Efficient Checking of Polynomials and Proofs and the Hardness of Appoximation Problems

The definition of the class NP (Coo71, Lev73) highlights the problem of verification of proofs as one of central interest to theoretical computer science. Recent efforts have shown that the efficiency of the verification can be greatly improved by allowing the verifier access to random bits and accepting probabilistic guarantees from the verifier (BFL91, BFLS91, FGL$\sp+$91, AS92). We improve upon the efficiency of the proof systems developed above and obtain proofs which can be verified probabilistically by examining only a constant number of (randomly chosen) bits of the proof. The efficiently verifiable proofs constructed here rely on the structural properties of low-degree polynomials. We explore the properties of these functions by examining some simple and basic questions about them. We consider questions of the form: (1) (testing) Given an oracle for a function f, is f close to a low-degree polynomial? (2) (correcting) Let f be close to a low-degree polynomial g, is it possible to efficiently reconstruct the value of g on any given input using an oracle for f? The questions described above have been raised before in the context of coding theory as the problems of error-detecting and error-correcting of codes. More recently interest in such questions has been regenerated due to its connections with the area of program result checking. We use results from coding theory as a starting point and combine these with several algorithmic techniques including pairwise independent sampling to give efficient randomized algorithms for these tasks. As a consequence we obtain fast randomized algorithms for error-detection and error-correction for some well-known codes. The expressive nature of low-degree polynomials suffices to capture the complexity of the class NP and we translate our results on the efficiency of the testing and correcting procedures into two different efficiently verifiable proof systems for deciding membership questions for NP languages. One proof system generates small and somewhat efficiently verifiable proofs and the other generates very large but very efficiently verifiable proofs. We then employ new techniques from the paper of (AS92) to compose these proof systems to obtain small proofs which can be verified by probing them in just a constant number of (randomly chosen) bits. An important consequence of this result is that for a large class of NP-complete optimization problems, it can be shown that finding even approximate solutions is an NP-hard problem. The particular class of optimization problems we consider is MAX SNP, introduced by Papadimiatriou and Yannakakis (PY91). For every MAX SNP-hard problem we show that there is a constant $\epsilon$, such that approximating the optimum to within a relative error of $\epsilon$ is NP-hard.

[1]  Ronitt Rubinfeld,et al.  Self-testing polynomial functions efficiently and over rational domains , 1992, SODA '92.

[2]  R. Rubinfeld A mathematical theory of self-checking, self-testing and self-correcting programs , 1991 .

[3]  Viggo Kann,et al.  Maximum Bounded 3-Dimensional Matching is MAX SNP-Complete , 1991, Inf. Process. Lett..

[4]  Russell Impagliazzo,et al.  How to recycle random bits , 1989, 30th Annual Symposium on Foundations of Computer Science.

[5]  David S. Johnson,et al.  Approximation algorithms for combinatorial problems , 1973, STOC.

[6]  Giorgio Ausiello,et al.  On the Structure of Combinatorial Problems and Structure Preserving Reductions , 1977, ICALP.

[7]  David S. Johnson,et al.  Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .

[8]  Joan Feigenbaum,et al.  Hiding Instances in Multioracle Queries , 1990, STACS.

[9]  L. Fortnow,et al.  On the power of multi-power interactive protocols , 1988, [1988] Proceedings. Structure in Complexity Theory Third Annual Conference.

[10]  Gábor Tardos Multi-prover Encoding Schemes and Three-prover Proof Systems , 1996, J. Comput. Syst. Sci..

[11]  Lance Fortnow,et al.  On the Power of Multi-Prover Interactive Protocols , 1994, Theor. Comput. Sci..

[12]  Teofilo F. Gonzalez,et al.  P-Complete Approximation Problems , 1976, J. ACM.

[13]  Boris A. Trakhtenbrot,et al.  A Survey of Russian Approaches to Perebor (Brute-Force Searches) Algorithms , 1984, Annals of the History of Computing.

[14]  David S. Johnson,et al.  The Complexity of Near-Optimal Graph Coloring , 1976, J. ACM.

[15]  Mihir Bellare,et al.  The complexity of approximating a nonlinear program , 1995, Math. Program..

[16]  Mihir Bellare,et al.  Interactive proofs and approximation: reductions from two provers in one round , 1993, [1993] The 2nd Israel Symposium on Theory and Computing Systems.

