Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

IP (complexity)

From Wikipedia, the free encyclopedia
Complexity class from interactive proofs

Incomputational complexity theory, the classIP (which stands forinteractive proof) is the class of problems solvable by aninteractive proof system. It is equal to the classPSPACE. The result was established in a series of papers: the first by Lund, Karloff, Fortnow, and Nisan showed thatco-NP had multiple-prover interactive proofs;[1] and the second, byShamir, employed their technique to establish that IP=PSPACE.[2] The result is a famous example where the proof does notrelativize.[3]

The concept of an interactive proof system was first introduced byShafi Goldwasser,Silvio Micali, andCharles Rackoff in 1985. An interactive proof system consists of two machines, a prover,P, which presents a proof that a givenstringn is a member of somelanguage, and a verifier,V, that checks that the presented proof is correct. The prover is assumed to be infinite in computation and storage, while the verifier is a probabilistic polynomial-time machine with access to a random bit string whose length is polynomial on the size ofn. These two machines exchange a polynomial number,p(n), of messages and once the interaction is completed, the verifier must decide whether or notn is in the language, with only a 1/3 chance of error. (So any language inBPP is inIP, since then the verifier could simply ignore the prover and make the decision on its own.)

General representation of an interactive proof protocol.

Definition

[edit]

A languageL belongs toIP if there existV,P such that for allQ,w:

wLPr[VP accepts w]23{\displaystyle w\in L\Rightarrow \Pr[V\leftrightarrow P{\text{ accepts }}w]\geq {\tfrac {2}{3}}}
wLPr[VQ accepts w]13{\displaystyle w\not \in L\Rightarrow \Pr[V\leftrightarrow Q{\text{ accepts }}w]\leq {\tfrac {1}{3}}}

TheArthur–Merlin protocol, introduced byLászló Babai, is similar in nature, except that the number of rounds of interaction is bounded by a constant rather than a polynomial.

Goldwasser et al. have shown thatpublic-coin protocols, where the random numbers used by the verifier are provided to the prover along with the challenges, are no less powerful than private-coin protocols. At most two additional rounds of interaction are required to replicate the effect of a private-coin protocol. The opposite inclusion is straightforward, because the verifier can always send to the prover the results of their private coin tosses, which proves that the two types of protocols are equivalent.

In the following section we prove thatIP =PSPACE, an important theorem in computational complexity, which demonstrates that an interactive proof system can be used to decide whether a string is a member of a language in polynomial time, even though the traditionalPSPACE proof may be exponentially long.

Proof of IP = PSPACE

[edit]

The proof can be divided in two parts, we show thatIPPSPACE andPSPACEIP.

IP ⊆ PSPACE

[edit]
This article mayrequirecleanup to meet Wikipedia'squality standards. The specific problem is:This proof relies onIP being a fully public-coin protocol: the full state of the verifier can be deterministically computed from its message history.IP is usually initially considered in terms of private-coin protocols. These turn out to be equivalent, but this is highly nontrivial, arguably a more difficult fact to proven than IP ⊆ PSPACE itself. Please helpimprove this article if you can.(November 2023) (Learn how and when to remove this message)

In order to demonstrate thatIPPSPACE, we present a simulation of an interactive proof system by a polynomial space machine. Now, we can define:

Pr[V accepts w starting at Mj]=maxPPr[VP accepts w starting at Mj]{\displaystyle \Pr[V{\text{ accepts }}w{\text{ starting at }}M_{j}]=\max \nolimits _{P}\Pr \left[V\leftrightarrow P{\text{ accepts }}w{\text{ starting at }}M_{j}\right]}

and for every 0 ≤jp and every message historyMj, we inductively define the functionNMj:

NMj={0j=p and mp=reject1j=p and mp=acceptmaxmj+1NMj+1j<p and j is oddwt-avgmj+1NMj+1j<p and j is even{\displaystyle N_{M_{j}}={\begin{cases}0&j=p{\text{ and }}m_{p}={\text{reject}}\\1&j=p{\text{ and }}m_{p}={\text{accept}}\\\max _{m_{j+1}}N_{M_{j+1}}&j<p{\text{ and }}j{\text{ is odd}}\\{\text{wt-avg}}_{m_{j+1}}N_{M_{j+1}}&j<p{\text{ and }}j{\text{ is even}}\\\end{cases}}}

where:

wt-avgmj+1NMj+1:=mj+1Prr[V(w,r,Mj)=mj+1]NMj+1{\displaystyle {\text{wt-avg}}_{m_{j+1}}N_{M_{j+1}}:=\sum \nolimits _{m_{j+1}}\Pr \nolimits _{r}[V(w,r,M_{j})=m_{j+1}]N_{M_{j+1}}}

where Prr is the probability taken over the random stringr of lengthp. This expression is the average ofNMj+1, weighted by the probability that the verifier sent messagemj+1.

TakeM0 to be the empty message sequence, here we will show thatNM0 can be computed in polynomial space, and thatNM0 = Pr[V acceptsw]. First, to computeNM0, an algorithm can recursively calculate the valuesNMj for everyj andMj. Since the depth of the recursion isp, only polynomial space is necessary. The second requirement is that we needNM0 = Pr[V acceptsw], the value needed to determine whetherw is in A. We use induction to prove this as follows.

We must show that for every 0 ≤jp and everyMj,NMj = Pr[V acceptsw starting atMj], and we will do this using induction onj. The base case is to prove forj =p. Then we will use induction to go fromp down to 0.

The base case ofj =p is fairly simple. Sincemp is either accept or reject, ifmp is accept,NMp is defined to be 1 and Pr[V acceptsw starting atMj] = 1 since the message stream indicates acceptance, thus the claim is true. Ifmp is reject, the argument is very similar.

For the inductive hypothesis, we assume that for somej+1 ≤p and any message sequenceMj+1,NMj+1 = Pr[V acceptsw starting atMj+1] and then prove the hypothesis forj and any message sequenceMj.

Ifj is even,mj+1 is a message fromV toP. By the definition ofNMj,

NMj=mj+1Prr[V(w,r,Mj)=mj+1]NMj+1.{\displaystyle N_{M_{j}}=\sum \nolimits _{m_{j+1}}\Pr \nolimits _{r}\left[V(w,r,M_{j})=m_{j+1}\right]N_{M_{j+1}}.}

Then, by the inductive hypothesis, we can say this is equal to

mj+1Prr[V(w,r,Mj)=mj+1]Pr[V accepts w starting at Mj+1].{\displaystyle \sum \nolimits _{m_{j+1}}\Pr \nolimits _{r}\left[V(w,r,M_{j})=m_{j+1}\right]*\Pr \left[V{\text{ accepts }}w{\text{ starting at }}M_{j+1}\right].}

Finally, by definition, we can see that this is equal to Pr[V acceptsw starting atMj].

Ifj is odd,mj+1 is a message fromP toV. By definition,

NMj=maxmj+1NMj+1.{\displaystyle N_{M_{j}}=\max \nolimits _{m_{j+1}}N_{M_{j+1}}.}

Then, by the inductive hypothesis, this equals

maxmj+1Pr[V accepts w starting at Mj+1].{\displaystyle \max \nolimits _{m_{j+1}}*\Pr[V{\text{ accepts }}w{\text{ starting at }}M_{j+1}].}

This is equal to Pr[V acceptsw starting atMj] since:

maxmj+1Pr[V accepts w starting at Mj+1]Pr[V accepts w starting at Mj]{\displaystyle \max \nolimits _{m_{j+1}}\Pr[V{\text{ accepts }}w{\text{ starting at }}M_{j+1}]\leq \Pr[V{\text{ accepts w starting at }}M_{j}]}

because the prover on the right-hand side could send the messagemj+1 to maximize the expression on the left-hand side. And:

maxmj+1Pr[V accepts w starting at Mj+1]Pr[V accepts w starting at Mj]{\displaystyle \max \nolimits _{m_{j+1}}\Pr \left[V{\text{ accepts }}w{\text{ starting at }}M_{j+1}\right]\geq \Pr \left[V{\text{ accepts }}w{\text{ starting at }}M_{j}\right]}

Since the same Prover cannot do any better than send that same message. Thus, this holds whetheri is even or odd and the proof thatIPPSPACE is complete.

Here we have constructed a polynomial space machine that uses the best proverP for a particular stringw in languageA. We use this best prover in place of a prover with random input bits because we are able to try every set of random input bits in polynomial space. Since we have simulated an interactive proof system with a polynomial space machine, we have shown thatIPPSPACE, as desired.

PSPACE ⊆ IP

[edit]

In order to illustrate the technique that will be used to provePSPACEIP, we will first prove a weaker theorem, which was proven by Lund, et al.: #SAT ∈IP. Then using the concepts from this proof we will extend it to show that TQBF ∈IP. Since TQBF ∈PSPACE-complete, and TQBF ∈IP thenPSPACEIP.

#SAT is a member of IP

[edit]

We begin by showing that #SAT is inIP, where:

#SAT={φ,k : φ is a CNF-formula with exactly k satisfying assignments}.{\displaystyle \#{\text{SAT}}=\left\{\langle \varphi ,k\rangle \ :\ \varphi {\text{ is a CNF-formula with exactly }}k{\text{ satisfying assignments}}\right\}.}

Note that this is different from the normal definition of#SAT, in that it is adecision problem, rather than a function.

First we use arithmetization to map the Boolean formula withn variables, φ(b1, ...,bn) to a polynomialpφ(x1, ...,xn), wherepφ mimics φ in thatpφ is 1 if φ is true and 0 otherwise provided that the variables ofpφ are assigned Boolean values. The Boolean operations ∨, ∧ and ¬ used in φ are simulated inpφ by replacing the operators in φ as shown in the table below.

abab
abab := 1 − (1 −a)(1 −b)
¬a1 −a
Arithmetization rules for converting a Boolean formula φ(b1, ...,bn) to a polynomialpφ(x1, ...,xn)

As an example,ϕ=a(b¬c){\displaystyle \phi =a\land (b\lor \neg c)} would be converted into a polynomial as follows:

pφ=a(b¬c)=a(b(1c))=a(1(1b)(1(1c)))=a(1(1b)(1(1c)))=a(acabc){\displaystyle {\begin{aligned}p_{\varphi }&=a\wedge (b\vee \neg c)\\&=a\wedge \left(b*(1-c)\right)\\&=a\wedge \left(1-(1-b)(1-(1-c))\right)\\&=a\left(1-(1-b)(1-(1-c))\right)\\&=a-(ac-abc)\end{aligned}}}

The operationsab andab each result in a polynomial with a degree bounded by the sum of the degrees of the polynomials fora andb and hence, the degree of any variable is at most the length of φ.

Now letF be afinite field with orderq > 2n; also demand that q be at least 1000. For each 0 ≤in, define a functionfi onF, having parametersa1,,ai1F{\displaystyle a_{1},\dots ,a_{i-1}\in F}, and a single variableaiF{\displaystyle a_{i}\in F}: For 0 ≤in and fora1,,aiF{\displaystyle a_{1},\dots ,a_{i}\in F} let

fi(a1,,ai)=ai+1,,an{0,1}p(a1,,an).{\displaystyle f_{i}(a_{1},\dots ,a_{i})=\sum \nolimits _{a_{i+1},\dots ,a_{n}\in \{0,1\}}p(a_{1},\dots ,a_{n}).}

Note that the value off0 is the number of satisfying assignments of φ.f0 is a void function, with no variables.

Now the protocol for #SAT works as follows:

Note that this is a public-coin algorithm.

If φ hask satisfying assignments, clearlyV will accept. If φ does not havek satisfying assignments we assume there is a proverP~{\displaystyle {\tilde {P}}} that tries to convinceV that φ does havek satisfying assignments. We show that this can only be done with low probability.

To preventV from rejecting in phase 0,P~{\displaystyle {\tilde {P}}} has to send an incorrect valuef~0(){\displaystyle {\tilde {f}}_{0}()} toP. Then, in phase 1,P~{\displaystyle {\tilde {P}}} must send an incorrect polynomialf~1{\displaystyle {\tilde {f}}_{1}} with the property thatf~1(0)+f~1(1)=f~0(){\displaystyle {\tilde {f}}_{1}(0)+{\tilde {f}}_{1}(1)={\tilde {f}}_{0}()}. WhenV chooses a randomr1 to send toP,

Pr[f~1(r1)=f1(r1)]<1n2.{\displaystyle \Pr \left[{\tilde {f}}_{1}(r_{1})=f_{1}(r_{1})\right]<{\tfrac {1}{n^{2}}}.}

This is because a polynomial in a single variable of degree at mostd can have no more thand roots (unless it always evaluates to 0). So, any two polynomials in a single variable of degree at mostd can be equal only ind places. Since |F| > 2n the chances ofr1 being one of these values is at mostn/2n<n/n3{\displaystyle n/2^{n}<n/n^{3}} ifn > 10, or at most (n/1000) ≤ (n/n3) ifn ≤ 10.

Generalizing this idea for the other phases we have for each 1 ≤in if

f~i1(r1,,ri1)fi1(r1,,ri1),{\displaystyle {\tilde {f}}_{i-1}(r_{1},\dots ,r_{i-1})\neq f_{i-1}(r_{1},\dots ,r_{i-1}),}

then forri chosen randomly fromF,

Pr[f~(r1,,ri)=fi(r1,,ri)]1n2.{\displaystyle \Pr \left[{\tilde {f}}(r_{1},\dots ,r_{i})=f_{i}(r_{1},\dots ,r_{i})\right]\leq {\tfrac {1}{n^{2}}}.}

There aren phases, so the probability thatP~{\displaystyle {\tilde {P}}} is lucky becauseV selects at some stage a convenientri is at most 1/n. So, no prover can make the verifier accept with probability greater than 1/n. We can also see from the definition that the verifierV operates in probabilistic polynomial time. Thus, #SAT ∈IP.

TQBF is a member of IP

[edit]

In order to show thatPSPACE is a subset ofIP, we need to choose aPSPACE-complete problem and show that it is inIP. Once we show this, then it clear thatPSPACEIP. The proof technique demonstrated here is credited toAdi Shamir.

We know that TQBF is inPSPACE-Complete. So let ψ be a quantifiedBoolean expression:

ψ=Q1x1Qmxm[φ]{\displaystyle \psi ={\mathsf {Q}}_{1}x_{1}\dots {\mathsf {Q}}_{m}x_{m}[\varphi ]}

where φ is a CNF formula. ThenQi is a quantifier, either ∃ or ∀. Nowfi is the same as in the previous proof, but now it also includes quantifiers.

fi(a1,,ai)={fi(a1,,am)=1Qi+1xi+1Qmxm[φ(a1,,ai)] is true0otherwise{\displaystyle f_{i}(a_{1},\dots ,a_{i})={\begin{cases}f_{i}(a_{1},\dots ,a_{m})=1&{\mathsf {Q}}_{i+1}x_{i+1}\dots {\mathsf {Q}}_{m}x_{m}[\varphi (a_{1},\dots ,a_{i})]{\text{ is true}}\\0&{\text{otherwise}}\end{cases}}}

Here, φ(a1, ...,ai) is φ witha1 toai substituted forx1 toxi. Thusf0 is thetruth value of ψ. In order to arithmetize ψ we must use the following rules:

fi(a1,,ai)={fi+1(a1,,ai,0)fi+1(a1,,ai,1)Qi+1=fi+1(a1,,ai,0)fi+1(a1,,ai,1)Qi+1={\displaystyle f_{i}(a_{1},\dots ,a_{i})={\begin{cases}f_{i+1}(a_{1},\dots ,a_{i},0)\cdot f_{i+1}(a_{1},\dots ,a_{i},1)&{\mathsf {Q}}_{i+1}=\forall \\f_{i+1}(a_{1},\dots ,a_{i},0)*f_{i+1}(a_{1},\dots ,a_{i},1)&{\mathsf {Q}}_{i+1}=\exists \end{cases}}}

where as before we definexy = 1 − (1 − x)(1 − y).

By using the method described in #SAT, we must face a problem that for anyfi the degree of the resulting polynomial may double with each quantifier. In order to prevent this, we must introduce a new reduction operatorR which will reduce the degrees of the polynomial without changing their behavior on Boolean inputs.

So now before we arithmetizeψ=Q1x1Qmxm[φ]{\displaystyle \psi ={\mathsf {Q}}_{1}x_{1}\dots {\mathsf {Q}}_{m}x_{m}[\varphi ]} we introduce a new expression:

ψ=Q1Rx1Q2Rx1Rx2QmRx1Rxm[φ]{\displaystyle \psi '={\mathsf {Q}}_{1}\mathrm {R} x_{1}{\mathsf {Q}}_{2}\mathrm {R} x_{1}\mathrm {R} x_{2}\dots {\mathsf {Q}}_{m}\mathrm {R} x_{1}\dots \mathrm {R} x_{m}[\varphi ]}

or put another way:

ψ=S1y1Skyk[φ], where Si{,,R}, yi{x1,,xm}{\displaystyle \psi '={\mathsf {S}}_{1}y_{1}\dots {\mathsf {S}}_{k}y_{k}[\varphi ],\qquad {\text{ where }}{\mathsf {S}}_{i}\in \{\forall ,\exists ,\mathrm {R} \},\ y_{i}\in \{x_{1},\dots ,x_{m}\}}

Now for everyik we define the functionfi. We also definefk(x1,,xm){\displaystyle f_{k}(x_{1},\dots ,x_{m})} to be the polynomialp(x1, ...,xm) which is obtained by arithmetizing φ. Now in order to keep the degree of the polynomial low, we definefi in terms offi+1:

If Si+1=,fi(a1,,ai)=fi+1(a1,,ai,0)fi+1(a1,,ai,1){\displaystyle {\text{If }}{\mathsf {S}}_{i+1}=\forall ,\quad f_{i}(a_{1},\dots ,a_{i})=f_{i+1}(a_{1},\dots ,a_{i},0)\cdot f_{i+1}(a_{1},\dots ,a_{i},1)}
If Si+1=,fi(a1,,ai)=fi+1(a1,,ai,0)fi+1(a1,,ai,1){\displaystyle {\text{If }}{\mathsf {S}}_{i+1}=\exists ,\quad f_{i}(a_{1},\dots ,a_{i})=f_{i+1}(a_{1},\dots ,a_{i},0)*f_{i+1}(a_{1},\dots ,a_{i},1)}
If Si+1=R,fi(a1,,ai,a)=(1a)fi+1(a1,,ai,0)+afi+1(a1,,ai,1){\displaystyle {\text{If }}{\mathsf {S}}_{i+1}=\mathrm {R} ,\quad f_{i}(a_{1},\dots ,a_{i},a)=(1-a)f_{i+1}(a_{1},\dots ,a_{i},0)+af_{i+1}(a_{1},\dots ,a_{i},1)}

Now we can see that the reduction operation R, doesn't change the degree of the polynomial. Also it is important to see that the Rx operation doesn't change the value of the function on Boolean inputs. Sof0 is still the truth value of ψ, but the Rx value produces a result that is linear inx. Also after anyQixi{\displaystyle {\mathsf {Q}}_{i}x_{i}} we addRx1Rxi{\displaystyle \mathrm {R} _{x_{1}}\dots \mathrm {R} _{x_{i}}} in ψ′ in order to reduce the degree down to 1 after arithmetizingQi{\displaystyle {\mathsf {Q}}_{i}}.

Now let's describe the protocol. Ifn is the length of ψ, all arithmetic operations in the protocol are over a field of size at leastn4 wheren is the length of ψ.

  • Phase 0:PV:P sendsf0 toV.V checks thatf0= 1 and rejects if not.
  • Phase 1:PV:P sendsf1(z) toV.V uses coefficients to evaluatef1(0) andf1(1). Then it checks that the polynomial's degree is at mostn and that the following identities are true:
f0()={f1(0)f1(1) if S=f1(0)f1(1) if S=.(1r)f1(0)+rf1(1) if S=R.{\displaystyle f_{0}(\varnothing )={\begin{cases}f_{1}(0)\cdot f_{1}(1)&{\text{ if }}{\mathsf {S}}=\forall \\f_{1}(0)*f_{1}(1)&{\text{ if }}{\mathsf {S}}=\exists .\\(1-r)f_{1}(0)+rf_{1}(1)&{\text{ if }}{\mathsf {S}}=\mathrm {R} .\end{cases}}}
If either fails then reject.

V uses coefficients to evaluatefi(r1,,ri1,0){\displaystyle f_{i}(r_{1},\dots ,r_{i-1},0)} andfi(r1,,ri1,1){\displaystyle f_{i}(r_{1},\dots ,r_{i-1},1)}. Then it checks that the polynomial degree is at mostn and that the following identities are true:

fi1(r1,,ri1)={fi(r1,,ri1,0)fi(r1,,ri1,1)S=fi(r1,,ri1,0)fi(r1,,ri1,1)S=.{\displaystyle f_{i-1}(r_{1},\dots ,r_{i-1})={\begin{cases}f_{i}(r_{1},\dots ,r_{i-1},0)\cdot f_{i}(r_{1},\dots ,r_{i-1},1)&{\mathsf {S}}=\forall \\f_{i}(r_{1},\dots ,r_{i-1},0)*f_{i}(r_{1},\dots ,r_{i-1},1)&{\mathsf {S}}=\exists .\end{cases}}}
fi1(r1r)=(1r)fi(r1,,ri1,0)+rfi(r1,,ri1,1) if S=R.{\displaystyle f_{i-1}(r_{1}\dots r)=(1-r)f_{i}(r_{1},\dots ,r_{i-1},0)+rf_{i}(r_{1},\dots ,r_{i-1},1){\text{ if }}{\mathsf {S}}=\mathrm {R} .}

If either fails then reject.

VP:V picks a randomr inF and sends it to P. (IfS=R{\displaystyle {\mathsf {S}}=\mathrm {R} } then thisr replaces the previousr).

Goto phasei + 1 whereP must persuadeV thatfi(r1,,r){\displaystyle f_{i}(r_{1},\dots ,r)} is correct.

This is the end of the protocol description.

If ψ is true thenV will accept whenP follows the protocol. Likewise ifP~{\displaystyle {\tilde {P}}} is a malicious prover which lies, and if ψ is false, thenP~{\displaystyle {\tilde {P}}} will need to lie at phase 0 and send some value forf0. If at phasei,V has an incorrect value forfi1(r1,){\displaystyle f_{i-1}(r_{1},\dots )} thenfi(r1,,0){\displaystyle f_{i}(r_{1},\dots ,0)} andfi(r1,,1){\displaystyle f_{i}(r_{1},\dots ,1)} will likely also be incorrect, and so forth. The probability forP~{\displaystyle {\tilde {P}}} to get lucky on some randomr is at most the degree of the polynomial divided by the field size:n/n4{\displaystyle n/n^{4}}. The protocol runs throughO(n2) phases, so the probability thatP~{\displaystyle {\tilde {P}}} gets lucky at some phase is ≤ 1/n. IfP~{\displaystyle {\tilde {P}}} is never lucky, thenV will reject at phasek+1.

Since we have now shown that bothIPPSPACE andPSPACEIP, we can conclude thatIP =PSPACE as desired. Moreover, we have shown that anyIP algorithm may be taken to be public-coin, since the reduction fromPSPACE toIP has this property.

Variants

[edit]

There are a number of variants ofIP which slightly modify the definition of the interactive proof system. We summarize some of the better-known ones here.

dIP

[edit]
Main article:Interactive proof system

A subset ofIP is thedeterministic Interactive Proof class, which is similar toIP but has a deterministic verifier (i.e. with no randomness).This class is equal toNP.

Perfect completeness

[edit]

Anequivalent definition ofIP replaces the condition that the interaction succeedswith high probability on strings in the language with the requirement that italways succeeds:

wLPr[VP accepts w]=1{\displaystyle w\in L\Rightarrow \Pr[V\leftrightarrow P{\text{ accepts }}w]=1}

This seemingly stronger criterion of "perfect completeness" does not change the complexity classIP, since any language with an interactive proof system may be given an interactive proof system with perfect completeness.[4]

MIP

[edit]
Main article:Interactive proof system § MIP

In 1988, Goldwasser et al. created an even more powerful interactive proof system based onIP calledMIP in which there aretwo independent provers. The two provers cannot communicate once the verifier has begun sending messages to them. Just as it's easier to tell if a criminal is lying if he and his partner are interrogated in separate rooms, it's considerably easier to detect a malicious prover trying to trick the verifier if there is another prover it can double-check with. In fact, this is so helpful that Babai, Fortnow, and Lund were able to show thatMIP =NEXPTIME, the class of all problems solvable by anondeterministic machine inexponential time, a very large class. Moreover, all languages inNP havezero-knowledge proofs in anMIP system, without any additional assumptions; this is only known forIP assuming the existence of one-way functions.

IPP

[edit]

IPP (unbounded IP) is a variant ofIP where we replace theBPP verifier by aPP verifier. More precisely, we modify the completeness and soundness conditions as follows:

  • Completeness: if a string is in the language, the honest verifier will be convinced of this fact by an honest prover with probability at least 1/2.
  • Soundness: if the string is not in the language, no prover can convince the honest verifier that it is in the language, except with probability less than 1/2.

AlthoughIPP also equalsPSPACE,IPP protocols behaves quite differently fromIP with respect tooracles:IPP=PSPACE with respect to all oracles, whileIPPSPACE with respect to almost all oracles.[5]

QIP

[edit]
Main article:Quantum Interactive Protocol

QIP is a version ofIP replacing theBPP verifier by aBQP verifier, whereBQP is the class of problems solvable byquantum computers in polynomial time. The messages are composed of qubits.[6] In 2009, Jain, Ji, Upadhyay, and Watrous proved thatQIP also equalsPSPACE,[7] implying that this change gives no additional power to the protocol. This subsumes a previous result of Kitaev and Watrous thatQIP is contained inEXPTIME becauseQIP =QIP[3], so that more than three rounds are never necessary.[8]

compIP

[edit]

WhereasIPP andQIP give more power to the verifier, acompIP system (competitive IP proof system) weakens the completeness condition in a way that weakens the prover:

  • Completeness: if a string is in the languageL, the honest verifier will be convinced of this fact by an honest prover with probability at least 2/3. Moreover, the prover will do so in probabilistic polynomial time given access to an oracle for the languageL.

Essentially, this makes the prover aBPP machine with access to an oracle for the language, but only in the completeness case, not the soundness case. The concept is that if a language is incompIP, then interactively proving it is in some sense as easy as deciding it. With the oracle, the prover can easily solve the problem, but its limited power makes it much more difficult to convince the verifier of anything. In fact,compIP isn't even known or believed to containNP.

On the other hand, such a system can solve some problems believed to be hard. Somewhat paradoxically, though such a system is not believed to be able to solve all ofNP, it can easily solve allNP-complete problems due to self-reducibility. This stems from the fact that if the language L is notNP-hard, the prover is substantially limited in power (as it can no longer decide allNP problems with its oracle).

Additionally, thegraph nonisomorphism problem (which is a classical problem inIP) is also incompIP, since the only hard operation the prover has to do is isomorphism testing, which it can use the oracle to solve. Quadratic non-residuosity and graph isomorphism are also incompIP.[9] Note, quadratic non-residuosity (QNR) is likely an easier problem than graph isomorphism as QNR is inUP intersectco-UP.[10]

Notes

[edit]
  1. ^Lund, C.; Fortnow, L.; Karloff, H.; Nisan, N. (1990). "Algebraic methods for interactive proof systems".Proceedings [1990] 31st AnnualSymposium on Foundations of Computer Science. IEEE Comput. Soc. Press. pp. 2–10.doi:10.1109/fscs.1990.89518.ISBN 0-8186-2082-X.S2CID 32614901.
  2. ^Shamir, Adi. "Ip= pspace."Journal of the ACM 39.4 (1992): 869-877.
  3. ^Chang Richard; et al. (1994)."The random oracle hypothesis is false".Journal of Computer and System Sciences.49 (1):24–39.doi:10.1016/s0022-0000(05)80084-4.
  4. ^Furer Martin, Goldreich Oded, Mansour Yishay, Sipser Michael, Zachos Stathis (1989). "On Completeness and Soundness in Interactive Proof Systems".Advances in Computing Research: A Research Annual.5:429–442.CiteSeerX 10.1.1.39.9412.{{cite journal}}: CS1 maint: multiple names: authors list (link)
  5. ^R. Chang, B. Chor, Oded Goldreich, J. Hartmanis, J. Håstad, D. Ranjan, and P. Rohatgi.The random oracle hypothesis is false.Journal of Computer and System Sciences, 49(1):24-39. 1994.
  6. ^J. Watrous.PSPACE has constant-round quantum interactive proof systems.Proceedings of IEEE FOCS'99, pp. 112-119. 1999.
  7. ^Rahul Jain; Zhengfeng Ji; Sarvagya Upadhyay;John Watrous (2009). "QIP = PSPACE".arXiv:0907.4737 [quant-ph].
  8. ^A. Kitaev and J. Watrous.Parallelization, amplification, and exponential time simulation of quantum interactive proof systems.Proceedings of the 32nd ACMSymposium on the Theory of Computing, pp. 608-617. 2000.
  9. ^Shafi Goldwasser andMihir Bellare.The Complexity of Decision versus Search.SIAM Journal on Computing, Volume 23, No. 1. February 1994.
  10. ^Cai JY, Threlfall RA (2004). "A note on quadratic residuosity andUP".Information Processing Letters.92 (3):127–131.CiteSeerX 10.1.1.409.1830.doi:10.1016/j.ipl.2004.06.015.

References

[edit]
Considered feasible
Suspected infeasible
Considered infeasible
Other complexity classes
Class hierarchies
Families of classes
Retrieved from "https://en.wikipedia.org/w/index.php?title=IP_(complexity)&oldid=1337976051"
Category:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp