-
Local Enumeration: The Not-All-Equal Case
Authors:
Mohit Gurumukhani,
Ramamohan Paturi,
Michael Saks,
Navid Talebanfard
Abstract:
Gurumukhani et al. (CCC'24) proposed the local enumeration problem Enum(k, t) as an approach to break the Super Strong Exponential Time Hypothesis (SSETH): for a natural number $k$ and a parameter $t$, given an $n$-variate $k$-CNF with no satisfying assignment of Hamming weight less than $t(n)$, enumerate all satisfying assignments of Hamming weight exactly $t(n)$. Furthermore, they gave a randomi…
▽ More
Gurumukhani et al. (CCC'24) proposed the local enumeration problem Enum(k, t) as an approach to break the Super Strong Exponential Time Hypothesis (SSETH): for a natural number $k$ and a parameter $t$, given an $n$-variate $k$-CNF with no satisfying assignment of Hamming weight less than $t(n)$, enumerate all satisfying assignments of Hamming weight exactly $t(n)$. Furthermore, they gave a randomized algorithm for Enum(k, t) and employed new ideas to analyze the first non-trivial case, namely $k = 3$. In particular, they solved Enum(3, n/2) in expected $1.598^n$ time. A simple construction shows a lower bound of $6^{\frac{n}{4}} \approx 1.565^n$.
In this paper, we show that to break SSETH, it is sufficient to consider a simpler local enumeration problem NAE-Enum(k, t): for a natural number $k$ and a parameter $t$, given an $n$-variate $k$-CNF with no satisfying assignment of Hamming weight less than $t(n)$, enumerate all Not-All-Equal (NAE) solutions of Hamming weight exactly $t(n)$, i.e., those that satisfy and falsify some literal in every clause. We refine the algorithm of Gurumukhani et al. and show that it optimally solves NAE-Enum(3, n/2), namely, in expected time $poly(n) \cdot 6^{\frac{n}{4}}$.
△ Less
Submitted 6 January, 2025;
originally announced January 2025.
-
Local Enumeration and Majority Lower Bounds
Authors:
Mohit Gurumukhani,
Ramamohan Paturi,
Pavel Pudlák,
Michael Saks,
Navid Talebanfard
Abstract:
Depth-3 circuit lower bounds and $k$-SAT algorithms are intimately related; the state-of-the-art $Σ^k_3$-circuit lower bound and the $k$-SAT algorithm are based on the same combinatorial theorem. In this paper we define a problem which reveals new interactions between the two. Define Enum($k$, $t$) problem as: given an $n$-variable $k$-CNF and an initial assignment $α$, output all satisfying assig…
▽ More
Depth-3 circuit lower bounds and $k$-SAT algorithms are intimately related; the state-of-the-art $Σ^k_3$-circuit lower bound and the $k$-SAT algorithm are based on the same combinatorial theorem. In this paper we define a problem which reveals new interactions between the two. Define Enum($k$, $t$) problem as: given an $n$-variable $k$-CNF and an initial assignment $α$, output all satisfying assignments at Hamming distance $t$ from $α$, assuming that there are no satisfying assignments of Hamming distance less than $t$ from $α$. Observe that: an upper bound $b(n, k, t)$ on the complexity of Enum($k$, $t$) implies:
- Depth-3 circuits: Any $Σ^k_3$ circuit computing the Majority function has size at least $\binom{n}{\frac{n}{2}}/b(n, k, \frac{n}{2})$.
- $k$-SAT: There exists an algorithm solving $k$-SAT in time $O(\sum_{t = 1}^{n/2}b(n, k, t))$.
A simple construction shows that $b(n, k, \frac{n}{2}) \ge 2^{(1 - O(\log(k)/k))n}$. Thus, matching upper bounds would imply a $Σ^k_3$-circuit lower bound of $2^{Ω(\log(k)n/k)}$ and a $k$-SAT upper bound of $2^{(1 - Ω(\log(k)/k))n}$. The former yields an unrestricted depth-3 lower bound of $2^{ω(\sqrt{n})}$ solving a long standing open problem, and the latter breaks the Super Strong Exponential Time Hypothesis.
In this paper, we propose a randomized algorithm for Enum($k$, $t$) and introduce new ideas to analyze it. We demonstrate the power of our ideas by considering the first non-trivial instance of the problem, i.e., Enum($3$, $\frac{n}{2}$). We show that the expected running time of our algorithm is $1.598^n$, substantially improving on the trivial bound of $3^{n/2} \simeq 1.732^n$. This already improves $Σ^3_3$ lower bounds for Majority function to $1.251^n$. The previous bound was $1.154^n$ which follows from the work of Håstad, Jukna, and Pudlák (Comput. Complex.'95).
△ Less
Submitted 23 May, 2024; v1 submitted 14 March, 2024;
originally announced March 2024.
-
Bounded-Depth Frege Lower Bounds for Random 3-CNFs via Deterministic Restrictions
Authors:
Svyatoslav Gryaznov,
Navid Talebanfard
Abstract:
A major open problem in proof complexity is to demonstrate that random 3-CNFs with a linear number of clauses require super-polynomial size refutations in bounded-depth Frege systems. We take the first step towards addressing this question by establishing a super-linear lower bound: for every $k$, there exists $ε_k > 0$ such that any depth-$k$ Frege refutation of a random $n$-variable 3-CNF with…
▽ More
A major open problem in proof complexity is to demonstrate that random 3-CNFs with a linear number of clauses require super-polynomial size refutations in bounded-depth Frege systems. We take the first step towards addressing this question by establishing a super-linear lower bound: for every $k$, there exists $ε_k > 0$ such that any depth-$k$ Frege refutation of a random $n$-variable 3-CNF with $Θ(n)$ clauses has $Ω(n^{1 + ε_k})$ steps w.h.p. Our proof involves a novel adaptation of the deterministic restriction technique introduced by Chaudhuri and Radhakrishnan (STOC'96).
For a given formula, this technique provides a method to fix a small number of variables in a bottom-up manner, ensuring that every surviving gate has small fan-in. Consequently, the resulting formula depends on a limited number of variables and can be simplified to a constant by a small variable assignment. Adapting this approach to proof complexity requires addressing the usual challenges associated with maintaining the hardness of a given instance. To this end, we introduce the following generalizations of standard proof complexity tools:
- Weak expanders: These bipartite graphs relax the classical notion of expansion by only requiring that small sets have a non-empty boundary, while intermediate-sized sets have a large boundary. This property is sufficient to preserve hardness (e.g., for resolution width) and is easier to maintain as we remove vertices from the graph.
- Formula assignments: To simplify a Frege proof, we consider a generalization of partial restrictions that assign values to formulas instead of just variables. We treat these assignments as new axioms added to our formula, as they generally cannot be expressed as variable substitutions.
△ Less
Submitted 2 September, 2024; v1 submitted 4 March, 2024;
originally announced March 2024.
-
Linear Branching Programs and Directional Affine Extractors
Authors:
Svyatoslav Gryaznov,
Pavel Pudlák,
Navid Talebanfard
Abstract:
A natural model of read-once linear branching programs is a branching program where queries are $\mathbb{F}_2$ linear forms, and along each path, the queries are linearly independent. We consider two restrictions of this model, which we call weakly and strongly read-once, both generalizing standard read-once branching programs and parity decision trees. Our main results are as follows.
- Average…
▽ More
A natural model of read-once linear branching programs is a branching program where queries are $\mathbb{F}_2$ linear forms, and along each path, the queries are linearly independent. We consider two restrictions of this model, which we call weakly and strongly read-once, both generalizing standard read-once branching programs and parity decision trees. Our main results are as follows.
- Average-case complexity. We define a pseudo-random class of functions which we call directional affine extractors, and show that these functions are hard on average for the strongly read-once model. We then present an explicit construction of such function with good parameters. This strengthens the result of Cohen and Shinkar (ITCS'16) who gave such average-case hardness for parity decision trees. Directional affine extractors are stronger than the more familiar class of affine extractors. Given the significance of these functions, we expect that our new class of functions might be of independent interest.
- Proof complexity. We also consider the proof system $\text{Res}[\oplus]$ which is an extension of resolution with linear queries. A refutation of a CNF in this proof system naturally defines a linear branching program solving the corresponding search problem. Conversely, we show that a weakly read-once linear BP solving the search problem can be converted to a $\text{Res}[\oplus]$ refutation with constant blow up.
△ Less
Submitted 26 January, 2022;
originally announced January 2022.
-
A Variant of the VC-dimension with Applications to Depth-3 Circuits
Authors:
Peter Frankl,
Svyatoslav Gryaznov,
Navid Talebanfard
Abstract:
We introduce the following variant of the VC-dimension. Given $S \subseteq \{0, 1\}^n$ and a positive integer $d$, we define $\mathbb{U}_d(S)$ to be the size of the largest subset $I \subseteq [n]$ such that the projection of $S$ on every subset of $I$ of size $d$ is the $d$-dimensional cube. We show that determining the largest cardinality of a set with a given $\mathbb{U}_d$ dimension is equival…
▽ More
We introduce the following variant of the VC-dimension. Given $S \subseteq \{0, 1\}^n$ and a positive integer $d$, we define $\mathbb{U}_d(S)$ to be the size of the largest subset $I \subseteq [n]$ such that the projection of $S$ on every subset of $I$ of size $d$ is the $d$-dimensional cube. We show that determining the largest cardinality of a set with a given $\mathbb{U}_d$ dimension is equivalent to a Turán-type problem related to the total number of cliques in a $d$-uniform hypergraph. This allows us to beat the Sauer--Shelah lemma for this notion of dimension. We use this to obtain several results on $Σ_3^k$-circuits, i.e., depth-$3$ circuits with top gate OR and bottom fan-in at most $k$:
* Tight relationship between the number of satisfying assignments of a $2$-CNF and the dimension of the largest projection accepted by it, thus improving Paturi, Saks, and Zane (Comput. Complex. '00).
* Improved $Σ_3^3$-circuit lower bounds for affine dispersers for sublinear dimension. Moreover, we pose a purely hypergraph-theoretic conjecture under which we get further improvement.
* We make progress towards settling the $Σ_3^2$ complexity of the inner product function and all degree-$2$ polynomials over $\mathbb{F}_2$ in general. The question of determining the $Σ_3^3$ complexity of IP was recently posed by Golovnev, Kulikov, and Williams (ITCS'21).
△ Less
Submitted 18 November, 2021;
originally announced November 2021.
-
On the extension complexity of polytopes separating subsets of the Boolean cube
Authors:
Pavel Hrubeš,
Navid Talebanfard
Abstract:
We show that
1. for every $A\subseteq \{0, 1\}^n$, there exists a polytope $P\subseteq \mathbb{R}^n$ with $P \cap \{0, 1\}^n = A$ and extension complexity $O(2^{n/2})$,
2. there exists an $A\subseteq \{0, 1\}^n$ such that the extension complexity of any $P$ with $P\cap \{0, 1\}^n = A$ must be at least $2^{\frac{n}{3}(1-o(1))}$.
We also remark that the extension complexity of any 0/1-polytope…
▽ More
We show that
1. for every $A\subseteq \{0, 1\}^n$, there exists a polytope $P\subseteq \mathbb{R}^n$ with $P \cap \{0, 1\}^n = A$ and extension complexity $O(2^{n/2})$,
2. there exists an $A\subseteq \{0, 1\}^n$ such that the extension complexity of any $P$ with $P\cap \{0, 1\}^n = A$ must be at least $2^{\frac{n}{3}(1-o(1))}$.
We also remark that the extension complexity of any 0/1-polytope in $\mathbb{R}^n$ is at most $O(2^n/n)$ and pose the problem whether the upper bound can be improved to $O(2^{cn})$, for $c<1$.
△ Less
Submitted 25 May, 2021;
originally announced May 2021.
-
A Separator Theorem for Hypergraphs and a CSP-SAT Algorithm
Authors:
Michal Koucký,
Vojtěch Rödl,
Navid Talebanfard
Abstract:
We show that for every $r \ge 2$ there exists $ε_r > 0$ such that any $r$-uniform hypergraph with $m$ edges and maximum vertex degree $o(\sqrt{m})$ contains a set of at most $(\frac{1}{2} - ε_r)m$ edges the removal of which breaks the hypergraph into connected components with at most $m/2$ edges. We use this to give an algorithm running in time $d^{(1 - ε_r)m}$ that decides satisfiability of $m$-v…
▽ More
We show that for every $r \ge 2$ there exists $ε_r > 0$ such that any $r$-uniform hypergraph with $m$ edges and maximum vertex degree $o(\sqrt{m})$ contains a set of at most $(\frac{1}{2} - ε_r)m$ edges the removal of which breaks the hypergraph into connected components with at most $m/2$ edges. We use this to give an algorithm running in time $d^{(1 - ε_r)m}$ that decides satisfiability of $m$-variable $(d, k)$-CSPs in which every variable appears in at most $r$ constraints, where $ε_r$ depends only on $r$ and $k\in o(\sqrt{m})$. Furthermore our algorithm solves the corresponding #CSP-SAT and Max-CSP-SAT of these CSPs. We also show that CNF representations of unsatisfiable $(2, k)$-CSPs with variable frequency $r$ can be refuted in tree-like resolution in size $2^{(1 - ε_r)m}$. Furthermore for Tseitin formulas on graphs with degree at most $k$ (which are $(2, k)$-CSPs) we give a deterministic algorithm finding such a refutation.
△ Less
Submitted 10 December, 2021; v1 submitted 14 May, 2021;
originally announced May 2021.
-
Tighter Hard Instances for PPSZ
Authors:
Pavel Pudlák,
Dominik Scheder,
Navid Talebanfard
Abstract:
We construct uniquely satisfiable $k$-CNF formulas that are hard for the algorithm PPSZ. Firstly, we construct graph-instances on which "weak PPSZ" has savings of at most $(2 + ε) / k$; the saving of an algorithm on an input formula with $n$ variables is the largest $γ$ such that the algorithm succeeds (i.e. finds a satisfying assignment) with probability at least $2^{ - (1 - γ) n}$. Since PPSZ (b…
▽ More
We construct uniquely satisfiable $k$-CNF formulas that are hard for the algorithm PPSZ. Firstly, we construct graph-instances on which "weak PPSZ" has savings of at most $(2 + ε) / k$; the saving of an algorithm on an input formula with $n$ variables is the largest $γ$ such that the algorithm succeeds (i.e. finds a satisfying assignment) with probability at least $2^{ - (1 - γ) n}$. Since PPSZ (both weak and strong) is known to have savings of at least $\frac{π^2 + o(1)}{6k}$, this is optimal up to the constant factor. In particular, for $k=3$, our upper bound is $2^{0.333\dots n}$, which is fairly close to the lower bound $2^{0.386\dots n}$ of Hertli [SIAM J. Comput.'14]. We also construct instances based on linear systems over $\mathbb{F}_2$ for which strong PPSZ has savings of at most $O\left(\frac{\log(k)}{k}\right)$. This is only a $\log(k)$ factor away from the optimal bound. Our constructions improve previous savings upper bound of $O\left(\frac{\log^2(k)}{k}\right)$ due to Chen et al. [SODA'13].
△ Less
Submitted 4 November, 2016;
originally announced November 2016.
-
On the Structure and the Number of Prime Implicants of 2-CNFs
Authors:
Navid Talebanfard
Abstract:
Let $m(n, k)$ be the maximum number of prime implicants that any $k$-CNF on n variables can have. We show that $3^{n/3} \le m(n,2) \le (1+o(1))3^{n/3}$.
Let $m(n, k)$ be the maximum number of prime implicants that any $k$-CNF on n variables can have. We show that $3^{n/3} \le m(n,2) \le (1+o(1))3^{n/3}$.
△ Less
Submitted 19 October, 2015; v1 submitted 12 August, 2014;
originally announced August 2014.