Interactive Proofs Lecture 18 AM 1 Interactive Proofs 2 - - PowerPoint PPT Presentation

interactive proofs
SMART_READER_LITE
LIVE PREVIEW

Interactive Proofs Lecture 18 AM 1 Interactive Proofs 2 - - PowerPoint PPT Presentation

Interactive Proofs Lecture 18 AM 1 Interactive Proofs 2 Interactive Proofs IP[k] 2 Interactive Proofs IP[k] IP[poly] = PSPACE 2 Interactive Proofs IP[k] IP[poly] = PSPACE IP protocol for TQBF using arithmetization 2 Interactive


slide-1
SLIDE 1

Interactive Proofs

Lecture 18 AM

1

slide-2
SLIDE 2

Interactive Proofs

2

slide-3
SLIDE 3

Interactive Proofs

IP[k]

2

slide-4
SLIDE 4

Interactive Proofs

IP[k] IP[poly] = PSPACE

2

slide-5
SLIDE 5

Interactive Proofs

IP[k] IP[poly] = PSPACE IP protocol for TQBF using arithmetization

2

slide-6
SLIDE 6

Interactive Proofs

IP[k] IP[poly] = PSPACE IP protocol for TQBF using arithmetization We saw IP protocol for sum-check

2

slide-7
SLIDE 7

Interactive Proofs

IP[k] IP[poly] = PSPACE IP protocol for TQBF using arithmetization We saw IP protocol for sum-check IP[const] = AM[const]

2

slide-8
SLIDE 8

Interactive Proofs

IP[k] IP[poly] = PSPACE IP protocol for TQBF using arithmetization We saw IP protocol for sum-check IP[const] = AM[const] We saw public coin protocol for Graph Non-Isomorphism

2

slide-9
SLIDE 9

Interactive Proofs

IP[k] IP[poly] = PSPACE IP protocol for TQBF using arithmetization We saw IP protocol for sum-check IP[const] = AM[const] We saw public coin protocol for Graph Non-Isomorphism Using 2-universal hash functions

2

slide-10
SLIDE 10

Interactive Proofs

IP[k] IP[poly] = PSPACE IP protocol for TQBF using arithmetization We saw IP protocol for sum-check IP[const] = AM[const] We saw public coin protocol for Graph Non-Isomorphism Using 2-universal hash functions Today: Collapse of the AM hierarchy

2

slide-11
SLIDE 11

Interactive Proofs

IP[k] IP[poly] = PSPACE IP protocol for TQBF using arithmetization We saw IP protocol for sum-check IP[const] = AM[const] We saw public coin protocol for Graph Non-Isomorphism Using 2-universal hash functions Today: Collapse of the AM hierarchy AM[const] = AM[2]

2

slide-12
SLIDE 12

Recall AM

3

slide-13
SLIDE 13

Recall AM

3

slide-14
SLIDE 14

Recall AM

AM[2] (or simply AM)

3

slide-15
SLIDE 15

Recall AM

AM[2] (or simply AM) Input x

3

slide-16
SLIDE 16

Recall AM

AM[2] (or simply AM) Input x Random coins r come from a beacon

3

slide-17
SLIDE 17

Recall AM

AM[2] (or simply AM) Input x Random coins r come from a beacon

3

slide-18
SLIDE 18

Recall AM

AM[2] (or simply AM) Input x Random coins r come from a beacon Unbounded prover Merlin sends a “proof” message a

3

slide-19
SLIDE 19

Recall AM

AM[2] (or simply AM) Input x Random coins r come from a beacon Unbounded prover Merlin sends a “proof” message a Polynomial time verifier Arthur runs a deterministic verification procedure R(x;r,a), and outputs Yes or No

3

slide-20
SLIDE 20

Recall AM

AM[2] (or simply AM) Input x Random coins r come from a beacon Unbounded prover Merlin sends a “proof” message a Polynomial time verifier Arthur runs a deterministic verification procedure R(x;r,a), and outputs Yes or No L is said to have an AM protocol if

3

slide-21
SLIDE 21

Recall AM

AM[2] (or simply AM) Input x Random coins r come from a beacon Unbounded prover Merlin sends a “proof” message a Polynomial time verifier Arthur runs a deterministic verification procedure R(x;r,a), and outputs Yes or No L is said to have an AM protocol if x∈L ⇔ max Pr[Yes] > 2/3

3

slide-22
SLIDE 22

Recall AM

AM[2] (or simply AM) Input x Random coins r come from a beacon Unbounded prover Merlin sends a “proof” message a Polynomial time verifier Arthur runs a deterministic verification procedure R(x;r,a), and outputs Yes or No L is said to have an AM protocol if x∈L ⇔ max Pr[Yes] > 2/3 x∉L ⇔ max Pr[Yes] < 1/3

