UWSpace is currently experiencing technical difficulties resulting from its recent migration to a new version of its software. These technical issues are not affecting the submission and browse features of the site. UWaterloo community members may continue submitting items to UWSpace. We apologize for the inconvenience, and are actively working to resolve these technical issues.
 

Variants of Pseudo-deterministic Algorithms and Duality in TFNP

Loading...
Thumbnail Image

Date

2023-08-18

Authors

Ebtehaj, Mohammad Hossein

Journal Title

Journal ISSN

Volume Title

Publisher

University of Waterloo

Abstract

We introduce a new notion of ``faux-deterministic'' algorithms for search problems in query complexity. Roughly, for a search problem $\cS$, a faux-deterministic algorithm is a probability distribution $\mathcal{A}$ over deterministic algorithms $A\in \mathcal{A}$ such that no computationally bounded adversary making black-box queries to a sampled algorithm $A\sim \mathcal{A}$ can find an input $x$ on which $A$ fails to solve $\cS$ ($(x, A(x))\notin \cS$). Faux-deterministic algorithms are a relaxation of \emph{pseudo-deterministic} algorithms, which are randomized algorithms with the guarantee that for any given input $x$, the algorithm outputs a unique output $y_x$ with high probability. Pseudo-deterministic algorithms are statistically indistinguishable from deterministic algorithms, while faux-deterministic algorithms relax this statistical indistinguishability to computational indistinguishability. We prove that in the query model, every verifiable search problem that has a randomized algorithm also has a faux-deterministic algorithm. By considering the pseudo-deterministic lower bound of Goldwasser et al. \cite{goldwasser_et_al:LIPIcs.CCC.2021.36}, we immediately prove an exponential gap between pseudo-deterministic and faux-deterministic complexities in query complexity. We additionally show that our faux-deterministic algorithm is also secure against quantum adversaries that can make black-box queries in superposition. We highlight two reasons to study faux-deterministic algorithms. First, for practical purposes, one can use a faux-deterministic algorithm instead of pseudo-deterministic algorithms in most cases where the latter is required. Second, since efficient faux-deterministic algorithms exist even when pseudo-deterministic ones do not, their existence demonstrates a barrier to proving pseudo-deterministic lower bounds: Lower bounds on pseudo-determinism must distinguish pseudo-determinism from faux-determinism. Finally, changing our perspective to the adversaries' viewpoint, we introduce a notion of ``dual problem'' $\cS^{*}$ for search problems $\cS$. In the dual problem $\cS^*$, the input is an algorithm $A$ purporting to solve $\cS$, and our goal is to find an adverse input $x$ on which $A$ fails to solve $\cS$. We discuss several properties in the query and Turing machine model that show the new problem $\cS^*$ is analogous to a dual for $\cS$.

Description

Keywords

pseudo-deterministic algorithms, complexity theory, query complexity, meta-complexity, quantum query complexity

LC Keywords

Citation