Abstract 1 Introduction 2 Notation and Tools 3 Refuting Bipartite CNFs References Appendix A Proof of Lemma 8 Appendix B Proof of Lemma 22 Appendix C Proof of Lemma 21

Searching for Falsified Clause in Random (log(n))-CNFs Is Hard for Randomized Communication

Artur Riazanov ORCID EPFL, Lausanne, Switzerland Anastasia Sofronova ORCID EPFL, Lausanne, Switzerland Dmitry Sokolov ORCID EPFL, Lausanne, Switzerland Weiqiang Yuan ORCID EPFL, Lausanne, Switzerland
Abstract

We show that for a randomly sampled unsatisfiable O(logn)-CNF over n variables the randomized two-party communication cost of finding a clause falsified by the given variable assignment is linear in n.

Keywords and phrases:
communication complexity, proof complexity, random CNF
Category:
RANDOM
Copyright and License:
[Uncaptioned image] © Artur Riazanov, Anastasia Sofronova, Dmitry Sokolov, and Weiqiang Yuan; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Communication complexity
Funding:
This project was supported by the Swiss State Secretariat for Education, Research and Innovation (SERI) under contract number MB22.00026.
Editors:
Alina Ene and Eshan Chattopadhyay

1 Introduction

This paper studies the communication complexity of Falsified Clause Search Problem.

Definition 1 ([31]).

Let X,Y be two disjoint sets of boolean variables and φ be a CNF formula over the variables XY. We define Falsified Clause Search Problem or Searchφ associated with formula φ in the following way:

  • input:

    a pair (x,y){0,1}X×{0,1}Y;

  • output:

    a clause Cφ that is violated by the input (x,y).

Communication lower bounds for search problems have applications in many areas of complexity theory. We consider two areas that are the most relevant and explain the applicability of communication lower bounds.

Proof complexity.

This area of complexity theory studies how hard it is to prove that a given formula φ is unsatisfiable; in other words, what is the length of the shortest proof in a certain proof system. Lower bounds for the proof systems often correspond to lower bounds on a run-time of SAT-solvers, and there are intricate connections to other areas of complexity theory, such as, for example, circuit complexity.

There is a general framework for obtaining lower bounds on the length of the shortest proofs via communication. Suppose that, for an unsatisfiable CNF formula φ, we divide the variables into two disjoint groups X and Y in an arbitrary way. For a fixed proof system we can try to transform efficient proof of φ into an efficient communication protocol for Searchφ. A lower bound on the communication complexity of Searchφ then implies a lower bound on the length of a proof of φ in .

This framework seems to originate from [31]. Following this reduction, lower bounds for many different proof systems were obtained, for example: tree-like Cutting Planes [26, 25, 10, 6], tree-like Threshold proof system [5], tree-like Res() [28], etc. [25, 21]. Depending on the communication model, even dag-like proofs can be analyzed via this framework [30, 35, 24, 12, 13, 40].

The lower bounds that can be achieved via this technique depend on the power of the communication model: the more powerful model we consider, the bigger class of proof systems we get the lower bound for. The choice of the formula φ is important here as well, in a sense that we need to be able to show the lower bound on the communication complexity of Searchφ. Typically, φ is artificially built for this purpose. In this paper, we show a communication lower bound for the natural class of formulas (without usage of ad hoc constructions) that is a candidate for being hard for all propositional proof systems.

Circuit complexity.

Natural embedding of Searchφ into a monotone Karchmer–Wigderson relation [29, 36] gives us the opportunity to use it for proving lower bounds for the monotone models of computation. From communication lower bounds, strong results are known for monotone formulas [37], monotone circuits [13, 32], monotone span programs [37, 34], etc. Communication is also the main instrument for showing separation between those models [34, 17], and trade-off results [9, 19]. These type of results are based on ad hoc constructions of the formulas φ. Namely, φ is designed in order to able to show communication lower bound.

1.1 Random CNF

To be more precise we start with the definition of random CNF formulas.

Definition 2.

Let 𝔉(m,n,Δ) denote the distribution of random Δ-CNF on n variables obtained by sampling m clauses (out of the (nΔ)2Δ possible clauses) uniformly at random with repetitions.

The famous result of Chvátal–Szemerédi says that if we pick a formula from this distribution with the proper parameters, the resulting formula will be unsatisfiable with high probability.

Theorem 3 (Chvátal–Szemerédi, [7]).

For any Δ3 whp 𝛗𝔉(m,n,Δ) is unsatisfiable if mln22Δn.

These types of distributions appear not only in most of the areas in computer science, but in general mathematics and physics as well [33]. An interesting application is due to Feige [11], who conjectured the following statement: no polynomial time algorithm may prove whp the unsatisfiability of a random O(1)-CNF formula with arbitrary large constant clause density. Assuming Feige’s conjecture, it is known that some problems are hard to approximate: vertex covering, PAC learning DNFs [8], etc.

As a candidate to be hard to refute in all proof systems, random CNFs are actively studied and lower bounds are known for many different proof systems [23, 4, 3, 1, 38]. Recent developments in this direction utilize the connection between proof complexity of φ and communication complexity of Searchφ. In particular, lower bounds for the Cutting Planes proofs of random O(logn)-CNF [24, 12, 40] follow this strategy. However, these results only consider lower bounds on deterministic dag-like communication complexity of Searchφ based on random O(logn)-CNF.

In this paper, we analyse the randomized tree-like communication of this problem that is incomparable with deterministic dag-like communication. This is a natural problem in a natural model, which also provides a way to explore how techniques used for structured formulas might extend to more typical instances like random CNFs. The main result is the following.

Theorem 4.

Let c>0 be a large enough constant, n>0,Δclogn,m=O(n2Δ). If 𝛗𝔉(m,n,Δ) and 𝐗,𝐘[n] is a partition of variables that is taken uniformly at random, then whp over choice of 𝛗 and partition 𝐗,𝐘 the randomized communication complexity of Search𝛗 is Ω(n).

1.2 Prior Results and Technique

For several types of formulas φ, the randomized communication complexity of Searchφ is well-studied. The approach for proving such bounds is the reduction of Unique Disjointness function to Searchφ. The main success in this direction is the reduction based on critical block sensitivity [25, 21], we also include some earlier results, though there is some difference in the technique [5]. More precisely, for this technique one should assume that φ=ψg (we take some formula ψ and, in place of each variable, we substitute a carefully chosen gadget g with fresh variables). Assuming that Searchψ has critical block sensitivity m (that is a generalization of the block sensitivity measure), it is possible to reduce instances of unique disjointness of size poly(m) to Searchφ.

