Average-case Complexity

We review the many open questions and the few things that are known about the average-case complexity of computational problems. We shall follow the presentations of Impagliazzo, of Goldreich, and of Bogdanov and the author, and focus on the following subjects. (i). Average-case tractability. What does it mean for a problem to have an "efficient on average'' algorithm with respect to a distribution of instances? There is more than one ``correct'' answer to this question, and a numberof subtleties arise, which are interesting to discuss. (ii) Worst case versus average-case. Is the existence of hard-on-averageproblems in a complexity class equivalent to the existence of worst-case-hardproblems? This is the case for complexity classes like PSPACE and EXP, but it is openfor NP, with partial evidence pointing to a negative answer. (To be sure, we believethat hard-on-average, and also worst-case hard problems, exist in NP, and if so theirexistence is ``equivalent'' in the way two true statements are logically equivalent. There is, however, partial evidence that such an equivalence cannot be establishedvia reductions. It is also known that such an equivalence cannot be established viaany relativizing technique.) (iii) Amplification of average-case hardness. A weak sense in which aproblem may be hard-on-average is that every efficient algorithm fails on a noticeable(at least inverse polynomial) fraction of inputs; a strong sense is that noalgorithm can do much better than guess the answer at random. In many settings,the existence of problems of weak average-case complexity implies the existenceof problems, in the same complexity class, of strong average-case complexity.It remains open to prove such equivalence in the setting of uniform algorithmsfor problems in NP. (Some partial results are known even in this setting.) (iv) Reductions and Completeness. Levin initiated a theoryof completeness for distributional problems under reductions that preserveaverage-case tractability. Even establishing the existence of an NP-completeproblem in this theory is a non-trivial (and interesting) result.

[1]  Leslie G. Valiant,et al.  NP is as easy as detecting unique solutions , 1985, STOC '85.

[2]  Luca Trevisan,et al.  On uniform amplification of hardness in NP , 2005, STOC '05.

[3]  Endre Szemerédi,et al.  Many hard examples for resolution , 1988, JACM.

[4]  Valentine Kabanets,et al.  2 Better Tradeoffs 2 . 1 Hardness amplification via error-correcting codes , 2007 .

[5]  Noam Nisan,et al.  On Yao's XOR-Lemma , 1995, Electron. Colloquium Comput. Complex..

[6]  Silvio Micali,et al.  Probabilistic Encryption , 1984, J. Comput. Syst. Sci..

[7]  Noam Nisan,et al.  BPP has subexponential time simulations unless EXPTIME has publishable proofs , 1991, [1991] Proceedings of the Sixth Annual Structure in Complexity Theory Conference.

[8]  Leonid A. Levin,et al.  Average Case Complete Problems , 1986, SIAM J. Comput..

[9]  Oded Goldreich,et al.  On basing one-way functions on NP-hardness , 2006, STOC '06.

[10]  Oded Goldreich,et al.  On Promise Problems (a survey in memory of Shimon Even [1935-2004]) , 2005, Electron. Colloquium Comput. Complex..

[11]  Uriel Feige,et al.  Witnesses for non-satisfiability of dense random 3CNF formulas , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).

[12]  Daniele Micciancio,et al.  Worst-case to average-case reductions based on Gaussian measures , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.

[13]  Emanuele Viola,et al.  Using nondeterminism to amplify hardness , 2004, STOC '04.

[14]  Ravi Kumar,et al.  On Polynomial-Factor Approximations to the Shortest Lattice Vector Length , 2003, SIAM J. Discret. Math..

[15]  Leonard M. Adleman,et al.  Two theorems on random polynomial time , 1978, 19th Annual Symposium on Foundations of Computer Science (sfcs 1978).

[16]  Michael E. Saks,et al.  On the complexity of unsatisfiability proofs for random k-CNF formulas , 1998, STOC '98.

[17]  Subhash Khot Hardness of Approximating the Shortest Vector Problem in Lattices , 2004, FOCS.

[18]  Ryan O'Donnell,et al.  Hardness amplification within NP , 2002, Proceedings 17th IEEE Annual Conference on Computational Complexity.

[19]  Ming Li,et al.  Average Case Complexity Under the Universal Distribution Equals Worst-Case Complexity , 1992, Inf. Process. Lett..

[20]  Dimitris Achlioptas,et al.  THE THRESHOLD FOR RANDOM k-SAT IS 2k log 2 O(k) , 2004, FOCS 2004.

[21]  Russell Impagliazzo,et al.  Hard-core distributions for somewhat hard problems , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.

[22]  C. P. Schnorr,et al.  A Hierarchy of Polynomial Time Lattice Basis Reduction Algorithms , 1987, Theor. Comput. Sci..

[23]  Uriel Feige,et al.  Relations between average case complexity and approximation complexity , 2002, STOC '02.

[24]  Oded Goldreich,et al.  On the limits of non-approximability of lattice problems , 1998, STOC '98.

[25]  Leonid A. Levin,et al.  No better ways to generate hard NP instances than picking uniformly at random , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.

[26]  Yacov Yacobi,et al.  The Complexity of Promise Problems with Applications to Public-Key Cryptography , 1984, Inf. Control..

[27]  Amnon Ta-Shma,et al.  If NP Languages are Hard on the Worst-Case, Then it is Easy to Find Their Hard Instances , 2005, 20th Annual IEEE Conference on Computational Complexity (CCC'05).

[28]  Luca Trevisan,et al.  On Worst-Case to Average-Case Reductions for NP Problems , 2005, Electron. Colloquium Comput. Complex..

[29]  Joan Feigenbaum,et al.  On the random-self-reducibility of complete sets , 1991, [1991] Proceedings of the Sixth Annual Structure in Complexity Theory Conference.

