Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJune 2024
Beating Brute Force for Compression Problems
STOC 2024: Proceedings of the 56th Annual ACM Symposium on Theory of ComputingPages 659–670https://doi.org/10.1145/3618260.3649778A compression problem is defined with respect to an efficient encoding function f; given a string x, our task is to find the shortest y such that f(y) = x. The obvious brute-force algorithm for solving this compression task on n-bit strings runs in time ...
- research-articleJune 2024
Formula Size-Depth Tradeoffs for Iterated Sub-permutation Matrix Multiplication
STOC 2024: Proceedings of the 56th Annual ACM Symposium on Theory of ComputingPages 1386–1395https://doi.org/10.1145/3618260.3649628Iterated Sub-Permutation Matrix Multiplication is the problem of computing the product of k n-by-n Boolean matrices with at most a single 1 in each row and column. For all d ≤ logk, this problem is solvable by size nO(dk1/d) monotone AC0 formulas of ...
- research-articleNovember 2023
A New Minimax Theorem for Randomized Algorithms
Journal of the ACM (JACM), Volume 70, Issue 6Article No.: 38, Pages 1–58https://doi.org/10.1145/3626514The celebrated minimax principle of Yao says that for any Boolean-valued function f with finite domain, there is a distribution μ over the domain of f such that computing f to error ε against inputs from μ is just as hard as computing f to error ε on ...
- research-articleAugust 2023
Constant-Depth Circuits vs. Monotone Circuits
CCC '23: Proceedings of the conference on Proceedings of the 38th Computational Complexity ConferenceArticle No.: 29, Pages 1–37https://doi.org/10.4230/LIPIcs.CCC.2023.29We establish new separations between the power of monotone and general (non-monotone) Boolean circuits:
• For every k ≥ 1, there is a monotone function in AC0 (constant-depth poly-size circuits) that requires monotone circuits of depth Ω(logk n). ...
- research-articleAugust 2023
Tight Correlation Bounds for Circuits Between AC0 and TC0
CCC '23: Proceedings of the conference on Proceedings of the 38th Computational Complexity ConferenceArticle No.: 18, Pages 1–40https://doi.org/10.4230/LIPIcs.CCC.2023.18We initiate the study of generalized AC0 circuits comprised of arbitrary unbounded fan-in gates which only need to be constant over inputs of Hamming weight ≥ k (up to negations of the input bits), which we denote GC0(k). The gate set of this class ...
-
- research-articleJune 2023
On Protocols for Monotone Feasible Interpolation
ACM Transactions on Computation Theory (TOCT), Volume 15, Issue 1-2Article No.: 2, Pages 1–17https://doi.org/10.1145/3583754Dag-like communication protocols, a generalization of the classical tree-like communication protocols, are useful objects in the realm of proof complexity (most importantly for monotone feasible interpolation) and circuit complexity. We consider three ...
- research-articleJune 2023
Range Avoidance, Remote Point, and Hard Partial Truth Table via Satisfying-Pairs Algorithms
STOC 2023: Proceedings of the 55th Annual ACM Symposium on Theory of ComputingPages 1058–1066https://doi.org/10.1145/3564246.3585147The range avoidance problem, denoted as C-Avoid, asks to find a non-output of a given C-circuit C:0,1^n -> 0,1^l with stretch l>n. This problem has recently received much attention in complexity theory for its connections with circuit lower bounds and ...
- research-articleJune 2023
Unprovability of Strong Complexity Lower Bounds in Bounded Arithmetic
STOC 2023: Proceedings of the 55th Annual ACM Symposium on Theory of ComputingPages 1051–1057https://doi.org/10.1145/3564246.3585144While there has been progress in establishing the unprovability of complexity statements in lower fragments of bounded arithmetic, understanding the limits of Jerabek’s theory APC1 (2007) and of higher levels of Buss’s hierarchy S2i (1986) has been a ...
- research-articleAugust 2022
Complexity of Modular Circuits
LICS '22: Proceedings of the 37th Annual ACM/IEEE Symposium on Logic in Computer ScienceArticle No.: 32, Pages 1–11https://doi.org/10.1145/3531130.3533350We study how the complexity of modular circuits computing AND depends on the depth of the circuits and the prime factorization of the modulus they use. In particular our construction of subexponential circuits of depth 2 for AND helps us to classify (...
- research-articleSeptember 2022
Derandomization from time-space tradeoffs
CCC '22: Proceedings of the 37th Computational Complexity ConferenceArticle No.: 37, Pages 1–26https://doi.org/10.4230/LIPIcs.CCC.2022.37A recurring challenge in the theory of pseudorandomness and circuit complexity is the explicit construction of "incompressible strings," i.e. finite objects which lack a specific type of structure or simplicity. In most cases, there is an associated NP ...
