fbpx
Wikipedia

PPP (complexity)

In computational complexity theory, the complexity class PPP (polynomial pigeonhole principle) is a subclass of TFNP. It is the class of search problems that can be shown to be total by an application of the pigeonhole principle. Christos Papadimitriou introduced it in the same paper that introduced PPAD and PPA.[1] PPP contains both PPAD and PWPP (polynomial weak pigeonhole principle) as subclasses. These complexity classes are of particular interest in cryptography because they are strongly related to cryptographic primitives such as one-way permutations and collision-resistant hash functions.

Definition

PPP is the set of all function computation problems that admit a polynomial-time reduction to the PIGEON problem, defined as follows:

Given a Boolean circuit   having the same number   of input bits as output bits, find either an input   that is mapped to the output  , or two distinct inputs   that are mapped to the same output  .

A problem is PPP-complete if PIGEON is also polynomial-time reducible to it. Note that the pigeonhole principle guarantees that PIGEON is total. We can also define WEAK-PIGEON, for which the weak pigeonhole principle guarantees totality. PWPP is the corresponding class of problems that are polynomial-time reducible to it.[2] WEAK-PIGEON is the following problem:

Given a Boolean circuit   having   input bits and   output bits, find   such that  .

Here, the range of the circuit is strictly smaller than its domain, so the circuit is guaranteed to be non-injective. WEAK-PIGEON reduces to PIGEON by appending a single 1 bit to the circuit's output, so PWPP   PPP.

Connection to cryptography

We can view the circuit in PIGEON as a polynomial-time computable hash function. Hence, PPP is the complexity class which captures the hardness of either inverting or finding a collision in hash functions. More generally, the relationship of subclasses of FNP to polynomial-time complexity classes can be used to determine the existence of certain cryptographic primitives, and vice versa.

For example, it is known that if FNP = FP, then one-way functions do not exist. Similarly, if PPP = FP, then one-way permutations do not exist.[3] Hence, PPP (which is a subclass of FNP) more closely captures the question of the existence of one-way permutations. We can prove this by reducing the problem of inverting a permutation   on an output   to PIGEON. Construct a circuit   that computes  . Since   is a permutation, a solution to PIGEON must output   such that  , which implies  .

Relationship to PPAD

PPP contains PPAD as a subclass (strict containment is an open problem). This is because End-of-the-Line, which defines PPAD, admits a straightforward polynomial-time reduction to PIGEON. In End-of-the-Line, the input is a start vertex   in a directed graph   where each vertex has at most one successor and at most one predecessor, represented by a polynomial-time computable successor function  . Define a circuit   whose input is a vertex   and whose output is its successor if there is one, or   if it does not. If we represent the source vertex   as the bitstring  , this circuit is a direct reduction of End-of-the-Line to Pigeon, since any collision in   provides a sink in  .

Notable problems

Equal sums problem

The equal sums problem is the following problem. Given   positive integers that sum to less than  , find two distinct subsets of the integers that have the same total. This problem is contained in PPP, but it is not known if it is PPP-complete.

Constrained-SIS problem

The constrained-SIS (short integer solution) problem, which is a generalization of the SIS problem from lattice-based cryptography, has been shown to be complete for PPP.[4] Prior to that work, the only problems known to be complete for PPP were variants of PIGEON.

Integer factorization

There exist polynomial-time randomized reductions from the integer factorization problem to WEAK-PIGEON.[5] Additionally, under the generalized Riemann hypothesis, there also exist deterministic polynomial reductions. However, it is still an open problem to unconditionally show that integer factorization is in PPP.

References

  1. ^ Christos Papadimitriou (1994). (PDF). Journal of Computer and System Sciences. 48 (3): 498–532. doi:10.1016/S0022-0000(05)80063-7. Archived from the original (PDF) on 2016-03-04. Retrieved 2009-12-11.
  2. ^ Emil Jeřábek (2016). "Integer factoring and modular square roots". Journal of Computer and System Sciences. 82 (2): 380–394. arXiv:1207.5220. doi:10.1016/j.jcss.2015.08.001.
  3. ^ Christos Papadimitriou (1994). (PDF). Journal of Computer and System Sciences. 48 (3): 498–532. doi:10.1016/S0022-0000(05)80063-7. Archived from the original (PDF) on 2016-03-04. Retrieved 2009-12-11.
  4. ^ K. Sotiraki, M. Zampitakis, and G. Zirdelis (2018). "PPP-Completeness with Connections to Cryptography". Proc. of 59th Symposium on Foundations of Computer Science. pp. 148–158. arXiv:1808.06407. doi:10.1109/FOCS.2018.00023.{{cite conference}}: CS1 maint: multiple names: authors list (link)
  5. ^ Emil Jeřábek (2016). "Integer factoring and modular square roots". Journal of Computer and System Sciences. 82 (2): 380–394. arXiv:1207.5220. doi:10.1016/j.jcss.2015.08.001.

complexity, computational, complexity, theory, complexity, class, polynomial, pigeonhole, principle, subclass, tfnp, class, search, problems, that, shown, total, application, pigeonhole, principle, christos, papadimitriou, introduced, same, paper, that, introd. In computational complexity theory the complexity class PPP polynomial pigeonhole principle is a subclass of TFNP It is the class of search problems that can be shown to be total by an application of the pigeonhole principle Christos Papadimitriou introduced it in the same paper that introduced PPAD and PPA 1 PPP contains both PPAD and PWPP polynomial weak pigeonhole principle as subclasses These complexity classes are of particular interest in cryptography because they are strongly related to cryptographic primitives such as one way permutations and collision resistant hash functions Contents 1 Definition 2 Connection to cryptography 3 Relationship to PPAD 4 Notable problems 4 1 Equal sums problem 4 2 Constrained SIS problem 4 3 Integer factorization 5 ReferencesDefinition EditPPP is the set of all function computation problems that admit a polynomial time reduction to the PIGEON problem defined as follows Given a Boolean circuit C displaystyle C having the same number n displaystyle n of input bits as output bits find either an input x displaystyle x that is mapped to the output C x 0 n displaystyle C x 0 n or two distinct inputs x y displaystyle x neq y that are mapped to the same output C x C y displaystyle C x C y A problem is PPP complete if PIGEON is also polynomial time reducible to it Note that the pigeonhole principle guarantees that PIGEON is total We can also define WEAK PIGEON for which the weak pigeonhole principle guarantees totality PWPP is the corresponding class of problems that are polynomial time reducible to it 2 WEAK PIGEON is the following problem Given a Boolean circuit C displaystyle C having n displaystyle n input bits and n 1 displaystyle n 1 output bits find x y displaystyle x neq y such that C x C y displaystyle C x C y Here the range of the circuit is strictly smaller than its domain so the circuit is guaranteed to be non injective WEAK PIGEON reduces to PIGEON by appending a single 1 bit to the circuit s output so PWPP displaystyle subseteq PPP Connection to cryptography EditWe can view the circuit in PIGEON as a polynomial time computable hash function Hence PPP is the complexity class which captures the hardness of either inverting or finding a collision in hash functions More generally the relationship of subclasses of FNP to polynomial time complexity classes can be used to determine the existence of certain cryptographic primitives and vice versa For example it is known that if FNP FP then one way functions do not exist Similarly if PPP FP then one way permutations do not exist 3 Hence PPP which is a subclass of FNP more closely captures the question of the existence of one way permutations We can prove this by reducing the problem of inverting a permutation p displaystyle pi on an output y displaystyle y to PIGEON Construct a circuit C displaystyle C that computes C x p x y displaystyle C x pi x oplus y Since p displaystyle pi is a permutation a solution to PIGEON must output x displaystyle x such that C x 0 p x y displaystyle C x 0 pi x oplus y which implies p x y displaystyle pi x y Relationship to PPAD EditPPP contains PPAD as a subclass strict containment is an open problem This is because End of the Line which defines PPAD admits a straightforward polynomial time reduction to PIGEON In End of the Line the input is a start vertex s displaystyle s in a directed graph G displaystyle G where each vertex has at most one successor and at most one predecessor represented by a polynomial time computable successor function f displaystyle f Define a circuit C displaystyle C whose input is a vertex x displaystyle x and whose output is its successor if there is one or x displaystyle x if it does not If we represent the source vertex s displaystyle s as the bitstring 0 n displaystyle 0 n this circuit is a direct reduction of End of the Line to Pigeon since any collision in C displaystyle C provides a sink in G displaystyle G Notable problems EditEqual sums problem Edit The equal sums problem is the following problem Given n displaystyle n positive integers that sum to less than 2 n 1 displaystyle 2 n 1 find two distinct subsets of the integers that have the same total This problem is contained in PPP but it is not known if it is PPP complete Constrained SIS problem Edit The constrained SIS short integer solution problem which is a generalization of the SIS problem from lattice based cryptography has been shown to be complete for PPP 4 Prior to that work the only problems known to be complete for PPP were variants of PIGEON Integer factorization Edit There exist polynomial time randomized reductions from the integer factorization problem to WEAK PIGEON 5 Additionally under the generalized Riemann hypothesis there also exist deterministic polynomial reductions However it is still an open problem to unconditionally show that integer factorization is in PPP References Edit Christos Papadimitriou 1994 On the complexity of the parity argument and other inefficient proofs of existence PDF Journal of Computer and System Sciences 48 3 498 532 doi 10 1016 S0022 0000 05 80063 7 Archived from the original PDF on 2016 03 04 Retrieved 2009 12 11 Emil Jerabek 2016 Integer factoring and modular square roots Journal of Computer and System Sciences 82 2 380 394 arXiv 1207 5220 doi 10 1016 j jcss 2015 08 001 Christos Papadimitriou 1994 On the complexity of the parity argument and other inefficient proofs of existence PDF Journal of Computer and System Sciences 48 3 498 532 doi 10 1016 S0022 0000 05 80063 7 Archived from the original PDF on 2016 03 04 Retrieved 2009 12 11 K Sotiraki M Zampitakis and G Zirdelis 2018 PPP Completeness with Connections to Cryptography Proc of 59th Symposium on Foundations of Computer Science pp 148 158 arXiv 1808 06407 doi 10 1109 FOCS 2018 00023 a href Template Cite conference html title Template Cite conference cite conference a CS1 maint multiple names authors list link Emil Jerabek 2016 Integer factoring and modular square roots Journal of Computer and System Sciences 82 2 380 394 arXiv 1207 5220 doi 10 1016 j jcss 2015 08 001 Retrieved from https en wikipedia org w index php title PPP complexity amp oldid 1000082653, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.