首页 > 最新文献

2009 24th Annual IEEE Conference on Computational Complexity最新文献

英文 中文
The Proof Complexity of Polynomial Identities 多项式恒等式的证明复杂性
Pub Date : 2009-07-15 DOI: 10.1109/CCC.2009.9
P. Hrubes, Iddo Tzameret
Devising an efficient deterministic -- or even a non-deterministic sub-exponential time -- algorithm for testing polynomial identities is a fundamental problem in algebraic complexity and complexity at large. Motivated by this problem, as well as by results from proof complexity, we investigate the complexity of _proving_ polynomial identities. To this end, we study a class of equational proof systems, of varying strength, operating with polynomial identities written as arithmetic formulas over a given ring. A proof in these systems establishes that two arithmetic formulas compute the same polynomial, and consists of a sequence of equations between polynomials, written as arithmetic formulas, where each equation in the sequence is derived from previous equations by means of the polynomial-ring axioms. We establish the first non-trivial upper and lower bounds on the size of equational proofs of polynomial identities, as follows: 1. Polynomial-size upper bounds on equational proofs of identities involving symmetric polynomials and interpolation-based identities. In particular, we show that basic properties of the elementary symmetric polynomials are efficiently provable already in equational proofs operating with depth-4 formulas, over infinite fields. This also yields polynomial-size depth-4 proofs of the Newton identities, providing a positive answer to a question posed by Grigoriev and Hirsch [GH03]. 2. Exponential-size lower bounds on (full, unrestricted) equational proofs of identities over certain specific rings. 3. Exponential-size lower bounds on analytic proofs operating with depth-3 formulas, under a certain regularity condition. The ``analytic'' requirement is, roughly, a condition that forbids introducing arbitrary formulas in a proof and the regularity condition is an additional structural restriction. 4. Exponential-size lower bounds on one-way proofs (of unrestricted depth) over infinite fields. Here, one-way proofs are analytic proofs, in which one is also not allowed to introduce arbitrary constants. Furthermore, we determine basic structural characterizations of equational proofs, and consider relations with polynomial identity testing procedures. Specifically, we show that equational proofs efficiently simulate the polynomial identity testing algorithm provided by Dvir and Shpilka [DS04].
设计一种有效的确定性——甚至是非确定性的次指数时间——算法来测试多项式恒等式是代数复杂性和总体复杂性中的一个基本问题。在这个问题的启发下,结合证明复杂性的结果,我们研究了证明多项式恒等式的复杂性。为此,我们研究了一类变强度的等式证明系统,在给定环上用算术公式表示的多项式恒等式进行运算。在这些系统中的证明建立了两个算术公式计算相同的多项式,并由多项式之间的一系列方程组成,这些方程写成算术公式,其中序列中的每个方程都是通过多项式环公理从先前的方程中导出的。我们建立了多项式恒等式证明大小的第一非平凡上界和下界,如下所示:涉及对称多项式和基于插值的恒等式证明的多项式大小上界。特别地,我们证明了初等对称多项式的基本性质已经在无限域上使用深度4公式的方程证明中有效地证明了。这也产生了牛顿恒等式的多项式大小的深度4证明,为Grigoriev和Hirsch [GH03]提出的问题提供了一个肯定的答案。2. 在某些特定环上的(完全,无限制)等式恒等式证明的指数大小下界。3.在一定的正则性条件下,深度为3的解析证明的指数大小下界。“解析性”要求大致上是一个禁止在证明中引入任意公式的条件,而正则性条件是一个附加的结构限制。4. 无限域上(深度不受限制的)单向证明的指数大小下界。这里,单向证明是解析证明,其中也不允许引入任意常数。进一步,我们确定了等式证明的基本结构特征,并考虑了它们与多项式恒等检验过程的关系。具体来说,我们证明了等式证明有效地模拟了Dvir和Shpilka [DS04]提供的多项式恒等检验算法。
{"title":"The Proof Complexity of Polynomial Identities","authors":"P. Hrubes, Iddo Tzameret","doi":"10.1109/CCC.2009.9","DOIUrl":"https://doi.org/10.1109/CCC.2009.9","url":null,"abstract":"Devising an efficient deterministic -- or even a non-deterministic sub-exponential time -- algorithm for testing polynomial identities is a fundamental problem in algebraic complexity and complexity at large. Motivated by this problem, as well as by results from proof complexity, we investigate the complexity of _proving_ polynomial identities. To this end, we study a class of equational proof systems, of varying strength, operating with polynomial identities written as arithmetic formulas over a given ring. A proof in these systems establishes that two arithmetic formulas compute the same polynomial, and consists of a sequence of equations between polynomials, written as arithmetic formulas, where each equation in the sequence is derived from previous equations by means of the polynomial-ring axioms. We establish the first non-trivial upper and lower bounds on the size of equational proofs of polynomial identities, as follows: 1. Polynomial-size upper bounds on equational proofs of identities involving symmetric polynomials and interpolation-based identities. In particular, we show that basic properties of the elementary symmetric polynomials are efficiently provable already in equational proofs operating with depth-4 formulas, over infinite fields. This also yields polynomial-size depth-4 proofs of the Newton identities, providing a positive answer to a question posed by Grigoriev and Hirsch [GH03]. 2. Exponential-size lower bounds on (full, unrestricted) equational proofs of identities over certain specific rings. 3. Exponential-size lower bounds on analytic proofs operating with depth-3 formulas, under a certain regularity condition. The ``analytic'' requirement is, roughly, a condition that forbids introducing arbitrary formulas in a proof and the regularity condition is an additional structural restriction. 