SlideShare une entreprise Scribd logo
1  sur  40
Interactive Proof Systems and
    An Introduction to PCP
               M. Reza Rahimi,
       Sharif University of Technology,
                Tehran, Iran.
2




    Outline
•   Introduction
•   Another Way to Look at NP
•   Interactive Proof Systems (IP)
•   Arthur-Merlin Proof Systems (AM)
•   IP=PSPACE
•   Probabilistically Checkable Proofs (PCPs)
•   Conclusion
3




   Introduction
• One of the most important events in the
  complexity theory is Interactive Proof Systems.
• It sheds light on the characteristic of some
  complexity classes.
• It has also influenced on some practical areas
  such as Cryptography and Algorithm Design.
• Before presentation of technical points, let’s
  start with the source of its main idea and its
  philosophy.
4



• Computation is basically a physical fact. This is
  the origin of Church-Turing-Markov thesis,
  which implies that:

    A Partial function is computable (in any accepted informal
    sense) if and only if it is computable by some binary Turing
                                machine.




  Any Physical Process
       in Universe                             Turing Machine
                                                   Program
5




• So in this view point, efficient solving of a special
  problem needs its efficient model of computation.
• Let’s see what happens in human society.
• Men communicate through languages with each
  other.
• Consider the following set.

        Σ={ x | all symbols that we know}
        ={A, ⊕∈ ∫∫∫ , ζ ,...},
              , ,
                ∗
        Farsi ⊂Σ ,
                  ∗
        English ⊂Σ ,....
6



• Remember your childhood. When you was curious
  and want to underestand something. What did
  you do?

       Child::(Verifier)                           Dad::(Prover)
                    1. Daddy, Can I play with fire?

                                   2. No.

                                  3. Why?

                        4. Because You may be burnt.

                        5. What will happen, if I burn?

               6. You will go to hospital and Dr injects you.


                 Ok!
7




• Let’s model this process according to our
  knowledge.
            T = {x | All true statements in the universe}.
            T ⊆ Σ∗ ,
            Input :: x =" Playing with fire is good."
            Query :: x ∈T, x ∉T ?


• So, Interaction is one of the instinctive ways that
  human being solves its problems.
• It is called Social Computational Model.
• We will show that in another way NP, IP,…, are
  abstract models of this model of computation.
8




          IP, NP, AM, MA,MIP,
       PCP,…. Computational Models.




Social Computational Models.
9




•   In society we have some general strategies to
    interact with People.
      •   We start from general questions to detailed
          questions.
      •   If we want to ask all the questions it will be very
          time consuming so we select some questions.


          We will use these techniques for our
                mathematical protocols.
10




      Another Way to Look at NP
• We know the following definition about NP:
   L ∈ NP ⇔ ∃V(.,.) ∈ P, ∃P(.), ∀x ∈ Σ ∗ ,
               1. x ∈ L ⇒ ∃y, y ≤ P( x ) and V(x, y) accepts.
               2. x ∉ L ⇒ ∀y, y ≤ P( x ) and V(x, y) rejects.

• We can look at this process like this:

                               y
                 Prover                  Verifier


                     x                        x
11



•   For prover we don’t consider any limit in time
    or space or computation power.
•   But verifier is deterministic polynomial time
    machine.
•   In this model of computation NP is defined
    like this:
      L ∈ NP ⇔ ∃ Prover, ∃ (Polynomia l Time Verifier) V, ∀x ∈ Σ ∗ ,
                1. x ∈ L ⇒ Prover has a strategy t o convince Verifier.
                  2. x ∉ L ⇒ Prover has no strategy t o convince Verifier.

•   So NP is single message interaction. What
    will happen if we
           –   Allow multiple rounds of interactions,
           –   Verifier can be randomized polynomial time machine?
12


• NP+ Multiple Round Interaction:

                        Y1
                        Y2
          Prover        Y3      Verifier
                        Yn


              x     Y1Y2Y3…Yn
                                    x


• According to the above it is obvious that
       NP=NP+Multiple Round of Interaction.
• NP+ Randomized Polynomial Time Verifier:

                         y        Randomized
           Prover               Polynomial Time
                                    Verifier

              x                            x
13

• The languages recognized by the previous model
  are in class MA.
                Conjecture: MA=NP.
• So, It seems that only using one feature will not
  make NP machine stronger. What will happen when
  we add both features?
                    Y1
                    Y2       Randomized
                    Y3
          Prover           Polynomial Time
                    Yn         Verifier

             x                     x
• This machine will lead us to the Interactive Proof
  Systems.
14


  Interactive Proof Systems (IP)
• IP Model:
                  q1
                                           x
                  a1
                  q2       Polynomial
   x
         Prover               Time
                  ai        Verifier
                                        Random String

                       OK or NO
15




• IP Class Definition:
        L ∈ IP ⇔ ∃V ∈ Probabilistic Polynomial Time TM, ∀x ∈ Σ ∗
                                                      2
                        1. x ∈ L ⇒ ∃P Pr{ V ↔ P ok} ≥ .
                                                      3
                                                      1
                        2. x ∉ L ⇒ ∀P Pr{ V ↔ P ok} ≤ .
                                                      3

• Note that Prover can not see the random string
  of verifier, so Verifier has Private Coin.
• Round of Interaction r(n) =The total number of
  messages exchanged.
• IP[K]::K round of interaction.
16




• Example: Graph Non-Isomorphism

  NONISO = { G1 , G2     G 1 and G 2 are not isomorphic graphs.}

  ISO = { G1 , G2   G 1 and G 2 are isomorphic graphs.}

• It is obvious that ISO є NP so NONISO є CO-NP.
• But we don’t know if it is NP-Complete or not.
       These two are very important in complexity theory.
       We know that it is in IP.
       It is proved that if ISO є NP-Complete then PH collapses.
17




Protocol: Private-Coin Graph Non-Isomorphism

V ∴Pick i ∈{1,2} uniformly randomly. Randomly permute the vertices of G i to get new
graph call it H. Send H to P.
P ∴Show that which of G1 or G 2 was the source of permutation. send its index to verifier.
V ∴Yes if i = j else No.



                      x ∈ NONISO ⇒ Pr{V ↔P Yes} =1
                                                 1
                      x ∉ NONISO ⇒Pr{V ↔P Yes} ≤
                                                 2
18


Arthur-Merlin Proof Systems (AM)
• AM Model:
                                q1
                                                                x
                                a1
                                q2                 Arthur
  x                                               Polynomial
       Merlin
                                                     Time
                                 ai                Verifier Random String


                                          OK or NO
      qi , ai = O( Poly ( x ),
      Random String = O( Poly ( x ),
      Number of Exchanged Messages = O( Poly ( x ),
      A( R, x, q1 , a1 , q 2 ,..., ai ) = qi +1 , Yes or No.
      M ( R, x, q1 , a1 , q 2 ,..., qi ) = ai .
19




• AM Class Definition:

       L ∈ AM ⇔ ∃ A ∈ Probabilistic Polynomial Time TM, ∀x ∈ Σ ∗
                                                     2
                     1.x ∈ L ⇒ ∃M, Pr{ A ↔ M ok} ≥ .
                                                     3
                                                     1
                     2.x ∉ L ⇒ ∀M, Pr{ A ↔ M ok} ≤ .
                                                     3


• Note that Prover can see the random string of
  verifier, so Verifier has Public Coin.
• Round of Interaction r(n) =The total number of
  messages exchanged.
• AM[K]=K round of interaction.
20




• It seems that the pervious protocol doesn’t work
  for this machine.
• If Merlin can see random bits he always answers
  correctly.
• But it is proved that NONISO є AM[2].

         Theorem:: (Goldwasser, Sipser)
              NONISO є AM[2].
21



      Some Results About IP and AM Relation

•   IP[K] ⊆ AM[k+2] for all Constants k.
•   For constant k ≥ 2 we have AM[K]=AM[2].
•   So we can move all of Arthur’s messages
    to beginning of interaction:
           AMAMAM…AM = AAMMAM…AM
               … = AAA…AMMM…M
22




IP=PSPACE ( Shamir’s Theorem)
• We describe it in two phase.

IP ⊆PSPACE
• Proof Idea:
   – Given any Verifier V , We will compute a using Polynomial
     Space machine.

                ∀x ∈ Σ* , V ⇒ a = max Pr{ V ↔ P = Ok}
                                  
                                   P
23




PSPACE ⊆ IP
• We need only to design an IP protocol for TQBF.
• Before presentation of this protocol Lets review
  some basic concepts.
Arithmetization:
Arithmetization

     The usefulness of this technique is that we can extract more
     property from boolean expressions.


                   Boolean Domain                Polynomial Domain
                   Φ ( x1 , x2 ,..., xm )   ⇔     P ( x1 , x2 ,..., xm )
                    x∧ y                    ⇔     x.y
                   ¬x                       ⇔ 1− x
                    x∨ y                    ⇔ 1-( 1-x)( 1-y).
24



Example:
Example

           Φ( x1 , x2 , x3 ) = x1 ∨ x2 ∨ ¬x3 ↔
           (1 − (1 − x1 )(1 − x2 )) ∨ (1 − x3 ) →
           (1 − (1 − (1 − (1 − x1 )(1 − x2 )))(1 − (1 − x3 )) →
           (1 − (1 − x1 )(1 − x2 )) x3 →
           P ( x1 , x2 , x3 ) = (1 − (1 − x1 )(1 − x2 )) x3 .
           { x1 ∨ x2 ∨ ¬x3 ⇔ (1 − (1 − x1 )(1 − x2 )) x3 }
Lemma:
Lemma

           Φ( x1 , x2 ,..., xm ) = 0 ⇔ P( x1 , x2 ,..., xm ) = 0.
           Φ( x1 , x2 ,..., xm ) = 1 ⇔ P( x1 , x2 ,..., xm ) = 1.
           ∴
             ∑ ∑
           x1∈{0 ,1} x2 ∈{0 ,1}
                                  ...     ∑ P( x , x ,..., x
                                        xm ∈{0 ,1}
                                                     1   2     m   )=k

           k = Number of Assignment of Φ.
25




• To catch general idea of the TQBF protocol lets
  review a protocol for following language.

   # SAT = {< Φ , k >: Φ is a cnf - formula with exactly k satisfying assignments}.
  Theorem ::
                  # SAT ∈ IP.


Main Idea :
• Lets investigate the problem intuitively.
26




• Think that we are Verifier and want to know that
  if x ∈ SAT is true or not.
• We usually start from General questions to
  detailed questions.
• If the prover is trustful he/she will answer all
  the questions correctly.
• If not we will catch him/her with detailed
  questions.
• Lets review some basic definition.
27


Φ( x1 , x2 ,..., xm ) → P( x1 , x2 ,..., xm )
f i ( x1 , x2 ,..., xi ) =        ∑           ∑
                              xi +1∈ 0 ,1} xi +2 ∈ 0 ,1}
                                    {             {
                                                           ...     ∑ P( x , x ,..., x
                                                                 xm ∈ 0 ,1}
                                                                     {
                                                                              1   2     m   )

= Number of satisfying assignment when input is x1 , x2 ,..., xi .


Example :
Φ( x1 , x2 ) → P ( x1 , x2 )
f 0 () =     ∑ ∑ P( x , x ) =P(0,0) + P(0,1) + P(1,0) + P(1,1).
           x1∈ 0 ,1} x2 ∈ 0 ,1}
              {          {
                                    1     2


f1 ( x1 ) =     ∑ P( x , x ) =P( x ,0) + P( x ,1).
              x2 ∈ 0 ,1}
                  {
                             1     2              1                      1


f 2 ( x1 , x2 ) = P ( x1 , x2 ).
f 0 () :: Number of satisfying assignment.


In General we have :
f i ( x1 , x2 ,..., xi ) = f i +1 ( x1 , x2 ,..., xi ,0) + f i +1 ( x1 , x2 ,..., xi ,1).
28


Prover   Verifier
29




• It is obvious that the foregoing Protocol is very
  large ( exponential message size).
• So we must use randomness for shortening the
  messages and protocol.
• In each phase, the message will be doubled. So we must
                    reduce this phase.
30
Prover   Verifier
31




Proof Idea:

• If x ∈ # SAT then trusted prover always answer
  correctly.
• Else devoius prover can cheat verifier with low
  probability in each phase. It means that:
                                   d   n
               Pr{ f i = f i } ≤     ≤ n
                                   q 2
32




• Now it is the time to revise the last protocol
  for TQBF.
• We know that:
     ∃ x1∀ x2 ...∀ xm Φ ( x1 , x2 ,..., xm ) ∈ TQBF ⇔    ∑ ∏
                                                        x1∈{0,1} x2 ∈{0 ,1}
                                                                              ...   ∏ P( x , x ,..., x
                                                                                xm ∈{0,1}
                                                                                            1   2        m   )0



 • At first glance it seems when we see ∏
   instead of addition we use multiplication.
 • But it may increase the size of the polynomial
   exponentially.
33




• So, we use clever idea for overcoming this
  problem.
    Linearization Operator R ::
    Rx1 [ P(x1 , x 2 ,..., x m )] ≡ (1 − x1 )P(0, x 2 ,..., x m ) + (x1 )P(1, x 2 ,..., x m )

• Now we use this operator for TQBF.

     ∃ x1∀ x2 ...∀ xm Φ ( x1 , x2 ,..., xm ) ⇒ ∃ x1 Rx1∀ x2 Rx1Rx2 ...∀ xm Φ ( x1 , x2 ,..., xm )
34




  Probabilistically Checkable Proofs
                (PCPs)
• Again, lets review the definition of NP class.

          L ∈ NP ⇔ ∃V(.,.) ∈ P, ∃P(.), ∀x ∈ Σ∗ ,
                      1. x ∈ L ⇒ ∃y, y ≤ P( x ) and V(x, y) accepts.
                      2. x ∉ L ⇒ ∀y, y ≤ P( x ) and V(x, y) rejects.



• So, if the input string is the member of
  language, verifier can access the whole bits of
  the polynomial size proof.
35




• What will happen if we restrict the verifier to
  access the subset of the proof but not all of it?
• It seems that in this case the verifier will lose its
  power. (Maybe)
• If we empower the verifier with randomization
  what will happen?

 • The answers of these questions will lead us to
                  PCP machine.
36




   O(q(n)): The number of query
   about the bits of the proof.                      x
                                  Polynomial Time
                                   Randomized O(r(n)) :Length
                                      Verifier    Of random string



Whole Proof
37



          Definition :
          PCP(r(n), q(n)) is the class of all languages accepted
          by an (r(n), q(n)) - restricted verifier V in the following
          sense :
                         x ∈ L ⇒ ∃y, Pr[V y (x) = 1] = 1.
                                                        1
                         x ∉ L ⇒ ∀y, Pr[V y (x) = 1] ≤ .
                                                        2


Some Points:
• We don’t have any restriction on the size of the
   proof.
• If the Verifier uses its history for the
   questioning, it is called adaptive else
   nonadaptive.
38




Some Clear Facts:

       NP = PCP(0, Poly(n)) =  PCP(0, n c ).
                              c 0

       CoRP = PCP(Poly(n),0).



And this is one of the most important theorems
that describes NP.

       PCP Theorem ::
                 NP = PCP(Log n,1)
39




•   Hastaad proved Stronger result : NP Equals
    PCP with O(logn) random bits and Exactly 3
    query bits.
•   PCP technique resaults into finding optimum
    band for NP-Hard optimization problems, such
    as MAX-3SAT and MAX-CLIQUE.
40




    Conclusion
•    In this talk I focused on general ideas of IP and
     PCP.
•    It seems that these results and techniques will
     have many things to say, especially in the area of
     complexity.
•    In future, we would see many wonderful results.


                    The END

Contenu connexe

Tendances

Modul 8 - Jaringan Syaraf Tiruan (JST)
Modul 8 - Jaringan Syaraf Tiruan (JST)Modul 8 - Jaringan Syaraf Tiruan (JST)
Modul 8 - Jaringan Syaraf Tiruan (JST)ahmad haidaroh
 
Knapsack problem algorithm, greedy algorithm
Knapsack problem algorithm, greedy algorithmKnapsack problem algorithm, greedy algorithm
Knapsack problem algorithm, greedy algorithmHoneyChintal
 
Synchronous counters
Synchronous countersSynchronous counters
Synchronous countersLee Diaz
 
Praktik dengan matlab
Praktik dengan matlabPraktik dengan matlab
Praktik dengan matlabSyafrizal
 
NEURAL NETWORK Widrow-Hoff Learning Adaline Hagan LMS
NEURAL NETWORK Widrow-Hoff Learning Adaline Hagan LMSNEURAL NETWORK Widrow-Hoff Learning Adaline Hagan LMS
NEURAL NETWORK Widrow-Hoff Learning Adaline Hagan LMSESCOM
 
Support Vector Machine.pptx
Support Vector Machine.pptxSupport Vector Machine.pptx
Support Vector Machine.pptxEri Zuliarso
 
Data mining 5 klasifikasi decision tree dan random forest
Data mining 5   klasifikasi decision tree dan random forestData mining 5   klasifikasi decision tree dan random forest
Data mining 5 klasifikasi decision tree dan random forestIrwansyahSaputra1
 
Spectral clustering
Spectral clusteringSpectral clustering
Spectral clusteringSOYEON KIM
 
Splay Tree Presentation Slides
Splay Tree Presentation SlidesSplay Tree Presentation Slides
Splay Tree Presentation SlidesMuhammad Shahbaz
 
Feedforward neural network
Feedforward neural networkFeedforward neural network
Feedforward neural networkSopheaktra YONG
 
Radial Basis Function Network (RBFN)
Radial Basis Function Network (RBFN)Radial Basis Function Network (RBFN)
Radial Basis Function Network (RBFN)ahmad haidaroh
 
Combinational circuits
Combinational circuitsCombinational circuits
Combinational circuitsSARITHA REDDY
 

Tendances (20)

Modul 8 - Jaringan Syaraf Tiruan (JST)
Modul 8 - Jaringan Syaraf Tiruan (JST)Modul 8 - Jaringan Syaraf Tiruan (JST)
Modul 8 - Jaringan Syaraf Tiruan (JST)
 
ID3 ALGORITHM
ID3 ALGORITHMID3 ALGORITHM
ID3 ALGORITHM
 
Knapsack problem algorithm, greedy algorithm
Knapsack problem algorithm, greedy algorithmKnapsack problem algorithm, greedy algorithm
Knapsack problem algorithm, greedy algorithm
 
Synchronous counters
Synchronous countersSynchronous counters
Synchronous counters
 
Logistic regression
Logistic regressionLogistic regression
Logistic regression
 
Backtracking
BacktrackingBacktracking
Backtracking
 
Praktik dengan matlab
Praktik dengan matlabPraktik dengan matlab
Praktik dengan matlab
 
NEURAL NETWORK Widrow-Hoff Learning Adaline Hagan LMS
NEURAL NETWORK Widrow-Hoff Learning Adaline Hagan LMSNEURAL NETWORK Widrow-Hoff Learning Adaline Hagan LMS
NEURAL NETWORK Widrow-Hoff Learning Adaline Hagan LMS
 
Support Vector Machine.pptx
Support Vector Machine.pptxSupport Vector Machine.pptx
Support Vector Machine.pptx
 
Data mining 5 klasifikasi decision tree dan random forest
Data mining 5   klasifikasi decision tree dan random forestData mining 5   klasifikasi decision tree dan random forest
Data mining 5 klasifikasi decision tree dan random forest
 
Support Vector Machines ( SVM )
Support Vector Machines ( SVM ) Support Vector Machines ( SVM )
Support Vector Machines ( SVM )
 
Spectral clustering
Spectral clusteringSpectral clustering
Spectral clustering
 
Splay Tree Presentation Slides
Splay Tree Presentation SlidesSplay Tree Presentation Slides
Splay Tree Presentation Slides
 
03 Data Mining Techniques
03 Data Mining Techniques03 Data Mining Techniques
03 Data Mining Techniques
 
Flipflop
FlipflopFlipflop
Flipflop
 
Feedforward neural network
Feedforward neural networkFeedforward neural network
Feedforward neural network
 
String matching algorithm
String matching algorithmString matching algorithm
String matching algorithm
 
Knn
KnnKnn
Knn
 
Radial Basis Function Network (RBFN)
Radial Basis Function Network (RBFN)Radial Basis Function Network (RBFN)
Radial Basis Function Network (RBFN)
 
Combinational circuits
Combinational circuitsCombinational circuits
Combinational circuits
 

Similaire à Interactive Proof Systems and An Introduction to PCP

Statistical Analysis of Neural Coding
Statistical Analysis of Neural CodingStatistical Analysis of Neural Coding
Statistical Analysis of Neural CodingYifei Shea, Ph.D.
 
Quarks zk study-club
Quarks zk study-clubQuarks zk study-club
Quarks zk study-clubAlex Pruden
 
CPSC 125 Ch 2 Sec 1
CPSC 125 Ch 2 Sec 1CPSC 125 Ch 2 Sec 1
CPSC 125 Ch 2 Sec 1David Wood
 
Pwl rewal-slideshare
Pwl rewal-slidesharePwl rewal-slideshare
Pwl rewal-slidesharepalvaro
 
Deep Learning for Cyber Security
Deep Learning for Cyber SecurityDeep Learning for Cyber Security
Deep Learning for Cyber SecurityAltoros
 
2009 CSBB LAB 新生訓練
2009 CSBB LAB 新生訓練2009 CSBB LAB 新生訓練
2009 CSBB LAB 新生訓練Abner Huang
 
Basics Of Neural Network Analysis
Basics Of Neural Network AnalysisBasics Of Neural Network Analysis
Basics Of Neural Network Analysisbladon
 
Time series anomaly discovery with grammar-based compression
Time series anomaly discovery with grammar-based compressionTime series anomaly discovery with grammar-based compression
Time series anomaly discovery with grammar-based compressionPavel Senin
 
How to Ground A Language for Legal Discourse In a Prototypical Perceptual Sem...
How to Ground A Language for Legal Discourse In a Prototypical Perceptual Sem...How to Ground A Language for Legal Discourse In a Prototypical Perceptual Sem...
How to Ground A Language for Legal Discourse In a Prototypical Perceptual Sem...L. Thorne McCarty
 
Internet of Things Data Science
Internet of Things Data ScienceInternet of Things Data Science
Internet of Things Data ScienceAlbert Bifet
 
A measure to evaluate latent variable model fit by sensitivity analysis
A measure to evaluate latent variable model fit by sensitivity analysisA measure to evaluate latent variable model fit by sensitivity analysis
A measure to evaluate latent variable model fit by sensitivity analysisDaniel Oberski
 
9. chapter 8 np hard and np complete problems
9. chapter 8   np hard and np complete problems9. chapter 8   np hard and np complete problems
9. chapter 8 np hard and np complete problemsJyotsna Suryadevara
 
CNIT 141: 9. Hard Problems
CNIT 141: 9. Hard ProblemsCNIT 141: 9. Hard Problems
CNIT 141: 9. Hard ProblemsSam Bowne
 
Foundation of KL Divergence
Foundation of KL DivergenceFoundation of KL Divergence
Foundation of KL DivergenceNatan Katz
 
Matt Purkeypile's Doctoral Dissertation Defense Slides
Matt Purkeypile's Doctoral Dissertation Defense SlidesMatt Purkeypile's Doctoral Dissertation Defense Slides
Matt Purkeypile's Doctoral Dissertation Defense Slidesmpurkeypile
 

Similaire à Interactive Proof Systems and An Introduction to PCP (20)

Statistical Analysis of Neural Coding
Statistical Analysis of Neural CodingStatistical Analysis of Neural Coding
Statistical Analysis of Neural Coding
 
Quarks zk study-club
Quarks zk study-clubQuarks zk study-club
Quarks zk study-club
 
CPSC 125 Ch 2 Sec 1
CPSC 125 Ch 2 Sec 1CPSC 125 Ch 2 Sec 1
CPSC 125 Ch 2 Sec 1
 
Pwl rewal-slideshare
Pwl rewal-slidesharePwl rewal-slideshare
Pwl rewal-slideshare
 
Deep Learning for Cyber Security
Deep Learning for Cyber SecurityDeep Learning for Cyber Security
Deep Learning for Cyber Security
 
2009 CSBB LAB 新生訓練
2009 CSBB LAB 新生訓練2009 CSBB LAB 新生訓練
2009 CSBB LAB 新生訓練
 
Basics Of Neural Network Analysis
Basics Of Neural Network AnalysisBasics Of Neural Network Analysis
Basics Of Neural Network Analysis
 
Time series anomaly discovery with grammar-based compression
Time series anomaly discovery with grammar-based compressionTime series anomaly discovery with grammar-based compression
Time series anomaly discovery with grammar-based compression
 
How to Ground A Language for Legal Discourse In a Prototypical Perceptual Sem...
How to Ground A Language for Legal Discourse In a Prototypical Perceptual Sem...How to Ground A Language for Legal Discourse In a Prototypical Perceptual Sem...
How to Ground A Language for Legal Discourse In a Prototypical Perceptual Sem...
 
