Proving Lower Bounds Via Pseudo-Random Generators
Proving Lower Bounds Via Pseudo-Random Generators
Generators
Manindra Agrawal
1 Introduction
The central aim of complexity theory is to prove lower bounds on the complexity
of problems. While the relative classification of problems (via reductions) has
been very successful, not much progress has been made in determining their
absolute complexity. For example, we do not even know if NE admits nonuniform
NC1 circuits.
Initial attempts (in 1970s) to prove lower bounds centered on using the diag-
onalization technique that had proven very useful in recursion theory. However,
a series of relativization results soon showed that this technique cannot help in
its standard guise [6]. Very recently, the technique has been used to prove cer-
tain simultaneous time-space lower bounds [7], however, its usefulness for single
resource lower bounds remains unclear.
In the 1980s, the results of Razborov [15] (lower bounds on monotone circuits)
and Håstad [8] (lower bounds on constant depth circuits) gave rise to the hope of
proving lower bounds via combinatorial arguments on boolean circuit model of
complexity classes. However, there was little progress since mid-80s and ten years
later Razborov and Rudich [16] explained the reason for this: they showed that
combinatorial arguments used for previous lower bounds cannot be extended to
larger classes.
Over the last ten years, a new paradigm is slowly emerging that might lead
us to strong lower bounds: pseudo-random generators. These were introduced in
1980s by Yao [22], Blum, and Micali [4], Nisan and Wigderson [14] to formulate
the hardness of cryptographic primitives (in the first two references) and to
derandomize polynomial-time randomized algorithms (in the last reference).
It was known from the beginning that existence of pseudo-random genera-
tors implies lower bounds on boolean circuits. In fact, they can be viewed as a
strong form of diagonalization. Attempts were then made to prove the other (and
seemingly more interesting) direction: lower bounds on boolean circuits imply
existence of pseudo-random generators. This was achieved after a lot of effort:
1
Håstad, Impagliazzo, Levin and Luby [9] showed that pseudo-random genera-
tors of polynomial stretch are equivalent to one-way functions, Impagliazzo and
Wigderson [10] showed that pseudo-random generators of exponential stretch are
equivalent to hard sets in E.
Some recent advances suggest that the first (and easier) direction of the above
equivalence may in fact hold the key to obtaining lower bounds. Very recently,
Omer Reingold used expander graphs (these are one of the fundamental tools in
derandomization) to search in an undirected graph using logarithmic space [17].
This proves SL = L, resolving the complexity of the class SL. Although Rein-
gold’s result does not yield a pseudo-random generator or a lower bound, it
suggests that one can do derandomization without appealing to lower bounds,
and a strong enough derandomization will result in a lower bound.
Lower bounds for arithmetic circuits have also been investigated, but again,
without much success. It appears that obtaining lower bounds for these cir-
cuits should be easier than boolean circuits since boolean circuits can simulate
arithmetic circuits but not vice versa. Kabanets and Impagliazzo [11] have re-
cently observed a connection between lower bounds on arithmetic circuits and
derandomizations of polynomial identity testing problem (given a multivariate
polynomial computed by an arithmetic circuit, test if it is identically zero). This
connection, however, is not as tight as for boolean circuits. For these circuits too
there is some evidence that proving lower bounds via derandomization might
work: the primality testing algorithm of Agrawal, Kayal, Saxena [2] essentially
derandomizes a certain polynomial identity.
Admittedly, the evidence for the success of “pseudo-random generator” ap-
proach is weak: neither Reingold’s result nor the primality testing algorithm
yield a lower bound (the AKS “derandomization” works only for a problem, not
a class). However, this is one of the, if not the, most promising approach that
we have presently for obtaining boolean and arithmetic circuit lower bounds
and so needs to be investigated seriously. In this article, we formulate, based
on pseudo-random generators, stepwise approaches to resolve two of the most
important conjectures in complexity theory: P 6= NP and its arithmetic analog
Permanent requires superpolynomial-sized arithmetic circuits. For arithmetic cir-
cuits, the result of Kabanets and Impagliazzo is not strong enough to show that
derandomization implies second conjecture. To make it work, we define pseudo-
random generators for arithmetic circuits and show that certain generators imply
the desired lower bound on arithmetic circuits.