3

slide-23
SLIDE 23

max Pr[Yes]

4

slide-24
SLIDE 24

max Pr[Yes]

Quantity of interest

4

slide-25
SLIDE 25

max Pr[Yes]

Quantity of interest Maximum (over prover strategies) probability (over coins from the beacon)

  • f Arthur saying yes

4

slide-26
SLIDE 26

max Pr[Yes]

Quantity of interest Maximum (over prover strategies) probability (over coins from the beacon)

  • f Arthur saying yes

Evaluate the “Avg-Max tree”

4

slide-27
SLIDE 27

max Pr[Yes]

Max

Avg

R

Max

R R

Max

... ... ... ...

Quantity of interest Maximum (over prover strategies) probability (over coins from the beacon)

  • f Arthur saying yes

Evaluate the “Avg-Max tree”

4

slide-28
SLIDE 28

max Pr[Yes]

Max

Avg

R

Max

R R

Max

... ... ... ...

Quantity of interest Maximum (over prover strategies) probability (over coins from the beacon)

  • f Arthur saying yes

Evaluate the “Avg-Max tree” Leaves: Pr[yes] = 0 or 1, as determined by Arthur’ s program

4

slide-29
SLIDE 29

max Pr[Yes]

Max

Avg

R

Max

R R

Max

... ... ... ...

Quantity of interest Maximum (over prover strategies) probability (over coins from the beacon)

  • f Arthur saying yes

Evaluate the “Avg-Max tree” Leaves: Pr[yes] = 0 or 1, as determined by Arthur’ s program Max nodes: maximum of children

4

slide-30
SLIDE 30

max Pr[Yes]

Max

Avg

R

Max

R R

Max

... ... ... ...

Quantity of interest Maximum (over prover strategies) probability (over coins from the beacon)

  • f Arthur saying yes

Evaluate the “Avg-Max tree” Leaves: Pr[yes] = 0 or 1, as determined by Arthur’ s program Max nodes: maximum of children Avg node: average of children

4

slide-31
SLIDE 31

max Pr[Yes]

Max

Avg

R

Max

R R

Max

... ... ... ...

Quantity of interest Maximum (over prover strategies) probability (over coins from the beacon)

  • f Arthur saying yes

Evaluate the “Avg-Max tree” Leaves: Pr[yes] = 0 or 1, as determined by Arthur’ s program Max nodes: maximum of children Avg node: average of children Extends to AM[k], with k alternating levels

4

slide-32
SLIDE 32

Soundness Amplification

5

slide-33
SLIDE 33

Soundness Amplification

Recall error reduction in BPP algorithms

5

slide-34
SLIDE 34

Soundness Amplification

Recall error reduction in BPP algorithms By repeating and taking majority

5

slide-35
SLIDE 35

Soundness Amplification

Recall error reduction in BPP algorithms By repeating and taking majority Exponential error reduction (by Chernoff bound)

5

slide-36
SLIDE 36

Soundness Amplification

Recall error reduction in BPP algorithms By repeating and taking majority Exponential error reduction (by Chernoff bound) Extends to MA

5

slide-37
SLIDE 37

Soundness Amplification

Recall error reduction in BPP algorithms By repeating and taking majority Exponential error reduction (by Chernoff bound) Extends to MA Given input and any answer from Merlin, to determine Pr[Yes]

5

slide-38
SLIDE 38

Soundness Amplification

Recall error reduction in BPP algorithms By repeating and taking majority Exponential error reduction (by Chernoff bound) Extends to MA Given input and any answer from Merlin, to determine Pr[Yes] Run many independent verifications (using independent random strings from the beacon). Chernoff bound holds.

5

slide-39
SLIDE 39

Soundness Amplification

Recall error reduction in BPP algorithms By repeating and taking majority Exponential error reduction (by Chernoff bound) Extends to MA Given input and any answer from Merlin, to determine Pr[Yes] Run many independent verifications (using independent random strings from the beacon). Chernoff bound holds. Increased the length of the second message

5

slide-40
SLIDE 40

Parallel Repetition for AM[k]

6

slide-41
SLIDE 41

Parallel Repetition for AM[k]

Soundness amplification by sequential repetition/majority

6

slide-42
SLIDE 42

Parallel Repetition for AM[k]

Soundness amplification by sequential repetition/majority Exponential amplification, just like in MA. But be careful! Not independent executions (Merlin can adapt strategy over the repetitions.) But not a problem!

6

slide-43
SLIDE 43

Parallel Repetition for AM[k]

Soundness amplification by sequential repetition/majority Exponential amplification, just like in MA. But be careful! Not independent executions (Merlin can adapt strategy over the repetitions.) But not a problem! But increases rounds

6

slide-44
SLIDE 44

Parallel Repetition for AM[k]

Soundness amplification by sequential repetition/majority Exponential amplification, just like in MA. But be careful! Not independent executions (Merlin can adapt strategy over the repetitions.) But not a problem! But increases rounds Soundness amplification without increasing rounds

6

slide-45
SLIDE 45

Parallel Repetition for AM[k]

Soundness amplification by sequential repetition/majority Exponential amplification, just like in MA. But be careful! Not independent executions (Merlin can adapt strategy over the repetitions.) But not a problem! But increases rounds Soundness amplification without increasing rounds Parallel repetition

6

slide-46
SLIDE 46

Parallel Repetition for AM[k]

Soundness amplification by sequential repetition/majority Exponential amplification, just like in MA. But be careful! Not independent executions (Merlin can adapt strategy over the repetitions.) But not a problem! But increases rounds Soundness amplification without increasing rounds Parallel repetition More careful! Merlin’ s answers (and probability of proof being rejected) in the parallel sessions could be correlated

6

slide-47
SLIDE 47

Parallel Repetition for AM[k]

Soundness amplification by sequential repetition/majority Exponential amplification, just like in MA. But be careful! Not independent executions (Merlin can adapt strategy over the repetitions.) But not a problem! But increases rounds Soundness amplification without increasing rounds Parallel repetition More careful! Merlin’ s answers (and probability of proof being rejected) in the parallel sessions could be correlated Still turns out to give exponential amplification

6

slide-48
SLIDE 48

MA ⊆ AM

7

slide-49
SLIDE 49

MA ⊆ AM

Publishing random test before receiving proof

7

slide-50
SLIDE 50

MA ⊆ AM

Publishing random test before receiving proof Completeness is no worse

7

slide-51
SLIDE 51

MA ⊆ AM

Publishing random test before receiving proof Completeness is no worse If MA soundness error is sufficiently small, can use union bound over all Merlin messages to get that the AM soundness error is still small

7

slide-52
SLIDE 52

MA ⊆ AM

Publishing random test before receiving proof Completeness is no worse If MA soundness error is sufficiently small, can use union bound over all Merlin messages to get that the AM soundness error is still small If MA soundness error < 1/2m+2, where m is the length

  • f Merlin’

s message, AM soundness error < 1/ 4

7

slide-53
SLIDE 53

MA ⊆ AM

Publishing random test before receiving proof Completeness is no worse If MA soundness error is sufficiently small, can use union bound over all Merlin messages to get that the AM soundness error is still small If MA soundness error < 1/2m+2, where m is the length

  • f Merlin’

s message, AM soundness error < 1/ 4 Note: Argument similar to why BPP ⊆ P/poly

7

slide-54
SLIDE 54

MA ⊆ AM

Publishing random test before receiving proof Completeness is no worse If MA soundness error is sufficiently small, can use union bound over all Merlin messages to get that the AM soundness error is still small If MA soundness error < 1/2m+2, where m is the length

  • f Merlin’

s message, AM soundness error < 1/ 4 Note: Argument similar to why BPP ⊆ P/poly Extends to MAM ⊆ AM

7

slide-55
SLIDE 55

MA ⊆ AM

Publishing random test before receiving proof Completeness is no worse If MA soundness error is sufficiently small, can use union bound over all Merlin messages to get that the AM soundness error is still small If MA soundness error < 1/2m+2, where m is the length

  • f Merlin’

s message, AM soundness error < 1/ 4 Note: Argument similar to why BPP ⊆ P/poly Extends to MAM ⊆ AM So MAM = AM

7

slide-56
SLIDE 56

Collapse of the AM hierarchy

8

slide-57
SLIDE 57

Collapse of the AM hierarchy

Intuition: Can change any MA sequence to an AM sequence

8

slide-58
SLIDE 58

Collapse of the AM hierarchy

Intuition: Can change any MA sequence to an AM sequence Need a notion of soundness error in each round

8

slide-59
SLIDE 59

Alternating Threshold TM

9

slide-60
SLIDE 60

Alternating Threshold TM

A generalization of ATM, with two thresholds instead of ∃ and ∀

9

slide-61
SLIDE 61

Alternating Threshold TM

A generalization of ATM, with two thresholds instead of ∃ and ∀

∃r’ ∃r ∃r

R

∃r’ ∃r ∃r

R R

∃r’

... ... ... ... ... ...

9

slide-62
SLIDE 62

Alternating Threshold TM

A generalization of ATM, with two thresholds instead of ∃ and ∀ ∃r: ! (or >) r fraction of children are 1?

∃r’ ∃r ∃r

R

∃r’ ∃r ∃r

R R

∃r’

... ... ... ... ... ...

9

slide-63
SLIDE 63

Alternating Threshold TM

A generalization of ATM, with two thresholds instead of ∃ and ∀ ∃r: ! (or >) r fraction of children are 1? ∃0 is ∃, and ∃1 is ∀

∃r’ ∃r ∃r

R

∃r’ ∃r ∃r

R R

∃r’

... ... ... ... ... ...

9

slide-64
SLIDE 64

Alternating Threshold TM

A generalization of ATM, with two thresholds instead of ∃ and ∀ ∃r: ! (or >) r fraction of children are 1? ∃0 is ∃, and ∃1 is ∀ Leaves R(x;path) = 0 or 1

∃r’ ∃r ∃r

R

∃r’ ∃r ∃r

R R

∃r’

... ... ... ... ... ...

9

slide-65
SLIDE 65

Alternating Threshold TM

A generalization of ATM, with two thresholds instead of ∃ and ∀ ∃r: ! (or >) r fraction of children are 1? ∃0 is ∃, and ∃1 is ∀ Leaves R(x;path) = 0 or 1 Parameters: depth (number of alternations) and size = log(#leaves) (= total length of the “messages”)

∃r’ ∃r ∃r

R

∃r’ ∃r ∃r

R R

∃r’

... ... ... ... ... ...

9

slide-66
SLIDE 66

Alternating Threshold TM

A generalization of ATM, with two thresholds instead of ∃ and ∀ ∃r: ! (or >) r fraction of children are 1? ∃0 is ∃, and ∃1 is ∀ Leaves R(x;path) = 0 or 1 Parameters: depth (number of alternations) and size = log(#leaves) (= total length of the “messages”) Will denote as ATTM[k,(r,r’),R] (size and individual degrees implicit)

∃r’ ∃r ∃r

R

∃r’ ∃r ∃r

R R

∃r’

... ... ... ... ... ...

9

slide-67
SLIDE 67

Alternating Threshold TM

10

slide-68
SLIDE 68

Alternating Threshold TM

We will be interested in ATTM[k,(r,r’),R] where

10

slide-69
SLIDE 69

Alternating Threshold TM

We will be interested in ATTM[k,(r,r’),R] where One of r, r’ is a fraction > 1/2 (called the threshold), and the

  • ther is 0 or 1

10

slide-70
SLIDE 70

Alternating Threshold TM

We will be interested in ATTM[k,(r,r’),R] where One of r, r’ is a fraction > 1/2 (called the threshold), and the

  • ther is 0 or 1

k is constant, size is polynomial and R is a polynomial time relation

10

slide-71
SLIDE 71

Alternating Threshold TM

We will be interested in ATTM[k,(r,r’),R] where One of r, r’ is a fraction > 1/2 (called the threshold), and the

  • ther is 0 or 1

k is constant, size is polynomial and R is a polynomial time relation ATTM threshold can also be amplified using “parallel repetition”!

10

slide-72
SLIDE 72

Alternating Threshold TM

We will be interested in ATTM[k,(r,r’),R] where One of r, r’ is a fraction > 1/2 (called the threshold), and the

  • ther is 0 or 1

k is constant, size is polynomial and R is a polynomial time relation ATTM threshold can also be amplified using “parallel repetition”! Takes threshold from (1/2 + c) to (1 - 1/2n)

10

slide-73
SLIDE 73

Alternating Threshold TM

We will be interested in ATTM[k,(r,r’),R] where One of r, r’ is a fraction > 1/2 (called the threshold), and the

  • ther is 0 or 1

k is constant, size is polynomial and R is a polynomial time relation ATTM threshold can also be amplified using “parallel repetition”! Takes threshold from (1/2 + c) to (1 - 1/2n) k unchanged, size increases by a polynomial factor

10

slide-74
SLIDE 74

A Pair of Complementary ATTMs

11

slide-75
SLIDE 75

A Pair of Complementary ATTMs

Consider M+ and M- of the form ATTM[k,(r,0),R] and ATTM[k,(r,1),Rc] (where r>1/2)

11

slide-76
SLIDE 76

A Pair of Complementary ATTMs

Consider M+ and M- of the form ATTM[k,(r,0),R] and ATTM[k,(r,1),Rc] (where r>1/2) We’ll call it a pair of complementary (k,r) ATTMs

11

slide-77
SLIDE 77

A Pair of Complementary ATTMs

Consider M+ and M- of the form ATTM[k,(r,0),R] and ATTM[k,(r,1),Rc] (where r>1/2) We’ll call it a pair of complementary (k,r) ATTMs For any r>1/2, {x| M+(x)=1} and {x| M-(x)=1} are disjoint