The general framework for working with such formulas of ψg is called lifting, and the idea is to “lift” the hardness of ψ with respect to another complexity measure to communication complexity via gadget. Lifting can be based on the other complexity measures as well. For example, it can also be implemented for randomized decision tree complexity instead of critical block sensitivity [16]; however, this method requires the lower bound on the randomized decision tree complexity, which might be non-trivial, especially in case of Searchφ problem. Such lower bound is known for Tseitin formulas [15], together with [16] it yields the lower bound for randomized communication complexity of Search for Tseitin formulas lifted by Inner Product.

The notable exception here is the lower bound on Search problem for Binary Pigeonhole Principle (BPHP) [27]. These formulas are not lifted, however the proof is also the reduction of Unique Disjointness to the Search problem. This reduction based on the inner symmetry of BPHP.

A different kind of proof of a Searchφ lower bound was given by Yang and Zhang [42] (based on [41, 42]), who prove a lower bound for a weak version of BPHP. In contrast to the previous works this one is not a reduction from Unique Disjointness. Instead, they directly apply the structure versus randomness framework from the lifting literature [18, 16] to the potential protocol that computes Searchφ.

Our proof of Theorem 4 combines the approach of [18, 16, 42] with the analysis of expander graphs via closure argument that was developed for proof complexity purposes in [3, 2]. However, we use the iterative construction of the closure from [39]. In part, this is also inspired by [20].

More precisely, the proof of our result is based on the following steps.

  1. 1.

    Following [24, 12, 40] we divide variables between Alice and Bob uniformly at random.

  2. 2.

    Following the line of work on lifting of randomized decision trees [18, 16, 42, 14] we show that every communication protocol can be converted into a more structured one, a so-called subcube-like protocol. In such a communication protocol, each rectangle is a product of two sets with some bits fixed and the remaining pseudorandom.

  3. 3.

    Due to the nature of our random CNFs, the invariant that all clauses contain pseudorandom variables is not strong enough on its own. Search problem still might become trivial early on in communication protocol; for example, if the contradiction could be narrowed down to a small set of clauses. To avoid this problem, we use the closure trick [3, 2, 39, 20], that allows us to maintain expansion property on the pseudorandom part of the graph.

  4. 4.

    Following [14], we show that the number of fixed bits in each rectangle is at most O(d/ε) if we allow error ε, where d is the communication complexity of the original protocol.

In addition, we show the better error bound dependency on the protocol depth d than in [14]. We give a more refined analysis of the conversion to the subcube-like protocols. More precisely, we show that the number of fixed bits in each rectangle is O(d) even when we allow for the exp(d) error.

2 Notation and Tools

We denote the standard binary entropy function by H(p)plog(1/p)+(1p)log(1/(1p)).

Definition 5.

A bipartite graph G=(L,R,E) is called an (r,Δ,αΔ)-expander, if all vertices in L have degree at most Δ and for any set SL such that |S|r it holds that |N(S)|αΔ|S|, where NG(S) denotes the set of neighbours of S in G (we omit the subscript if the graph is clear from the context).

With a CNF formula φ over n variables and with m clauses we associate a graph Gφ([m],[n],E) in a natural way: (i,j)E iff the i-th clause contains the j-th variable. The following Lemma gives us some useful properties of underlying graphs of random CNFs. It follows from a standard computation, which was featured, for example, in [40, Lemma A.2].

Lemma 6.

Let n>0, η>0 be an arbitrary constant, Δ=clog(n), for a large enough constant c depends on η, m=O(n2Δ). Let G([m],[n],E) be a bipartite graph, such that each i[m] choses Δ neighbours uniformly at random over (nΔ) possibilities. Then G is an (r,Δ,(1η)Δ)-expander for r=Ω(n/Δ).

Instead of working directly with randomised communication, we use the equivalent characterisation through distributional communication complexity. That is, we prove a lower bound against deterministic protocols that achieve error ε with respect to a certain distribution on inputs (here we use uniform distribution), and a lower bound against randomised protocols that achieve error ε follows. Below, “communication protocol” refers to a deterministic communication protocol.

3 Refuting Bipartite CNFs

In this section we mainly prove a special “bipartite” case of Theorem 4. We show in Section 3.1 that it actually implies the general case.

Theorem 7.

Let α>0 be an absolute constant. Let G1([m],[n],E1),G2([m],[n],E2) be two (r,Δ,αΔ)-expanders, and X,Y{0,1}n. For each i[m], let Ci be a disjunction of variables in {xjjNG1(i)}{yjjNG2(i)} with arbitrary signs. Then for every communication protocol Π:{0,1}n×{0,1}n[m] of depth d at most O(Δr):

Pr(𝒙,𝒚)X×Y𝒊Π(𝒙,𝒚)[C𝒊(𝒙,𝒚)=0]d2Ω(Δ)+exp(d).

This section is organized as follows. In Section 3.1, we derive Theorem 4 from Theorem 7. In Section 3.2, we formally define subcube-like protocols and provide necessary tools. In Section 3.3, we give a more refined analysis of the conversion from general protocols to subcube-like ones in [14]. In Section 3.4, we show the hardness of Searchφ against subcube-like protocols when the underlying graphs are good expanders. Finally, in Section 3.5, we put everything together and derive Theorem 7.

3.1 Deriving Theorem 4 from Theorem 7

The main part of the argument that reduces the general case to the bipartite is a clean-up lemma essentially saying that incurring a small error we can treat the general case as bipartite. Similar arguments have been made in [24, 12, 40].

Let φ=i[n]Ci be a Δ-CNF with the set of variables [n]. Let AB=[n] be a partition of the variables. Let GA([m],A,EA) and GB([m],B,EB) be the graphs with edges connecting a clause with all variables from one of the sets mentioned in it. Let ErrorA[m] and ErrorB[m] be the sets of clauses with degree exceeding (1δ)Δ in GA and GB respectively. It means that clauses from [m](ErrorAErrorB) have at least δΔ variables from A and B. We then say that (A,B) is δ-good partition for φ if

  1. 1.

    Pr𝒙{0,1}A[iErrorA we have Ci(𝒙,)1]12Ω(Δ).

  2. 2.

    Pr𝒚{0,1}B[iErrorB we have Ci(,𝒚)1]12Ω(Δ).

  3. 3.

    GAErrorAErrorB and GBErrorAErrorB are (r,Δ,δΔ/2)-expanders, where r=Ω(n/Δ).

In this definition we assume that δ is an absolute constant and hidden constants depend on it.

Lemma 8.

