Sinho Chewi, Jaume de Dios Pont, Jerry Li, Chen Lu, Shyam Narayanan
Log-concave sampling has witnessed remarkable algorithmic advances in recent years, but the corresponding problem of proving lower bounds for this task has remained elusive, with lower bounds previously known only in dimension one. In this work, we establish the following query lower bounds: (1) sampling from strongly log-concave and log-smooth distributions in dimension d ≥ 2 requires Ω(log κ) queries, which is sharp in any constant dimension, and (2) sampling from Gaussians in dimension d (hence also from general log-concave and log-smooth distributions in dimension d) requires (widetilde{Omega }(min (sqrt kappa log d, d)) ) queries, which is nearly sharp for the class of Gaussians. Here κ denotes the condition number of the target distribution. Our proofs rely upon (1) a multiscale construction inspired by work on the Kakeya conjecture in geometric measure theory, and (2) a novel reduction that demonstrates that block Krylov algorithms are optimal for this problem, as well as connections to lower bound techniques based on Wishart matrices developed in the matrix-vector query literature.
{"title":"Query lower bounds for log-concave sampling","authors":"Sinho Chewi, Jaume de Dios Pont, Jerry Li, Chen Lu, Shyam Narayanan","doi":"10.1145/3673651","DOIUrl":"https://doi.org/10.1145/3673651","url":null,"abstract":"<p>Log-concave sampling has witnessed remarkable algorithmic advances in recent years, but the corresponding problem of proving <i>lower bounds</i> for this task has remained elusive, with lower bounds previously known only in dimension one. In this work, we establish the following query lower bounds: (1) sampling from strongly log-concave and log-smooth distributions in dimension <i>d</i> ≥ 2 requires <i>Ω</i>(log <i>κ</i>) queries, which is sharp in any constant dimension, and (2) sampling from Gaussians in dimension <i>d</i> (hence also from general log-concave and log-smooth distributions in dimension <i>d</i>) requires (widetilde{Omega }(min (sqrt kappa log d, d)) ) queries, which is nearly sharp for the class of Gaussians. Here <i>κ</i> denotes the condition number of the target distribution. Our proofs rely upon (1) a multiscale construction inspired by work on the Kakeya conjecture in geometric measure theory, and (2) a novel reduction that demonstrates that block Krylov algorithms are optimal for this problem, as well as connections to lower bound techniques based on Wishart matrices developed in the matrix-vector query literature.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"39 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141505503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Demand for blockchains such as Bitcoin and Ethereum is far larger than supply, necessitating a mechanism that selects a subset of transactions to include “on-chain” from the pool of all pending transactions. This paper investigates the problem of designing a blockchain transaction fee mechanism through the lens of mechanism design. We introduce two new forms of incentive-compatibility that capture some of the idiosyncrasies of the blockchain setting, one (MMIC) that protects against deviations by profit-maximizing miners and one (OCA-proofness) that protects against off-chain collusion between miners and users.
This study is immediately applicable to major change (made on August 5, 2021) to Ethereum’s transaction fee mechanism, based on a proposal called “EIP-1559.” Originally, Ethereum’s transaction fee mechanism was a first-price (pay-as-bid) auction. EIP-1559 suggested making several tightly coupled changes, including the introduction of variable-size blocks, a history-dependent reserve price, and the burning of a significant portion of the transaction fees. We prove that this new mechanism earns an impressive report card: it satisfies the MMIC and OCA-proofness conditions, and is also dominant-strategy incentive compatible (DSIC) except when there is a sudden demand spike. We also introduce an alternative design, the “tipless mechanism,” which offers an incomparable slate of incentive-compatibility guarantees—it is MMIC and DSIC, and OCA-proof unless in the midst of a demand spike.
{"title":"Transaction Fee Mechanism Design","authors":"Tim Roughgarden","doi":"10.1145/3674143","DOIUrl":"https://doi.org/10.1145/3674143","url":null,"abstract":"<p>Demand for blockchains such as Bitcoin and Ethereum is far larger than supply, necessitating a mechanism that selects a subset of transactions to include “on-chain” from the pool of all pending transactions. This paper investigates the problem of designing a blockchain transaction fee mechanism through the lens of mechanism design. We introduce two new forms of incentive-compatibility that capture some of the idiosyncrasies of the blockchain setting, one (MMIC) that protects against deviations by profit-maximizing miners and one (OCA-proofness) that protects against off-chain collusion between miners and users. </p><p>This study is immediately applicable to major change (made on August 5, 2021) to Ethereum’s transaction fee mechanism, based on a proposal called “EIP-1559.” Originally, Ethereum’s transaction fee mechanism was a first-price (pay-as-bid) auction. EIP-1559 suggested making several tightly coupled changes, including the introduction of variable-size blocks, a history-dependent reserve price, and the burning of a significant portion of the transaction fees. We prove that this new mechanism earns an impressive report card: it satisfies the MMIC and OCA-proofness conditions, and is also dominant-strategy incentive compatible (DSIC) except when there is a sudden demand spike. We also introduce an alternative design, the “tipless mechanism,” which offers an incomparable slate of incentive-compatibility guarantees—it is MMIC and DSIC, and OCA-proof unless in the midst of a demand spike.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"9 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141505504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
For a finite set of balls of radius r, the k-fold cover is the space covered by at least k balls. Fixing the ball centers and varying the radius, we obtain a nested sequence of spaces that is called the k-fold filtration of the centers. For k = 1, the construction is the union-of-balls filtration that is popular in topological data analysis. For larger k, it yields a cleaner shape reconstruction in the presence of outliers. We contribute a sparsification algorithm to approximate the topology of the k-fold filtration. Our method is a combination and adaptation of several techniques from the well-studied case k = 1, resulting in a sparsification of linear size that can be computed in expected near-linear time with respect to the number of input points. Our method also extends to the multicover bifiltration, composed of the k-fold filtrations for several values of k, with the same size and complexity bounds.
对于半径为 r 的有限球集,k-折叠覆盖是至少由 k 个球覆盖的空间。固定球心并改变半径,我们会得到一个嵌套空间序列,称为球心的 k 折叠过滤。对于 k = 1,该结构就是拓扑数据分析中常用的球联盟过滤。对于较大的 k,在存在离群值的情况下,它能产生更简洁的形状重构。我们贡献了一种稀疏化算法来近似 k 倍过滤的拓扑结构。我们的方法是对 k = 1 情况下几种技术的组合和调整,从而产生了一种线性大小的稀疏化,可以在与输入点数量接近线性的预期时间内计算出来。我们的方法还可扩展到多覆盖分层,由多个 k 值的 k 折叠过滤组成,具有相同的大小和复杂度限制。
{"title":"Sparse Higher Order Čech Filtrations","authors":"Mickaël Buchet, Bianca B Dornelas, Michael Kerber","doi":"10.1145/3666085","DOIUrl":"https://doi.org/10.1145/3666085","url":null,"abstract":"<p>For a finite set of balls of radius <i>r</i>, the <i>k</i>-fold cover is the space covered by at least <i>k</i> balls. Fixing the ball centers and varying the radius, we obtain a nested sequence of spaces that is called the <i>k</i>-fold filtration of the centers. For <i>k</i> = 1, the construction is the union-of-balls filtration that is popular in topological data analysis. For larger <i>k</i>, it yields a cleaner shape reconstruction in the presence of outliers. We contribute a sparsification algorithm to approximate the topology of the <i>k</i>-fold filtration. Our method is a combination and adaptation of several techniques from the well-studied case <i>k</i> = 1, resulting in a sparsification of linear size that can be computed in expected near-linear time with respect to the number of input points. Our method also extends to the multicover bifiltration, composed of the <i>k</i>-fold filtrations for several values of <i>k</i>, with the same size and complexity bounds.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"2 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141170701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Graph Minors Structure Theorem of Robertson and Seymour asserts that, for every graph H, every H-minor-free graph can be obtained by clique-sums of “almost embeddable” graphs. Here a graph is “almost embeddable” if it can be obtained from a graph of bounded Euler-genus by pasting graphs of bounded pathwidth in an “orderly fashion” into a bounded number of faces, called the vortices, and then adding a bounded number of additional vertices, called apices, with arbitrary neighborhoods. Our main result is a full classification of all graphs H for which the use of vortices in the theorem above can be avoided. To this end we identify a (parametric) graph (mathscr{S}_t) and prove that all (mathscr{S}_t)-minor-free graphs can be obtained by clique-sums of graphs embeddable in a surface of bounded Euler-genus after deleting a bounded number of vertices. We show that this result is tight in the sense that the appearance of vortices cannot be avoided for H-minor-free graphs, whenever H is not a minor of (mathscr{S}_t) for some (tin mathbb {N}. ) Using our new structure theorem, we design an algorithm that, given an (mathscr{S}_t)-minor-free graph G, computes the generating function of all perfect matchings of G in polynomial time. Our results, combined with known complexity results, imply a complete characterization of minor-closed graph classes where the number of perfect matchings is polynomially computable: They are exactly those graph classes that do not contain every (mathscr{S}_t) as a minor. This provides a sharp complexity dichotomy for the problem of counting perfect matchings in minor-closed classes.
罗伯逊(Robertson)和西摩(Seymour)提出的 "图最小值结构定理"(Graph Minors Structure Theorem)认为,对于每个图 H,每个无 H 最小值的图都可以通过 "几乎可嵌入 "图的簇和得到。这里的 "几乎可嵌入 "图指的是通过将有界路径宽度的图 "有序地 "粘贴到有界数的面上(称为涡面),然后再添加有界数的额外顶点(称为顶点)和任意邻域,就能从有界欧拉源图中得到的图。我们的主要成果是对所有图 H 进行全面分类,对于这些图 H,可以避免在上述定理中使用漩涡。为此,我们确定了一个(参数)图 (mathscr{S}_t),并证明了所有 (mathscr{S}_t)-minor-free图都可以通过删除一定数量的顶点后嵌入有界欧拉属表面的图的clique-sums得到。我们证明了这一结果的严密性,即只要 H 不是某个 (tin mathbb {N} 的 (mathscr{S}_t) 的 minor,那么对于无 H minor 的图来说,涡旋的出现就无法避免。我们的结果与已知的复杂性结果相结合,意味着完全匹配数可多项式计算的次要封闭图类的完整特征:它们正是那些不包含每个 minor(mathscr{S}_t)的图类。这为计算小封闭类中的完全匹配问题提供了一个尖锐的复杂性二分法。
{"title":"Killing a Vortex","authors":"Dimitrios Thilikos, Sebastian Wiederrecht","doi":"10.1145/3664648","DOIUrl":"https://doi.org/10.1145/3664648","url":null,"abstract":"<p>The Graph Minors Structure Theorem of Robertson and Seymour asserts that, for every graph <i>H</i>, every <i>H</i>-minor-free graph can be obtained by clique-sums of “almost embeddable” graphs. Here a graph is “almost embeddable” if it can be obtained from a graph of bounded Euler-genus by pasting graphs of bounded pathwidth in an “orderly fashion” into a bounded number of faces, called the <i>vortices</i>, and then adding a bounded number of additional vertices, called <i>apices</i>, with arbitrary neighborhoods. Our main result is a full classification of all graphs <i>H</i> for which the use of vortices in the theorem above can be avoided. To this end we identify a (parametric) graph (mathscr{S}_t) and prove that all (mathscr{S}_t)-minor-free graphs can be obtained by clique-sums of graphs embeddable in a surface of bounded Euler-genus after deleting a bounded number of vertices. We show that this result is tight in the sense that the appearance of vortices cannot be avoided for <i>H</i>-minor-free graphs, whenever <i>H</i> is not a minor of (mathscr{S}_t) for some (tin mathbb {N}. ) Using our new structure theorem, we design an algorithm that, given an (mathscr{S}_t)-minor-free graph <i>G</i>, computes the generating function of all perfect matchings of <i>G</i> in polynomial time. Our results, combined with known complexity results, imply a complete characterization of minor-closed graph classes where the number of perfect matchings is polynomially computable: They are exactly those graph classes that do not contain every (mathscr{S}_t) as a minor. This provides a <i>sharp</i> complexity dichotomy for the problem of counting perfect matchings in minor-closed classes.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"24 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140940924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mika Göös, Alexandros Hollender, Siddhartha Jain, Gilbert Maystre, William Pires, Robert Robere, Ran Tao
It is well-known that Resolution proofs can be efficiently simulated by Sherali–Adams (SA) proofs. We show, however, that any such simulation needs to exploit huge coefficients: Resolution cannot be efficiently simulated by SA when the coefficients are written in unary. We also show that Reversible Resolution (a variant of MaxSAT Resolution) cannot be efficiently simulated by Nullstellensatz (NS).
