37
Algorithms and lower bounds for de-Morgan formulas of low- communication leaf gates Sajin Koroth (Simon Fraser University) Valentine Kabanets Joint with Zhenjian Lu Dimitrios Myrisiotis Igor Carboni Oliveira

Algorithms and lower bounds for de-Morgan formulas of low

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Algorithms and lower bounds for de-Morgan formulas of low

Algorithms and lower bounds for de-Morgan formulas of low-communication leaf gatesSajin Koroth (Simon Fraser University)

ValentineKabanets

Joint with

ZhenjianLu

Dimitrios Myrisiotis

Igor Carboni Oliveira

Page 2: Algorithms and lower bounds for de-Morgan formulas of low

Outline

ā€¢ Background

ā€¢ Circuit model :

ā€¢ Prior work

ā€¢ Results

ā€¢ Lower bounds

ā€¢ PRGā€™s

ā€¢ SAT algorithmā€™s

ā€¢ Learning algorithms

ā€¢ Overview of the lower bound technique

Formula[s] āˆ˜ š’¢

Page 3: Algorithms and lower bounds for de-Morgan formulas of low

Parallel vs Sequential computation

ā€¢ Most of linear algebra can be done in parallel

ā€¢ Gaussian elimination is an outlier

ā€¢ Intuitively its an inherently sequential procedure

ā€¢ There are theoretical reasons to believe so

ā€¢ There is an efficient sequential algorithm

Page 4: Algorithms and lower bounds for de-Morgan formulas of low

P vs NC1

Are there problems with efficient sequential algorithms which do not have efficient parallel algorithms ?

Class P of poly-time solvable problems

Modeled as circuits

Page 5: Algorithms and lower bounds for de-Morgan formulas of low

Circuit complexity

ā€¢ Complexity parameters :

ā€¢ Size : # of gates

ā€¢ Depth : length of the longest path from root to leaf

ā€¢ Fan in : 2, Fan out

ā€¢ Formulas :

ā€¢ Underlying DAG is a tree

ā€¢ No reuse of computation

ā€¢ Depth = log ( Size )

Internal gates

Leaf gates

Page 6: Algorithms and lower bounds for de-Morgan formulas of low

Circuit complexityClass = Poly-Size FormulasNC1

ā€¢ Efficient parallel computation (formally CREW PRAM):

ā€¢ Polynomially many processors

ā€¢ Logarithmic computation time

size(F) = nO(1)

x1 x2 xn x5

F

depth(F) = O(log n)

In formula, depth(F) = O(log size(F))

Page 7: Algorithms and lower bounds for de-Morgan formulas of low

Circuit complexityP vs rephrasedNC1

ā€¢ A Boolean function (candidates: Perfect matching, Gaussian elimination etc)

ā€¢ That can be computed in poly-time ( )

ā€¢ Any de-Morgan formula computing it has super-poly size ( )

f

f āˆˆ P

f āˆ‰ NC1

Page 8: Algorithms and lower bounds for de-Morgan formulas of low

P vs NC1State of the art

ā€¢ Andreevā€™87 : for a function in called the Andreev function

ā€¢ Also, Andreevā€™87 : , where is the shrinkage exponent

ā€¢ Paterson and Zwickā€™93 :

ā€¢ Hastadā€™98 (breakthrough) :

ā€¢ Talā€™14 :

ā€¢ Best l.b. for Andreevā€™s function (Talā€™14) :

ā€¢ Best l.b. for a function in (Talā€™16) :

Ī©(n2.5āˆ’o(1)) P

Ī©(n1+Ī“āˆ’o(1)) Ī“

Ī“ ā‰„ 1.63

Ī“ ā‰„ 2 āˆ’ o(1)

Ī“ = 2

Ī© ( n3

log2 n log log n )P Ī© ( n3

log n(log log n)2 )

Page 9: Algorithms and lower bounds for de-Morgan formulas of low

Cubic formula lower boundsAndreevā€™s function

f (

)

x1 x2 x3 xnā‹Æā‹Æ ,Truth Table of a bit function ( )log n h 2log n = n

y1 y2 y3 ynā‹Æā‹Æ =

y1 y2 y3 y nlog nā‹Æā‹Æ

āŠ•

z1

y nlog n

y 2nlog n

ā‹Æā‹Æ

āŠ•

z2

ynāˆ’ nlog n

ynā‹Æā‹Æ

āŠ•

zlog n

h

nlog n

Page 10: Algorithms and lower bounds for de-Morgan formulas of low

Cubic formula lower boundsHastadā€™s result

ā€¢ (Talā€™14) :

ā€¢ Doesnā€™t work if there are parity gates at bottom

Ī© ( n3

log2 n log log n )

Page 11: Algorithms and lower bounds for de-Morgan formulas of low

Our ModelAugmenting de-Morgan formulas

ā€¢ de-Morgan formulas : leaf gates, input literals

ā€¢ Our model : leaf gates, low communication functions

Leaf gatesLeaf gates of low cc

Page 12: Algorithms and lower bounds for de-Morgan formulas of low

Our modelReformulation

ā€¢

ā€¢ Size s de-Morgan formula

ā€¢ : A family of Boolean functions

ā€¢ Leaf gates are functions

ā€¢ Our model :

ā€¢ - low communication complexity Boolean functions

ā€¢

Formula[s] āˆ˜ š’¢

š’¢

g āˆˆ š’¢

š’¢

s = O(n2)

Page 13: Algorithms and lower bounds for de-Morgan formulas of low

Communication complexity

ā€¢ Yaoā€™s 2-party model

ā€¢ Input divided into 2 parts

ā€¢ Goal : compute with minimal communication

x, y

f(x, y) x yf(x, y)

m1m2

mk

Page 14: Algorithms and lower bounds for de-Morgan formulas of low

Our modelComplexity of Andreevā€™s function

f (

)

x1 x2 x3 xnā‹Æā‹Æ ,Truth Table of a bit function ( )log n h 2log n = n

y1 y2 y3 ynā‹Æā‹Æ =

y1 y2 y3 y nlog nā‹Æā‹Æ

āŠ•

z1

y nlog n

y 2nlog n

ā‹Æā‹Æ

āŠ•

z2

ynāˆ’ nlog n

ynā‹Æā‹Æ

āŠ•

zlog n

h

nlog n

de-Morgan formula of size n

log n

Leaf gates

Communication complexityOf Parity = 2 bits

Page 15: Algorithms and lower bounds for de-Morgan formulas of low

Our modelPrior work - Bipartite Formulas

ā€¢ Input is divided into two parts,

ā€¢ Every leaf can gate can access any Boolean function of either or but not both

ā€¢ Models a well known measure - graph complexity

ā€¢ Talā€™16: Bipartite formula complexity of is

ā€¢ Earlier methods could not do super linear

x, y

x y

IPn Ī©(n2)

g1 g2 g3 gs

F

x1 x2 x3 xnā‹Æā‹Æ y1 y2 y3 ynā‹Æā‹Æ

Communication complexityOf a bipartite function = 1 bit

Page 16: Algorithms and lower bounds for de-Morgan formulas of low

Our modelConnection to Hardness Magnification

ā€¢ : Given the truth table of a function on bits ( )

ā€¢ Yes : if has a circuit of size at most

ā€¢ No : otherwise

ā€¢ Meta computational problem with connections to Crypto, learning theory, circuit complexity etc

ā€¢ OPSā€™19:

ā€¢ If there exists an such that is not in

ā€¢ then,

MCSPN[k] f n N = 2n

f k

Ļµ MCSPN[2o(n)] Formula[N1+Ļµ] āˆ˜ XOR

NP āˆ‰ NC1

Page 17: Algorithms and lower bounds for de-Morgan formulas of low

Our modelConnection to PRG for polytopes

ā€¢ Polytope : AND of LTFā€™s

ā€¢ LTF :

ā€¢

ā€¢ Ex :

ā€¢ Nisanā€™94 : Randomized communication complexity

ā€¢ PRGā€™s for polytopes : Approximate volume computation

sign(w1x1 + ā€¦ + wnxn āˆ’ Īø)

w1, ā€¦, wn, Īø āˆˆ ā„

3x1 + 4x2 + 5x7 ā‰„ 12

O(log n)

Page 18: Algorithms and lower bounds for de-Morgan formulas of low

Our modelInteresting low communication bottom gates

ā€¢ Bipartite functions

ā€¢ Parities

ā€¢ LTFā€™s (Linear threshold functions)

ā€¢ PTFā€™s (Polynomial threshold functions)

Page 19: Algorithms and lower bounds for de-Morgan formulas of low

Our resultsTarget function - Generalized inner product

ā€¢ Generalization of binary inner product

ā€¢

ā€¢

IPn(x, y) = āˆ‘iāˆˆ[n]

xiyi

GIPkn(x1, x2, ā€¦, xk) = āˆ‘

iāˆˆ[n/k]āˆjāˆˆ[k]

xji

x21 x2

2 x23 x2

nk

ā‹Æā‹Æ

x11 x1

2 x13 x1

nk

ā‹Æā‹Æ

xk1 xk

2 xk3 xk

nk

ā‹Æā‹Æ

āˆ§

āˆ§

āˆ§z1

āˆ§

āˆ§

āˆ§z2

āˆ§

āˆ§

āˆ§zkāŠ•0/1

Page 20: Algorithms and lower bounds for de-Morgan formulas of low

Our resultsLower bound

ā€¢ Let be computed on average by ,

ā€¢ That is,

ā€¢ Then,

ā€¢ : Randomized communication of with error in the number on forehead communication complexity model

GIPkn F āˆˆ Formula[s] āˆ˜ š’¢

Prx

[F(x) = GIPkn(x)] ā‰„ 1/2 + Ļµ

s = Ī© ( n2

k2 ā‹… 16k ā‹… RkĻµ/2n2(š’¢) ā‹… log2(1/Ļµ) )

RkĻµ/2n2(š’¢) š’¢ Ļµ/2n2

Page 21: Algorithms and lower bounds for de-Morgan formulas of low

Our resultsMCSP lower bounds

ā€¢ If is computed , then

ā€¢ Contrast : OPSā€™19:

ā€¢ If there exists an such that is not in

ā€¢ then,

ā€¢ Our techniques cannot handle

MCSPN[2cn] Formula[s] āˆ˜ XOR s = O(n2)

Ļµ MCSPN[2o(n)]Formula[N1+Ļµ] āˆ˜ XOR

NP āˆ‰ NC1

MCSPN[2o(n)]

Page 22: Algorithms and lower bounds for de-Morgan formulas of low

Our resultsPRG

ā€¢ A pseudo random generator is said to fool a function class if

ā€¢

ā€¢ is any function from

ā€¢

ā€¢ is the seed,

ā€¢ Smaller the seed length compared to the better

G Ļµ ā„±

Przāˆˆ{0,1}l(n) [f(G(z)) = 1] āˆ’ Pr

xāˆˆ{0,1}n [f(x) = 1] ā‰¤ Ļµ

f ā„±

G : {0,1}l(n) ā†’ {0,1}n

z l(n) ā‹˜ n

n

Page 23: Algorithms and lower bounds for de-Morgan formulas of low

Our resultsPRG

ā€¢ Parities at the bottom can make things harder.

ā€¢ best known PRG seed length

ā€¢ best known only

AC0 poly(log n)

AC0 āˆ˜ XOR (1 āˆ’ o(1))n

Page 24: Algorithms and lower bounds for de-Morgan formulas of low

Our resultsPRG

ā€¢ There is a PRG that -fools

ā€¢ Seed length :

ā€¢ Seed length is optimal, unless lower bound can be improved

Ļµ Formula[s] āˆ˜ XOR

O( s ā‹… log s ā‹… log(1/Ļµ) + log n)

Page 25: Algorithms and lower bounds for de-Morgan formulas of low

Our resultsPRG

ā€¢ Natural generalization to

ā€¢ There is a PRG that -fools

ā€¢ Seed length :

ā€¢ Number in hand

Formula[s] āˆ˜ š’¢

Ļµ Formula[s] āˆ˜ š’¢

n/k + O( s ā‹… (Rkāˆ’NIHĻµ/6s (š’¢) + log s) ā‹… log(1/Ļµ) + log k) ā‹… log k

Page 26: Algorithms and lower bounds for de-Morgan formulas of low

Our resultsPRG - Corollaries

ā€¢ (Ours + Vio15) : There is a PRG

ā€¢ Seed length :

ā€¢ -fools intersection of halfspaces over

ā€¢ Our results beats earlier results when and

O(n1/2 ā‹… m1/4 ā‹… log n ā‹… log(n/Ļµ))

Ļµ m {0,1}n

m = O(n) Ļµ ā‰¤ 1/n

Page 27: Algorithms and lower bounds for de-Morgan formulas of low

Our resultsPRG - Corollaries

ā€¢ There is a PRG

ā€¢ Seed length :

ā€¢ -fools

ā€¢ First of its kind

ā€¢ Blackbox counting algorithm (Whitebox due to CW19)

O(n1/2 ā‹… s1/4 ā‹… log n ā‹… log(n/Ļµ))

Ļµ Formula[s] āˆ˜ SYM

Page 28: Algorithms and lower bounds for de-Morgan formulas of low

Our resultsSAT Algorithm

ā€¢ Given circuit class

ā€¢ Circuit SAT : Given , is there an ,

ā€¢ #Circuit SAT : Given , how many ,

š’ž

C āˆˆ š’ž x C(x) = 1

C āˆˆ š’ž x C(x) = 1

Page 29: Algorithms and lower bounds for de-Morgan formulas of low

Our resultsSAT Algorithm

ā€¢ Randomized #SAT algorithm for

ā€¢ Running time

ā€¢

ā€¢ First of its kind #SAT for unbounded depth Boolean circuits with PTFā€™s at the bottom

Formula[s] āˆ˜ š’¢

2nāˆ’t

t = Ī©n

s ā‹… log2 s ā‹… R21/3(š’¢)

1/2

for LTFslog n

Page 30: Algorithms and lower bounds for de-Morgan formulas of low

Our resultsLearning algorithm

ā€¢ There is PAC-learning algorithm

ā€¢ Learns

ā€¢ Accuracy : , Confidence :

ā€¢ Time complexity :

ā€¢ can be learned in [Rei11]

ā€¢ Crypto connection:

ā€¢ is assumed to compute PRFs (BIP+18)

ā€¢ If true, canā€™t be learned in time

Formula[n2āˆ’Ī³] āˆ˜ XOR

Ļµ Ī“

poly(2n/log n,1/Ļµ, log(1/Ī“))

Formula[n2āˆ’Ī³] 2o(n)

MOD3 āˆ˜ XOR

Formula[n2.8] āˆ˜ XOR 2o(n)

Page 31: Algorithms and lower bounds for de-Morgan formulas of low

Lower bound techniqueOutline

ā€¢ cannot even be weakly approximated by low communication complexity functions

ā€¢ Weakness of : Size formula can be ā€œapproximatedā€ by degree polynomial

ā€¢ is weakly approximated by a collection of leaf gates

GIPkn

Formula[s] āˆ˜ š’¢ ss

GIPkn

Page 32: Algorithms and lower bounds for de-Morgan formulas of low

Lower bound techniquePart I

ā€¢ cannot even be weakly approximated by low communication complexity functions

ā€¢ In the number on forehead model

ā€¢ Protocol computes with error (uniform distribution)

ā€¢ Then commn.comp >

GIPkn

GIPkn Ļµ

n/4k āˆ’ log(1/(1 āˆ’ 2Ļµ))

Page 33: Algorithms and lower bounds for de-Morgan formulas of low

Lower bound techniquePart II

ā€¢ Weakness of : Size formula can be ā€œapproximatedā€ by degree polynomial

ā€¢ Reichardtā€™11 : Approximation of Boolean formulas by Polynomials

ā€¢ be a formula of size

ā€¢ There is a real polynomial of degree

ā€¢ For every

ā€¢ Fact : For any ,

ā€¢ Corollary : For any formula of size ,

Formula[s] āˆ˜ š’¢ s s

F(y1, ā€¦, ym) s

p(y1, ā€¦, ym) O( s)

y āˆˆ {0,1}m, |F(a) āˆ’ p(a) | ā‰¤ 1/10

0 < Ļµ < 1 degĻµ( f ) ā‰¤ deg( f ) ā‹… log(1/Ļµ)

F s degĻµ(F) ā‰¤ s ā‹… log(1/Ļµ)

Page 34: Algorithms and lower bounds for de-Morgan formulas of low

Lower bound - proof sketch

g1 g2 g3 gs

F

size(F) = sāˆ d ā‰¤ s

pS gi1

gid

ā‰¤ s sāˆ‘

p(x)

ā€¢ correlates well ( ) with

ā€¢ correlates well ( ) with a monomial ( )

F Ļµ p

F1

s spS āˆ

jāˆˆ[S],|S|ā‰¤ s

gij

ā€¢ Since each has low communication complexity, so does

ā€¢ correlated well with the target function , thus it correlates well with the monomial ( a low communication function) !!!!!!!

gi

āˆjāˆˆ[S],|S|ā‰¤ s

gij

F f

Reichardt ā€˜2011

āˆ€x āˆˆ {0,1}n, |F(x) āˆ’ p(x) | ā‰¤ Ļµdeg(p) ā‰¤ s

Page 35: Algorithms and lower bounds for de-Morgan formulas of low

Limitations of our approach

ā€¢ To get better lower bounds, find a smaller degree approximating polynomial

ā€¢ Approximate degree bound of Reichardt ( ) cannot be improved

ā€¢ function can be computed by a size de-Morgan formula

ā€¢ Approximate degree of is

s

ANDn n

ANDn Īø( n)

Page 36: Algorithms and lower bounds for de-Morgan formulas of low

Future directions

ā€¢ Extend lower bounds to when

ā€¢ Design a PRG of seed length and error for intersection of half spaces

ā€¢ Learn in time

Formula[s] āˆ˜ š’¢ s = Ļ‰(n2)

no(1) Ļµ ā‰¤ 1/n n

Formula[s] āˆ˜ XOR 2O( s)

Page 37: Algorithms and lower bounds for de-Morgan formulas of low

Questions?

Thank you