This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Hardness of Sparse Sets and Minimal Circuit Size Problem

Bin Fu
Department of Computer Science,
University of Texas Rio Grande Valley, Edinburg, TX 78539, USA.
[email protected]
Abstract

We study the magnification of hardness of sparse sets in nondeterministic time complexity classes on a randomized streaming model. One of our results shows that if there exists a 2no(1)2^{n^{o(1)}}-sparse set in NTIME(2no(1)){\rm NTIME}(2^{n^{o(1)}}) that does not have any randomized streaming algorithm with no(1)n^{o(1)} updating time, and no(1)n^{o(1)} space, then NEXPBPP{\rm NEXP}\not={\rm BPP}, where a f(n)f(n)-sparse set is a language that has at most f(n)f(n) strings of length nn. We also show that if MCSP{\rm MCSP} is ZPP{\rm ZPP}-hard under polynomial time truth-table reductions, then EXPZPP{\rm EXP}\not={\rm ZPP}.

1 Introduction

Hardness magnification has been intensively studied in the recent years [13, 4, 10, 12]. A small lower bound such as Ω(n1+ϵ)\Omega(n^{1+\epsilon}) for one problem may bring a large lower bound such as super-polynomial lower bound for another problem. This research is closely related to Minimum Circuit Size Problem (MCSP) that is to determine if a given string of length n=2mn=2^{m} with integer mm can be generated by a circuit of size kk. For a function s(n):s(n):\mathbb{N}\rightarrow\mathbb{N}, MCSP[s(n)]{\rm MCSP}[s(n)] is that given a string xx of length n=2mn=2^{m}, determine if there is a circuit of size at most s(n)s(n) to generate xx. This problem has received much attention in the recent years [3, 2, 13, 8, 7, 6, 5, 4, 12, 11, 10].

Hardness magnification results are shown in a series of recent papers about MCSP [13, 4, 10, 12]. Oliveira and Santhanam [13] show that n1+ϵn^{1+\epsilon}-size lower bounds for approximating MKtP[nβ]{\rm MKtP}[n^{\beta}] with an additive error O(logn)O(\log n) implies EXPP/poly{\rm EXP}\not\subseteq{\rm P}/{\rm poly}. Oliveira, Pich and Santhanam [12] show that for all small β>0\beta>0, n1+ϵn^{1+\epsilon}-size lower bounds for approximating MCSP[nβm]{\rm MCSP}[n^{\beta m}] with factor O(m)O(m) error implies NPP/poly{\rm NP}\not\subseteq{\rm P}/{\rm poly}. McKay, Murray, and Williams [10] show that an Ω(npoly(logn))\Omega(n{\rm poly}(\log n)) lower bound on poly(logn){\rm poly}(\log n) space deterministic streaming model for MCSP[poly(logn)]{\rm MCSP}[{\rm poly}(\log n)] implies separation of P from NP.

The hardness magnification of non-uniform complexity for sparse sets is recently developed by Chen, Jin and Williams [4]. Since MCSP[s(n)]{\rm MCSP}[s(n)] are of sub-exponential density for s(n)=no(1)s(n)=n^{o(1)}, the hardness magnification for sub-exponential density sets is more general than the hardness magnification for MCSP{\rm MCSP}. They show that if there is an ϵ>0\epsilon>0 and a family of languages {Lb}\{L_{b}\} (indexed over b(0,1)b\in(0,1)) such that each LbL_{b} is a 2nb2^{n^{b}}-sparse language in NP{\rm NP}, and LbCircuit[n1+ϵ]L_{b}\not\in{\rm Circuit}[n^{1+\epsilon}], then NPCircuit[nk]{\rm NP}\not\subseteq{\rm Circuit}[n^{k}] for all kk, where Circuit[f(n)]{\rm Circuit}[f(n)] is the class of languages with nonuniform circuits of size bounded by function f(n)f(n). Their result also holds for all complexity classes CC with C=C\exists C=C.

On the other hand, it is unknown if MCSP is NP-hard. Murray and Williams  [11] show that NP-completeness of MCSP implies the separation of EXP  from ZPP, a long standing unsolved problem in computational complexity theory. Hitchcock and Pavan [8, 11] if MCSP is NP{\rm NP}-hard under polynomial time truth-table reductions, then EXPNPP/poly\not\subseteq{\rm NP}\cap{\rm P}/{\rm poly}.

Separating NEXP from BPP, and EXP from ZPP  are two of major open problems in the computational complexity theory. We are motivated by further relationship about sparse sets and MCSP, and the two separations NEXPBPP{\rm NEXP}\not={\rm BPP} and EXPZPP{\rm EXP}\not={\rm ZPP}. We develop a polynomial method on finite fields to magnify the hardness of sparse sets in nondeterministic time complexity classes over a randomized streaming model. One of our results show that if there exists a 2no(1)2^{n^{o(1)}}-sparse set in NTIME(2no(1)){\rm NTIME}(2^{n^{o(1)}}) that does not have a randomized streaming algorithm with no(1)n^{o(1)} updating time, and no(1)n^{o(1)} space, then NEXPBPP{\rm NEXP}\not={\rm BPP}, where a f(n)f(n)-sparse set is a language that has at most f(n)f(n) strings of length nn. Our magnification result has a flexible trade off between the spareness and time complexity.

We use two functions d(n)d(n) and g(n)g(n) to control the sparseness of a tally set TT. Function d(n)d(n) gives an upper bound for the number of elements of in TT and g(n)g(n) is the gap lower bound between a string 1n1^{n} and the next string 1m1^{m} in TT, which satisfy g(n)<mg(n)<m. The class TALLY(d(n),g(n)){\rm TALLY}(d(n),g(n)) defines the class of all those tally sets. By choosing d(n)=loglognd(n)=\log\log n, and g(n)=222ng(n)=2^{2^{2n}}, we prove that if MCSP is ZPPTALLY(d(n),g(n)){\rm ZPP}\cap{\rm TALLY}(d(n),g(n))-hard under polynomial time truth-table reductions, then EXPZPP{\rm EXP}\not={\rm ZPP}.

1.1 Comparison with the existing results

Comparing with some existing results about sparse sets hardness magnification in this line [4], there are some new advancements in this paper.

  1. 1.

    Our magnification of sparse set is based on a uniform streaming model. A class of results in [4] are based on nonuniform models. In [10], they show that if there is APHA\in{\rm PH}, and a function s(n)logns(n)\geq\log n, search-MCSPA[s(n)]{\rm MCSP}^{A}[s(n)] does not have s(n)cs(n)^{c} updating time in deterministic streaming model for all positive, then PNP{\rm P}\not={\rm NP}. MCSP[s(n)]{\rm MCSP}[s(n)] is a s(n)O(s(n))s(n)^{{\rm O}(s(n))}-sparse set.

  2. 2.

    Our method is conceptually simple, and easy to understand. It is a polynomial algebraic approach on finite fields.

  3. 3.

    A flexible trade off between sparseness and time complexity is given in our paper.

Proving NP-hardness for MCSP implies EXPZPP{\rm EXP}\not={\rm ZPP} [8, 11]. We consider the implication of ZPP-hardness for MCSP{\rm MCSP}, and show that if MCSP is ZPPTALLY(d(n),g(n)){\rm ZPP}\cap{\rm TALLY}(d(n),g(n))-hard for a function pair such as d(n)=loglognd(n)=\log\log n and g(n)=222ng(n)=2^{2^{2n}}, then EXPZPP{\rm EXP}\not={\rm ZPP}. It seems that proving MCSP is ZPP{\rm ZPP}-hard is much easier than proving MCSP is NP-hard since ZPP(NPco-NP)NP{\rm ZPP}\subseteq({\rm NP}\cap{{\rm co}{\rm\mbox{-}}{\rm NP}})\subseteq{\rm NP}. According to the low-high hierarchy theory developed by Schöning [14], the class NPco-NP{\rm NP}\cap{{\rm co}{\rm\mbox{-}}{\rm NP}} is the low class L1L_{1}. Although MCSP{\rm MCSP} may not be in the class ZPP{\rm ZPP}, it is possible to be ZPP{\rm ZPP}-hard.

2 Notations

Minimum Circuit Size Problem (MCSP) is that given an integer kk, and a binary string TT of length n=2mn=2^{m} for some integer m0m\geq 0, determine if TT can be generated by a circuit of size kk. Let ={1,2,}\mathbb{N}=\{1,2,\cdots\} be the set of all natural numbers. For a language LL, LnL^{n} is the set of strings in LL of length nn, and LnL^{\leq n} is the set of strings in LL of length at most nn. For a finite set AA, denote |A||A| to be the number of elements in AA. For a string ss, denote |s||s| to be its length. If x,y,zx,y,z are not empty strings, we have a coding method that converts a x,yx,y into a string x,y\langle x,y\rangle with |x|+|y||x,y|3(|x|+|y|)|x|+|y|\leq|\langle x,y\rangle|\leq 3(|x|+|y|) and converts x,y,zx,y,z into x,y,z\langle x,y,z\rangle with |x|+|y|+|z||x,y,z|3(|x|+|y|+|z|)|x|+|y|+|z|\leq|\langle x,y,z\rangle|\leq 3(|x|+|y|+|z|). For example, for x=x1xn1,y=y1yn2,z=z1zn3x=x_{1}\cdots x_{n_{1}},y=y_{1}\cdots y_{n_{2}},z=z_{1}\cdots z_{n_{3}}, let x,y,z=1x11xn1001y11yn2001z11zn3\langle x,y,z\rangle=1x_{1}\cdots 1x_{n_{1}}001y_{1}\cdots 1y_{n_{2}}001z_{1}\cdots 1z_{n_{3}}.

Let DTIME(t(n)){\rm DTIME}(t(n)) be the class of languages accepted by deterministic Turing machines in time O(t(n)){\rm O}(t(n)). Let NTIME(t(n)){\rm NTIME}(t(n)) be the class of languages accepted by nondeterministic Turing machines in time O(t(n)){\rm O}(t(n)). Define EXP=c=1DTIME(2nc){\rm EXP}=\cup_{c=1}^{\infty}{\rm DTIME}(2^{n^{c}}) and NEXP=c=1NTIME(2nc){\rm NEXP}=\cup_{c=1}^{\infty}{\rm NTIME}(2^{n^{c}}). P/poly, which is also called PSIZE, is the class of languages that have polynomial-size circuits.

We use a polynomial method on a finite field FF. It is classical theory that each finite field is of size pkp^{k} for some prime number pp and integer k1k\geq 1 (see [9]). For a finite field FF, we denote R(F)=(p,tF(u))R(F)=(p,t_{F}(u)) to represent FF, where tF(u)t_{F}(u) is a irreducible polynomial over field GF(p){\rm GF}(p) for the prime number pp and its degree is deg(tF(.))=k\deg(t_{F}(.))=k. The polynomial tF(u)t_{F}(u) is equal to uu if FF is of size pp, which is a prime number. Each element of FF with R(F)=(p,tF(u))R(F)=(p,t_{F}(u)) is a polynomial q(u)q(u) with degree less than the degree of tF(u)t_{F}(u). For two elements q1(u)q_{1}(u) and q2(u)q_{2}(u) in FF, their addition is defined by (q1(u)+q2(u))(modtF(u))(q_{1}(u)+q_{2}(u))({\rm mod}\ t_{F}(u)), and their multiplication is defined by (q1(u)q2(u))(modtF(u))(q_{1}(u)\cdot q_{2}(u))({\rm mod}\ t_{F}(u)) (see [9]). Each element in GF(2k){\rm GF}(2^{k}) is a polynomial i=0k1biui\sum_{i=0}^{k-1}b_{i}u^{i} (bi{0,1}b_{i}\in\{0,1\}), which is represented by a binary string bk1b0b_{k-1}\cdots b_{0} of length kk.

We use GF(2k){\rm GF}(2^{k}) field in our randomized streaming algorithm for hardness magnification . Let FF be a GF(2k){\rm GF}(2^{k}) field (a field of size q=2kq=2^{k}) and has its R(F)=(2,tF(u))R(F)=(2,t_{F}(u)). Let s=a0am1s=a_{0}\cdots a_{m-1} be a binary string of length mm with mkm\leq k, and uu be a variable. Define w(s,u)w(s,u) to be the element i=0m1aiui\sum_{i=0}^{m-1}a_{i}u^{i} in GF(2k){\rm GF}(2^{k}). Let xx be a string in {0,1}\{0,1\}^{*} and kk be an integer at least 11. Let x=sr1st2s1s0x=s_{r-1}s_{t-2}\cdots s_{1}s_{0} such that each sis_{i} is a substring of xx of length kk for i=1,2,,r1i=1,2,\cdots,r-1, and the substring s0s_{0} has its length |s0|k|s_{0}|\leq k. Each sis_{i} is called a kk-segment of xx for i=0,1,,r1i=0,1,\cdots,r-1. Define the polynomial dx(z)=zr+i=0r1w(si,u)zid_{x}(z)=z^{r}+\sum_{i=0}^{r-1}w(s_{i},u)z^{i}, which converts a binary string into a polynomial in GF(2k){\rm GF}(2^{k}).

We develop a streaming algorithm that converts an input string into an element in a finite field. We give the definition to characterize the properties of the streaming algorithm developed in this paper. Our streaming algorithm is to convert an input stream xx into an element dx(a)F=GF(2k)d_{x}(a)\in F={\rm GF}(2^{k}) by selecting a random element aa from FF.

Definition 1

Let r0(n),r1(n),r2(n),s(n),u(n)r_{0}(n),r_{1}(n),r_{2}(n),s(n),u(n) be nondecreasing functions from \mathbb{N} to \mathbb{N}. Define Streaming(r0(n),r1(n),s(n),u(n),r2(n)){\rm Streaming}(r_{0}(n),r_{1}(n),s(n),u(n),r_{2}(n)) to be the class of languages LL that have one-pass streaming algorithms that has input (n,x)(n,x) with n=|x|n=|x| (xx is a string and read by streaming), it satisfies

  1. i.

    It takes r0(n)r_{0}(n) time to generate a field F=GF(2k)F={\rm GF}(2^{k}), which is represented by (2,tF(.))(2,t_{F}(.)) with a irreducible polynomial tf(.)t_{f}(.) over GF(2){\rm GF}(2) of degree kk.

  2. ii.

    It takes O(r1(n))O(r_{1}(n)) random steps before reading the first bit from the input stream xx.

  3. iii.

    It uses O(s(n))O(s(n)) space that includes the space to hold the field representation generated by the algorithm. The space for a field representation is Ω((deg(tF(.))+1))\Omega((\deg(t_{F}(.))+1)) and O((deg(tF(.))+1)){\rm O}((\deg(t_{F}(.))+1)) for the irreducible polynomial tF(.)t_{F}(.) over GF(2){\rm GF}(2).

  4. iv.

    It takes O(u(n))O(u(n)) field conversions to elements in FF and O(u(n))O(u(n)) field operations in FF after reading each bit.

  5. v.

    It runs O(r2(n))O(r_{2}(n)) randomized steps after reading the entire input.

3 Overview of Our Methods

In this section, we give a brief description about our methods used in this paper. Our first result is based on a polynomial method on a finite field whose size affects the hardness of magnification. The second result is a translational method for zero-error probabilistic complexity classes.

3.1 Magnify the Hardness of Sparse Sets

We have a polynomial method over finite fields. Let LL be f(n)f(n)-sparse language in NTIME(t1(n)){\rm NTIME}(t_{1}(n)). In order to handle an input string of size nn, a finite field F=GF(q)F={\rm GF}(q) with q=2kq=2^{k} for some integer kk is selected, and is represented by R(F)=(2,tF(z))R(F)=(2,t_{F}(z)), where tF(z)t_{F}(z) is a irreducible polynomial over GF(2){\rm GF}(2). An input y=a1a2any=a_{1}a_{2}\cdots a_{n} is partitioned into kk-segments sr1s1s0s_{r-1}\cdots s_{1}s_{0} such that each sis_{i} is converted into an element w(si,u)w(s_{i},u) in FF, and yy is transformed into an polynomial dy(z)=zr+i=0r1w(si,u)zid_{y}(z)=z^{r}+\sum_{i=0}^{r-1}w(s_{i},u)z^{i}. A random element aFa\in F is chosen in the beginning of streaming algorithm before processing the input stream. The value dy(a)d_{y}(a) is evaluated with the procession of input stream. The finite FF is large enough such that for different y1y_{1} and y2y_{2} of the same length, dy1(.)d_{y_{1}}(.) and dy2(.)d_{y_{2}}(.) are different polynomials due to their different coefficients derived from y1y_{1} and y2y_{2}, respectively. Let H(y)H(y) be the set of all n,a,dy(a)\langle n,a,d_{y}(a)\rangle with aFa\in F and n=|y|n=|y|. Set A(n)A(n) is the union of all H(y)H(y) with yLny\in L^{n}. The set of AA is i=1A(n)\cup_{i=1}^{\infty}A(n). A small lower bound for the language AA is magnified to large lower bound for LL.

The size of field FF depends on the density of set LL and is O(f(n)n){\rm O}(f(n)n). By the construction of AA, if yLy\in L, there are qq tuples n,a,dy(a)\langle n,a,d_{y}(a)\rangle in AA that are generated by yy via all aa in FF. For two different y1y_{1} and y2y_{2} of length nn, the intersection H(y1)H(y2)H(y_{1})\cap H(y_{2}) is bounded by the degree of dy1(.)d_{y_{1}}(.). If yLy\not\in L, the number of items n,a,dy(a)\langle n,a,d_{y}(a)\rangle generated by yy is at most q4{q\over 4} in AA. If yLy\in L, the number of items n,a,dy(a)\langle n,a,d_{y}(a)\rangle generated by yy is qq in AA. This enables us to convert a string xx of length nn in LL into some strings in AA of length much smaller than nn, make the hardness magnification possible.

3.2 Separation by ZPP-hardness of MCSP

Our another result shows that ZPP-hardness for MCSP implies EXPZPP{\rm EXP}\not={\rm ZPP}. We identify a class of functions that are padding stable, which has the property if TTALLY(d(n),g(n))T\in{\rm TALLY}(d(n),g(n)), then {1n+2n:1nT}TALLY(d(n),g(n))\{1^{n+2^{n}}:1^{n}\in T\}\in{\rm TALLY}(d(n),g(n)). The function pair d(n)=loglognd(n)=\log\log n and g(n)=222ng(n)=2^{2^{2n}} has this property. We construct a very sparse tally set LEXPTALLY(d(n),g(n))L\in{\rm EXP}\cap{\rm TALLY}(d(n),g(n)) that separates ZPEXP{\rm ZPEXP} from ZPP{\rm ZPP}, where ZPEXP{\rm ZPEXP} is the zero error exponential time probabilistic class. It is based on a diagonal method that is combined with a padding design. A tally language LL has a zero-error 22n2^{2^{n}}-time probabilistic algorithm implies L={1n+2n:1nL}L^{\prime}=\{1^{n+2^{n}}:1^{n}\in L\} has a zero-error 2n2^{n}-time probabilistic algorithm. Adapting to the method of [11], we prove that if MCSP is ZPPTALLY(d(n),g(n)){\rm ZPP}\cap{\rm TALLY}(d(n),g(n))-hard under polynomial time truth-table reductions, then EXPZPP{\rm EXP}\not={\rm ZPP}.

4 Hardness Magnification via Streaming

In this section, we show a hardness magnification of sparse sets via a streaming algorithm. A classical algorithm to find irreducible polynomial [15] is used to construct a field that is large enough for our algorithm.

Theorem 2

[15] There is a deterministic algorithm that constructs a irreducible polynomial of degree nn in O(p12(logp)3n3+ϵ+(logp)2n4+ϵ){\rm O}(p^{1\over 2}(\log p)^{3}n^{3+\epsilon}+(\log p)^{2}n^{4+\epsilon}) operations in FF, where FF is a finite field GF(p){\rm GF}(p) with prime number pp.

Definition 3

Let f(n)f(n) be a function from NN to NN. For a language A{0,1}A\subseteq\{0,1\}^{*}, we say AA is f(n)f(n)-sparse if |An|f(n)|A^{n}|\leq f(n) for all large integer nn.

4.1 Streaming Algorithm

The algorithm Streaming(.) is based on a language LL that is f(n)f(n)-sparse. It generates a field F=GF(2k)F={\rm GF}(2^{k}) and evaluates dx(a)d_{x}(a) with a random element aa in FF. A polynomial zr+i=0r1bizi=zr+br1zr1+br2zr2++b0z^{r}+\sum_{i=0}^{r-1}b_{i}z^{i}=z^{r}+b_{r-1}z^{r-1}+b_{r-2}z^{r-2}+\cdots+b_{0} can be evaluated by (((z+br1)z+br2)z+)z+b0(\cdots((z+b_{r-1})z+b_{r-2})z+...)z+b_{0} according to the classical Horner’s algorithm. For example, z2+z+1=(z+1)z+1z^{2}+z+1=(z+1)z+1.

Algorithm

Streaming(n,xn,x)

Input: an integer nn, and string x=a1anx=a_{1}\cdots a_{n} of the length nn;

Steps:

  1. 1.

    Select a field size q=2kq=2^{k} such that 8f(n)n<q16f(n)n8f(n)n<q\leq 16f(n)n.

  2. 2.

