On Probabilistic Time versus Alternating Time

Sipser and GAƒÂics, and independently Lautemann, proved in '83 that probabilistic polynomial time is contained in the second level of the polynomial-time hierarchy, i.e. BPP is in Sigma_2 P. This is essentially the only non-trivial upper bound that we have on the power of probabilistic computation. More precisely, the Sipser-GAƒÂics-Lautemann simulation shows that probabilistic time can be simulated deterministically, using two quantifiers, **with a quadratic blow-up in the running time**. That is, BPTime(t) is contained in Sigma_2 Time(t^2). In this talk we discuss whether this quadratic blow-up in the running time is necessary. We show that the quadratic blow-up is indeed necessary for black-box simulations that use two quantifiers, such as those of Sipser, GAƒÂics, and Lautemann. To obtain this result, we prove a new circuit lower bound for computing **approximate majority**, i.e. computing the majority of a given bit-string whose fraction of 1's is bounded away from 1/2 (by a constant): We show that small depth-3 circuits for approximate majority must have bottom fan-in Omega(log n). On the positive side, we obtain that probabilistic time can be simulated deterministically, using three quantifiers, in quasilinear time. That is, BPTime(t) is contained in Sigma_3 Time(t polylog t). Along the way, we show that approximate majority can be computed by uniform polynomial-size depth-3 circuits. This is a uniform version of a striking result by Ajtai that gives *non-uniform* polynomial-size depth-3 circuits for approximate majority. If time permits, we will discuss some applications of our results to proving lower bounds on randomized Turing machines.

[1]  Michael Sipser,et al.  Parity, circuits, and the polynomial-time hierarchy , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[2]  Samuel R. Buss,et al.  Switching lemma for small restrictions and lower bounds for k-DNF resolution , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..

[3]  Michael Sipser,et al.  A complexity theoretic approach to randomness , 1983, STOC.

[4]  Miklós Ajtai,et al.  ∑11-Formulae on finite structures , 1983, Ann. Pure Appl. Log..

[5]  D. Melkebeek TIME-SPACE LOWER BOUNDS FOR NP-COMPLETE PROBLEMS , 2004 .

[6]  Richard J. Lipton,et al.  Time-space lower bounds for satisfiability , 2005, JACM.

[7]  Alexander Russell,et al.  Symmetric alternation captures BPP , 1998, computational complexity.

[8]  Larry J. Stockmeyer,et al.  On Approximation Algorithms for #P , 1985, SIAM J. Comput..

[9]  Salil P. Vadhan,et al.  The round complexity of two-party random selection , 2005, STOC '05.

[10]  Nabil Kahale,et al.  Eigenvalues and expansion of regular graphs , 1995, JACM.

[11]  Ran Raz,et al.  A time lower bound for satisfiability , 2004, Theor. Comput. Sci..

[12]  Eric Allender,et al.  Time-space tradeoffs in the counting hierarchy , 2001, Proceedings 16th Annual IEEE Conference on Computational Complexity.

[13]  Zvi Galil,et al.  Explicit Constructions of Linear-Sized Superconcentrators , 1981, J. Comput. Syst. Sci..

[14]  Noam Nisan,et al.  Pseudorandom generators for space-bounded computations , 1990, STOC '90.

[15]  Oded Goldreich,et al.  Another proof that bpp?ph (and more) , 1997 .

[16]  Noam Nisan,et al.  Pseudorandom generators for space-bounded computation , 1992, Comb..

[17]  Dieter van Melkebeek,et al.  Time-Space Lower Bounds for the Polynomial-Time Hierarchy on Randomized Machines , 2006, SIAM J. Comput..

[18]  Michael E. Saks,et al.  Time-space trade-off lower bounds for randomized computation of decision problems , 2003, JACM.

[19]  Wolfgang Maass,et al.  Speed-Up of Turing Machines with One Work Tape and a Two-Way Input Tape , 1987, SIAM J. Comput..

[20]  Moni Naor,et al.  Small-bias probability spaces: efficient constructions and applications , 1990, STOC '90.

[21]  Ran Canetti More on BPP and the Polynomial-Time Hierarchy , 1996, Inf. Process. Lett..

[22]  Noam Nisan,et al.  On read-once vs. multiple access to randomness in logspace , 1990, Proceedings Fifth Annual Structure in Complexity Theory Conference.

[23]  Noam Nisan,et al.  Pseudorandomness for network algorithms , 1994, STOC '94.

[24]  J. Håstad Computational limitations of small-depth circuits , 1987 .

[25]  Ronald V. Book What is Structural Complexity Theory , 1989 .

[26]  Miklós Ajtai,et al.  Approximate Counting with Uniform Constant-Depth Circuits , 1990, Advances In Computational Complexity Theory.

[27]  Akira Maruoka,et al.  Expanders obtained from affine transformations , 1985, STOC '85.

[28]  Yacov Yacobi,et al.  The Complexity of Promise Problems with Applications to Public-Key Cryptography , 1984, Inf. Control..

[29]  Clemens Lautemann,et al.  BPP and the Polynomial Hierarchy , 1983, Inf. Process. Lett..

[30]  Oded Goldreich,et al.  Modern Cryptography, Probabilistic Proofs and Pseudorandomness , 1998, Algorithms and Combinatorics.

[31]  Z. Galil,et al.  Explicit constructions of linear size superconcentrators , 1979, 20th Annual Symposium on Foundations of Computer Science (sfcs 1979).