[17]  Richard J. Lipton,et al.  PSPACE is provable by two provers in one round , 1991, [1991] Proceedings of the Sixth Annual Structure in Complexity Theory Conference.

[18]  Mihir Bellare,et al.  Linearity testing in characteristic two , 1996, IEEE Trans. Inf. Theory.

[19]  Stephen A. Cook,et al.  The complexity of theorem-proving procedures , 1971, STOC.

[20]  Madhu Sudan,et al.  Highly Resilient Correctors for Polynomials , 1992, Inf. Process. Lett..

[21]  Silvio Micali,et al.  Proofs that yield nothing but their validity and a methodology of cryptographic protocol design , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).

[22]  László Babai,et al.  Trading group theory for randomness , 1985, STOC '85.

[23]  Mihalis Yannakakis,et al.  Optimization, approximation, and complexity classes , 1991, STOC '88.

[24]  Mihalis Yannakakis,et al.  The Traveling Salesman Problem with Distances One and Two , 1993, Math. Oper. Res..

[25]  Adi Shamir,et al.  IP = PSPACE , 1992, JACM.

[26]  Martin Fürer Improved Hardness Results for Approximating the Chromatic Number , 1995, FOCS.

[27]  M. Sudan,et al.  Robust Characterizations of Polynomials and Their Applications to Program Testing , 1993 .

[28]  László Lovász,et al.  Two-prover one-round proof systems: their power and their problems (extended abstract) , 1992, STOC '92.

[29]  Avi Wigderson,et al.  Dispersers, deterministic amplification, and weak random sources , 1989, 30th Annual Symposium on Foundations of Computer Science.

[30]  Marshall W. Bern,et al.  The Steiner Problem with Edge Lengths 1 and 2 , 1989, Inf. Process. Lett..

[31]  Carsten Lund,et al.  Algebraic methods for interactive proof systems , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.

[32]  David B. Shmoys,et al.  A unified approach to approximation algorithms for bottleneck problems , 1986, JACM.

[33]  Joan Feigenbaum,et al.  Security with Low Communication Overhead , 1990, CRYPTO.

[34]  David P. Williamson,et al.  .879-approximation algorithms for MAX CUT and MAX 2SAT , 1994, STOC '94.

[35]  Adi Shamir,et al.  Fully parallelized multi prover protocols for NEXP-time , 1991, [1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science.

[36]  László Babai,et al.  Transparent (Holographic) Proofs , 1993, STACS.

[37]  Richard J. Lipton,et al.  New Directions In Testing , 1989, Distributed Computing And Cryptography.

[38]  László Babai,et al.  Transparent Proofs and Limits to Approximation , 1994 .

[39]  Sanjeev Arora,et al.  Reductions, codes, PCPs, and inapproximability , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.

[40]  Carsten Lund,et al.  The Approximation of Maximum Subgraph Problems , 1993, ICALP.

[41]  John E. Hopcroft,et al.  Complexity of Computer Computations , 1974, IFIP Congress.

[42]  David B. Shmoys,et al.  Using dual approximation algorithms for scheduling problems: Theoretical and practical results , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).

[43]  G. S. Lueker,et al.  Bin packing can be solved within 1 + ε in linear time , 1981 .

[44]  Ran Raz,et al.  A parallel repetition theorem , 1995, STOC '95.

[45]  László Babai,et al.  Arthur-Merlin Games: A Randomized Proof System, and a Hierarchy of Complexity Classes , 1988, J. Comput. Syst. Sci..

[46]  Tao Jiang,et al.  Linear approximation of shortest superstrings , 1991, STOC '91.

[47]  Manuel Blum,et al.  Self-testing/correcting with applications to numerical problems , 1990, STOC '90.

[48]  David B. Shmoys,et al.  Computing near-optimal solutions to combinatorial optimization problems , 1994, Combinatorial Optimization.

[49]  Martín Abadi,et al.  On hiding information from an oracle , 1987, J. Comput. Syst. Sci..

[50]  Ronitt Rubinfeld,et al.  Reconstructing algebraic functions from mixed data , 1992, Proceedings., 33rd Annual Symposium on Foundations of Computer Science.

[51]  Phokion G. Kolaitis,et al.  The decision problem for the probabilities of higher-order properties , 1987, STOC.

[52]  Ronitt Rubinfeld,et al.  Learning polynomials with queries: The highly noisy case , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.

[53]  Giorgio Ausiello,et al.  Structure Preserving Reductions among Convex Optimization Problems , 1980, J. Comput. Syst. Sci..

[54]  L. Babai,et al.  On slightly superlinear transparent proofs , 1993 .

[55]  Jacob T. Schwartz,et al.  Fast Probabilistic Algorithms for Verification of Polynomial Identities , 1980, J. ACM.

[56]  D. Garling,et al.  Algebra, Volume 1 , 1969, Mathematical Gazette.

[57]  Rusins Freivalds,et al.  Fast Probabilistic Algorithms , 1979, MFCS.

[58]  Shlomo Moran,et al.  Non Deterministic Polynomial Optimization Problems and their Approximations , 1977, Theoretical Computer Science.

[59]  Ronitt Rubinfeld,et al.  Self-testing/correcting for polynomials and for approximate functions , 1991, STOC '91.

[60]  Carsten Lund,et al.  On the hardness of approximating minimization problems , 1994, JACM.

[61]  Sanjeev Arora Probabilistic checking of proofs and hardness of approximation problems , 1995 .

[62]  David S. Johnson,et al.  Some Simplified NP-Complete Graph Problems , 1976, Theor. Comput. Sci..

[63]  Silvio Micali,et al.  The knowledge complexity of interactive proof-systems , 1985, STOC '85.

[64]  Giorgio Ausiello,et al.  Toward a Unified Approach for the Classification of NP-Complete Optimization Problems , 1979, Theor. Comput. Sci..

[65]  Joan Feigenbaum,et al.  Locally Random Reductions in Interactive Complexity Theory , 1990, Advances In Computational Complexity Theory.

[66]  László Lovász,et al.  Approximating clique is almost NP-complete , 1991, [1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science.

[67]  Mihir Bellare,et al.  Improved non-approximability results , 1994, STOC '94.

[68]  Shlomo Moran,et al.  Non Deterministic Polynomial Optimization Problems and their Approximations , 1977, Theor. Comput. Sci..

[69]  Piotr Berman,et al.  On the Complexity of Approximating the Independent Set Problem , 1989, Inf. Comput..

[70]  Joan Feigenbaum,et al.  Probabilistically checkable debate systems and approximation algorithms for PSPACE-hard functions , 1993, STOC.

[71]  Manuel Blum,et al.  Designing programs that check their work , 1989, STOC '89.

[72]  Pierluigi Crescenzi,et al.  A compendium of NP optimization problems , 1994, WWW Spring 1994.

[73]  Avi Wigderson,et al.  Multi-prover interactive proofs: how to remove intractability assumptions , 2019, STOC '88.

[74]  David Zuckerman,et al.  NP-complete problems have a version that's hard to approximate , 1993, [1993] Proceedings of the Eigth Annual Structure in Complexity Theory Conference.

[75]  David B. Shmoys,et al.  A Best Possible Heuristic for the k-Center Problem , 1985, Math. Oper. Res..

[76]  Martín Abadi,et al.  On hiding information from an oracle , 1987, STOC '87.

[77]  Carsten Lund,et al.  Non-deterministic exponential time has two-prover interactive protocols , 2005, computational complexity.

[78]  David S. Johnson,et al.  The NP-Completeness Column: An Ongoing Guide , 1982, J. Algorithms.

[79]  Michael Luby,et al.  A simple parallel algorithm for the maximal independent set problem , 1985, STOC '85.

[80]  Joan Feigenbaum,et al.  On the random-self-reducibility of complete sets , 1991, [1991] Proceedings of the Sixth Annual Structure in Complexity Theory Conference.

[81]  Carsten Lund,et al.  On the hardness of computing the permanent of random matrices , 1996, STOC '92.

[82]  Mihalis Yannakakis,et al.  The complexity of multiway cuts (extended abstract) , 1992, STOC '92.

[83]  Kireeti Kompella,et al.  Efficient Checkers for Number-Theoretic Computations , 1995, Inf. Comput..

[84]  Carsten Lund,et al.  Proof verification and the intractability of approximation problems , 1992, FOCS 1992.

[85]  Oded Goldreich,et al.  Probabilistic Proof Systems , 1994 .

[86]  Leonid A. Levin,et al.  Checking computations in polylogarithmic time , 1991, STOC '91.

[87]  Ronald Fagin Generalized first-order spectra, and polynomial. time recognizable sets , 1974 .

[88]  Leonid A. Levin,et al.  A hard-core predicate for all one-way functions , 1989, STOC '89.

[89]  V. Rich Personal communication , 1989, Nature.