Circuit principles and weak pigeonhole variants 1
نویسندگان
چکیده
This paper considers the relational versions of the surjective, partial surjective, and multifunction weak pigeonhole principles for PV , Σ1, Π b 1, and B(Σ b 1)-formulas as well as relativizations of these formulas to higher levels of the bounded arithmetic hierarchy. We show that the partial surjective weak pigeonhole principle for Π1 formulas implies that for each k there is a string of length 22n k which is hard to block recognize by circuits of size nk. These principles in turn imply the partial surjective principle for Σ1 formulas. We show that the surjective weak pigeonhole principle for B(Σ1) formulas in S 1 2 implies our hard-string principle which in turn implies the surjective weak pigeonhole principle for Σ1 formulas. We introduce a class of predicates corresponding to poly-log length iterates of polynomial-time computable predicates and show that over S 1 2 , the multifunction weak pigeonhole principle for such predicates is equivalent to an “iterative” circuit block-recognition principle. A consequence of this is that if S 1 2 proves this principles then RSA is vulnerable to polynomial time attacks.
منابع مشابه
Circuit Principles and Weak Pigeonhole Variants
This paper considers the relational versions of the surjective and multifunction weak pigeonhole principles for PV , Σ1 and Θ b 2-formulas. We show that the relational surjective pigeonhole principle for Θ2 formulas in S 1 2 implies a circuit block-recognition principle which in turn implies the surjective weak pigeonhole principle for Σ1 formulas. We introduce a class of predicates correspondi...
متن کاملOn Independence of Variants of the Weak Pigeonhole Principle
The principle sPHPb (PV (α)) states that no oracle circuit can compute a surjection of a onto b. We show that sPHP P (a)(PV (α)) is independent of PV1(α)+ sPHP π(a) Π(a)(PV (α)) for various choices of the parameters π, Π, %, P . We also improve the known separation of iWPHP(PV ) from S 2 + sWPHP(PV ) under cryptographic assumptions.
متن کاملAbelian groups and quadratic residues in weak arithmetic
We investigate the provability of some properties of abelian groups and quadratic residues in variants of bounded arithmetic. Specifically, we show that the structure theorem for finite abelian groups is provable in S 2 + iWPHP(Σ b 1), and use it to derive Fermat’s little theorem and Euler’s criterion for the Legendre symbol in S 2 + iWPHP(PV ) extended by the pigeonhole principle PHP(PV ). We ...
متن کاملResolution and the Weak Pigeonhole Principle
We give new upper bounds for resolution proofs of the weak pigeonhole principle. We also give lower bounds for tree-like resolution proofs. We present a normal form for resolution proofs of pigeonhole principles based on a new monotone resolution rule.
متن کاملMore on the relative strength of counting principles
We give exponential size lower bounds for bounded-depth Frege proofs of variants of the bijective (‘onto’) version of the pigeonhole principle, even given additional axiom schemas for modular counting principles. As a consequence we show that for bounded-depth Frege systems the general injective version of the pigeonhole principle is exponentially more powerful than its bijective version. Furth...
متن کامل