skip to main content
10.1145/3055399.3055466acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
research-article
Public Access

Average-case fine-grained hardness

Published:19 June 2017Publication History

ABSTRACT

We present functions that can be computed in some fixed polynomial time but are hard on average for any algorithm that runs in slightly smaller time, assuming widely-conjectured worst-case hardness for problems from the study of fine-grained complexity. Unconditional constructions of such functions are known from before (Goldmann et al., IPL '94), but these have been canonical functions that have not found further use, while our functions are closely related to well-studied problems and have considerable algebraic structure.

Based on the average-case hardness and structural properties of our functions, we outline the construction of a Proof of Work scheme and discuss possible approaches to constructing fine-grained One-Way Functions. We also show how our reductions make conjectures regarding the worst-case hardness of the problems we reduce from (and consequently the Strong Exponential Time Hypothesis) heuristically falsifiable in a sense similar to that of (Naor, CRYPTO '03).

We prove our hardness results in each case by showing fine-grained reductions from solving one of three problems - namely, Orthogonal Vectors (OV), 3SUM, and All-Pairs Shortest Paths (APSP) - in the worst case to computing our function correctly on a uniformly random input. The conjectured hardness of OV and 3SUM then gives us functions that require n2-o(1) time to compute on average, and that of APSP gives us a function that requires n3-o(1) time. Using the same techniques we also obtain a conditional average-case time hierarchy of functions.

Skip Supplemental Material Section

Supplemental Material

d2_sa_3.mp4

mp4

143.6 MB

References

  1. Amir Abboud. 2017. Personal communication. (2017).Google ScholarGoogle Scholar
  2. Amir Abboud, Arturs Backurs, and Virginia Vassilevska Williams. 2015. If the current clique algorithms are optimal, so is Valiant’s parser. In Foundations of Computer Science (FOCS), 2015 IEEE 56th Annual Symposium on. IEEE, 98–117. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Amir Abboud, Arturs Backurs, and Virginia Vassilevska Williams. 2015.Google ScholarGoogle Scholar
  4. Quadratic-Time Hardness of LCS and other Sequence Similarity Measures. CoRR abs/1501.07053 (2015). http://arxiv.org/abs/1501.07053Google ScholarGoogle Scholar
  5. Amir Abboud, Thomas Dueholm Hansen, Virginia Vassilevska Williams, and Ryan Williams. 2015.Google ScholarGoogle Scholar
  6. Simulating branching programs with edit distance and friends or: A polylog shaved is a lower bound made. arXiv preprint arXiv:1511.06022 (2015).Google ScholarGoogle Scholar
  7. Amir Abboud and Kevin Lewi. 2013. Exact weight subgraphs and the k-sum conjecture. In International Colloquium on Automata, Languages, and Programming. Springer Berlin Heidelberg, 1–12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Amir Abboud, Virginia Vassilevska Williams, and Oren Weimann. 2014. Consequences of faster alignment of sequences. In International Colloquium on Automata, Languages, and Programming. Springer, 39–51. STOC’17, June 2017, Montreal, Canada Ball et al.Google ScholarGoogle Scholar
  9. Amir Abboud, Virginia Vassilevska Williams, and Huacheng Yu. 2015. Matching Triangles and Basing Hardness on an Extremely Popular Conjecture. Manuscript: https://dl.dropboxusercontent.com/u/14999836/publications/MatchTria. pdf. (2015).Google ScholarGoogle Scholar
  10. László Babai. 1985.Google ScholarGoogle Scholar
  11. Trading Group Theory for Randomness. In Proceedings of the 17th Annual ACM Symposium on Theory of Computing, May 6-8, 1985, Providence, Rhode Island, USA, Robert Sedgewick (Ed.). ACM, 421–429. DOI: https:// Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Arturs Backurs, Nishanth Dikkala, and Christos Tzamos. 2016. Tight Hardness Results for Maximum Weight Rectangles. arXiv preprint arXiv:1602.05837 (2016).Google ScholarGoogle Scholar
  13. Arturs Backurs and Piotr Indyk. 2014. Edit Distance Cannot Be Computed in Strongly Subquadratic Time (unless SETH is false). CoRR abs/1412.0348 (2014). http://arxiv.org/abs/1412.0348 Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Arturs Backurs and Christos Tzamos. 2016. Improving Viterbi is Hard: Better Runtimes Imply Faster Clique Algorithms. arXiv preprint arXiv:1607.04229 (2016).Google ScholarGoogle Scholar
  15. Marshall Ball, Alon Rosen, Manuel Sabin, and Prashant Nalini Vasudevan. 2017.Google ScholarGoogle Scholar
  16. Proofs of Useful Work. In submission. (2017).Google ScholarGoogle Scholar
  17. Armin Biere, Marijn Heule, and Hans van Maaren. 2009.Google ScholarGoogle Scholar
  18. Handbook of satisfiability. Vol. 185. ios press. http://gauss.ececs.uc.edu/Courses/c626/notes/history.pdfGoogle ScholarGoogle Scholar
  19. Andreas Björklund and Petteri Kaski. 2016. How proofs are prepared at Camelot. In Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing. ACM, 391–400. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Andrej Bogdanov and Luca Trevisan. 2006.Google ScholarGoogle Scholar
  21. Average-Case Complexity. Foundations and Trends in Theoretical Computer Science 2, 1 (2006). DOI:https: //Google ScholarGoogle Scholar
  22. Karl Bringmann, Allan Grønlund, and Kasper Green Larsen. 2016. A Dichotomy for Regular Expression Membership Testing. arXiv preprint arXiv:1611.00918 (2016).Google ScholarGoogle Scholar
  23. Karl Bringmann and Marvin Künnemann. 2015.Google ScholarGoogle Scholar
  24. Quadratic conditional lower bounds for string problems and dynamic time warping. In Foundations of Computer Science (FOCS), 2015 IEEE 56th Annual Symposium on. IEEE, 79–97. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Jin-yi Cai, Aduri Pavan, and D. Sivakumar. 1999. On the Hardness of Permanent. In STACS 99, 16th Annual Symposium on Theoretical Aspects of Computer Science, Trier, Germany, March 4-6, 1999, Proceedings (Lecture Notes in Computer Science), Christoph Meinel and Sophie Tison (Eds.), Vol. 1563. Springer, 90–99. DOI: https:// Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Chris Calabro, Russell Impagliazzo, Valentine Kabanets, and Ramamohan Paturi. 2003. The Complexity of Unique k-SAT: An Isolation Lemma for k-CNFs. In 18th Annual IEEE Conference on Computational Complexity (Complexity 2003), 7-10 July 2003, Aarhus, Denmark. 135. DOI:https://Google ScholarGoogle ScholarCross RefCross Ref