[30]  Gilles Brassard,et al.  Relativized cryptography , 1979, 20th Annual Symposium on Foundations of Computer Science (sfcs 1979).

[31]  Noam Nisan,et al.  Hardness vs Randomness , 1994, J. Comput. Syst. Sci..

[32]  Amin Coja-Oghlan,et al.  Certifying Unsatisfiability of Random 2k-SAT Formulas Using Approximation Techniques , 2003, FCT.

[33]  Richard J. Lipton,et al.  Amplification of weak learning under the uniform distribution , 1993, COLT '93.

[34]  Emanuele Viola,et al.  On constructing parallel pseudorandom generators from one-way functions , 2005, 20th Annual IEEE Conference on Computational Complexity (CCC'05).

[35]  Yuri Gurevich,et al.  Average Case Complexity ∗ , 1998 .

[36]  R. Impagliazzo,et al.  P=BPP unless E has sub-exponential circuits: Derandomizing the XOR Lemma , 2002 .

[37]  Dorit Aharonov,et al.  Lattice problems in NP ∩ coNP , 2005, JACM.

[38]  Luca Trevisan,et al.  Pseudorandom generators without the XOR lemma , 1999, Proceedings. Fourteenth Annual IEEE Conference on Computational Complexity (Formerly: Structure in Complexity Theory Conference) (Cat.No.99CB36317).

[39]  Michael Krivelevich,et al.  Efficient Recognition of Random Unsatisfiable k-SAT Instances by Spectral Methods , 2001, STACS.

[40]  Miklós Ajtai,et al.  Generating Hard Instances of Lattice Problems , 1996, Electron. Colloquium Comput. Complex..

[41]  Vladimiro Sassone,et al.  Bulletin of the European Association for Theoretical Computer Science , 2005 .

[42]  M. Ajtai The shortest vector problem in L2 is NP-hard for randomized reductions (extended abstract) , 1998, STOC '98.

[43]  Richard M. Karp,et al.  Probabilistic Analysis of Partitioning Algorithms for the Traveling-Salesman Problem in the Plane , 1977, Math. Oper. Res..

[44]  Oded Goldreich,et al.  Notes on Levin's Theory of Average-Case Complexity , 1997, Studies in Complexity and Cryptography.

[45]  Ravi Kumar,et al.  A sieve algorithm for the shortest lattice vector problem , 2001, STOC '01.

[46]  Cristopher Moore,et al.  The Asymptotic Order of the k-SAT Threshold , 2002 .

[47]  Russell Impagliazzo,et al.  One-way functions are essential for complexity based cryptography , 1989, 30th Annual Symposium on Foundations of Computer Science.

[48]  Oded Goldreich,et al.  On the possibility of basing Cryptography on the assumption that P ≠ NP , 1998, IACR Cryptol. ePrint Arch..

[49]  Sanjeev Arora,et al.  Polynomial time approximation schemes for Euclidean traveling salesman and other geometric problems , 1998, JACM.

[50]  Johan Håstad,et al.  Some optimal inapproximability results , 2001, JACM.

[51]  Subhash Khot,et al.  Hardness of approximating the shortest vector problem in lattices , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.

[52]  Manuel Blum,et al.  How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).

[53]  Daniele Micciancio Almost Perfect Lattices, the Covering Radius Problem, and Applications to Ajtai's Connection Factor , 2003, SIAM J. Comput..

[54]  Rafail Ostrovsky,et al.  One-way functions, hard on average problems, and statistical zero-knowledge proofs , 1991, [1991] Proceedings of the Sixth Annual Structure in Complexity Theory Conference.

[55]  László Lovász,et al.  Factoring polynomials with rational coefficients , 1982 .

[56]  Luca Trevisan,et al.  List-decoding using the XOR lemma , 2003, 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings..

[57]  Uriel Feige,et al.  Random 3CNF formulas elude the Lovasz theta function , 2006, Electron. Colloquium Comput. Complex..

[58]  Shafi Goldwasser,et al.  Complexity of lattice problems , 2002 .

[59]  David Thomas,et al.  The Art in Computer Programming , 2001 .

[60]  Eli Ben-Sasson,et al.  Short proofs are narrow—resolution made simple , 2001, JACM.

[61]  Oded Goldreich,et al.  On the theory of average case complexity , 1989, STOC '89.

[62]  Leonid A. Levin,et al.  A Pseudorandom Generator from any One-way Function , 1999, SIAM J. Comput..

[63]  Oded Regev,et al.  On lattices, learning with errors, random linear codes, and cryptography , 2005, STOC '05.

[64]  Luca Trevisan,et al.  Some Applications of Coding Theory in Computational Complexity , 2004, Electron. Colloquium Comput. Complex..

[65]  Adi Shamir,et al.  On the cryptocomplexity of knapsack systems , 1979, STOC.

[66]  Russell Impagliazzo,et al.  A personal view of average-case complexity , 1995, Proceedings of Structure in Complexity Theory. Tenth Annual IEEE Conference.

[67]  Cynthia Dwork,et al.  A public-key cryptosystem with worst-case/average-case equivalence , 1997, STOC '97.

[68]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[69]  Oded Regev,et al.  Lattice problems and norm embeddings , 2006, STOC '06.

[70]  Oded Goldreich Foundations of Cryptography: Volume 1 , 2006 .

[71]  Amnon Ta-Shma,et al.  New connections between derandomization, worst-case complexity and average-case complexity , 2006, Electron. Colloquium Comput. Complex..

[72]  Leonid A. Levin,et al.  One-way functions and pseudorandom generators , 1985, STOC '85.

[73]  Emanuele Viola,et al.  The complexity of constructing pseudorandom generators from hard functions , 2005, computational complexity.