Resource Bounded Unprovability of Computational Lower Bounds
نویسندگان
چکیده
This paper introduces new notions of asymptotic proofs, PT(polynomial-time)extensions, PTM(polynomial-time Turing machine)-ω-consistency, etc. on formal theories of arithmetic including PA (Peano Arithmetic). An asymptotic proof is a set of infinitely many formal proofs, which is introduced to define and characterize a property, PTM-ω-consistency, of a formal theory. Informally speaking, PTM-ω-consistency is a polynomial-time bounded version (in asymptotic proofs) of ω-consistency, and characterized in two manners: (1) (in the light of the extension of PTM to TM) the resource unbounded version of PTM-ω-consistency is equivalent to ω-consistency, and (2) (in the light of asymptotic proofs by PTM) a PTMω-inconsistent theory includes an axiom that only a super-polynomial-time Turing machine can prove asymptotically over PA, under some assumptions. This paper shows that P6=NP (more generally, any super-polynomial-time lower bound in PSPACE) is unprovable in a PTM-ω-consistent theory T , where T is a consistent PT-extension of PA (although this paper does not show that P6=NP is unprovable in PA, since PA has not been proven to be PTM-ω-consistent). This result implies that to prove P 6=NP by any technique requires a PTM-ω-inconsistent theory, which should include an axiom that only a super-polynomialtime machine can prove asymptotically over PA (or implies a super-polynomial-time computational upper bound) under some assumptions. This result is a kind of generalization of the result of “Natural Proofs” by Razborov and Rudich [21], who showed that to prove “P6=NP” by a class of techniques called “Natural Proofs” implies a super-polynomial-time (e.g., sub-exponential-time) algorithm that can break a typical cryptographic primitive, a pseudo-random generator. Our result also implies that any relativizable proof of P6=NP requires the resource unbounded version of PTM-ω-inconsistent theory, ω-inconsistent theory, which suggests another negative result by Baker, Gill and Solovay [1] that no relativizable proof can prove “P6=NP” in PA, which is a ω-consistent theory. Therefore, our result gives a unified view to the existing two major negative results on proving P6=NP, Natural Proofs and relativizable proofs, through the two manners of characterization of PTM-ω-consistency. We also show that the PTM-ω-consistency of T cannot be proven in any PTM-ω-consistent theory S, where S is a consistent PT-extension of T . That is, to prove the independence of P vs NP from T by proving the PTM-ω-consistency of T requires a PTM-ω-inconsistent theory, or implies a super-polynomial-time computational upper bound under some assumptions. This seems to be related to the results of Ben-David and Halevi [4] and Kurz, O’Donnell and Royer [17], who showed that to prove the independence of P vs NP from PA using any currently known mathematical paradigm implies an extremely-close-to-polynomial-time (but still super-polynomial-time) algorithm that can solve NP-complete problems. Based on this result, we show that the security of any computational cryptographic scheme is unprovable in the setting where adversaries and provers are modeled as polynomial-time Turing machines and only a PTM-ω-consistent theory is allowed to prove the security.
منابع مشابه
Resource Bounded Unprovability O F Computational Lower Bounds (part 1)
This paper shows that the proof complexity (minimum computational complexity of proving formally or asymptotically) of \P 6=NP" is super-polynomial-time with respect to a theory T , which is a consistent extension of Peano Arithmetic (PA), and PTM-!-consistent, where the PTM-!-consistency is a polynomial-time Turing machine (PTM) version of !consistency. In other words, to prove \P 6=NP" (by an...
متن کاملar X iv : 1 10 2 . 20 95 v 1 [ cs . C C ] 1 0 Fe b 20 11 Axiomatizing Resource Bounds for Measure ⋆
Resource-bounded measure is a generalization of classical Lebesgue measure that is useful in computational complexity. The central parameter of resource-bounded measure is the resource bound ∆, which is a class of functions. When ∆ is unrestricted, i.e., contains all functions with the specified domains and codomains, resource-bounded measure coincides with classical Lebesgue measure. On the ot...
متن کاملAxiomatizing Resource Bounds for Measure
Resource-bounded measure is a generalization of classical Lebesgue measure that is useful in computational complexity. The central parameter of resource-bounded measure is the resource bound ∆, which is a class of functions. When ∆ is unrestricted, i.e., contains all functions with the specified domains and codomains, resource-bounded measure coincides with classical Lebesgue measure. On the ot...
متن کاملUnprovability of Lower Bounds on Circuit Size in Certain Fragments of Bounded Arithmetic
We show that if strong pseudorandom generators exist then the statement “α encodes a circuit of size n(log ∗ n) for SATISFIABILITY” is not refutable in S2 2(α). For refutation in S1 2(α), this is proven under the weaker assumption of the existence of generators secure against the attack by small depth circuits, and for another system which is strong enough to prove exponential lower bounds for ...
متن کاملOn Approximation Lower Bounds for TSP with Bounded Metrics
We develop a new method for proving explicit approximation lower bounds for TSP problems with bounded metrics improving on the best up to now known bounds. They almost match the best known bounds for unbounded metric TSP problems. In particular, we prove the best known lower bound for TSP with bounded metrics for the metric bound equal to 4.
متن کاملROBUST RESOURCE-CONSTRAINED PROJECT SCHEDULING WITH UNCERTAIN-BUT-BOUNDED ACTIVITY DURATIONS AND CASH FLOWS I. A NEW SAMPLING-BASED HYBRID PRIMARY-SECONDARY CRITERIA APPROACH
This paper, we presents a new primary-secondary-criteria scheduling model for resource-constrained project scheduling problem (RCPSP) with uncertain activity durations (UD) and cash flows (UC). The RCPSP-UD-UC approach producing a “robust” resource-feasible schedule immunized against uncertainties in the activity durations and which is on the sampling-based scenarios may be evaluated from a cos...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2003 شماره
صفحات -
تاریخ انتشار 2003