  27. Marco L. Carmosino, Jiawei Gao, Russell Impagliazzo, Ivan Mihajlin, Ramamohan Paturi, and Stefan Schneider. 2016.Google ScholarGoogle Scholar
  28. Nondeterministic Extensions of the Strong Exponential Time Hypothesis and Consequences for Non-reducibility. In Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, Cambridge, MA, USA, January 14-16, 2016. 261–270. DOI:https: // Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Timothy M Chan and Ryan Williams. 2016.Google ScholarGoogle Scholar
  30. Deterministic apsp, orthogonal vectors, and more: Quickly derandomizing razborov-smolensky. In Proceedings of the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms. Society for Industrial and Applied Mathematics, 1246–1255. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. M. Cygan, F.V. Fomin, L. Kowalik, D. Lokshtanov, D. Marx, M. Pilipczuk, M. Pilipczuk, and S. Saurabh. 2015.Google ScholarGoogle Scholar
  32. Parameterized Algorithms. Springer International Publishing. 469–470 pages. https://books.google.co.il/books?id=Frg0CgAAQBAJGoogle ScholarGoogle Scholar
  33. Akshay Degwekar, Vinod Vaikuntanathan, and Prashant Nalini Vasudevan. 2016. Fine-Grained Cryptography. In Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III. 533–562. DOI:https:// Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Holger Dell, Thore Husfeldt, and Martin Wahlén. 2010. Exponential time complexity of the permanent and the Tutte polynomial. In International Colloquium on Automata, Languages, and Programming. Springer, 426–437. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Cynthia Dwork and Moni Naor. 1992. Pricing via Processing or Combatting Junk Mail. In Advances in Cryptology - CRYPTO ’92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings. 139–147. DOI:https:// Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. J Feigenbaum and L Fortnow. 1990. On the Random-Self-Reducibility of Complete Sets. University of Chicago Technical Report (1990), 90–22. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Charles M. Fiduccia. 1972. Polynomial Evaluation via the Division Algorithm: The Fast Fourier Transform Revisited. In Proceedings of the 4th Annual ACM Symposium on Theory of Computing, May 1-3, 1972, Denver, Colorado, USA, Patrick C. Fischer, H. Paul Zeiger, Jeffrey D. Ullman, and Arnold L. Rosenberg (Eds.). ACM, 88–93. DOI:https:// Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Anka Gajentaan and Mark H Overmars. 1995. On a class of O (n 2 ) problems in computational geometry. Computational geometry 5, 3 (1995), 165–185. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Jiawei Gao and Russell Impagliazzo. 2016. Orthogonal Vectors is hard for firstorder properties on sparse graphs. Electronic Colloquium on Computational Complexity (ECCC) 23 (2016), 53. http://eccc.hpi-web.de/report/2016/053Google ScholarGoogle Scholar
  40. Peter Gemmell and Madhu Sudan. 1992. Highly resilient correctors for polynomials. Information processing letters 43, 4 (1992), 169–174. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Mikael Goldmann, Per Grape, and Johan Håstad. 1994.Google ScholarGoogle Scholar
  42. On Average Time Hierarchies. Inf. Process. Lett. 49, 1 (1994), 15–20. DOI:https:// Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Oded Goldreich, Shafi Goldwasser, and Silvio Micali. 1984. How to Construct Random Functions (Extended Abstract). In 25th Annual Symposium on Foundations of Computer Science, West Palm Beach, Florida, USA, 24-26 October 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. 464–479. DOI:https://Google ScholarGoogle Scholar
  45. Oded Goldreich and Guy Rothblum. February 2017. Simple Doubly-Efficient Interactive Proof Systems for Locally-Characterizable Sets. Electronic Colloquium on Computational Complexity Report TR17-018. (February 2017).Google ScholarGoogle Scholar
  46. Shafi Goldwasser and Dhiraj Holden. 2016.Google ScholarGoogle Scholar
  47. On the Fine Grained Complexity of Polynomial Time Problems Given Correlated Instances. In Innovations in Theoretical Computer Science (ITCS).Google ScholarGoogle Scholar
  48. Shafi Goldwasser and Michael Sipser. 1986. Private coins versus public coins in interactive proof systems. In Proceedings of the eighteenth annual ACM symposium on Theory of computing. ACM, 59–68. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Johan Håstad. 1987. One-way permutations in N C 0. Inform. Process. Lett. 26, 3 (1987), 153–155. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Johan Håstad, Russell Impagliazzo, Leonid A. Levin, and Michael Luby. 1999. A Pseudorandom Generator from any One-way Function. SIAM J. Comput. 28, 4 (1999), 1364–1396. DOI:https:// Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Ellis Horowitz. 1972.Google ScholarGoogle Scholar
