SlideShare a Scribd company logo
Isolation Lemma for Directed Reachability and NL vs. L
Nutan Limaye (IIT Bombay)
Joint work with Vaibhav Krishan
Indian National Mathematics Initiative
Workshop on Complexity Theory
Nov 04 - Nov 06, 2016
Isolation lemma for NP
SAT
Given a Boolean formula φ determine whether φ has a satisfying
assignment.
Isolation lemma for NP
SAT
Given a Boolean formula φ determine whether φ has a satisfying
assignment.
Isolation Procedure for SAT
Isolation lemma for NP
SAT
Given a Boolean formula φ determine whether φ has a satisfying
assignment.
Isolation Procedure for SAT
Given: a Boolean forumla φ on n input variables,
Isolation lemma for NP
SAT
Given a Boolean formula φ determine whether φ has a satisfying
assignment.
Isolation Procedure for SAT
Given: a Boolean forumla φ on n input variables,
Output: a new formula ψ on the same n variables such that
Isolation lemma for NP
SAT
Given a Boolean formula φ determine whether φ has a satisfying
assignment.
Isolation Procedure for SAT
Given: a Boolean forumla φ on n input variables,
Output: a new formula ψ on the same n variables such that
every satisfying assignment of ψ also satisfies φ
Isolation lemma for NP
SAT
Given a Boolean formula φ determine whether φ has a satisfying
assignment.
Isolation Procedure for SAT
Given: a Boolean forumla φ on n input variables,
Output: a new formula ψ on the same n variables such that
every satisfying assignment of ψ also satisfies φ
This implies that if φ is not satisfiable then ψ is also not satisfiable.
Isolation lemma for NP
SAT
Given a Boolean formula φ determine whether φ has a satisfying
assignment.
Isolation Procedure for SAT
Given: a Boolean forumla φ on n input variables,
Output: a new formula ψ on the same n variables such that
every satisfying assignment of ψ also satisfies φ
This implies that if φ is not satisfiable then ψ is also not satisfiable.
if φ is satisfiable, then ψ has exactly one satisfying assignment.
Isolation lemma for NP
SAT
Given a Boolean formula φ determine whether φ has a satisfying
assignment.
Isolation Procedure for SAT
Given: a Boolean forumla φ on n input variables,
Output: a new formula ψ on the same n variables such that
every satisfying assignment of ψ also satisfies φ
This implies that if φ is not satisfiable then ψ is also not satisfiable.
if φ is satisfiable, then ψ has exactly one satisfying assignment.
Valiant Vazirani Isolation Lemma
Isolation lemma for NP
SAT
Given a Boolean formula φ determine whether φ has a satisfying
assignment.
Isolation Procedure for SAT
Given: a Boolean forumla φ on n input variables,
Output: a new formula ψ on the same n variables such that
every satisfying assignment of ψ also satisfies φ
This implies that if φ is not satisfiable then ψ is also not satisfiable.
if φ is satisfiable, then ψ has exactly one satisfying assignment.
Valiant Vazirani Isolation Lemma
There is a randomized polynomial time isolation procedure for SAT
with success probability Ω(1
n )
Bumping up the success probability
Determinizing Isolation Procedure for SAT
Can one get rid of the randomness in the Isolation Procedure for
SAT?
Bumping up the success probability
Determinizing Isolation Procedure for SAT
Can one get rid of the randomness in the Isolation Procedure for
SAT? Open!
Success probability of the Isolation Procedure for SAT
Bumping up the success probability
Determinizing Isolation Procedure for SAT
Can one get rid of the randomness in the Isolation Procedure for
SAT? Open!
Success probability of the Isolation Procedure for SAT
Can one make the success probability of the Isolation Procedure
higher?
Bumping up the success probability
Determinizing Isolation Procedure for SAT
Can one get rid of the randomness in the Isolation Procedure for
SAT? Open!
Success probability of the Isolation Procedure for SAT
Can one make the success probability of the Isolation Procedure
higher?
The success probability of the Isolation Procedure for SAT can be
made greater than 2/3 if and only if NP ⊆ P/poly.
Bumping up the success probability
Determinizing Isolation Procedure for SAT
Can one get rid of the randomness in the Isolation Procedure for
SAT? Open!
Success probability of the Isolation Procedure for SAT
Can one make the success probability of the Isolation Procedure
higher?
The success probability of the Isolation Procedure for SAT can be
made greater than 2/3 if and only if NP ⊆ P/poly.
[DKvMW] Is Valiant Vazinai’s isolation probability improvable? Dell, Kabanets, van
Melkebeek, Watanabe, Computational Complexity, 2013.
NL, L, Directed Reachability, L/poly
Complexity classes NL, L, L/poly
NL, L, Directed Reachability, L/poly
Complexity classes NL, L, L/poly
L: the class of decision problems decidable by dereministic Turing
machines using O(log n) space, where n is the length of the input.
NL, L, Directed Reachability, L/poly
Complexity classes NL, L, L/poly
L: the class of decision problems decidable by dereministic Turing
machines using O(log n) space, where n is the length of the input.
NL: the class of decision problems decidable by non-dereministic
Turing machine using O(log n) space, where n is the length of the
input.
NL, L, Directed Reachability, L/poly
Complexity classes NL, L, L/poly
L: the class of decision problems decidable by dereministic Turing
machines using O(log n) space, where n is the length of the input.
NL: the class of decision problems decidable by non-dereministic
Turing machine using O(log n) space, where n is the length of the
input.
L/poly: the class of decision problems decidable by dereministic
Turing machine using O(log n) space and poly(n) amount of advice,
where n is the length of the input.
NL, L, Directed Reachability, L/poly
Complexity classes NL, L, L/poly
L: the class of decision problems decidable by dereministic Turing
machines using O(log n) space, where n is the length of the input.
NL: the class of decision problems decidable by non-dereministic
Turing machine using O(log n) space, where n is the length of the
input.
L/poly: the class of decision problems decidable by dereministic
Turing machine using O(log n) space and poly(n) amount of advice,
where n is the length of the input.
Directed Reachability, Reach
Given: A directed graph G = (V , E) and two designated vertices s, t
NL, L, Directed Reachability, L/poly
Complexity classes NL, L, L/poly
L: the class of decision problems decidable by dereministic Turing
machines using O(log n) space, where n is the length of the input.
NL: the class of decision problems decidable by non-dereministic
Turing machine using O(log n) space, where n is the length of the
input.
L/poly: the class of decision problems decidable by dereministic
Turing machine using O(log n) space and poly(n) amount of advice,
where n is the length of the input.
Directed Reachability, Reach
Given: A directed graph G = (V , E) and two designated vertices s, t
Output: yes if and only if there is a directed path from s to t in G.
Our result
Isolation Procedure for Directed Reachability
Our result
Isolation Procedure for Directed Reachability
Given: a graph G on n input vertices, and two designated vertices s, t
Our result
Isolation Procedure for Directed Reachability
Given: a graph G on n input vertices, and two designated vertices s, t
Output: a new graph H on the same n variables such that
Our result
Isolation Procedure for Directed Reachability
Given: a graph G on n input vertices, and two designated vertices s, t
Output: a new graph H on the same n variables such that
every s to t path in H is also a path in G
Our result
Isolation Procedure for Directed Reachability
Given: a graph G on n input vertices, and two designated vertices s, t
Output: a new graph H on the same n variables such that
every s to t path in H is also a path in G
This implies that in G if t is not reachable from s then in H as well
there is no s to t path.
Our result
Isolation Procedure for Directed Reachability
Given: a graph G on n input vertices, and two designated vertices s, t
Output: a new graph H on the same n variables such that
every s to t path in H is also a path in G
This implies that in G if t is not reachable from s then in H as well
there is no s to t path.
if G has an s to t path, then H has exactly one s to t path.
