skip to main content
10.1145/301250.301428acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free Access

Graph nonisomorphism has subexponential size proofs unless the polynomial-time hierarchy collapses

Published:01 May 1999Publication History
First page image

References

  1. AK97.V. Arvind and J. KObler. On pseudorandomness and resource-bounded measure. In Proceedings I 7th Conference on the Foundations of Software Technology and Theoretical Computer Science, volume 1346 of Lecture Notes in Computer Science, pages 235-249. Springer-Verlag, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. AKL+79.R. Aleliunas, R. Karp, R. Lipton, L. Lov,Ssz, and C. Rackoff. Random walks, universal traversal sequences, and the complexity of maze problems. In Proceedings of the 20th IEEE Symposium on Foundations of Computer Science, pages 218-223. IEEE, 1979.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Ang88.D. Angluin. Queries and concept learning. Machine Learning, 2(4):319-342, t 988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Bab85.L. Babai. Trading group theory for randomness. In Proceedings of the 17th ACM Symposium on the Theory of Computing, pages 421-429. ACM, 1985. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. BCG+96.N. Bshouty, R. Cleve, R. Gavald~, S. Kannan. and C. Tamon. Oracles and queries that are sufficient for exact learning. Journal of Computer and System Sciences, 52(3):421-433, t996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. BDG90.J. Balc,Szar, J. Dfaz, and $. Gabarr6. Structural Complexity II, volume 22 of EATCS Monographs on Theoretical Computer Science. Springer-Verlag, 1990.Google ScholarGoogle Scholar
  7. BDG95.J. Balctizar, J. Dfaz, and J. Gabarr6. Structural Complexity 1, volume I 1 of EATCS Monographs on Theoretical Computer Science. Springer-Verlag, t995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. BFNW93.L. Babai, L. Formow, N. Nisan, and A. Wigderson. BPP has subexponential time simulations unless EX- PTIME has publishable proofs. Computational Complexity, 3:307-318, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. BKL83.L. Bahai, W. Kantor, and E. Luks. Computational complexity and the classification of finite simple groups. In Proceedings of the 24th IEEE Symposium on Foundations of Computer Science, pages 162-171. IEEE, 1983.Google ScholarGoogle Scholar
  10. BL83.L. Bahai and E. Luks. Canonical labeling of graphs. In Proceedings of the 15th ACM Symposium on the Theory of Computing, pages t71-183. ACM, 1983. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. BM84.M. B!um and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM Journal on Computing, 13:850--864, 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. BM88.L. Babai and S. Moran. Arthur-Merlin games: a randomized proof system, and a hierarchy of complexity classes. Journal of Computer and System Sciences, 36:254-276, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. BNS92.L. Babai, N. Nisan, and M. Szegedy. Multiparty protocols, pseudorandom generators for logspace, and timespace trade-offs. Journal of Computer and System Sciences, 45:204--232, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. CRT98.A. Clementi, I. Rotim, and L. Trevisan. Recent advances towards proving P = BPP. Bulletin of the European Association for Theoretical Computer Science, 64:96-103, February 1998.Google ScholarGoogle Scholar
  15. FFK94.S. Fenner, L. Fortnow, and S. Kurtz. Gap-definable counting classes. Journal of Computer and System Sciences, 48(I): 116-148, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. For97.L. Fortnow. Counting complexity. In L. Hemaspaandra and A. Selman, editors, Complexity Theory Retrospective H, pages 81-107. Springer-Vertag, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Fri90.J. Friedman. A note on matrix rigidity. Technical Report TR-308-91, Department of Computer Science, Princeton University, 1990.Google ScholarGoogle Scholar
  18. GMW91.O. Goldreich, S. Micali, and A. Wigderson. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. Journal of the ACM, 38:691-729, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. GS89.S. Goldwasser and M. Sipser. Private coins versus public coins in interactive proof systems. In S. Micati, editor, Randomness and Computation, volume 5 of Advances in Computing Research, pages 73-90. JAI Press, Greenwich, 1989.Google ScholarGoogle Scholar
  20. Imp95.R. Impagliazzo. Hard-core distributions for somewhat hard problems. In Proceedings of the 36th IEEE Symposium on Foundations of Computer Science, pages 538-545. IEEE, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. IW97.R. Impagliazzo and A. Wigderson. P=BPP unless E has sub-exponential circuits: Derandomizing the XOR lemma. In Proceedings of the 29th ACM Symposium on the Theory of Computing, pages 220--229. ACM, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Lit88.N. Littlestone. Learning when irrelevant attributes abound: A new linear-threshold algorithm. Machine Learning, 2:285-318, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. LP82.H. Lewis and Ch. Papadimitriou. Symmetric spacebounded computation. Theoretical Computer Science, 19(2):161-I87, t982.Google ScholarGoogle ScholarCross RefCross Ref
  24. Mil98.E Bro Miltersen. Relativizable pseudorandom generators and extractors. Comment to ECCC Technical Report TR98-055, 1998.Google ScholarGoogle Scholar
  25. Nis92.N. Nisan. Pseudorandom generators for spacebounded computation. Combinatorica, 12:449--461, 1992.Google ScholarGoogle ScholarCross RefCross Ref
  26. NW94.N. Nisan and A. Wigderson. Hardness vs. randomness. Journal of Computer and System Sciences, 49:149- 167, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Pap94.Ch. Papadimitriou. Computational Complexity. Addison-Wesley, 1994.Google ScholarGoogle Scholar
  28. PV91.P. Pudlfik and Z. Vavffn. Computation of rigidity of order n2/r for one simple matrix. Comment. Math. Univ. Carolinae, 32:213-218, 1991.Google ScholarGoogle Scholar
  29. PW90.L. Pitt and M. Warmuth. Prediction preserving reducibility. Journal of Computer and System Sciences, 41 (3):430--467, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Raz.A. Razborov. On rigid matrices. Manuscript in Russian.Google ScholarGoogle Scholar
  31. Rud97.S. Rudich. Super-bits, demi-bits, and NP/qpolynatural proofs. In Proceedings of the Ist International Symposium on Randomization and Approximation Techniques in Computer Science, volume 1269 of Lecture Notes in Computer Science, pages 85-93. Springer-Verlag, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. TO92.S. Toda and M. Ogiwara. Counting classes are at least as hard as the polynomial-time hierarchy. SIAM Journal on Computing, 21(2):316-328, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Tod91.S. Toda. PP is as hard as the polynomial-time hierarchy. SIAM Journal on Computing, 20(5):865-877, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Tre98.L. Trevisan. Constructions of near-optimal extractors using pseudo-random generators. Technical Report TR-98-055, Electronic Colloquium on Computational Complexity, 1998.Google ScholarGoogle Scholar
  35. Vad98.S. Vadhan. Extracting all the randomness from a weakly random source. Technical Report TR-98-047, Electronic Colloquium on Computational Complexity, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Val77.L. Valiant. Graph4heoretic arguments in low-level complexity. In Proceedings of the 6th Symposium on Mathematical Foundations of Computer Science, volume 53 of Lecture Notes in Computer Science, pages 162-176. Spfinger-Verlag, 1977.Google ScholarGoogle ScholarCross RefCross Ref
  37. VV86.L. Valiant and V. Vazirani. NP is as easy as detecting unique solutions. TheoreffcaI Computer Science, 47:85-93, 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Yao82.A. Yao. Theory and applications of trapdoor functions. In Proceedings of the 23rd IEEE Symposium on Foundations of Computer Science, pages 80-91. IEEE, 1982.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Graph nonisomorphism has subexponential size proofs unless the polynomial-time hierarchy collapses

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        STOC '99: Proceedings of the thirty-first annual ACM symposium on Theory of Computing
        May 1999
        790 pages
        ISBN:1581130678
        DOI:10.1145/301250

        Copyright © 1999 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 May 1999

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate1,469of4,586submissions,32%

        Upcoming Conference

        STOC '24
        56th Annual ACM Symposium on Theory of Computing (STOC 2024)
        June 24 - 28, 2024
        Vancouver , BC , Canada

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader