• Aucun résultat trouvé

RELATIONSHIP BETWEEN BPP AND OTHER CLASSES

Dans le document This page intentionally left blank (Page 161-164)

PART ONE BASIC COMPLEXITY CLASSES

CHAPTER 7 Randomized computation

7.5 RELATIONSHIP BETWEEN BPP AND OTHER CLASSES

machine outputs “heads” and stops; ifbi >pi, the machine outputs “tails” andhalts;

otherwise, the machine goes to stepi+1. Clearly, the machine reaches stepi+1 iff bj=pjfor allji, which happens with probability 1/2i. Thus the probability of “heads”

is

ipi21i, which is exactlyρ. Furthermore, the expectedrunning time is

iic· 21i. For every constantc, this infinite sum is bounded by another constant (see Exercise7.2).

Conversely, probabilistic algorithms that only have access toρ-coins do not have less power than standard probabilistic algorithms:

Lemma 7.13von-Neumann[vN51] A coin withPr[Heads] =1/2can be simulated by a probabilistic TM with access to a stream ofρ-biased coins in expected time O(ρ(11−ρ)).# Proof: We construct a TMMthat given the ability to tossρ-coins, outputs a 1/2-coin.

The machineM tosses pairs of coins until the first time it gets a pair containing two different results (i.e., “Heads-Tails” or “Tails-Heads”). Then, if the first of these two results is “Heads” it outputs “Heads” and otherwise it outputs “Tails.”

The probability that a pair of coins comes up “Head-Tails” isρ(1−ρ), while the probability it comes up “Tails-Heads” is(1ρ)ρ =ρ(1ρ). Hence, in each stepM halts with probability 2ρ(1−ρ), andconditionedonMhalting in a particular step, the outputs “Heads” and “Tails” are equiprobable (i.e.,M’s output is a fair coin). Note that we didnot needto knowρto run this simulation.

Weak random sources. Physicists (andphilosophers) are still not completely certain that randomness exists in the world, and even if it does, it is not clear that our computers have access to an endless stream of independent coins. Conceivably, it may be the case that we only have access to a source ofimperfectrandomness that, although somewhat unpredictable, does not consist of independent coins. In Chapter 21, we show how to use such imperfect sources to run probabilistic algorithms that were designed assuming perfect randomness.

7.5 RELATIONSHIP BETWEEN BPP AND OTHER CLASSES

Below we will show thatBPPP/poly. Thus PBPPP/poly. Furthermore, we show thatBPPp2p2andso ifNP=P, thenBPP=P. Of course, since we do not believeP=NP, this still leaves open the possibility thatP =BPP. However, as mentionedabove (andwill be elaboratedin Chapters 19and20), we can show that if certain plausible complexity-theoretic conjectures are true, thenBPP=P. Thus we suspect thatBPPis the same asPandhence (by the Time Hierarchy Theorem)BPPis a proper subset of, say,DTIME(nlogn). Yet currently researchers are not even able to show thatBPPis a proper subset ofNEXP.

7.5.1 BPPP/poly

Now we show that allBPPlanguages have polynomial sizedcircuits. Together with Theorem6.19this shows that unless the polynomial-hierarchy collapses,3SATcannot be solvedin probabilistic polynomial time.

Theorem 7.14 [Adl78]

BPPP/poly.

Proof: SupposeLBPP, then by the alternative definition of BPPandthe error reduction procedure of Theorem7.10, there exists a TMMthat on inputs of sizenuses mrandom bits and such that for everyx ∈ {0, 1}n, Prr[M(x,r)= L(x)] ≤ 2−n−1. Say that a stringr∈ {0, 1}misbadfor an inputx∈ {0, 1}nifM(x,r)=L(x)andotherwise callr good for x. For every x, at most 2m

2n+1 strings r are badforx. Adding over all x ∈ {0, 1}n, there are at most 2n· 22n+1m = 2m/2 stringsr that are badforsome x. In particular, there exists a stringr0∈ {0, 1}m that is goodforevery x∈ {0, 1}n. We can hardwire such a stringr0to obtain a circuitC(of size at most quadratic in the running time ofM) that on inputxoutputsM(x,r0). The circuitCwill satisfyC(x)=L(x)for everyx∈ {0, 1}n.

7.5.2 BPPis inPH

At first glance,BPPseems to have nothing to do with the polynomial hierarchy, so the next theorem is somewhat surprising.

Theorem 7.15 (Sipser-Gács Theorem) BPPp2p2.

Proof: It is enough to prove thatBPPp2becauseBPPis closedunder complemen-tation (i.e.,BPP=coBPP).

SupposeLBPP. Then by the alternative definition ofBPPandthe error reduc-tion procedure of Theorem7.10there exists a polynomial-time deterministic TMMfor Lthat on inputs of lengthnusesm=poly(n)random bits and satisfies

xL⇒Pr

r [M(x,r)accepts ]≥1−2n xL⇒Pr

r [M(x,r)accepts ]≤2−n

Forx∈ {0, 1}n, letSxdenote the set ofr’s for whichMaccepts the input pairx,r. Then either|Sx| ≥ (1−2−n)2m or|Sx| ≤2−n2m, depending on whether or notxL.

We will show how to check, using two quantifiers, which of the two cases is true.

Figure 7.1.There are only two possible sizes for the set ofr’s such thatM(x,r)=Accept: Either this set is almost all of{0, 1}m, or it is a tiny fraction of{0, 1}m. In the former case, a few random “shifts” of this set are quite likely to cover all of{0, 1}m. In the latter case, the set’s size is so small that a few shifts cannot cover{0, 1}m.

7.5. Relationship BetweenBPPand Other Classes 137 For a set S ⊆ {0, 1}m andstringu ∈ {0, 1}m, we denote byS+u the “shift” of the setSbyu:S+u= {x+u:xS}where+denotes vector addition modulo 2 (i.e., bitwise XOR). Letk=m

n

+1. Theorem7.15is impliedby the following two claims (see Figure 7.1).

Claim 1: For every setS ⊆ {0, 1}m with|S| ≤ 2m−n andeveryk vectors u1,. . .,uk,

ki=1(S+ui)= {0, 1}m.

Proof: Since|S+ui| = |S|, by the union boundwe have| ∪ki=1(S+ui)| ≤k|S|<2m (for sufficiently largen).

Claim 2: For every setS ⊆ {0, 1}mwith|S| ≥(1−2n)2m, there existu1,. . .,uksuch that∪ki=1(S+ui)= {0, 1}m.

Proof: This follows from the probabilistic method: We claim that if u1,. . .,uk are chosen independently at random, then Pr[∪ki=1(S+ui) = {0, 1}m] > 0. Indeed, for r ∈ {0, 1}m, letBr denote the “bad event” that ris not in∪ki=1(S+ui). It suffices to prove that Pr[∃r∈{0, 1}mBr]<1, which will follow by the union boundif we can show for everyrthat Pr[Br]<2−m. ButBr = ∩i∈[k]Bir whereBiris the event thatrS+ui, or, equivalently, thatr+uiS(using the fact that modulo 2, a+b= ca =c+b).

Yet,r+ui is a uniform element in{0, 1}m, andso it will be in Swith probability at least 1−2−n. Furthermore, the eventsBirare independent for differenti’s implying that Pr[Br] =Pr[Bir]k ≤2nk<2m.

Together Claims1and2show thatxLif andonly if the following statement is true:

∃u1,. . .,uk∈ {0, 1}m ∀r∈ {0, 1}m r∈ ∪ki=1(Sx+ui) or, equivalently,

∃u1,. . .,uk ∈ {0, 1}m ∀r∈ {0, 1}m k i=1

M(x,rui)accepts

which represents ap2computation sincekis poly(n). Hence we have shownL2. 7.5.3 Hierarchy theorems and complete problems?

The reader may have wondered if BPP has complete problems, or if probabilistic computation has hierarchy theorems. Now we discuss this.

Complete problems for BPP?

Though a very natural class,BPPbehaves differently in some ways from other classes we have seen. For example, we know of no complete languages forBPP. One reason for this difficulty is that the defining property ofBPTIMEmachines issemantic, namely, that they accept every input string either with probability at least2/3or with probability at most1/3. Testing whether a given TMMhas this property is undecidable. By contrast, the defining property of an NDTM issyntactic:Given a string, it is easy to determine if it is a validencoding of an NDTM. Complete problems seem easier to findfor syntactically

defined classes than for semantically defined ones. For example, consider the following natural attempt at aBPP-complete language: DefineLto contain all tuplesM,x, 1t such that on inputx,Moutputs 1 withintsteps with probability at least2/3. The language Lis indeedBPP-hardbut is not known to be inBPPsince forM,x, 1tLwe could have Pr[M(x)=1] =1/2(say), which is greater than1/3. In fact, we will see in Chapter17 that this language is#P-complete andhence unlikely to be in any level of the polynomial hierarchy unless the hierarchy collapses. However if, as believed,BPP=P, thenBPP does have a complete problem (sincePdoes).

Does BPTIME have a hierarchy theorem?

Is every problem inBPTIME(n2)also inBPTIME(n)? One wouldimagine not, and this seems like the kindof result we shouldbe able to prove using the diagonalization techniques of Chapter3. However currently we are even unable to show that, say, BPTIME(n)=BPTIME(n(logn)10). The standard diagonalization techniques fail, again apparently because the defining property ofBPTIMEmachines is semantic. However, recently there has been some progress on obtaining hierarchy theorems for some closely relatedclasses (see the chapter notes).

Dans le document This page intentionally left blank (Page 161-164)