SlideShare uma empresa Scribd logo
1 de 40
Baixar para ler offline
Interactive Proof Systems and
    An Introduction to PCP
               M. Reza Rahimi,
       Sharif University of Technology,
                Tehran, Iran.
2




    Outline
•   Introduction
•   Another Way to Look at NP
•   Interactive Proof Systems (IP)
•   Arthur-Merlin Proof Systems (AM)
•   IP=PSPACE
•   Probabilistically Checkable Proofs (PCPs)
•   Conclusion
3




   Introduction
• One of the most important events in the
  complexity theory is Interactive Proof Systems.
• It sheds light on the characteristic of some
  complexity classes.
• It has also influenced on some practical areas
  such as Cryptography and Algorithm Design.
• Before presentation of technical points, let’s
  start with the source of its main idea and its
  philosophy.
4



• Computation is basically a physical fact. This is
  the origin of Church-Turing-Markov thesis,
  which implies that:

    A Partial function is computable (in any accepted informal
    sense) if and only if it is computable by some binary Turing
                                machine.




  Any Physical Process
       in Universe                             Turing Machine
                                                   Program
5




• So in this view point, efficient solving of a special
  problem needs its efficient model of computation.
• Let’s see what happens in human society.
• Men communicate through languages with each
  other.
• Consider the following set.

        Σ={ x | all symbols that we know}
        ={A, ⊕∈ ∫∫∫ , ζ ,...},
              , ,
                ∗
        Farsi ⊂Σ ,
                  ∗
        English ⊂Σ ,....
6



• Remember your childhood. When you was curious
  and want to underestand something. What did
  you do?

       Child::(Verifier)                           Dad::(Prover)
                    1. Daddy, Can I play with fire?

                                   2. No.

                                  3. Why?

                        4. Because You may be burnt.

                        5. What will happen, if I burn?

               6. You will go to hospital and Dr injects you.


                 Ok!
7




• Let’s model this process according to our
  knowledge.
            T = {x | All true statements in the universe}.
            T ⊆ Σ∗ ,
            Input :: x =" Playing with fire is good."
            Query :: x ∈T, x ∉T ?


• So, Interaction is one of the instinctive ways that
  human being solves its problems.
• It is called Social Computational Model.
• We will show that in another way NP, IP,…, are
  abstract models of this model of computation.
8




          IP, NP, AM, MA,MIP,
       PCP,…. Computational Models.




Social Computational Models.
9




•   In society we have some general strategies to
    interact with People.
      •   We start from general questions to detailed
          questions.
      •   If we want to ask all the questions it will be very
          time consuming so we select some questions.


          We will use these techniques for our
                mathematical protocols.
10




      Another Way to Look at NP
• We know the following definition about NP:
   L ∈ NP ⇔ ∃V(.,.) ∈ P, ∃P(.), ∀x ∈ Σ ∗ ,
               1. x ∈ L ⇒ ∃y, y ≤ P( x ) and V(x, y) accepts.
               2. x ∉ L ⇒ ∀y, y ≤ P( x ) and V(x, y) rejects.

• We can look at this process like this:

                               y
                 Prover                  Verifier


                     x                        x
11



•   For prover we don’t consider any limit in time
    or space or computation power.
•   But verifier is deterministic polynomial time
    machine.
•   In this model of computation NP is defined
    like this:
      L ∈ NP ⇔ ∃ Prover, ∃ (Polynomia l Time Verifier) V, ∀x ∈ Σ ∗ ,
                1. x ∈ L ⇒ Prover has a strategy t o convince Verifier.
                  2. x ∉ L ⇒ Prover has no strategy t o convince Verifier.

•   So NP is single message interaction. What
    will happen if we
           –   Allow multiple rounds of interactions,
           –   Verifier can be randomized polynomial time machine?
12


• NP+ Multiple Round Interaction:

                        Y1
                        Y2
          Prover        Y3      Verifier
                        Yn


              x     Y1Y2Y3…Yn
                                    x


• According to the above it is obvious that
       NP=NP+Multiple Round of Interaction.
• NP+ Randomized Polynomial Time Verifier:

                         y        Randomized
           Prover               Polynomial Time
                                    Verifier

              x                            x
13

• The languages recognized by the previous model
  are in class MA.
                Conjecture: MA=NP.
• So, It seems that only using one feature will not
  make NP machine stronger. What will happen when
  we add both features?
                    Y1
                    Y2       Randomized
                    Y3
          Prover           Polynomial Time
                    Yn         Verifier

             x                     x
• This machine will lead us to the Interactive Proof
  Systems.
14


  Interactive Proof Systems (IP)
• IP Model:
                  q1
                                           x
                  a1
                  q2       Polynomial
   x
         Prover               Time
                  ai        Verifier
                                        Random String

                       OK or NO
15




• IP Class Definition:
        L ∈ IP ⇔ ∃V ∈ Probabilistic Polynomial Time TM, ∀x ∈ Σ ∗
                                                      2
                        1. x ∈ L ⇒ ∃P Pr{ V ↔ P ok} ≥ .
                                                      3
                                                      1
                        2. x ∉ L ⇒ ∀P Pr{ V ↔ P ok} ≤ .
                                                      3

• Note that Prover can not see the random string
  of verifier, so Verifier has Private Coin.
• Round of Interaction r(n) =The total number of
  messages exchanged.
• IP[K]::K round of interaction.
16




• Example: Graph Non-Isomorphism

  NONISO = { G1 , G2     G 1 and G 2 are not isomorphic graphs.}

  ISO = { G1 , G2   G 1 and G 2 are isomorphic graphs.}

• It is obvious that ISO є NP so NONISO є CO-NP.
• But we don’t know if it is NP-Complete or not.
       These two are very important in complexity theory.
       We know that it is in IP.
       It is proved that if ISO є NP-Complete then PH collapses.
17




Protocol: Private-Coin Graph Non-Isomorphism

V ∴Pick i ∈{1,2} uniformly randomly. Randomly permute the vertices of G i to get new
graph call it H. Send H to P.
P ∴Show that which of G1 or G 2 was the source of permutation. send its index to verifier.
V ∴Yes if i = j else No.



                      x ∈ NONISO ⇒ Pr{V ↔P Yes} =1
                                                 1
                      x ∉ NONISO ⇒Pr{V ↔P Yes} ≤
                                                 2
18


Arthur-Merlin Proof Systems (AM)
• AM Model:
                                q1
                                                                x
                                a1
                                q2                 Arthur
  x                                               Polynomial
       Merlin
                                                     Time
                                 ai                Verifier Random String


