Impossibility results for recycling random bits in two-prover proof systems

Recycling random bits (that is, replacing independent random bits by dependent random bits extracted from a pseudo-random bit generator) has been a successful enterprise in many scenarios, including cryptography, NC computations, space bounded computation, RP and BPP algorithms, and interactive proofs. A wide variety of techniques have been introduced for this purpose. Recycling random bits is highly motivated in the context of parallel repetition of two-prover one-round proof systems, where (if it were possible) it would lead to stronger hardness results for approximating NP-hard optimization problems. In this paper we show that the great success enjoyed by general techniques for recycling random bits in other contexts meets its limits when MIP(2, 1) proof systems are concerned. That is, there are natural MIP(2, 1) proof systems for 3-SAT for which parallel repetition using independent random bits can reduce the error to be polynomially small, but parallel repetition using pseudo-random bits cannot reduce the error below a constant, regardless of the nature of the pseudo-random source. *Incumbent of the Joseph and Celia Reskin Career Development Chair, Department of Applied Math and Computer Science, the Weizmann Institute, Rehovot 76100, Israel. f eige@wisdom. weizmann. ac il. Supported by a Yigal Alon Fellowship. t NEC Resemch Institute, 4 Independence Way, Princeton NJ, 08540. joet?research .nj .nec. corn. Permission to copy without fee all or part of this material is granted provided that the copies are not made or distribute for direct commercial advantage, the ACM copyri ht notice and the 8 title of the publication and Its date appear, an notice is given that copyin is by permission of the Association of Computing Machinery. o cop otherwise or to republish, requires ~f,, Wdh!’speciLpermissi& . . . STOC’ 95, Las Vegas, Nevada, USA @ 1995 ACM 0-89791 -718-9/95/0005.. $3.50 Joe Kiliant

[1]  Leonid A. Levin,et al.  Security preserving amplification of hardness , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.

[2]  Avi Wigderson,et al.  Multi-prover interactive proofs: how to remove intractability assumptions , 2019, STOC '88.

[3]  Mihir Bellare,et al.  Interactive proofs and approximation: reductions from two provers in one round , 1993, [1993] The 2nd Israel Symposium on Theory and Computing Systems.

[4]  Avi Wigderson,et al.  Dispersers, deterministic amplification, and weak random sources , 1989, 30th Annual Symposium on Foundations of Computer Science.

[5]  Leonid A. Levin,et al.  Pseudo-random generation from one-way functions , 1989, STOC '89.

[6]  László Lovász,et al.  Approximating clique is almost NP-complete , 1991, [1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science.

[7]  Moni Naor,et al.  Small-Bias Probability Spaces: Efficient Constructions and Applications , 1993, SIAM J. Comput..

[8]  Sanjeev Arora,et al.  Probabilistic checking of proofs; a new characterization of NP , 1992, Proceedings., 33rd Annual Symposium on Foundations of Computer Science.

[9]  Carsten Lund,et al.  On the hardness of approximating minimization problems , 1993, STOC.

[10]  A. Wigderson,et al.  Dispersers , Deterministic Ampli cation , and Weak RandomSources , 1989 .

[11]  Noam Nisan,et al.  Multiparty Protocols and Logspace-hard Pseudorandom Sequences (Extended Abstract) , 1989, Symposium on the Theory of Computing.

[12]  Michael Luby,et al.  A simple parallel algorithm for the maximal independent set problem , 1985, STOC '85.

[13]  Ran Raz,et al.  A parallel repetition theorem , 1995, STOC '95.

[14]  Carsten Lund,et al.  Proof verification and hardness of approximation problems , 1992, Proceedings., 33rd Annual Symposium on Foundations of Computer Science.

[15]  Noam Nisan,et al.  More deterministic simulation in logspace , 1993, STOC.

[16]  Noam Nisan Rl <= Sc , 1994, Comput. Complex..

[17]  Moni Naor,et al.  Small-bias probability spaces: efficient constructions and applications , 1990, STOC '90.

[18]  Oded Goldreich,et al.  RSA and Rabin Functions: Certain Parts are as Hard as the Whole , 1988, SIAM J. Comput..

[19]  Mihalis Yannakakis,et al.  Optimization, approximation, and complexity classes , 1991, STOC '88.

[20]  László Lovász,et al.  Two-prover one-round proof systems: their power and their problems (extended abstract) , 1992, STOC '92.

[21]  Carsten Lund,et al.  Efficient probabilistically checkable proofs and applications to approximations , 1993, STOC.

[22]  Noam Nisan,et al.  Multiparty protocols and logspace-hard pseudorandom sequences , 1989, STOC '89.

[23]  János Komlós,et al.  Deterministic simulation in LOGSPACE , 1987, STOC.

[24]  Russell Impagliazzo,et al.  How to recycle random bits , 1989, 30th Annual Symposium on Foundations of Computer Science.

[25]  L. Lovász Combinatorial problems and exercises , 1979 .

[26]  Oded Goldreich,et al.  On the power of two-point based sampling , 1989, J. Complex..