11

slide-78
SLIDE 78

A Pair of Complementary ATTMs

Consider M+ and M- of the form ATTM[k,(r,0),R] and ATTM[k,(r,1),Rc] (where r>1/2) We’ll call it a pair of complementary (k,r) ATTMs For any r>1/2, {x| M+(x)=1} and {x| M-(x)=1} are disjoint M = ATTM[k,(1-r,1),Rc] is the complement of M+: {x| M+(x)=0} = {x| M(x)=1}

11

slide-79
SLIDE 79

A Pair of Complementary ATTMs

Consider M+ and M- of the form ATTM[k,(r,0),R] and ATTM[k,(r,1),Rc] (where r>1/2) We’ll call it a pair of complementary (k,r) ATTMs For any r>1/2, {x| M+(x)=1} and {x| M-(x)=1} are disjoint M = ATTM[k,(1-r,1),Rc] is the complement of M+: {x| M+(x)=0} = {x| M(x)=1} If r > 1-r, M- stricter than M: {x| M-(x)=1} ⊆ {x| M(x)=1}

11

slide-80
SLIDE 80

A Pair of Complementary ATTMs

12

slide-81
SLIDE 81

A Pair of Complementary ATTMs

12

slide-82
SLIDE 82

A Pair of Complementary ATTMs

L is said to have a pair of complementary ATTMs (M+,M-) if

12

slide-83
SLIDE 83

A Pair of Complementary ATTMs

L is said to have a pair of complementary ATTMs (M+,M-) if x∈L ⇔ M+(x)=1 and M-(x)=0

12

slide-84
SLIDE 84

A Pair of Complementary ATTMs

L is said to have a pair of complementary ATTMs (M+,M-) if x∈L ⇔ M+(x)=1 and M-(x)=0 x∉L ⇔ M-(x)=1 and M+(x)=0

12

slide-85
SLIDE 85

A Pair of Complementary ATTMs

L is said to have a pair of complementary ATTMs (M+,M-) if x∈L ⇔ M+(x)=1 and M-(x)=0 x∉L ⇔ M-(x)=1 and M+(x)=0 Exact threshold not critical

12

slide-86
SLIDE 86

A Pair of Complementary ATTMs

L is said to have a pair of complementary ATTMs (M+,M-) if x∈L ⇔ M+(x)=1 and M-(x)=0 x∉L ⇔ M-(x)=1 and M+(x)=0 Exact threshold not critical Threshold of (M+,M-) can be reduced to any r > 1/2

12

slide-87
SLIDE 87

A Pair of Complementary ATTMs

L is said to have a pair of complementary ATTMs (M+,M-) if x∈L ⇔ M+(x)=1 and M-(x)=0 x∉L ⇔ M-(x)=1 and M+(x)=0 Exact threshold not critical Threshold of (M+,M-) can be reduced to any r > 1/2 Reducing threshold enlarges {x| M+(x)=1} and {x| M-(x)=1}

12

slide-88
SLIDE 88

A Pair of Complementary ATTMs

L is said to have a pair of complementary ATTMs (M+,M-) if x∈L ⇔ M+(x)=1 and M-(x)=0 x∉L ⇔ M-(x)=1 and M+(x)=0 Exact threshold not critical Threshold of (M+,M-) can be reduced to any r > 1/2 Reducing threshold enlarges {x| M+(x)=1} and {x| M-(x)=1} And they stay disjoint

12

slide-89
SLIDE 89

A Pair of Complementary ATTMs

L is said to have a pair of complementary ATTMs (M+,M-) if x∈L ⇔ M+(x)=1 and M-(x)=0 x∉L ⇔ M-(x)=1 and M+(x)=0 Exact threshold not critical Threshold of (M+,M-) can be reduced to any r > 1/2 Reducing threshold enlarges {x| M+(x)=1} and {x| M-(x)=1} And they stay disjoint So they do not change (as they were already a partitioning)

12

slide-90
SLIDE 90

A Pair of Complementary ATTMs

L is said to have a pair of complementary ATTMs (M+,M-) if x∈L ⇔ M+(x)=1 and M-(x)=0 x∉L ⇔ M-(x)=1 and M+(x)=0 Exact threshold not critical Threshold of (M+,M-) can be reduced to any r > 1/2 Reducing threshold enlarges {x| M+(x)=1} and {x| M-(x)=1} And they stay disjoint So they do not change (as they were already a partitioning) By parallel repetition, can increase threshold to exponentially close to 1, starting from 1/2 + c

12

slide-91
SLIDE 91

AM and ATTM-pairs

13

slide-92
SLIDE 92

AM and ATTM-pairs

A language L has an AM[k,r] protocol iff L has a pair of complementary (k,r) ATTMs for r>1/2+c

