Sie sind auf Seite 1von 9

Non-automatizability of bounded-depth Frege proofs

Maria Luisa Bonet Carlos Domingoy


Department of Software (LSI) Department of Software (LSI)
Universitat Politècnica de Catalunya Universitat Politècnica de Catalunya
Barcelona, Spain Barcelona, Spain
bonet@lsi.upc.es carlos@lsi.upc.es
Ricard Gavaldày Alexis Maciel
Department of Software (LSI) Dept. of Math. and Computer Science
Universitat Politècnica de Catalunya Clarkson University
Barcelona, Spain Potsdam, NY 13699-5815, U.S.A.
gavalda@lsi.upc.es alexis@clarkson.edu
Toniann Pitassiz
Department of Computer Science
University of Arizona
Tucson, AZ 85721, U.S.A.
toni@cs.arizona.edu

Abstract proof system there is a class of tautologies that requires


superpolynomial proof length is equivalent to NP = Co-
In this paper, we show how to extend the argument NP. This fact started a program that consists in trying to
due to Bonet, Pitassi and Raz to show that bounded-depth prove superpolynomial lower bounds for increasingly more
Frege proofs do not have feasible interpolation, assuming powerful proof systems. The other motivation for studying
that factoring of Blum integers or computing the Diffie- the complexity of proof systems comes from issues related
Hellman function is sufficiently hard. It follows as a to automated theorem provers. The question is: given a
corollary that bounded-depth Frege is not automatizable; particular propositional proof system, are there efficient
in other words, there is no deterministic polynomial-time algorithms for finding the shortest proofs of a tautology in
algorithm that will output a short proof if one exists. A that system? Our results have to do with both motivations,
notable feature of our argument is its simplicity. and in what follows we will explain these relationships in
more detail.
Consider first the issue of proving superpolynomial
1. Introduction lower bounds for propositional proof systems. The
interpolation method has been one of the most used and
In the last years there has been a lot of interest in promising approaches. It is inspired by Craig’s interpo-
studying the complexity of propositional proof systems. lation theorem for propositional logic which states that if
The motivation comes from two ends. On one side, Cook A(~x;~z) ! B (~y;~z) is a tautology where ~z is a vector
and Reckhow [5] showed that whether for every possible of shared variables, and ~x and ~ y are vectors of separate
 Partially supported by projects ESPRIT 20244 ALCOM-IT, TIC variables for A and B respectively, then there is a formula
97-1475-CE and CICYT TIC98-0410-C02-01. C (~z) such that A(~x;~z) ! C (~z) and C (~z) ! B (~y;~z)
y Partially supported by projects ESPRIT 20244 ALCOM-IT, TIC are tautologies. We will give a different formulation of
97-1475-CE, KOALA DGES PB95-0787 and SGR CIRIT 1997SGR- this theorem in order to use it to prove lower bounds
00366.
z Research supported by NSF Grant CCR-9457782, US-Israel BSF for unsatisfiable formulas as follows. Take an unsatisfiable
Grant 95-00238, and Grant INT-9600919/ME-103 from NSF and MŠMT formula A0 (~x;~z) ^ A1 (~y ;~z) , where ~z is a vector of shared
(Czech Republic) variables, and ~x and ~
y are vectors of separate variables for
A0 and A1 respectively. Since the formula is unsatisfiable, cryptographic assumptions: Extended Frege, Frege and
it follows that for any truth assignment ~ to ~z , either even TC 0 -Frege systems. These negative results are
A0 (~x; ~ ) is unsatisfiable or A1 (~y; ~ ) is unsatisfiable. An important not only as a guide for searching for lower
interpolation function associated with the formula is a bound techniques, but also because they imply that the
Boolean function that takes such an assignment ~ as proof system in question cannot be automatized. This
input, and outputs 0 only if A0 (~x; ~ ) is unsatisfiable, connection was first made explicit by [3] and takes us
and outputs 1 only if A1 (~y ; ~ ) is unsatisfiable. We back to the second motivation for studying propositional
say that a proof system S has the feasible interpolation proof systems.
property if whenever an unsatisfiable formula of the form A proof system S is automatizable if there exists a
A0 (~x;~z) ^ A1 (~y;~z) has a polynomial-size refutation in S , deterministic procedure D that takes as input a formula
then that formula has an interpolation function that can be f and returns an S -refutation of f (if one exists) in
computed by a polynomial-size Boolean circuit. Therefore, time polynomial in the size of the shortest S -refutation
in a proof system with the feasible interpolation property, of f . Automatizability is a crucial concept for automated
proving a superpolynomial lower bound on refutation size theorem proving: in proof complexity we are mostly
reduces to constructing a unsatisfiable formula of the form interested in the length of the shortest proof, whereas
A0 (~x;~z) ^ A1 (~y;~z) with interpolation function F and in theorem proving it is also essential to be able to
proving that F cannot be computed by polynomial-size find the proof. Bonet, Pitassi and Raz [3] show that
circuits. if S does not have feasible interpolation, then S is not
Unconditional lower bounds for proof systems have automatizable. Thus, feasible interpolation is a simple
been obtained by considering a monotone variant of the measure that formalizes the complexity/search tradeoff: the
feasible interpolation property. The main feature of this existence of feasible interpolation implies superpolynomial
type of interpolation is that the interpolation function has lower bounds (sometimes modulo complexity assump-
polynomial-size monotone circuits. So, for example, take tions), whereas the nonexistence of feasible interpolation
a function that cannot be computed by polynomial-size implies that the proof system cannot be automatized.
monotone circuits like the clique function. Define A0 (x; z ) In this paper, we use and extend the ideas in [3] to show
to say “the graph z has a clique x of size k ” and that bounded-depth Frege systems do not have feasible
A1 (y; z ) to say “the graph z has a k , 1 -coloring y ”. interpolation unless the Diffie-Hellman function can be
computed by circuits of size 2n for arbitrarily small

