Incomputational complexity theory, the classIP (which stands forinteractive proof) is the class of problems solvable by aninteractive proof system. It is equal to the classPSPACE. The result was established in a series of papers: the first by Lund, Karloff, Fortnow, and Nisan showed thatco-NP had multiple-prover interactive proofs;[1] and the second, byShamir, employed their technique to establish that IP=PSPACE.[2] The result is a famous example where the proof does notrelativize.[3]
The concept of an interactive proof system was first introduced byShafi Goldwasser,Silvio Micali, andCharles Rackoff in 1985. An interactive proof system consists of two machines, a prover,P, which presents a proof that a givenstringn is a member of somelanguage, and a verifier,V, that checks that the presented proof is correct. The prover is assumed to be infinite in computation and storage, while the verifier is a probabilistic polynomial-time machine with access to a random bit string whose length is polynomial on the size ofn. These two machines exchange a polynomial number,p(n), of messages and once the interaction is completed, the verifier must decide whether or notn is in the language, with only a 1/3 chance of error. (So any language inBPP is inIP, since then the verifier could simply ignore the prover and make the decision on its own.)

A languageL belongs toIP if there existV,P such that for allQ,w:
TheArthur–Merlin protocol, introduced byLászló Babai, is similar in nature, except that the number of rounds of interaction is bounded by a constant rather than a polynomial.
Goldwasser et al. have shown thatpublic-coin protocols, where the random numbers used by the verifier are provided to the prover along with the challenges, are no less powerful than private-coin protocols. At most two additional rounds of interaction are required to replicate the effect of a private-coin protocol. The opposite inclusion is straightforward, because the verifier can always send to the prover the results of their private coin tosses, which proves that the two types of protocols are equivalent.
In the following section we prove thatIP =PSPACE, an important theorem in computational complexity, which demonstrates that an interactive proof system can be used to decide whether a string is a member of a language in polynomial time, even though the traditionalPSPACE proof may be exponentially long.
The proof can be divided in two parts, we show thatIP ⊆PSPACE andPSPACE ⊆IP.
This article mayrequirecleanup to meet Wikipedia'squality standards. The specific problem is:This proof relies onIP being a fully public-coin protocol: the full state of the verifier can be deterministically computed from its message history.IP is usually initially considered in terms of private-coin protocols. These turn out to be equivalent, but this is highly nontrivial, arguably a more difficult fact to proven than IP ⊆ PSPACE itself. Please helpimprove this article if you can.(November 2023) (Learn how and when to remove this message) |
In order to demonstrate thatIP ⊆PSPACE, we present a simulation of an interactive proof system by a polynomial space machine. Now, we can define:
and for every 0 ≤j ≤p and every message historyMj, we inductively define the functionNMj:
where:
where Prr is the probability taken over the random stringr of lengthp. This expression is the average ofNMj+1, weighted by the probability that the verifier sent messagemj+1.
TakeM0 to be the empty message sequence, here we will show thatNM0 can be computed in polynomial space, and thatNM0 = Pr[V acceptsw]. First, to computeNM0, an algorithm can recursively calculate the valuesNMj for everyj andMj. Since the depth of the recursion isp, only polynomial space is necessary. The second requirement is that we needNM0 = Pr[V acceptsw], the value needed to determine whetherw is in A. We use induction to prove this as follows.
We must show that for every 0 ≤j ≤p and everyMj,NMj = Pr[V acceptsw starting atMj], and we will do this using induction onj. The base case is to prove forj =p. Then we will use induction to go fromp down to 0.
The base case ofj =p is fairly simple. Sincemp is either accept or reject, ifmp is accept,NMp is defined to be 1 and Pr[V acceptsw starting atMj] = 1 since the message stream indicates acceptance, thus the claim is true. Ifmp is reject, the argument is very similar.
For the inductive hypothesis, we assume that for somej+1 ≤p and any message sequenceMj+1,NMj+1 = Pr[V acceptsw starting atMj+1] and then prove the hypothesis forj and any message sequenceMj.
Ifj is even,mj+1 is a message fromV toP. By the definition ofNMj,
Then, by the inductive hypothesis, we can say this is equal to
Finally, by definition, we can see that this is equal to Pr[V acceptsw starting atMj].
Ifj is odd,mj+1 is a message fromP toV. By definition,
Then, by the inductive hypothesis, this equals
This is equal to Pr[V acceptsw starting atMj] since:
because the prover on the right-hand side could send the messagemj+1 to maximize the expression on the left-hand side. And:
Since the same Prover cannot do any better than send that same message. Thus, this holds whetheri is even or odd and the proof thatIP ⊆PSPACE is complete.
Here we have constructed a polynomial space machine that uses the best proverP for a particular stringw in languageA. We use this best prover in place of a prover with random input bits because we are able to try every set of random input bits in polynomial space. Since we have simulated an interactive proof system with a polynomial space machine, we have shown thatIP ⊆PSPACE, as desired.
In order to illustrate the technique that will be used to provePSPACE ⊆IP, we will first prove a weaker theorem, which was proven by Lund, et al.: #SAT ∈IP. Then using the concepts from this proof we will extend it to show that TQBF ∈IP. Since TQBF ∈PSPACE-complete, and TQBF ∈IP thenPSPACE ⊆IP.
We begin by showing that #SAT is inIP, where:
Note that this is different from the normal definition of#SAT, in that it is adecision problem, rather than a function.
First we use arithmetization to map the Boolean formula withn variables, φ(b1, ...,bn) to a polynomialpφ(x1, ...,xn), wherepφ mimics φ in thatpφ is 1 if φ is true and 0 otherwise provided that the variables ofpφ are assigned Boolean values. The Boolean operations ∨, ∧ and ¬ used in φ are simulated inpφ by replacing the operators in φ as shown in the table below.
| a ∧b | ab |
| a ∨b | a ∗b := 1 − (1 −a)(1 −b) |
| ¬a | 1 −a |
As an example, would be converted into a polynomial as follows:
The operationsab anda ∗b each result in a polynomial with a degree bounded by the sum of the degrees of the polynomials fora andb and hence, the degree of any variable is at most the length of φ.
Now letF be afinite field with orderq > 2n; also demand that q be at least 1000. For each 0 ≤i ≤n, define a functionfi onF, having parameters, and a single variable: For 0 ≤i ≤n and for let
Note that the value off0 is the number of satisfying assignments of φ.f0 is a void function, with no variables.
Now the protocol for #SAT works as follows:
Note that this is a public-coin algorithm.
If φ hask satisfying assignments, clearlyV will accept. If φ does not havek satisfying assignments we assume there is a prover that tries to convinceV that φ does havek satisfying assignments. We show that this can only be done with low probability.
To preventV from rejecting in phase 0, has to send an incorrect value toP. Then, in phase 1, must send an incorrect polynomial with the property that. WhenV chooses a randomr1 to send toP,
This is because a polynomial in a single variable of degree at mostd can have no more thand roots (unless it always evaluates to 0). So, any two polynomials in a single variable of degree at mostd can be equal only ind places. Since |F| > 2n the chances ofr1 being one of these values is at most ifn > 10, or at most (n/1000) ≤ (n/n3) ifn ≤ 10.
Generalizing this idea for the other phases we have for each 1 ≤i ≤n if
then forri chosen randomly fromF,
There aren phases, so the probability that is lucky becauseV selects at some stage a convenientri is at most 1/n. So, no prover can make the verifier accept with probability greater than 1/n. We can also see from the definition that the verifierV operates in probabilistic polynomial time. Thus, #SAT ∈IP.
In order to show thatPSPACE is a subset ofIP, we need to choose aPSPACE-complete problem and show that it is inIP. Once we show this, then it clear thatPSPACE ⊆IP. The proof technique demonstrated here is credited toAdi Shamir.
We know that TQBF is inPSPACE-Complete. So let ψ be a quantifiedBoolean expression:
where φ is a CNF formula. ThenQi is a quantifier, either ∃ or ∀. Nowfi is the same as in the previous proof, but now it also includes quantifiers.
Here, φ(a1, ...,ai) is φ witha1 toai substituted forx1 toxi. Thusf0 is thetruth value of ψ. In order to arithmetize ψ we must use the following rules:
where as before we definex ∗y = 1 − (1 − x)(1 − y).
By using the method described in #SAT, we must face a problem that for anyfi the degree of the resulting polynomial may double with each quantifier. In order to prevent this, we must introduce a new reduction operatorR which will reduce the degrees of the polynomial without changing their behavior on Boolean inputs.
So now before we arithmetize we introduce a new expression:
or put another way:
Now for everyi ≤k we define the functionfi. We also define to be the polynomialp(x1, ...,xm) which is obtained by arithmetizing φ. Now in order to keep the degree of the polynomial low, we definefi in terms offi+1:
Now we can see that the reduction operation R, doesn't change the degree of the polynomial. Also it is important to see that the Rx operation doesn't change the value of the function on Boolean inputs. Sof0 is still the truth value of ψ, but the Rx value produces a result that is linear inx. Also after any we add in ψ′ in order to reduce the degree down to 1 after arithmetizing.
