On the Hardness of Computing the Permanent of Random Matrices (Extended Abstract)

We study the complexity of computing the permanent on random inputs. We consider matrices drawn randomly from the space of n by n matrices with integer values between 0 and p –1, for any large enough prime p . We show that any polynomial time algorithm which computes the permanent correctly on even an exponentially small fraction of these matrices, implies the collapse of the polynomial-time hierarchy to its second level. We also show that it is hard to get partial information about the value of the permanent modulo p . We show that any balanced polynomial-time 0/1 predicate (e.g., the least significant bit, the parity of all the bits, the quadratic residuosity character) cannot be guessed with probability significantly greater than 1/2 (unless the polynomial hierarchy collapses). This result can be extended to showing simultaneous hardness for linear size groups of bits.

[1]  Manuel Blum,et al.  How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).

[2]  Leslie G. Valiant,et al.  NP is as easy as detecting unique solutions , 1985, STOC '85.

[3]  W. Schmidt Equations over Finite Fields: An Elementary Approach , 1976 .

[4]  Mark Jerrum,et al.  Approximating the Permanent , 1989, SIAM J. Comput..

[5]  Madhu Sudan,et al.  Highly Resilient Correctors for Polynomials , 1992, Inf. Process. Lett..

[6]  László Babai,et al.  Trading group theory for randomness , 1985, STOC '85.

[7]  Ronitt Rubinfeld,et al.  Self-testing/correcting for polynomials and for approximate functions , 1991, STOC '91.

[8]  Jacob T. Schwartz,et al.  Fast Probabilistic Algorithms for Verification of Polynomial Identities , 1980, J. ACM.

[9]  F. MacWilliams,et al.  The Theory of Error-Correcting Codes , 1977 .

[10]  Silvio Micali,et al.  The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..

[11]  Larry J. Stockmeyer,et al.  The complexity of approximate counting , 1983, STOC.

[12]  Shafi Goldwasser,et al.  Private coins versus public coins in interactive proof systems , 1986, STOC '86.

[13]  Richard J. Lipton,et al.  New Directions In Testing , 1989, Distributed Computing And Cryptography.

[14]  Oded Goldreich,et al.  RSA/Rabin Bits are 1/2 + 1/poly(log N) Secure , 1984, FOCS.

[15]  Adi Shamir,et al.  The discrete log is very discreet , 1990, STOC '90.

[16]  Joan Feigenbaum,et al.  Hiding Instances in Multioracle Queries , 1990, STACS.

[17]  Jacob T. Schwartz Probabilistic algorithms for verification of polynomial identities (invited) , 1979, EUROSAM.

[18]  Richard J. Lipton,et al.  A Monte-Carlo Algorithm for Estimating the Permanent , 1993, SIAM J. Comput..

[19]  Leonid A. Levin,et al.  A hard-core predicate for all one-way functions , 1989, STOC '89.

[20]  Carsten Lund,et al.  Algebraic methods for interactive proof systems , 1992, JACM.

[21]  Viktória Zankó,et al.  #P-Completeness via Many-One Reductions , 1990, Int. J. Found. Comput. Sci..

[22]  Andrei Z. Broder,et al.  How hard is it to marry at random? (On the approximation of the permanent) , 1986, STOC '86.

[23]  Leslie G. Valiant,et al.  The Complexity of Computing the Permanent , 1979, Theor. Comput. Sci..

[24]  Seinosuke Toda On the computational power of PP and (+)P , 1989, 30th Annual Symposium on Foundations of Computer Science.

[25]  Stathis Zachos,et al.  Does co-NP Have Short Interactive Proofs? , 1987, Inf. Process. Lett..

[26]  Jin-Yi Cai,et al.  A Note on Enumarative Counting , 1991, Inf. Process. Lett..