Interactive Proofs




CS254

Chris Pollett

May 1, 2017

Outline

Interactive Proofs

Example Deterministic Verifiers

Probabilistic Verifiers

Interactive Proof System

Definition. Let `f, g : {0,1}^star -> {0,1}^star` be functions, let `k ge 0` be an integer, and let `r` be a random `m` bit string. A `k`-round interaction of `f` and `g` on input `x in {0,1}^star`, denoted by `langle f, g rangle(x)`, is the sequence of `a_1, ..., a_k in {0,1}^star` defined as follows:
`\qquad\qquad a_1 = f(x, r)`
`\qquad\qquad a_2 = g(x, a_1)`
`\qquad\qquad`...
`\qquad\qquad a_(2i+1) = f(x, r, a_1, ... a_(2i))` for `2i < k`
`\qquad\qquad a_(2i+2) = g(x, a_1, ..., a_(2i+1))` for `2i +1 < k`.

The class IP

Definition For an integer `k ge 1`, we say that `L` is in `IP[k]` if there is a probabilistic TM `V` that can have a `k`-round interaction with a function `P:{0,1}^star -> {0,1}^star` such that on input `x`, `V` runs in time bounded by `q(|x|)` for some polynomial `q` and:
(Completeness) `x in L => exists P Pr[out_V langle V, P rangle(x) = 1] ge 2/3`
(Soundness) `x !in L => forall P Pr[out_V langle V, P rangle(x) = 1] le 1/3`
where all probabilities are over the choice of `r`.

We define `IP = cup_(c ge 1) IP[n^c]`.

Remarks about IP

Remarks about Interactive Protocols and Approximability

Quiz

Which of the following statements is true?

  1. The proof that our random walk algorithm for 2-SAT discovers a truth assignment with probability 1/2 used Chernoff Bounds.
  2. The proof that the choice of 2/3 in the definition of BPP didn't matter directly used Markov's Inequality.
  3. BPP is contained in the polynomial time hierarchy.

Graph Isomorphism and Nonisomorphism

Interactive Protocol for GNI

Protocol:
  V: Pick i in {1,2} uniformly at random. 
     Randomly permutes the vertices of Gi to get a new graph H.
     Send  H to P.
  P: Identify which of G1, G2 was used to produce H.
     Let Gj be that graph. 
     Send j to V.
  V: Accept if i=j; otherwise reject.

Public coins and AM

Definition. For every `k` the complexity class `AM[k]` is defined as the subset of `IP[k]` obtained when we restrict the verifier's messages to be random bits, and not allowing it to use any other randoms bits that are not contained in these messages.

Another Characterization of AM

Public Coin Simulation of Private Coins

Theorem. (Goldwasser Sipser 1987). For all polynomials k(n),
`IP[k] subseteq AM[k+2]`.

Before we show this proof we show the following subcase:

Theorem. `GNI in AM[2]`

Proof. Let `S = {H | H ~= G_1 mbox( or ) H~= G_2}`. An `n` vertex graph has at most `n!` equivalent graphs. Let's assume this is exactly `n!` for the graphs `G_1` and `G_2`. Then the size of `S` differs by a factor of 2 depending on whether `G_1` and `G_2` are isomorphic.

Now consider the general case where `G_1` or `G_2` may have less than `n!` equivalent graphs. An `n`-vertex graph has less than `n!` equivalent graphs iff it has a nontrivial automorphism, which is a permutation that is not the identity permutation. Let `aut(G)` denote the automorphisms of `G`. We change the definition of `S` to
`S = {(H, pi) | H ~=G_1 mbox( or ) H ~=G_2 mbox( and ) pi in aut(H)}`.
using the fact that `aut(G)` is a subgroup. One can verify that this `S` has size `2 cdot (n!)` or `n!` depending on whether `G_1` and `G_2` are isomorphic. So to convince the verifier these two graphs are nonisomorphic it suffices for the prover to convince the first case happens rather than the second. We will do this with the set lower bound protocol which we describe on Monday.