Bounded Query Functions with Limited Output Bits
نویسندگان
چکیده
This paper explores the difference between parallel and serial queries to an NP-complete oracle, SAT, from the perspective of functions with a limited number of output bits. For polynomial-time bounded query language classes, which can be considered as functions with 1-bit output, previous work has shown that 2 serial queries to SAT is equivalent to 3 parallel queries to SAT. In contrast, for function classes with no limit on the number of output bits, previous work has shown that there exists a function that can be computed in polynomial time using 3 parallel queries to SAT, but cannot be computed using 2 serial queries to SAT, unless P = NP. The results in this paper show that there exists a function with 2-bit output that can be computed using 3 parallel queries to SAT, but cannot be computed using 2 serial queries to SAT, unless the Polynomial Hierarchy collapses.
منابع مشابه
Bounded Pre-image Awareness and the Security of Hash-Tree Keyless Signatures
We present a new tighter security proof for unbounded hash tree keyless signature (timestamping) schemes that use Merkle-Damg̊ard (MD) hash functions with Preimage Aware (PrA) compression functions. It is known that the PrA assumption alone is insufficient for proving the security of unbounded hash tree schemes against back-dating attacks. We show that many known PrA constructions satisfy a stro...
متن کاملDesign and Simulation of a Modified 32-bit ROM-based Direct Digital Frequency Synthesizer on FPGA
This paper presents a modified 32-bit ROM-based Direct Digital Frequency Synthesizer (DDFS). Maximum output frequency of the DDFS is limited by the structure of the accumulator used in the DDFS architecture. The hierarchical pipeline accumulator (HPA) presented in this paper has less propagation delay time rather than the conventional structures. Therefore, it results in both higher maximum ope...
متن کاملNon-malleable Codes for Bounded Depth, Bounded Fan-In Circuits
We show how to construct efficient, unconditionally secure non-malleable codes for bounded output locality. In particular, our scheme is resilient against functions such that any output bit is dependent on at most n bits, where n is the total number of bits in a codeword and 0 ≤ δ < 1 a constant. Notably, this tampering class includes NC .
متن کاملComplexity Upper Bounds for Classical Locally Random Reductions Using a Quantum Computational Argument
We use a quantum computational argument to prove, for any integer k ≥ 2, a complexity upper bound for nonadaptive k-query classical locally random reductions (LRRs) that allow bounded-errors. Extending and improving a recent result of Pavan and Vinodchandran [PV], we prove that if a set L has a nonadaptive 2-query classical LRR to functions g and h, where both g and h can output O(logn) bits, s...
متن کاملCSE 599 d Quantum Computing Problem Set 2 Solutions
Let fα : {0, 1} → {0, 1} be one of four functions from two bits to one bit defined as fα(x1, x2) = δα1,x1δα2,x2 where α ∈ {0, 1} and x ∈ {0, 1} (The four different functions are label by the two bits of α.) (a) Prove that in order to exactly (no probability of failure) distinguish between these four functions, you need to query this function three times in the worst case. The function is 1 on o...
متن کامل