    Generate an irreducible polynomial tF(u)t_{F}(u) of degree kk over GF(2){\rm GF}(2) such that (2,tF(u))(2,t_{F}(u)) represents finite F=GF(q)F={\rm GF}(q) (by Theorem 2 with p=2p=2);

  3. 3.

    Let aa be a random element in FF;

  4. 4.

    Let r=nkr=\left\lceil n\over k\right\rceil; (Note that rr is the number of kk-segments of xx. See Section 2)

  5. 5.

    Let j=r1j=r-1;

  6. 6.

    Let v=1v=1;

  7. 7.

    Repeat

  8. 8.

    {

  9. 9.

    Receive the next kk-segment sjs_{j} from the input stream xx;

  10. 10.

    Convert sjs_{j} into an element bj=w(sj,u)b_{j}=w(s_{j},u) in GF(q){\rm GF}(q);

  11. 11.

    Let v=va+bjv=v\cdot a+b_{j};

  12. 12.

    Let j=j1j=j-1;

    }

  13. 13.

    Until j<0j<0 (the end of the stream);

  14. 14.

    Output n,a,v\langle n,a,v\rangle;

End of Algorithm

Now we have our magnification algorithm. Let M(.)M(.) be a randomized Turing machine to accept a language AA that contains all |x|,a,dx(a)\langle|x|,a,d_{x}(a)\rangle with aFa\in F and xLx\in L. We have the following randomized streaming algorithm to accept LL via the randomized algorithm M(.)M(.) for AA.

Algorithm

Magnification(n,xn,x)

Input integer nn and x=a1anx=a_{1}\cdots a_{n} as a stream;

Steps: Let y=y=Streaming(n,xn,x); Accept if M(y)M(y) accepts;

End of Algorithm

4.2 Hardness Magnification

In this section, we derive some results about hardness magnification via sparse set. Our results show a trade off between the hardness magnification and sparseness via the streaming model.

Definition 4

For a nondecreasing function t(.):t(.):\mathbb{N}\rightarrow\mathbb{N}, define BTIME(t(n)){\rm BTIME}(t(n)) the class of languages LL that have two-side bounded error probabilistic algorithms with time complexity O(t(n))O(t(n)). Define BPP=c=1BTIME(nc){\rm BPP}=\cup_{c=1}^{\infty}{\rm BTIME}(n^{c}).

Theorem 5

Assume that u1(m)u_{1}(m) be nondecreasing function for the time to generate an irreducible polynomial of degree mm in GF(2){\rm GF}(2), and u2(m)u_{2}(m) be the nondecreasing function of a time upper bound for the operations (+,.+,.) in GF(2m){\rm GF}(2^{m}). Let f(.),t1(.),t2(.),t3(n)f(.),t_{1}(.),t_{2}(.),t_{3}(n) be nondecreasing functions \mathbb{N}\rightarrow\mathbb{N} with f(n)2n2f(n)\leq 2^{n\over 2}, v(n)=(logn+logf(n))v(n)=(\log n+\log f(n)), and 10v(n)+t1(n)+u1(10v(n))+nu2(10v(n))t2(v(n))10v(n)+t_{1}(n)+u_{1}(10v(n))+n\cdot u_{2}(10v(n))\leq t_{2}(v(n)) for all large nn. If there is a f(n)f(n)-sparse set LL with LNTIME(t1(n))L\in{\rm NTIME}(t_{1}(n)) and LStreaming(u1(10v(n))),v(n),v(n),1,t3(10v(n)))L\not\in{\rm Streaming}(u_{1}(10v(n))),v(n),v(n),1,t_{3}(10v(n))), then there is a language AA such that ANTIME(t2(n))A\in{\rm NTIME}(t_{2}(n)) and ABTIME(t3(n))A\not\in{\rm BTIME}(t_{3}(n)).

Proof:  Select a finite field GF(q){\rm GF}(q) with q=2kq=2^{k} for an integer kk by line 1 of the algorithm streaming(.). For each xLnx\in L^{n}, let xx be partitioned into kk-segments: sr1sr2s0s_{r-1}s_{r-2}\cdots s_{0}. Let w(si,u)w(s_{i},u) convert sis_{i} into an element of GF(q){\rm GF}(q) (See Section 2). Define polynomial dx(z)=zr+i=0r1w(q,si)zid_{x}(z)=z^{r}+\sum_{i=0}^{r-1}w(q,s_{i})z^{i}. For each xx, let H(x)H(x) be the set {n,a,dx(a)|aGF(q)}\{\langle n,a,d_{x}(a)\rangle|a\in{\rm GF}(q)\}, where n=|x|n=|x|. Define set A(n)=yLnH(y)A(n)=\cup_{y\in L^{n}}H(y) for n=1,2n=1,2\cdots, and language A=n=1+A(n)A=\cup_{n=1}^{+\infty}A(n).

Claim 1. For any xLnx\not\in L^{n} with n=|x|n=|x|, we have |H(x)A(n)|<q4|H(x)\cap A(n)|<{q\over 4}.

Proof:  Assume that for some xLnx\not\in L^{n} with n=|x|n=|x|, |H(x)A(n)|q4|H(x)\cap A(n)|\geq{q\over 4}. It is easy to see that rnr\leq n and knk\leq n for all large nn by the algorithm Streaming(.) and the condition of f(.)f(.) in the theorem. Assume that |H(x)H(y)|<r+1|H(x)\cap H(y)|<r+1 for every yLny\in L^{n}. Since A(n)A(n) is the union H(y)H(y) with yLny\in L^{n} and |Ln|f(n)|L^{n}|\leq f(n), there are at most rf(n)nf(n)<q8rf(n)\leq nf(n)<{q\over 8} elements in H(x)A(n)H(x)\cap A(n) by line 1 of the algorithm Streaming(.). Thus, |H(x)A(n)|<q8|H(x)\cap A(n)|<{q\over 8}. This brings a contradiction. Therefore, there is a yLny\in L^{n} to have |H(x)H(y)|r+1|H(x)\cap H(y)|\geq r+1. Since the polynomials dx(.)d_{x}(.) and dy(.)d_{y}(.) are of degrees at most rr, we have dx(z)=dy(z)d_{x}(z)=d_{y}(z) (two polynomials are equal). Thus, x=yx=y. This brings a contradiction because xLnx\not\in L^{n} and yLny\in L^{n}.         

Claim 2. If xLx\in L, then Streaming(|x|,x)A(|x|,x)\in A. Otherwise, with probability at most 14{1\over 4}, Streaming(|x|,x)A(|x|,x)\in A.

Proof:  For each xx, it generates n,a,dx(a)\langle n,a,d_{x}(a)\rangle for a random aGF(q)a\in{\rm GF}(q). Each aGF(q)a\in{\rm GF}(q) determines a random path. We have that if xLx\in L, then n,a,dx(a)A\langle n,a,d_{x}(a)\rangle\in A, and if xLx\not\in L, then n,a,dx(a)A\langle n,a,d_{x}(a)\rangle\in A with probability at most 14{1\over 4} by Claim 1.         

Claim 3. ANTIME(t2(m))A\in{\rm NTIME}(t_{2}(m)).