The conjunction of both formulas is unsatisfiable and thus
does not have polynomial-size refutations in any proof  > 0 . Note that our assumption is stronger than that of
system that has the monotone interpolation property. [3] who only needed to assume that the Diffie-Hellman
In the last few years, the interpolation method has been function cannot be computed by polynomial-size circuits.
used to prove many lower bounds. In particular, lower Also note that computing the Diffie-Hellman function is
bounds have been shown for all of the following systems: at least as hard as factoring Blum integers [1] . (See also
Resolution [2], Cutting Planes [6, 2, 13, 4], generalizations [16, 11].)
of Cutting Planes [2, 8, 7], relativized bounded arithmetic The basic idea behind the result of [3] is as follows.
[15], Hilbert’s Nullstellensatz [14], the polynomial calculus They construct a TC 0 -Frege formula DHn based on the
[14], and the Lovasz-Schriver proof system [12]. Diffie-Hellman function. The size of the formula is polyno-
On the other hand, in a separate sequence of pa- mial in n , the length of the numbers involved. The bulk of
pers beginning with a key idea due to Krajı́ček and the argument is to show that there exists a polynomial-size
Pudlák [9, 3], it has been shown that under sufficiently TC 0 -Frege refutation of DHn . On the other hand, an
strong cryptographic assumptions, many stronger proof interpolation function for DHn computes one bit of the
systems do not have feasible interpolation. The main ideas secret key exchanged by the Diffie-Hellman procedure.
are as follows. Suppose that H is a permutation that Thus, if TC 0 -Frege admits feasible interpolation, then the
is generally believed to be one-way. Formulate A0 (~x;~z) secret key exchanged by the Diffie-Hellman procedure can
as saying “ H (x) = z and the last bit of x is 0 ” and be broken using polynomial-size circuits and hence the
A1 (y; z ) as saying “ H (y) = z and the last bit of y is 1 ”. Diffie-Hellman cryptographic scheme is not secure.
Since H is injective, A0 ^ A1 is a contradiction. If the In the present paper, we will scale down the above
proof system can have a short refutation of A0 ^ A1 , then idea from n to polylog n . Consider DHm where m =
the proof system does not have the feasible interpolation polylog n . By directly applying the main theorem of [3],
property, unless H is not a one-way permutation. Using DHm has a TC 0 -Frege refutation of size polynomial in
a more general reformulation of the ideas just sketched, m . We will show how to simulate this refutation with
it has been proved that the following proof systems do an AC 0 -Frege refutation of size polynomial in n . More
not have feasible interpolation, under commonly accepted generally, we will show that any TC 0 -Frege proof of size
polynomial in n in which all the threshold and parity which allow us to introduce each connective on both
connectives have fan-in polylog n can be simulated by the left side and the right side. The cut rule allows
an AC 0 -Frege proof of size polynomial in n . Now if the derivation of ,; ,0 ! ; 0 from ,; A !  , and
AC 0 -Frege admits feasible interpolation, then the secret ,0 ! A; 0 .
key exchanged by the Diffie-Hellman procedure can be The logical rules are as follows.
broken using circuits of subexponential size and hence the
Diffie-Hellman cryptographic scheme is not secure. 1. (Negation-left) From , ! A;  , we can derive
The paper is organized as follows. In Section 2, we :A; , !  .
define the AC 0 and TC 0 -Frege systems. In Section 3,
we define some AC 0 formulas used in the simulation. In 2. (Negation-right) From A; , !  , derive , !
Section 4, we prove some preliminary lemmas. In Section :A;  .
5, we show how to simulate the restricted TC 0 -Frege
3. (And-left) From A ; ^(A ; : : : ; An ); , !  derive
1 2
proofs mentioned in the previous paragraph. In Section 6,
we prove our main result.
^(A ; : : : ; An ); , !  .
1

4. (And-right) From , ! A ;  and , ! 1


0 0
2. AC and TC -Frege systems ^(A ; : : : ; An );  derive , ! ^(A ; : : : ; An ); 
2 1

5. (Or-left) From A ; , !  and _(A ; : : : ; An ); , !


1 2
We will work with the specific bounded-depth threshold  derive _(A ; : : : ; An ); , ! 
1
logic system TC 0 -Frege defined in [10] and also used in
[3]. This system is a sequent-calculus logical system where 6. (Or-right) From , ! A ; _(A ; : : : ; An );  derive
1 2
formulas are built up using the connectives _ , ^ , Thk , , ! _(A ; : : : ; An );  .
1
: , and b . Thk (x) is true if and only if the number of
1’s in x is at least k , and b (x) is true if and only if the 7. (Mod-left) From A ; b, (A ; : : : ; An ); , !  and
1 1 2

number of 1’s in x is equal to b mod 2 . b (A ; : : : ; An ); , ! A ;  derive b (A ; : : : ; An );


2 1 1
, ! .
(Mod-right) From A ; , ! b, (A ; : : : ; An ); 
Definition 1 Formulas are built up using the connectives
^ , _ , Thk , 1 , 0 , : . All connectives are assumed to 8. 1
and , ! A ; b (A ; : : : ; An );  derive , !
1 2

have unbounded fan-in. Thk (A1 ; : : : ; An ) is interpreted 1 2

to be true if and only if the number of true Ai ’s is at least


b (A ; : : : ; An );  .
1

k ; b (A1 ; : : : ; An ) is interpreted to be true if and only if 9. (Threshold-left) From Thk (A ; : : : ; An ); , ! 


the number of true Ai ’s is equal to b mod 2 .
2
and A ; Thk, (A ; : : : ; An ); , !  derive
1 1 2
Thk (A ; : : : ; An ); , !  .
The formula ^(A1 ; : : : ; An ) denotes the logical AND
1

of the multi-set consisting of A1 ; : : : An , and similarly for 10. (Threshold-right) From , ! A ; Thk (A ; : : : ; An );
_ , b and Thk . Thus commutativity of the connectives is
1 2
 and , ! Thk, (A ; : : : ; An );  derive , !
1 2
implicit. Our proof system operates on sequents which are Thk (A1 ; : : : ; An );  .
sets of formulas of the form A1 ; : : : ; Ap ! B1 ; : : : ; Bq .
The intended meaning is that the conjunction of the Ai ’s The size of a proof is the total size of all the formulas
implies the disjunction of the Bj ’s. A proof of a sequent S that occur in the proof. The depth of a proof is the
in our logic system is a sequence of sequents, S1 ; : : : ; Sr , maximum depth of all the formulas that occur in the
such that each sequent Si is either an initial sequent, or proof.
follows from previous sequents by one of the rules of A family of sequents (,1 ! 1 ); (,2 ! 2 ); (,3 !
inference, and the final sequent, Sr , is S . 3 ); : : : has TC 0 -Frege proofs if each sequent has a
The initial sequents are of the form: (1) A ! A where bounded-depth proof of size polynomial in the size of the
A is any formula; (2) ! ^() ; _() ! ; (3) 1() ! ; ! sequent. More precisely,
0() ; and (4) Thk () ! for k  1 ; ! Th0 (A1 ; : : : ; An )
for n  0 . The rules of inference are as follows. Note that Definition 2 Let F = f(,n ! n ) : n 2 N g be a family
the logical rules are defined for n  1 and k  1 . First we N
of sequents. Then fRn : n 2 g is a family of TC 0 -Frege
have simple structural rules such as weakening (formulas proofs for F if there exist constants c and d such that the
can always be added to the left or to the right), contraction following conditions hold: (1) Each Rn is a valid proof
(two copies of the same formula can be replaced by one), of (,n ! n ) in our system; (2) For all i , the depth of
and permutation (formulas in a sequent can be reordered). Rn is at most d ; and (3) For all n , the size of Rn is at
The remaining rules are the cut rule, and logical rules most (size(,n ! n ))c .
We say that a formula f can be arranged into d levels 1. TTj : this will be a depth 2 circuit that takes
if the connectives of f can be arranged into d groups as input (log n)1=2 numbers, each of length j
L1; : : : ; Ld called levels such that all the inputs of every and outputs their sum. We will only use TTj
connective at some level are either propositional variables for j = O(log log n) , thus these circuits take less
or connectives from the previous levels. Note that f can than log n inputs, and can therefore be defined by
be arranged into d levels if and only if f has depth at the obvious DNF formulas. (TT thus stands for
most d . Moreover, if f has depth less than d , then some truth-table definition.) Note that if j = k log log n ,
of the levels may be empty. then the number of output bits of TTj will be
(k + 1=2) log log n . The formula TTjl represents
Definition 3 The AC 0 -Frege system is a restriction of the the lth output bit of TTj .
TC 0 -Frege system, where we omit the parity and threshold
connectives and the associated rules. 2. +j : This circuit takes two numbers, each j -bits
long, and outputs their sum. Since we will use this
In the following sections, we will use the symbols 0 circuit only for j = O(log log n) , again the total
and 1 in our formulas. These will simply stand for the number of bits is much less than log n , so we will
formulas x ^ :x and x _ :x , respectively. Thus the use the obvious depth-2 truth-table circuit. Note that
sequents 0 ! and ! 1 have constant-size AC 0 -Frege the number of output bits of +j will be j + 1 .
proofs.
3. GEj : This is a depth-2 formula that takes two j -bit
numbers x and y as input and outputs 1 if and only
3. Notation and AC 0 counting formulas if x is greater than or equal to y . We will be using
GEj only for j = O(log log n) , so again this circuit
In this section we will describe some of the AC 0 will be the obvious depth-2 truth-table formula.
formulas that we will be using. Recall that our goal is to 4. EQUIVj : This is a depth-2 formula that takes two
show that TC 0 -Frege proofs of size polynomial in n in j -bit numbers x and y as input and outputs 1 if and
which all the threshold and parity connectives have fan-in only if x is congruent to y modulo 2 . We will be
polylog n can be simulated by AC 0 -Frege proofs of size using EQUIVj only for j = O(log log n) , so again
polynomial in n . To this end, we will define AC 0 circuits this circuit will be the obvious depth-2 truth-table
of size polynomial in n that can simulate threshold and formula.
parity gates of fan-in polylog n .
We will first show how to add polylog n many bits 5. SUMj;i : This circuit takes as input i numbers, each
using AC 0 circuits of size polynomial in n . The j bits long and outputs their sum. The circuit will be
general idea is as follows. Suppose that the original defined inductively using the TT subcircuits repeat-
input bits are x1 ; : : : ; xm , where m = (log n)k for edly. First, SUMj;0 () = 0 and SUMj;1 (x1 ) = x1 .
some k . We will sum these numbers in a divide and Next, consider SUMj;i (x1 ; : : : ; xi ) for i > 1 . There
conquer fashion, by dividing these inputs into (log n)1=2 are two cases, depending on whether or not i is
consecutive groups, where each group will have size a power of (log n)1=2 . First, if i is not a power
(log n)k,1=2 . After adding the numbers in each group of (log n)1=2 , then SUMj;i (x1 ; : : : ; xi ) is equal to
(recursively), we will have (log n)1=2 numbers, each of SUMj;i (x1 ; : : : ; xi ; 0; : : : ; 0) , where we pad with the
length (k , 1=2) log log n . For the final step, we notice minimum number of zeroes such that the total number
that the total number of bits is less than log n , and thus of inputs is a power of (log n)1=2 . In the second
these (log n)1=2 numbers can be added using a DNF case, assume that i is a power of (log n)1=2 , and
formula of size at most n . To summarize, the AC 0 specifically let i = (log n)k . The idea is that
circuit to add (log n)k 1-bit numbers will be composed SUMj;i (x1 ; : : : ; xi ) will be a full tree consisting of
of 2k levels. The input level (level 2k ) will consist of 2k levels of TT ’s. We define SUMj;i as follows:
(log n)k,1=2 “truth table” subcircuits, TT1 , where each
SUMj;(log n) (x1 ; : : : ; x(log n)k )
k
truth-table subcircuit will take (log n)1=2 numbers, each
of length 1, and output their sum. Finally the output level = TTj+(k,1=2) log log n (A1 ; : : : ; A(log n)1=2 )
(level one), will consist of a single truth-table subcircuit,
TT(k,1=2) log log n , which will again take (log n)1=2 num- where Ar = SUMj;(log n)
,
k 1=2
(xmr,1 +1 ; : : : ; xmr )
bers, each of length (k , 1=2) log log n and output their and mt = t(log n)k,1=2 .
sum.
We proceed more carefully below. We define five types 6. THik (x1 ; : : : ; xi ) : This is a constant-depth formula
of AC 0 circuits as follows. that takes i one-bit inputs, and outputs 1 if and only
if the number of 1’s is k or greater. It is defined 1.(, ! F (A); ) from (, ! F (B ); ) , (,; B !
to be equal to GElog i (SUM1;i (x1 ; : : : ; xi ); k ) . It A; ) and (,; A ! B; ) .
2. (,; F (A) ! ) from (,; F (B ) ! ) , (,; B !
is important to note that in simulating the original
threshold gate, Thk , we are going from an unordered
list of the variables to an ordered list of the variables. A; ) and (,; A ! B; ) .
That is, in our formula for THik , the order of the
Lemma 5 In AC 0 -Frege, for every formula A and F (x) ,
variables matters. Even though commutativity of
the following sequents can be proved in size polynomial
the underlying variables was implicit in Thk , we
in the size of A and F (x) :
will need to show that permutation of THk can be
simulated by our formulas. 1. F (0) ! A; F (A)
7. PARITYib (x1 ; : : : ; xi ) : This is a constant-depth for- 2. F (1); A ! F (A)
mula that takes i one-bit inputs, and outputs 1
if and only if the number of 1’s is congruent 3. F (A); A ! F (1)
to b modulo 2 . It is defined to be equal to F (A) ! A; F (0)
EQUIVlog i (SUM1;i (x1 ; : : : ; xi ); b) . Again, we will
4.
need to show that permutation of PARITYb can be Lemma 6 In AC 0 -Frege, for every formula A and F (x) ,
simulated by our formulas. the following sequents can be derived in size polynomial
in the size of A and F (x) :
To simplify notation, we will usually omit the super-
scripts on the above AC 0 formulas. (They can be figured 1. ! F (A) from ! F (0) and ! F (1) .
out from context.) It will be helpful to keep in mind that
the length of all intermediate numbers will be at most 2. F (A) ! from F (0) ! and F (1) ! .
O(log log n) (i.e., j = O(log log n) .) Lemma 7 In AC 0 -Frege, for every formula F (x1 ; : : : ; xn )
Also, sometimes we will use the notation f = g , where
and for every sequence of formulas A1 ; : : : ; An , if
f and g are circuits, each with j outputs. For example, ! F (A1 ; : : : ; An ) is a tautology, then ! F (A1 ; : : : ; An )
SUM(A1 ; A2 ; : : : ; Am ) = SUM(A2 ; A1 ; : : : ; Am ) . This
V can be derived from sequents of the form F (B1 ; : : : ; Bn )
j
notation is shorthand for the sequent ! i=1 ((:fi _ gi ) ^
(:gi _ fi )) . However, when f = g occurs in a sequent,
! F (B(1) ; : : : ; B(n)) where  is a permutation. The
Vj
then it represents the formula i=1 ((:fi _ gi ) ^ (:gi _ fi )) .
size of the derivation is polynomial in the size of
F (x1 ; : : : ; xn ) and of the Ai ’s.
Lastly, in general, we will write the above formulas in
prefix notation (i.e., GE(x; y ) ), but for the + formulas Proof By induction on m , we show how to derive the
we will usually use infix notation (i.e., x + y ). sequents ! F (A1 ; : : : ; Am ; 0i ; 1n,m,i ) , 0  i  n ,
m . The base case, m = 0 , is easy since the sequents
4. Preliminaries ! F (0i ; 1n,i ) , 0  i  n , contain no variables.
Suppose that the case m holds. Let i
be arbitrary. We want to derive the sequent
The lemmas of this section will greatly simplify the
arguments in the rest of the article. Let F (x) be a
! F (A1 ; : : : ; Am+1 ; 0i ; 1n,(m+1),i ) . By Lemma 6, it is
sufficient to derive ! F (A1 ; : : : ; Am ; 0; 0i ; 1n,(m+1),i )
formula depending on propositional variable x . F may and ! F (A1 ; : : : ; Am ; 1; 0i ; 1n,(m+1),i ) . These two se-
also depend on other variables; the notation F (x) means
that only x is relevant in the context. Given another
quents follow from the inductive hypothesis by permuting
the arguments of F .
formula A , F (A) will denote the formula obtained by The bound on the size of the derivation is easy to
replacing every occurrence of x by A . A derivation of a
sequent S from S1 ; : : : ; Sp is a proof of S that uses the
verify. In particular, the total number of permutation
sequents S1 ; : : : ; Sp as additional initial sequents.
sequents used is bounded by n2 . ut
Lemma 4 can be proved by induction on the structure Lemma 8 In AC 0 -Frege, if , !  is a tautology with
of the formula F . Lemma 5 then follows from Lemma 4, at most O(log n) variables, then , !  can be proved
and Lemma 6, from Lemma 5. in size polynomial in n and in the size of , !  .