Let 𝛗𝔉(m,n,Δ) with Δ=clogn and m=α2Δn, where c,α>0 are constants, and c40. Let 𝐗,𝐘 be a uniformly random partition of [n]. Then whp (𝐗,𝐘) is a δ-good partition for 𝛗 for any δ1/10.

We defer the proof of this lemma to Appendix A.

Proof of Theorem 4.

Applying Lemma 8, we get that the variable partition 𝑿𝒀=[n] is 1/10-good wrt 𝝋. Let G1G𝑿Error𝑿Error𝒀, G2G𝒀Error𝑿Error𝒀. Note that the left parts of these graphs have equal size. We can add dummy variables to the right parts of these graphs to make them equal as well for the simplicity of notation.

By Lemma 8, the probability over (𝒙,𝒚){0,1}𝑿×{0,1}𝒀 for the Error𝑿 or Error𝒀 to not be immediately satisfied is 2Ω(Δ). This means that if we consider a protocol for the problem Search𝝋 for the variable partition 𝑿𝒀 with the probability of success ε, we can reinterpret it as a protocol for G1 and G2 with the probability of success at least ε2Ω(Δ).

We apply Theorem 7 with α120. Since rΔ can be as large as Ω(n) by Lemma 6, we can pick the constants depending on α such that the probability from Theorem 7 is less than 1100. Then the probability of success for the problem from Theorem 4 is less than 1100+2Ω(Δ), and the theorem follows.

3.2 Density Restoring Machinery

Every communication protocol Π can be seen as a tree (not necessarily binary). Let 𝒩(Π) denote the set of all nodes in Π. Each node v𝒩(Π) is associated with a rectangle, denoted Rv=Xv×Yv.

Definition 9 (Min-entropy).

For a random variable 𝐱, let H(𝐱)=minxlog(1Pr[𝐱=x]).

Definition 10 (Spread variables).

Let 𝐱{0,1}n be a random boolean vector. We say 𝐱 is γ-spread if for every I[n] we have H(𝐱I)γ|I|.

Definition 11 (Structured variables).

Let 𝐱{0,1}n be a random boolean vector and I[n]. We say 𝐱 is (I,γ)-structured if there exists some aI{0,1}I such that

  • Pr[𝒙I=aI]=1;

  • 𝒙[m]I is γ-spread.

Definition 12 (Subcube-like rectangle).

A rectangle R=X×Y{0,1}n×{0,1}n is γ-subcube-like with respect to (I,J) where I,J[n] if 𝐱X is (I,γ)-structured and 𝐲Y is (J,γ)-structured. In which case, we use fix(X)I and fix(Y)J to denote the fixed part of X and Y respectively.

Definition 13 (Subcube-like protocols [14]).

A communication protocol Π:{0,1}n×{0,1}nS is γ-subcube-like if for every node v𝒩(Π) in the protocol tree, Rv is γ-subcube-like.

Definition 14 (Codimension).

The codimension of a subcube-like rectangle R=X×Y is defined as the total number of fixed positions in X and Y, denoted codim(R)|fix(X)|+|fix(Y)|. The codimension of a subcube-like protocol Π is the maximum codimension of subcube-like rectangles associated with any nodes in the protocol tree of Π, denoted codim(Π)maxv𝒩(Π)codim(Rv).

Lemma 15 (Density Restoring Partition [22]).

Let 𝐱{0,1}n be a random boolean vector with support X{0,1}n and 0<γ<1 be a fixed parameter. There exists a partition

X=X1X2X3Xr

such that for each j[r], 𝐱𝐱Xj is (Ij,γ)-structured with respect to some Ij[n].

Moreover, if we denote pjPr[𝐱XjX], then it holds that:

H(𝒙[m]Ij𝒙Xj)H(𝒙)γ|Ij|log(1/pj).

3.3 Subcube-like protocols from general protocols

Göös et al. [14] show how to convert an arbitrary communication protocol into a subcube-like one. Specifically, they prove the following.

Lemma 16 ([14]).

Let Π be a communication protocol of depth d and ε>0. There exists a subcube-like protocol Π~ of codimension codim(Π~)=O(d/ε) such that

Pr𝒙,𝒚[Π(𝒙,𝒚)Π~(𝒙,𝒚)]ε.

Their bound is tight in the constant-error regime. However, it degenerates when ε=O(d/n).

In this subsection, we give a more refined analysis of the reduction in [14], which makes the bound applicable in the inverse polynomial error regime (when d=Ω(logn)). We remark that such an analysis has been implicitly provided in [22].

Lemma 17.

Let Π be a communication protocol of depth d. There exists a γ-subcube-like protocol Π~ of codimension codim(Π~)=71γd such that

Pr𝒙,𝒚[Π(𝒙,𝒚)Π~(𝒙,𝒚)]exp(d).

We include a simplified version of the algorithm for such conversion from [14] for completeness. This algorithm simulates a subcube-like protocol Π on an input (x,y), given a general protocol Π.

Algorithm 2 (simplified) conversion from [14].

Proof.

Let Π be as given by Algorithm 2 in [14]. More precisely, let the protocol tree of Π consist all the possible configurations at the end of each iteration plus the initial one as the root (so the tree is not necessarily binary). Observe that Π has depth d, though may have much larger communication complexity.

For any x,y{0,1}n, we have Π(x,y)=Π(x,y). It suffices to show Pr𝒙,𝒚[codim(R(𝒙,𝒚))>71γd]exp(d), where R(x,y) is the unique rectangle associated with the leaves of Π that contains (x,y). The desired Π~ can then be obtained by shaving all the nodes in the protocol tree of Π associated with a rectangle of codimension greater than 71γd.

For each node v𝒩(Π), define the entropy deficiency of v as

D(v)D(Xv)+D(Yv),

where

D(Xv)n|fix(Xv)|H(𝒙[n]fix(Xv)),𝒙Xv

and D(Yv) is defined analogously.

Now consider running Π on x,y, and let v0,,vd𝒩(Π) denote all the nodes on the execution path. Fix any k[d] and let us simply use u and v to denote vk1 and vk. Suppose without loss of generality that it is Alice who sends a bit to Bob in the k-th iteration. Recall that in each iteration Alice first partitions Xu=Xu0Xu1 according to the bit she sends. Then she performs the density-restoring partition with parameter γ on Xub=Xub,1Xub,r where xXub. Finally, she determines the unique Xub,i that contains x. Then for the next configuration, Xv=Xub,i. Let us define

qubPr[𝒙Xub𝒙Xu],
pub,jPr[𝒙kjXub,k|𝒙Xub]j[r],
hk(x,y)log(1/qub)+log(1/pub,i),
nk(x,y)|fix(Xv)fix(Xu)|.

We have the following simple fact.

Fact 18.

D(v)D(u)(1γ)nk(x,y)+hk(x,y).

Proof.

D(v)D(u) =|fix(Xv)|+|fix(Xu)|+H(Xv)H(Xu)
=nk(x,y)+(H(Xv)H(Xub))+(H(Xub)H(Xv))
(from Lemma 15) nk+log(1/qub)+(γnk(x,y)+log(1/pub,i))
=(1γ)nk(x,y)+hk(x,y).

Together with the nonnegativity of D, we can bound the codimension of R(x,y) by h(x,y)k=1dhk(x,y) up to a multiplicative factor.

Claim 19.

For every x,y{0,1}n, codim(R(x,y))11γh(x,y).

Proof.

Consider the path in the tree leading to the leaf R(x,y), this path being of length d. Summing up the inequalities from Fact 18 along that path, we get:

D(vd)D(v0)(1γ)j=1dnj(x,y)+j=1dhj(x,y)

Since D(vd) is non-negative and D(v0)=0, it follows that:

codim(R(x,y))=j=1dnj(x,y)11γj=1dhj(x,y)=11γh(x,y).

We also observe that hk(𝒙,𝒚) has an exponential tail for each k[d], even conditioned on any node v of depth k1 being reached.

Claim 20.

For every node v𝒩(Π) of depth 0k<d and threshold γ0,

Pr𝒙,𝒚[hk+1(𝒙,𝒚)1+γ𝒗k=v]2γ.

Proof.

Let 𝒃,𝒊 be as defined in the (k+1)-th iteration of Algorithm 2 given 𝒙,𝒚. We have

Pr𝒙,𝒚[hk+1(𝒙,𝒚)1+γ𝒗k=v]
= b{0,1}Pr[𝒃=b𝒗k=v]Pr[log(1/qvb)+log(1/pvb,𝒊)1+γ𝒃=b,𝒗k=v]
= b{0,1}qvbPr[qvbpb,𝒊2γ1|𝒃=b,𝒗k=v]
b{0,1}qvbmin{1,2γ1qvb}
2γ,

where in the second last inequality, we use the property that Pr[pvb,𝒊t𝒃=b,𝒗k=v]t for all t[0,1].

Finally, we need the following adaptive version of Bernstein’s inequality, whose proof can be found in Appendix C.

Lemma 21.

Let 𝐚1,,𝐚n be a random sequence of reals and ζ>0 be some fixed parameter. If for any 1kn and a1,,ak1 such that Pr[𝐚1=a1,,𝐚k1=ak1]>0,

Pr[𝒂kx𝒂1=a1,,𝒂k1=ak1]exp(ζx),

then

Pr[i=1n𝒂i4ζn]exp(n).

We are now ready to bound the codimension of R(𝒙,𝒚). Let (𝒂khk(𝒙,𝒚)1)k[d]d be a random sequence of reals. By Claim 20, 𝒂 satisfies the condition in Lemma 21 with ζ=ln2. Therefore,

Pr[h(𝒙,𝒚)7d]=Pr[i=1d𝒂i6d]exp(d).

Together with Claim 19, we conclude that

Pr[codim(R(𝒙,𝒚))71γd]Pr[h(𝒙,𝒚)7d]exp(d).

3.4 Lower bound against subcube-like protocols

The following lemma is implicit in [20], we include its proof in Appendix B for completeness.

Lemma 22.

Let 0<β<α<1 and let Π:{0,1}n×{0,1}nS be a subcube-like protocol of codimension codim(Π)d(αβ)2rΔ/4, and G1=([m],[n],E1),G2=([m],[n],E2) be two (r,Δ,αΔ)-expanders. Then there exist families {𝖢𝗅X(v)}v𝒩(Π),{𝖢𝗅Y(v)}v𝒩(Π) of subsets of [m] such that the following conditions hold:

  1. 1.

    For every non-root v𝒩(Π), let u denote v’s parent. Then 𝖢𝗅X(u)𝖢𝗅X(v) and 𝖢𝗅Y(u)𝖢𝗅Y(v).

  2. 2.

    For every v𝒩(Π), G1𝖢𝗅X(v)N(𝖢𝗅X(v))fix(Xv) and G2𝖢𝗅Y(v)N(𝖢𝗅Y(v))fix(Yv) are both (r,Δ,βΔ)-expanders.

  3. 3.

    For every v𝒩(Π), |𝖢𝗅X(v)|,|𝖢𝗅Y(v)|1αβd/Δ.

Lemma 23.

As in Theorem 7 let G1([m],[n],E1),G2([m],[n],E2) be two (r,Δ,αΔ)-expanders, and X,Y{0,1}n. For each i[m], let Ci be a disjunction of variables in {xjjNG1(i)}{yjjNG2(i)} with arbitrary signs. Let Π:{0,1}n×{0,1}n[m] be a γ-subcube-like communication protocol of codim(Π)d. If dα2rΔ/4, then

Pr𝒙,𝒚[C𝒊(𝒙,𝒚)=0𝒊=Π(𝒙,𝒚)]O(2γαΔ/2d).

Proof.

We rephrase the success probability of Π as follows: Sample a random leaf of Π with probability |R|/22n. Then

Pr𝒙,𝒚[C𝒊(𝒙,𝒚)=0𝒊=Π(𝒙,𝒚)]=𝔼[Pr(𝒙,𝒚)R[CΠ()(𝒙,𝒚)=0]]. (1)

Let {𝖢𝗅X(v)}v𝒩(Π),{𝖢𝗅Y(v)}v𝒩(Π) be given by Lemma 22 with respect to Π,G1,G2 and β=α/2. For each node v𝒩(Π), define Jv𝖢𝗅X(v)𝖢𝗅Y(v). We first observe that for each leaf , Π has low success probability on R if Π()J.

Claim 24.

Let be any leaf in the protocol tree of Π. Suppose that iJ. Then

Pr(𝒙,𝒚)R[Ci(𝒙,𝒚)=0]2γαΔ/2.

Proof.

By the definition of J, we have i𝖢𝗅X(). Let A[n](fix(X)N(𝖢𝗅X())) be the set of neighbors of i in G1𝖢𝗅X()N(𝖢𝗅X())fix(X), by the expansion we get |A|αΔ/2. Since X×Y is γ-subcube-like we have that 𝒙[n]fix(X) is γ-spread. In particular, H(𝒙A)γ|A|γαΔ/2. Let τ{0,1}A be the unique assignment that violates all literals of Ci in A. The min-entropy bound above then implies Pr[Ci(𝒙,𝒚)=0]Pr[𝒙A=τ]2γαΔ/2. On the other hand, unfortunately, it is possible that

pi()Pr(𝒙,𝒚)R[Ci(𝒙,𝒚)=0]

is close to 1 for some iJ. Nevertheless, we can show that this can happen only for a small fraction of leaves.

Claim 25.

Let be a random leaf sampled as stated above. Then

𝔼[iJpi()]2γαΔ/2d.

Proof.

First, denoting by 𝒙,𝒚 the leaf containing (𝒙,𝒚), we can write

𝔼[iJpi()] =i[m]𝔼[𝟏iJpi()]
=i[m]Pr𝒙,𝒚[iJ𝒙,𝒚Ci(𝒙,𝒚)=0]
=i[m]Pr𝒙,𝒚[Ci(𝒙,𝒚)=0iJ𝒙,𝒚]Pr𝒙,𝒚[iJ𝒙,𝒚]
maxi[m]Pr𝒙,𝒚[Ci(𝒙,𝒚)=0iJ𝒙,𝒚]i[m]Pr𝒙,𝒚[iJ𝒙,𝒚]
=maxi[m]Pr𝒙,𝒚[Ci(𝒙,𝒚)=0iJ𝒙,𝒚]𝔼[|J|].

Observe that |J|d for every leaf , it suffices to show

Pr𝒙,𝒚[Ci(𝒙,𝒚)=0iJ𝒙,𝒚]2γαΔ/2.

for every i[m]. Now let us fix an arbitrary i[m]. The event “iJ𝒙,𝒚” can be reinterpreted as follows: with

Vi{v𝒩(Π)iJv and the parent of v does not satisfy that}

we have that iJ𝒙,𝒚 if and only if (𝒙,𝒚)vViRv (the rectangles form a partition since the nodes in Vi are maximally close to the root). Then
Pr𝒙,𝒚[Ci(𝒙,𝒚)=0iJ𝒙,𝒚]vViPr𝒙,𝒚[(𝒙,𝒚)RviJ𝒙,𝒚]Pr𝒙,𝒚[Ci(𝒙,𝒚)=0(𝒙,𝒚)Rv].

Since the right-hand side is a convex combination of Pr[Ci(𝒙,𝒚)=0(𝒙,𝒚)Rv] for vVi, it suffices to bound the maximum of these probabilities.

The crucial observation to conclude the proof is that i𝖢𝗅X(v) if Bob spoke in the parent node of v and i𝖢𝗅Y(v) if Alice spoke in that node. In any case, an argument similar to that in Claim 24 applies and we have Pr[Ci(𝒙,𝒚)=0(𝒙,𝒚)Rv]2γαΔ/2, which concludes the proof. Now we are ready to show the desired bound. Combining the above two claims, we have

(1) =Pr[Π()J]𝔼[Pr(𝒙,𝒚)R[CΠ()(𝒙,𝒚)=0]Π()J]
+Pr[Π()J]𝔼[Pr(𝒙,𝒚)R[CΠ()(𝒙,𝒚)=0]Π()J]
2γαΔ/2+𝔼[iJpi()]
=O(d/2γαΔ/2).

3.5 Proof of Theorem 7

We first restate the theorem for convenience. See 7

Proof.

Let Π~ be a subcube-like protocol given by Lemma 17 with respect to Π and γ=α. Then codim(Π)7d1α. Moreover,

Pr𝒙,𝒚[Π(𝒙,𝒚)Π~(𝒙,𝒚)]exp(d).

We can then apply Lemma 23 and conclude that

Pr𝒙,𝒚[C𝒊(𝒙,𝒚)=0𝒊=Π(𝒙,𝒚)]Pr𝒙,𝒚[C𝒊(𝒙,𝒚)=0𝒊=Π~(𝒙,𝒚)]+exp(d)=d2Ω(Δ)+exp(d).

References

  • [1] Michael Alekhnovich. Lower bounds for k-dnf resolution on random 3-cnfs. Comput. Complex., 20(4):597–614, 2011. doi:10.1007/s00037-011-0026-0.
  • [2] Michael Alekhnovich, Eli Ben-Sasson, Alexander A. Razborov, and Avi Wigderson. Pseudorandom generators in propositional proof complexity. SIAM J. Comput., 34(1):67–88, 2004. doi:10.1137/S0097539701389944.
  • [3] Michael Alekhnovich and Alexander A. Razborov. Lower bounds for polynomial calculus: Non-binomial case. Proceedings of the Steklov Institute of Mathematics, 242:18–35, 2003. Available at http://people.cs.uchicago.edu/˜razborov/files/misha.pdf. Preliminary version in FOCS ’01.
  • [4] Paul Beame, Richard M. Karp, Toniann Pitassi, and Michael E. Saks. The efficiency of resolution and davis–putnam procedures. SIAM J. Comput., 31(4):1048–1075, 2002. doi:10.1137/S0097539700369156.
  • [5] Paul Beame, Toniann Pitassi, and Nathan Segerlind. Lower bounds for lov[a-acute]sz–schrijver systems and beyond follow from multiparty communication complexity. SIAM J. Comput., 37(3):845–869, 2007. doi:10.1137/060654645.
  • [6] Paul Beame and Michael Whitmeyer. Multiparty Communication Complexity of Collision-Finding and Cutting Planes Proofs of Concise Pigeonhole Principles. In Keren Censor-Hillel, Fabrizio Grandoni, Joël Ouaknine, and Gabriele Puppis, editors, 52nd International Colloquium on Automata, Languages, and Programming (ICALP 2025), volume 334 of Leibniz International Proceedings in Informatics (LIPIcs), pages 21:1–21:20, Dagstuhl, Germany, 2025. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.ICALP.2025.21.
  • [7] Vašek Chvátal and Endre Szemerédi. Many hard examples for resolution. J. ACM, 35(4):759–768, October 1988. doi:10.1145/48014.48016.
  • [8] Amit Daniely and Shai Shalev-Shwartz. Complexity theoretic limitations on learning dnf’s. In Vitaly Feldman, Alexander Rakhlin, and Ohad Shamir, editors, 29th Annual Conference on Learning Theory, volume 49 of Proceedings of Machine Learning Research, pages 815–830, Columbia University, New York, New York, USA, 23–26 June 2016. PMLR. URL: https://proceedings.mlr.press/v49/daniely16.html.
  • [9] Susanna F. de Rezende, Noah Fleming, Duri Andrea Janett, Jakob Nordström, and Shuo Pang. Truly supercritical trade-offs for resolution, cutting planes, monotone circuits, and weisfeiler–leman. In Proceedings of the 57th Annual ACM Symposium on Theory of Computing, STOC ’25, pages 1371–1382, New York, NY, USA, 2025. Association for Computing Machinery. doi:10.1145/3717823.3718271.
  • [10] Susanna F. de Rezende, Jakob Nordström, and Marc Vinyals. How limited interaction hinders real communication (and what it means for proof and circuit complexity). In Irit Dinur, editor, IEEE 57th Annual Symposium on Foundations of Computer Science, FOCS 2016, 9-11 October 2016, Hyatt Regency, New Brunswick, New Jersey, USA, pages 295–304. IEEE Computer Society, 2016. doi:10.1109/FOCS.2016.40.
  • [11] Uriel Feige. Relations between average case complexity and approximation complexity. In Proceedings of the 17th Annual IEEE Conference on Computational Complexity, Montréal, Québec, Canada, May 21-24, 2002, page 5. IEEE Computer Society, 2002. doi:10.1109/CCC.2002.10006.
  • [12] Noah Fleming, Denis Pankratov, Toniann Pitassi, and Robert Robere. Random Θ(logn)-CNFs are Hard for Cutting Planes. J. ACM, 69(3):19:1–19:32, 2022. doi:10.1145/3486680.
  • [13] Ankit Garg, Mika Göös, Pritish Kamath, and Dmitry Sokolov. Monotone circuit lower bounds from resolution. Theory Comput., 16:1–30, 2020. doi:10.4086/TOC.2020.V016A013.
  • [14] Mika Göös, Tom Gur, Siddhartha Jain, and Jiawei Li. Quantum communication advantage in tfnp. In Proceedings of the 57th Annual ACM Symposium on Theory of Computing, STOC ’25, pages 1465–1475, New York, NY, USA, 2025. Association for Computing Machinery. doi:10.1145/3717823.3718155.
  • [15] Mika Göös, Rahul Jain, and Thomas Watson. Extension complexity of independent set polytopes. SIAM J. Comput., 47(1):241–269, 2018. doi:10.1137/16M109884X.
  • [16] Mika Göös, T. S. Jayram, Toniann Pitassi, and Thomas Watson. Randomized communication versus partition number. ACM Trans. Comput. Theory, 10(1):4:1–4:20, 2018. doi:10.1145/3170711.
  • [17] Mika Göös, Pritish Kamath, Robert Robere, and Dmitry Sokolov. Adventures in monotone complexity and TFNP. In Avrim Blum, editor, 10th Innovations in Theoretical Computer Science Conference, ITCS 2019, January 10-12, 2019, San Diego, California, USA, volume 124 of LIPIcs, pages 38:1–38:19. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2019. doi:10.4230/LIPIcs.ITCS.2019.38.
  • [18] Mika Göös, Shachar Lovett, Raghu Meka, Thomas Watson, and David Zuckerman. Rectangles are nonnegative juntas. SIAM J. Comput., 45(5):1835–1869, 2016. doi:10.1137/15M103145X.
  • [19] Mika Göös, Gilbert Maystre, Kilian Risse, and Dmitry Sokolov. Supercritical tradeoffs for monotone circuits. In Proceedings of the 57th Annual ACM Symposium on Theory of Computing, STOC ’25, pages 1359–1370, New York, NY, USA, 2025. Association for Computing Machinery. doi:10.1145/3717823.3718229.
  • [20] Mika Göös, Ilan Newman, Artur Riazanov, and Dmitry Sokolov. Hardness condensation by restriction. In Bojan Mohar, Igor Shinkar, and Ryan O’Donnell, editors, Proceedings of the 56th Annual ACM Symposium on Theory of Computing, STOC 2024, Vancouver, BC, Canada, June 24-28, 2024, pages 2016–2027. ACM, 2024. doi:10.1145/3618260.3649711.
  • [21] Mika Göös and Toniann Pitassi. Communication lower bounds via critical block sensitivity. SIAM Journal on Computing, 47(5):1778–1806, 2018. doi:10.1137/16M1082007.
  • [22] Mika Göös, Toniann Pitassi, and Thomas Watson. Query-to-communication lifting for BPP. SIAM Journal on Computing, 49(4), 2020. doi:10.1137/17M115339X.
  • [23] Dima Grigoriev. Linear lower bound on degrees of positivstellensatz calculus proofs for the parity. Theoretical Computer Science, 259(1):613–622, 2001. doi:10.1016/S0304-3975(00)00157-2.
  • [24] Pavel Hrubes and Pavel Pudlák. Random formulas, monotone circuits, and interpolation. In Chris Umans, editor, 58th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2017, Berkeley, CA, USA, October 15-17, 2017, pages 121–131. IEEE Computer Society, 2017. doi:10.1109/FOCS.2017.20.
  • [25] Trinh Huynh and Jakob Nordström. On the virtue of succinct proofs: amplifying communication complexity hardness to time-space trade-offs in proof complexity. In Howard J. Karloff and Toniann Pitassi, editors, Proceedings of the 44th Symposium on Theory of Computing Conference, STOC 2012, New York, NY, USA, May 19 - 22, 2012, pages 233–248. ACM, 2012. doi:10.1145/2213977.2214000.
  • [26] Russell Impagliazzo, Toniann Pitassi, and Alasdair Urquhart. Upper and lower bounds for tree-like cutting planes proofs. In Proceedings of the Ninth Annual Symposium on Logic in Computer Science (LICS ’94), Paris, France, July 4-7, 1994, pages 220–228. IEEE Computer Society, 1994. doi:10.1109/LICS.1994.316069.
  • [27] Dmitry Itsykson and Artur Riazanov. Proof complexity of natural formulas via communication arguments. In Valentine Kabanets, editor, 36th Computational Complexity Conference, CCC 2021, July 20-23, 2021, Toronto, Ontario, Canada (Virtual Conference), volume 200 of LIPIcs, pages 3:1–3:34. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2021. doi:10.4230/LIPIcs.CCC.2021.3.
  • [28] Dmitry Itsykson and Dmitry Sokolov. Resolution over linear equations modulo two. Ann. Pure Appl. Log., 171(1), 2020. doi:10.1016/J.APAL.2019.102722.
  • [29] Mauricio Karchmer and Avi Wigderson. Monotone circuits for connectivity require super-logarithmic depth. SIAM J. Discret. Math., 3(2):255–265, 1990. doi:10.1137/0403021.
  • [30] Jan Krajícek. Interpolation theorems, lower bounds for proof systems, and independence results for bounded arithmetic. J. Symb. Log., 62(2):457–486, 1997. doi:10.2307/2275541.
  • [31] László Lovász, Moni Naor, Ilan Newman, and Avi Wigderson. Search problems in the decision tree model. SIAM J. Discret. Math., 8(1):119–132, 1995. doi:10.1137/S0895480192233867.
  • [32] Shachar Lovett, Raghu Meka, Ian Mertz, Toniann Pitassi, and Jiapeng Zhang. Lifting with sunflowers. In Mark Braverman, editor, 13th Innovations in Theoretical Computer Science Conference, ITCS 2022, January 31 - February 3, 2022, Berkeley, CA, USA, volume 215 of LIPIcs, pages 104:1–104:24. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2022. doi:10.4230/LIPIcs.ITCS.2022.104.
  • [33] Marc Mezard, Giorgio Parisi, and Riccardo Zecchina. Analytic and algorithmic solution of random satisfiability problems. Science (New York, N.Y.), 297:812–815, September 2002. doi:10.1126/science.1073287.
  • [34] Toniann Pitassi and Robert Robere. Lifting nullstellensatz to monotone span programs over any field. In Ilias Diakonikolas, David Kempe, and Monika Henzinger, editors, Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2018, Los Angeles, CA, USA, June 25-29, 2018, pages 1207–1219. ACM, 2018. doi:10.1145/3188745.3188914.
  • [35] Pavel Pudlák. Lower bounds for resolution and cutting plane proofs and monotone computations. J. Symb. Log., 62(3):981–998, 1997. doi:10.2307/2275583.
  • [36] Alexander A. Razborov. Applications of matrix methods to the theory of lower bounds in computational complexity. Comb., 10(1):81–93, 1990. doi:10.1007/BF02122698.
  • [37] Robert Robere, Toniann Pitassi, Benjamin Rossman, and Stephen A. Cook. Exponential lower bounds for monotone span programs. In Irit Dinur, editor, IEEE 57th Annual Symposium on Foundations of Computer Science, FOCS 2016, 9-11 October 2016, Hyatt Regency, New Brunswick, New Jersey, USA, pages 406–415. IEEE Computer Society, 2016. doi:10.1109/FOCS.2016.51.
  • [38] Anastasia Sofronova and Dmitry Sokolov. A lower bound for k-dnf resolution on random CNF formulas via expansion. Electron. Colloquium Comput. Complex., TR22-054, 2022. URL: https://eccc.weizmann.ac.il/report/2022/054.
  • [39] Dmitry Sokolov. (semi)algebraic proofs over ±1 variables. In Konstantin Makarychev, Yury Makarychev, Madhur Tulsiani, Gautam Kamath, and Julia Chuzhoy, editors, Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, STOC 2020, Chicago, IL, USA, June 22-26, 2020, pages 78–90. ACM, 2020. doi:10.1145/3357713.3384288.
  • [40] Dmitry Sokolov. Random (logn)-CNF Are Hard for Cutting Planes (Again). In Bojan Mohar, Igor Shinkar, and Ryan O’Donnell, editors, Proceedings of the 56th Annual ACM Symposium on Theory of Computing, STOC 2024, Vancouver, BC, Canada, June 24-28, 2024, pages 2008–2015. ACM, 2024. doi:10.1145/3618260.3649636.
  • [41] Shuo Wang, Guangxu Yang, and Jiapeng Zhang. Communication Complexity of Set-Intersection Problems and Its Applications. Technical report, ECCC, 2023. URL: https://eccc.weizmann.ac.il/report/2023/164.
  • [42] Guangxu Yang and Jiapeng Zhang. Communication lower bounds for collision problems via density increment arguments. In Proceedings of the 56th Annual ACM Symposium on Theory of Computing, STOC 2024, pages 630–639, New York, NY, USA, 2024. Association for Computing Machinery. doi:10.1145/3618260.3649607.

Appendix A Proof of Lemma 8

We start by proving Item 1 (Item 2 is analogous). Let N𝑿(i) for i[m] be the set of neighbors of i in 𝑿 and N𝒀(i) – in 𝒀. Then Error𝑿={i[m]|N𝑿(i)|>(1δ)Δ}. We then write

𝔼[|Error𝑿|] =i[m]Pr[|N𝑿(i)|>(1δ)Δ]
=i[m]SN(i):|S|(1δ)ΔPr[𝑿N(i)=S]
=mjδΔ(mmj)2Δ
m2(1H(δ))Δ
=αn2H(δ)Δ
=αn1+cH(δ)

On the other hand for every iError𝑿 we have

Pr𝒙{0,1}𝑿[Ci(𝒙,)1]=2|N𝑿(i)|2(1δ)Δ=nc(1δ).

Then by a union bound we get

Pr𝒙{0,1}𝑿[iError𝑿:Ci(𝒙,)1]|Error𝑿|nc(1δ).

Then by Markov’s inequality applied to |Error𝑿| with probability 1ε over 𝑿 we have

Pr𝒙{0,1}𝑿[iError𝑿:Ci(𝒙,)1] 1/ε𝔼[|Error𝑿|]nc(1δ)
=α/εn1+cH(δ)c(1δ)
=α/εn1c(1δH(δ))

Now it remains to prove Item 3. First, let 𝑮([m],[n],E𝑿E𝒀) be the union of G𝑿 and G𝒀. By Lemma 6 whp over 𝝋 the graph 𝑮 is an (r,Δ,(1η)Δ)-expander for any η and r=Ωη(nΔ). Now it is sufficient to show G𝑿Error𝒀 is an (r,Δ,(δ2η)Δ)-expander whp, G𝒀Error𝑿 is distributed identically to G𝑿Error𝒀 and removing additional nodes from the left-hand side does not reduce expansion.

We in fact show that conditioned on the fact that 𝑮 is an (r,Δ,(1η)Δ)-expander, G𝑿Error𝒀 is (r,Δ,(δ2η)Δ)-expander with probability 1. Consider an arbitrary subset U[m] of size at most r. For every such subset we need to have |N(U)𝒀N(Error𝒀)|(δ2η)Δ|UError𝒀|. Here and below N(S)=N𝑮(S). Consider the set U{vN(U)v is connected with a single node in U}. Then |U|(12η)|U|Δ: indeed the number of edges incident to U can be estimated in two ways:

Δ|U|=|E(U×[n])||U|+2(|N(U)||U|)2(1η)Δ|U||U|.

Then we can partition the set N(U) into sets Ni for iU where NiN(i) and |Ni|(12η)Δ: find a node iU such that |UN(i)|(12η)Δ, let NiUN(i) and continue the process for U{i}, the reason the resulting sets form a partition is that NiN(U{i})= by the definition of U.

For every Y[n] if |N(i)Y|δΔ, then |NiY||N(i)Y||N(i)Ni|(δ2η)Δ. It follows that after removing Error𝒀 (vertices for which |N(i)𝒀|<δΔ), every vertex i in the set UError𝒀 in G𝑿 has at least (δ2η)Δ neighbours in Ni𝒀. As Ni is a partition, it follows that |N(U)Error𝒀N(Error𝒀)|(δ2η)Δ|UError𝒀|.

Finally, choosing η=δ/4 completes the proof. By Lemma 6 this particular choice only affects the hidden constant in r=Ω(n/Δ).

Appendix B Proof of Lemma 22

Since 𝖢𝗅X and 𝖢𝗅Y are independent of each other, we just focus on constructing 𝖢𝗅X. It suffices to prove the following lemma:

Lemma 26.

Let G=([m],[n],E) be an (r,Δ,αΔ)-expander. Let 𝒯 be a tree with nodes labeled with subsets of [n], where Sv[n] denotes the label of v such that

  • For the root of 𝒯, the node r we have Sr=.

  • If u is a parent of v, then SuSv.

  • For every u we have |Su|d(αβ)2rΔ/4.

Then there for every node u to 𝒯 there exists a set Tu[m] such that

  1. (a)

    The graph GuGTuSuN(Tu) is an (r,Δ,βΔ)-expander.

  2. (b)

    If u is a parent of v, then TuTv.

  3. (c)

    |Tu|1αβd/Δ.

To finish the proof of Lemma 22 given Lemma 26 we just let 𝒯 be the tree of the protocol and Su be fix(Xu), then take 𝖢𝗅X(u)Tu.

We now proceed to prove Lemma 26. Wlog we may assume that if u is a parent of v we have |SvSu|1 (just by replacing a single edge in 𝒯 by a chain of edges).

We construct the sets Tu inductively starting from the root r where Tr=. Suppose u is a parent of node v and we have constructed Tu. If Su=Sv, we just let TvTu, so assume that SvSu={i}. Let GuGui. Let us find the largest set Bv[m]Tu such that |Bv|r and |NGu(Bv)|βΔ|Bv| and let TvTuBv. Then Gv=GuTuNGu(Tu). It is clear that T satisfies Item (b).

Proof of Item (c).

We show by induction on the depth of a node u that |Tu|1αβ/Δ. The base case is satisfied since for the root r the set Tr is empty. Now let u be a node at depth and v be its child at depth +1. We have that |Tu|1αβ/Δ, we need to prove that |Tv|=|TuBv|1αβ(+1)/Δ.

On the one hand NGu(Bv)=NG(Bv)(NG(Tu)Sv). On the other hand, |NGu(Bv)|βΔ|Bv|. By the expansion of G we have |NG(Bv)|αΔ|Bv|. Hence |NG(Tu)Sv|(αβ)Δ|Bv|. By the assumption on the tree |Sv|=+1, and by induction hypothesis |Tu|1αβ/Δ, so |NG(Tu))|1αβ.

Combining the two inequalities, we get 1αβ+(+1)(αβ)Δ|Bv|.

From that, we get |Bv|21(αβ)2Δ(+1)r/2, where the last inequality follows from the assumptions on . Then we get that |Tv||Tu|+|Bv|r. Now we can use expansion of G to bound |NG(Tv)|αΔ|Tv|. On the other hand, let r=w0,w1,,w=u,w+1=v be the path in 𝒯 from the root to v. We then have

NG(Tv)i=0NGwi(Bwi+1)Sv.

By the choice of sets B we get |NG(Tv)|βΔ|Tv|+|Sv|. Combining the two bounds we get |Tv|1αβ|Sv|/Δ, which concludes the proof.

Proof of Item (a).

Pick the node v at depth +1 such that Gv is not an (r,Δ,βΔ)-expander, and v is the closest to the root among such nodes. In particular, for its parent u the graph Gu is (r,Δ,βΔ)-expander. Then there exists a set T of size at most r such that NGv(T)<βΔ|T|. By expansion of G we get |NG(T)|αΔ|T|. Then, since NGv(T)=NG(T)(NG(Tv)Sv) we have

12(αβ)Δr2αβ1αβ+(+1)|NG(Tv)Sv|(αβ)Δ|T|.

The left-hand side follows from Item (c) and the right-hand side follows from the analysis above. Then |T|r/2. Since by the proof of Item (c) we have that |Bv|r/2, we get |TBv|r, yet |NGu(TBv)|<βΔ|Bv|+βΔ|T|βΔ|BvT|, contradicting the choice of Bv.

Appendix C Proof of Lemma 21

Lemma 21. [Restated, see original statement.]

Let 𝐚1,,𝐚n be a random sequence of reals and ζ>0 be some fixed parameter. If for any 1kn and a1,,ak1 such that Pr[𝐚1=a1,,𝐚k1=ak1]>0,

Pr[𝒂kx𝒂1=a1,,𝒂k1=ak1]exp(ζx),

then

Pr[i=1n𝒂i4ζn]exp(n).

Proof.

Let λ(0,ζ) be some parameter that will be determined later. First, observe that for any 1kn and a1,,ak1 such that Pr[𝒂1=a1,,𝒂k1=ak1]>0,

𝔼[exp(λ𝒂k)𝒂1=a1,,𝒂k1=ak1]ζ0exp(λx)exp(ζx)dx=ζ/(ζλ). (2)

Next, we prove by induction on k from n to 1 that

𝔼[exp(λi=kn𝒂i)|𝒂1=a1,,𝒂k1=ak1](ζζλ)nk+1. (3)

The base case k=n is exactly (2). Now assume that (3) holds for all km+1. Then

𝔼[exp(λi=mn𝒂i)|𝒂1=a1,,𝒂m1=am1]
amPr[𝒂m=am𝒂1=a1,,𝒂m1=am1]exp(λam)
𝔼[exp(λi=m+1n𝒂i)|𝒂1=a1,,𝒂m=am]
(λζλ)nm𝔼[exp(λ𝒂m)𝒂1=a1,,𝒂m1=am1]
= (λζλ)nm+1.

Finally, by setting λ=ζ/2, we conclude that

Pr[i=1n𝒂i4ζn] =Pr[exp(λi=1n𝒂i)exp(4λζn)]
𝔼[exp(λi=1n𝒂i)]exp(2n)
(ζζλ)nexp(2n)
exp(n).