Our result
Isolation Procedure for Directed Reachability
Given: a graph G on n input vertices, and two designated vertices s, t
Output: a new graph H on the same n variables such that
every s to t path in H is also a path in G
This implies that in G if t is not reachable from s then in H as well
there is no s to t path.
if G has an s to t path, then H has exactly one s to t path.
Success probability of the Isolation Procedure for Reach
Theorem (Main result)
There exists a randomized isolation procedure for Reach with success
probability greater than 2/3 if and only if NL ⊆ L/poly.
Isolation for other classes
Isolation for LogCFL
Isolation for other classes
Isolation for LogCFL
There exists a randomized isolation procedure for a hard problem in
LogCFL that runs in L/poly with success probability greater than 2/3
if and only if LogCFL ⊆ L/poly.
Isolation for other classes
Isolation for LogCFL
There exists a randomized isolation procedure for a hard problem in
LogCFL that runs in L/poly with success probability greater than 2/3
if and only if LogCFL ⊆ L/poly.
Isolation for NP
There exists a randomized isolation procedure for SAT that runs in
L/poly with success probability greater than 2/3 if and only if NP ⊆
L/poly.
Proof outline
The proofs follows a similar structure as in [DKvMW]
Proof outline
The proofs follows a similar structure as in [DKvMW]
We will start with some definitions.
Proof outline
The proofs follows a similar structure as in [DKvMW]
We will start with some definitions.
Definition (Promise sets for a version of Reach)
Proof outline
The proofs follows a similar structure as in [DKvMW]
We will start with some definitions.
Definition (Promise sets for a version of Reach)
YesReach = {(G, s, t) | unique reachable path between s and t},
Proof outline
The proofs follows a similar structure as in [DKvMW]
We will start with some definitions.
Definition (Promise sets for a version of Reach)
YesReach = {(G, s, t) | unique reachable path between s and t}, and
NoReach = {(G, s, t) | no path between s and t}
Proof outline
The proofs follows a similar structure as in [DKvMW]
We will start with some definitions.
Definition (Promise sets for a version of Reach)
YesReach = {(G, s, t) | unique reachable path between s and t}, and
NoReach = {(G, s, t) | no path between s and t}
Definition (PrUReach)
Proof outline
The proofs follows a similar structure as in [DKvMW]
We will start with some definitions.
Definition (Promise sets for a version of Reach)
YesReach = {(G, s, t) | unique reachable path between s and t}, and
NoReach = {(G, s, t) | no path between s and t}
Definition (PrUReach)
Given: G ∈ YesReach ∪ NoReach
Proof outline
The proofs follows a similar structure as in [DKvMW]
We will start with some definitions.
Definition (Promise sets for a version of Reach)
YesReach = {(G, s, t) | unique reachable path between s and t}, and
NoReach = {(G, s, t) | no path between s and t}
Definition (PrUReach)
Given: G ∈ YesReach ∪ NoReach
Output: yes if and only if G ∈ YesReach.
Proof outline
Recall the statement we wish to prove
Proof outline
Recall the statement we wish to prove
Theorem (Main result)
There exists a randomized isolation procedure for Reach with success
probability greater than 2/3 if and only if NL ⊆ L/poly.
Proof outline
Recall the statement we wish to prove
Theorem (Main result)
There exists a randomized isolation procedure for Reach with success
probability greater than 2/3 if and only if NL ⊆ L/poly.
Step 1 Prove that NL ⊆ L/poly if and only if PrUReach ∈ L/poly.
Proof outline
Recall the statement we wish to prove
Theorem (Main result)
There exists a randomized isolation procedure for Reach with success
probability greater than 2/3 if and only if NL ⊆ L/poly.