Proof:  Let z=10v(n)=10(logn+logf(n))z=10v(n)=10(\log n+\log f(n)). Each element in field F=GF(2k)F={\rm GF}(2^{k}) is of length kk. For each u=n,a,bu=\langle n,a,b\rangle (a,bFa,b\in F), we need to guess a string xLnx\in L^{n} such that b=dx(a)b=d_{x}(a). It is easy to see that v(n)|n,a,b|10v(n)v(n)\leq|\langle n,a,b\rangle|\leq 10v(n) for all large nn if n,a,bA\langle n,a,b\rangle\in A (See Section 2 about coding). Let m=|n,a,b|m=|\langle n,a,b\rangle|. It takes at most u1(z)u_{1}(z) steps to generate a irreducible polynomial tF(.)t_{F}(.) for the field FF by our assumption.

Since LNTIME(t1(n))L\in{\rm NTIME}(t_{1}(n)), checking if uAu\in A takes nondeterministic t1(n)t_{1}(n) steps to guess a string xLnx\in L^{n}, u1(z)u_{1}(z) deterministic steps to generate tF(u)t_{F}(u) for the field FF, O(z)O(z) nondeterministic steps to generate a random element aFa\in F, and additional O(nu2(z)){\rm O}(n\cdot u_{2}(z)) steps to evaluate dx(a)d_{x}(a) in by following algorithm Streaming(.) and check b=dx(a)b=d_{x}(a). The polynomial tF(u)t_{F}(u) in the GF(2){\rm GF}(2) has degree at most zz. Each polynomial operation (++ or .) in FF takes at most u2(z)u_{2}(z) steps. Since z+t1(n)+u1(z)+nu2(z)t2(m)z+t_{1}(n)+u_{1}(z)+n\cdot u_{2}(z)\leq t_{2}(m) time by the condition of this theorem, we have ANTIME(t2(m))A\in{\rm NTIME}(t_{2}(m)).

 

Claim 4. If ABTIME(t3(m))A\in{\rm BTIME}(t_{3}(m)), then LStreaming(u1(10v(n)),v(n),v(n),L\in{\rm Streaming}(u_{1}(10v(n)),v(n),v(n), 1,t3(10v(n)))1,t_{3}(10v(n))).

Proof:  The field generated at line 2 in algorithm Streaming(.) takes u1(10(logn+logf(n)))u_{1}(10(\log n+\log f(n))) time. Let x=a1anx=a_{1}\cdots a_{n} be the input string. The string xx partitioned into kk-segments sr1s0s_{r-1}\cdots s_{0}. Transform each sis_{i} into an element bi=w(si,u)b_{i}=w(s_{i},u) in GF(q){\rm GF}(q) in the streaming algorithm. We generate a polynomial dx(z)=zr+i=0r1bizi=zr+br1zr1+br2zr2++b0d_{x}(z)=z^{r}+\sum_{i=0}^{r-1}b_{i}z^{i}=z^{r}+b_{r-1}z^{r-1}+b_{r-2}z^{r-2}+\cdots+b_{0}. Given a random element aGF(q)a\in{\rm GF}(q), we evaluate dx(a)=(((a+br1)a+br2)a+)a+b0d_{x}(a)=(\cdots((a+b_{r-1})a+b_{r-2})a+...)a+b_{0} according to the classical algorithm. Therefore, dx(a)d_{x}(a) is evaluated in Streaming(.) with input (|x|,x)(|x|,x).

If ABTIME(t3(m))A\in{\rm BTIME}(t_{3}(m)), then LL has a randomized streaming algorithm that has at most t3(10v(n))t_{3}(10v(n)) random steps after reading the input, and at most O(v(n)){\rm O}(v(n)) space. After reading one substring sis_{i} from xx, it takes one conversion from a substring of the input to an element of field FF by line 10, and at most two field operations by line 11 in the algorithm Streaming(.).

 

Claim 4 brings a contradiction to our assumption about the complexity of LL in the theorem. This proves the theorem.         

Proposition 6

Let f(n):f(n):\mathbb{N}\rightarrow\mathbb{N} be a nondecreasing function. If for each fixed ϵ(0,1)\epsilon\in(0,1), f(n)nϵf(n)\leq n^{\epsilon} for all large nn, then there is a nondecreasing unbounded function g(n):g(n):\mathbb{N}\rightarrow\mathbb{N} with f(n)n1g(n)f(n)\leq n^{1\over g(n)}.

Proof: Let n0=1n_{0}=1. For each k1k\geq 1, let nkn_{k} be the least integer such that nknk1n_{k}\geq n_{k-1} and f(n)n1kf(n)\leq n^{1\over k} for all nnkn\geq n_{k}. Clearly, we have the infinite list n1n2nkn_{1}\leq n_{2}\cdots\leq n_{k}\leq\cdots such that limk+nk=+\lim_{k\rightarrow+\infty}n_{k}=+\infty. Define function g(k):g(k):\mathbb{N}\rightarrow\mathbb{N} such that g(n)=kg(n)=k for all n[nk1,nk)n\in[n_{k-1},n_{k}). For each nnkn\geq n_{k}, we have f(n)n1kf(n)\leq n^{1\over k}.         

Our Definition 7 is based Proposition 6. It can simplify the proof when we handle a function that is no(1)n^{o(1)}.

Definition 7

A function f(n):f(n):\mathbb{N}\rightarrow\mathbb{N} is no(1)n^{o(1)} if there is a nondecreasing function g(n):g(n):\mathbb{N}\rightarrow\mathbb{N} such that limn+g(n)=+\lim_{n\rightarrow+\infty}g(n)=+\infty and f(n)n1g(n)f(n)\leq n^{1\over g(n)} for all large nn. A function f(n):f(n):\mathbb{N}\rightarrow\mathbb{N} is 2no(1)2^{n^{o(1)}} if there is a nondecreasing function g(n):g(n):\mathbb{N}\rightarrow\mathbb{N} such that limn+g(n)=+\lim_{n\rightarrow+\infty}g(n)=+\infty and f(n)2n1g(n)f(n)\leq 2^{n^{1\over g(n)}} for all large nn.

Corollary 8

If there exists a 2no(1)2^{n^{o(1)}}-sparse language LL in NTIME(2no(1)){\rm NTIME}(2^{n^{o(1)}}) such that LL does not have any randomized streaming algorithm with no(1)n^{o(1)} updating time, and no(1)n^{o(1)} space, then NEXPBPP{\rm NEXP}\not={\rm BPP}.

Proof:  Let g(n):g(n):\mathbb{N}\rightarrow\mathbb{N} be an arbitrary unbounded nondecreasing function that satisfies limn+g(n)=+\lim_{n\rightarrow+\infty}g(n)=+\infty and g(n)loglogng(n)\leq\log\log n. Let t1(n)=f(n)=2n1g(n)t_{1}(n)=f(n)=2^{n^{1\over g(n)}} and Let t2(n)=22nt_{2}(n)=2^{2n}, t3(n)=ng(n)t_{3}(n)=n^{\sqrt{g(n)}}, and v(n)=(logn+logf(n))v(n)=(\log n+\log f(n)).