Np complete
Np completeNp complete
Np complete
 
Internet of Things Data Science
Internet of Things Data ScienceInternet of Things Data Science
Internet of Things Data Science
 
A measure to evaluate latent variable model fit by sensitivity analysis
A measure to evaluate latent variable model fit by sensitivity analysisA measure to evaluate latent variable model fit by sensitivity analysis
A measure to evaluate latent variable model fit by sensitivity analysis
 
Flat
FlatFlat
Flat
 
9. chapter 8 np hard and np complete problems
9. chapter 8   np hard and np complete problems9. chapter 8   np hard and np complete problems
9. chapter 8 np hard and np complete problems
 
CNIT 141: 9. Hard Problems
CNIT 141: 9. Hard ProblemsCNIT 141: 9. Hard Problems
CNIT 141: 9. Hard Problems
 
UNIT-V.ppt
UNIT-V.pptUNIT-V.ppt
UNIT-V.ppt
 
Lecture 01.ppt
Lecture 01.pptLecture 01.ppt
Lecture 01.ppt
 
Foundation of KL Divergence
Foundation of KL DivergenceFoundation of KL Divergence
Foundation of KL Divergence
 
Matt Purkeypile's Doctoral Dissertation Defense Slides
Matt Purkeypile's Doctoral Dissertation Defense SlidesMatt Purkeypile's Doctoral Dissertation Defense Slides
Matt Purkeypile's Doctoral Dissertation Defense Slides
 
Chap 4 markov chains
Chap 4   markov chainsChap 4   markov chains
Chap 4 markov chains
 

Plus de Reza Rahimi

Boosting Personalization In SaaS Using Machine Learning.pdf
Boosting Personalization  In SaaS Using Machine Learning.pdfBoosting Personalization  In SaaS Using Machine Learning.pdf
Boosting Personalization In SaaS Using Machine Learning.pdfReza Rahimi
 
Self-Tuning and Managing Services
Self-Tuning and Managing ServicesSelf-Tuning and Managing Services
Self-Tuning and Managing ServicesReza Rahimi
 
Low Complexity Secure Code Design for Big Data in Cloud Storage Systems
Low Complexity Secure Code Design for Big Data in Cloud Storage SystemsLow Complexity Secure Code Design for Big Data in Cloud Storage Systems
Low Complexity Secure Code Design for Big Data in Cloud Storage SystemsReza Rahimi
 
Smart Connectivity
Smart ConnectivitySmart Connectivity
Smart ConnectivityReza Rahimi
 
Self-Tuning Data Centers
Self-Tuning Data CentersSelf-Tuning Data Centers
Self-Tuning Data CentersReza Rahimi
 
The Next Big Thing in IT
The Next Big Thing in ITThe Next Big Thing in IT
The Next Big Thing in ITReza Rahimi
 
QoS-Aware Middleware for Optimal Service Allocation in Mobile Cloud Computing
QoS-Aware Middleware for Optimal Service Allocation in Mobile Cloud ComputingQoS-Aware Middleware for Optimal Service Allocation in Mobile Cloud Computing
QoS-Aware Middleware for Optimal Service Allocation in Mobile Cloud ComputingReza Rahimi
 
On Optimal and Fair Service Allocation in Mobile Cloud Computing
On Optimal and Fair Service Allocation in Mobile Cloud ComputingOn Optimal and Fair Service Allocation in Mobile Cloud Computing
On Optimal and Fair Service Allocation in Mobile Cloud ComputingReza Rahimi
 
SMS Spam Filter Design Using R: A Machine Learning Approach
SMS Spam Filter Design Using R: A Machine Learning ApproachSMS Spam Filter Design Using R: A Machine Learning Approach
SMS Spam Filter Design Using R: A Machine Learning ApproachReza Rahimi
 
Mobile Applications on an Elastic and Scalable 2-Tier Cloud Architecture
Mobile Applications on an Elastic and Scalable 2-Tier Cloud ArchitectureMobile Applications on an Elastic and Scalable 2-Tier Cloud Architecture
Mobile Applications on an Elastic and Scalable 2-Tier Cloud ArchitectureReza Rahimi
 
Exploiting an Elastic 2-Tiered Cloud Architecture for Rich Mobile Applications
Exploiting an Elastic 2-Tiered Cloud Architecture for Rich Mobile ApplicationsExploiting an Elastic 2-Tiered Cloud Architecture for Rich Mobile Applications
Exploiting an Elastic 2-Tiered Cloud Architecture for Rich Mobile ApplicationsReza Rahimi
 
Fingerprint High Level Classification
Fingerprint High Level ClassificationFingerprint High Level Classification
Fingerprint High Level ClassificationReza Rahimi
 
Linear Programming and its Usage in Approximation Algorithms for NP Hard Opti...
Linear Programming and its Usage in Approximation Algorithms for NP Hard Opti...Linear Programming and its Usage in Approximation Algorithms for NP Hard Opti...
Linear Programming and its Usage in Approximation Algorithms for NP Hard Opti...Reza Rahimi
 
Optimizing Multicast Throughput in IP Network
Optimizing Multicast Throughput in IP NetworkOptimizing Multicast Throughput in IP Network
Optimizing Multicast Throughput in IP NetworkReza Rahimi
 
The Case for a Signal Oriented Data Stream Management System
The Case for a Signal Oriented Data Stream Management SystemThe Case for a Signal Oriented Data Stream Management System
The Case for a Signal Oriented Data Stream Management SystemReza Rahimi
 
Mobile Cloud Computing: Big Picture
Mobile Cloud Computing: Big PictureMobile Cloud Computing: Big Picture
Mobile Cloud Computing: Big PictureReza Rahimi
 
Network Information Processing
Network Information ProcessingNetwork Information Processing
Network Information ProcessingReza Rahimi
 
Pervasive Image Computation: A Mobile Phone Application for getting Informat...
Pervasive Image Computation: A Mobile  Phone Application for getting Informat...Pervasive Image Computation: A Mobile  Phone Application for getting Informat...
Pervasive Image Computation: A Mobile Phone Application for getting Informat...Reza Rahimi
 
Gaussian Integration
Gaussian IntegrationGaussian Integration
Gaussian IntegrationReza Rahimi
 