13

slide-93
SLIDE 93

AM and ATTM-pairs

A language L has an AM[k,r] protocol iff L has a pair of complementary (k,r) ATTMs for r>1/2+c Guarantees on probability of acceptance translated to threshold guarantees, and vice versa

13

slide-94
SLIDE 94

AM and ATTM-pairs

A language L has an AM[k,r] protocol iff L has a pair of complementary (k,r) ATTMs for r>1/2+c Guarantees on probability of acceptance translated to threshold guarantees, and vice versa AM[k,r] protocol → (k,r’) ATTM pair: natural conversion works if r > 1-2-2k and r’ = 3/ 4 [Exercise]

13

slide-95
SLIDE 95

AM and ATTM-pairs

A language L has an AM[k,r] protocol iff L has a pair of complementary (k,r) ATTMs for r>1/2+c Guarantees on probability of acceptance translated to threshold guarantees, and vice versa AM[k,r] protocol → (k,r’) ATTM pair: natural conversion works if r > 1-2-2k and r’ = 3/ 4 [Exercise] (k,r’) ATTM pair → AM[k,r] protocol: natural conversion works if r’ > 1-1/ 4k and r = 3/ 4 [Exercise]

13

slide-96
SLIDE 96

AM and ATTM-pairs

A language L has an AM[k,r] protocol iff L has a pair of complementary (k,r) ATTMs for r>1/2+c Guarantees on probability of acceptance translated to threshold guarantees, and vice versa AM[k,r] protocol → (k,r’) ATTM pair: natural conversion works if r > 1-2-2k and r’ = 3/ 4 [Exercise] (k,r’) ATTM pair → AM[k,r] protocol: natural conversion works if r’ > 1-1/ 4k and r = 3/ 4 [Exercise] Enough, because we can reduce error (increase thresholds) for both AM protocols and ATTMs

13

slide-97
SLIDE 97

AM[k] = AM

14

slide-98
SLIDE 98

AM[k] = AM

In terms of ATTM-pairs

14

slide-99
SLIDE 99

AM[k] = AM

In terms of ATTM-pairs Flipping MA to AM: reduces depth, does not change size, but requires threshold to be reduced from 1 - 1/2m+2 to 3/ 4

14

slide-100
SLIDE 100

AM[k] = AM

In terms of ATTM-pairs Flipping MA to AM: reduces depth, does not change size, but requires threshold to be reduced from 1 - 1/2m+2 to 3/ 4 Amplifying again: Threshold increased to 1 - 1/2m+2, but size increased by a polynomial factor

14

slide-101
SLIDE 101

AM[k] = AM

In terms of ATTM-pairs Flipping MA to AM: reduces depth, does not change size, but requires threshold to be reduced from 1 - 1/2m+2 to 3/ 4 Amplifying again: Threshold increased to 1 - 1/2m+2, but size increased by a polynomial factor Repeat ~k/2 times to reduce to AM[2]

14

slide-102
SLIDE 102

One-Sided Error

15

slide-103
SLIDE 103

Recall BPP ⊆ Σ2P

One-Sided Error

15

slide-104
SLIDE 104

Recall BPP ⊆ Σ2P

One-Sided Error

x∉L: |Yesx|<2-n2m x∈L: |Yesx|>(1-2-n)2m

Space of random strings = {0,1}m Yesx = {r| M(x,r)=yes }

15

slide-105
SLIDE 105

Recall BPP ⊆ Σ2P Using “shifts” of random tapes

One-Sided Error

x∉L: |Yesx|<2-n2m x∈L: |Yesx|>(1-2-n)2m

Space of random strings = {0,1}m Yesx = {r| M(x,r)=yes }

15

slide-106
SLIDE 106

Recall BPP ⊆ Σ2P Using “shifts” of random tapes x∈L ⇒ ∃P P(Yesx) = {0,1}m

One-Sided Error

x∉L: |Yesx|<2-n2m x∈L: |Yesx|>(1-2-n)2m

Space of random strings = {0,1}m Yesx = {r| M(x,r)=yes }

15

slide-107
SLIDE 107

Recall BPP ⊆ Σ2P Using “shifts” of random tapes x∈L ⇒ ∃P P(Yesx) = {0,1}m x∉L ⇒ ∀P |P(Yesx)| < 2m/ 4

One-Sided Error

x∉L: |Yesx|<2-n2m x∈L: |Yesx|>(1-2-n)2m

Space of random strings = {0,1}m Yesx = {r| M(x,r)=yes }

15

slide-108
SLIDE 108

Recall BPP ⊆ Σ2P Using “shifts” of random tapes x∈L ⇒ ∃P P(Yesx) = {0,1}m x∉L ⇒ ∀P |P(Yesx)| < 2m/ 4 As an MAM protocol

