Quantum Implications of Huang’s Sensitivity Theorem
Abstract
Based on the recent breakthrough of Huang (2019), we show that for any total Boolean function , the deterministic query complexity, , is at most quartic in the quantum query complexity, : . This matches the known separation (up to log factors) due to Ambainis, Balodis, Belovs, Lee, Santha, and Smotrovs (2017). We also use the result to resolve the quantum analogue of the Aanderaa–Karp–Rosenberg conjecture. We show that if is a nontrivial monotone graph property of an -vertex graph specified by its adjacency matrix, then , which is also optimal.
1 Introduction
Last year, Huang resolved a major open problem in the analysis of Boolean functions called the sensitivity conjecture [Hua19], which was open for nearly 30 years [NS94]. Surprisingly, Huang’s elegant proof takes less than 2 pages—truly a “proof from the book.” Specifically, Huang showed that for any total Boolean function, which is a function , we have
(1) |
where is the real degree of and is the (maximum) sensitivity of . These measures and other measures appearing in this introduction are defined in Section 2.
In this note, we describe some implications of Huang’s resolution of the sensitivity conjecture to quantum query complexity. We observe that Huang actually proves a stronger claim, in which in Eq. 1 can be replaced by , a spectral relaxation of sensitivity that we define later. This observation has several implications for quantum query complexity.
We use this observation to settle the optimal relation between the deterministic query complexity, , and quantum query complexity, , for total functions. We know from the seminal results of Nisan [Nis91], Nisan and Szegedy [NS94] and Beals et al. [BBC+01] that any total Boolean function satisfies555This means that for total functions, quantum query algorithms can only outperform classical query algorithms by a polynomial factor. On the other hand, for partial functions, which are defined on a subset of , exponential and even larger speedups are possible.
(2) |
Grover’s algorithm [Gro96] shows that for the or function, a quadratic separation between and is possible. This was the best known quantum speedup for total functions until the work of Ambainis et al. [ABB+17], who constructed a total function with
(3) |
In this note, we show that the quartic separation (up to log factors) in Eq. 3 is actually the best possible:
Theorem 1.
For all Boolean functions , we have .
We deduce Theorem 1 as a corollary of a new tight quadratic relationship between and :
Theorem 2.
For all Boolean functions , we have .
Observe that Theorem 2 is tight for the or function on variables, whose degree is and whose quantum query complexity is [Gro96, BBBV97]. Prior to this work, the best relation between and was a sixth power relation, , which follows from Eq. 2.
As discussed earlier, our proof relies on the restatement of Huang’s result (Theorem 5), showing that , where is the spectral relaxation of sensitivity defined in Section 3. We then show that the measure lower bounds the original quantum adversary method of Ambainis [Amb02], which in turn lower bounds .
We now show how Theorem 1 straightforwardly follows from Theorem 2 using two previously known connections between complexity measures of Boolean functions.
Proof of Theorem 1 assuming Theorem 2.
In [Mid04], Midrijanis showed that for all total functions , we have
(4) |
where is the block sensitivity of .
Theorem 2 shows that . Combining the relationship between block sensitivity and approximate degree from [NS94] with the results of [BBC+01], we get that . (This can also be proved directly using the lower bound method in [BBBV97].)
Combining these three inequalities yields for all total Boolean functions . ∎
It remains to show the main result, Theorem 2, which we do in Section 3 using the proof of the sensitivity conjecture by Huang [Hua19] and the spectral adversary method in quantum query complexity [BSS03].
In Section 4, we also use Theorem 2 to prove the quantum analogue of the famous Aanderaa–Karp–Rosenberg conjecture. Briefly, this conjecture is about the minimum possible query complexity of a nontrivial monotone graph property, for graphs specified by their adjacency matrices.
There are variants of the conjecture for different models of computation. For example, the randomized variant of the Aanderaa–Karp–Rosenberg conjecture, attributed to Karp [SW86, Conjecture 1.2] and Yao [Yao77, Remark (2)], states that for all nontrivial monotone graph properties , we have . Following a long line of work, the current best lower bound is due to Chakrabarti and Khot [CK01].
The quantum version of the conjecture was raised by Buhrman, Cleve, de Wolf, and Zalka [BCdWZ99], who observed that the best one could hope for is , because the nontrivial monotone graph property “contains at least one edge” can be decided with queries using Grover’s algorithm [Gro96]. Buhrman et al. [BCdWZ99] also showed that all nontrivial monotone graph properties satisfy . The current best lower bound is , which was credited to Yao in [MSS07]. We resolve this conjecture by showing an optimal lower bound.
Theorem 3.
Let be a nontrivial monotone graph property. Then .
Theorem 3 follows by combining Theorem 2 with a known quadratic lower bound on the degree of monotone graph properties.