Quantum Computation and Algorithms
Quantum Computation and Algorithms Quantum Computation and Algorithms
Quantum Computation and Algorithms Reza Rahimi
 

Plus de Reza Rahimi (20)

Boosting Personalization In SaaS Using Machine Learning.pdf
Boosting Personalization  In SaaS Using Machine Learning.pdfBoosting Personalization  In SaaS Using Machine Learning.pdf
Boosting Personalization In SaaS Using Machine Learning.pdf
 
Self-Tuning and Managing Services
Self-Tuning and Managing ServicesSelf-Tuning and Managing Services
Self-Tuning and Managing Services
 
Low Complexity Secure Code Design for Big Data in Cloud Storage Systems
Low Complexity Secure Code Design for Big Data in Cloud Storage SystemsLow Complexity Secure Code Design for Big Data in Cloud Storage Systems
Low Complexity Secure Code Design for Big Data in Cloud Storage Systems
 
Smart Connectivity
Smart ConnectivitySmart Connectivity
Smart Connectivity
 
Self-Tuning Data Centers
Self-Tuning Data CentersSelf-Tuning Data Centers
Self-Tuning Data Centers
 
The Next Big Thing in IT
The Next Big Thing in ITThe Next Big Thing in IT
The Next Big Thing in IT
 
QoS-Aware Middleware for Optimal Service Allocation in Mobile Cloud Computing
QoS-Aware Middleware for Optimal Service Allocation in Mobile Cloud ComputingQoS-Aware Middleware for Optimal Service Allocation in Mobile Cloud Computing
QoS-Aware Middleware for Optimal Service Allocation in Mobile Cloud Computing
 
On Optimal and Fair Service Allocation in Mobile Cloud Computing
On Optimal and Fair Service Allocation in Mobile Cloud ComputingOn Optimal and Fair Service Allocation in Mobile Cloud Computing
On Optimal and Fair Service Allocation in Mobile Cloud Computing
 
SMS Spam Filter Design Using R: A Machine Learning Approach
SMS Spam Filter Design Using R: A Machine Learning ApproachSMS Spam Filter Design Using R: A Machine Learning Approach
SMS Spam Filter Design Using R: A Machine Learning Approach
 
Mobile Applications on an Elastic and Scalable 2-Tier Cloud Architecture
Mobile Applications on an Elastic and Scalable 2-Tier Cloud ArchitectureMobile Applications on an Elastic and Scalable 2-Tier Cloud Architecture
Mobile Applications on an Elastic and Scalable 2-Tier Cloud Architecture
 
Exploiting an Elastic 2-Tiered Cloud Architecture for Rich Mobile Applications
Exploiting an Elastic 2-Tiered Cloud Architecture for Rich Mobile ApplicationsExploiting an Elastic 2-Tiered Cloud Architecture for Rich Mobile Applications
Exploiting an Elastic 2-Tiered Cloud Architecture for Rich Mobile Applications
 
Fingerprint High Level Classification
Fingerprint High Level ClassificationFingerprint High Level Classification
Fingerprint High Level Classification
 
Linear Programming and its Usage in Approximation Algorithms for NP Hard Opti...
Linear Programming and its Usage in Approximation Algorithms for NP Hard Opti...Linear Programming and its Usage in Approximation Algorithms for NP Hard Opti...
Linear Programming and its Usage in Approximation Algorithms for NP Hard Opti...
 
Optimizing Multicast Throughput in IP Network
Optimizing Multicast Throughput in IP NetworkOptimizing Multicast Throughput in IP Network
Optimizing Multicast Throughput in IP Network
 
The Case for a Signal Oriented Data Stream Management System
The Case for a Signal Oriented Data Stream Management SystemThe Case for a Signal Oriented Data Stream Management System
The Case for a Signal Oriented Data Stream Management System
 
Mobile Cloud Computing: Big Picture
Mobile Cloud Computing: Big PictureMobile Cloud Computing: Big Picture
Mobile Cloud Computing: Big Picture
 
Network Information Processing
Network Information ProcessingNetwork Information Processing
Network Information Processing
 
Pervasive Image Computation: A Mobile Phone Application for getting Informat...
Pervasive Image Computation: A Mobile  Phone Application for getting Informat...Pervasive Image Computation: A Mobile  Phone Application for getting Informat...
Pervasive Image Computation: A Mobile Phone Application for getting Informat...
 
Gaussian Integration
Gaussian IntegrationGaussian Integration
Gaussian Integration
 
Quantum Computation and Algorithms
Quantum Computation and Algorithms Quantum Computation and Algorithms
Quantum Computation and Algorithms
 

Dernier

ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 

Dernier (20)

ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 

Interactive Proof Systems and An Introduction to PCP

  • 1. Interactive Proof Systems and An Introduction to PCP M. Reza Rahimi, Sharif University of Technology, Tehran, Iran.
  • 2. 2 Outline • Introduction • Another Way to Look at NP • Interactive Proof Systems (IP) • Arthur-Merlin Proof Systems (AM) • IP=PSPACE • Probabilistically Checkable Proofs (PCPs) • Conclusion
  • 3. 3 Introduction • One of the most important events in the complexity theory is Interactive Proof Systems. • It sheds light on the characteristic of some complexity classes. • It has also influenced on some practical areas such as Cryptography and Algorithm Design. • Before presentation of technical points, let’s start with the source of its main idea and its philosophy.
  • 4. 4 • Computation is basically a physical fact. This is the origin of Church-Turing-Markov thesis, which implies that: A Partial function is computable (in any accepted informal sense) if and only if it is computable by some binary Turing machine. Any Physical Process in Universe Turing Machine Program
  • 5. 5 • So in this view point, efficient solving of a special problem needs its efficient model of computation. • Let’s see what happens in human society. • Men communicate through languages with each other. • Consider the following set. Σ={ x | all symbols that we know} ={A, ⊕∈ ∫∫∫ , ζ ,...}, , , ∗ Farsi ⊂Σ , ∗ English ⊂Σ ,....
  • 6. 6 • Remember your childhood. When you was curious and want to underestand something. What did you do? Child::(Verifier) Dad::(Prover) 1. Daddy, Can I play with fire? 2. No. 3. Why? 4. Because You may be burnt. 5. What will happen, if I burn? 6. You will go to hospital and Dr injects you. Ok!
  • 7. 7 • Let’s model this process according to our knowledge. T = {x | All true statements in the universe}. T ⊆ Σ∗ , Input :: x =" Playing with fire is good." Query :: x ∈T, x ∉T ? • So, Interaction is one of the instinctive ways that human being solves its problems. • It is called Social Computational Model. • We will show that in another way NP, IP,…, are abstract models of this model of computation.
  • 8. 8 IP, NP, AM, MA,MIP, PCP,…. Computational Models. Social Computational Models.
  • 9. 9 • In society we have some general strategies to interact with People. • We start from general questions to detailed questions. • If we want to ask all the questions it will be very time consuming so we select some questions. We will use these techniques for our mathematical protocols.
  • 10. 10 Another Way to Look at NP • We know the following definition about NP: L ∈ NP ⇔ ∃V(.,.) ∈ P, ∃P(.), ∀x ∈ Σ ∗ , 1. x ∈ L ⇒ ∃y, y ≤ P( x ) and V(x, y) accepts. 2. x ∉ L ⇒ ∀y, y ≤ P( x ) and V(x, y) rejects. • We can look at this process like this: y Prover Verifier x x
  • 11. 11 • For prover we don’t consider any limit in time or space or computation power. • But verifier is deterministic polynomial time machine. • In this model of computation NP is defined like this: L ∈ NP ⇔ ∃ Prover, ∃ (Polynomia l Time Verifier) V, ∀x ∈ Σ ∗ , 1. x ∈ L ⇒ Prover has a strategy t o convince Verifier. 2. x ∉ L ⇒ Prover has no strategy t o convince Verifier. • So NP is single message interaction. What will happen if we – Allow multiple rounds of interactions, – Verifier can be randomized polynomial time machine?
  • 12. 12 • NP+ Multiple Round Interaction: Y1 Y2 Prover Y3 Verifier Yn x Y1Y2Y3…Yn x • According to the above it is obvious that NP=NP+Multiple Round of Interaction. • NP+ Randomized Polynomial Time Verifier: y Randomized Prover Polynomial Time Verifier x x
  • 13. 13 • The languages recognized by the previous model are in class MA. Conjecture: MA=NP. • So, It seems that only using one feature will not make NP machine stronger. What will happen when we add both features? Y1 Y2 Randomized Y3 Prover Polynomial Time Yn Verifier x x • This machine will lead us to the Interactive Proof Systems.
  • 14. 14 Interactive Proof Systems (IP) • IP Model: q1 x a1 q2 Polynomial x Prover Time ai Verifier Random String OK or NO
  • 15. 15 • IP Class Definition: L ∈ IP ⇔ ∃V ∈ Probabilistic Polynomial Time TM, ∀x ∈ Σ ∗ 2 1. x ∈ L ⇒ ∃P Pr{ V ↔ P ok} ≥ . 3 1 2. x ∉ L ⇒ ∀P Pr{ V ↔ P ok} ≤ . 3 • Note that Prover can not see the random string of verifier, so Verifier has Private Coin. • Round of Interaction r(n) =The total number of messages exchanged. • IP[K]::K round of interaction.
  • 16. 16 • Example: Graph Non-Isomorphism NONISO = { G1 , G2 G 1 and G 2 are not isomorphic graphs.} ISO = { G1 , G2 G 1 and G 2 are isomorphic graphs.} • It is obvious that ISO є NP so NONISO є CO-NP. • But we don’t know if it is NP-Complete or not. These two are very important in complexity theory. We know that it is in IP. It is proved that if ISO є NP-Complete then PH collapses.
  • 17. 17 Protocol: Private-Coin Graph Non-Isomorphism V ∴Pick i ∈{1,2} uniformly randomly. Randomly permute the vertices of G i to get new graph call it H. Send H to P. P ∴Show that which of G1 or G 2 was the source of permutation. send its index to verifier. V ∴Yes if i = j else No. x ∈ NONISO ⇒ Pr{V ↔P Yes} =1 1 x ∉ NONISO ⇒Pr{V ↔P Yes} ≤ 2
  • 18. 18 Arthur-Merlin Proof Systems (AM) • AM Model: q1 x a1 q2 Arthur x Polynomial Merlin Time ai Verifier Random String OK or NO qi , ai = O( Poly ( x ), Random String = O( Poly ( x ), Number of Exchanged Messages = O( Poly ( x ), A( R, x, q1 , a1 , q 2 ,..., ai ) = qi +1 , Yes or No. M ( R, x, q1 , a1 , q 2 ,..., qi ) = ai .
  • 19. 19 • AM Class Definition: L ∈ AM ⇔ ∃ A ∈ Probabilistic Polynomial Time TM, ∀x ∈ Σ ∗ 2 1.x ∈ L ⇒ ∃M, Pr{ A ↔ M ok} ≥ . 3 1 2.x ∉ L ⇒ ∀M, Pr{ A ↔ M ok} ≤ . 3 • Note that Prover can see the random string of verifier, so Verifier has Public Coin. • Round of Interaction r(n) =The total number of messages exchanged. • AM[K]=K round of interaction.
  • 20. 20 • It seems that the pervious protocol doesn’t work for this machine. • If Merlin can see random bits he always answers correctly. • But it is proved that NONISO є AM[2]. Theorem:: (Goldwasser, Sipser) NONISO є AM[2].
  • 21. 21 Some Results About IP and AM Relation • IP[K] ⊆ AM[k+2] for all Constants k. • For constant k ≥ 2 we have AM[K]=AM[2]. • So we can move all of Arthur’s messages to beginning of interaction: AMAMAM…AM = AAMMAM…AM … = AAA…AMMM…M
  • 22. 22 IP=PSPACE ( Shamir’s Theorem) • We describe it in two phase. IP ⊆PSPACE • Proof Idea: – Given any Verifier V , We will compute a using Polynomial Space machine. ∀x ∈ Σ* , V ⇒ a = max Pr{ V ↔ P = Ok}  P
  • 23. 23 PSPACE ⊆ IP • We need only to design an IP protocol for TQBF. • Before presentation of this protocol Lets review some basic concepts. Arithmetization: Arithmetization The usefulness of this technique is that we can extract more property from boolean expressions. Boolean Domain Polynomial Domain Φ ( x1 , x2 ,..., xm ) ⇔ P ( x1 , x2 ,..., xm ) x∧ y ⇔ x.y ¬x ⇔ 1− x x∨ y ⇔ 1-( 1-x)( 1-y).
  • 24. 24 Example: Example Φ( x1 , x2 , x3 ) = x1 ∨ x2 ∨ ¬x3 ↔ (1 − (1 − x1 )(1 − x2 )) ∨ (1 − x3 ) → (1 − (1 − (1 − (1 − x1 )(1 − x2 )))(1 − (1 − x3 )) → (1 − (1 − x1 )(1 − x2 )) x3 → P ( x1 , x2 , x3 ) = (1 − (1 − x1 )(1 − x2 )) x3 . { x1 ∨ x2 ∨ ¬x3 ⇔ (1 − (1 − x1 )(1 − x2 )) x3 } Lemma: Lemma Φ( x1 , x2 ,..., xm ) = 0 ⇔ P( x1 , x2 ,..., xm ) = 0. Φ( x1 , x2 ,..., xm ) = 1 ⇔ P( x1 , x2 ,..., xm ) = 1. ∴ ∑ ∑ x1∈{0 ,1} x2 ∈{0 ,1} ... ∑ P( x , x ,..., x xm ∈{0 ,1} 1 2 m )=k k = Number of Assignment of Φ.
  • 25. 25 • To catch general idea of the TQBF protocol lets review a protocol for following language. # SAT = {< Φ , k >: Φ is a cnf - formula with exactly k satisfying assignments}. Theorem :: # SAT ∈ IP. Main Idea : • Lets investigate the problem intuitively.
  • 26. 26 • Think that we are Verifier and want to know that if x ∈ SAT is true or not. • We usually start from General questions to detailed questions. • If the prover is trustful he/she will answer all the questions correctly. • If not we will catch him/her with detailed questions. • Lets review some basic definition.
  • 27. 27 Φ( x1 , x2 ,..., xm ) → P( x1 , x2 ,..., xm ) f i ( x1 , x2 ,..., xi ) = ∑ ∑ xi +1∈ 0 ,1} xi +2 ∈ 0 ,1} { { ... ∑ P( x , x ,..., x xm ∈ 0 ,1} { 1 2 m ) = Number of satisfying assignment when input is x1 , x2 ,..., xi . Example : Φ( x1 , x2 ) → P ( x1 , x2 ) f 0 () = ∑ ∑ P( x , x ) =P(0,0) + P(0,1) + P(1,0) + P(1,1). x1∈ 0 ,1} x2 ∈ 0 ,1} { { 1 2 f1 ( x1 ) = ∑ P( x , x ) =P( x ,0) + P( x ,1). x2 ∈ 0 ,1} { 1 2 1 1 f 2 ( x1 , x2 ) = P ( x1 , x2 ). f 0 () :: Number of satisfying assignment. In General we have : f i ( x1 , x2 ,..., xi ) = f i +1 ( x1 , x2 ,..., xi ,0) + f i +1 ( x1 , x2 ,..., xi ,1).
  • 28. 28 Prover Verifier
  • 29. 29 • It is obvious that the foregoing Protocol is very large ( exponential message size). • So we must use randomness for shortening the messages and protocol. • In each phase, the message will be doubled. So we must reduce this phase.
  • 30. 30 Prover Verifier
  • 31. 31 Proof Idea: • If x ∈ # SAT then trusted prover always answer correctly. • Else devoius prover can cheat verifier with low probability in each phase. It means that: d n Pr{ f i = f i } ≤ ≤ n q 2
  • 32. 32 • Now it is the time to revise the last protocol for TQBF. • We know that: ∃ x1∀ x2 ...∀ xm Φ ( x1 , x2 ,..., xm ) ∈ TQBF ⇔ ∑ ∏ x1∈{0,1} x2 ∈{0 ,1} ... ∏ P( x , x ,..., x xm ∈{0,1} 1 2 m )0 • At first glance it seems when we see ∏ instead of addition we use multiplication. • But it may increase the size of the polynomial exponentially.
  • 33. 33 • So, we use clever idea for overcoming this problem. Linearization Operator R :: Rx1 [ P(x1 , x 2 ,..., x m )] ≡ (1 − x1 )P(0, x 2 ,..., x m ) + (x1 )P(1, x 2 ,..., x m ) • Now we use this operator for TQBF. ∃ x1∀ x2 ...∀ xm Φ ( x1 , x2 ,..., xm ) ⇒ ∃ x1 Rx1∀ x2 Rx1Rx2 ...∀ xm Φ ( x1 , x2 ,..., xm )
  • 34. 34 Probabilistically Checkable Proofs (PCPs) • Again, lets review the definition of NP class. L ∈ NP ⇔ ∃V(.,.) ∈ P, ∃P(.), ∀x ∈ Σ∗ , 1. x ∈ L ⇒ ∃y, y ≤ P( x ) and V(x, y) accepts. 2. x ∉ L ⇒ ∀y, y ≤ P( x ) and V(x, y) rejects. • So, if the input string is the member of language, verifier can access the whole bits of the polynomial size proof.
  • 35. 35 • What will happen if we restrict the verifier to access the subset of the proof but not all of it? • It seems that in this case the verifier will lose its power. (Maybe) • If we empower the verifier with randomization what will happen? • The answers of these questions will lead us to PCP machine.
  • 36. 36 O(q(n)): The number of query about the bits of the proof. x Polynomial Time Randomized O(r(n)) :Length Verifier Of random string Whole Proof
  • 37. 37 Definition : PCP(r(n), q(n)) is the class of all languages accepted by an (r(n), q(n)) - restricted verifier V in the following sense : x ∈ L ⇒ ∃y, Pr[V y (x) = 1] = 1. 1 x ∉ L ⇒ ∀y, Pr[V y (x) = 1] ≤ . 2 Some Points: • We don’t have any restriction on the size of the proof. • If the Verifier uses its history for the questioning, it is called adaptive else nonadaptive.
  • 38. 38 Some Clear Facts: NP = PCP(0, Poly(n)) =  PCP(0, n c ). c 0 CoRP = PCP(Poly(n),0). And this is one of the most important theorems that describes NP. PCP Theorem :: NP = PCP(Log n,1)
  • 39. 39 • Hastaad proved Stronger result : NP Equals PCP with O(logn) random bits and Exactly 3 query bits. • PCP technique resaults into finding optimum band for NP-Hard optimization problems, such as MAX-3SAT and MAX-CLIQUE.
  • 40. 40 Conclusion • In this talk I focused on general ideas of IP and PCP. • It seems that these results and techniques will have many things to say, especially in the area of complexity. • In future, we would see many wonderful results. The END