Promise Problems and Access to Unambiguous Computation

This paper studies the power of three types of access to unambiguous computation: nonadaptive access, fault-tolerant access, and guarded access. (1) Though for NP it is known that nonadaptive access has exponentially terse adaptive simulations, we show that UP has no such relativizable simulations: there are worlds in which (k+1)-truth-table access to UP is not subsumed by k-Turing access to UP. (2) Though fault-tolerant access (i.e., "1-helping" access) is known to be no more powerful than NP itself, we give both structural and relativized evidence that fault tolerant access to UP suffices to recognize even sets beyond UP. Furthermore, we completely characterize, in terms of locally positive reductions, the sets that fault-tolerantly reduce to UP. (3) In guarded access, Grollmann and Selman''s natural notion of access to unambiguous computation, a deterministic polynomial-time Turing machine asks questions to a nondeterministic polynomial-time Turing machine in such a way that the nondeterministic machine never accepts ambiguously. In contrast to guarded access, the standard notion of access to unambiguous computation is that of access to a set that is uniformly unambiguous-- even for queries that it never will be asked by its questioner, it must be unambiguous. We show that these notions, though the same for nonadaptive reductions, differ for Turing and strong nondeterministic reductions.

[1]  Timothy J. Long,et al.  Quantitative Relativizations of Complexity Classes , 1984, SIAM J. Comput..

[2]  Ker-I Ko,et al.  On Helping by Robust Oracle Machines , 1987, Theor. Comput. Sci..

[3]  John T. Gill,et al.  Computational complexity of probabilistic Turing machines , 1974, STOC '74.

[4]  Alan L. Selman,et al.  Complexity Measures for Public-Key Cryptosystems , 1988, SIAM J. Comput..

[5]  Deborah Joseph,et al.  Some Remarks on Witness Functions for Nonpolynomial and Noncomplete Sets in NP , 1985, Theor. Comput. Sci..

[6]  David S. Johnson,et al.  A Catalog of Complexity Classes , 1991, Handbook of Theoretical Computer Science, Volume A: Algorithms and Complexity.

[7]  Richard Beigel,et al.  On the relativized power of additional accepting paths , 1989, [1989] Proceedings. Structure in Complexity Theory Fourth Annual Conference.

[8]  Yacov Yacobi,et al.  The Complexity of Promise Problems with Applications to Public-Key Cryptography , 1984, Inf. Control..

[9]  Ker-I Ko,et al.  On Some Natural Complete Operators , 1985, Theor. Comput. Sci..

[10]  Timothy J. Long Strong Nondeterministic Polynomial-Time Reducibilities , 1982, Theor. Comput. Sci..

[11]  Lane A. Hemaspaandra,et al.  Separating Complexity Classes With Tally Oracles , 1992, Theor. Comput. Sci..

[12]  José L. Balcázar,et al.  Self-reducibility structures and solutions of NP problemst , 1989 .

[13]  Yacov Yacobi,et al.  Cryptocomplexity and NP-Completeness , 1980, ICALP.

[14]  Kenneth W. Regan A Uniform Reduction Theorem - Extending a Result of J. Grollmann and A. Selman , 1986, ICALP.

[15]  Juris Hartmanis,et al.  Complexity Classes without Machines: On Complete Languages for UP , 1986, Theor. Comput. Sci..

[16]  Alan L. Selman,et al.  Polynomial Time Enumeration Reducibility , 1978, SIAM J. Comput..

[17]  Eric Allender,et al.  P-Printable Sets , 1988, SIAM J. Comput..

[18]  Juris Hartmanis,et al.  Robust Machines Accept Easy Sets , 1990, Theor. Comput. Sci..

[19]  Juris Hartmanis,et al.  One-Way Functions, Robustness, and the Non-Isomorphism of NP-Complete Sets , 1987, Proceeding Structure in Complexity Theory.

[20]  Sanjay Jain,et al.  On the Limitations of Locally Robust Positive Reductions , 1989, FSTTCS.

[21]  Janos Simon On some central problems in computational complexity , 1975 .

[22]  R. Beigel,et al.  Bounded Queries to SAT and the Boolean Hierarchy , 1991, Theor. Comput. Sci..

[23]  Uwe Schöning,et al.  Robust Algorithms: A Different Approach to Oracles , 1984, Theor. Comput. Sci..

[24]  L. Hemachandra The strong exponential hierarchy collapses , 1987, STOC 1987.

[25]  Uwe Schöning,et al.  Robust Algorithms: A Different Approach to Oracles , 1985, Theor. Comput. Sci..

[26]  R.E. Ladner,et al.  A Comparison of Polynomial Time Reducibilities , 1975, Theor. Comput. Sci..

[27]  Alan L. Selman,et al.  Reductions on NP and P-Selective Sets , 1982, Theor. Comput. Sci..

[28]  Ian Parberry,et al.  On the Construction of Parallel Computers from Various Bases of Boolean Functions , 1986, Theor. Comput. Sci..

[29]  Juris Hartmanis,et al.  The Boolean Hierarchy II: Applications , 1989, SIAM J. Comput..

[30]  Lane A. Hemachandra,et al.  A complexity theory for feasible closure properties , 1993 .

[31]  Klaus W. Wagner,et al.  Bounded Query Classes , 1990, SIAM J. Comput..

[32]  Jin-Yi Cai,et al.  On the Power of Parity Polynomial Time , 1989, STACS.

[33]  C. Papadimitriou,et al.  Two remarks on the power of counting , 1983 .

[34]  Manuel Blum,et al.  Generic oracles and oracle classes , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).

[35]  Leslie G. Valiant,et al.  Relative Complexity of Checking and Evaluating , 1976, Inf. Process. Lett..

[36]  José L. Balcázar,et al.  Strong and Robustly Strong Polynomial-Time Reducibilities to Sparse Sets , 1991, Theor. Comput. Sci..