                                          OK or NO
      qi , ai = O( Poly ( x ),
      Random String = O( Poly ( x ),
      Number of Exchanged Messages = O( Poly ( x ),
      A( R, x, q1 , a1 , q 2 ,..., ai ) = qi +1 , Yes or No.
      M ( R, x, q1 , a1 , q 2 ,..., qi ) = ai .
19




• AM Class Definition:

       L ∈ AM ⇔ ∃ A ∈ Probabilistic Polynomial Time TM, ∀x ∈ Σ ∗
                                                     2
                     1.x ∈ L ⇒ ∃M, Pr{ A ↔ M ok} ≥ .
                                                     3
                                                     1
                     2.x ∉ L ⇒ ∀M, Pr{ A ↔ M ok} ≤ .
                                                     3


• Note that Prover can see the random string of
  verifier, so Verifier has Public Coin.
• Round of Interaction r(n) =The total number of
  messages exchanged.
• AM[K]=K round of interaction.
20




• It seems that the pervious protocol doesn’t work
  for this machine.
• If Merlin can see random bits he always answers
  correctly.
• But it is proved that NONISO є AM[2].

         Theorem:: (Goldwasser, Sipser)
              NONISO є AM[2].
21



      Some Results About IP and AM Relation

•   IP[K] ⊆ AM[k+2] for all Constants k.
•   For constant k ≥ 2 we have AM[K]=AM[2].
•   So we can move all of Arthur’s messages
    to beginning of interaction:
           AMAMAM…AM = AAMMAM…AM
               … = AAA…AMMM…M
22




IP=PSPACE ( Shamir’s Theorem)
• We describe it in two phase.

IP ⊆PSPACE
• Proof Idea:
   – Given any Verifier V , We will compute a using Polynomial
     Space machine.

                ∀x ∈ Σ* , V ⇒ a = max Pr{ V ↔ P = Ok}
                                  
                                   P
23




PSPACE ⊆ IP
• We need only to design an IP protocol for TQBF.
• Before presentation of this protocol Lets review
  some basic concepts.
Arithmetization:
Arithmetization

     The usefulness of this technique is that we can extract more
     property from boolean expressions.


                   Boolean Domain                Polynomial Domain
                   Φ ( x1 , x2 ,..., xm )   ⇔     P ( x1 , x2 ,..., xm )
                    x∧ y                    ⇔     x.y
                   ¬x                       ⇔ 1− x
                    x∨ y                    ⇔ 1-( 1-x)( 1-y).
24



Example:
Example

           Φ( x1 , x2 , x3 ) = x1 ∨ x2 ∨ ¬x3 ↔
           (1 − (1 − x1 )(1 − x2 )) ∨ (1 − x3 ) →
           (1 − (1 − (1 − (1 − x1 )(1 − x2 )))(1 − (1 − x3 )) →
           (1 − (1 − x1 )(1 − x2 )) x3 →
           P ( x1 , x2 , x3 ) = (1 − (1 − x1 )(1 − x2 )) x3 .
           { x1 ∨ x2 ∨ ¬x3 ⇔ (1 − (1 − x1 )(1 − x2 )) x3 }
Lemma:
Lemma

           Φ( x1 , x2 ,..., xm ) = 0 ⇔ P( x1 , x2 ,..., xm ) = 0.
           Φ( x1 , x2 ,..., xm ) = 1 ⇔ P( x1 , x2 ,..., xm ) = 1.
           ∴
             ∑ ∑
           x1∈{0 ,1} x2 ∈{0 ,1}
                                  ...     ∑ P( x , x ,..., x
                                        xm ∈{0 ,1}
                                                     1   2     m   )=k

           k = Number of Assignment of Φ.
25




• To catch general idea of the TQBF protocol lets
  review a protocol for following language.

   # SAT = {< Φ , k >: Φ is a cnf - formula with exactly k satisfying assignments}.
  Theorem ::
                  # SAT ∈ IP.


Main Idea :
• Lets investigate the problem intuitively.
26




• Think that we are Verifier and want to know that
  if x ∈ SAT is true or not.
• We usually start from General questions to
  detailed questions.
• If the prover is trustful he/she will answer all
  the questions correctly.
• If not we will catch him/her with detailed
  questions.
• Lets review some basic definition.
27


Φ( x1 , x2 ,..., xm ) → P( x1 , x2 ,..., xm )
f i ( x1 , x2 ,..., xi ) =        ∑           ∑
                              xi +1∈ 0 ,1} xi +2 ∈ 0 ,1}
                                    {             {
                                                           ...     ∑ P( x , x ,..., x
                                                                 xm ∈ 0 ,1}
                                                                     {
                                                                              1   2     m   )

= Number of satisfying assignment when input is x1 , x2 ,..., xi .


Example :
Φ( x1 , x2 ) → P ( x1 , x2 )
f 0 () =     ∑ ∑ P( x , x ) =P(0,0) + P(0,1) + P(1,0) + P(1,1).
           x1∈ 0 ,1} x2 ∈ 0 ,1}
              {          {
                                    1     2


f1 ( x1 ) =     ∑ P( x , x ) =P( x ,0) + P( x ,1).
              x2 ∈ 0 ,1}
                  {
                             1     2              1                      1


f 2 ( x1 , x2 ) = P ( x1 , x2 ).
f 0 () :: Number of satisfying assignment.


In General we have :
f i ( x1 , x2 ,..., xi ) = f i +1 ( x1 , x2 ,..., xi ,0) + f i +1 ( x1 , x2 ,..., xi ,1).
28


Prover   Verifier
29




• It is obvious that the foregoing Protocol is very
  large ( exponential message size).
• So we must use randomness for shortening the
  messages and protocol.
• In each phase, the message will be doubled. So we must
                    reduce this phase.
30
Prover   Verifier
31




Proof Idea:

• If x ∈ # SAT then trusted prover always answer
  correctly.
• Else devoius prover can cheat verifier with low
  probability in each phase. It means that:
                                   d   n
               Pr{ f i = f i } ≤     ≤ n
                                   q 2
32




• Now it is the time to revise the last protocol
  for TQBF.
• We know that:
     ∃ x1∀ x2 ...∀ xm Φ ( x1 , x2 ,..., xm ) ∈ TQBF ⇔    ∑ ∏
                                                        x1∈{0,1} x2 ∈{0 ,1}
                                                                              ...   ∏ P( x , x ,..., x
                                                                                xm ∈{0,1}
                                                                                            1   2        m   )0



 • At first glance it seems when we see ∏
   instead of addition we use multiplication.
 • But it may increase the size of the polynomial
   exponentially.
33




• So, we use clever idea for overcoming this
  problem.
    Linearization Operator R ::
    Rx1 [ P(x1 , x 2 ,..., x m )] ≡ (1 − x1 )P(0, x 2 ,..., x m ) + (x1 )P(1, x 2 ,..., x m )

• Now we use this operator for TQBF.

     ∃ x1∀ x2 ...∀ xm Φ ( x1 , x2 ,..., xm ) ⇒ ∃ x1 Rx1∀ x2 Rx1Rx2 ...∀ xm Φ ( x1 , x2 ,..., xm )
34




  Probabilistically Checkable Proofs
                (PCPs)
• Again, lets review the definition of NP class.

          L ∈ NP ⇔ ∃V(.,.) ∈ P, ∃P(.), ∀x ∈ Σ∗ ,
                      1. x ∈ L ⇒ ∃y, y ≤ P( x ) and V(x, y) accepts.
                      2. x ∉ L ⇒ ∀y, y ≤ P( x ) and V(x, y) rejects.



• So, if the input string is the member of
  language, verifier can access the whole bits of
  the polynomial size proof.
35




• What will happen if we restrict the verifier to
  access the subset of the proof but not all of it?
• It seems that in this case the verifier will lose its
  power. (Maybe)
• If we empower the verifier with randomization
  what will happen?

 • The answers of these questions will lead us to
                  PCP machine.
36




   O(q(n)): The number of query
   about the bits of the proof.                      x
                                  Polynomial Time
                                   Randomized O(r(n)) :Length
                                      Verifier    Of random string



Whole Proof
37



          Definition :
          PCP(r(n), q(n)) is the class of all languages accepted
          by an (r(n), q(n)) - restricted verifier V in the following
          sense :
                         x ∈ L ⇒ ∃y, Pr[V y (x) = 1] = 1.
                                                        1
                         x ∉ L ⇒ ∀y, Pr[V y (x) = 1] ≤ .
                                                        2


Some Points:
• We don’t have any restriction on the size of the
   proof.
• If the Verifier uses its history for the
   questioning, it is called adaptive else
   nonadaptive.
38




Some Clear Facts:

       NP = PCP(0, Poly(n)) =  PCP(0, n c ).
                              c 0

       CoRP = PCP(Poly(n),0).



And this is one of the most important theorems
that describes NP.

       PCP Theorem ::
                 NP = PCP(Log n,1)
39




•   Hastaad proved Stronger result : NP Equals
    PCP with O(logn) random bits and Exactly 3
    query bits.
•   PCP technique resaults into finding optimum
    band for NP-Hard optimization problems, such
    as MAX-3SAT and MAX-CLIQUE.
40




    Conclusion
•    In this talk I focused on general ideas of IP and
     PCP.
•    It seems that these results and techniques will
     have many things to say, especially in the area of
     complexity.
•    In future, we would see many wonderful results.


                    The END

Mais conteúdo relacionado

Mais procurados

Federated learning in brief
Federated learning in briefFederated learning in brief
Federated learning in briefShashi Perera
 
Demystifying data engineering
Demystifying data engineeringDemystifying data engineering
Demystifying data engineeringThang Bui (Bob)
 
Semi-Supervised Learning
Semi-Supervised LearningSemi-Supervised Learning
Semi-Supervised LearningLukas Tencer
 
Load Balancing In Cloud Computing newppt
Load Balancing In Cloud Computing newpptLoad Balancing In Cloud Computing newppt
Load Balancing In Cloud Computing newpptUtshab Saha
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALASaikiran Panjala
 
Grid Computing
Grid ComputingGrid Computing
Grid Computingabhiritva
 
Grid computing by vaishali sahare [katkar]
Grid computing by vaishali sahare [katkar]Grid computing by vaishali sahare [katkar]
Grid computing by vaishali sahare [katkar]vaishalisahare123
 
Modern Data architecture Design
Modern Data architecture DesignModern Data architecture Design
Modern Data architecture DesignKujambu Murugesan
 
Data Warehouse - Incremental Migration to the Cloud
Data Warehouse - Incremental Migration to the CloudData Warehouse - Incremental Migration to the Cloud
Data Warehouse - Incremental Migration to the CloudMichael Rainey
 
Introduction to Parallel Computing
Introduction to Parallel ComputingIntroduction to Parallel Computing
Introduction to Parallel ComputingAkhila Prabhakaran
 
Anomaly Detection using Deep Auto-Encoders
Anomaly Detection using Deep Auto-EncodersAnomaly Detection using Deep Auto-Encoders
Anomaly Detection using Deep Auto-EncodersGianmario Spacagna
 
Business Intelligence Trends 2020
Business Intelligence Trends 2020Business Intelligence Trends 2020
Business Intelligence Trends 2020Wiiisdom
 
The Analytics and Data Science Landscape
The Analytics and Data Science LandscapeThe Analytics and Data Science Landscape
The Analytics and Data Science LandscapePhilip Bourne
 
What is a Neural Network | Edureka
What is a Neural Network | EdurekaWhat is a Neural Network | Edureka
What is a Neural Network | EdurekaEdureka!
 
Introduction to Data Visualization
Introduction to Data Visualization Introduction to Data Visualization
Introduction to Data Visualization Ana Jofre
 
Big data 2017 final
Big data 2017   finalBig data 2017   final
Big data 2017 finalAmjid Ali
 
Fedarated learning
Fedarated learningFedarated learning
Fedarated learningVaishakhKP1
 
Recent PhD Research Topic Ideas For Computer Science Engineering 2020
Recent PhD Research Topic Ideas For Computer Science Engineering 2020Recent PhD Research Topic Ideas For Computer Science Engineering 2020
Recent PhD Research Topic Ideas For Computer Science Engineering 2020PhD Assistance
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing ArchitectureYong Heui Cho
 

Mais procurados (20)

Federated learning in brief
Federated learning in briefFederated learning in brief
Federated learning in brief
 
Demystifying data engineering
Demystifying data engineeringDemystifying data engineering
Demystifying data engineering
 
Semi-Supervised Learning
Semi-Supervised LearningSemi-Supervised Learning
Semi-Supervised Learning
 
Load Balancing In Cloud Computing newppt
Load Balancing In Cloud Computing newpptLoad Balancing In Cloud Computing newppt
Load Balancing In Cloud Computing newppt
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
Grid Computing
Grid ComputingGrid Computing
Grid Computing
 
Grid computing by vaishali sahare [katkar]
Grid computing by vaishali sahare [katkar]Grid computing by vaishali sahare [katkar]
Grid computing by vaishali sahare [katkar]
 
Modern Data architecture Design
Modern Data architecture DesignModern Data architecture Design
Modern Data architecture Design
 
Data Warehouse - Incremental Migration to the Cloud
Data Warehouse - Incremental Migration to the CloudData Warehouse - Incremental Migration to the Cloud
Data Warehouse - Incremental Migration to the Cloud
 
Introduction to Parallel Computing
Introduction to Parallel ComputingIntroduction to Parallel Computing
Introduction to Parallel Computing
 
Anomaly Detection using Deep Auto-Encoders
Anomaly Detection using Deep Auto-EncodersAnomaly Detection using Deep Auto-Encoders
Anomaly Detection using Deep Auto-Encoders
 
Business Intelligence Trends 2020
Business Intelligence Trends 2020Business Intelligence Trends 2020
Business Intelligence Trends 2020
 
The Analytics and Data Science Landscape
The Analytics and Data Science LandscapeThe Analytics and Data Science Landscape
The Analytics and Data Science Landscape
 
What is a Neural Network | Edureka
What is a Neural Network | EdurekaWhat is a Neural Network | Edureka
What is a Neural Network | Edureka
 
Introduction to Data Visualization
Introduction to Data Visualization Introduction to Data Visualization
Introduction to Data Visualization
 
Big data 2017 final
Big data 2017   finalBig data 2017   final
Big data 2017 final
 
Distributed storage system
Distributed storage systemDistributed storage system
Distributed storage system
 
Fedarated learning
Fedarated learningFedarated learning
Fedarated learning
 
Recent PhD Research Topic Ideas For Computer Science Engineering 2020
Recent PhD Research Topic Ideas For Computer Science Engineering 2020Recent PhD Research Topic Ideas For Computer Science Engineering 2020
Recent PhD Research Topic Ideas For Computer Science Engineering 2020
 
Cloud Computing Architecture
Cloud Computing ArchitectureCloud Computing Architecture
Cloud Computing Architecture
 

Semelhante a IP=PSPACE

Statistical Analysis of Neural Coding
Statistical Analysis of Neural CodingStatistical Analysis of Neural Coding
Statistical Analysis of Neural CodingYifei Shea, Ph.D.
 
Quarks zk study-club
Quarks zk study-clubQuarks zk study-club
Quarks zk study-clubAlex Pruden
 
CPSC 125 Ch 2 Sec 1
CPSC 125 Ch 2 Sec 1CPSC 125 Ch 2 Sec 1
CPSC 125 Ch 2 Sec 1David Wood
 
Pwl rewal-slideshare
Pwl rewal-slidesharePwl rewal-slideshare
Pwl rewal-slidesharepalvaro
 
Deep Learning for Cyber Security
Deep Learning for Cyber SecurityDeep Learning for Cyber Security
Deep Learning for Cyber SecurityAltoros
 
2009 CSBB LAB 新生訓練
2009 CSBB LAB 新生訓練2009 CSBB LAB 新生訓練
2009 CSBB LAB 新生訓練Abner Huang
 
Basics Of Neural Network Analysis
Basics Of Neural Network AnalysisBasics Of Neural Network Analysis
Basics Of Neural Network Analysisbladon
 
Time series anomaly discovery with grammar-based compression
Time series anomaly discovery with grammar-based compressionTime series anomaly discovery with grammar-based compression
Time series anomaly discovery with grammar-based compressionPavel Senin
 
How to Ground A Language for Legal Discourse In a Prototypical Perceptual Sem...
How to Ground A Language for Legal Discourse In a Prototypical Perceptual Sem...How to Ground A Language for Legal Discourse In a Prototypical Perceptual Sem...
How to Ground A Language for Legal Discourse In a Prototypical Perceptual Sem...L. Thorne McCarty
 
Internet of Things Data Science
Internet of Things Data ScienceInternet of Things Data Science
Internet of Things Data ScienceAlbert Bifet
 
A measure to evaluate latent variable model fit by sensitivity analysis
A measure to evaluate latent variable model fit by sensitivity analysisA measure to evaluate latent variable model fit by sensitivity analysis
A measure to evaluate latent variable model fit by sensitivity analysisDaniel Oberski
 
9. chapter 8 np hard and np complete problems
9. chapter 8   np hard and np complete problems9. chapter 8   np hard and np complete problems
9. chapter 8 np hard and np complete problemsJyotsna Suryadevara
 
CNIT 141: 9. Hard Problems
CNIT 141: 9. Hard ProblemsCNIT 141: 9. Hard Problems
CNIT 141: 9. Hard ProblemsSam Bowne
 
Foundation of KL Divergence
Foundation of KL DivergenceFoundation of KL Divergence
Foundation of KL DivergenceNatan Katz
 
Matt Purkeypile's Doctoral Dissertation Defense Slides
Matt Purkeypile's Doctoral Dissertation Defense SlidesMatt Purkeypile's Doctoral Dissertation Defense Slides
Matt Purkeypile's Doctoral Dissertation Defense Slidesmpurkeypile
 

Semelhante a IP=PSPACE (20)

Statistical Analysis of Neural Coding
Statistical Analysis of Neural CodingStatistical Analysis of Neural Coding
Statistical Analysis of Neural Coding
 
Quarks zk study-club
Quarks zk study-clubQuarks zk study-club
Quarks zk study-club
 
CPSC 125 Ch 2 Sec 1
CPSC 125 Ch 2 Sec 1CPSC 125 Ch 2 Sec 1
CPSC 125 Ch 2 Sec 1
 
Pwl rewal-slideshare
Pwl rewal-slidesharePwl rewal-slideshare
Pwl rewal-slideshare
 
Deep Learning for Cyber Security
Deep Learning for Cyber SecurityDeep Learning for Cyber Security
Deep Learning for Cyber Security
 
2009 CSBB LAB 新生訓練
2009 CSBB LAB 新生訓練2009 CSBB LAB 新生訓練
2009 CSBB LAB 新生訓練
 
Basics Of Neural Network Analysis
Basics Of Neural Network AnalysisBasics Of Neural Network Analysis
Basics Of Neural Network Analysis
 
Time series anomaly discovery with grammar-based compression
Time series anomaly discovery with grammar-based compressionTime series anomaly discovery with grammar-based compression
Time series anomaly discovery with grammar-based compression
 
How to Ground A Language for Legal Discourse In a Prototypical Perceptual Sem...
How to Ground A Language for Legal Discourse In a Prototypical Perceptual Sem...How to Ground A Language for Legal Discourse In a Prototypical Perceptual Sem...
How to Ground A Language for Legal Discourse In a Prototypical Perceptual Sem...
 
Np complete
Np completeNp complete
Np complete
 
Internet of Things Data Science
Internet of Things Data ScienceInternet of Things Data Science
Internet of Things Data Science
 
A measure to evaluate latent variable model fit by sensitivity analysis
A measure to evaluate latent variable model fit by sensitivity analysisA measure to evaluate latent variable model fit by sensitivity analysis
A measure to evaluate latent variable model fit by sensitivity analysis
 
Flat
FlatFlat
Flat
 
9. chapter 8 np hard and np complete problems
9. chapter 8   np hard and np complete problems9. chapter 8   np hard and np complete problems
9. chapter 8 np hard and np complete problems
 
CNIT 141: 9. Hard Problems
CNIT 141: 9. Hard ProblemsCNIT 141: 9. Hard Problems
CNIT 141: 9. Hard Problems
 
UNIT-V.ppt
UNIT-V.pptUNIT-V.ppt
UNIT-V.ppt
 
Lecture 01.ppt
Lecture 01.pptLecture 01.ppt
Lecture 01.ppt
 
Foundation of KL Divergence
Foundation of KL DivergenceFoundation of KL Divergence
Foundation of KL Divergence
 
Matt Purkeypile's Doctoral Dissertation Defense Slides
Matt Purkeypile's Doctoral Dissertation Defense SlidesMatt Purkeypile's Doctoral Dissertation Defense Slides
Matt Purkeypile's Doctoral Dissertation Defense Slides
 
Chap 4 markov chains
Chap 4   markov chainsChap 4   markov chains
Chap 4 markov chains
 

Mais de Reza Rahimi

Boosting Personalization In SaaS Using Machine Learning.pdf
Boosting Personalization  In SaaS Using Machine Learning.pdfBoosting Personalization  In SaaS Using Machine Learning.pdf
Boosting Personalization In SaaS Using Machine Learning.pdfReza Rahimi
 
Self-Tuning and Managing Services
Self-Tuning and Managing ServicesSelf-Tuning and Managing Services
Self-Tuning and Managing ServicesReza Rahimi
 
Low Complexity Secure Code Design for Big Data in Cloud Storage Systems
Low Complexity Secure Code Design for Big Data in Cloud Storage SystemsLow Complexity Secure Code Design for Big Data in Cloud Storage Systems
Low Complexity Secure Code Design for Big Data in Cloud Storage SystemsReza Rahimi
 
Smart Connectivity
Smart ConnectivitySmart Connectivity
Smart ConnectivityReza Rahimi
 
Self-Tuning Data Centers
Self-Tuning Data CentersSelf-Tuning Data Centers
Self-Tuning Data CentersReza Rahimi
 
The Next Big Thing in IT
The Next Big Thing in ITThe Next Big Thing in IT
The Next Big Thing in ITReza Rahimi
 
QoS-Aware Middleware for Optimal Service Allocation in Mobile Cloud Computing
QoS-Aware Middleware for Optimal Service Allocation in Mobile Cloud ComputingQoS-Aware Middleware for Optimal Service Allocation in Mobile Cloud Computing
QoS-Aware Middleware for Optimal Service Allocation in Mobile Cloud ComputingReza Rahimi
 
On Optimal and Fair Service Allocation in Mobile Cloud Computing
On Optimal and Fair Service Allocation in Mobile Cloud ComputingOn Optimal and Fair Service Allocation in Mobile Cloud Computing
On Optimal and Fair Service Allocation in Mobile Cloud ComputingReza Rahimi
 
SMS Spam Filter Design Using R: A Machine Learning Approach
SMS Spam Filter Design Using R: A Machine Learning ApproachSMS Spam Filter Design Using R: A Machine Learning Approach
SMS Spam Filter Design Using R: A Machine Learning ApproachReza Rahimi
 
Mobile Applications on an Elastic and Scalable 2-Tier Cloud Architecture
Mobile Applications on an Elastic and Scalable 2-Tier Cloud ArchitectureMobile Applications on an Elastic and Scalable 2-Tier Cloud Architecture
Mobile Applications on an Elastic and Scalable 2-Tier Cloud ArchitectureReza Rahimi
 
Exploiting an Elastic 2-Tiered Cloud Architecture for Rich Mobile Applications
Exploiting an Elastic 2-Tiered Cloud Architecture for Rich Mobile ApplicationsExploiting an Elastic 2-Tiered Cloud Architecture for Rich Mobile Applications
Exploiting an Elastic 2-Tiered Cloud Architecture for Rich Mobile ApplicationsReza Rahimi
 
Fingerprint High Level Classification
Fingerprint High Level ClassificationFingerprint High Level Classification
Fingerprint High Level ClassificationReza Rahimi
 
Linear Programming and its Usage in Approximation Algorithms for NP Hard Opti...
Linear Programming and its Usage in Approximation Algorithms for NP Hard Opti...Linear Programming and its Usage in Approximation Algorithms for NP Hard Opti...
Linear Programming and its Usage in Approximation Algorithms for NP Hard Opti...Reza Rahimi
 
Optimizing Multicast Throughput in IP Network
Optimizing Multicast Throughput in IP NetworkOptimizing Multicast Throughput in IP Network
Optimizing Multicast Throughput in IP NetworkReza Rahimi
 
The Case for a Signal Oriented Data Stream Management System
The Case for a Signal Oriented Data Stream Management SystemThe Case for a Signal Oriented Data Stream Management System
The Case for a Signal Oriented Data Stream Management SystemReza Rahimi
 
Mobile Cloud Computing: Big Picture
Mobile Cloud Computing: Big PictureMobile Cloud Computing: Big Picture
Mobile Cloud Computing: Big PictureReza Rahimi
 
Network Information Processing
Network Information ProcessingNetwork Information Processing
Network Information ProcessingReza Rahimi
 
Pervasive Image Computation: A Mobile Phone Application for getting Informat...
Pervasive Image Computation: A Mobile  Phone Application for getting Informat...Pervasive Image Computation: A Mobile  Phone Application for getting Informat...
Pervasive Image Computation: A Mobile Phone Application for getting Informat...Reza Rahimi
 
Gaussian Integration
Gaussian IntegrationGaussian Integration
Gaussian IntegrationReza Rahimi
 
Quantum Computation and Algorithms
Quantum Computation and Algorithms Quantum Computation and Algorithms
Quantum Computation and Algorithms Reza Rahimi
 

Mais de Reza Rahimi (20)

Boosting Personalization In SaaS Using Machine Learning.pdf
Boosting Personalization  In SaaS Using Machine Learning.pdfBoosting Personalization  In SaaS Using Machine Learning.pdf
Boosting Personalization In SaaS Using Machine Learning.pdf
 
Self-Tuning and Managing Services
Self-Tuning and Managing ServicesSelf-Tuning and Managing Services
Self-Tuning and Managing Services
 
Low Complexity Secure Code Design for Big Data in Cloud Storage Systems
Low Complexity Secure Code Design for Big Data in Cloud Storage SystemsLow Complexity Secure Code Design for Big Data in Cloud Storage Systems
Low Complexity Secure Code Design for Big Data in Cloud Storage Systems
 
Smart Connectivity
Smart ConnectivitySmart Connectivity
Smart Connectivity
 
Self-Tuning Data Centers
Self-Tuning Data CentersSelf-Tuning Data Centers
Self-Tuning Data Centers
 
The Next Big Thing in IT
The Next Big Thing in ITThe Next Big Thing in IT
The Next Big Thing in IT
 
QoS-Aware Middleware for Optimal Service Allocation in Mobile Cloud Computing
QoS-Aware Middleware for Optimal Service Allocation in Mobile Cloud ComputingQoS-Aware Middleware for Optimal Service Allocation in Mobile Cloud Computing
QoS-Aware Middleware for Optimal Service Allocation in Mobile Cloud Computing
 
On Optimal and Fair Service Allocation in Mobile Cloud Computing
On Optimal and Fair Service Allocation in Mobile Cloud ComputingOn Optimal and Fair Service Allocation in Mobile Cloud Computing
On Optimal and Fair Service Allocation in Mobile Cloud Computing
 
SMS Spam Filter Design Using R: A Machine Learning Approach
SMS Spam Filter Design Using R: A Machine Learning ApproachSMS Spam Filter Design Using R: A Machine Learning Approach
SMS Spam Filter Design Using R: A Machine Learning Approach
 
Mobile Applications on an Elastic and Scalable 2-Tier Cloud Architecture
Mobile Applications on an Elastic and Scalable 2-Tier Cloud ArchitectureMobile Applications on an Elastic and Scalable 2-Tier Cloud Architecture
Mobile Applications on an Elastic and Scalable 2-Tier Cloud Architecture
 
Exploiting an Elastic 2-Tiered Cloud Architecture for Rich Mobile Applications
Exploiting an Elastic 2-Tiered Cloud Architecture for Rich Mobile ApplicationsExploiting an Elastic 2-Tiered Cloud Architecture for Rich Mobile Applications
Exploiting an Elastic 2-Tiered Cloud Architecture for Rich Mobile Applications
 
Fingerprint High Level Classification
Fingerprint High Level ClassificationFingerprint High Level Classification
Fingerprint High Level Classification
 
Linear Programming and its Usage in Approximation Algorithms for NP Hard Opti...
Linear Programming and its Usage in Approximation Algorithms for NP Hard Opti...Linear Programming and its Usage in Approximation Algorithms for NP Hard Opti...
Linear Programming and its Usage in Approximation Algorithms for NP Hard Opti...
 
Optimizing Multicast Throughput in IP Network
Optimizing Multicast Throughput in IP NetworkOptimizing Multicast Throughput in IP Network
Optimizing Multicast Throughput in IP Network
 
The Case for a Signal Oriented Data Stream Management System
The Case for a Signal Oriented Data Stream Management SystemThe Case for a Signal Oriented Data Stream Management System
The Case for a Signal Oriented Data Stream Management System
 
Mobile Cloud Computing: Big Picture
Mobile Cloud Computing: Big PictureMobile Cloud Computing: Big Picture
Mobile Cloud Computing: Big Picture
 
Network Information Processing
Network Information ProcessingNetwork Information Processing
Network Information Processing
 
Pervasive Image Computation: A Mobile Phone Application for getting Informat...
Pervasive Image Computation: A Mobile  Phone Application for getting Informat...Pervasive Image Computation: A Mobile  Phone Application for getting Informat...
Pervasive Image Computation: A Mobile Phone Application for getting Informat...
 
Gaussian Integration
Gaussian IntegrationGaussian Integration
Gaussian Integration
 
Quantum Computation and Algorithms
Quantum Computation and Algorithms Quantum Computation and Algorithms
Quantum Computation and Algorithms
 

Último

CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxAnupam32727
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptx4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptxmary850239
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...Osopher
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptxAneriPatwari
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...Nguyen Thanh Tu Collection
 
How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17Celine George
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 

Último (20)

CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptx4.9.24 Social Capital and Social Exclusion.pptx
4.9.24 Social Capital and Social Exclusion.pptx
 
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
Healthy Minds, Flourishing Lives: A Philosophical Approach to Mental Health a...
 
ARTERIAL BLOOD GAS ANALYSIS........pptx
ARTERIAL BLOOD  GAS ANALYSIS........pptxARTERIAL BLOOD  GAS ANALYSIS........pptx
ARTERIAL BLOOD GAS ANALYSIS........pptx
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
 
How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 

IP=PSPACE

  • 1. Interactive Proof Systems and An Introduction to PCP M. Reza Rahimi, Sharif University of Technology, Tehran, Iran.
  • 2. 2 Outline • Introduction • Another Way to Look at NP • Interactive Proof Systems (IP) • Arthur-Merlin Proof Systems (AM) • IP=PSPACE • Probabilistically Checkable Proofs (PCPs) • Conclusion
  • 3. 3 Introduction • One of the most important events in the complexity theory is Interactive Proof Systems. • It sheds light on the characteristic of some complexity classes. • It has also influenced on some practical areas such as Cryptography and Algorithm Design. • Before presentation of technical points, let’s start with the source of its main idea and its philosophy.
  • 4. 4 • Computation is basically a physical fact. This is the origin of Church-Turing-Markov thesis, which implies that: A Partial function is computable (in any accepted informal sense) if and only if it is computable by some binary Turing machine. Any Physical Process in Universe Turing Machine Program
  • 5. 5 • So in this view point, efficient solving of a special problem needs its efficient model of computation. • Let’s see what happens in human society. • Men communicate through languages with each other. • Consider the following set. Σ={ x | all symbols that we know} ={A, ⊕∈ ∫∫∫ , ζ ,...}, , , ∗ Farsi ⊂Σ , ∗ English ⊂Σ ,....
  • 6. 6 • Remember your childhood. When you was curious and want to underestand something. What did you do? Child::(Verifier) Dad::(Prover) 1. Daddy, Can I play with fire? 2. No. 3. Why? 4. Because You may be burnt. 5. What will happen, if I burn? 6. You will go to hospital and Dr injects you. Ok!
  • 7. 7 • Let’s model this process according to our knowledge. T = {x | All true statements in the universe}. T ⊆ Σ∗ , Input :: x =" Playing with fire is good." Query :: x ∈T, x ∉T ? • So, Interaction is one of the instinctive ways that human being solves its problems. • It is called Social Computational Model. • We will show that in another way NP, IP,…, are abstract models of this model of computation.
  • 8. 8 IP, NP, AM, MA,MIP, PCP,…. Computational Models. Social Computational Models.
  • 9. 9 • In society we have some general strategies to interact with People. • We start from general questions to detailed questions. • If we want to ask all the questions it will be very time consuming so we select some questions. We will use these techniques for our mathematical protocols.
  • 10. 10 Another Way to Look at NP • We know the following definition about NP: L ∈ NP ⇔ ∃V(.,.) ∈ P, ∃P(.), ∀x ∈ Σ ∗ , 1. x ∈ L ⇒ ∃y, y ≤ P( x ) and V(x, y) accepts. 2. x ∉ L ⇒ ∀y, y ≤ P( x ) and V(x, y) rejects. • We can look at this process like this: y Prover Verifier x x
  • 11. 11 • For prover we don’t consider any limit in time or space or computation power. • But verifier is deterministic polynomial time machine. • In this model of computation NP is defined like this: L ∈ NP ⇔ ∃ Prover, ∃ (Polynomia l Time Verifier) V, ∀x ∈ Σ ∗ , 1. x ∈ L ⇒ Prover has a strategy t o convince Verifier. 2. x ∉ L ⇒ Prover has no strategy t o convince Verifier. • So NP is single message interaction. What will happen if we – Allow multiple rounds of interactions, – Verifier can be randomized polynomial time machine?
  • 12. 12 • NP+ Multiple Round Interaction: Y1 Y2 Prover Y3 Verifier Yn x Y1Y2Y3…Yn x • According to the above it is obvious that NP=NP+Multiple Round of Interaction. • NP+ Randomized Polynomial Time Verifier: y Randomized Prover Polynomial Time Verifier x x
  • 13. 13 • The languages recognized by the previous model are in class MA. Conjecture: MA=NP. • So, It seems that only using one feature will not make NP machine stronger. What will happen when we add both features? Y1 Y2 Randomized Y3 Prover Polynomial Time Yn Verifier x x • This machine will lead us to the Interactive Proof Systems.
  • 14. 14 Interactive Proof Systems (IP) • IP Model: q1 x a1 q2 Polynomial x Prover Time ai Verifier Random String OK or NO
  • 15. 15 • IP Class Definition: L ∈ IP ⇔ ∃V ∈ Probabilistic Polynomial Time TM, ∀x ∈ Σ ∗ 2 1. x ∈ L ⇒ ∃P Pr{ V ↔ P ok} ≥ . 3 1 2. x ∉ L ⇒ ∀P Pr{ V ↔ P ok} ≤ . 3 • Note that Prover can not see the random string of verifier, so Verifier has Private Coin. • Round of Interaction r(n) =The total number of messages exchanged. • IP[K]::K round of interaction.
  • 16. 16 • Example: Graph Non-Isomorphism NONISO = { G1 , G2 G 1 and G 2 are not isomorphic graphs.} ISO = { G1 , G2 G 1 and G 2 are isomorphic graphs.} • It is obvious that ISO є NP so NONISO є CO-NP. • But we don’t know if it is NP-Complete or not. These two are very important in complexity theory. We know that it is in IP. It is proved that if ISO є NP-Complete then PH collapses.
  • 17. 17 Protocol: Private-Coin Graph Non-Isomorphism V ∴Pick i ∈{1,2} uniformly randomly. Randomly permute the vertices of G i to get new graph call it H. Send H to P. P ∴Show that which of G1 or G 2 was the source of permutation. send its index to verifier. V ∴Yes if i = j else No. x ∈ NONISO ⇒ Pr{V ↔P Yes} =1 1 x ∉ NONISO ⇒Pr{V ↔P Yes} ≤ 2
  • 18. 18 Arthur-Merlin Proof Systems (AM) • AM Model: q1 x a1 q2 Arthur x Polynomial Merlin Time ai Verifier Random String OK or NO qi , ai = O( Poly ( x ), Random String = O( Poly ( x ), Number of Exchanged Messages = O( Poly ( x ), A( R, x, q1 , a1 , q 2 ,..., ai ) = qi +1 , Yes or No. M ( R, x, q1 , a1 , q 2 ,..., qi ) = ai .
  • 19. 19 • AM Class Definition: L ∈ AM ⇔ ∃ A ∈ Probabilistic Polynomial Time TM, ∀x ∈ Σ ∗ 2 1.x ∈ L ⇒ ∃M, Pr{ A ↔ M ok} ≥ . 3 1 2.x ∉ L ⇒ ∀M, Pr{ A ↔ M ok} ≤ . 3 • Note that Prover can see the random string of verifier, so Verifier has Public Coin. • Round of Interaction r(n) =The total number of messages exchanged. • AM[K]=K round of interaction.
  • 20. 20 • It seems that the pervious protocol doesn’t work for this machine. • If Merlin can see random bits he always answers correctly. • But it is proved that NONISO є AM[2]. Theorem:: (Goldwasser, Sipser) NONISO є AM[2].
  • 21. 21 Some Results About IP and AM Relation • IP[K] ⊆ AM[k+2] for all Constants k. • For constant k ≥ 2 we have AM[K]=AM[2]. • So we can move all of Arthur’s messages to beginning of interaction: AMAMAM…AM = AAMMAM…AM … = AAA…AMMM…M
  • 22. 22 IP=PSPACE ( Shamir’s Theorem) • We describe it in two phase. IP ⊆PSPACE • Proof Idea: – Given any Verifier V , We will compute a using Polynomial Space machine. ∀x ∈ Σ* , V ⇒ a = max Pr{ V ↔ P = Ok}  P
  • 23. 23 PSPACE ⊆ IP • We need only to design an IP protocol for TQBF. • Before presentation of this protocol Lets review some basic concepts. Arithmetization: Arithmetization The usefulness of this technique is that we can extract more property from boolean expressions. Boolean Domain Polynomial Domain Φ ( x1 , x2 ,..., xm ) ⇔ P ( x1 , x2 ,..., xm ) x∧ y ⇔ x.y ¬x ⇔ 1− x x∨ y ⇔ 1-( 1-x)( 1-y).
  • 24. 24 Example: Example Φ( x1 , x2 , x3 ) = x1 ∨ x2 ∨ ¬x3 ↔ (1 − (1 − x1 )(1 − x2 )) ∨ (1 − x3 ) → (1 − (1 − (1 − (1 − x1 )(1 − x2 )))(1 − (1 − x3 )) → (1 − (1 − x1 )(1 − x2 )) x3 → P ( x1 , x2 , x3 ) = (1 − (1 − x1 )(1 − x2 )) x3 . { x1 ∨ x2 ∨ ¬x3 ⇔ (1 − (1 − x1 )(1 − x2 )) x3 } Lemma: Lemma Φ( x1 , x2 ,..., xm ) = 0 ⇔ P( x1 , x2 ,..., xm ) = 0. Φ( x1 , x2 ,..., xm ) = 1 ⇔ P( x1 , x2 ,..., xm ) = 1. ∴ ∑ ∑ x1∈{0 ,1} x2 ∈{0 ,1} ... ∑ P( x , x ,..., x xm ∈{0 ,1} 1 2 m )=k k = Number of Assignment of Φ.
  • 25. 25 • To catch general idea of the TQBF protocol lets review a protocol for following language. # SAT = {< Φ , k >: Φ is a cnf - formula with exactly k satisfying assignments}. Theorem :: # SAT ∈ IP. Main Idea : • Lets investigate the problem intuitively.
  • 26. 26 • Think that we are Verifier and want to know that if x ∈ SAT is true or not. • We usually start from General questions to detailed questions. • If the prover is trustful he/she will answer all the questions correctly. • If not we will catch him/her with detailed questions. • Lets review some basic definition.
  • 27. 27 Φ( x1 , x2 ,..., xm ) → P( x1 , x2 ,..., xm ) f i ( x1 , x2 ,..., xi ) = ∑ ∑ xi +1∈ 0 ,1} xi +2 ∈ 0 ,1} { { ... ∑ P( x , x ,..., x xm ∈ 0 ,1} { 1 2 m ) = Number of satisfying assignment when input is x1 , x2 ,..., xi . Example : Φ( x1 , x2 ) → P ( x1 , x2 ) f 0 () = ∑ ∑ P( x , x ) =P(0,0) + P(0,1) + P(1,0) + P(1,1). x1∈ 0 ,1} x2 ∈ 0 ,1} { { 1 2 f1 ( x1 ) = ∑ P( x , x ) =P( x ,0) + P( x ,1). x2 ∈ 0 ,1} { 1 2 1 1 f 2 ( x1 , x2 ) = P ( x1 , x2 ). f 0 () :: Number of satisfying assignment. In General we have : f i ( x1 , x2 ,..., xi ) = f i +1 ( x1 , x2 ,..., xi ,0) + f i +1 ( x1 , x2 ,..., xi ,1).
  • 28. 28 Prover Verifier
  • 29. 29 • It is obvious that the foregoing Protocol is very large ( exponential message size). • So we must use randomness for shortening the messages and protocol. • In each phase, the message will be doubled. So we must reduce this phase.
  • 30. 30 Prover Verifier
  • 31. 31 Proof Idea: • If x ∈ # SAT then trusted prover always answer correctly. • Else devoius prover can cheat verifier with low probability in each phase. It means that: d n Pr{ f i = f i } ≤ ≤ n q 2
  • 32. 32 • Now it is the time to revise the last protocol for TQBF. • We know that: ∃ x1∀ x2 ...∀ xm Φ ( x1 , x2 ,..., xm ) ∈ TQBF ⇔ ∑ ∏ x1∈{0,1} x2 ∈{0 ,1} ... ∏ P( x , x ,..., x xm ∈{0,1} 1 2 m )0 • At first glance it seems when we see ∏ instead of addition we use multiplication. • But it may increase the size of the polynomial exponentially.
  • 33. 33 • So, we use clever idea for overcoming this problem. Linearization Operator R :: Rx1 [ P(x1 , x 2 ,..., x m )] ≡ (1 − x1 )P(0, x 2 ,..., x m ) + (x1 )P(1, x 2 ,..., x m ) • Now we use this operator for TQBF. ∃ x1∀ x2 ...∀ xm Φ ( x1 , x2 ,..., xm ) ⇒ ∃ x1 Rx1∀ x2 Rx1Rx2 ...∀ xm Φ ( x1 , x2 ,..., xm )
  • 34. 34 Probabilistically Checkable Proofs (PCPs) • Again, lets review the definition of NP class. L ∈ NP ⇔ ∃V(.,.) ∈ P, ∃P(.), ∀x ∈ Σ∗ , 1. x ∈ L ⇒ ∃y, y ≤ P( x ) and V(x, y) accepts. 2. x ∉ L ⇒ ∀y, y ≤ P( x ) and V(x, y) rejects. • So, if the input string is the member of language, verifier can access the whole bits of the polynomial size proof.
  • 35. 35 • What will happen if we restrict the verifier to access the subset of the proof but not all of it? • It seems that in this case the verifier will lose its power. (Maybe) • If we empower the verifier with randomization what will happen? • The answers of these questions will lead us to PCP machine.
  • 36. 36 O(q(n)): The number of query about the bits of the proof. x Polynomial Time Randomized O(r(n)) :Length Verifier Of random string Whole Proof
  • 37. 37 Definition : PCP(r(n), q(n)) is the class of all languages accepted by an (r(n), q(n)) - restricted verifier V in the following sense : x ∈ L ⇒ ∃y, Pr[V y (x) = 1] = 1. 1 x ∉ L ⇒ ∀y, Pr[V y (x) = 1] ≤ . 2 Some Points: • We don’t have any restriction on the size of the proof. • If the Verifier uses its history for the questioning, it is called adaptive else nonadaptive.
  • 38. 38 Some Clear Facts: NP = PCP(0, Poly(n)) =  PCP(0, n c ). c 0 CoRP = PCP(Poly(n),0). And this is one of the most important theorems that describes NP. PCP Theorem :: NP = PCP(Log n,1)
  • 39. 39 • Hastaad proved Stronger result : NP Equals PCP with O(logn) random bits and Exactly 3 query bits. • PCP technique resaults into finding optimum band for NP-Hard optimization problems, such as MAX-3SAT and MAX-CLIQUE.
  • 40. 40 Conclusion • In this talk I focused on general ideas of IP and PCP. • It seems that these results and techniques will have many things to say, especially in the area of complexity. • In future, we would see many wonderful results. The END