One-Sided Error

x∉L: |Yesx|<2-n2m x∈L: |Yesx|>(1-2-n)2m

Space of random strings = {0,1}m Yesx = {r| M(x,r)=yes }

15

slide-109
SLIDE 109

Recall BPP ⊆ Σ2P Using “shifts” of random tapes x∈L ⇒ ∃P P(Yesx) = {0,1}m x∉L ⇒ ∀P |P(Yesx)| < 2m/ 4 As an MAM protocol Merlin sends P

One-Sided Error

x∉L: |Yesx|<2-n2m x∈L: |Yesx|>(1-2-n)2m

Space of random strings = {0,1}m Yesx = {r| M(x,r)=yes }

15

slide-110
SLIDE 110

Recall BPP ⊆ Σ2P Using “shifts” of random tapes x∈L ⇒ ∃P P(Yesx) = {0,1}m x∉L ⇒ ∀P |P(Yesx)| < 2m/ 4 As an MAM protocol Merlin sends P Arthur picks r←{0,1}m

One-Sided Error

x∉L: |Yesx|<2-n2m x∈L: |Yesx|>(1-2-n)2m

Space of random strings = {0,1}m Yesx = {r| M(x,r)=yes }

15

slide-111
SLIDE 111

Recall BPP ⊆ Σ2P Using “shifts” of random tapes x∈L ⇒ ∃P P(Yesx) = {0,1}m x∉L ⇒ ∀P |P(Yesx)| < 2m/ 4 As an MAM protocol Merlin sends P Arthur picks r←{0,1}m Merlin sends s ∈ Yesx s.t. r ∈ P(s)

One-Sided Error

x∉L: |Yesx|<2-n2m x∈L: |Yesx|>(1-2-n)2m

Space of random strings = {0,1}m Yesx = {r| M(x,r)=yes }

15

slide-112
SLIDE 112

Recall BPP ⊆ Σ2P Using “shifts” of random tapes x∈L ⇒ ∃P P(Yesx) = {0,1}m x∉L ⇒ ∀P |P(Yesx)| < 2m/ 4 As an MAM protocol Merlin sends P Arthur picks r←{0,1}m Merlin sends s ∈ Yesx s.t. r ∈ P(s) One-sided error

One-Sided Error

x∉L: |Yesx|<2-n2m x∈L: |Yesx|>(1-2-n)2m

Space of random strings = {0,1}m Yesx = {r| M(x,r)=yes }

15

slide-113
SLIDE 113

Perfect Completeness

16

slide-114
SLIDE 114

Converting MA protocol to perfectly complete MA

Perfect Completeness

16

slide-115
SLIDE 115

Converting MA protocol to perfectly complete MA Consider Yesx,a where a is the message from Merlin

Perfect Completeness

16

slide-116
SLIDE 116

Converting MA protocol to perfectly complete MA Consider Yesx,a where a is the message from Merlin x∈L ⇒ ∃a,P P(Yesx,a) = {0,1}m

Perfect Completeness

16

slide-117
SLIDE 117

Converting MA protocol to perfectly complete MA Consider Yesx,a where a is the message from Merlin x∈L ⇒ ∃a,P P(Yesx,a) = {0,1}m x∉L ⇒ ∀a,P |P(Yesx,a)| < 2m/ 4

Perfect Completeness

16

slide-118
SLIDE 118

Converting MA protocol to perfectly complete MA Consider Yesx,a where a is the message from Merlin x∈L ⇒ ∃a,P P(Yesx,a) = {0,1}m x∉L ⇒ ∀a,P |P(Yesx,a)| < 2m/ 4 Perfectly complete MA protocol

Perfect Completeness

16

slide-119
SLIDE 119

Converting MA protocol to perfectly complete MA Consider Yesx,a where a is the message from Merlin x∈L ⇒ ∃a,P P(Yesx,a) = {0,1}m x∉L ⇒ ∀a,P |P(Yesx,a)| < 2m/ 4 Perfectly complete MA protocol Merlin sends a, P

Perfect Completeness

16

slide-120
SLIDE 120

Converting MA protocol to perfectly complete MA Consider Yesx,a where a is the message from Merlin x∈L ⇒ ∃a,P P(Yesx,a) = {0,1}m x∉L ⇒ ∀a,P |P(Yesx,a)| < 2m/ 4 Perfectly complete MA protocol Merlin sends a, P Arthur picks r←{0,1}m