It is easy to see that v(n)=no(1)v(n)=n^{{\rm o}(1)}, and both u1(n)u_{1}(n) and u2(n)u_{2}(n) are nO(1)n^{{\rm O}(1)} (see Theorem 2). For any fixed c0>0c_{0}>0, we have t2(v(n))>t2(logf(n))t2(n1g(n))>t1(n)+nc0t_{2}(v(n))>t_{2}(\log f(n))\geq t_{2}(n^{1\over g(n)})>t_{1}(n)+n^{c_{0}} for all large nn. For all large nn, we have

t3(10v(n))\displaystyle t_{3}(10v(n)) \displaystyle\leq t3(20logf(n))=t3(20n1g(n))\displaystyle t_{3}(20\log f(n))=t_{3}(20n^{1\over g(n)}) (1)
\displaystyle\leq (20n1g(n))g(20n1g(n))(n2g(n))g(n)=no(1).\displaystyle(20n^{1\over g(n)})^{\sqrt{g(20n^{1\over g(n)}})}\leq(n^{2\over g(n)})^{\sqrt{g(n)}}=n^{o(1)}. (2)

Clearly, these functions satisfy the inequality of the precondition in Theorem  5. Assume LStreaming(poly(v(n)),v(n),v(n),1,t3(10v(n)))L\in{\rm Streaming}({\rm poly}(v(n)),v(n),v(n),1,t_{3}(10v(n))). With O(v(n))=no(1)O(v(n))=n^{o(1)} space, we have a field representation (2,tF(.))(2,t_{F}(.)) with deg(tF(.))=no(1)\deg(t_{F}(.))=n^{o(1)}. Thus, each field operation takes no(1)n^{o(1)} time by the brute force method for polynomial addition and multiplication. We have t3(10v(n))=no(1)t_{3}(10v(n))=n^{o(1)} by inequality (2). Thus, the streaming algorithm updating time is no(1)n^{o(1)}. Therefore, we have that LL has a randomized streaming algorithm with no(1)n^{o(1)} updating time, and no(1)n^{o(1)} space. This gives a contradiction. So,
LStreaming(poly(v(n)),v(n),v(n),1,t3(10v(n)))L\not\in{\rm Streaming}({\rm poly}(v(n)),v(n),v(n),1,t_{3}(10v(n))). By Theorem 5, there is ANTIME(t2(n))A\in{\rm NTIME}(t_{2}(n)) such that ABTIME(t3(n))A\not\in{\rm BTIME}(t_{3}(n)). Therefore, ABPPA\not\in{\rm BPP}. Thus, NEXPBPP{\rm NEXP}\not={\rm BPP}.         

5 Implication of ZPP-Hardness of MCSP

In this section, we show that if MCSP is ZPPTALLY{\rm ZPP}\cap{\rm TALLY}-hard, then EXPZPP{\rm EXP}\not={\rm ZPP}. The conclusion still holds if TALLY{\rm TALLY} is replaced by a very sparse subclass of TALLY{\rm TALLY} languages.

Definition 9

For a nondecreasing function t(.):t(.):\mathbb{N}\rightarrow\mathbb{N}, define ZTIME(t(n)){\rm ZTIME}(t(n)) the class of languages LL that have zero-error probabilistic algorithms with time complexity O(t(n))O(t(n)). Define ZPP=c=1ZTIME(nc){\rm ZPP}=\cup_{c=1}^{\infty}{\rm ZTIME}(n^{c}), and
ZPEXP=c=1ZTIME(2nc){\rm ZPEXP}=\cup_{c=1}^{\infty}{\rm ZTIME}(2^{n^{c}}).

Definition 10

For an nondecreasing function f(n):f(n):\mathbb{N}\rightarrow\mathbb{N}, define TALLY[f(k)]{\rm TALLY}[f(k)] to be the class of tally set A{1}A\subseteq\{1\}^{*} such that for each 1mA1^{m}\in A, there is an integer ii\in\mathbb{N} with m=f(i)m=f(i). For a tally language T{1}T\subseteq\{1\}^{*}, define Pad(T)={12n+n|1nT}{\rm Pad}(T)=\{1^{2^{n}+n}|1^{n}\in T\}.

Definition 11

For two languages AA and BB, a polynomial time truth-table reduction from AA to BB is a polynomial time computable function f(.)f(.) such that for each instance xx for AA, f(x)=(y1,,ym,C(.))f(x)=(y_{1},\cdots,y_{m},C(.)) to satisfy xAx\in A if and only if C(B(y1),,B(ym))=1C(B(y_{1}),\cdots,B(y_{m}))=1, where C(.)C(.) is circuit of mm input bits and B(.)B(.) is the characteristic function of BB.

Let rP\leq_{r}^{P} be a type of polynomial time reductions (ttP\leq^{P}_{tt} represents polynomial time truth-table reductions), and CC be a class of languages. A language AA is CC-hard under rP\leq_{r}^{P} reductions if for each BCB\in C, BrPAB\leq_{r}^{P}A.

Definition 12

Let kk be an integer. Define two classes of functions with recursions: (1) log(1)(n)=log2n\log^{(1)}(n)=\log_{2}n, and log(k+1)(n)=log2(log(k)(n))\log^{(k+1)}(n)=\log_{2}(\log^{(k)}(n)). (2) exp(1)(n)=2n{\rm exp}^{(1)}(n)=2^{n}, and exp(k+1)(n)=2exp(k)(n){\rm exp}^{(k+1)}(n)=2^{{\rm exp}^{(k)}(n)}.

Definition 13

For two nondecreasing functions d(n),g(n):d(n),g(n):\mathbb{N}\rightarrow\mathbb{N}, the pair (d(n),g(n))(d(n),g(n)) is time constructible if (d(n),g(n))(d(n),g(n)) can be computed in time d(n)+g(n)d(n)+g(n) steps.

Definition 14

Define TALLY(d(n),g(n)){\rm TALLY}(d(n),g(n)) to be the class of tally sets TT such that |Tn|d(n)|T^{\leq n}|\leq d(n) and for any two strings 1n,1mT1^{n},1^{m}\in T with n<mn<m, they satisfy g(n)<mg(n)<m. We call d(n)d(n) to be the density function and g(n)g(n) to be the gap function. A gap function g(n)g(n) is padding stable if g(2n+n)<2g(n)+g(n)g(2^{n}+n)<2^{g(n)}+g(n) for all n>1n>1.

Lemma 15
  1. i.

    Assume the gap function g(n)g(n) is padding stable. If TTALLY(d(n),g(n))T\in{\rm TALLY}(d(n),g(n)), then Pad(T)TALLY(d(n),g(n)){\rm Pad}(T)\in{\rm TALLY}(d(n),g(n)).

  2. ii.

    For each integer k>0k>0, g(n)=exp(k)(2n)g(n)={\rm exp}^{(k)}({2n}) is padding stable.

Proof:  Part i. Let 1n1^{n} be a string in TT. The next shortest string 1mT1^{m}\in T with n<mn<m satisfies g(n)<mg(n)<m. We have 12n+n1^{2^{n}+n} and 12m+m1^{2^{m}+m} are two consecutive neighbor strings in Pad(T){\rm Pad}(T) such that there is no other string 1kPad(T)1^{k}\in{\rm Pad}(T) with 2n+n<k<2m+m2^{n}+n<k<2^{m}+m. We have g(2n+n)<2g(n)+g(n)<2m+mg(2^{n}+n)<2^{g(n)}+g(n)<2^{m}+m. Since the strings in Pad(T)n{\rm Pad}(T)^{\leq n} are one-one mapped from the strings in TT with length less than nn, |Pad(T)n||Tn|d(n)|{\rm Pad}(T)^{\leq n}|\leq|T^{\leq n}|\leq d(n), we have Pad(T)TALLY(d(n),g(n)){\rm Pad}(T)\in{\rm TALLY}(d(n),g(n)). This proves Part (i).