  52. A fast method for interpolation using preconditioning. Inform. Process. Lett. 1, 4 (1972), 157–163.Google ScholarGoogle Scholar
  53. R. Impagliazzo. 1995. A Personal View of Average-case Complexity. In Proceedings of the 10th Annual Structure in Complexity Theory Conference (SCT’95) (SCT ’95). IEEE Computer Society, Washington, DC, USA, 134–. http://dl.acm.org/citation. cfm?id=829497.829786 Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Russell Impagliazzo and Michael Luby. 1989. One-way Functions are Essential for Complexity Based Cryptography (Extended Abstract). In 30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October - 1 November 1989. 230–235. DOI:https:// Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. 63483Google ScholarGoogle Scholar
  56. Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, and Amit Sahai. 2008. Cryptography with constant computational overhead. In Proceedings of the fortieth annual ACM symposium on Theory of computing. ACM, 433–442. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Jeffrey C Lagarias and Andrew M. Odlyzko. 1987. Computing π (x): An analytic method. Journal of Algorithms 8, 2 (1987), 173–191. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Leonid A. Levin. 1986. Average Case Complete Problems. SIAM J. Comput. 15, 1 (1986), 285–286. DOI:https:// Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Richard Lipton. 1991.Google ScholarGoogle Scholar
  60. New directions in testing. Distributed Computing and Cryptography 2 (1991), 191–202.Google ScholarGoogle Scholar
  61. Ueli M Maurer. 1992. Conditionally-perfect secrecy and a provably-secure randomized cipher. Journal of Cryptology 5, 1 (1992), 53–66. Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Ralph C. Merkle. 1978. Secure Communications Over Insecure Channels. Commun. ACM 21, 4 (1978), 294–299. DOI:https:// Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008).Google ScholarGoogle Scholar
  64. Moni Naor. 2003.Google ScholarGoogle Scholar
  65. On cryptographic assumptions and challenges. In Annual International Cryptology Conference. Springer, 96–109.Google ScholarGoogle Scholar
  66. Jaroslav Nešetřil and Svatopluk Poljak. 1985. On the complexity of the subgraph problem. Commentationes Mathematicae Universitatis Carolinae 26, 2 (1985), 415–419.Google ScholarGoogle Scholar
  67. Mihai P ˇ atraşcu. 2010. Towards Polynomial Lower Bounds for Dynamic Problems. In Proceedings of the Forty-second ACM Symposium on Theory of Computing (STOC ’10). ACM, New York, NY, USA, 603–610. DOI:https:// Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. Liam Roditty and Uri Zwick. 2004.Google ScholarGoogle Scholar
  69. On dynamic shortest paths problems. In European Symposium on Algorithms. Springer, 580–591.Google ScholarGoogle Scholar
  70. Virginia Vassilevska and Ryan Williams. 2009. Finding, minimizing, and counting weighted subgraphs. In In Proceedings of the Fourty-First Annual ACM Symposium on the Theory of Computing. 455–464. Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. Ryan Williams. 2005.Google ScholarGoogle Scholar
  72. A new algorithm for optimal 2-constraint satisfaction and its implications. Theor. Comput. Sci. 348, 2-3 (2005), 357–365. DOI:https: // Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. Ryan Williams. 2016. Strong ETH Breaks With Merlin and Arthur: Short Non-Interactive Proofs of Batch Evaluation. In 31st Conference on Computational Complexity, CCC 2016, May 29 to June 1, 2016, Tokyo, Japan. 2:1–2:17. DOI: https:// Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Virginia Vassilevska Williams. 2015. Hardness of easy problems: Basing hardness on popular conjectures such as the strong exponential time hypothesis. In Proc. International Symposium on Parameterized and Exact Computation. 16–28. http: //theory.stanford.edu/~virgi/ipecsurvey.pdfGoogle ScholarGoogle Scholar

Index Terms

  1. Average-case fine-grained hardness

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            STOC 2017: Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing
            June 2017
            1268 pages
            ISBN:9781450345286
            DOI:10.1145/3055399

            Copyright © 2017 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 19 June 2017

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate1,469of4,586submissions,32%

            Upcoming Conference

            STOC '24
            56th Annual ACM Symposium on Theory of Computing (STOC 2024)
            June 24 - 28, 2024
            Vancouver , BC , Canada

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader