Exponential Lower Bounds for Monotone Span Programs

Monotone span programs are a linear-algebraic model of computation which were introduced by Karchmer and Wigderson in 1993 [1]. They are known to be equivalent to linear secret sharing schemes, and have various applications in complexity theory and cryptography. Lower bounds for monotone span programs have been difficult to obtain because they use non-monotone operations to compute monotone functions, in fact, the best known lower bounds are quasipolynomial for a function in (nonmonotone) P [2]. A fundamental open problem is to prove exponential lower bounds on monotone span program size for any explicit function. We resolve this open problem by giving exponential lower bounds on monotone span program size for a function in monotone P. This also implies the first exponential lower bounds for linear secret sharing schemes. Our result is obtained by proving exponential lower bounds using Razborov's rank method [3], a measure that is strong enough to prove lower bounds for many monotone models. As corollaries we obtain new proofs of exponential lower bounds for monotone formula size, monotone switching network size, and the first lower bounds for monotone comparator circuit size for a function in monotone P. We also obtain new polynomial degree lower bounds for Nullstellensatz refutations using an interpolation theorem of Pudlak and Sgall [4]. Finally, we obtain quasipolynomial lower bounds on the rank measure for the st-connectivity function, implying tight bounds for st-connectivity in all of the computational models mentioned above.

[1]  Ernst W. Mayr,et al.  The computational complexity of the circuit value and network stability problems , 1990 .

[2]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[3]  HierarchyRan Raz,et al.  Separation of the Monotone NC , 1999 .

[4]  Troy Lee,et al.  Disjointness is Hard in the Multiparty Number-on-the-Forehead Model , 2007, 2008 23rd Annual IEEE Conference on Computational Complexity.

[5]  Yeow Meng Chee,et al.  Coding and Cryptology - Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings , 2011, IWCC.

[6]  Siu Man Chan Just a Pebble Game , 2013, 2013 IEEE Conference on Computational Complexity.

[7]  Cristopher Moore,et al.  Internal Diffusion-Limited Aggregation: Parallel Algorithms and Complexity , 1999, cond-mat/9909233.

[8]  Dai Tri Man Le,et al.  The complexity of the comparator circuit value problem , 2012, TOCT.

[9]  Arkadev Chattopadhyay,et al.  Multiparty Communication Complexity of Disjointness , 2008, Electron. Colloquium Comput. Complex..

[10]  Avi Wigderson NL/poly /spl sube/ /spl oplus/L/poly , 1994, Proceedings of IEEE 9th Annual Conference on Structure in Complexity Theory.

[11]  Michael T. Goodrich,et al.  Zig-zag sort: a simple deterministic data-oblivious sorting algorithm running in O(n log n) time , 2014, STOC.

[12]  Avi Wigderson,et al.  Superpolynomial Lower Bounds for Monotone Span Programs , 1996, Comb..

[13]  Alexander A. Razborov,et al.  Lower bounds for the polynomial calculus , 1998, computational complexity.

[14]  M. Sipser,et al.  Monotone Separation of Logspace from NC. , 1991 .

[15]  Alexander A. Sherstov Communication Lower Bounds Using Dual Polynomials , 2008, Bull. EATCS.

[16]  Jakob Nordström,et al.  On the virtue of succinct proofs: amplifying communication complexity hardness to time-space trade-offs in proof complexity , 2012, STOC '12.

[17]  Avi Wigderson,et al.  Monotone circuits for connectivity require super-logarithmic depth , 1990, STOC '88.

[18]  Toniann Pitassi,et al.  Communication lower bounds via critical block sensitivity , 2013, STOC.

[19]  Mika Göös,et al.  Lower Bounds for Clique vs. Independent Set , 2015, 2015 IEEE 56th Annual Symposium on Foundations of Computer Science.

[20]  Ran Raz,et al.  Separation of the Monotone NC Hierarchy , 1999, Comb..

[21]  Patrick W. Dymond,et al.  Speedups of deterministic machines by synchronous parallel machines , 1983, J. Comput. Syst. Sci..

[22]  Alexander A. Razborov,et al.  Applications of matrix methods to the theory of lower bounds in computational complexity , 1990, Comb..

[23]  Jirí Sgall,et al.  Algebraic models of computation and interpolation for algebraic proof systems , 1996, Proof Complexity and Feasible Arithmetics.

[24]  R. Impagliazzo,et al.  Lower bounds on Hilbert's Nullstellensatz and propositional proofs , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[25]  Vijaya Ramachandran,et al.  Parallel algorithm and complexity results for telephone link simulation , 1991, Proceedings of the Third IEEE Symposium on Parallel and Distributed Processing.

[26]  Aaron Potechin,et al.  Bounds on Monotone Switching Networks for Directed Connectivity , 2009, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.

[27]  Anna Gál,et al.  Lower bounds for monotone span programs , 2005, computational complexity.

[28]  Stephen A. Cook,et al.  An observation on time-storage trade off , 1973, J. Comput. Syst. Sci..

[29]  Alexander A. Sherstov The Pattern Matrix Method , 2009, SIAM J. Comput..

[30]  E. Szemerédi,et al.  O(n LOG n) SORTING NETWORK. , 1983 .

[31]  Robert E. Tarjan,et al.  Variations of a pebble game on graphs , 1978 .

[32]  Pavel Pudlák,et al.  A note on monotone complexity and the rank of matrices , 2003, Inf. Process. Lett..

[33]  Samuel R. Buss,et al.  Linear gaps between degrees for the polynomial calculus modulo distinct primes , 1999, STOC '99.

[34]  Avi Wigderson,et al.  On span programs , 1993, [1993] Proceedings of the Eigth Annual Structure in Complexity Theory Conference.

[35]  Enav Weinreb,et al.  Separating the Power of Monotone Span Programs over Different Fields , 2005, SIAM J. Comput..

[36]  T. Sanders,et al.  Analysis of Boolean Functions , 2012, ArXiv.

[37]  Uzi Vishkin,et al.  Constant Depth Reducibility , 1984, SIAM J. Comput..

[38]  A. Razborov On submodular complexity measures , 1992 .

[39]  Ben Reichardt,et al.  Span Programs are Equivalent to Quantum Query Algorithms , 2014, SIAM J. Comput..

[40]  Allan Borodin,et al.  On Relating Time and Space to Size and Depth , 1977, SIAM J. Comput..

[41]  Shachar Lovett,et al.  Rectangles Are Nonnegative Juntas , 2015, SIAM J. Comput..

[42]  Lajos Rónyai,et al.  Extremal bipartite graphs and superpolynomial lower bounds for monotone span programs , 1996, STOC '96.

[43]  Prasad Raghavendra,et al.  Lower Bounds on the Size of Semidefinite Programming Relaxations , 2014, STOC.

[44]  Aaron Potechin,et al.  Tight bounds for monotone switching networks via fourier analysis , 2012, STOC '12.

[45]  P. MuraliKrishna,et al.  SECURE SCHEMES FOR SECRET SHARING AND KEY DISTRIBUTION USING PELL'S EQUATION , 2013 .

[46]  Anna Gál A characterization of span program size and improved lower bounds for monotone span programs , 1998, STOC '98.

[47]  Omer Reingold,et al.  Undirected connectivity in log-space , 2008, JACM.

[48]  Russell Impagliazzo,et al.  Using the Groebner basis algorithm to find proofs of unsatisfiability , 1996, STOC '96.

[49]  M. V. Wilkes,et al.  The Art of Computer Programming, Volume 3, Sorting and Searching , 1974 .