This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

\lmcsdoi

1639 \lmcsheadingLABEL:LastPageApr. 07, 2020Aug. 12, 2020

A limitation on the KPT interpolation

Jan Krajíček MFF, Charles University, Sokolovská 83, Prague, 186 75, The Czech Republic [email protected]
Abstract.

We prove a limitation on a variant of the KPT theorem proposed for propositional proof systems by Pich and Santhanam [7], for all proof systems that prove the disjointness of two NP sets that are hard to distinguish.

Key words and phrases:
Propositional proof complexity, interpolation, KPT theorem.

For a coNP property ψ(x)\psi(x), given n1n\geq 1, we can construct a size nO(1)n^{O(1)} propositional formula ψn(x,y){|\mkern-2.5mu|}\psi{|\mkern-2.5mu|}^{n}(x,y) with nn atoms x=(x1,,xn)x=(x_{1},\dots,x_{n}) and nO(1)n^{O(1)} atoms yy such that for any a{0,1}na\in{\{0,1\}^{n}}, ψ(a)\psi(a) is true iff ψn(a,y)TAUT{|\mkern-2.5mu|}\psi{|\mkern-2.5mu|}^{n}(a,y)\in\mbox{TAUT}. This is just a restatement of the NP-completeness of SAT. In addition, if ψ(x)\psi(x) is defined in a suitable language of arithmetic and has a suitable logical form, the translation can be defined purely syntactically without a reference to machines or computations. This then allows to transform also a possible first-order proof of xψ(x)\forall x\psi(x) into a sequence of short propositional proofs of tautologies ψn{|\mkern-2.5mu|}\psi{|\mkern-2.5mu|}^{n}, n=1,2,n=1,2,\dots; if the original proof uses axioms of theory TT (essentially any sound r.e. theory) then the propositional proofs will be in a proof system PTP_{T} associated to TT. Many standard proof systems are of the form PTP_{T} for some TT, and this is often the most efficient way how to construct short PTP_{T}-proofs of uniform sequences of tautologies. Although the unprovability of xψ(x)\forall x\psi(x) in TT does not imply lower bounds for PTP_{T}-proofs of the tautologies, a method used in establishing the unprovability sometimes yields an insight how the lower bound could be proved. All this is a well-established part of proof complexity and the reader can find it in [4, Chpt.12] (or in references given there).

The translation is, however, not entirely faithful for formulas of a certain logical form, and this is an obstacle for transforming the conditional unprovability result for strong universal theories in [3] into conditional lower bounds for strong proof systems. To explain the problem in some detail assume ψ(x)\psi(x) has the form

i<|x|y(|y|=|x|)φ(x,i,y)\exists i<|x|\forall y(|y|=|x|)\ \varphi(x,i,y) (1)

where φ\varphi is a p-time property and |x||x| is the bit length of xx. The provability of xψ(x)\forall x\psi(x) in a universal TT can be analyzed using the KPT theorem which provides an efficient interactive algorithm for finding ii given xx (cf. [6] or [4, Sec.12.2]). The same method does not, however, work in the propositional setting. To illustrate this assume that ψn{|\mkern-2.5mu|}\psi{|\mkern-2.5mu|}^{n} has a proof in proof system PTP_{T} attached to TT and from that we can deduce in TT that

i<nψn(x,i,yi)\bigvee_{i<n}\ {|\mkern-2.5mu|}\psi{|\mkern-2.5mu|}^{n}(x,i,y_{i}) (2)

is a tautology (in addition the translation assures that all yiy_{i} are disjoint tuples of atoms). This implies in TT that for all assignments aa and b=(b0,,bn1)b=(b_{0},\dots,b_{n-1}) for all xx and all yy variables there is i<ni<n such that ψn(a,b){|\mkern-2.5mu|}\psi{|\mkern-2.5mu|}^{n}(a,b) is true. But to get (1) (and then use the KPT analysis from [3]) we would need to show that for all aa there is one i<ni<n such that for all bib_{i} the formula is true. Unfortunately, to derive this one needs to use the bounded collection scheme (allowing to move the quantifier bounding ii before the quantifier bounding bib_{i}) and this scheme is not available in universal theories under consideration, cf. [1]. The reader can find more about this issue in [3, Sec.5] or at the end of [4, Sec.12.8]; knowing this background offers my motivation for this research (which differs perhaps from that of [7]) but it is not needed to understand the argument below.

Pich and Santhanam [7] proposed a direct way how to bypass this obstacle: simply ignore it and prove a version of the KPT theorem for (some, at least) strong propositional proof systems. For such proof systems a conditional lower bound can be indeed proved, cf. [7] or [3].

{defiC}

[[7]] Let P be a propositional proof system. The system has KPT interpolation if there are a constant k1k\geq 1 and kk p-time functions

f1(x,z),f2(x,z,w1),,fk(x,z,w1,,wk1)f_{1}(x,z),f_{2}(x,z,w_{1}),\dots,f_{k}(x,z,w_{1},\dots,w_{k-1})

such that whenever π\pi is a P-proof of a disjunction of the form

A0(x,y1)Am1(x,ym)A_{0}(x,y_{1})\vee\dots\vee A_{m-1}(x,y_{m})

where xx is a nn-tuple of atoms and y1,,ymy_{1},\dots,y_{m} are disjoint tuples of atoms, then for all a{0,1}na\in{\{0,1\}^{n}} the following is valid for all b1,,bmb_{1},\dots,b_{m} of the appropriate lengths:

  • either Ai1(a,yi1)TAUTA_{i_{1}}(a,y_{i_{1}})\in\mbox{TAUT} for i1=f1(a,π)i_{1}=f_{1}(a,\pi) or, if Ai1(a,bi1)A_{i_{1}}(a,b_{i_{1}}) is false,

  • Ai2(a,yi2)TAUTA_{i_{2}}(a,y_{i_{2}})\in\mbox{TAUT} for i2=f2(a,π,bi1)i_{2}=f_{2}(a,\pi,b_{i_{1}}) or, if Ai2(a,bi2)A_{i_{2}}(a,b_{i_{2}}) is false,

  • \dots, or

  • Aik(a,yik)TAUTA_{i_{k}}(a,y_{i_{k}})\in\mbox{TAUT} for ik=fk(a,π,bi1,,bik1)i_{k}=f_{k}(a,\pi,b_{i_{1}},\dots,b_{i_{k-1}}).

An illuminating interpretation of the definition can be made using the interactive communication model of [5] involving Student and Teacher. Student is a p-time machine while Teacher has unlimited powers. At the beginning Student gets a{0,1}na\in{\{0,1\}^{n}} and the proof π\pi and computes from it his first candidate solution: index i1i_{1} such that Ai1(a,yi1)A_{i_{1}}(a,y_{i_{1}}) is — he thinks — a tautology. Teacher either approves or she provides Student with a counter-example: an assignment bi1b_{i_{1}} for yi1y_{i_{1}} which falsifies the formula. In the next round Student can use this counter-example to propose his next candidate solution, etc. Functions f1,fkf_{1},\dots f_{k} in the definition form a strategy for Student so that he solves the task for all aa and π\pi in kk steps in the worst case. Note that if we fixed m=2m=2 as in ordinary interpolation then k=2k=2 would suffice; the concept makes sense for variable mm only.


Unfortunately, we show in this note that this property fails for strong proof systems (above a low depth Frege system) for essentially the same reasons why ordinary feasible interpolation fails for them (cf. [4, Sec.18.7]). For a set U{0,1}U\subseteq{{\{0,1\}}^{*}} and n1n\geq 1 put Un:=U{0,1}nU_{n}:=U\cap{\{0,1\}}^{n}. LK3/2\mbox{LK}_{3/2} is the Σ\Sigma-depth 11 subsystem of sequent calculus (cf. [4, Sec.3.4]).

Theorem 1.

Let P be a proof system containing LK3/2\mbox{LK}_{3/2}. Assume that U,VU,V are disjoint NP sets such that:

  1. (1)

    Propositional formulas expressing that UnVn=U_{n}\cap V_{n}=\emptyset have p-size P-proofs.

  2. (2)

    For any constant c1c\geq 1, for all large enough nn there is a distribution 𝐃n{\bf D}_{n} on {0,1}n{\{0,1\}^{n}} with support UnVnU_{n}\cup V_{n} such that there is no size ncn^{c} circuit CnC_{n} for which

    Probx[(xUnCn(x)=1)(xVnCn(x)=0)]1/2+nc{\mbox{Prob}}_{x}[(x\in U_{n}\wedge C_{n}(x)=1)\vee(x\in V_{n}\wedge C_{n}(x)=0)]\geq 1/2+n^{-c}

    where samples xx in the probability are chosen according to 𝐃n{\bf D}_{n}.

Then P does not admit KPT interpolation.

Remarks.
  1. (1)

    An example of a pair of two NP sets U,VU,V that are conjectured to satisfy the second condition can be defined using one-way permutation (more generally an injective one-way function with output length determined by input length) and its hard bit: UU (resp. VV) are the strings in the range of the permutation whose hard bit is 11 (resp. 0). Distribution 𝐃n{\bf D}_{n} is in this case generated by the permutation from the uniform distribution on the seed strings, i.e. it is uniform itself.

  2. (2)

    It is known that the hypothesis of the theorem can be fulfilled for systems such as EF, F, TC0\mbox{TC}^{0}-F and, under stronger hypotheses about non-separability of UU and VV, also for AC0\mbox{AC}^{0}-F above certain small depth; see the comprehensive discussion in [4, Sec.18.7].

  3. (3)

    The phrase that P contains LK3/2\mbox{LK}_{3/2} means for simplicity just that: P can operate with sequents consisting of Σ\Sigma-depth 11 formulas and all LK3/2\mbox{LK}_{3/2}-proofs are also P-proofs. However, this is used only in Claim 1 and, in fact, it would suffice that P represents formulas U(x,y)U(x,y) and V(x,z)V(x,z) (defined below) in some other formalism and efficiently simulates modus ponens.


Proof of the theorem occupies the rest of this note.

Write U(x,y)U(x,y) for a p-time relation that yy witnesses xUx\in U and similarly V(x,z)V(x,z) for VV, with the length of both yy and zz p-bounded in the length of xx. Let n,m1n,m\geq 1 and for mm strings x1,xmx_{1},\dots x_{m} of length nn each consider the following 2m2m propositional formulas translating the predicates U(x,y)U(x,y) and V(x,z)V(x,z) (which we shall denote also UU and VV in order to ease on notation):

  • U(xi,yi)U(x_{i},y_{i}): xix_{i} is an nn-tuple of atoms for bits of xix_{i} and yiy_{i} is an nO(1)n^{O(1)}-tuple of atoms for bits of a witness associated with xix_{i} together with bits needed to encode UU as propositional formula suitable for P (e.g. as 3CNF),

  • V(xi,zi)V(x_{i},z_{i}): analogously for VV,

  • where all xi,yi,zix_{i},y_{i},z_{i} are disjoint.

Consider the induction statement:

x1U(i<m,xiUxi+1U)xmUx_{1}\in U\wedge(\forall i<m,\ x_{i}\in U\rightarrow x_{i+1}\in U)\rightarrow x_{m}\in U (3)

and write it as a disjunction with m+1m+1 disjuncts:

x1Ui(xiUxi+1U)xmU.x_{1}\notin U\vee\bigvee_{i}(x_{i}\in U\wedge x_{i+1}\notin U)\vee x_{m}\in U\ . (4)

Now replace xiUx_{i}\in U by xiVx_{i}\notin V and xmUx_{m}\in U by xmVx_{m}\notin V and write it propositionally:

¬U(x1,y1)i[¬V(xi,zi)¬U(xi+1,yi+1)]¬V(xm,zm).\neg U(x_{1},y_{1})\vee\bigvee_{i}[\neg V(x_{i},z_{i})\wedge\neg U(x_{i+1},y_{i+1})]\vee\neg V(x_{m},z_{m}). (5)

Note that except the xx-variables the m+1m+1 disjuncts are disjoint.

Claim 1.

(5) has a p-size proof in P.

To see this note that induction (3) can be proved by simulating modus ponens (here we use that P contains LK3/2\mbox{LK}_{3/2}). Disjunction (5) follows from it because we assume that the disjointness of Un,VnU_{n},V_{n} has short P-proofs, i.e. U(x,y)¬V(x,z)U(x,y)\rightarrow\neg V(x,z) has a short proof.


Now apply the supposed KPT interpolation to (5). W.l.o.g. we shall assume (and arrange that in the construction below) that x1Ux_{1}\in U and xmVx_{m}\in V (with witnesses y1y_{1} and zmz_{m}, respectively). Hence Student in the KPT computation is supposed to find i<mi<m for which the ii-th disjunct

Ai:=[¬V(xi,zi)¬U(xi+1,yi+1)],i=1,,m1A_{i}\ :=\ [\neg V(x_{i},z_{i})\wedge\neg U(x_{i+1},y_{i+1})]\ ,\ i=1,\dots,m-1

is valid (i.e. where the induction step going from ii to i+1i+1 fails). We shall show that the existence of such a KPT p-time Student allows to separate UnU_{n} from VnV_{n} with a non-negligible advantage violating the hypotheses of the theorem.

Take any mm such that 32k1mnO(1)3\cdot 2^{k-1}\leq m\leq n^{O(1)} (the upper bound implies that the proof in Claim 1 is of size nO(1)n^{O(1)}). For 1i<m1\leq i<m define:

Wi[m]:=Ui×Vmi and W[m]:=iWi[m].W_{i}[m]:=U^{i}\times V^{m-i}\ \mbox{ and }\ W[m]:=\bigcup_{i}W_{i}[m]\ .

Note that any string w=(w1,,wm)W[m]w=(w_{1},\dots,w_{m})\in W[m] satisfies w1Uw_{1}\in U and wmVw_{m}\in V.

Let k1k\geq 1 and f1,,fkf_{1},\dots,f_{k} be the constant and the p-time functions provided the assumed KPT interpolation for P. Assume that 1i1<m1\leq i_{1}<m is the most frequent value f1f_{1} computes on inputs from W[m]W[m] (thinking of a P-proof π\pi as fixed). This maximal frequency γ\gamma is at least 1/m1/m. (Here the frequency means with respect to the product of distributions 𝐃n{\bf D}_{n} on {0,1}n{\{0,1\}}^{n} for which it is assumed that Un,VnU_{n},V_{n} are hard to separate.)

Claim 2.

The frequency on Wi1[m]W_{i_{1}}[m] is at least γnω(1)\gamma-n^{\omega(1)}, i.e. it is at least 1/m1/m modulo a negligible error.

Note that for any i<ji<j the frequency for Wi[m],Wj[m]W_{i}[m],W_{j}[m] can differ only negligibly because otherwise we could use the usual triangle inequality argument to find a non-negligible discrepancy between frequencies on Wt[m]W_{t}[m] and Wt+1[m]W_{t+1}[m] for some it<ji\leq t<j, and use it to separate UnU_{n} from VnV_{n} (on position t+1t+1, after fixing the rest of coordinates by averaging). Because all Wi[m]W_{i}[m] are disjoint, the frequency must be γ\gamma up to a negligible difference.


Now we describe a process that transforms the assumed successful strategy​ for​ Student into a p-time algorithm​ with​ p-size advice, separating Un,VnU_{n},V_{n} with a non-negligible advantage.

Assume first i1<m/2i_{1}<m/2. By averaging there are u1,um/2Unu_{1},\dots u_{m/2}\in U_{n} s.t. f1(w)=i1f_{1}(w)=i_{1} with frequency at least 1/(2m)1/(2m) (the factor 22 in the denominator allows us to forget about the “up to the negligible error” phrase) for all ww of the form:

{u1}××{um/2}×W[m/2].\{u_{1}\}\times\cdots\times\{u_{m/2}\}\times W[m/2]\ .

Fix such u1,,um/2u_{1},\dots,u_{m/2} and also witnesses a1,,am/2a_{1},\dots,a_{m/2} for their membership in UU. These will be used as advice for the eventual algorithm.

If i1m/2i_{1}\geq m/2 then fill analogously the last m/2m/2 positions by elements of VnV_{n} and include the relevant witnesses in the advice. W.l.o.g. we assume that the first case i1<m/2i_{1}<m/2 occurred.

We interpret this situation as reducing the Student-Teacher computation to k1k-1 rounds on smaller universe W[m/2]W[m/2]. Namely, given w=(w1,,wm/2)W[m/2]w=(w_{1},\dots,w_{m/2})\in W[m/2] define:

w~:=(u1,,um/2,w1,,wm/2)W[m]\tilde{w}\ :=\ (u_{1},\dots,u_{m/2},w_{1},\dots,w_{m/2})\ \in\ W[m] (6)

and run f1f_{1} on w~\tilde{w}. If f1(w~)i1f_{1}(\tilde{w})\neq i_{1}, declare failure. Otherwise use the advice witnesses to produce a falsifying assignment for Ai1A_{i_{1}}: U(ui1+1,ai1+1)U(u_{i_{1}+1},a_{i_{1}+1}) holds.

After this first step use functions f2,f3,f_{2},f_{3},\dots (and Claim 2 for the smaller universes) and as long as they give values j<m/2j<m/2 always answer for Teacher using the advice strings aja_{j}. Eventually Student proposes value jm/2j\geq m/2: choose the most frequent such value i2m/2i_{2}\geq m/2 and proceed as in case of i1i_{1}, further restricting domain (6) as in binary search. Repeating this at most (k1)(k-1)-times the situation will be as follows:

  1. (1)

    The universe will shrink at most to W[m/(2k1)]W[m/(2^{k-1})] which is at least W[3]W[3]. In fact, we shall arrange in the last step that exactly W[3]W[3] remains (by filling in more positions by elements of UnU_{n} or VnV_{n}, respectively, if needed) and hence the inputs before applying the last KPT function fkf_{k} are of the form (w1,w2,w3)(w_{1},w_{2},w_{3}) with w1Uw_{1}\in U and w3Vw_{3}\in V.

    Note that Student gets to use fkf_{k} because if he succeeded earlier it would violate Claim 2.

  2. (2)

    The last function fkf_{k} has to find a gap in the induction, and this itself will violate Claim 2. In particular, the gap is either between w1w_{1} and w2w_{2} and then w2Vw_{2}\in V, or between w2w_{2} and w3w_{3} and then w2Uw_{2}\in U.

  3. (3)

    This process has the probability 1/(2m)\geq 1/(2m), i.e. non-negligible, of not failing in any of the k1k-1 rounds and hence it will not fail and will compute correctly the membership of (any) w2w_{2} in UU or VV with a non-negligible probability. In all cases when the process fails output random bit 0 or 11 with equal probability.

This proves the theorem. ∎


We conclude by pointing out that the KPT theorem enters propositional proof complexity also via notions of pseudo-surjective and iterable maps in the theory of proof complexity generators, cf. [2] or [4, Sec.19.4] for detailed expositions of this subject.

Acknowledgment

I thank J. Pich (Oxford) for comments on an earlier note.

References

  • [1] S. A. Cook and N. Thapen. The strength of replacement in weak arithmetic. ACM Transactions on Computational Logic, 7:4, (2006).
  • [2] J. Krajíček. Dual weak pigeonhole principle, pseudo-surjective functions, and provability of circuit lower bounds. J. of Symbolic Logic, 69(1), (2004), pp.265-286.
  • [3] J. Krajíček. On the proof complexity of the Nisan-Wigderson generator based on a hard NPcoNP{{\mbox{{NP}}\cap{\mbox{coNP}}}} function. J. of Mathematical Logic, 11(1), (2011), pp.11-27.
  • [4] J. Krajíček. Proof complexity. Encyclopedia of Mathematics and Its Applications, Vol. 170, Cambridge University Press, 2019.
  • [5] J. Krajíček, P. Pudlák, and J. Sgall. Interactive Computations of Optimal Solutions. in: B. Rovan (ed.): Mathematical Foundations of Computer Science (B. Bystrica, August ’90), Lecture Notes in Computer Science 452, Springer-Verlag, (1990), pp. 48-60.
  • [6] J. Krajíček, P. Pudlák and G. Takeuti. Bounded arithmetic and the polynomial hierarchy. Annals of Pure and Applied Logic, 52, (1991), pp.143–153.
  • [7] J. Pich and R. Santhanam. Strong Co-Nondeterministic Lower Bounds for NP Cannot be Proved Feasibly. preprint, (2020).