[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/22145.22192acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free access

Trading group theory for randomness

Published: 01 December 1985 Publication History

Abstract

In a previous paper [BS] we proved, using the elements of the theory of nilpotent groups, that some of the fundamental computational problems in matriz groups belong to NP. These problems were also shown to belong to coNP, assuming an unproven hypothesis concerning finite simple groups.
The aim of this paper is to replace most of the (proven and unproven) group theory of [BS] by elementary combinatorial arguments. The result we prove is that relative to a random oracle B, the mentioned matrix group problems belong to (NP∩coNP)B.
The problems we consider are membership in and order of a matrix group given by a list of generators. These problems can be viewed as multidimensional versions of a close relative of the discrete logarithm problem. Hence NP∩coNP might be the lowest natural complexity class they may fit in.
We remark that the results remain valid for black box groups where group operations are performed by an oracle.
The tools we introduce seem interesting in their own right. We define a new hierarchy of complexity classes AM(k) “just above NP”, introducing Arthur vs. Merlin games, the bounded-away version of Papdimitriou's Games against Nature. We prove that in spite of their analogy with the polynomial time hierarchy, the finite levels of this hierarchy collapse to AM=AM(2). Using a combinatorial lemma on finite groups [BE], we construct a game by which the nondeterministic player (Merlin) is able to convince the random player (Arthur) about the relation [G]=N provided Arthur trusts conclusions based on statistical evidence (such as a Slowly-Strassen type “proof” of primality).
One can prove that AM consists precisely of those languages which belong to NPB for almost every oracle B.
Our hierarchy has an interesting, still unclarified relation to another hierarchy, obtained by removing the central ingredient from the User vs. Expert games of Goldwasser, Micali and Rackoff.

References

[1]
L. Adleman, Two theorems on random polynomial time, in' Proc. 19th IEEE Syrup. Found. Comp. Sei., 1078, pp. 75-8,3
[2]
L. Bahai, On the eomplexity of matrix group problems 1I, in preparation
[3]
L. Babai and P. Erdbs, Representation of gro,p elements as short products, in: Theory and Practice of Combinatorics (A. Rosa et al. eds.), Annals of Distr. Math. 12 (1982), pp. 27-30
[4]
L. Babai and E. Szemerddi, On the comp}exity of matrix group problems I, in: Proc. 25th IEEE Syrup. Found. Comp. Sei., Palm Beach, FL 1084, pp. 220-240
[5]
C. l{. Bennett and J. Gill, Relative to a random oracle A, Pa~NP~y~coNp'4 with probability 1, SIAM J. Comp. 10 (1981), 96-113
[6]
L. Bahai, W. M. Kantor and E. M. Luks, Con~putational complexity and the classification of finite simple gro, ps, in: Proc. 24th IEEE Syrup. Found. Comp. Sci., Tucson AZ 1983, pp. 162-171
[7]
J. 1,. C~rter and M. N. Wegman, Universal classes of hash functions, JCSS 18, no.2 (1079), 143-154
[8]
M. L. Furst, J. Hoperoft and E. M. Luks, Polynomial-time algorithms for permutation groups, in' Proc. 21st IEEE Symp. Found. Comp. Sci., Syracuse, N. Y. 1980, pp. 36-41
[9]
O. Gaber and Z. Galil, Explicit construction of linear sized superconeentrators, j. Comp. Syst. Sei. 22 (1981), 40%420
[10]
J. Gill, Computational complexity of probabilistic Turing machines, SiAM J. Comp. 6 (1077), 675-605
[11]
S. Goldwasser, S. Mieali and C. Rackoff, The knowledge complexity of interactive protocols, in: Proe. 17th ACM Symp. Theory of Comp., Providence, R. I. 1985 (this volume)
[12]
S. A. Kurtz, Randomness and genericity in thc degrees of unsolvability, Ph.D. Thesis, Univ. of Illinois at Urbana, 1981
[13]
C. l,autemann, Bi'P and the polynomial hierarchy, Info. Pro~. Letters 17, no.4 (1~183) 215-217
[14]
G. A. Margulis, Explicit constructions of concentrators, Probl. Pored. lnfo. 9 (1973}, 71-80 {English transl, in Probi. lnfo. Transm. (~975), a2a-aa2)
[15]
K. A. Mihailova, The occurrence problem for direct products of groups {Russian), Dokl. Akad. Nauk SSSR 119 (1958), 1103-1105 and M~t. Sb. (N. S.) 7O (tl2)(~g66), 24~-281
[16]
G. L. Miller, Riemann's hypothesis and tt~ts for primMity, J. Comput. System Sci. 13- (1076), 300-317
[17]
C. H. Papadimitriou, Games against Nature, in: Proc. 24th IEEE Syrup. Found. Comp. Sci., Tucson AZ, 1983, pp. 446-450
[18]
M. Pinsker, On the complexity of a concentrator, 7th Internat. Teletraffic Conf., Stockholm 107a, als/1-4
[19]
N. Pippenger, Superconcentrators, SIAM J. Comp. 6 (1977), 298-304
[20]
Gerald E. Sacks, Degrees of unsolvability, Annals of Math. Studies 55, Princeton Univ. Press, Princeton N.J. 1066 (2nd ed.)
[21]
C. C. Sims. Some group theoretic algorithms, in: Lect. Notes in Math., Springer, N. Y. 1078, pp. 108-124
[22]
M. Sipser, A complexity theoretic approach to randomness, in: Proc. 15th ACM Syrup. on Theory of Comp.: Boston 1983, 330-335
[23]
R. Solovay and V. Strassen, A fast Monte Carlo test for primality, SIAM J. Comp. 6 (1977) 84-85
[24]
L. Stoekmeyer, The polynomial time hiararchy, Theor. Comp. Sci. 3, no. I (1976}, 1-22

Cited By

View all
  • (2024)Special Soundness in the Random Oracle ModelIACR Communications in Cryptology10.62056/avivommolOnline publication date: 7-Oct-2024
  • (2024)Special Soundness RevisitedIACR Communications in Cryptology10.62056/aep2c3w9pOnline publication date: 7-Oct-2024
  • (2024)zkPi: Proving Lean Theorems in Zero-KnowledgeProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670322(4301-4315)Online publication date: 2-Dec-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
STOC '85: Proceedings of the seventeenth annual ACM symposium on Theory of computing
December 1985
484 pages
ISBN:0897911512
DOI:10.1145/22145
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 December 1985

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

STOC85
Sponsor:
STOC85: Annual ACM Conference on Theory of Computing
May 6 - 8, 1985
Rhode Island, Providence, USA

Acceptance Rates

Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

Upcoming Conference

STOC '25
57th Annual ACM Symposium on Theory of Computing (STOC 2025)
June 23 - 27, 2025
Prague , Czech Republic

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)354
  • Downloads (Last 6 weeks)48
Reflects downloads up to 09 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Special Soundness in the Random Oracle ModelIACR Communications in Cryptology10.62056/avivommolOnline publication date: 7-Oct-2024
  • (2024)Special Soundness RevisitedIACR Communications in Cryptology10.62056/aep2c3w9pOnline publication date: 7-Oct-2024
  • (2024)zkPi: Proving Lean Theorems in Zero-KnowledgeProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670322(4301-4315)Online publication date: 2-Dec-2024
  • (2024)AlterEgoProceedings of the 7th International Workshop on Edge Systems, Analytics and Networking10.1145/3642968.3654814(7-12)Online publication date: 22-Apr-2024
  • (2024)Verifiable Coded Computation of Multiple FunctionsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.345028819(8009-8022)Online publication date: 2024
  • (2024)Refereed Delegation of Computation Using Smart ContractsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2024.337284821:6(5208-5227)Online publication date: Nov-2024
  • (2024)Ligetron: Lightweight Scalable End-to-End Zero-Knowledge Proofs Post-Quantum ZK-SNARKs on a Browser2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00086(1760-1776)Online publication date: 19-May-2024
  • (2024)Jump Operators, Interactive Proofs and Proof Complexity Generators2024 IEEE 65th Annual Symposium on Foundations of Computer Science (FOCS)10.1109/FOCS61266.2024.00044(573-593)Online publication date: 27-Oct-2024
  • (2024)Formal Verification of the Sumcheck Protocol2024 IEEE 37th Computer Security Foundations Symposium (CSF)10.1109/CSF61375.2024.00014(605-619)Online publication date: 8-Jul-2024
  • (2024)Quantum interactive proofs using quantum energy teleportationQuantum Information Processing10.1007/s11128-024-04448-023:6Online publication date: 12-Jun-2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media