Let C(s(n), d(n)) denote the class of circuits of size s(n) and depth d(n) on inputs
of size n. We will assume that all our circuits are layered with layers alternating
between AND and OR gates.
We begin with the definition of a pseudo-random generator for boolean cir-
cuits.
2
Definition 21 Function f , f : {0, 1}∗ 7→ {0, 1}∗ , is a (`(n), n)-pseudo-random
generator against C(s(n), d(n)) if:
1
| Pr [C(x) = 1] − Pr [C(f (y)) = 1] | ≤ .
x∈{0,1}n y∈{0,1}`(n) n
It is also easy to see (via a similar counting argument) that (o(log s(n)), n)-
pseudo-random generators cannot exist against C(s(n), d(n)). This motivates the
following definition.
3
3 Boolean Circuit Lower Bounds via Pseudo-Random
Generators
The set A is in Ntime(t(m) · m): guess a y of size m − 1 and compute first m bits
of f (y). The set of also in Dtime(t(m) · 2m ): for every y of size m − 1 compute
the first m bits of f (y) and check if any matches.
Suppose there is a circuit family in C(s(`−1 (n)), d(`−1 (n))) that accepts A.
Fix an input size m = `(n) + 1 for some n and consider the corresponding circuit
C from the family. Construct a new circuit, say D, on input size n as follows.
Circuit D simply simulates circuit C on the first m bits of its input (ignoring the
remaining bits). By the definition of A, it follows that for every y, |y| = m − 1,
f (y) is accepted by D. In addition, circuit D rejects at least half of its inputs
(because the number of prefixes of m bits of f (y)’s is at most 2m−1 ). Circuit D
is in C(s(n), d(n)) since the input size has grown from m (for circuit C) to n (for
circuit D). Therefore,
1
| Pr [D(x) = 1] − Pr [D(f (y)) = 1] | ≤ .
x∈{0,1}n y∈{0,1}m−1 n
1
However, the first probability is less than 2 while the second is 1 as argued
above. This is a contradiction. t
u
Lemma 33 ([8, 14]) For any d > 0, there exists a mO(1) -computable (logO(d) n, n)-
pseudo-random generator against C(n, d), the class of size n, depth d circuits.
1
The converse of this corollary was shown by Impagliazzo and Wigderson [10].
4
The above generator is constructed by taking Håstad’s lower bound [8] on
constant-depth circuits and applying Nisan-Wigderson’s construction [14] of
pseudo-random generators on it. This generator is clearly not an optimal gen-
erator, but comes close – its input length is logO(d) n instead of O(log n). If one
can reduce the input length to, say, O(t(d) log n) for any function t(·), then we
get an optimal generator. This is our first step:
It is worth mentioning at this point that exponential lower bounds are not
known even for depth three circuits! The above lemma implies another lower
bound:
Proof. Take any size nd− , depth (d − ) log n (for some > 0) circuit C on
n inputs with unbounded fanin OR-gates. The circuit can be converted into
a subexponential size depth d circuit as follows. Cut C into d2 layers of depth
2(d−)
d log n each. In each layer, write each topmost gate as OR-of-ANDs of bot-
tommost gates. A direct counting shows that each such OR-of-ANDs will have
1−
O(n2dn d ) gates. There are at most nd− OR-of-ANDs, and therefore, the size
1−
of the resulting circuit is at most 2O(log n·n d ) = 2o(n) . The depth of the cir-
cuit is d. The existence of a 2O(m) -computable optimal pseudo-random generator
against C(n, d) implies the existence of a set A in E that cannot be accepted by
any family of circuits from C(2δn , d) for suitable δ > 0 by the above lemma. This
means that circuit C cannot accept {A}=n . t
u
The better time complexity of the generator implies that the set A will now
belong to the class NP instead of E. Thus we get:
5
Corollary 36 If there exists a mO(1) -computable optimal pseudo-random gen-
erator against C(n, d) then there is a set in NP that cannot be accepted by a
non-uniform semiunbounded circuit family of size nd− , depth (d − ) log n for
any > 0.
The last step is to push the class of circuits further up to all polylog depth
circuits, i.e., the class NC. This class is believed to be substantially smaller than
the class of all polynomial sized circuits.
6
the field F . We assume that all arithmetic circuits are layered and the layers
alternate between multiplication and addition/subtraction gates. Circuit C has
at most n input variables and computes a polynomial over F of degree at most
2n . Note that the number of input variables for arithmetic circuit is not as
important parameter as for boolean circuits. Even single variable circuits can
compute very complex polynomials. Kabanets and Impagliazzo [11] showed a
connection between polynomial identity testing and lower bounds on arithmetic
circuits. They proved that if there is a polynomial-time deterministic algorithm
for verifying polynomial identities then NEXP cannot have polynomial-sized
arithmetic circuits. They also proved a partial converse: if Permanent cannot
be computed by polynomial-sized arithmetic circuits, then polynomial identity
testing can be done in subexponential time.
We make this relationship between identity testing and lower bounds stronger
via an appropriate notion of pseudo-random generator against arithmetic cir-
cuits.
7
n in the boolean case. The degree of each output polynomial is 2`(n) which
equals nO(1) for optimal generator. Therefore, the time needed to compute such
a generator is 2Ω(`(n)) (= nΩ(1) for optimal case). This can be exponentially
larger than the input size of the generator. Hence we do not have as much
freedom available to vary the time complexity of the generator. This motivates
the following definition.
This definition of pseudo-random generators is the right one from the per-
spective of derandomization of identity testing.
log5 n 4 log
16 Y Yn
4
16 log5 n
g(x) = x · ((x − a)r − 1)
r=1 a=1
8
Theorem 51 Let f be an efficiently computable (`(n), n)-pseudo-random gen-
erator against A(n, F ). Then there is a multilinear polynomial computable in
time 2O(`(n)) that cannot be computed by any circuit family in A(n, F ).2
where f (n) = (f1 (y), f2 (y), . . . , fn (y), g(y)). Such a q always exists as the fol-
lowing argument shows.
The number of coefficients of q are exactly 22m . These need to satisfy a
polynomial equation of degree at most 2m·2m . So the equation gives rise
to at most 2m · 2m + 1 homogeneous constraints on the coefficients. Since
(2m · 2m + 1) < 22m for m ≥ 3, there is always a non-trivial polynomial
q satisfying all the conditions.
The polynomial q can be computed by solving a system of 2O(m) linear equations
in 2O(m) variables over the field F . Each of these equations can be computed in
time 2O(m) using computability of f . Therefore, q can be computed in time 2O(m) .
Now suppose q can be computed by a circuit C ∈ A(n, F ). By the definition of
polynomial q, it follows that C(f1 (y), f2 (y), . . . , f2m (y)) = 0. The size of circuit
C is n and it computes a non-zero polynomial. This contradicts the pseudo-
randomness of f . t
u
As in the case of boolean circuits, optimal pseudo-random generators against
constant depth arithmetic circuits is our first goal.
9
Proof. A size nd− , depth (d − ) log n arithmetic circuit with unbounded fanin
addition gates can be translated, exactly as in proof of Lemma 35, to a subex-
ponential sized depth d circuit. The optimal pseudo-random generator against
depth d circuits gives the lower bound. t
u
The class of arithmetic branching programs is equivalent to the class of poly-
nomials computed by determinants of a polynomial sized matrix [21, 19, 5]. Also,
polynomial-sized arithmetic formulas can be expressed as polynomial sized arith-
metic branching programs. We get a much stronger lower bound by generalizing
the pseudo-random generator to work against polynomial sized branching pro-
grams.