Part ii. We have inequality g(2n+n)=exp(k)(2(2n+n))<exp(k)(42n)=exp(k)(2n+2)g(2^{n}+n)={\rm exp}^{(k)}(2(2^{n}+n))<{\rm exp}^{(k)}(4\cdot 2^{n})={\rm exp}^{(k)}(2^{n+2}) exp(k)(22n)=2g(n)<2g(n)+g(n)\leq{\rm exp}^{(k)}(2^{2n})=2^{g(n)}<2^{g(n)}+g(n). Therefore, gap function g(n)g(n) is padding stable. This proves Part ii.         

Lemma 16

Let d(n)d(n) and g(n)g(n) be nondecreasing unbounded functions from NN to NN, and (d(n),g(n))(d(n),g(n)) is time constructible. Then there exists a time constructible increasing unbounded function f(n):f(n):\mathbb{N}\rightarrow\mathbb{N} such that
TALLY[f(n)]TALLY(d(n),g(n)){\rm TALLY}[f(n)]\subseteq{\rm TALLY}(d(n),g(n)).

Proof: Compute the least integer n1n_{1} with d(n1)>0d(n_{1})>0. Let s1s_{1} be the number of steps for the computation. Define f(1)=max(s1,n1)f(1)=\max(s_{1},n_{1}). Assume that f(k1)f(k-1) has been defined. We determine the function value f(k)f(k) below.

For an integer k>0k>0, compute g(f(k1))g(f(k-1)) and the least kk numbers n1<n2<<nkn_{1}<n_{2}<\cdots<n_{k} such that 0<d(n1)<d(n2)<<d(nk)0<d(n_{1})<d(n_{2})<\cdots<d(n_{k}). Assume the computation above takes ss steps. Define f(k)f(k) to be the max(2s,nk,g(f(k1))+1)\max(2s,n_{k},g(f(k-1))+1). For each language TTALLY[f(n)]T\in{\rm TALLY}[f(n)], there are at most kk strings in TT with length at most f(k)f(k). On the other hand, d(nk)kd(n_{k})\geq k by the increasing list 0<d(n1)<d(n2)<<d(nk)0<d(n_{1})<d(n_{2})<\cdots<d(n_{k}). Therefore, we have |Tnk|kd(nk)|T^{\leq n_{k}}|\leq k\leq d(n_{k}). Furthermore, we also have g(f(k1))<f(k)g(f(k-1))<f(k). Since ss is the number of steps to determine the values s,nk,s,n_{k}, and g(f(k1))+1g(f(k-1))+1. We have 2sf(k)2s\leq f(k). Thus, f(k)f(k) can be computed in f(k)f(k) steps by spending some idle steps. Therefore, the function f(.)f(.) is time constructible.         

We will use the notion TALLY[f(k)]{\rm TALLY}[f(k)] to characterize extremely sparse tally sets with fast growing function such as f(k)=222kf(k)=2^{2^{2^{k}}}. It is easy to see that TALLY=TALLY[I(.)]{\rm TALLY}={\rm TALLY}[I(.)], where I(.)I(.) is the identity function I(k)=kI(k)=k.

Lemma 17

Let d(n)d(n) and g(n)g(n) be nondecreasing unbounded functions. If function g(n))g(n)) is padding stable, then there is a language AA such that AZTIME(2O(n))TALLY(d(n),g(n))A\in{\rm ZTIME}(2^{O(n)})\cap{\rm TALLY}(d(n),g(n)) and AZPPA\not\in{\rm ZPP}.

Proof:  It is based on the classical translational method. Assume ZTIME(2O(n))TALLY(d(n),g(n))ZPP{\rm ZTIME}(2^{O(n)})\cap{\rm TALLY}(d(n),g(n))\subseteq{\rm ZPP}. Let f(.)f(.) be a time constructible increasing unbounded function via Lemma 16 such that
TALLY[f(n)]TALLY(d(n),g(n)){\rm TALLY}[f(n)]\subseteq{\rm TALLY}(d(n),g(n)). Let t1(n)=22nt_{1}(n)=2^{2^{n}} and t2(n)=22n1t_{2}(n)=2^{2^{n-1}}. Let LL be a tally language in DTIME(t1(n))TALLY[f(n)]{\rm DTIME}(t_{1}(n))\cap{\rm TALLY}[f(n)], but it is not in DTIME(t2(n)){\rm DTIME}(t_{2}(n)). Such a language LL can be constructed via a standard diagonal method. Let M1,,M2M_{1},\cdots,M_{2} be the list of Turing machines such that each MiM_{i} has time upper bound by function t2(n)t_{2}(n). Define language LTALLY[f(n)]L\in{\rm TALLY}[f(n)] such that for each kk, 1f(k)L1^{f(k)}\in L if and only if Mk(1f(k))M_{k}(1^{f(k)}) rejects in t2(f(k))t_{2}(f(k)) steps. We have LTALLY(d(n),g(n))L\in{\rm TALLY}(d(n),g(n)) by Lemma 16.

Let L1=Pad(L)L_{1}={\rm Pad}(L). We have L1TALLY(d(n),g(n))L_{1}\in{\rm TALLY}(d(n),g(n)) by Lemma 15. We have L1DTIME(2O(n))ZTIME(2O(n))L_{1}\in{\rm DTIME}(2^{O(n)})\subseteq{\rm ZTIME}(2^{O(n)}). Thus, L1ZPPL_{1}\in{\rm ZPP}. So, LZTIME(2O(n))L\in{\rm ZTIME}(2^{O(n)}). Therefore, LZTIME(2O(n))TALLY(d(n),g(n))L\in{\rm ZTIME}(2^{O(n)})\cap{\rm TALLY}(d(n),g(n)). We have LZPPL\in{\rm ZPP}. Thus, LDTIME(2nO(1))DTIME(22n1)L\in{\rm DTIME}(2^{n^{{\rm O}(1)}})\subseteq{\rm DTIME}(2^{2^{n-1}}). This brings a contradiction.         

Theorem 18

Let d(n)d(n) and g(n)g(n) be nondecreasing unbounded functions from \mathbb{N} to \mathbb{N}. Assume that g(n)g(n) is padding stable. If MCSP  is ZPPTALLY(d(n),g(n)){\rm ZPP}\cap{\rm TALLY}(d(n),g(n))-hard under polynomial time truth-table reductions, then EXPZPP\not={\rm ZPP}.

Proof:  Assume that MCSP is (ZPPTALLY(d(n),g(n))({\rm ZPP}\cap{\rm TALLY}(d(n),g(n))-hard under polynomial time truth-table reductions, and EXP=ZPP{\rm EXP}={\rm ZPP}.