Now let's describe the protocol. Ifn is the length of ψ, all arithmetic operations in the protocol are over a field of size at leastn4 wheren is the length of ψ.
V uses coefficients to evaluate and. Then it checks that the polynomial degree is at mostn and that the following identities are true:
If either fails then reject.
V →P:V picks a randomr inF and sends it to P. (If then thisr replaces the previousr).
Goto phasei + 1 whereP must persuadeV that is correct.
This is the end of the protocol description.
If ψ is true thenV will accept whenP follows the protocol. Likewise if is a malicious prover which lies, and if ψ is false, then will need to lie at phase 0 and send some value forf0. If at phasei,V has an incorrect value for then and will likely also be incorrect, and so forth. The probability for to get lucky on some randomr is at most the degree of the polynomial divided by the field size:. The protocol runs throughO(n2) phases, so the probability that gets lucky at some phase is ≤ 1/n. If is never lucky, thenV will reject at phasek+1.
Since we have now shown that bothIP ⊆PSPACE andPSPACE ⊆IP, we can conclude thatIP =PSPACE as desired. Moreover, we have shown that anyIP algorithm may be taken to be public-coin, since the reduction fromPSPACE toIP has this property.
There are a number of variants ofIP which slightly modify the definition of the interactive proof system. We summarize some of the better-known ones here.
A subset ofIP is thedeterministic Interactive Proof class, which is similar toIP but has a deterministic verifier (i.e. with no randomness).This class is equal toNP.
Anequivalent definition ofIP replaces the condition that the interaction succeedswith high probability on strings in the language with the requirement that italways succeeds:
This seemingly stronger criterion of "perfect completeness" does not change the complexity classIP, since any language with an interactive proof system may be given an interactive proof system with perfect completeness.[4]
In 1988, Goldwasser et al. created an even more powerful interactive proof system based onIP calledMIP in which there aretwo independent provers. The two provers cannot communicate once the verifier has begun sending messages to them. Just as it's easier to tell if a criminal is lying if he and his partner are interrogated in separate rooms, it's considerably easier to detect a malicious prover trying to trick the verifier if there is another prover it can double-check with. In fact, this is so helpful that Babai, Fortnow, and Lund were able to show thatMIP =NEXPTIME, the class of all problems solvable by anondeterministic machine inexponential time, a very large class. Moreover, all languages inNP havezero-knowledge proofs in anMIP system, without any additional assumptions; this is only known forIP assuming the existence of one-way functions.
IPP (unbounded IP) is a variant ofIP where we replace theBPP verifier by aPP verifier. More precisely, we modify the completeness and soundness conditions as follows:
AlthoughIPP also equalsPSPACE,IPP protocols behaves quite differently fromIP with respect tooracles:IPP=PSPACE with respect to all oracles, whileIP ≠PSPACE with respect to almost all oracles.[5]
QIP is a version ofIP replacing theBPP verifier by aBQP verifier, whereBQP is the class of problems solvable byquantum computers in polynomial time. The messages are composed of qubits.[6] In 2009, Jain, Ji, Upadhyay, and Watrous proved thatQIP also equalsPSPACE,[7] implying that this change gives no additional power to the protocol. This subsumes a previous result of Kitaev and Watrous thatQIP is contained inEXPTIME becauseQIP =QIP[3], so that more than three rounds are never necessary.[8]
WhereasIPP andQIP give more power to the verifier, acompIP system (competitive IP proof system) weakens the completeness condition in a way that weakens the prover:
Essentially, this makes the prover aBPP machine with access to an oracle for the language, but only in the completeness case, not the soundness case. The concept is that if a language is incompIP, then interactively proving it is in some sense as easy as deciding it. With the oracle, the prover can easily solve the problem, but its limited power makes it much more difficult to convince the verifier of anything. In fact,compIP isn't even known or believed to containNP.
On the other hand, such a system can solve some problems believed to be hard. Somewhat paradoxically, though such a system is not believed to be able to solve all ofNP, it can easily solve allNP-complete problems due to self-reducibility. This stems from the fact that if the language L is notNP-hard, the prover is substantially limited in power (as it can no longer decide allNP problems with its oracle).
Additionally, thegraph nonisomorphism problem (which is a classical problem inIP) is also incompIP, since the only hard operation the prover has to do is isomorphism testing, which it can use the oracle to solve. Quadratic non-residuosity and graph isomorphism are also incompIP.[9] Note, quadratic non-residuosity (QNR) is likely an easier problem than graph isomorphism as QNR is inUP intersectco-UP.[10]
{{cite journal}}: CS1 maint: multiple names: authors list (link)