4. Exponential-size lower bounds on one-way proofs (of unrestricted depth) over infinite fields. Here, one-way proofs are analytic proofs, in which one is also not allowed to introduce arbitrary constants. Furthermore, we determine basic structural characterizations of equational proofs, and consider relations with polynomial identity testing procedures. Specifically, we show that equational proofs efficiently simulate the polynomial identity testing algorithm provided by Dvir and Shpilka [DS04].","PeriodicalId":158572,"journal":{"name":"2009 24th Annual IEEE Conference on Computational Complexity","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127278922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Fixed-Polynomial Size Circuit Bounds 固定多项式大小的电路边界
Pub Date : 2009-07-15 DOI: 10.1109/CCC.2009.21
L. Fortnow, R. Santhanam
In 1982, Kannan showed that $Sigma^P_2$ does not have $n^k$-sized circuits for any $k$. Do smaller classes also admit such circuit lower bounds? Despite several improvements of Kannan's result, we still cannot prove that $P^NP$ does not have linear size circuits. Work of Aaronson and Wigderson provides strong evidence -- the ``algebrization'' barrier -- that current techniques have inherent limitations in this respect. We explore questions about fixed-polynomial size circuit lower bounds around and beyond the algebrization barrier. We find several connections, including begin{itemize} item The following are equivalent: begin{itemize} item $NP$ is in $SIZE(n^k)$ (has $O(n^k)$-size circuit families) for some $k$ item For each $c$, $P^{NP[n^c]}$ is in $SIZE(n^k)$ for some $k$ item $ONP/1$ is in $SIZE(n^k)$ for some $k$, where $ONP$ is the class of languages accepted {it obliviously} by $NP$ machines, with witnesses for ``yes'' instances depending only on the input length. end{itemize} item For a large number of natural classes ${cal C}$ and all $k geq 1$, ${cal C}$ is in $SIZE(n^k)$ if and only if ${cal C}/1capP/poly$ is in $SIZE(n^k)$. item If there is a $d$ such that $MATIME(n) subseteq NTIME(n^d)$, then $P^{NP}$ does not have $O(n^k)$ size circuits for any $k ≫ 0$. item One cannot show $n^2$-size circuit lower bounds for $oplus P$ without new nonrelativizing techniques. In particular, the proof that $PP notsubseteq SIZE(n^k)$ for all $k$ relies on the (relativizing) result that $P^{PP} subseteq MA Longrightarrow PP notsubseteq SIZE(n^k)$, and we give an oracle relative to which $P^{oplus P} subseteq MA$ and $oplus P subseteq SIZE(n^2)$ both hold. end{itemize}
1982年,Kannan证明$Sigma^P_2$对于任何$k$都没有$n^k$大小的电路。小班也承认这样的电路下限吗?尽管对Kannan的结果进行了几次改进,我们仍然不能证明$P^NP$没有线性大小的电路。Aaronson和Wigderson的工作提供了强有力的证据——“代数化”障碍——当前的技术在这方面有固有的局限性。我们探讨了固定多项式大小的电路在代数势垒周围和之外的下界问题。我们发现了一些联系,包括 begin{itemize} item 以下是等价的: begin{itemize} item $NP$ 是在$SIZE(n^k)$(有$O(n^k)$大小的电路家族)为一些 $k$ item 对于每个$c$,有些人在$SIZE(n^k)$中找到$P^{NP[n^c]}$$k$ item $ONP/1$ 对于某些$k$,是在$SIZE(n^k)$中,其中$ONP$是{it}$NP$机器不受影响地接受的语言类别,“yes”实例的见证仅取决于输入长度。 end{itemize} item 对于大量的自然类${cal C}$和所有的$k geq 1$,当且仅当${cal C}/1capP/poly$在$SIZE(n^k)$中时,${cal C}$在$SIZE(n^k)$中。 item 如果有一个$d$这样的$MATIME(n) subseteq NTIME(n^d)$,那么$P^{NP}$没有任何$k ≫ 0$的$O(n^k)$大小的电路。 item 如果没有新的非相对化技术,就无法显示$oplus P$的$n^2$大小的电路下界。特别地,对于所有$k$的$PP notsubseteq SIZE(n^k)$的证明依赖于$P^{PP} subseteq MA Longrightarrow PP notsubseteq SIZE(n^k)$的(相对化)结果,并且我们给出了$P^{oplus P} subseteq MA$和$oplus P subseteq SIZE(n^2)$都持有的一个相对的oracle。 end{itemize}
{"title":"Fixed-Polynomial Size Circuit Bounds","authors":"L. Fortnow, R. Santhanam","doi":"10.1109/CCC.2009.21","DOIUrl":"https://doi.org/10.1109/CCC.2009.21","url":null,"abstract":"In 1982, Kannan showed that $Sigma^P_2$ does not have $n^k$-sized circuits for any $k$. Do smaller classes also admit such circuit lower bounds? Despite several improvements of Kannan's result, we still cannot prove that $P^NP$ does not have linear size circuits. Work of Aaronson and Wigderson provides strong evidence -- the ``algebrization'' barrier -- that current techniques have inherent limitations in this respect. We explore questions about fixed-polynomial size circuit lower bounds around and beyond the algebrization barrier. We find several connections, including begin{itemize} item The following are equivalent: begin{itemize} item $NP$ is in $SIZE(n^k)$ (has $O(n^k)$-size circuit families) for some $k$ item For each $c$, $P^{NP[n^c]}$ is in $SIZE(n^k)$ for some $k$ item $ONP/1$ is in $SIZE(n^k)$ for some $k$, where $ONP$ is the class of languages accepted {it obliviously} by $NP$ machines, with witnesses for ``yes'' instances depending only on the input length. end{itemize} item For a large number of natural classes ${cal C}$ and all $k geq 1$, ${cal C}$ is in $SIZE(n^k)$ if and only if ${cal C}/1capP/poly$ is in $SIZE(n^k)$. item If there is a $d$ such that $MATIME(n) subseteq NTIME(n^d)$, then $P^{NP}$ does not have $O(n^k)$ size circuits for any $k ≫ 0$. item One cannot show $n^2$-size circuit lower bounds for $oplus P$ without new nonrelativizing techniques. In particular, the proof that $PP notsubseteq SIZE(n^k)$ for all $k$ relies on the (relativizing) result that $P^{PP} subseteq MA Longrightarrow PP notsubseteq SIZE(n^k)$, and we give an oracle relative to which $P^{oplus P} subseteq MA$ and $oplus P subseteq SIZE(n^2)$ both hold. end{itemize}","PeriodicalId":158572,"journal":{"name":"2009 24th Annual IEEE Conference on Computational Complexity","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123708451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Planar Graph Isomorphism is in Log-Space 平面图同构存在于对数空间中