Let LL be a language in ZTIME(2O(n))TALLY[d(.),g(.)]{\rm ZTIME}(2^{O(n)})\cap{\rm TALLY}[d(.),g(.)], but LZPPL\not\in{\rm ZPP} by Lemma 17. Let L=Pad(L)L^{\prime}={\rm Pad}(L). Clearly, every string 1y1^{y} in LL^{\prime} has the property that y=2n+ny=2^{n}+n for some integer nn. This property is easy to check and we reject all strings without this property in linear time. We have LZPPL^{\prime}\in{\rm ZPP}. Therefore, there is a polynomial time truth-table reduction from LL^{\prime} to MCSP via a polynomial time truth-table reduction M(.)M(.). Let polynomial p(n)=ncp(n)=n^{c} be the running time for M(.)M(.) for a fixed cc and n2n\geq 2.

Define the language R={(1n,i,j),R=\{(1^{n},i,j), the ii-th bit of jj-th query of M(1n+2n)M(1^{n+{2^{n}}}) is equal to 1,1, and i,jp(n+2n)}i,j\leq p(n+2^{n})\}. We can easily prove that RR is in EXP{\rm EXP}. Therefore, RZPPP/polyR\in{\rm ZPP}\subseteq{\rm P}/{\rm poly} (See [1]).

Therefore, there is a class of polynomial size circuits {Cn}n=1\{C_{n}\}_{n=1}^{\infty} to recognize RR such that Cn(.)C_{n}(.) recognize all (1n,i,j)(1^{n},i,j) with i,jp(n+2n)i,j\leq p(n+2^{n}) in RR. Assume that the size of CnC_{n} is of size at most q(n)=nt0+t0q(n)=n^{t_{0}}+t_{0} for a fixed t0t_{0}. For an instance x=1nx=1^{n} for LL, consider the instance y=1n+2ny=1^{n+2^{n}} for LL^{\prime}. We can compute all non-adaptive queries T,s(n)\langle T,s(n)\rangle to MCSP{\rm MCSP} in 2nO(1)2^{n^{O(1)}} time via M(y)M(y). If s(n)q(n)s(n)\geq q(n), the answer from MCSP{\rm MCSP} for the query T,s(n)\langle T,s(n)\rangle is yes since T,s(n)\langle T,s(n)\rangle can be generated as one of the instances via the circuit Cn(.)C_{n}(.). If s(n)<q(n)s(n)<q(n), we can use a brute force method to check if there exists a circuit of size at most q(n)q(n) to generate TT. It takes 2nO(1)2^{n^{O(1)}} time. Therefore, LEXPL\in{\rm EXP}. Thus, LZPPL\in{\rm ZPP}. This bring a contradiction as we already assume LZPPL\not\in{\rm ZPP}.         

Corollary 19

For any integer kk, if MCSP  is ZPPTALLY(log(k)(n),exp(k)(2n)){\rm ZPP}\cap{\rm TALLY}(\log^{(k)}(n),{\rm exp}^{(k)}(2n))-hard under polynomial time truth-table reductions, then EXPZPP\not={\rm ZPP}.

Proof:  It follows from Theorem 18 and Lemma 15.         

Corollary 20

For any integer kk, if MCSP  is ZPPTALLY{\rm ZPP}\cap{\rm TALLY}-hard under polynomial time truth-table reductions, then EXPZPP\not={\rm ZPP}.

Corollary 21

If MCSP  is ZPP{\rm ZPP}-hard under polynomial time truth-table reductions, then EXPZPP\not={\rm ZPP}.

6 Conclusions

In this paper, we develop an algebraic method to magnify the hardness of sparse sets in nondeterministic classes via a randomized streaming model. It has a flexible trade off between the sparseness and time complexity. This shows connection to the major problems to prove NEXPBPP{\rm NEXP}\not={\rm BPP}. We also prove that if MCSP{\rm MCSP} is ZPP-hard, then EXPZPP{\rm EXP}\not={\rm ZPP}.

Acknowledgements: This research was supported in part by National Science Foundation Early Career Award 0845376, and Bensten Fellowship of the University of Texas Rio Grande Valley. Part of this research was conducted while the author was visiting the School of Computer Science and Technology of Hengyang Normal University in the summer of 2019 and was supported by National Natural Science Foundation of China 61772179.

References

  • [1] L. Adleman. Two theorems on random polynomial time. In Proceedings of the 19th Annual IEEE Symposium on Foundations of Computer Science, pages 75–83, 1978.
  • [2] E. Allender and S. Hirahara. New insights on the (non-)hardness of circuit minimization and related problems. In 42nd International Symposium on Mathematical Foundations of Computer Science, MFCS 2017, August 21-25, 2017 - Aalborg, Denmark, pages 54:1–54:14, 2017.
  • [3] E. Allender, D. Holden, and V. Kabanets. The minimum oracle circuit size problem. Computational Complexity, 26(2):469–496, 2017.
  • [4] L. Chen, C. Jin, and R. Williams. Hardness magnification for all sparse NP languages. Electronic Colloquium on Computational Complexity (ECCC), 26:118, 2019.
  • [5] S. Hirahara, I. C. Oliveira, and R. Santhanam. Np-hardness of minimum circuit size problem for OR-AND-MOD circuits. In 33rd Computational Complexity Conference, CCC 2018, June 22-24, 2018, San Diego, CA, USA, pages 5:1–5:31, 2018.
  • [6] S. Hirahara and R. Santhanam. On the average-case complexity of MCSP and its variants. In 32nd Computational Complexity Conference, CCC 2017, July 6-9, 2017, Riga, Latvia, pages 7:1–7:20, 2017.
  • [7] S. Hirahara and O. Watanabe. Limits of minimum circuit size problem as oracle. In 31st Conference on Computational Complexity, CCC 2016, May 29 to June 1, 2016, Tokyo, Japan, pages 18:1–18:20, 2016.
  • [8] J. M. Hitchcock and A. Pavan. On the np-completeness of the minimum circuit size problem. In 35th IARCS Annual Conference on Foundation of Software Technology and Theoretical Computer Science, FSTTCS 2015, December 16-18, 2015, Bangalore, India, pages 236–245, 2015.
  • [9] T. Hungerford. Algebra. Springer-Verlag, 1974.
  • [10] D. M. McKay, C. D. Murray, and R. R. Williams. Weak lower bounds on resource-bounded compression imply strong separations of complexity classes. In Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, STOC 2019, Phoenix, AZ, USA, June 23-26, 2019., pages 1215–1225, 2019.
  • [11] C. D. Murray and R. R. Williams. On the (non) np-hardness of computing circuit complexity. Theory of Computing, 13(1):1–22, 2017.
  • [12] I. C. Oliveira, J. Pich, and R. Santhanam. Hardness magnification near state-of-the-art lower bounds. In 34th Computational Complexity Conference, CCC 2019, July 18-20, 2019, New Brunswick, NJ, USA., pages 27:1–27:29, 2019.
  • [13] I. C. Oliveira and R. Santhanam. Hardness magnification for natural problems. In 59th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2018, Paris, France, October 7-9, 2018, pages 65–76, 2018.
  • [14] U. Schöning. A low and a high hierarchy within NP. JCSS, 27:14–28, 1983.
  • [15] V. Shoup. New algorithms for finding irreducible polynomials over finite fields. In 29th Annual Symposium on Foundations of Computer Science, White Plains, New York, USA, 24-26 October 1988, pages 283–290, 1988.