On Protocols for Monotone Feasible Interpolation

IF 0.8 Q3 COMPUTER SCIENCE, THEORY & METHODS ACM Transactions on Computation Theory Pub Date : 2022-01-14 DOI:10.1145/3583754
Lukáš Folwarczný
{"title":"On Protocols for Monotone Feasible Interpolation","authors":"Lukáš Folwarczný","doi":"10.1145/3583754","DOIUrl":null,"url":null,"abstract":"Dag-like communication protocols, a generalization of the classical tree-like communication protocols, are useful objects in the realm of proof complexity (most importantly for monotone feasible interpolation) and circuit complexity. We consider three kinds of protocols in this article (d is the degree of a protocol): — IEQ-d-dags: feasible sets of these protocols are described by inequality which means that the feasible sets are combinatorial triangles; these protocols are also called triangle-dags in the literature, — EQ-d-dags: feasible sets are described by equality, and — c-IEQ-d-dags: feasible sets are described by a conjunction of c inequalities.Garg, Göös, Kamath, and Sokolov (Theory of Computing, 2020) mentioned all these protocols, and they noted that EQ-d-dags are a special case of c-IEQ-d-dags. The exact relationship between these types of protocols is unclear. As our main contribution, we prove the following statement: EQ-2-dags can efficiently simulate c-IEQ-d-dags when c and d are constants. This implies that EQ-2-dags are at least as strong as IEQ-d-dags and that EQ-2-dags have the same strength as c-IEQ-d-dags for c ≥ 2 (because 2-IEQ-2-dags can trivially simulate EQ-2-dags). Hrubeš and Pudlák (Information Processing Letters, 2018) proved that IEQ-d-dags over the monotone Karchmer-Wigderson relation are equivalent to monotone real circuits which implies that we have exponential lower bounds for these protocols. Lower bounds for EQ-2-dags would directly imply lower bounds for the proof system R(LIN).","PeriodicalId":44045,"journal":{"name":"ACM Transactions on Computation Theory","volume":null,"pages":null},"PeriodicalIF":0.8000,"publicationDate":"2022-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Transactions on Computation Theory","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3583754","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 2

Abstract

Dag-like communication protocols, a generalization of the classical tree-like communication protocols, are useful objects in the realm of proof complexity (most importantly for monotone feasible interpolation) and circuit complexity. We consider three kinds of protocols in this article (d is the degree of a protocol): — IEQ-d-dags: feasible sets of these protocols are described by inequality which means that the feasible sets are combinatorial triangles; these protocols are also called triangle-dags in the literature, — EQ-d-dags: feasible sets are described by equality, and — c-IEQ-d-dags: feasible sets are described by a conjunction of c inequalities.Garg, Göös, Kamath, and Sokolov (Theory of Computing, 2020) mentioned all these protocols, and they noted that EQ-d-dags are a special case of c-IEQ-d-dags. The exact relationship between these types of protocols is unclear. As our main contribution, we prove the following statement: EQ-2-dags can efficiently simulate c-IEQ-d-dags when c and d are constants. This implies that EQ-2-dags are at least as strong as IEQ-d-dags and that EQ-2-dags have the same strength as c-IEQ-d-dags for c ≥ 2 (because 2-IEQ-2-dags can trivially simulate EQ-2-dags). Hrubeš and Pudlák (Information Processing Letters, 2018) proved that IEQ-d-dags over the monotone Karchmer-Wigderson relation are equivalent to monotone real circuits which implies that we have exponential lower bounds for these protocols. Lower bounds for EQ-2-dags would directly imply lower bounds for the proof system R(LIN).
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
关于单调可行插值的协议
Dag类通信协议是经典树状通信协议的推广,在证明复杂性(最重要的是对于单调可行插值)和电路复杂性领域是有用的对象。本文考虑了三种协议(d是协议的度):——IEQ-d-dags:这些协议的可行集用不等式来描述,这意味着可行集是组合三角形;这些协议在文献中也被称为三角dags,--EQ-d-d-dags:可行集由等式描述,--c-IEQ-d-dags:可行集用c不等式的联合描述。Garg、Gös、Kamath和Sokolov(计算理论,2020)提到了所有这些协议,他们指出EQ-d-d-dag是c-IEQ-d-dags的特例。这些类型的协议之间的确切关系尚不清楚。作为我们的主要贡献,我们证明了以下陈述:当c和d为常数时,EQ-2-dags可以有效地模拟c-IEQ-d-dags。这意味着EQ-2-dags至少与IEQ-d-dags一样强,并且对于c≥2,EQ-2-dag具有与c-IEQ-d-dags相同的强度(因为2-IEQ-2-dags可以简单地模拟EQ-2-dads)。Hrubeš和Pudlák(Information Processing Letters,2018)证明了单调Karchmer-Wigderson关系上的IEQ-d-dags等价于单调实电路,这意味着我们对这些协议有指数下界。EQ-2-dags的下界将直接意味着证明系统R(LIN)的下界。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
ACM Transactions on Computation Theory
ACM Transactions on Computation Theory COMPUTER SCIENCE, THEORY & METHODS-
CiteScore
2.30
自引率
0.00%
发文量
10
期刊最新文献
Small-Space Spectral Sparsification via Bounded-Independence Sampling Tight Sum-of-Squares lower bounds for binary polynomial optimization problems Optimal Polynomial-time Compression for Boolean Max CSP On p -Group Isomorphism: search-to-decision, counting-to-decision, and nilpotency class reductions via tensors Quantum communication complexity of linear regression
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1