These results have consequences for total ({text{upshape sffamily NP}} ) search problems. First, we characterise the classes ({text{upshape sffamily PPADS}} ), ({text{upshape sffamily PPAD}} ), ({text{upshape sffamily SOPL}} ) by unary-SA, unary-NS, and Reversible Resolution, respectively. Second, we show that, relative to an oracle, ({text{upshape sffamily PLS}} notsubseteq {text{upshape sffamily PPP}} ), ({text{upshape sffamily SOPL}} notsubseteq {text{upshape sffamily PPA}} ), and ({text{upshape sffamily EOPL}} notsubseteq {text{upshape sffamily UEOPL}} ). In particular, together with prior work, this gives a complete picture of the black-box relationships between all classical ({text{upshape sffamily TFNP}} ) classes introduced in the 1990s.
{"title":"Separations in Proof Complexity and TFNP","authors":"Mika Göös, Alexandros Hollender, Siddhartha Jain, Gilbert Maystre, William Pires, Robert Robere, Ran Tao","doi":"10.1145/3663758","DOIUrl":"https://doi.org/10.1145/3663758","url":null,"abstract":"<p>It is well-known that Resolution proofs can be efficiently simulated by Sherali–Adams (SA) proofs. We show, however, that any such simulation needs to exploit huge coefficients: Resolution cannot be efficiently simulated by SA when the coefficients are written in unary. We also show that <i>Reversible Resolution</i> (a variant of MaxSAT Resolution) cannot be efficiently simulated by Nullstellensatz (NS). </p><p>These results have consequences for total ({text{upshape sffamily NP}} ) search problems. First, we characterise the classes ({text{upshape sffamily PPADS}} ), ({text{upshape sffamily PPAD}} ), ({text{upshape sffamily SOPL}} ) by unary-SA, unary-NS, and Reversible Resolution, respectively. Second, we show that, relative to an oracle, ({text{upshape sffamily PLS}} notsubseteq {text{upshape sffamily PPP}} ), ({text{upshape sffamily SOPL}} notsubseteq {text{upshape sffamily PPA}} ), and ({text{upshape sffamily EOPL}} notsubseteq {text{upshape sffamily UEOPL}} ). In particular, together with prior work, this gives a complete picture of the black-box relationships between all classical ({text{upshape sffamily TFNP}} ) classes introduced in the 1990s.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"20 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140940739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Michael Dinitz, Jeremy Fineman, Seth Gilbert, Calvin Newport
The best known solutions for k-message broadcast in dynamic networks of size n require Ω(nk) rounds. In this paper, we see if these bounds can be improved by smoothed analysis. To do so, we study perhaps the most natural randomized algorithm for disseminating tokens in this setting: at every time step, choose a token to broadcast randomly from the set of tokens you know. We show that with even a small amount of smoothing (i.e., one random edge added per round), this natural strategy solves k-message broadcast in (tilde{O}(n+k^3) ) rounds, with high probability, beating the best known bounds for (k=o(sqrt {n}) ) and matching the Ω(n + k) lower bound for static networks for k = O(n1/3) (ignoring logarithmic factors). In fact, the main result we show is even stronger and more general: given ℓ-smoothing (i.e., ℓ random edges added per round), this simple strategy terminates in O(kn2/3log 1/3(n)ℓ− 1/3) rounds. We then prove this analysis close to tight with an almost-matching lower bound. To better understand the impact of smoothing on information spreading, we next turn our attention to static networks, proving a tight bound of (tilde{O}(ksqrt {n}) ) rounds to solve k-message broadcast, which is better than what our strategy can achieve in the dynamic setting. This confirms the intuition that although smoothed analysis reduces the difficulties induced by changing graph structures, it does not eliminate them altogether. Finally, we apply tools developed to support our smoothed analysis to prove an optimal result for k-message broadcast in so-called well-mixed networks in the absence of smoothing. By comparing this result to an existing lower bound for well-mixed networks, we establish a formal separation between oblivious and strongly adaptive adversaries with respect to well-mixed token spreading, partially resolving an open question on the impact of adversary strength on the k-message broadcast problem.
在规模为 n 的动态网络中,k 消息广播的已知最佳解决方案需要 Ω(nk) 轮。在本文中,我们将探讨能否通过平滑分析来改进这些约束。为此,我们研究了在这种情况下传播令牌的最自然的随机算法:在每个时间步,从已知的令牌集合中随机选择一个令牌进行广播。我们的研究表明,即使进行少量的平滑处理(即每轮增加一条随机边),这种自然策略也能在 (tilde{O}(n+k^3) ) 轮内高概率地解决 k 消息广播问题,超过了 (k=o(sqrt {n}) ) 的已知最佳边界,并与 k = O(n1/3) 的静态网络的 Ω(n + k) 下限相匹配(忽略对数因子)。事实上,我们展示的主要结果甚至更强、更普遍:在给定 ℓ 平滑(即每轮添加 ℓ 随机边)的情况下,这一简单策略在 O(kn2/3log 1/3(n)ℓ- 1/3) 轮内终止。然后,我们用一个几乎匹配的下限证明了这一分析接近严密。为了更好地理解平滑化对信息传播的影响,我们接下来把注意力转向了静态网络,证明了解决 k 消息广播所需的 (tilde{O}(ksqrt {n}) ) 轮次的紧约束,这比我们的策略在动态环境中所能达到的效果要好。这印证了我们的直觉:虽然平滑分析可以减少图结构变化带来的困难,但并不能完全消除这些困难。最后,我们应用为支持平滑分析而开发的工具,证明了在没有平滑分析的情况下,所谓混合良好网络中 k 消息广播的最优结果。通过将这一结果与现有的混杂网络下限进行比较,我们在混杂令牌传播方面正式区分了遗忘型对手和强适应型对手,从而部分解决了对手强度对 k 信息广播问题的影响这一悬而未决的问题。
{"title":"Smoothed Analysis of Information Spreading in Dynamic Networks","authors":"Michael Dinitz, Jeremy Fineman, Seth Gilbert, Calvin Newport","doi":"10.1145/3661831","DOIUrl":"https://doi.org/10.1145/3661831","url":null,"abstract":"<p>The best known solutions for <i>k</i>-message broadcast in dynamic networks of size <i>n</i> require <i>Ω</i>(<i>nk</i>) rounds. In this paper, we see if these bounds can be improved by smoothed analysis. To do so, we study perhaps the most natural randomized algorithm for disseminating tokens in this setting: at every time step, choose a token to broadcast randomly from the set of tokens you know. We show that with even a small amount of smoothing (i.e., one random edge added per round), this natural strategy solves <i>k</i>-message broadcast in (tilde{O}(n+k^3) ) rounds, with high probability, beating the best known bounds for (k=o(sqrt {n}) ) and matching the <i>Ω</i>(<i>n</i> + <i>k</i>) lower bound for static networks for <i>k</i> = <i>O</i>(<i>n</i><sup>1/3</sup>) (ignoring logarithmic factors). In fact, the main result we show is even stronger and more general: given ℓ-smoothing (i.e., ℓ random edges added per round), this simple strategy terminates in <i>O</i>(<i>kn</i><sup>2/3</sup>log <sup>1/3</sup>(<i>n</i>)ℓ<sup>− 1/3</sup>) rounds. We then prove this analysis close to tight with an almost-matching lower bound. To better understand the impact of smoothing on information spreading, we next turn our attention to static networks, proving a tight bound of (tilde{O}(ksqrt {n}) ) rounds to solve <i>k</i>-message broadcast, which is better than what our strategy can achieve in the dynamic setting. This confirms the intuition that although smoothed analysis reduces the difficulties induced by changing graph structures, it does not eliminate them altogether. Finally, we apply tools developed to support our smoothed analysis to prove an optimal result for <i>k</i>-message broadcast in so-called well-mixed networks in the absence of smoothing. By comparing this result to an existing lower bound for well-mixed networks, we establish a formal separation between oblivious and strongly adaptive adversaries with respect to well-mixed token spreading, partially resolving an open question on the impact of adversary strength on the <i>k</i>-message broadcast problem.</p>","PeriodicalId":50022,"journal":{"name":"Journal of the ACM","volume":"48 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140830493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We show the following hold, unconditionally unless otherwise stated, relative to a random oracle:
•
There are NP search problems solvable by quantum polynomial-time machines but not classical probabilistic polynomial-time machines.
•
There exist functions that are one-way, and even collision resistant, against classical adversaries but are easily inverted quantumly. Similar counterexamples exist for digital signatures and CPA-secure public key encryption (the latter requiring the assumption of a classically CPA-secure encryption scheme). Interestingly, the counterexample does not necessarily extend to the case of other cryptographic objects such as PRGs.
•
There are unconditional publicly verifiable proofs of quantumness with the minimal rounds of interaction: for uniform adversaries, the proofs are non-interactive, whereas for non-uniform adversaries the proofs are two message public coin.
•
Our results do not appear to contradict the Aaronson-Ambanis conjecture. Assuming this conjecture, there exist publicly verifiable certifiable randomness, again with the minimal rounds of interaction.