1.1 Known relations and separations
Table 1 summarizes the known relations and separations between complexity measures studied in this paper (and more). This is an update to a similar table that appears in [ABK16] with the addition of and . Definitions and additional details about interpreting the table can be found in [ABK16].
For all the separations claimed in the table, we provide either an example of a separating function or a citation to a result that constructs such a function. All the relationships in the table follow by combining the relationships depicted in Figure 1 and the following inequalities that hold for all total Boolean functions:
|
|
|
|
|
|
|
|
|
|
|
||||||||||||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
||||||||||||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
||||||||||||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
||||||||||||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
||||||||||||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
||||||||||||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
||||||||||||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
||||||||||||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
||||||||||||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
||||||||||||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
||||||||||||||||||||||||
|
|
|
|
|
|
|
|
|
|
|
-
•
An entry in the row and column roughly means that for all total functions , and there exists a function with (see [ABK16] for a precise definition).
-
•
The second row of each cell contains an example of a function that achieves the separation (or a citation to an example), where , , , , and -tree is the balanced nand-tree function.
-
•
Cells have a white background if the relationship is optimal and a gray background otherwise.
-
•
Entries with a green background follow from Huang’s result. Entries with a red background follow from this work.
1.2 Paper organization
Section 2 contains some preliminaries required to understand the proof of Theorem 2, which is proved in Section 3. Section 4 gives some background and motivation for the Aanderaa–Karp–Rosenberg conjecture and proves Theorem 3. We end with some open problems in Section 5.
Appendix A describes some properties of , its many equivalent formulations, and its relationship with other complexity measures.
2 Preliminaries
2.1 Query complexity
Let be a Boolean function. Let be a deterministic algorithm that computes on input by making queries to the bits of . The worst-case number of queries makes (over choices of ) is the query complexity of . The minimum query complexity of any deterministic algorithm computing is the deterministic query complexity of , denoted by .
We define the bounded-error randomized (respectively quantum) query complexity of , denoted by (respectively ), in an analogous way. We say an algorithm computes with bounded error if for all , where the probability is over the internal randomness of . Then (respectively ) is the minimum number of queries required by any randomized (respectively quantum) algorithm that computes with bounded error. It is clear that . For more details on these measures, see the survey by Buhrman and de Wolf [BDW02].
2.2 Sensitivity and block sensitivity
Let be a Boolean function, and let be a string. A block is a subset of . We say that a block is sensitive for (with respect to ) if , where is the -bit string that is on bits in and otherwise. We say a bit is sensitive for if the block is sensitive for . The maximum number of disjoint blocks that are all sensitive for is called the block sensitivity of (with respect to ), denoted by . The number of sensitive bits for is called the sensitivity of , denoted by . Clearly, , since is has the same definition as except that the size of the blocks is restricted to . We define and .
2.3 Degree measures
A polynomial is said to represent the function if for all . A polynomial is said to -approximate if for all and for all . The degree of , denoted by , is the minimum degree of a polynomial representing . The -approximate degree, denoted by , is the minimum degree of a polynomial -approximating . We will omit when . We know that , , and .
The degree of as a polynomial is also called the Fourier-degree of , which equals where . In particular, if and only if agrees with the Parity function, , on exactly half of the inputs.
3 Proof of main result (Theorem 2)
Before proving Theorem 2, which is based on Huang’s proof, we reinterpret his result in terms of a new complexity measure of Boolean functions that we call : the spectral norm of the sensitivity graph of .
Definition 4 (Sensitivity Graph , Spectral Sensitivity ).
Let be a Boolean function. The sensitivity graph of , is a subgraph of the Boolean hypercube, where , and . That is, is the set of edges between neighbors on the hypercube that have different -value. Let be the adjacency matrix of the graph . We define the spectral sensitivity of as .
Note that because is a real symmetric matrix, is also the largest eigenvalue of . Since is bipartite, the largest and smallest eigenvalues of are equal in magnitude.
Huang’s proof of the sensitivity conjecture can be divided into two steps:
-
1.
-
2.
The second step is the simple fact that the spectral norm of an adjacency matrix is at most the maximum degree of any vertex in the graph, which equals in this case.
We reprove the first claim, i.e., , for completeness.
Theorem 5 ([Hua19]).
For all Boolean functions , we have .
Proof.
Without loss of generality we can assume that since otherwise we can restrict our attention to a subcube of dimension in which the degree remains the same and the top eigenvalue is at most . Specifically, we can choose any monomial in the polynomial representing of degree and set all the variables not appearing in this monomial to .
For with , let and . By the fact that we know that as otherwise would have correlation with the -variate parity function, implying that ’s top Fourier coefficient is .
We also note that any edge in the hypercube that goes between and is an edge in since it changes the value of . This holds since for such an edge, , we have . Similarly, any edge in the hypercube that goes between and is an edge in .
Assume without loss of generality that . Thus, . We will show that there exists a nonzero vector supported only on the entries of , such that .
Let be the complete -dimensional Boolean Hypercube. That is, and . Take the following signing of the edges of the Boolean hypercube, defined recursively.
(5) |
This gives a new matrix where if and only if is not a neighbor of in the hypercube.
Huang showed that has eigenvalues that equal and eigenvalues that equal . To show this, he showed that by induction on and thus all eigenvalues of must be either or . Then, observing that the trace of is , as all diagonal entries equal , we see that we must have an equal number of and eigenvalues.
Thus, the subspace of eigenvectors for with eigenvalue is of dimension . Using , there must exists a nonzero eigenvector for with eigenvalue that vanishes on . Fix to be any such vector.
Let be the vector whose entries are the absolute values of the entries of . We claim that . To see so, note that for every we have
(6) |
On the other hand, for we have . Thus the norm of is at least times the norm of , and hence . ∎
Finally, we prove that . We rely on a variant of the adversary method introduced by Barnum, Saks, and Szegedy [BSS03] (see also [SS06]).
Definition 6 (Spectral Adversary method).
Let and be matrices of size with entries in satisfying if and only if , and if and only if . Let denote a nonnegative symmetric matrix such that (i.e., the nonzero entries of are a subset of the the nonzero entries of ). Then .
Barnum, Saks, and Szegedy [BSS03] proved that .
Lemma 7.
For all Boolean functions .
Proof.
We prove that . Indeed, one can take to be simply the adjacency matrix of . That is, for any put if and only if in the hypercube and . We observe that . On the other hand, for any , is the restriction of the sensitive edges in direction . The maximum degree in the graph represented by is hence is at most . Thus we have
(7) |
Combining this with [BSS03], we get . ∎
4 Monotone graph properties
The Aanderaa–Karp–Rosenberg conjectures are a collection of conjectures related to the query complexity of deciding whether an input graph specified by its adjacency matrix satisfies a given property in various models of computation.
Specifically, let the input be an -vertex undirected simple graph specified by its adjacency matrix. This means we can query any unordered pair , where , and learn whether there is an edge between vertex and . Note that the input size is .
A function on variables is a graph property if it treats the input as a graph and not merely a string of length . Specifically, the function must be invariant under permuting vertices of the graph. In other words, the function can only depend on the isomorphism class of the graph, not the specific labels of the vertices. A function is monotone (increasing) if for all , , where means for all . For a monotone function, negating a in the input cannot change the function value from to . In the context of graph properties, if the input graph has a certain monotone graph property, then adding more edges cannot destroy the property.
Examples of monotone graph properties include “ is connected,” “ contains a clique of size ,” “ contains a Hamiltonian cycle,” “ has chromatic number greater than ,” “ is not planar”, and “ has diameter at most .” Many commonly encountered graph properties (or their negation) are monotone graph properties. Finally, we say a function is nontrivial if there exist inputs and such that .
The deterministic Aanderaa–Karp–Rosenberg conjecture, also called the evasiveness conjecture,666A function is called evasive if its deterministic query complexity equals its input size. states that for all nontrivial monotone graph properties , . This conjecture remains open to this day, although the weaker claim that was proved over 40 years ago by Rivest and Vuillemin [RV76]. Several works have improved on the constant in their lower bound, and the best current result is due to Scheidweiler and Triesch [ST13], who prove a lower bound of . The evasiveness conjecture has been established in several special cases including when is prime [KSS84] and when restricted to bipartite graphs [Yao88].
The randomized Aanderaa–Karp–Rosenberg conjecture asserts that all nontrivial monotone graph properties satisfy . A sequence of increasingly stronger lower bounds, starting with a lower bound of due to Yao [Yao91], a lower bound of due to King [Kin88], and a lower bound of due to Hajnal [Haj91], has led to the current best lower bound of due to Chakrabarti and Khot [CK01]. There are also two lower bounds due to Friedgut, Kahn, and Wigderson [FKW02] and O’Donnell, Saks, Schramm, and Servedio [OSSS05] that are better than this bound for some graph properties.
The quantum Aanderaa–Karp–Rosenberg conjecture states that all nontrivial monotone graph properties satisfy . This is the best lower bound one could hope to prove since there exist properties with , such as the property of containing at least one edge. In fact, for any it is possible to construct a graph property with quantum query complexity using known lower bounds for the threshold function [BBC+01].
As stated in the introduction, the question was first raised by Buhrman, Cleve, de Wolf, and Zalka [BCdWZ99], who showed a lower bound of . This was improved by Yao to using the technique in [CK01] and Ambainis’ adversary bound [Amb02]. Better lower bounds are known in some special cases, such as when the property is a subgraph isomorphism property, where we know a lower bound of due to Kulkarni and Podder [KP16].
As stated in Theorem 3, we resolve the quantum Aanderaa–Karp–Rosenberg conjecture and show an optimal lower bound. The proof combines Theorem 2 with a quadratic lower bound on the degree of nontrivial monotone graph properties. With some work, the original quadratic lower bound on the deterministic query complexity of nontrivial monotone graph properties by Rivest and Vuillemin [RV76] can be modified to prove a similar lower bound for degree. We were not able to find such a proof in the literature, and instead combine the following two claims to obtain the desired claim.
First, we use the result of Dodis and Khanna [DK99, Theorem 2]:
Theorem 8.
For all nontrivial monotone graph properties, .
Here is the minimum degree of a Boolean function when represented as a polynomial over the finite field with two elements, . We combine this with a standard lemma that shows that this measure lower bounds . A proof can be found in [O’D09, Proposition 6.23]:
Lemma 9.
For all Boolean functions , we have .
5 Open questions
We saw that lower-bounds both , and thus , and also the sensitivity . One might conjecture that lower-bounds all the complexity measures in Figure 1, including .
Conjecture 1.
For all Boolean functions , we have .
If 1 we true, Theorem 5 would imply that , settling a longstanding conjecture posed by Nisan and Szegedy [NS94]. The current best relation between the two measures is . The following conjecture is weaker, and might be easier to tackle first.
Conjecture 2.
For all Boolean functions , we have .
Another longstanding open problem is to show a quadratic relation between deterministic query complexity and block sensitivity:
Conjecture 3.
For all Boolean functions , we have .
If this conjecture were true, it would optimally resolve several relationships in Table 1, and would imply, for example, and .
After settling the best relation between and , the next pressing question is to settle the best relation between and . Recently, the fourth author [Tal19] showed a power separation between and , while the best known relationship is a power relationship (this work). We conjecture that both these bounds can be improved.
Conjecture 4.
For all Boolean functions , we have .
Conjecture 5.
There exists a Boolean function such that .
We note that there are candidate constructions based on the work of [AA18, ABK16, Tal19] that are conjectured to satisfy . In particular, it suffices to prove a conjectured bound on the Fourier spectrum of deterministic decision trees [Tal19] to prove 5.
Finally, for the special case of monotone total Boolean functions , Beals et al. [BBC+01] already showed in 1998 that . It would be interesting to know whether this can be improved, perhaps all the way to .
References
- [AA18] Scott Aaronson and Andris Ambainis. Forrelation: A problem that optimally separates quantum from classical computing. SIAM J. Comput., 47(3):982–1038, 2018. doi:10.1137/15M1050902.
- [ABB+17] Andris Ambainis, Kaspars Balodis, Aleksandrs Belovs, Troy Lee, Miklos Santha, and Juris Smotrovs. Separations in query complexity based on pointer functions. Journal of the ACM, 64(5):1–24, September 2017. doi:10.1145/3106234.
- [ABK16] Scott Aaronson, Shalev Ben-David, and Robin Kothari. Separations in query complexity using cheat sheets. In Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2016, pages 863–876, 2016. doi:10.1145/2897518.2897644.
- [Amb02] Andris Ambainis. Quantum lower bounds by quantum arguments. Journal of Computer and System Sciences, 64(4):750–767, jun 2002. doi:10.1006/jcss.2002.1826.
- [Amb13] Andris Ambainis. Superlinear advantage for exact quantum algorithms. In Proceedings of the 45th ACM Symposium on Theory of Computing (STOC 2013), pages 891–900, 2013. doi:10.1145/2488608.2488721.
- [BBBV97] Charles H. Bennett, Ethan Bernstein, Gilles Brassard, and Umesh Vazirani. Strengths and weaknesses of quantum computing. SIAM Journal on Computing, 26(5):1510–1523, October 1997. doi:10.1137/S0097539796300933.
- [BBC+01] Robert Beals, Harry Buhrman, Richard Cleve, Michele Mosca, and Ronald de Wolf. Quantum lower bounds by polynomials. Journal of the ACM, 48(4):778–797, 2001. doi:10.1145/502090.502097.
- [BCdWZ99] Harry Buhrman, Richard Cleve, Ronald de Wolf, and Christof Zalka. Bounds for small-error and zero-error quantum algorithms. In 40th Annual Symposium on Foundations of Computer Science, pages 358–368, 1999. doi:10.1109/SFFCS.1999.814607.
- [BDW02] Harry Buhrman and Ronald De Wolf. Complexity measures and decision tree complexity: a survey. Theoretical Computer Science, 288(1):21–43, 2002. doi:10.1016/S0304-3975(01)00144-X.
- [BHT17] Shalev Ben-David, Pooya Hatami, and Avishay Tal. Low-sensitivity functions from unambiguous certificates. In 8th Innovations in Theoretical Computer Science Conference, ITCS 2017, volume 67 of LIPIcs, pages 28:1–28:23. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2017. doi:10.4230/LIPIcs.ITCS.2017.28.
- [BSS03] Howard Barnum, Michael E. Saks, and Mario Szegedy. Quantum query complexity and semi-definite programming. In 18th Annual IEEE Conference on Computational Complexity (Complexity 2003), pages 179–193, 2003. doi:10.1109/CCC.2003.1214419.
- [BT17] Mark Bun and Justin Thaler. A nearly optimal lower bound on the approximate degree of AC0. In IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS 2017), pages 1–12, 2017. doi:10.1109/FOCS.2017.10.
- [CK01] Amit Chakrabarti and Subhash Khot. Improved lower bounds on the randomized complexity of graph properties. In Automata, Languages and Programming, pages 285–296, 2001. doi:10.1007/3-540-48224-5_24.
- [DK99] Yevgeniy Dodis and Sanjeev Khanna. Space-time tradeoffs for graph properties. In Automata, Languages and Programming, pages 291–300, 1999. doi:10.1007/3-540-48523-6_26.
- [FKW02] Ehud Friedgut, Jeff Kahn, and Avi Wigderson. Computing graph properties by randomized subcube partitions. In Randomization and Approximation Techniques in Computer Science, pages 105–113, 2002. doi:10.1007/3-540-45726-7_9.
- [GJPW18] Mika Göös, T. S. Jayram, Toniann Pitassi, and Thomas Watson. Randomized communication versus partition number. ACM Transactions on Computation Theory, 10(1):1–20, January 2018. doi:10.1145/3170711.
- [GL13] Gene H. Golub and Charles F. Van Loan. Matrix computations. Johns Hopkins University Press, Baltimore, 2013. URL: https://jhupbooks.press.jhu.edu/title/matrix-computations.
- [GPW18] Mika Göös, Toniann Pitassi, and Thomas Watson. Deterministic communication vs. partition number. SIAM Journal on Computing, 47(6):2435–2450, 2018. doi:10.1137/16M1059369.
- [Gro96] Lov K. Grover. A fast quantum mechanical algorithm for database search. In Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, STOC 1996, pages 212–219, 1996. doi:10.1145/237814.237866.
- [GSS13] Justin Gilmer, Michael Saks, and Srikanth Srinivasan. Composition limits and separating examples for some Boolean function complexity measures. In Proceedings of 2013 IEEE Conference on Computational Complexity (CCC 2013), pages 185–196, June 2013. doi:10.1109/CCC.2013.27.
- [Haj91] Péter Hajnal. An lower bound on the randomized complexity of graph properties. Combinatorica, 11(2):131–143, jun 1991. doi:10.1007/bf01206357.
- [Hua19] Hao Huang. Induced subgraphs of hypercubes and a proof of the sensitivity conjecture. Annals of Mathematics, 190(3):949–955, 2019. doi:10.4007/annals.2019.190.3.6.
- [Khr71] V. M. Khrapchenko. Method of determining lower bounds for the complexity of P-schemes. Mathematical Notes of the Academy of Sciences of the USSR, 10(1):474–479, 1971. doi:10.1007/bf01747074.
- [Kin88] Valerie King. Lower bounds on the complexity of graph properties. In Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, STOC ’88, page 468–476. Association for Computing Machinery, 1988. doi:10.1145/62212.62258.
- [Kou93] Elias Koutsoupias. Improvements on Khrapchenko’s theorem. Theoretical Computer Science, 116(2):399–403, aug 1993. doi:10.1016/0304-3975(93)90330-V.
- [KP16] Raghav Kulkarni and Supartha Podder. Quantum Query Complexity of Subgraph Isomorphism and Homomorphism. In 33rd Symposium on Theoretical Aspects of Computer Science (STACS 2016), volume 47 of Leibniz International Proceedings in Informatics (LIPIcs), pages 48:1–48:13. Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik, 2016. doi:10.4230/LIPIcs.STACS.2016.48.
- [KSS84] Jeff Kahn, Michael Saks, and Dean Sturtevant. A topological approach to evasiveness. Combinatorica, 4(4):297–306, dec 1984. doi:10.1007/bf02579140.
- [KT16] Raghav Kulkarni and Avishay Tal. On fractional block sensitivity. Chicago Journal of Theoretical Computer Science, 2016(8), July 2016. doi:10.4086/cjtcs.2016.008.
- [LLS06] Sophie Laplante, Troy Lee, and Mario Szegedy. The quantum adversary method and classical formula size lower bounds. computational complexity, 15(2):163–196, jun 2006. doi:10.1007/s00037-006-0212-7.
- [LNS20] Sophie Laplante, Reza Naserasr, and Anupa Sunny. Sensitivity lower bounds from linear dependencies. Technical Report TR20-002, Electronic Colloquium on Computational Complexity (ECCC), January 2020. URL: https://eccc.weizmann.ac.il/report/2020/002/.
- [Mid04] Gatis Midrijanis. Exact quantum query complexity for total Boolean functions. arXiv preprint quant-ph/0403168, 2004. arXiv:quant-ph/0403168.
