. Thus, inductively either we get an inconsistent coloring (in this case, color arbitrarily) or we end up fixing the colors of which in turn fixes the color of the edge .
Hence, flipping the color of fixed by the above assignment produces an edge-coloring which is not a -coloring.
By the above case analysis, we have an edge-coloring of which is not a -coloring. By theorem 1 we obtain a string outside the range of the circuit in polynomial time.
3.2 Warm-up 2: Polynomial time algorithm for -Avoid
As our next application, we show a polynomial time algorithm for solving the range avoidance problem when each output function computes an And or Or function of input bits for a fixed . Additionally, it satisfies the constraint that any two output functions share at most one input. Thus, the hypergraph corresponding to is a -uniform linear hypergraph. The sub-hypergraphs we will use in this case are -crown and . As our next application, we show a polynomial time algorithm for solving the range avoidance problem when each output function computes an And or Or function of input bits for a fixed . The sub-hypergraphs we will use in this case are -crown and . A -crown is a -uniform linear hypergraph consisting of disjoint hyperedges and an additional hyperedge intersecting each hyperedge exactly once. is a variant of the -crown where the edges intersect in a common vertex . We will use the following extremal bound on these subhypergraphs.
Proposition 14 ([20]).
Let be a -uniform linear hypergraph with where is the number of vertices with degree at least . Then contains a -crown or .
Proposition 15.
Let be a multi-output circuit where and each output function computes Andk or Ork for fixed . Additionally, any two output functions share at most one input. Then, there is a polynomial time algorithm for solving Avoid on .
Proof.
We will show an edge coloring of the hypergraphs -crown or which is not a -coloring.
By Proposition 14 we have that if then contains a or -crown. Furthermore, we can find these subhypergraphs in polynomial time. By the above argument, we can find an edge coloring of and -crown which is not a -coloring. By theorem 1 we can find a string outside the range of in polynomial time. We remark that the above special case of Avoid (-Avoid) can be solved by a direct algorithm similar to the algorithm for -Avoid due to [8]. Nevertheless, the above method is yet another demonstration of our framework for solving the Avoid problem.
3.3 Polynomial time Algorithm for -Avoid
In this subsection, we show the first application of our formulation of the problem in terms of hypergraphs. We apply it to describe a deterministic polynomial time algorithm for -Avoid.
For our purpose, we are interested in a special case of -coloring when . We define this formally below:
Definition 16 (MAJ-coloring).
Let be a -uniform hypergraph. We say is a MAJ-coloring if there exists a vertex coloring such that we have such that .
We have the following corollary from Theorem 1.
Corollary 17.
Let be a circuit where each output function computes a MAJ function. Let be the corresponding hypergraph. Suppose contains a subhypergraph such that there is an edge-coloring of which is not MAJ-coloring. Then there is a polynomial time algorithm to find a string outside the range of .
Thus it is sufficient to exhibit an explicit fixed size linear -uniform hypergraph which satisfies the conditions of Corollary 17.
Hypergraph Structure: Wickets
A wicket is defined as a grid with one edge removed. By Proposition 9, if contains more than edges, then it contains a wicket. We will show that there is an edge coloring of a wicket which is not a MAJ-coloring. We note that Proposition 9 requires the hypergraph to be linear and hence using wickets as subhypergraph would yield an algorithm for -Avoid and not the more general case of -Avoid.
Lemma 18.
Let be a wicket. There exists an edge-coloring such that it is not a MAJ-coloring. Furthermore, we can find this in polynomial time.
Proof.
Wlog let the edge removed from the wicket be a column edge. Let where be the set of three row edges and denote the set of column edges. We will show that the following is not a MAJ-coloring: .
Let be the set of vertices upon which the edges of are incident. For the edges in to be colored , there must be at least three vertices in that should be colored . Similarly, for the edges in to be , there must be at least vertices in that should be colored . Thus, totally there should be at least distinct vertices in . But , which is a contradiction. Hence, is not a MAJ-coloring. The following is an easy corollary of Corollary 17 and Lemma 18.
Corollary 19.
Let be an instance of -Avoid with . Then we can find a outside the range of in polynomial time.
3.4 Polynomial time Algorithm for -Avoid
In this subsection, we show a second application of the framework proposed in Theorem 1. Let be a multi-output circuit such that each output function computes MAJ of input bits. Let be a -uniform hypergraph obtained from as in the case of Theorem 1. Since every pair of output functions intersects in at most one input variable, we have that is a linear -uniform hypergraph.
Recall Proposition 11, which argued that a -uniform hypergraph that has more than hyperedges must have a grid contained in it. We will show that if contains a - grid then we can solve range avoidance for the corresponding circuit in polynomial time and hence this will imply an algorithm for -Avoid by using the same framework as Theorem 1.
Lemma 20.
There exists an edge-coloring of -grid which is not a MAJ-coloring. Furthermore, we can find in polynomial time.
Proof.
Let be a grid. Let where are the sets of edges corresponding to the rows and columns of the grid, respectively. We define an edge-coloring
We will show that is not a valid MAJ-coloring. We consider the following cases based on the parity of :
- Case 1:
-
Suppose is odd. For each to be colored , at least of its vertices should be colored . Since the edges in are pairwise disjoint, at least distinct vertices should be colored . Similarly for edges in , we have that at least vertices in should be colored . Hence, there should be at least vertices in , which is a contradiction.
- Case 2:
-
Suppose is even. By the previous argument, for edges in to get color at least vertices should be colored . For edges in at least vertices should be colored . So totally, there are at least vertices in , which is again a contradiction.
In either case, we obtain a contradiction. Hence, is not a MAJ-coloring.
Theorem 21.
Let be an instance of -Avoid and . There is a polynomial time algorithm to find a string outside the range of .
4 Polynomial time Algorithm for Monotone--Avoid
In this section, we describe a deterministic polynomial time algorithm for Monotone--Avoid for . The algorithm proceeds in three steps. In the first step, we give a polynomial time reduction from Monotone--Avoid to -Avoid. Next, we show a reduction from -Avoid to -Avoid. Finally, we put all the pieces together and describe a polynomial time algorithm for solving -Avoid when .
4.1 Reduction from Monotone--Avoid to -Avoid
We show the following reduction:
Theorem 22.
There is a polynomial time reduction from Monotone--Avoid to -Avoid.
Proof.
Let be a monotone circuit with . We will obtain a circuit such that , and , where each output function computes majority of three input bits. Furthermore, we can find a outside the from in polynomial time by setting the remaining many bits of to arbitrary values. We remark that this proof technique is inspired by [8].
To begin with, note that there are only a few types of monotone functions that depend on bits. For each of these cases we will show a reduction from to a smaller circuit such that a string outside the range of gives a string which is outside the range of . Let denote the sub-circuit of that computes the -th bit of the output. Let be the set of inputs with weight , for . We describe the reduction for each type of function except when the function is the function. We iteratively apply this sequence of reduction rules for each , we will end up with a circuit where each output bit is the function in terms of input variables.
- Case 1: :
-
That is computes a constant function. Then setting and the remaining output bits arbitrarily gives a string outside the range of .
- Case 2: :
-
Suppose computes OR of three input variables . Then setting and all the input variables to we obtain a smaller circuit such that then is outside the range of .
- Case 3:
-
where : Without loss of generality, we assume . In this case, setting and the input variables to we obtain a smaller circuit . The same argument applies when , and .
- Case 4:
-
where : Without loss of generality, let , and . By the property of monotone functions, we have that evaluates to on inputs . Then setting and , yields a circuit . Same argument applies in the case when , and also in the case when .
- Case 5:
-
where : Without loss of generality, assume . Setting and we get a smaller circuit . The other cases when and can be handled similarly.
- Case 6:
-
where : Without loss of generality, assume . Setting and we get a smaller circuit . The same argument applies when or .
- Case 7: :
-
In this case, computes AND of three input variables . Then setting and all the input variables to we obtain a smaller circuit such that then is outside the range of .
- Case 8: :
-
That is, computes a constant zero function. Then setting and the remaining output bits arbitrarily gives a string outside the range of .
It can be verified that the only function that is not covered in the above cases is when computes Maj on bits. Note that in each case we eliminate one output bit and at least one input bit. Thus, finally we are left with a circuit where and each output bit is computed by function.
We note that we can check the type of function computed by a circuit by simply evaluating the function on all possible input values. Since the function depends on only three variables there are only input possibilities to check. Hence, overall the reduction can be done in polynomial time.
4.2 Polynomial time Algorithm for -Avoid with Quadratic Stretch
We show that there is a deterministic polynomial time algorithm for -Avoid. Recall that -Avoid instance is a circuit with constant depth, bounded fan-in and polynomial size, where each output function of the circuit is a majority of exactly three input variables. For each , let denote the function corresponding to the -th output bit, and let denote the set of three variables that depends on. We shall demonstrate the working of the algorithm in three steps.
For our purpose, we shall define sub-circuits of called clusters (denoted by ) as follows: Let be the set of output functions of . We define the relation as follows: We say if some input that feeds into both for . Let be the transitive closure of . Observe that is an equivalence relation. We define a cluster to be an equivalence class of .
Step 1: Reduction to a single cluster
The following lemma shows that must contain a cluster with more outputs than inputs and hence we can concentrate on such a cluster.
Lemma 23.
Let be a multi-output circuit with , then there exists a cluster such that where .
Proof.
Let be the clusters such that covers the set of output functions of . Observe that covers the input set of . By definition, such that we have that and . Assume for the sake of contradiction that for each cluster , we have . Then by the above observation, we have that implying that , which is a contradiction.
Let be a cluster guaranteed by proposition 23. Let be the sub-circuit of corresponding to the cluster . Since, , there must be a string outside the range of . Observe that if then any which agrees with is outside . Hence, it suffices to solve the problem on .
It is easy to see that if there exist two output functions that intersect in three inputs, then we already have a string outside the range. Hence, we consider the cases when they intersect in fewer than three inputs. Motivated by this, we define the following problems: -Avoid (-Avoid) is the following problem: Given such that output function is function and any two functions share at most two (resp. one) inputs, the goal is to find .
Step 2 : A reduction to -Avoid
For the rest of the proof, , and . We show that there is a polynomial time reduction from -Avoid problem to -Avoid problem. Finally, in step 3, we will show that there is a deterministic polynomial time algorithm for -Avoid problem.
Lemma 24.
There is a polynomial time reduction from to .
Proof.
Let be a circuit such that each output bit is computed by a function where . By step , we know that the set of functions corresponding to form some cluster . Hence, we obtain starting with an arbitrary function in and iteratively adding a new function to , such that . Our algorithm will follow this construction procedure, and eliminate functions that appear in that order by setting input variables.
We start with the following claim that helps us eliminate functions from the circuit by setting input variables. Let be two output functions of such that . Initially , and we iteratively apply the following claim for each function that is used to build the cluster by the above process. A variable in is said to be alive if it is not set to a value in in the below process.
Claim 25.
such that , there is a setting of and a consistent partial assignment to the input variables (or identification of variables), such that at most one variable in remains alive.
Proof.
We shall prove this by induction on the construction of the cluster. Initially, let , . Without loss of generality, let and . We observe that if and , then and the number of variables in is exactly .
By hypothesis, the number of variables in which are alive after steps is at most . Now consider a such that , we would like to show that there is an assignment of values to (which also sets some input variables) such that in the new cluster, , the number of variables that are alive is still at most . The following cases arise depending on the two inputs share with the cluster. Let and let .
- Case 1:
-
Both , are not alive: There are two cases to consider. Suppose . By setting , we can obtain a string that is outside the range of . The other case is when , . In this case, we set and . Therefore, the number of variables in the new cluster is still at most .
- Case 2:
-
Exactly one of , is alive: Again two cases arise. Consider the first case when , . Now, we set eliminating all the variables. The other case is: , . Similarly, we set , , which eliminates all the variables.
- Case 3:
-
Both , are alive: If that are both alive, then it must be that . In this case, we set so that the number of variables in the cluster is at most .
Hence, in all the cases there is an assignment value to and consistent assignment for variables in such that there is at most one variable which is alive in .
Now, we consider the functions such that . Let . If is assigned to , then we set to and the input variables in to . Consider the other case when is alive. Wlog let . We set the output of and its other two inputs to . In this case, we have not yet assigned a fixed value to , which we shall fix in the next step. However, note that in either case, the number of alive variables in is at most .
After at most iterations, we would have fixed each of the inputs to one of or . This is because, in the iterative process, each function that we add to the set covers at least one new variable. Now consider an , which is guaranteed since . Observe that . Let . The following two cases arise based on the number of alive variables.
- Case 1:
-
Suppose there is no variable in which is alive. Then the value of is already fixed by the inputs . Wlog let this be . Setting the output of to gives a string outside .
- Case 2:
-
Suppose there is exactly one variable that is alive. Wlog let .
- Case 2(a):
-
Consider the case when for . Notice that this already forces to take value . Thus, by setting to and the functions outputs of functions that were set to to we obtain a which is outside .
- Case 2(b):
-
Suppose . Then setting the output of to , we fix the value of to . Thus, at this stage, there are no variables that are alive in . Since, and there exists a such that . Since all inputs are fixed, we can now handle this using case 1.
- Case 3:
-
Suppose has two variables that are alive. Let where .
- Case 3(a):
-
Suppose . By setting the output of to , we fix the value of to . This eliminates all the variables from . Again, this reduces to case 1.
- Case 3(b):
-
Suppose . This fixes the value of to . Hence, setting the output of to gives a string outside the range.
- Case 4:
-
Suppose all the three variables of are alive. Note that since and , there must be at least two more functions outside . If any of these functions satisfy the above cases, then we have already found a solution to the problem. Therefore, we consider the case when all three functions have all three variables that are alive. By PHP, there exist two functions at least two of whose inputs are set to . This fixes the output of these functions to . Setting one of the outputs to and the other to yields a string outside the range.
Thus, if there exist two functions in that have at least two common inputs, then as described above, we already have a solution to the range avoidance problem. Otherwise, we have an instance of -Avoid. Note that the above steps can be done in polynomial time. Hence, it suffices to show a polynomial time algorithm for this case.
Having described all the ingredients of the proof, we are now ready to prove our first algorithm for -Avoid (which works only for quadratic stretch ). We apply step to obtain a sub-circuit whose outputs form a cluster . We note that there must be a cluster with inputs and outputs. Otherwise, if each cluster with inputs has less than outputs then we get , which is a contradiction. Next, we observe that any two functions in share at most two input variables since otherwise we can trivially obtain a string outside the range by assigning opposite values to the corresponding output bits. By step , we reduce our problem to an instance of -Avoid in polynomial time. Since , Proposition 9 gives a polynomial time algorithm for solving -Avoid.
This gives a polynomial time algorithm for solving Monotone--Avoid with quadratic stretch, thus completing the proof of the following theorem from the introduction. See 5
5 A New Turan-type Bound and Application to Monotone--Avoid
In this section, we prove a new Turan-type theorem for -uniform linear hypergraphs. We show the application of the same to obtain an efficient algorithm for One-Intersect-MAJ3-Avoid with , thus proving Theorem 8.
5.1 Extremal Bounds for Loose -Cycles
We first show an extremal bound for the loose cycle in a connected -uniform linear hypergraph.
Theorem 7. [Restated, see original statement.]
Any connected 3-uniform linear hypergraph with edges must contain a loose cycle.
Proof.
Let be a connected 3-uniform linear hypergraph with . We would like to show that there is a loose cycle in . Towards this, we construct block graph corresponding to as follows: let the set of hyperedges in be the vertices of and add an edge if the hyperedges intersect at a vertex. Note that is a simple graph since is linear. Observe that is connected. We have since the vertices in correspond to the hyperedges in . Now we shall argue that finding a copy of loose cycle in is equivalent to finding a subgraph in where consists of an edge and distinct odd walks from to and to without using edge , where and are neighbors of respectively in . The equivalence follows from the observation that a walk of length corresponds to a walk of length in . Thus, our task is to show that .
For each vertex in , there is a clique of size in , where . Furthermore, each vertex in participates in cliques, since is -uniform. The number of edges in .
The last inequality follows from the Cauchy-Schwartz inequality by taking as all vectors and as . Since , we have . Hence, contains a cycle. Let be an edge in this cycle. We would like to show that contains . Suffices to show that there is a walk of odd length from to . The argument for odd walk from to is symmetric. Together with the edges this gives the desired subgraph . Observe that is still connected. Hence, there must be a path from to . If this path is of odd length then we have our desired path. Otherwise, we shall obtain a walk from to of odd length. By handshaking lemma, we have that the average degree of is . By averaging argument there exists a vertex with minimum degree . Since , we have that the degree of is at least . Since participates in at most three cliques, by PHP we get that there is a clique of size at least three which contains . Hence, there is an odd cycle containing . Let be a path from to , whose existence is guaranteed as is connected. Observe that is a walk of odd length from to . The other walk containing can be obtained similarly. Hence, there is a copy of (loose cycle) in . This completes the proof.
5.2 Polynomial time Algorithm for Monotone--Avoid with Linear Stretch
In section 4.2, we saw that using wicket as our candidate for forbidden sub-hypergraph gives a polynomial time algorithm for Monotone--Avoid with quadratic stretch. In order to improve this bound on the stretch requirement, we shall use different forbidden sub-hypergraphs which are loose -cycles. It suffices to show that the structure has an edge-coloring which is not MAJ-coloring and that the extremal number for the structure is not too large.
First, we show that there exists an edge-coloring of which is not MAJ-coloring.
Lemma 26.
Let be -cycle. Then there exists an edge-coloring of which is not MAJ-coloring.
Proof.
Let be the cycle with as -structure where , . Consider the following edge-coloring-
Let . First, consider the case when . This forces the color of the other two endpoints of to . Iteratively, we get iff . This implies which is a contradiction. The other case when is similar. For our purpose, we shall work with loose cycles instead of cycles. In fact, the edge-coloring demonstrated in the proof of Lemma 26 is also an edge-coloring of loose -cycle which is not a MAJ-coloring.
Corollary 27.
Let be a loose -cycle. Then there exists an edge-coloring of which is not a MAJ-coloring.
Finally, combining all the results above, we shall now prove our first algorithm for Monotone--Avoid with linear stretch.
Theorem 8 (Main Theorem). [Restated, see original statement.]
For , Monotone--Avoid can be solved in deterministic polynomial time.
Proof.
By Lemma 23 and Lemma 24, we first reduce the circuit to a sub-circuit corresponding to cluster, and then further to the case of One-Intersect-MAJ3-Avoid. Hence, it suffices to solve One-Intersect-MAJ3-Avoid. By theorem 7 we know that there exists a loose in the hypergraph corresponding to the given circuit. It suffices to show that we can find loose in in polynomial time. By corollary 27 and theorem 17 we get a polynomial time algorithm to solve -Avoid. Indeed to find in the proof of Theorem 7, we need to find the paths , and a high degree vertex , which can be done in polynomial time. Hence, we can find the in polynomial time.
6 Conclusion
We described the formulation of special cases of Avoid in terms of Turan-type problems in -uniform hypergraphs and demonstrated some applications to solve monotone versions of Avoid under depth restrictions for the circuit. We exhibited several different fixed hypergraphs - -cage, weak Fano plane, grid, -butterfly, -odd kite which can be also used to derive polynomial time algorithms for One-Intersect-MAJ3-Avoid which in turn is used to solve Monotone--Avoid when the stretch is quadratic. Finally, the improvement to linear stretch (Theorem 8) comes from using loose cycles as our hypergraph. We note that this is not a fixed-sized hypergraph; however, we can find it in polynomial time. Prior to this work, the best known polynomial time algorithm Monotone--Avoid was via the algorithm for -Avoid which requires [6]. We extend our framework to solve -Avoid for linear and quadratic stretch respectively. [6] give a polynomial time algorithm for solving -Avoid when . it would be interesting to improve the stretch using the hypergraph framework even for monotone circuits, which would in turn give an improvement for the case of -Avoid.
References
- [1] WG Brown, Paul Erdos, and VT Sós. Some extremal problems on r-graphs. In New directions in the theory of graphs (Proc. Third Ann Arbor Conf., Univ. Michigan, Ann Arbor, Mich, 1971), pages 53–63. Academic Press New York, 1973.
- [2] Lijie Chen, Shuichi Hirahara, and Hanlin Ren. Symmetric Exponential Time Requires Near-Maximum Circuit Size. In Proceedings of the 56th Annual ACM Symposium on Theory of Computing, STOC 2024, pages 1990–1999, 2024. doi:10.1145/3618260.3649624.
- [3] Claton Collier-Cartaino, Nathan Graber, and Tao Jiang. Linear Turán Numbers of Linear Cycles and Cycle-Complete Ramsey Numbers. Combinatorics, Probability and Computing, 27(3):358–386, 2018. doi:10.1017/S0963548317000530.
- [4] Jakob Führer and Jozsef Solymosi. Caps and wickets. Discrete Mathematics, 348(3):114334, 2025. doi:10.1016/j.disc.2024.114334.
- [5] Zoltán Füredi and Miklós Ruszinkó. Uniform hypergraphs containing no grids. Advances in Mathematics, 240:302–324, 2013.
- [6] Karthik Gajulapalli, Alexander Golovnev, Satyajeet Nagargoje, and Sidhant Saraogi. Range Avoidance for Constant Depth Circuits: Hardness and Algorithms. In Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, (Proceedings of APPROX/RANDOM 2023), volume 275, pages 65:1–65:18, 2023. doi:10.4230/LIPICS.APPROX/RANDOM.2023.65.
- [7] W. T. Gowers and J. Long. The length of an s-increasing sequence of r-tuples. Combinatorics, Probability and Computing, 30(5):686–721, 2021. doi:10.1017/S0963548320000371.
- [8] Venkatesan Guruswami, Xin Lyu, and Xiuhan Wang. Range Avoidance for Low-Depth Circuits and Connections to Pseudorandomness. In Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (Proceedings of APPROX/RANDOM 2022), volume 245, pages 20:1–20:21, 2022. doi:10.4230/LIPIcs.APPROX/RANDOM.2022.20.
- [9] Ervin Gyori and Nathan Lemons. Hypergraphs with no cycle of a given length. Combinatorics, Probability and Computing, 21(1–2):193–201, 2012. doi:10.1017/S0963548311000691.
- [10] András Gyárfás and Gábor N. Sárközy. The linear turán number of small triple systems or why is the wicket interesting? Discrete Mathematics, 345(11):113025, 2022. doi:10.1016/j.disc.2022.113025.
- [11] Rahul Ilango, Jiatu Li, and R. Ryan Williams. Indistinguishability obfuscation, range avoidance, and bounded arithmetic. In Proceedings of the 55th Annual ACM Symposium on Theory of Computing (STOC 2023), pages 1076–1089, 2023. doi:10.1145/3564246.3585187.
- [12] Peter Keevash. Hypergraph Turán Problems. Surveys in Combinatorics, June 2011.
- [13] Peter Keevash and Benny Sudakov. The Turán Number Of The Fano Plane. Combinatorica, 25, March 2004. doi:10.1007/s00493-005-0034-2.
- [14] Robert Kleinberg, Oliver Korten, Daniel Mitropolsky, and Christos Papadimitriou. Total Functions in the Polynomial Hierarchy. In Proceedings of 12th Innovations in Theoretical Computer Science Conference (ITCS 2021), volume 185, pages 44:1–44:18, 2021. doi:10.4230/LIPIcs.ITCS.2021.44.
- [15] Oliver Korten. The Hardest Explicit Construction. In 2021 IEEE 62nd Annual Symposium on Foundations of Computer Science (FOCS), pages 433–444, 2022. doi:10.1109/FOCS52979.2021.00051.
- [16] Neha Kuntewar and Jayalal Sarma. Range Avoidance in Boolean Circuits via Turan-type Bounds, 2025. doi:10.48550/arXiv.2503.17114.
- [17] Zeyong Li. Symmetric Exponential Time Requires Near-Maximum Circuit Size: Simplified, Truly Uniform. In Proceedings of the 56th Annual ACM Symposium on Theory of Computing, STOC 2024, pages 2000–2007. Association for Computing Machinery, 2024. doi:10.1145/3618260.3649615.
- [18] Hanlin Ren, Rahul Santhanam, and Zhikun Wang. On the Range Avoidance Problem for Circuits. In 63rd IEEE Annual Symposium on Foundations of Computer Science, FOCS 2022, Denver, CO, USA, October 31 - November 3, 2022, pages 640–650. IEEE, 2022. doi:10.1109/FOCS54457.2022.00067.
- [19] Jozsef Solymosi. Wickets in 3-uniform hypergraphs. Discrete Mathematics, 347(6):114029, 2024. doi:10.1016/J.DISC.2024.114029.
- [20] Lin-Peng Zhang, Hajo Broersma, and Ligong Wang. A note on generalized crowns in linear r-graphs, 2024. arXiv:2401.12339.
