Resource Bounded Unprovability O F Computational Lower Bounds (part 1)
نویسندگان
چکیده
This paper shows that the proof complexity (minimum computational complexity of proving formally or asymptotically) of \P 6=NP" is super-polynomial-time with respect to a theory T , which is a consistent extension of Peano Arithmetic (PA), and PTM-!-consistent, where the PTM-!-consistency is a polynomial-time Turing machine (PTM) version of !consistency. In other words, to prove \P 6=NP" (by any technique) requires super-polynomialtime computational power over T . This result is a kind of generalization of the result of \Natural Proofs" by Razborov and Rudich [20], who showed that to prove \P 6=NP" by a class of techniques called \Natural" implies computational power that can break a typical cryptographic primitive, a pseudo-random generator. This result implies that P6=NP is formally unproven in PTM-!-consistent theory T . We also show that to prove the independence of P vs NP from T by proving the PTM-!-consistency of T requires super-polynomial-time computational power. This seems to be related to the results of Ben-David and Halevi [4] and Kurz, O'Donnell and Royer [16], who showed that to prove the independence of P vs NP from PA using any currently known mathematical paradigm implies an extremely-close-topolynomial time algorithm that can solve NP-complete problems. Based on this result, we show that the security of any computational cryptographic scheme is unprovable in the standard setting of modern cryptography, where an adversary is modeled as a polynomial-time Turing machine.
منابع مشابه
Some Results in Circuit Complexity
The thesis consists of three parts. The first part investigates the AC complexity of subgraph isomorphism problem that is, detecting whether an n-vertex input graph contains a P -subgraph for some fixed P . For the average-case complexity, where the input is a distribution on random graphs at the threshold and small error is allowed, we are able to explicitly characterize the minimal AC size up...
متن کاملBounded Independence Plus Noise Fools Products
Let D be a b-wise independent distribution over {0, 1}m. Let E be the “noise” distribution over {0, 1}m where the bits are independent and each bit is 1 with probability η/2. We study which tests f : {0, 1}m → [−1, 1] are ε-fooled by D + E, i.e., |E[f(D+E)]−E[f(U)]| ≤ ε where U is the uniform distribution. We show that D+E ε-fools product tests f : ({0, 1}n)k → [−1, 1] given by the product of k...
متن کاملComplexity of a Single Face in an Arrangement of s-Intersecting Curves
Consider a face F in an arrangement of n Jordan curves in the plane, no two of which intersect more than s times. We prove that the combinatorial complexity of F is O(λs(n)), O(λs+1(n)), and O(λs+2(n)), when the curves are bi-infinite, semi-infinite, or bounded, respectively; λk(n) is the maximum length of a Davenport-Schinzel sequence of order k on an alphabet of n symbols. Our bounds asymptot...
متن کاملStrong computational lower bounds via parameterized complexity
We develop new techniques for deriving strong computational lower bounds for a class of well-known NP-hard problems. This class includes weighted satisfiability, dominating set, hitting set, set cover, clique, and independent set. For example, although a trivial enumeration can easily test in time O(nk) if a given graph of n vertices has a clique of size k, we prove that unless an unlikely coll...
متن کاملar X iv : 1 10 2 . 20 95 v 1 [ cs . C C ] 1 0 Fe b 20 11 Axiomatizing Resource Bounds for Measure ⋆
Resource-bounded measure is a generalization of classical Lebesgue measure that is useful in computational complexity. The central parameter of resource-bounded measure is the resource bound ∆, which is a class of functions. When ∆ is unrestricted, i.e., contains all functions with the specified domains and codomains, resource-bounded measure coincides with classical Lebesgue measure. On the ot...
متن کامل