Step 1 Prove that NL ⊆ L/poly if and only if PrUReach ∈ L/poly.
Step 2 Prove the following statement:
Proof outline
Recall the statement we wish to prove
Theorem (Main result)
There exists a randomized isolation procedure for Reach with success
probability greater than 2/3 if and only if NL ⊆ L/poly.
Step 1 Prove that NL ⊆ L/poly if and only if PrUReach ∈ L/poly.
Step 2 Prove the following statement:
There exists a randomized isolation procedure for Reach with success
probability greater than 2/3 if and only if PrUReach ∈ L/poly.
Proof outline
Recall the statement we wish to prove
Theorem (Main result)
There exists a randomized isolation procedure for Reach with success
probability greater than 2/3 if and only if NL ⊆ L/poly.
Step 1 Prove that NL ⊆ L/poly if and only if PrUReach ∈ L/poly.
Step 2 Prove the following statement:
There exists a randomized isolation procedure for Reach with success
probability greater than 2/3 if and only if PrUReach ∈ L/poly.
Details of Step 1
NL ⊆ L/poly ⇔ PrUReach ∈ L/poly
Details of Step 1
NL ⊆ L/poly ⇔ PrUReach ∈ L/poly
⇒ This direction is trivial.
Details of Step 1
NL ⊆ L/poly ⇔ PrUReach ∈ L/poly
⇒ This direction is trivial.
⇐ Uses an algorithm developed in the following work.
Details of Step 1
NL ⊆ L/poly ⇔ PrUReach ∈ L/poly
⇒ This direction is trivial.
⇐ Uses an algorithm developed in the following work.
[RA] Making Nondeterminism Unambiguous, Reinhardt, Allender, SIAM Journal of
Computing, 2000.
Details of Step 1
NL ⊆ L/poly ⇔ PrUReach ∈ L/poly
⇒ This direction is trivial.
⇐ Uses an algorithm developed in the following work.
[RA] Making Nondeterminism Unambiguous, Reinhardt, Allender, SIAM Journal of
Computing, 2000.
We need one more definition.
Details of Step 1
NL ⊆ L/poly ⇔ PrUReach ∈ L/poly
⇒ This direction is trivial.
⇐ Uses an algorithm developed in the following work.
[RA] Making Nondeterminism Unambiguous, Reinhardt, Allender, SIAM Journal of
Computing, 2000.
We need one more definition.
Definition (Min-unique graph [GW, RA] )
Details of Step 1
NL ⊆ L/poly ⇔ PrUReach ∈ L/poly
⇒ This direction is trivial.
⇐ Uses an algorithm developed in the following work.
[RA] Making Nondeterminism Unambiguous, Reinhardt, Allender, SIAM Journal of
Computing, 2000.
We need one more definition.
Definition (Min-unique graph [GW, RA] )
A weighted directed graph G = (V , E) with weight function w : E → N is said to
be min-unique if between every pair of vertices the minimum weight path is
unique.
Breaking down Step 1
Step 1.1: Generating min-unique graph using advice
Breaking down Step 1
Step 1.1: Generating min-unique graph using advice
Given a graph G on n vertices a procedure P1 generates graphs
G1, G2, . . . , Gn2
For all 1 ≤ i ≤ n2
, Gi is on the same set of vertices as G.
Breaking down Step 1
Step 1.1: Generating min-unique graph using advice
Given a graph G on n vertices a procedure P1 generates graphs
G1, G2, . . . , Gn2
For all 1 ≤ i ≤ n2
, Gi is on the same set of vertices as G.
G has an s to t path iff ∀i ∈ [n2
], Gi has an s to t path.
Breaking down Step 1
Step 1.1: Generating min-unique graph using advice
Given a graph G on n vertices a procedure P1 generates graphs
G1, G2, . . . , Gn2
For all 1 ≤ i ≤ n2
, Gi is on the same set of vertices as G.
G has an s to t path iff ∀i ∈ [n2
], Gi has an s to t path.
If G has an s to t path then ∃i ∈ [n2
] : such that Gi is min-unique.
Breaking down Step 1
Step 1.1: Generating min-unique graph using advice
Given a graph G on n vertices a procedure P1 generates graphs
G1, G2, . . . , Gn2
For all 1 ≤ i ≤ n2
, Gi is on the same set of vertices as G.
G has an s to t path iff ∀i ∈ [n2
], Gi has an s to t path.
If G has an s to t path then ∃i ∈ [n2
] : such that Gi is min-unique.
P1 has an L/poly algorithm.
Breaking down Step 1
Step 1.1: Generating min-unique graph using advice
Given a graph G on n vertices a procedure P1 generates graphs
G1, G2, . . . , Gn2
For all 1 ≤ i ≤ n2
, Gi is on the same set of vertices as G.
G has an s to t path iff ∀i ∈ [n2
], Gi has an s to t path.
If G has an s to t path then ∃i ∈ [n2
] : such that Gi is min-unique.
P1 has an L/poly algorithm.
P1
advice string
G1, G2, . . . , Gn2
G
Breaking down Step 1
Step 1.2: Generating G ∈ YesReach ∪ NoReach given a min-unique G
Breaking down Step 1
Step 1.2: Generating G ∈ YesReach ∪ NoReach given a min-unique G
Given a min-unique graph G on n vertices a procedure P2 generates a
graph CG
Breaking down Step 1
Step 1.2: Generating G ∈ YesReach ∪ NoReach given a min-unique G
Given a min-unique graph G on n vertices a procedure P2 generates a
graph CG
On input (G, s, t), (CG , s , t ) is produced.
Breaking down Step 1
Step 1.2: Generating G ∈ YesReach ∪ NoReach given a min-unique G
Given a min-unique graph G on n vertices a procedure P2 generates a
graph CG
On input (G, s, t), (CG , s , t ) is produced.
G has an s to t path if and only if CG has an s to t path.
Breaking down Step 1
Step 1.2: Generating G ∈ YesReach ∪ NoReach given a min-unique G
Given a min-unique graph G on n vertices a procedure P2 generates a
graph CG
On input (G, s, t), (CG , s , t ) is produced.
G has an s to t path if and only if CG has an s to t path.
If G is min-unique and has an s to t path then there is a unique path
from s to t .
Breaking down Step 1
Step 1.2: Generating G ∈ YesReach ∪ NoReach given a min-unique G
Given a min-unique graph G on n vertices a procedure P2 generates a
graph CG
On input (G, s, t), (CG , s , t ) is produced.
G has an s to t path if and only if CG has an s to t path.
If G is min-unique and has an s to t path then there is a unique path
from s to t .
P2 has an L/poly algorithm.
Breaking down Step 1
Step 1.2: Generating G ∈ YesReach ∪ NoReach given a min-unique G
Given a min-unique graph G on n vertices a procedure P2 generates a
graph CG
On input (G, s, t), (CG , s , t ) is produced.
G has an s to t path if and only if CG has an s to t path.
If G is min-unique and has an s to t path then there is a unique path
from s to t .
P2 has an L/poly algorithm.
P2
advice string
(CG , s , t )
(G, s, t)
Breaking down Step 1
Step 1.3: Using P1, P2 to solve Reach.
Breaking down Step 1
Step 1.3: Using P1, P2 to solve Reach.
P be the algorithm that solves PrUReach in L/poly.
Breaking down Step 1
Step 1.3: Using P1, P2 to solve Reach.
P be the algorithm that solves PrUReach in L/poly.
G P1
G1
G2
P2 CG1
P2 CG2
...
...
...
Gn2 P2 CGn2
P
Yes iff P ac-
cepts one of
the graphs
Breaking down Step 1
Step 1.3: Using P1, P2 to solve Reach.
P be the algorithm that solves PrUReach in L/poly.
G P1
G1
G2
P2 CG1
P2 CG2
...
...
...
Gn2 P2 CGn2
P
Yes iff P ac-
cepts one of
the graphs
If G does not have an s to t path, we reject.
Breaking down Step 1
Step 1.3: Using P1, P2 to solve Reach.
P be the algorithm that solves PrUReach in L/poly.
G P1
G1
G2
P2 CG1
P2 CG2
...
...
...
Gn2 P2 CGn2
P
Yes iff P ac-
cepts one of
the graphs
If G does not have an s to t path, we reject.
If G has an s to t path,
Breaking down Step 1
Step 1.3: Using P1, P2 to solve Reach.
P be the algorithm that solves PrUReach in L/poly.
G P1
G1
G2
P2 CG1
P2 CG2
...
...
...
Gn2 P2 CGn2
P
Yes iff P ac-
cepts one of
the graphs
If G does not have an s to t path, we reject.
If G has an s to t path,
at least one of the Gi is min-unique.
Breaking down Step 1
Step 1.3: Using P1, P2 to solve Reach.
P be the algorithm that solves PrUReach in L/poly.
G P1
G1
G2
P2 CG1
P2 CG2
...
...
...
Gn2 P2 CGn2
P
Yes iff P ac-
cepts one of
the graphs
If G does not have an s to t path, we reject.
If G has an s to t path,
at least one of the Gi is min-unique.
The corresponding CGi
∈ YesReach.
Details about Step 1.2
Step 1.2: Generating G ∈ YesReach ∪ NoReach given a min-unique G
Details about Step 1.2
Step 1.2: Generating G ∈ YesReach ∪ NoReach given a min-unique G
Given a min-unique graph G on n vertices
On input (G, s, t), (CG , s , t ) is produced.
G has an s to t path if and only if CG has an s to t path.
Details about Step 1.2
Step 1.2: Generating G ∈ YesReach ∪ NoReach given a min-unique G
Given a min-unique graph G on n vertices
On input (G, s, t), (CG , s , t ) is produced.
G has an s to t path if and only if CG has an s to t path.
If G is min-unique then there is a unique path from s to t .
Details about Step 1.2
Step 1.2: Generating G ∈ YesReach ∪ NoReach given a min-unique G
Given a min-unique graph G on n vertices
On input (G, s, t), (CG , s , t ) is produced.
G has an s to t path if and only if CG has an s to t path.
If G is min-unique then there is a unique path from s to t .
[RA] If G is min-unqiue then there is a UL algorithm that decides the
reachability in G.
Details about Step 1.2
Step 1.2: Generating G ∈ YesReach ∪ NoReach given a min-unique G
Given a min-unique graph G on n vertices
On input (G, s, t), (CG , s , t ) is produced.
G has an s to t path if and only if CG has an s to t path.
If G is min-unique then there is a unique path from s to t .
[RA] If G is min-unqiue then there is a UL algorithm that decides the
reachability in G.
CG is the configuration graph of the UL algorithm on input G.
Details about Step 1.2
Step 1.2: Generating G ∈ YesReach ∪ NoReach given a min-unique G
Given a min-unique graph G on n vertices
On input (G, s, t), (CG , s , t ) is produced.
G has an s to t path if and only if CG has an s to t path.
If G is min-unique then there is a unique path from s to t .
[RA] If G is min-unqiue then there is a UL algorithm that decides the
reachability in G.
CG is the configuration graph of the UL algorithm on input G.
CG can be computed in L.
Proof outline
Recall the statement we wish to prove
Proof outline
Recall the statement we wish to prove
Theorem (Main result)
There exists a randomized isolation procedure for Reach with success
probability greater than 2/3 if and only if NL ⊆ L/poly.
Proof outline
Recall the statement we wish to prove
Theorem (Main result)
There exists a randomized isolation procedure for Reach with success
probability greater than 2/3 if and only if NL ⊆ L/poly.