Pub Date : 2009-07-15 DOI: 10.1145/3543686
Samir Datta, N. Limaye, Prajakta Nimbhorkar, T. Thierauf, Fabian Wagner
Graph Isomorphism is the prime example of a computational problem with a wide difference between the best known lower and upper bounds on its complexity. There is a significant gap between extant lower and upper bounds for planar graphs as well. We bridge the gap for this natural and important special case by presenting an upper bound that matches the known log-space hardness [JKMT03]. In fact, we show the formally stronger result that planar graph canonization is in log-space. This improves the previously known upper bound of AC1 [MR91]. Our algorithm first constructs the biconnected component tree of a connected planar graph and then refines each biconnected component into a triconnected component tree. The next step is to log-space reduce the biconnected planar graph isomorphism and canonization problems to those for 3-connected planar graphs, which are known to be in log-space by [DLN08]. This is achieved by using the above decomposition, and by making significant modifications to Lindell’s algorithm for tree canonization, along with changes in the space complexity analysis. The reduction from the connected case to the biconnected case requires further new ideas, including a non-trivial case analysis and a group theoretic lemma to bound the number of automorphisms of a colored 3-connected planar graph. This lemma is crucial for the reduction to work in log-space.
图同构是一个计算问题的主要例子,它的复杂度在已知的下界和上界之间有很大的差异。在现有的平面图的下界和上界之间也有很大的差距。我们通过给出一个与已知对数空间硬度[JKMT03]相匹配的上界来弥补这个自然而重要的特殊情况的差距。实际上,我们给出了平面图规范化在对数空间中的形式化更强的结果。这改善了先前已知的AC1上限[MR91]。该算法首先构造连通平面图的双连通分量树,然后将每个双连通分量细化为三连通分量树。下一步是在对数空间中将双连通平面图的同构和规范化问题简化为3连通平面图的同构和规范化问题,这是已知的在对数空间中的[DLN08]。这可以通过使用上述分解、对Lindell的树规范化算法进行重大修改以及对空间复杂性分析进行更改来实现。从连通情况到双连通情况的化约需要进一步的新思想,包括非平凡情况分析和限定彩色3连通图自同构数的群论引理。这个引理对于在对数空间中进行约简是至关重要的。
{"title":"Planar Graph Isomorphism is in Log-Space","authors":"Samir Datta, N. Limaye, Prajakta Nimbhorkar, T. Thierauf, Fabian Wagner","doi":"10.1145/3543686","DOIUrl":"https://doi.org/10.1145/3543686","url":null,"abstract":"Graph Isomorphism is the prime example of a computational problem with a wide difference between the best known lower and upper bounds on its complexity. There is a significant gap between extant lower and upper bounds for planar graphs as well. We bridge the gap for this natural and important special case by presenting an upper bound that matches the known log-space hardness [JKMT03]. In fact, we show the formally stronger result that planar graph canonization is in log-space. This improves the previously known upper bound of AC1 [MR91]. Our algorithm first constructs the biconnected component tree of a connected planar graph and then refines each biconnected component into a triconnected component tree. The next step is to log-space reduce the biconnected planar graph isomorphism and canonization problems to those for 3-connected planar graphs, which are known to be in log-space by [DLN08]. This is achieved by using the above decomposition, and by making significant modifications to Lindell’s algorithm for tree canonization, along with changes in the space complexity analysis. The reduction from the connected case to the biconnected case requires further new ideas, including a non-trivial case analysis and a group theoretic lemma to bound the number of automorphisms of a colored 3-connected planar graph. This lemma is crucial for the reduction to work in log-space.","PeriodicalId":158572,"journal":{"name":"2009 24th Annual IEEE Conference on Computational Complexity","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114136528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
The Maximum Communication Complexity of Multi-Party Pointer Jumping 多方指针跳转的最大通信复杂度
Pub Date : 2009-07-15 DOI: 10.1109/CCC.2009.30
Joshua Brody
We study the one-way number-on-the-forhead (NOF) communication complexity of the $k$-layer pointer jumping problem. Strong lower bounds for this problem would have important implications in circuit complexity. All of our results apply to myopic protocols (where players see only one layer ahead, but can still see arbitrarily far behind them.) Furthermore, our results apply to the maximum communication complexity, where a protocol is charged for the maximum communication sent by a single player rather than the total communication sent by all players. Our main result is a lower bound of $n/2$ bits for deterministic protocols, independent of the number of players. We also provide a matching upper bound, as well as an $Omega(n/klog n)$ lower bound for randomized protocols, improving on the bounds of Chakrabarti. In the non-Boolean version of the problem, we give a lower bound of $n (log^{(k-1)} n)(1-o(1))$ bits, essentially matching the upper bound from Damm et al.