Step 2. Obtain an efficiently-computable optimal pseudo-random generator against
size n arithmetic branching programs over F .
This step nearly achieves our final goal.
Lemma 53 If there exist efficiently-computable optimal pseudo-random gener-
ators against size n arithmetic branching programs over F then there exists a
multilinear polynomial computable in E that (1) cannot be expressed as the de-
terminant of a subexponential sized matrix and (2) cannot be computed by a
n
2o( log n ) -sized arithmetic circuit.
Proof. The first part follows directly from Theorem 51 translated for arithmetic
branching programs. For the second part, recall that the polynomial q is multi-
linear and so has polynomial degree. In [20] it is shown that arithmetic circuits
of size N and degree D can be transformed to arithmetic circuits of size N O(1)
with depth O(log N log D). Further, a circuit of depth O(log N log D) can be ex-
pressed as determinant of a matrix of size 2O(log N log D) = N O(log D) . Using the
lower bound of first part, it followsn
that the polynomial q cannot be computed
by arithmetic circuits of size 2o( log n ) . t
u
To obtain a lower bound on permanent, we need to improve the time com-
plexity of polynomial q. Suppose that each coefficient cS of the polynomial q
can be computed by a #P-function (this will require that all coefficients of each
polynomial in f (n) to be computed by a #P-function). Then it follows that the
polynomial q can be expressed as permanent of a matrix of size polynomial in
m (because permanent captures #P-computations). Let us call such a generator
#P-computable.
Step 3. Obtain a #P-computable optimal pseudo-random generator against size
n arithmetic branching programs over F .
Corollary 54 If there exists an efficiently-computable optimal pseudo-random
generator against size n arithmetic branching programs over F then the perma-
nent of a n × n matrix over F (1) cannot be expressed as the determinant of a
n
subexponential-sized matrix over F , (2) cannot be computed by a 2o( log n ) -sized
arithmetic circuit.
Of course, the above step cannot be carried out for fields of characteristic
two where permanent is equal to the determinant.
10
6 Will This Approach Work?
In the sequence of steps proposed to prove arithmetic and boolean circuit lower
bounds, perhaps the most important one is step 1. Achieving this step will,
besides providing strong lower bounds for the first time, will establish the cor-
rectness of the approach and increase the possibility that remaining steps can
also be achieved.
In this section, we discuss some potential candidates to achieve Step 1 for
both boolean and arithmetic circuits.
where |x| = |y| = (2d + 2) log n, xi is computed in the field Fn2d+2 treating x as
an element of the field, and ‘·’ is inner product modulo 2. It is shown in [3] that
fB,d satisfies the required independence property.
Functions fB,d can easily shown to be mO(1) computable. We can prove the
following about function fB,2 :
11
AND gate in the circuit. Its fanin is at most 2 log n. Therefore, it outputs a 1
on at least n12 inputs. Since the output of fB,2 is 2 log n-wise independent with
a bias of at most n14 , the probability that this AND gate will output a 1, when
given fB,2 as input, is at least n12 − n14 > 0. Hence fB,2 is a hitting set generator
against C.
In fact, using a different definition for fB,2 from [3] can bring the complexity
of the hard set down to SAC1 from NP. This implies that fB,d cannot be a
hitting set generator for all d (because SAC1 circuits can be transformed to
subexponential sized constant depth circuits as observed earlier). However, it
appears that a combination of fB,d with other derandomization primitives can
result in hitting set generators for higher depths.
12
Lemma 64 Function fA,2 is a hitting set generator against size n, depth 2
arithmetic circuits.
It is to be hoped that the next twenty five years will be more fruitful for lower
bounds than the previous ones. One might even hope that all the proposed steps
will be achieved answering two of the most fundamental questions in complexity
theory.
References
[1] Manindra Agrawal. On derandomizing tests for certain polynomial identities.
In Proceedings of the Conference on Computational Complexity, pages 355–362,
2003.
[2] Manindra Agrawal, Neeraj Kayal, and Nitin Saxena. PRIMES is in P. Annals of
Mathematics, 160(2):781–793, 2004.
[3] N. Alon, O. Goldreich, J. Håstad, and R. Peralta. Simple constructions of almost
k-wise independent random variables. In Proceedings of Annual IEEE Symposium
on Foundations of Computer Science, pages 544–553, 1990.
[4] M. Blum and S. Micali. How to generate cryptographically strong sequences of
pseudo-random bits. SIAM Journal on Computing, 13:850–864, 1984.
[5] C. Damm. DET=L#l . Technical Report Informatik-preprint 8, Fachbereich In-
formatik der Humboldt Universität zu Berlin, 1991.
13
[6] L. Fortnow. The role of relativization in complexity theory. Bulletin of the Eu-
ropean Association for Theoretical Computer Science, 1994. Complexity Theory
Column.
[7] L. Fortnow. Time-space tradeoffs for satisfiability. J. Comput. Sys. Sci.,
60(2):337–353, 2000.
[8] J. Håstad. Computational limitations on small depth circuits. PhD thesis, Mas-
sachusetts Institute of Technology, 1986.
[9] J. Håstad, R. Impagliazzo, L. Levin, and M. Luby. A pseudo-random generator
from any one-way function. SIAM Journal on Computing, pages 221–243, 1998.
[10] R. Impagliazzo and A. Wigderson. P = BPP if E requires exponential circuits:
Derandomizing the XOR lemma. In Proceedings of Annual ACM Symposium on
the Theory of Computing, pages 220–229, 1997.
[11] Valentine Kabanets and Russell Impagliazzo. Derandomizing polyonmial iden-
tity tests means proving circuit lower bounds. In Proceedings of Annual ACM
Symposium on the Theory of Computing, pages 355–364, 2003.
[12] K. Mulmuley and M. Sohoni. Geometric complexity theory I: An approach to the
P vs. NP and other related problems. SIAM Journal on Computing, 31(2):496–
526, 2002.
[13] J. Naor and M. Naor. Small-bias probability spaces: Efficient constructions and
applications. In Proceedings of Annual ACM Symposium on the Theory of Com-
puting, pages 213–223, 1990.
[14] N. Nisan and A. Wigderson. Hardness vs. randomness. J. Comput. Sys. Sci.,
49(2):149–167, 1994.
[15] A. Razborov. Lower bounds for the monotone complexity of some boolean func-
tions. Doklady Akademii Nauk SSSR, 281(4):798–801, 1985. English translation
in Soviet Math. Doklady, 31:354-357, 1985.
[16] A. Razborov and S. Rudich. Natural proofs. In Proceedings of Annual ACM
Symposium on the Theory of Computing, pages 204–213, 1994.
[17] O. Reingold. Undirected s-t-connectivity in logspace. In Proceedings of Annual
ACM Symposium on the Theory of Computing, pages 376–385, 2005.
[18] J. T. Schwartz. Fast probabilistic algorithms for verification of polynomial iden-
tities. J. ACM, 27(4):701–717, 1980.
[19] S. Toda. Counting problems computationally equivalent to the determinant.
manuscript, 1991.
[20] L. Valiant, S. Skyum, S. Berkowitz, and C. Rackoff. Fast parallel computation
of polynnomials using few processors. SIAM Journal on Computing, 12:641–644,
1983.
[21] V Vinay. Counting auxiliary pushdown automata and semi-unbounded arithmetic
circuits. In Proceedings of the Structure in Complexity Theory Conference, pages
270–284. Springer LNCS 223, 1991.
[22] A. C. Yao. Theory and applications of trapdoor functions. In Proceedings of An-
nual IEEE Symposium on Foundations of Computer Science, pages 80–91, 1982.
[23] R. E. Zippel. Probabilistic algorithms for sparse polynomials. In EUROSCAM’79,
pages 216–226. Springer LNCS 72, 1979.
14