- research-articleJune 2022
Query Evaluation by Circuits
PODS '22: Proceedings of the 41st ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database SystemsPages 67–78https://doi.org/10.1145/3517804.3524142In addition to its theoretical interest, computing with circuits has found applications in many other areas such as secure multi-party computation and outsourced query processing. Yet, the exact circuit complexity of query evaluation had remained an ...
- research-articleJune 2022
The exact complexity of pseudorandom functions and the black-box natural proof barrier for bootstrapping results in computational complexity
STOC 2022: Proceedings of the 54th Annual ACM SIGACT Symposium on Theory of ComputingPages 962–975https://doi.org/10.1145/3519935.3520010Investigating the computational resources we need for cryptography is an essential task of both theoretical and practical interests. This paper provides answers to this problem on pseudorandom functions (PRFs). We resolve the exact complexity of PRFs by ...
- research-articleJune 2022
Expander-Based Cryptography Meets Natural Proofs
AbstractWe introduce new forms of attack on expander-based cryptography, and in particular on Goldreich’s pseudorandom generator and one-way function. Our attacks exploit low circuit complexity of the underlying expander’s neighbor function and/or of the ...
- research-articleNovember 2021
Symmetric Circuits for Rank Logic
ACM Transactions on Computational Logic (TOCL), Volume 23, Issue 1Article No.: 6, Pages 1–35https://doi.org/10.1145/3476227Fixed-point logic with rank (FPR) is an extension of fixed-point logic with counting (FPC) with operators for computing the rank of a matrix over a finit field. The expressive power of FPR properly extends that of FPC and is contained in P, but it is not ...
- research-articleSeptember 2021
The (generalized) orthogonality dimension of (generalized) kneser graphs: bounds and applications
CCC '21: Proceedings of the 36th Computational Complexity ConferenceArticle No.: lipics, Page 1https://doi.org/10.4230/LIPIcs.CCC.2021.8The orthogonality dimension of a graph G = (V, E) over a field F is the smallest integer t for which there exists an assignment of a vector uv ∈ Ft with 〈uv, uv〉 ≠ 0 to every vertex v ∈ V, such that 〈uv, uv'〉 = 0 whenever v and v' are adjacent vertices ...
- research-articleSeptember 2021
Toward better depth lower bounds: the XOR-KRW conjecture
CCC '21: Proceedings of the 36th Computational Complexity ConferenceArticle No.: lipics, Page 1https://doi.org/10.4230/LIPIcs.CCC.2021.38In this paper, we propose a new conjecture, the XOR-KRW conjecture, which is a relaxation of the Karchmer-Raz-Wigderson conjecture [10]. This relaxation is still strong enough to imply P ⊈ NC1 if proven. We also present a weaker version of this ...
- research-articleJune 2021
Expressive Power of Linear Algebra Query Languages
PODS'21: Proceedings of the 40th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database SystemsPages 342–354https://doi.org/10.1145/3452021.3458314Linear algebra algorithms often require some sort of iteration or recursion as is illustrated by standard algorithms for Gaussian elimination, matrix inversion, and transitive closure. A key characteristic shared by these algorithms is that they allow ...
- research-articleJune 2021
Strong co-nondeterministic lower bounds for NP cannot be proved feasibly
STOC 2021: Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of ComputingPages 223–233https://doi.org/10.1145/3406325.3451117We show unconditionally that Cook’s theory PV formalizing poly-time reasoning cannot prove, for any non-deterministic poly-time machine M defining a language L(M), that L(M) is inapproximable by co-nondeterministic circuits of sub-exponential size. In ...
- research-articleJanuary 2021
From Circuit Complexity to Faster All-Pairs Shortest Paths
We present a randomized method for computing the min-plus product (a.k.a. tropical product) of two $n \times n$ matrices, yielding a faster algorithm for solving the all-pairs shortest path problem (APSP) in dense $n$-node directed graphs with arbitrary ...
- research-articleJanuary 2021
Strong Average-Case Circuit Lower Bounds from Nontrivial Derandomization
SIAM Journal on Computing (SICOMP), Volume 51, Issue 3Pages STOC20-115–STOC20-173https://doi.org/10.1137/20M1364886In a recent breakthrough, [C. Murray and R. R. Williams, STOC 2018, ACM, New York, 2018, pp. 890--901] proved that ${NQP} = {NTIME}[n^{{polylog}(n)}]$ cannot be computed by polynomial-size ${ACC}^0$ circuits (constant-depth circuits consisting of ${AND}$/...