Lemma 4 In AC 0 -Frege, for every formula A , B and Proof Since the total number of variables is only
F (x) , and for every sequence of formulas , and  , the O(log n) , the total number of truth assignments to the
following sequents can be derived in size polynomial in variables is nO(1) . The proof proceeds by giving linear
the size of A , B , F (x) , , and  : size proofs (in the size of the sequent) of ; , !  , where
 is a set of literals, corresponding to a particular truth parity connectives have fan-in polylog n , then the AC 0
assignment to all O(log n) variables. Then these proofs translation of , !  has an AC 0 -Frege proof of size
are combined using repeated applications of the cut rule polynomial in n .
to remove the literals in  , one-by-one. ut
The proof will be by induction on the number of steps
Lemma 9 Let , !  be an AC -Frege tautology with
0
in P . For i = 1; : : : ; jP j , we will show that there is an
underlying variables x1 ; : : : ; xm . Let f1 ; : : : ; fq be dis- AC 0 -Frege proof of L0i , of size polynomial in n , with
joint subformulas occurring in , !  . Let ,0 ! 0 be intermediate lines L01 ; : : : ; L0i,1 .
the result of replacing every occurrence of each subformula For the inductive basis, we need to give polynomial-size
fi by the variable Ai . Suppose that the Ai ’s are now the AC 0 -Frege proofs of the initial sequents of the TC 0 -Frege
only variables in ,0 ! 0 . If ,0 ! 0 is also a tautology system. The first of these sequents is A ! A which
and q = O(log n) , then , !  has an AC 0 -Frege proof translates to A0 ! A00 where A0 and A00 are two—
of size polynomial in n and in the size of , !  . possibly different—AC 0 translations of A . Our first task
is therefore to give a polynomial-size AC 0 -Frege proof of
Proof The proof is very similar to the one above, except A0 ! A00 . We start with the following lemma.
that now we obtain linear size proofs (in the size of the
sequent) of ; , !  , but where now  corresponds to a Lemma 11 Let m = polylog n . The sequents
particular truth assignment to all of the O(log n) formulas THk (A1 ; : : : ; Am ) ! THk (A(1) ; : : : ; A(m) ) and
A1 ; : : : ; Aq . Since ,0 ! 0 is a tautology, each of these PARITYb (A1 ; : : : ; Am ) ! PARITYb (A(1) ; : : : ; A(m) ) ,
nO(1) sequents is true and has a simple linear sized proof. where  is any permutation, have AC 0 -Frege proofs of
Now again, we use repeated applications of the cut rule size polynomial in n .
(now applied to constant-depth formulas) to remove all of
the formulas in  , one-by-one. ut Proof The formula THk (A1 ; : : : ; Am ) is de-
fined as GE(SUM(A1 ; : : : ; Am ); k ) and the circuit
SUM(A1 ; : : : ; Am ) has only O(log log n) outputs. There-
5. Simulating the restricted TC 0 -Frege proofs fore, by Lemma 9, the sequent

Let P denote a TC 0 -Frege proof of a sequent , !  . THk (A1 ; : : : ; Am );


Suppose that P has size polynomial in n and that all (SUM(A1 ; : : : ; Am ) = SUM(A(1) ; : : : ; A(m) ))
the threshold and parity connectives in P have fan-in
polylog n . Our goal in this section is to show that
! THk (A(1) ; : : : ; A(m) )
P can be simulated by an AC 0 -Frege proof of size has an AC 0 -Frege proof. This implies that to
polynomial in n . This will be done by translating the lines prove THk (A1 ; : : : ; Am ) ! THk (A(1) ; : : : ; A(m) ) ,
L1; : : : ; LjP j of P into equivalent AC 0 -Frege sequents it is sufficient to prove that SUM(A1 ; : : : ; Am ) =
that will constitute the skeleton of an AC 0 -Frege proof. SUM(A(1) ; : : : ; A(m) ) . The same is true for the
More precisely, each line Li will be translated into L0i PARITYb sequent.
and L01 ; : : : ; L0jP j,1 will become intermediate lines in an In order to show that SUM(A1 ; : : : ; Am ) =
AC 0 -Frege proof of L0jP j . SUM(A(1) ; : : : ; A(m) ) , it suffices to show that
An AC 0 formula A0 is an AC 0 translation of a TC 0
formula A if A0 can be obtained by replacing every SUM(A1 ; : : : ; Ar ; : : : ; As ; : : : ; Am )
threshold and parity connective in A by the TH and = SUM(A1 ; : : : ; As ; : : : ; Ar ; ::Am ):
PARITY formulas defined in Section 3. Note that if A
has size polynomial in n and if the threshold and parity In other words, it suffices to show that the result holds
connectives in A all have fan-in polylog n , then A0 has when we transpose two elements, Ar and As . The idea
size polynomial in n . Also note that A0 is not unique will be to rewrite SUM(A1 ; : : : ; Ar ; : : : ; As ; : : : ; Am ) in
since the arguments of the connectives are multi-sets while terms of the variables Ar and As , and O(log n) new
the inputs to the TH and PARITY formulas are ordered. (meta)variables. This will be done by replacing most of the
The notion of an AC 0 translation extends in the obvious subformulas of the original formula by these new variables.
way to sequents. The formula SUM(A1 ; : : : ; As ; : : : ; Ar ; : : : ; Am ) will be
The main result of this section can now be stated rewritten in a similar way. The resulting two formulas
precisely. will be truth-functionally equivalent, and since they will
involve only O(log n) variables, we will be able to apply
Theorem 10 If , !  has a TC 0 -Frege proof of Lemma 9 to complete the proof. In order to see how to
size polynomial in n in which all the threshold and do this, we will need some notation.
Recall that the SUM circuit on m = (log n)k 1-bit Lemma 12 Let A0 and A00 be AC 0 translations of the
inputs is divided into 2k levels, where each level consists same TC 0 -Frege formula A . Suppose that A has size
of depth-2 TT circuits. Let j = (log n)1=2 . Then the polynomial in n and that all the threshold and parity
SUM circuit on A1 ; : : : ; Am can be viewed as a tree connectives in A have fan-in polylog n . Then the sequent
with 2k levels. Let  denote a particular path in this A0 ! A00 has an AC 0 -Frege proof of size polynomial in
tree. (So the nodes in the tree at level 1 have path names n.
1; : : : ; j ; the nodes in the tree at level 2 have path names
11; 12; : : :; 1j; 21; 22; : : :; 2j; : : : ; j 1; : : : ; jj and so on.) Proof The proof is by induction on the struc-
Then Xi will denote the subcircuit at level i in the tree ture of A . The inductive basis is trivial. For
obtained by following the path  . In this notation, we the inductive step, several cases need to be consid-
have SUM(A1 ; : : : ; Am ) = TT(X11 ; X12 ; : : : ; X1j ) and in ered depending on the top connective of A . Sup-
general Xi = TT(Xi;+1 ; Xi;+12 ; : : : ; Xi;j pose, for example, that A is a formula of the form
+1 ) . Also, notice
1

that X2k are vectors of j input variables. Thk (A1 ; : : : ; Am ) . Then A0 = THk (A0(1) ; : : : ; A0(m) )
Assume for notational simplicity that Ar 2 X211k :::1 and A00 = THk (A00(1) ; : : : ; A00(m) ) , where  and  are
and As 2 X2jj:::j k . That is, Ar is the very first variable permutations and the primes and double primes indicate
and As is the very last variable. Then we will write different AC 0 translations of the same formula. We want
SUM(A1 ; : : : ; Am ) as follows: to derive A0 ! A00 . By Lemma 11, it is sufficient to
derive THk (A01 ; : : : ; A0m ) ! THk (A001 ; : : : ; A00m ) .
SUM(A1 ; : : : ; Am ) Let F (x) = THk (A01 ; : : : ; A0m,1 ; x) . By Lemma 4,
= TT(X11; X12 ; : : : ; X1j ) and by the inductive hypothesis applied to Am , we can
derive F (A0m ) ! F (A00m ) , that is,
= TT(
TT(X211 ; X212; : : : ; X21j ); THk (A01 ; : : : ; A0m,1 ; A0m )
X12; : : : ; X1j,1 ; ! THk (A01 ; : : : ; A0m,1 ; A00m ):
TT(X2j1 ; : : : ; X2jj ) ) Repeat this, with a different formula F (x) , to get
= TT(
TT( THk (A01 ; : : : ; A0m,2 ; A0m,1 ; A00m )
TT(X3111 ; : : : ; X311j ); ! THk (A01 ; : : : ; A0m,2 ; A00m,1 ; A00m ):
X212 ; : : : ; X21j ); Continue repeating until we get
X12; : : : ; X1j,1 ;
TT( THk (A01 ; A002 ; : : : ; A00m )
X2j1 ; : : : ; X2j(j,1) ; ! THk (A001 ; A002 ; : : : ; A00m ):
TT(X3jj1 ; : : : ; X3jjj ) ) ): A series of cuts will now produce the desired sequent.
The other cases are similar and the bound on the size
The idea of the above representation is that we are of the proof is easy to verify. ut
representing most of the SUM circuit by large subformulas
that are never looked at; only the part of the circuit that Note that the proof of Lemma 11 is the only place in
must be opened up in order to look at Ar and As the proof of Theorem 10 where we mention the particular
will be represented. Thus, in this representation, the definitions we are using for the TH and PARITY for-
number of metavariables that are represented in total is mulas. Therefore, our proof of Theorem 10 works with
4kj (polylog n) = O(log n) . This is because at each level, any kind of AC 0 translation that is obtained by replacing
we are adding 2j new variables, each of length polylog n every threshold and parity connective by AC 0 formulas
and the number of levels is 2k . that satisfy the property stated in Lemma 11.
In the same manner, we break up the formula Let us now return to the inductive basis of the proof
SUM(A1 ; : : : ; As ; : : : ; Ar ; : : : ; Am ) with Ar and As of Theorem 10. The initial sequent A ! A is taken
transposed. Again, this formula will involve O(log n) care of by Lemma 12. The sequents ! ^() and _() !
metavariables, and these metavariables will be identical to remain unchanged under AC 0 translation and are therefore
the metavariables involved in SUM(A1 ; : : : ; Am ) . Fur- handled by the identical AC 0 -Frege initial sequents. Next,
thermore, these two formulas (on O(log n) metavariables) the sequents 1 () ! , ! 0 () and Thk () ! , for k  1 ,
are equivalent. Thus we can apply Lemma 9 to complete become PARITY1 () ! , ! PARITY0 () and THk () ! ,
the proof. ut respectively. These are all tautologies with no variables
that can therefore be easily proven. Finally, the sequent Using Lemma 11, we can easily prove that the arguments
! Th0 (A1 ; : : : ; Am ) becomes ! TH0 (A1 ; : : : ; Am ) , a of G0 and G1 can be permuted. Therefore, by Lemma 7,
tautology that can be proven using Lemmas 7 and 11. we get ! G0 (A2 ; : : : ; Am ) and ! G1 (A2 ; : : : ; Am ) .
We now move to the inductive step. Suppose that we Now by Lemma 6, we get
have an AC 0 -Frege proof of L0i , of size polynomial in
n , with intermediate lines L01 ; : : : ; L0i,1 . We want to ! THk (A ; A ; : : : ; Am ) _ :THk (A ; : : : ; Am ) :
1 2 2

get an AC 0 -Frege proof of L0i+1 , of size polynomial in


n , with intermediate lines L01; : : : ; L0i . In the original The first sequent can be easily derived from this. The
ut
TC 0 -Frege proof P , Li+1 is either an initial sequent or
proof of the other sequents is similar.
obtained from previous sequents by one of the TC 0 -Frege Continuing with the simulation of the Th -right
inference rules. If Li+1 is an initial sequent, then we rule, let A0 = A01 , B 0 = THk (A02 ; : : : ; A0m ) ,
are done by the argument used in the inductive basis. So C 0 = THk,1 (A02 ; : : : ; A0m ) and D0 = THk (A01 ; : : : ; A0m ) .
suppose that Li+1 was obtained from previous sequents We want to derive ,0 ! D0 ; 0 from ,0 ! A0 ; B 0 ; 0
by one of the TC 0 -Frege inference rules. We will show and ,0 ! C 0 ; 0 . From the second sequent in Lemma 13,
how to simulate these rules using AC 0 -Frege proofs of we have A0 ; C 0 ! D0 . Using this together with
size polynomial in n . ,0 ! C 0 ; 0 we can apply weakening and cut to
All of the structural rules as well as the cut, : -left, derive ,0 ; A0 ! D0 ; 0 . Now applying cut to this
: -right, ^ -left, ^ -right, _ -left and _ -right rules can be formula together with ,0 ! A0 ; B 0 ; 0 yields the formula
easily simulated by using Lemma 12 and the corresponding ,0 ! D0 ; B 0 ; 0 . Finally, applying weakening and cut to
AC 0 -Frege rules. We are left with the  -left,  -right, this formula together with B 0 ! D0 , the first sequent in
Th -left and Th -right rules. Lemma 13, we derive ,0 ! D0 ; 0 as desired.
Consider the Th -right rule. Suppose that Li+1 is a
sequent of the form , ! Thk (A1 ; : : : ; An );  and that
The simulation of the threshold-left rule is similar. The
simulation of the  rules is also similar except that it uses
Li+1 was derived from , ! A1 ; Thk (A2 ; : : : ; An ); 
and , ! Thk,1 (A2 ; : : : ; An );  . We need to show
the following lemma instead of Lemma 13:
that ,0 ! THk (A0(1) ; : : : ; A0(n) ); 0 can be de- Lemma 14 Let m = polylog n . The following sequents
rived from ,00 ! A001 ; THk (A00(2) ; : : : ; A00(n) );  and have AC 0 -Frege proofs of size polynomial in n .
,000 ! THk,1 (A000 (2) ; : : : ; A000 (n) ); 000 , where  ,  and
 are permutations and the primes, double primes and 1. A1 ; PARITYb (A1 ; : : : ; Am )
triple primes indicate different AC 0 translations of the ! PARITYb,1 (A2 ; : : : ; Am )
same formula or sequent. By Lemmas 11 and 12, it PARITYb (A1 ; : : : ; Am )
is sufficient to show that ,0 ! THk (A01 ; : : : ; A0n ); 0
2.
! A1 ; PARITYb (A2 ; : : : ; Am )
can be derived from ,0 ! A01 ; THk (A02 ; : : : ; A0n );  and
,0 ! THk,1 (A02 ; : : : ; A0n ); 0 . We will use the following 3. A1 ; PARITYb,1 (A2 ; : : : ; Am )
lemma: ! PARITYb (A1 ; : : : ; Am )
Lemma 13 Let m = polylog n . The following sequents 4. PARITYb (A2 ; : : : ; Am )
have AC 0 -Frege proofs of size polynomial in n . ! A1 ; PARITYb (A1 ; : : : ; Am )
1. THk (A2 ; : : : ; Am ) ! THk (A1 ; : : : ; Am ) The proof this lemma is similar to that of Lemma 13.
2. A1 ; THk,1 (A2 ; : : : ; Am ) ! THk (A1 ; : : : ; Am )
6. Our main result
3. THk (A1 ; : : : ; Am ) ! THk,1 (A2 ; : : : ; Am )
4. THk (A1 ; : : : ; Am ) ! A1 ; THk (A2 ; : : : ; Am ) We are now ready to prove our main theorem.

Proof Consider the first sequent. Let Theorem 15 Assuming that the Diffie-Hellman function
cannot be computed with circuits of size 2n for any


G0 (A2 ; : : : ; Am )  > 0 , AC 0 -Frege does not have feasible interpolation.


= THk (0; A2 ; : : : ; Am ) _ :THk (A2 ; : : : ; Am )
Proof DHm , as defined by [3], is a TC 0 -Frege formula
and with m variables and of size polynomial in m . By the
main theorem of [3], DHm has a TC 0 -Frege refutation
G1 (A2 ; : : : ; Am ) of size polynomial in m . Setting m = polylog n , by
= THk (1; A2 ; : : : ; Am ) _ :THk (A2 ; : : : ; Am ): Theorem 10, it follows that the AC 0 translation of DHm
has an AC 0 -Frege refutation of size polynomial in n . [16] Z. Shmuely. Composite diffie-hellman public-key gener-
Note that any AC 0 translation of DHm has the same ating systems are hard to break. Technical Report 356,
interpolation function as DHm itself. Thus, if AC 0 -Frege Computer Science Department, Technion, Israel, 1985.
has feasible interpolation, then for every k , the Diffie-
Hellman function on (log n)k many bits has circuits of
size polynomial in n . The result follows. ut
References

[1] E. Biham, D. Boneh, and O. Reingold. Generalized diffie-


hellman modulo a composite is not weaker than factoring.
Technical Report 97-14, Theory of Cryptography Library,
1997. Available at http://philby.ucsd.edu/cryptolib.html.
[2] M. Bonet, T. Pitassi, and R. Raz. Lower bounds for cutting
planes proofs with small coefficients. Journal of Symbolic
Logic, 62(3):708–728, 1997.
[3] M. L. Bonet, T. Pitassi, and R. Raz. No feasible
interpolation for TC 0 -Frege proofs. In Proceedings of
the 38th IEEE Symposium on Foundations of Computer
Science, pages 254–263, 1997.
[4] S. Cook and A. Haken. An exponential lower bound
for the size of monotone real circuits. In Proceedings of
the 36th IEEE Symposium on Foundations of Computer
Science, 1995. To appear in J. Comput. System Sci.
[5] S. Cook and R. Reckhow. The relative efficiency of
propositional proof systems. J. Symbolic Logic, 44:36–50,
1979.
[6] R. Impagliazzo, T. Pitassi, and A. Urquhart. Upper
and lower bounds for tree-like cutting planes proofs. In
Proceedings of the IEEE Symposium on Logic in Computer
Science, 1994.
[7] J. Krajı́ček. Discretely ordered modules as a first-order
extension of the cutting planes proof system. Submitted.
[8] J. Krajı́ček. Interpolation theorems, lower bounds for proof
systems and independence results for bounded arithmetic.
To appear in the J. Symbolic Logic.
[9] J. Krajı́ček and P. Pudlák. Some consequences of cryp-
tographical conjectures for S21 and EF . In D. Leivant,
editor, Logic and Computational Complexity, volume 960
of Lecture Notes in Computer Science, pages 210–220.
Springer-Verlag, 1995.
[10] A. Maciel and T. Pitassi. Towards lower bounds for
bounded-depth frege proofs with modular connectives. In
P. Beame and S. Buss, editors, Proof Complexity and
Feasible Arithmetics, volume 39 of DIMACS Series in
Discrete Mathematics and Theoretical Computer Science,
pages 195–227. American Mathematical Society, 1998.
[11] K. McCurley. A key distribution system equivalent to
factoring. J. Cryptology, 1:95–105, 1988.
[12] P. Pudlák. Personal communication.
[13] P. Pudlák. Lower bounds for resolution and cutting planes
proofs and monotone computations. J. Symbolic Logic,
62(3), 1997.
[14] P. Pudlák and J. Sgall. Algebraic models of computation
and interpolation for algebraic proof systems. Submitted.
[15] A. Razborov. Unprovability of lower bounds on the circuit
size in certain fragments of bounded arithmetic. Izvestiya
of the R.A.N., 59(1):201–224, 1995.

Das könnte Ihnen auch gefallen