Pseudo-Deterministic Proofs

نویسندگان

  • Shafi Goldwasser
  • Ofer Grossman
  • Dhiraj Holden
چکیده

We introduce pseudo-deterministic interactive proofs (psdAM): interactive proof systems for search problems where the verifier is guaranteed with high probability to output the same output on different executions. As in the case with classical interactive proofs, the verifier is a probabilistic polynomial time algorithm interacting with an untrusted powerful prover. We view pseudo-deterministic interactive proofs as an extension of the study of pseudodeterministic randomized polynomial time algorithms: the goal of the latter is to find canonical solutions to search problems whereas the goal of the former is to prove that a solution to a search problem is canonical to a probabilistic polynomial time verifier. Alternatively, one may think of the powerful prover as aiding the probabilistic polynomial time verifier to find canonical solutions to search problems, with high probability over the randomness of the verifier. The challenge is that pseudo-determinism should hold not only with respect to the randomness, but also with respect to the prover: a malicious prover should not be able to cause the verifier to output a solution other than the unique canonical one. We show the following results: • A natural and illustrative example of a search problem in psdAM is the language where given two isomorphic graphs (G0, G1), the goal is to find an isomorphism φ from G0 to G1. We will show a constant round interactive proof where on every pair of input graphs (G0, G1), the verifier with high probability will output a unique isomorphism φ from G0 to G1, although many isomorphisms may exist. • In contrast, we show that it is unlikely that psdAM proofs with constant rounds exist for NP-complete problems by showing that if any NP-complete problem has an psdAM protocol where the verifier outputs a unique witness with high probability, then the polynomial hierarchy collapses. • We show that for every problem in search-BPP, there exists a pseudo-deterministic MA protocol which succeeds on infinitely many input lengths, where the verifier takes subexponential time. • Finally, we consider non-deterministic log-space NL algorithms with canonical outputs, which we name pseudo-deterministic NL: on every input, for every non-deterministic choice of the algorithm, either the algorithm rejects or it outputs a canonical unique output. We show that every search problem in search-NL (solvable by a nondeterministic log-space algorithm), is in pseudo-deterministic NL. • We show that the class of pseudo-deterministic AM protocols equals the class of problems solvable by polynomial time search algorithms with oracle access to promise-AM∩ coAM, where queries to the oracle must be in the promise. We show similar results for pseudodeterministic NP and pseudo-deterministic MA.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Randomness and Pseudo-Randomness in Discrete Mathematics

The discovery, demonstrated in the early work of Paley, Zygmund, Erdős, Kac, Turán, Shannon, Szele and others, that deterministic statements can be proved by probabilistic reasoning, led already in the first half of the century to several striking results in Analysis, Number Theory, Combinatorics and Information Theory. It soon became clear that the method, which is now called the probabilistic...

متن کامل

On the Impossibility of Structure-Preserving Deterministic Primitives

Complex cryptographic protocols are often constructed in a modular way from primitives such as signatures, commitments, and encryption schemes, verifiable random functions, etc. together with zero-knowledge proofs ensuring that these primitives are properly orchestrated by the protocol participants. Over the past decades a whole framework of discrete logarithm based primitives has evolved. This...

متن کامل

An apparatus for pseudo-deterministic testing

Pseudo-random testing is popularly used, particularly in Built-In Self Test (BIST) applications. To achieve a desired fault coverage, pseudo-random patterns are often supplemented with few deterministic patterns. When positions of deterministic patterns in the pseudo-random sequence are known a priori, pseudo-random sub-sequences can be chosen such that they cover these deterministic patterns. ...

متن کامل

Pseudo Hoops

Pseudo-hoops are algebraic structures introduced in [1, 2] by B. Bosbach under the name of complementary semigroups. This is a formalization of the paper [4]. Following [4] we prove some properties of pseudo-hoops and we define the basic concepts of filter and normal filter. The lattice of normal filters is isomorphic with the lattice of congruences of a pseudo-hoop. We also study some importan...

متن کامل

Finding Primitive Roots Pseudo-Deterministically

Pseudo-deterministic algorithms are randomized search algorithms which output unique solutions (i.e., with high probability they output the same solution on each execution). We present a pseudo-deterministic algorithm that, given a prime p, finds a primitive root modulo p in time exp(O( p log p log log p)). This improves upon the previous best known provable deterministic (and pseudo-determinis...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017