研究了$k$层指针跳转问题的单向前端数(NOF)通信复杂度。这个问题的强下界对电路复杂性有重要的意义。我们所有的结果都适用于近视协议(玩家只能看到前面的一层,但仍然可以看到他们后面很远的地方)。此外,我们的结果适用于最大通信复杂性,其中协议对单个玩家发送的最大通信收取费用,而不是所有玩家发送的总通信。我们的主要结果是确定性协议的$n/2$位的下界,独立于玩家的数量。我们还提供了随机协议的匹配上界和$Omega(n/klog n)$下界,改进了Chakrabarti的界。在这个问题的非布尔版本中,我们给出了$n (log^{(k-1)} n)(1-o(1))$位的下界,基本上与Damm等人给出的上界相匹配。
{"title":"The Maximum Communication Complexity of Multi-Party Pointer Jumping","authors":"Joshua Brody","doi":"10.1109/CCC.2009.30","DOIUrl":"https://doi.org/10.1109/CCC.2009.30","url":null,"abstract":"We study the one-way number-on-the-forhead (NOF) communication complexity of the $k$-layer pointer jumping problem. Strong lower bounds for this problem would have important implications in circuit complexity. All of our results apply to myopic protocols (where players see only one layer ahead, but can still see arbitrarily far behind them.) Furthermore, our results apply to the maximum communication complexity, where a protocol is charged for the maximum communication sent by a single player rather than the total communication sent by all players. Our main result is a lower bound of $n/2$ bits for deterministic protocols, independent of the number of players. We also provide a matching upper bound, as well as an $Omega(n/klog n)$ lower bound for randomized protocols, improving on the bounds of Chakrabarti. In the non-Boolean version of the problem, we give a lower bound of $n (log^{(k-1)} n)(1-o(1))$ bits, essentially matching the upper bound from Damm et al.","PeriodicalId":158572,"journal":{"name":"2009 24th Annual IEEE Conference on Computational Complexity","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121952903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
On Basing ZK ≠ BPP on the Hardness of PAC Learning 基于PAC学习难度的ZK≠BPP
Pub Date : 2009-07-15 DOI: 10.1109/CCC.2009.11
David Xiao
Learning is a central task in computer science, and there are various formalisms for capturing the notion. One important model studied in computational learning theory is the PAC model of Valiant (CACM 1984). On the other hand, in cryptography the notion of "learning nothing'' is often modelled by the simulation paradigm: in an interactive protocol, a party learns nothing if it can produce a transcript of the protocol by itself that is indistinguishable from what it gets by interacting with other parties. The most famous example of this paradigm is zero knowledge proofs, introduced by Goldwasser, Micali, and Rackoff (SICOMP 1989). Applebaum et al. (FOCS 2008) observed that a theorem of Ostrovsky and Wigderson (ISTCS 1993) combined with the transformation of one-way functions to pseudo-random functions (Hastad et al. SICOMP 1999, Goldreich et al. J. ACM 1986) implies that if there exist non-trivial languages with zero-knowledge arguments, then no efficient algorithm can PAC learn polynomial-size circuits. They also prove a weak reverse implication, that if a certain non-standard learning task is hard, then zero knowledge is non-trivial. This motivates the question we explore here: can one prove that hardness of PAC learning is equivalent to non-triviality of zero-knowledge? We show that this statement cannot be proven via the following techniques: 1. Relativizing techniques: there exists an oracle relative to which learning polynomial-size circuits is hard and yet the class of languages with zero knowledge arguments is trivial. 2. Semi-black-box techniques: if there is a black-box construction of a zero-knowledge argument for an NP-complete language (possibly with a non-black-box security reduction) based on hardness of PAC learning, then NP has statistical zero knowledge proofs, namely NP is contained in SZK. Under the standard conjecture that NP is not contained in SZK, our results imply that most standard techniques do not suffice to prove the equivalence between the non-triviality of zero knowledge and the hardness of PAC learning. Our results hold even when considering non-uniform hardness of PAC learning with membership queries. In addition, our technique relies on a new kind of separating oracle that may be of independent interest.
学习是计算机科学的核心任务,有各种各样的形式来表达这个概念。计算学习理论中研究的一个重要模型是Valiant (ccm, 1984)的PAC模型。另一方面,在密码学中,“什么也学不到”的概念通常是通过模拟范式来建模的:在交互式协议中,如果一方能够自己生成协议的副本,并且该副本与通过与其他各方交互获得的副本无法区分,那么它就什么也学不到。这种范式最著名的例子是零知识证明,由Goldwasser、Micali和Rackoff (SICOMP 1989)提出。Applebaum et al. (fos 2008)观察到Ostrovsky和Wigderson (ISTCS 1993)的一个定理与单向函数到伪随机函数的变换(Hastad et al.)相结合。SICOMP 1999, Goldreich等。J. ACM 1986)表明,如果存在具有零知识参数的非平凡语言,则没有有效的算法可以PAC学习多项式大小的电路。他们还证明了一个微弱的反向暗示,即如果某个非标准的学习任务很难,那么零知识是非平凡的。这激发了我们在这里探讨的问题:能否证明PAC学习的硬度等同于零知识的非平凡性?我们证明这个说法不能通过以下技术来证明:1。相对化技术:存在一种相对于其学习多项式大小的电路是困难的oracle,而具有零知识参数的语言类是微不足道的。2. 半黑箱技术:如果存在基于PAC学习硬度的NP完备语言(可能具有非黑箱安全性约简)的零知识论证的黑箱构造,则NP具有统计零知识证明,即NP包含在SZK中。在SZK中不包含NP的标准猜想下,我们的结果表明大多数标准技术不足以证明零知识的非平凡性与PAC学习的硬度之间的等价性。我们的结果甚至在考虑带有成员查询的PAC学习的非均匀硬度时也成立。此外,我们的技术依赖于一种新的分离oracle,它可能具有独立的兴趣。
{"title":"On Basing ZK ≠ BPP on the Hardness of PAC Learning","authors":"David Xiao","doi":"10.1109/CCC.2009.11","DOIUrl":"https://doi.org/10.1109/CCC.2009.11","url":null,"abstract":"Learning is a central task in computer science, and there are various formalisms for capturing the notion. One important model studied in computational learning theory is the PAC model of Valiant (CACM 1984). On the other hand, in cryptography the notion of \"learning nothing'' is often modelled by the simulation paradigm: in an interactive protocol, a party learns nothing if it can produce a transcript of the protocol by itself that is indistinguishable from what it gets by interacting with other parties. The most famous example of this paradigm is zero knowledge proofs, introduced by Goldwasser, Micali, and Rackoff (SICOMP 1989). Applebaum et al. (FOCS 2008) observed that a theorem of Ostrovsky and Wigderson (ISTCS 1993) combined with the transformation of one-way functions to pseudo-random functions (Hastad et al. SICOMP 1999, Goldreich et al. J. ACM 1986) implies that if there exist non-trivial languages with zero-knowledge arguments, then no efficient algorithm can PAC learn polynomial-size circuits. They also prove a weak reverse implication, that if a certain non-standard learning task is hard, then zero knowledge is non-trivial. This motivates the question we explore here: can one prove that hardness of PAC learning is equivalent to non-triviality of zero-knowledge? We show that this statement cannot be proven via the following techniques: 1. Relativizing techniques: there exists an oracle relative to which learning polynomial-size circuits is hard and yet the class of languages with zero knowledge arguments is trivial. 2. Semi-black-box techniques: if there is a black-box construction of a zero-knowledge argument for an NP-complete language (possibly with a non-black-box security reduction) based on hardness of PAC learning, then NP has statistical zero knowledge proofs, namely NP is contained in SZK. Under the standard conjecture that NP is not contained in SZK, our results imply that most standard techniques do not suffice to prove the equivalence between the non-triviality of zero knowledge and the hardness of PAC learning. Our results hold even when considering non-uniform hardness of PAC learning with membership queries. In addition, our technique relies on a new kind of separating oracle that may be of independent interest.","PeriodicalId":158572,"journal":{"name":"2009 24th Annual IEEE Conference on Computational Complexity","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127543359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
One-Way Functions and the Berman-Hartmanis Conjecture 单向函数与Berman-Hartmanis猜想
Pub Date : 2009-07-15 DOI: 10.1109/CCC.2009.17
Manindra Agrawal, O. Watanabe
The Berman-Hartmanis conjecture states that all NP-complete sets are P-isomorphic each other. On this conjecture, we first improve the previous result of Agrawal and show that all NP-complete sets are P/poly-time computable 1,li-reducible to each other based on the assumption that there exist regular one-way functions that cannot be inverted by randomized polynomial-time algorithms. Secondly, we show that, besides the above assumption, if all one-way functions have some easy part to invert, then all NP-complete sets are P/poly-isomorphic to each other.
Berman-Hartmanis猜想指出所有的np完全集合彼此是p同构的。在这个猜想上,我们首先改进了Agrawal先前的结果,并基于存在不能被随机化多项式时间算法反转的正则单向函数的假设,证明了所有np -完备集是P/多时间可计算的1,li-彼此可约的。其次,我们证明了除上述假设外,如果所有的单向函数都有一些容易被反转的部分,那么所有的np完全集合彼此是P/多同构的。
{"title":"One-Way Functions and the Berman-Hartmanis Conjecture","authors":"Manindra Agrawal, O. Watanabe","doi":"10.1109/CCC.2009.17","DOIUrl":"https://doi.org/10.1109/CCC.2009.17","url":null,"abstract":"The Berman-Hartmanis conjecture states that all NP-complete sets are P-isomorphic each other. On this conjecture, we first improve the previous result of Agrawal and show that all NP-complete sets are P/poly-time computable 1,li-reducible to each other based on the assumption that there exist regular one-way functions that cannot be inverted by randomized polynomial-time algorithms. Secondly, we show that, besides the above assumption, if all one-way functions have some easy part to invert, then all NP-complete sets are P/poly-isomorphic to each other.","PeriodicalId":158572,"journal":{"name":"2009 24th Annual IEEE Conference on Computational Complexity","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123685330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Regularity, Boosting, and Efficiently Simulating Every High-Entropy Distribution 规则性、增强和高效模拟每一个高熵分布
Pub Date : 2009-07-15 DOI: 10.1109/CCC.2009.41
L. Trevisan, Madhur Tulsiani, S. Vadhan
We show that every bounded function g: {0,1}^n -≫ [0,1] admits an efficiently computable "simulator" function h: {0,1}^n-≫[0,1] such that every fixed polynomial size circuit has approximately the same correlation with g as with h. If g describes (up to scaling) a high min-entropy distribution D, then h can be used to efficiently sample a distribution D' of the same min-entropy that is indistinguishable from D by circuits of fixed polynomial size. We state and prove our result in a more abstract setting, in which we allow arbitrary finite domains instead of {0,1}^n, and arbitrary families of distinguishers, instead of fixed polynomial size circuits. Our result implies (a) the Weak Szemeredi Regularity Lemma of Frieze and Kannan (b) a constructive version of the Dense Model Theorem of Green, Tao and Ziegler with better quantitative parameters (polynomial rather than exponential in the distinguishing probability), and (c) the Impagliazzo Hardcore Set Lemma. It appears to be the general result underlying the known connections between "regularity" results in graph theory, "decomposition" results in additive combinatorics, and the Hardcore Lemma in complexity theory. We present two proofs of our result, one in the spirit of Nisan's proof of the Hardcore Lemma via duality of linear programming, and one similar to Impagliazzo's "boosting" proof. A third proof by iterative partitioning, which gives the complexity of the sampler to be exponential in the distinguishing probability, is also implicit in the Green-Tao-Ziegler proofs of the Dense Model Theorem.
我们证明了每个有界函数g: {0,1}^n- >[0,1]承认一个有效可计算的“模拟器”函数h: {0,1}^n- >[0,1],使得每个固定多项式大小的电路与g具有近似相同的相关性。如果g描述(缩放)一个高最小熵分布D,那么h可以用来有效地采样一个具有相同最小熵的分布D',并且固定多项式大小的电路与D无法区分。我们在一个更抽象的环境中陈述并证明了我们的结果,在这个环境中,我们允许任意有限域而不是{0,1}^n,以及任意族的区分符,而不是固定的多项式大小的电路。我们的结果包含(a) Frieze和Kannan的弱Szemeredi正则引理(b) Green、Tao和Ziegler的密集模型定理的建设性版本,具有更好的定量参数(在区分概率上是多项式而不是指数),以及(c) Impagliazzo核心集引理。它似乎是图论中的“正则性”结果、加性组合学中的“分解”结果和复杂性理论中的硬核引理之间已知联系的一般结果。我们给出了我们的结果的两个证明,一个是基于Nisan通过线性规划的对偶性证明硬核引理的精神,另一个类似于Impagliazzo的“增强”证明。第三种通过迭代划分的证明,给出了采样器的复杂性在区分概率上是指数的,这也隐含在稠密模型定理的Green-Tao-Ziegler证明中。
{"title":"Regularity, Boosting, and Efficiently Simulating Every High-Entropy Distribution","authors":"L. Trevisan, Madhur Tulsiani, S. Vadhan","doi":"10.1109/CCC.2009.41","DOIUrl":"https://doi.org/10.1109/CCC.2009.41","url":null,"abstract":"We show that every bounded function g: {0,1}^n -≫ [0,1] admits an efficiently computable \"simulator\" function h: {0,1}^n-≫[0,1] such that every fixed polynomial size circuit has approximately the same correlation with g as with h. If g describes (up to scaling) a high min-entropy distribution D, then h can be used to efficiently sample a distribution D' of the same min-entropy that is indistinguishable from D by circuits of fixed polynomial size. We state and prove our result in a more abstract setting, in which we allow arbitrary finite domains instead of {0,1}^n, and arbitrary families of distinguishers, instead of fixed polynomial size circuits. Our result implies (a) the Weak Szemeredi Regularity Lemma of Frieze and Kannan (b) a constructive version of the Dense Model Theorem of Green, Tao and Ziegler with better quantitative parameters (polynomial rather than exponential in the distinguishing probability), and (c) the Impagliazzo Hardcore Set Lemma. It appears to be the general result underlying the known connections between \"regularity\" results in graph theory, \"decomposition\" results in additive combinatorics, and the Hardcore Lemma in complexity theory. We present two proofs of our result, one in the spirit of Nisan's proof of the Hardcore Lemma via duality of linear programming, and one similar to Impagliazzo's \"boosting\" proof. A third proof by iterative partitioning, which gives the complexity of the sampler to be exponential in the distinguishing probability, is also implicit in the Green-Tao-Ziegler proofs of the Dense Model Theorem.","PeriodicalId":158572,"journal":{"name":"2009 24th Annual IEEE Conference on Computational Complexity","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128557646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 79
Poly-logarithmic Independence Fools AC^0 Circuits 多对数独立性愚AC^0电路
Pub Date : 2009-07-15 DOI: 10.1145/1754399.1754401
M. Braverman
We prove that poly-sized AC^0 circuits cannot distinguish a poly-logarithmically independent distribution from the uniform one. This settles the 1990 conjecture by Linial and Nisan [LN90]. The only prior progress on the problem was by Bazzi [Baz07], who showed that O(log^2 n)-independent distributions fool poly-size DNF formulas. Razborov [Raz08] has later given a much simpler proof for Bazzi’s theorem.
我们证明了多尺度AC^0电路不能区分多对数无关分布和均匀分布。这就解决了Linial和Nisan [LN90]在1990年提出的猜想。在此问题上唯一的先验进展是Bazzi [Baz07],他证明了O(log^2 n)独立分布可以欺骗多元大小的DNF公式。Razborov [Raz08]后来对Bazzi定理给出了一个更简单的证明。
{"title":"Poly-logarithmic Independence Fools AC^0 Circuits","authors":"M. Braverman","doi":"10.1145/1754399.1754401","DOIUrl":"https://doi.org/10.1145/1754399.1754401","url":null,"abstract":"We prove that poly-sized AC^0 circuits cannot distinguish a poly-logarithmically independent distribution from the uniform one. This settles the 1990 conjecture by Linial and Nisan [LN90]. The only prior progress on the problem was by Bazzi [Baz07], who showed that O(log^2 n)-independent distributions fool poly-size DNF formulas. Razborov [Raz08] has later given a much simpler proof for Bazzi’s theorem.","PeriodicalId":158572,"journal":{"name":"2009 24th Annual IEEE Conference on Computational Complexity","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128647996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 105
Increasing the Gap between Descriptional Complexity and Algorithmic Probability 增加描述复杂性和算法概率之间的差距
Pub Date : 2009-07-15 DOI: 10.1109/CCC.2009.13
A. Day
The coding theorem is a fundamental result of algorithmic information theory. A well known theorem of Gács shows that the analog of the coding theorem fails for continuous sample spaces. This means that descriptional monotonic complexity does not coincide within an additive constant with the negative logarithm of algorithmic probability. Gács's proof provided a lower bound on the difference between these values. He showed that for infinitely many finite binary strings, this difference was greater than a version of the inverse Ackermann function applied to string length. This paper establishes that this lower bound can be substantially improved. The inverse Ackermann function can be replaced with a function O(log(log(x))). This shows that in continuous sample spaces, descriptional monotonic complexity and algorithmic probability are very different. While this proof builds on the original work by Gács, it does have a number of new features, in particular, the algorithm at the heart of the proof works on sets of strings as opposed to individual strings.
编码定理是算法信息论的一个基本结论。一个著名的Gács定理表明,编码定理的类比对于连续的样本空间是不成立的。这意味着,描述性单调复杂性并不与算法概率的负对数加性常数重合。Gács的证明提供了这些值之差的下界。他证明了对于无限多个有限二进制字符串,这种差异大于应用于字符串长度的逆阿克曼函数的一个版本。本文证明了这个下界可以得到很大的改进。逆Ackermann函数可以用函数O(log(log(x))代替。这表明在连续样本空间中,描述单调复杂度和算法概率有很大的不同。虽然这个证明建立在Gács的原始工作的基础上,但它确实有许多新特性,特别是,证明核心的算法适用于字符串集合,而不是单个字符串。
{"title":"Increasing the Gap between Descriptional Complexity and Algorithmic Probability","authors":"A. Day","doi":"10.1109/CCC.2009.13","DOIUrl":"https://doi.org/10.1109/CCC.2009.13","url":null,"abstract":"The coding theorem is a fundamental result of algorithmic information theory. A well known theorem of Gács shows that the analog of the coding theorem fails for continuous sample spaces. This means that descriptional monotonic complexity does not coincide within an additive constant with the negative logarithm of algorithmic probability. Gács's proof provided a lower bound on the difference between these values. He showed that for infinitely many finite binary strings, this difference was greater than a version of the inverse Ackermann function applied to string length. This paper establishes that this lower bound can be substantially improved. The inverse Ackermann function can be replaced with a function O(log(log(x))). This shows that in continuous sample spaces, descriptional monotonic complexity and algorithmic probability are very different. While this proof builds on the original work by Gács, it does have a number of new features, in particular, the algorithm at the heart of the proof works on sets of strings as opposed to individual strings.","PeriodicalId":158572,"journal":{"name":"2009 24th Annual IEEE Conference on Computational Complexity","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116673596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Lower Bounds on Quantum Multiparty Communication Complexity 量子多方通信复杂度的下界
Pub Date : 2009-07-15 DOI: 10.1109/CCC.2009.24
Troy Lee, G. Schechtman, A. Shraibman
A major open question in communication complexity is if randomized and quantum communication are polynomially related for all total functions. So far, no gap larger than a power of two is known, despite significant efforts. We examine this question in the number-on-the-forehead model of multiparty communication complexity. We show that essentially all lower bounds known on randomized complexity in this model also hold for quantum communication. This includes bounds of size Omega(n/2^k) for the k-party complexity of explicit functions, bounds for the generalized inner product function, and recent work on the multiparty complexity of disjointness. To the best of our knowledge, these are the first lower bounds of any kind on quantum communication in the general number-on-the-forehead model. We show this result in the following way. In the two-party case, there is a lower bound on quantum communication complexity in terms of a norm gamma_2, which is known to subsume nearly all other techniques in the literature. For randomized complexity there is another natural bound in terms of a different norm mu which is also one of the strongest techniques available. A deep theorem in functional analysis, Grothendieck's inequality, implies that gamma_2 and mu are equivalent up to a constant factor. This connection is one of the major obstacles to showing a larger gap between randomized and quantum communication complexity in the two-party case. The lower bound technique in terms of the norm mu was recently extended to the multiparty number-on-the-forehead model. Here we show how the gamma_2 norm can be also extended to lower bound quantum multiparty complexity. Surprisingly, even in this general setting the two lower bounds, on quantum and classical communication, are still very closely related. This implies that separating quantum and classical communication in this setting will require the development of new techniques. The relation between these extensions of mu and gamma_2 is proved by a multi-dimensional version of Grothendieck's inequality.
通信复杂性的一个主要开放问题是随机通信和量子通信是否对所有总函数都是多项式相关的。到目前为止,尽管付出了巨大的努力,但还没有发现差距大于2的情况。我们在多方通信复杂性的“额上数”模型中检验这个问题。我们表明,在这个模型中,基本上所有已知的随机复杂度的下界也适用于量子通信。这包括大小为ω (n/2^k)的显式函数的k方复杂度的界,广义内积函数的界,以及最近关于不连接的多方复杂度的工作。据我们所知,这是在一般的额上数字模型中量子通信的第一个下界。我们用下面的方式来显示这个结果。在两方的情况下,量子通信的复杂性有一个下限,以规范gamma_2表示,已知它包含了文献中几乎所有其他技术。对于随机复杂度,有另一种自然界,用不同的范数mu表示,这也是最强大的技术之一。泛函分析中的一个深奥的定理,格罗腾迪克不等式,表明在一个常数因子范围内,gamma_2和mu是等价的。这种联系是在两方情况下显示随机通信和量子通信复杂性之间较大差距的主要障碍之一。根据范数mu的下界技术最近被推广到多方额上数模型。这里我们展示了如何将gamma_2范数扩展到下界量子多方复杂性。令人惊讶的是,即使在这种一般情况下,量子和经典通信的两个下界仍然非常密切相关。这意味着,在这种情况下,分离量子通信和经典通信将需要开发新技术。用格罗腾迪克不等式的多维形式证明了这些扩展与γ - 2之间的关系。
{"title":"Lower Bounds on Quantum Multiparty Communication Complexity","authors":"Troy Lee, G. Schechtman, A. Shraibman","doi":"10.1109/CCC.2009.24","DOIUrl":"https://doi.org/10.1109/CCC.2009.24","url":null,"abstract":"A major open question in communication complexity is if randomized and quantum communication are polynomially related for all total functions. So far, no gap larger than a power of two is known, despite significant efforts. We examine this question in the number-on-the-forehead model of multiparty communication complexity. We show that essentially all lower bounds known on randomized complexity in this model also hold for quantum communication. This includes bounds of size Omega(n/2^k) for the k-party complexity of explicit functions, bounds for the generalized inner product function, and recent work on the multiparty complexity of disjointness. To the best of our knowledge, these are the first lower bounds of any kind on quantum communication in the general number-on-the-forehead model. We show this result in the following way. In the two-party case, there is a lower bound on quantum communication complexity in terms of a norm gamma_2, which is known to subsume nearly all other techniques in the literature. For randomized complexity there is another natural bound in terms of a different norm mu which is also one of the strongest techniques available. A deep theorem in functional analysis, Grothendieck's inequality, implies that gamma_2 and mu are equivalent up to a constant factor. This connection is one of the major obstacles to showing a larger gap between randomized and quantum communication complexity in the two-party case. The lower bound technique in terms of the norm mu was recently extended to the multiparty number-on-the-forehead model. Here we show how the gamma_2 norm can be also extended to lower bound quantum multiparty complexity. Surprisingly, even in this general setting the two lower bounds, on quantum and classical communication, are still very closely related. This implies that separating quantum and classical communication in this setting will require the development of new techniques. The relation between these extensions of mu and gamma_2 is proved by a multi-dimensional version of Grothendieck's inequality.","PeriodicalId":158572,"journal":{"name":"2009 24th Annual IEEE Conference on Computational Complexity","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121567883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
期刊
2009 24th Annual IEEE Conference on Computational Complexity
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1