- [MSS07] Frédéric Magniez, Miklos Santha, and Mario Szegedy. Quantum algorithms for the triangle problem. SIAM Journal on Computing, 37(2):413–424, 2007. doi:10.1137/050643684.
- [Nis91] Noam Nisan. CREW prams and decision trees. SIAM J. Comput., 20(6):999–1007, 1991. doi:10.1137/0220062.
- [NS94] Noam Nisan and Mario Szegedy. On the degree of Boolean functions as real polynomials. Computational Complexity, 4(4):301–313, dec 1994. doi:10.1007/BF01263419.
- [NW95] Noam Nisan and Avi Wigderson. On rank vs. communication complexity. Combinatorica, 15(4):557–565, 1995. doi:10.1007/BF01192527.
- [O’D09] Ryan O’Donnell. Analysis of Boolean Functions. Cambridge University Press, 2009. doi:10.1017/cbo9781139814782.
- [OSSS05] Ryan O’Donnell, Michael Saks, Oded Schramm, and Rocco A. Servedio. Every decision tree has an influential variable. In 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS’05), pages 31–39, 2005. doi:10.1109/SFCS.2005.34.
- [Rub95] David Rubinstein. Sensitivity vs. block sensitivity of Boolean functions. Combinatorica, 15(2):297–299, 1995. doi:10.1007/BF01200762.
- [RV76] Ronald L. Rivest and Jean Vuillemin. On recognizing graph properties from adjacency matrices. Theoretical Computer Science, 3(3):371 – 384, 1976. doi:10.1016/0304-3975(76)90053-0.
- [SS06] Robert Spalek and Mario Szegedy. All quantum adversary methods are equivalent. Theory of Computing, 2(1):1–18, 2006. doi:10.4086/toc.2006.v002a001.
- [ST13] Robert Scheidweiler and Eberhard Triesch. A lower bound for the complexity of monotone graph properties. SIAM Journal on Discrete Mathematics, 27(1):257–265, 2013. doi:10.1137/120888703.
- [SW86] Michael Saks and Avi Wigderson. Probabilistic Boolean decision trees and the complexity of evaluating game trees. In Proceedings of the 27th Annual Symposium on Foundations of Computer Science, SFCS ’86, page 29–38, 1986. doi:10.1109/SFCS.1986.44.
- [Tal13] Avishay Tal. Properties and applications of Boolean function composition. In Proceedings of the 4th Conference on Innovations in Theoretical Computer Science, ITCS ’13, pages 441–454, 2013. doi:10.1145/2422436.2422485.
- [Tal19] Avishay Tal. Towards optimal separations between quantum and randomized query complexities. arXiv, 2019. arXiv:1912.12561.
- [Yao77] Andrew Chi-Chih Yao. Probabilistic computations: Toward a unified measure of complexity. In 18th Annual Symposium on Foundations of Computer Science (SFCS 1977), pages 222–227, 1977. doi:10.1109/SFCS.1977.24.
- [Yao88] Andrew Chi-Chih Yao. Monotone bipartite graph properties are evasive. SIAM Journal on Computing, 17(3):517–520, 1988. doi:10.1137/0217031.
- [Yao91] Andrew Chi-Chih Yao. Lower bounds to randomized algorithms for graph properties. Journal of Computer and System Sciences, 42(3):267 – 287, 1991. doi:10.1016/0022-0000(91)90003-N.
Appendix A Properties of the measure
We show that the measure satisfies various elegant properties. First, it can be defined in multiple ways, one of which was introduced by Koutsoupias back in 1993 [Kou93]. It also has a formulation as a special case of the quantum adversary bound and hence can be expressed as as a semidefinite program closely related to that of the quantum adversary bound. Due to this characterization, can be viewed as both a maximization problem and a minimization problem. These equivalent formulations are described in Section A.1.
Second, we show that , which was already observed by Laplante, Lee, and Szegedy [LLS06] (though we give a slightly different proof). Finally, we show lower bounds on and an optimal quadratic separation between and .
A.1 Equivalent formulations
Theorem 10.
For all Boolean functions , we have
(8) |
where the measures , , and are defined below. Furthermore, itself has several equivalent formulations: .
We now define all these measures before proving this theorem.
Koutsoupias complexity .
For a Boolean function , let , and let . Let be the matrix with rows and columns labeled by and respectively, with if the Hamming distance of and is , and otherwise. Koutsoupias [Kou93] observed that is a lower bound on formula size, for every such choice of and . We define to be the maximum value of over choices of and . Thus is a lower bound on the formula size of .
Single-bit positive adversary .
We define as a version of the adversary bound where we are only allowed to put nonzero weight on input pairs where and the Hamming distance between and is exactly . We will define in terms of the spectral adversary version, which we also denote by . is defined as the maximum of
(9) |
over matrices of a special form. We require satisfy the following: (1) its entries are nonnegative reals; (2) its rows and columns are indexed by ; (3) whenever ; (4) whenever the Hamming distance of and is not ; and (5) is not all . In the above expression, refers to the Hadamard (entrywise) product, is the domain of , and is the -valued matrix with if and only if .
Single-bit negative adversary .
We define using the same definition as above, except that the matrix is allowed to have negative entries. Note that since this is a relaxation of the conditions on , we clearly have .
Single-bit strong weighted adversary .
We define as a single-bit version of the strong weighted adversary method from [SS06]. For this definition, we say a weight function is feasible if it is symmetric (i.e., ) and if it satisfies the conditions on above (i.e., it places weight on a pair unless both and the Hamming distance between and is ). We view such a feasible weight scheme as the weights on a weighted bipartite graph, where the left vertex set is and the right vertex set is . We let denote the weighted degree of in this graph, i.e., the sum of the weights of its incident edges. Then is defined as the maximum, over such feasible weight schemes , of
(10) |
Here ranges over , ranges over , and denotes the string with bit flipped.777Readers familiar with the adversary bound should note that this definition is analogous a weighted version of Ambainis’s original adversary method; in the original method, the denominator was the geometric mean of (a) the weight of the neighbors of with disagree with at , and (b) the weight of the neighbors of which disagree with at ; but in our case, both (a) and (b) are simply , since is the only string that disagrees with on bit and is connected to in the bipartite graph.
Single-bit minimax adversary .
Unlike the other forms, we define as a minimization problem rather than a maximization problem. We say a weight function is feasible if for all with and Hamming distance , we have , where is the bit on which and disagree. is defined as the minimum, over such feasible weight schemes , of
(11) |
Semidefinite program version .
We define to be the optimal value of the following semidefinite program.
(12) |
Here and are variable matrices with rows and columns indexed by , is the -matrix with if and only if both and have Hamming distance , and is the -matrix with if and only if .
We now prove Theorem 10.
Proof.
Recall that in the definition of , we picked and and defined the resulting matrix . Since the spectral norm of a submatrix is always smaller than or equal to the spectral norm of the original matrix, we can always assume without loss of generality that and . Then for the resulting matrix with rows and columns indexed by and respectively. Now, recall that was the adjacency matrix of the graph , which has an edge between and if and the Hamming weight between and is . The rows and columns of are each indexed by . By rearranging them, we can make be block diagonal with blocks equal to and . From there it follows that , so .
Next, recall that is defined as the maximum ratio over valid choices of . Note that since can only be nonzero if and disagree on one bit, is nonzero only on pairs which disagree exactly on bit . In other words, if denotes the -valued matrix with if and only if and disagree on bit and only on , then is nonzero only in entries where is . Now, note that is a permutation matrix. Hence, by rearranging the rows and columns of , we can get it to be diagonal. This means is the maximum entry of , and hence is the maximum entry of . It follows that is the maximum of over feasible matrices with , where . This argument also holds for , which is the maximum of over feasible (possibly negative) matrices with .
Next, observe that negative weights never help for maximizing : indeed, if we had with negative entries maximizing , then we would have vectors and with and ; but then replacing and with their entry-wise absolute values, and replacing with its entry-wise absolute value , we clearly get that . However, , so remains feasible. This means we can always take the maximizing matrix to be nonnegative, so . We can similarly assume that the unit vectors and maximizing are nonnegative.
Finally, consider the maximizing matrix and the maximizing unit vectors and , all nonnegative, and satisfying . Note that the expression is nondecreasing in the entries of , since everything is nonnegative. Hence to maximize , we can always take every nonzero entry of to be , since this maintains . In other words, the matrix maximizing will always simply be , and hence is always exactly equal to .
It remains to show that . The proof of this essentially follows the arguments in [SS06] for the regular positive adversary, though some steps are a little simpler. To start, we’ve seen that . Since is symmetric, we have for some unit vector , which we’ve established is nonnegative; this vector is also an eigenvector, so . Consider the weight scheme . Then . Hence if , we have
(13) |
This means . In the other direction, let be a feasible weight scheme for , let , and let , where . Then , and
(14) |
Hence . On the other hand, we have . This means that the ratio equals , which is ; thus .
Next we examine . Consider a solution to this semidefinite program and define , where is defined as and is defined by when and otherwise. Recall that is diagonal and that for all . Since positive semidefinite matrices are symmetric, must be symmetric for all , so is symmetric. Moreover, the diagonal of is all zeros, so we must have . Further, if for some , we must have the corresponding row and column of be all zeros. If we let and be and with the all-zero rows and columns deleted, then it is clear that if and only if . Defining as with those rows and columns deleted and as with those entries deleted, we have . Observe that if and only if for all vectors , which is if and only if for all vectors (since we have ). This, in turn, is equivalent to . Since , this is equivalent to , which is in turn equivalent to . Since and we are maximizing , it never helps for to have nonzero entries in places where is . Hence we can assume without loss of generality that , which means the constraint becomes , where we defined . We thus have . On the other hand, letting , we have
(15) |
Hence . The reduction in the other direction works similarly: start with an adversary matrix with , and let be its principle eigenvector. Then set and . Then , which implies that . We also have , , and .
Finally, we handle . To do so, we first take the dual of the semidefinite program for . This dual has the form
(16) |
where the variables are (a scalar) and matrices , each with rows and columns indexed by . Strong duality follows since when is not all zeros, and the semidefinite program in has a strictly feasible solution (just take to equal for a small enough positive constant , and take ). This means the optimal solution of the minimization problem above equals . It remains to show that this optimal solution also equals .
Let and be a feasible solution to the semidefinite program above. Since , we have for some matrix . Define . Note that we also have . Then by Cauchy–Schwarz, . If and are such that , then they disagree in only one bit , and hence for that and for all . Since we have , we conclude that for all such pairs , we have on the bit where and differ; hence the weight scheme is feasible. Furthermore, for any , . Hence is at most the optimal value of this semidefinite program.
In the other direction, consider a feasible weight scheme , and define . Then , where we treat as a vector; hence . Moreover, , and for a pair with , there is some which is the unique bit they disagree on, and hence ; but this means that , and so . Finally, , which means that , as desired. ∎
A.2 Upper bounds
We now show a slightly better upper bound on , that it is upper bounded by the geometric mean of the 0-sensitivity and 1-sensitivity, which can be a better upper bound than .
We provide two proofs of this. The first uses the formulation and uses a linear algebra argument about norms. This proof is due to Laplante, Lee, and Szegedy [LLS06], who observed this about the measure .
To describe this proof, we briefly need to describe some matrix norms. For a vector , the -norm for a positive integer is defined as . We also define . Note that is simply the sum of the absolute values of all the entries of the vector.
Similarly, for a matrix , we define the induced -norm of to be
(17) |
The spectral norm is the induced -norm . The 1-norm is simply the maximum sum of absolute values of entries in any column of the matrix. The -norm is the maximum sum of absolute values of entries in any row of the matrix.
Lastly, we need a useful relationship between these norms sometimes called Hölder’s inequality for induced matrix norms (see [GL13, Corollary 2.3.2] for a proof):
Proposition 11.
For all matrices , we have .
We can now prove the upper bound:
Lemma 12.
For all (possibly partial) functions , we have .
Proof.
We know that and is a matrix of the form if we rearrange the rows and columns so that all -inputs come first and are followed by -inputs, since only connects inputs with different -values. Thus we have
(18) |
where we used Hölder’s inequality (Proposition 11) and the fact that the maximum row and column sum of are precisely and , respectively. ∎
Our second proof of this claim uses the formulation which yields an arguably simpler proof.
Lemma 13.
For all (possibly partial) functions , we have .
Proof.
Using the version of , set if , and set if . Then if and differ in a single bit , we clearly have . On the other hand, for -inputs , and analogously for -inputs . ∎
Using this better bound on and Huang’s result, we also get that for all total Boolean functions ,
(19) |
This result was also recently observed by Laplante, Naserasr, and Sunny [LNS20]. Unlike their proof, the following uses Huang’s theorem in a completely black-box way.
Proposition 14.
Assume that for all total Boolean functions . Then we also have .
Proof.
Let and . We know that by assumption. Let be the AND function on bits composed with the OR function on bits. Clearly and . Furthermore, because the function is monotone, the sensitive bits for a -input are bits set to , and the sensitive bits for a -input are bits set to . This means that composing this function with with yield a function where the one-sided sensitivity will be upper bounded by the product of one-sided sensitivity of the individual functions. Hence for all , we have
(20) |
Using the assumption on the function , we get
(21) |
Finally, it is well known that (see, e.g., [Tal13]), and hence , which implies . ∎
A.3 Lower bounds
Finally, we prove some lower bounds on .
Lemma 15.
For all (possibly partial) functions , .
Proof.
Consider any input with sensitivity . This means has neighbors on the hypercube with different value. The sensitivity graph restricted to these inputs is a star graph centered at . The spectral norm of the adjacency matrix of the star graph on vertices is . Since the spectral norm of is lower bounded by that of a submatrix, we have . ∎
This relationship is tight for the function which has and . Although has unbalanced sensitivities, with and , there are functions with and . One example of such a function is . Another example of such a function with a quadratic gap between and is the function that is if and only if the input string has Hamming weight . This function has since the all zeros string is fully sensitive and since every Hamming weight string is also fully sensitive. But we know that this problem can be solved by Grover’s algorithm with queries, and hence .
We can also lower bound using the relationship between spectral norm and Frobenius norm. We have for all matrices that [GL13, Eq. (2.3.7)], where . For the sensitivity graph of , is just the average sensitivity.
Lemma 16.
For all (possibly partial) functions , .