Abstract
The main motivation of this work is to study the average case hardness of the problems which belong to high complexity classes. In more detail, we are interested in provable hard problems which have a big set of hard instances. Moreover, we consider efficient generators of these hard instances of the problems. Our investigation has possible applications in cryptography. As a first step, we consider computational problems from the NEXP class.
We extend techniques presented in [7] in order to develop efficient generation of hard instances of exponentially hard problems. Particularly, for any given polynomial time (deterministic/probabilistic) heuristic claiming to solve NEXP hard problem our procedure finds instances on which the heuristic errs. Then we present techniques for generating hard instances for (super polynomial but) sub exponential time heuristics.
As a concrete example the Succinct Permanent \(\bmod \; p\) problem is chosen. First, we prove the NEXP hardness of this problem (via randomized polynomial time reduction). Next, for any given polynomial time heuristic we construct hard instance. Finally, an efficient technique which expands one hard instance to exponential set (in the number of additional bits added to the found instance) of hard instances of the Succinct Permanent \(\bmod \; p\) problem is provided.
Partially supported by the Israeli Ministry of Science (Russia Israel grant), Rita Altura Trust Chair in Computer Sciences, Lynne and William Frankel Center for Computer Sciences, Israel Science Foundation (grant number 428/11), Cabarnit Cyber Security MAGNET Consortium, Grant from the Technion’s Institute for Future Defense Technologies Research named for the Medvedi, Shwartzman and Gensler families, and the Israeli Internet Association.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Agrawal, M., Kayal, N., Saxena, N.: PRIMES is in P. Ann. of Math 2, 781–793 (2002)
Babai, L., Fortnow, L., Lund, C.: Non-Deterministic Exponential Time has Two-Prover Interactive Protocols. Computational Complexity 1, 3–40 (1991)
Babai, L., Fortnow, L., Nisan, N., Wigderson, A.: BPP Has Subexponential Time Simulations Unless EXPTIME has Publishable Proofs. Computational Complexity 3, 307–318 (1993)
Dolev, S., Fandina, N., Gutfreund, D.: Succinct Permanent is NEXP-hard with Many Hard Instances. Electronic Colloquium on Computational Complexity (ECCC) 19, 86 (2012)
Dolev, S., Korach, E., Uzan, G.: Magnifying Computing Gaps Establishing Encrypted Communication over Unidirectional Channels (Extended Abstract). In: Masuzawa, T., Tixeuil, S. (eds.) SSS 2007. LNCS, vol. 4838, pp. 253–265. Springer, Heidelberg (2007)
Galperin, H., Wigderson, A.: Succinct representations of graphs. Inf. Control 56, 183–198 (1984)
Gutfreund, D., Shaltiel, R., Ta-shma, A.: If NP Languages are Hard on the Worst-Case, Then it is Easy to Find Their Hard Instances. Computational Complexity 16(4), 412–441 (2007)
Impagliazzo, R., Wigderson, A.: Randomness vs time: derandomization under a uniform assumption. J. Comput. Syst. Sci. 63, 672–688 (2001)
Lipton, R.: New directions in testing. In: Distributed Computing and Cryptography. DIMACS Series on Discrete Mathematics and Theoretical Computer Science, vol. 2, pp. 191–202 (1991)
Merkle, R.C.: Secure Communications Over Insecure Channels. CACM 21(4), 294–299 (1978)
Papadimitriou, C.H.: Computational Complexity. Addison-Wesley (1994)
Papadimitriou, C.H., Yannakakis, M.: A note on succinct representations of graphs. Inf. Control 71, 181–185 (1986)
Rybalov, A.N.: Generic Complexity of Presburger Arithmetic. In: Diekert, V., Volkov, M.V., Voronkov, A. (eds.) CSR 2007. LNCS, vol. 4649, pp. 356–361. Springer, Heidelberg (2007)
Sudan, M., Trevisan, L., Vadhan, S.P.: Pseudorandom Generators without the XOR Lemma. J. Comput. Syst. Sci. 62, 236–266 (2001)
Trevisan, L., Vadhan, S.: Pseudorandomness and average-case complexity via uniform reductions. Computational Complexity 16(4), 331–364 (2007)
Valiant, L.G.: The complexity of computing the permanent. Theoretical Computer Science 8(2), 189–201 (1979)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dolev, S., Fandina, N., Gutfreund, D. (2013). Succinct Permanent Is NEXP-Hard with Many Hard Instances. In: Spirakis, P.G., Serna, M. (eds) Algorithms and Complexity. CIAC 2013. Lecture Notes in Computer Science, vol 7878. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38233-8_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-38233-8_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38232-1
Online ISBN: 978-3-642-38233-8
eBook Packages: Computer ScienceComputer Science (R0)