Perfect Completeness

16

slide-121
SLIDE 121

Converting MA protocol to perfectly complete MA Consider Yesx,a where a is the message from Merlin x∈L ⇒ ∃a,P P(Yesx,a) = {0,1}m x∉L ⇒ ∀a,P |P(Yesx,a)| < 2m/ 4 Perfectly complete MA protocol Merlin sends a, P Arthur picks r←{0,1}m Checks if there exists s ∈ P-1(r) s.t. s ∈ Yesx,a

Perfect Completeness

16

slide-122
SLIDE 122

Converting MA protocol to perfectly complete MA Consider Yesx,a where a is the message from Merlin x∈L ⇒ ∃a,P P(Yesx,a) = {0,1}m x∉L ⇒ ∀a,P |P(Yesx,a)| < 2m/ 4 Perfectly complete MA protocol Merlin sends a, P Arthur picks r←{0,1}m Checks if there exists s ∈ P-1(r) s.t. s ∈ Yesx,a Converting AM protocols

Perfect Completeness

16

slide-123
SLIDE 123

Converting MA protocol to perfectly complete MA Consider Yesx,a where a is the message from Merlin x∈L ⇒ ∃a,P P(Yesx,a) = {0,1}m x∉L ⇒ ∀a,P |P(Yesx,a)| < 2m/ 4 Perfectly complete MA protocol Merlin sends a, P Arthur picks r←{0,1}m Checks if there exists s ∈ P-1(r) s.t. s ∈ Yesx,a Converting AM protocols Yesx = {r| ∃a s.t. Arthur accepts x on transcript (r,a) }

Perfect Completeness

16

slide-124
SLIDE 124

Converting MA protocol to perfectly complete MA Consider Yesx,a where a is the message from Merlin x∈L ⇒ ∃a,P P(Yesx,a) = {0,1}m x∉L ⇒ ∀a,P |P(Yesx,a)| < 2m/ 4 Perfectly complete MA protocol Merlin sends a, P Arthur picks r←{0,1}m Checks if there exists s ∈ P-1(r) s.t. s ∈ Yesx,a Converting AM protocols Yesx = {r| ∃a s.t. Arthur accepts x on transcript (r,a) } A one-sided error MAM protocol: (P, r, a)

Perfect Completeness

16

slide-125
SLIDE 125

Converting MA protocol to perfectly complete MA Consider Yesx,a where a is the message from Merlin x∈L ⇒ ∃a,P P(Yesx,a) = {0,1}m x∉L ⇒ ∀a,P |P(Yesx,a)| < 2m/ 4 Perfectly complete MA protocol Merlin sends a, P Arthur picks r←{0,1}m Checks if there exists s ∈ P-1(r) s.t. s ∈ Yesx,a Converting AM protocols Yesx = {r| ∃a s.t. Arthur accepts x on transcript (r,a) } A one-sided error MAM protocol: (P, r, a) But MAM = AM (and preserves completeness)

Perfect Completeness

16

slide-126
SLIDE 126

Perfect Completeness

17

slide-127
SLIDE 127

Perfect Completeness

Therefore requiring perfect completeness does not change the classes MA or AM

17

slide-128
SLIDE 128

Perfect Completeness

Therefore requiring perfect completeness does not change the classes MA or AM Contrast with RP vs. BPP

17

slide-129
SLIDE 129

Today

18

slide-130
SLIDE 130

Today

MA ⊆ AM. MAM = AM.

18

slide-131
SLIDE 131

Today

MA ⊆ AM. MAM = AM. AM[k] = AM for k ! 2

18

slide-132
SLIDE 132

Today

MA ⊆ AM. MAM = AM. AM[k] = AM for k ! 2 Using alternate characterization in terms of pairs of complementary ATTMs

18

slide-133
SLIDE 133

Today

MA ⊆ AM. MAM = AM. AM[k] = AM for k ! 2 Using alternate characterization in terms of pairs of complementary ATTMs

  • ne-sided-error-AM = AM

18

slide-134
SLIDE 134

Today

MA ⊆ AM. MAM = AM. AM[k] = AM for k ! 2 Using alternate characterization in terms of pairs of complementary ATTMs

  • ne-sided-error-AM = AM

Coming up:

18

slide-135
SLIDE 135

Today

MA ⊆ AM. MAM = AM. AM[k] = AM for k ! 2 Using alternate characterization in terms of pairs of complementary ATTMs

  • ne-sided-error-AM = AM

Coming up: A little more of AM (and where it fits into the zoo)

18

slide-136
SLIDE 136

Today

MA ⊆ AM. MAM = AM. AM[k] = AM for k ! 2 Using alternate characterization in terms of pairs of complementary ATTMs

  • ne-sided-error-AM = AM

Coming up: A little more of AM (and where it fits into the zoo) Some other concepts in interactive proofs

18