Step 1 Prove that NL ⊆ L/poly if and only if PrUReach ∈ L/poly.
Proof outline
Recall the statement we wish to prove
Theorem (Main result)
There exists a randomized isolation procedure for Reach with success
probability greater than 2/3 if and only if NL ⊆ L/poly.
Step 1 Prove that NL ⊆ L/poly if and only if PrUReach ∈ L/poly.
Step 2 Prove the following statement:
Proof outline
Recall the statement we wish to prove
Theorem (Main result)
There exists a randomized isolation procedure for Reach with success
probability greater than 2/3 if and only if NL ⊆ L/poly.
Step 1 Prove that NL ⊆ L/poly if and only if PrUReach ∈ L/poly.
Step 2 Prove the following statement:
There exists a randomized isolation procedure for Reach with success
probability greater than 2/3 if and only if PrUReach ∈ L/poly.
Proof outline
Recall the statement we wish to prove
Theorem (Main result)
There exists a randomized isolation procedure for Reach with success
probability greater than 2/3 if and only if NL ⊆ L/poly.
Step 1 Prove that NL ⊆ L/poly if and only if PrUReach ∈ L/poly.
Step 2 Prove the following statement:
There exists a randomized isolation procedure for Reach with success
probability greater than 2/3 if and only if PrUReach ∈ L/poly.
Details about Step 2
From the hypothesis we can show that there is an L/poly procedure,
say B s.t.
Details about Step 2
From the hypothesis we can show that there is an L/poly procedure,
say B s.t.
Given a graph G as input, it outputs G1, G2, . . . , Gt such that
> 2/3 fraction of the Gi s have unique s to t paths.
Details about Step 2
From the hypothesis we can show that there is an L/poly procedure,
say B s.t.
Given a graph G as input, it outputs G1, G2, . . . , Gt such that
> 2/3 fraction of the Gi s have unique s to t paths.
B
advice string
G1, G2, . . . , Gt
G
Details about Step 2
From the hypothesis we can show that there is an L/poly procedure,
say B s.t.
Given a graph G as input, it outputs G1, G2, . . . , Gt such that
> 2/3 fraction of the Gi s have unique s to t paths.
B
advice string
G1, G2, . . . , Gt
G
H be a graph with π as its s to t path.
Details about Step 2
From the hypothesis we can show that there is an L/poly procedure,
say B s.t.
Given a graph G as input, it outputs G1, G2, . . . , Gt such that
> 2/3 fraction of the Gi s have unique s to t paths.
B
advice string
G1, G2, . . . , Gt
G
H be a graph with π as its s to t path.
For two graph G, H we say that (G, H) is good if π is a reachable
path in < 2/3 fraction of graphs in B(G + H).
Details about Step 2
From the hypothesis we can show that there is an L/poly procedure,
say B s.t.
Given a graph G as input, it outputs G1, G2, . . . , Gt such that
> 2/3 fraction of the Gi s have unique s to t paths.
B
advice string
G1, G2, . . . , Gt
G
H be a graph with π as its s to t path.
For two graph G, H we say that (G, H) is good if π is a reachable
path in < 2/3 fraction of graphs in B(G + H).
Let B(G + H) = G1, G2, . . . , Gt .
Details about Step 2
Properties of a good pair (G, H)
Details about Step 2
Properties of a good pair (G, H)
If (G, H) is good then G ∈ YesReach.
Details about Step 2
Properties of a good pair (G, H)
If (G, H) is good then G ∈ YesReach.
If (G, H) good then there is a ρ such that ρ = π
Details about Step 2
Properties of a good pair (G, H)
If (G, H) is good then G ∈ YesReach.
If (G, H) good then there is a ρ such that ρ = π and ρ is a unique
reachable path in some Gi
Details about Step 2
Properties of a good pair (G, H)
If (G, H) is good then G ∈ YesReach.
If (G, H) good then there is a ρ such that ρ = π and ρ is a unique
reachable path in some Gi , that ρ is a reachable path in G.
Details about Step 2
Properties of a good pair (G, H)
If (G, H) is good then G ∈ YesReach.
If (G, H) good then there is a ρ such that ρ = π and ρ is a unique
reachable path in some Gi , that ρ is a reachable path in G. Therefore
G ∈ YesReach.
Details about Step 2
Properties of a good pair (G, H)
If (G, H) is good then G ∈ YesReach.
If (G, H) good then there is a ρ such that ρ = π and ρ is a unique
reachable path in some Gi , that ρ is a reachable path in G. Therefore
G ∈ YesReach.
If G, H are both in YesReach then either (G, H) or (H, G) is good.
Let π, ρ be unique s to t paths in H, G, respectively.
Details about Step 2
Properties of a good pair (G, H)
If (G, H) is good then G ∈ YesReach.
If (G, H) good then there is a ρ such that ρ = π and ρ is a unique
reachable path in some Gi , that ρ is a reachable path in G. Therefore
G ∈ YesReach.
If G, H are both in YesReach then either (G, H) or (H, G) is good.
Let π, ρ be unique s to t paths in H, G, respectively. (π = ρ).
Details about Step 2
Properties of a good pair (G, H)
If (G, H) is good then G ∈ YesReach.
If (G, H) good then there is a ρ such that ρ = π and ρ is a unique
reachable path in some Gi , that ρ is a reachable path in G. Therefore
G ∈ YesReach.
If G, H are both in YesReach then either (G, H) or (H, G) is good.
Let π, ρ be unique s to t paths in H, G, respectively. (π = ρ).
If neither good, then each π and ρ are reachable paths in 2/3 of the
Gi s.
Details about Step 2
Properties of a good pair (G, H)
If (G, H) is good then G ∈ YesReach.
If (G, H) good then there is a ρ such that ρ = π and ρ is a unique
reachable path in some Gi , that ρ is a reachable path in G. Therefore
G ∈ YesReach.
If G, H are both in YesReach then either (G, H) or (H, G) is good.
Let π, ρ be unique s to t paths in H, G, respectively. (π = ρ).
If neither good, then each π and ρ are reachable paths in 2/3 of the
Gi s.
This means > 1/3 of Gi s have two distinct s to t paths.
Details about Step 2
Properties of a good pair (G, H)
If (G, H) is good then G ∈ YesReach.
If (G, H) good then there is a ρ such that ρ = π and ρ is a unique
reachable path in some Gi , that ρ is a reachable path in G. Therefore
G ∈ YesReach.
If G, H are both in YesReach then either (G, H) or (H, G) is good.
Let π, ρ be unique s to t paths in H, G, respectively. (π = ρ).
If neither good, then each π and ρ are reachable paths in 2/3 of the
Gi s.
This means > 1/3 of Gi s have two distinct s to t paths.
This contradicts the hypothesis of B.
Details about Step 2
Properties of a good pair (G, H)
If (G, H) is good then G ∈ YesReach.
If (G, H) good then there is a ρ such that ρ = π and ρ is a unique
reachable path in some Gi , that ρ is a reachable path in G. Therefore
G ∈ YesReach.
If G, H are both in YesReach then either (G, H) or (H, G) is good.
Let π, ρ be unique s to t paths in H, G, respectively. (π = ρ).
If neither good, then each π and ρ are reachable paths in 2/3 of the
Gi s.
This means > 1/3 of Gi s have two distinct s to t paths.
This contradicts the hypothesis of B.
Given H, π as advice and G as input, whether (G, H) is good or not
can be decided in L/poly.
Wrap-up
Design the advice strings
As advice we need (H1, π1), (H2, π2), . . . , (H , π ).
Wrap-up
Design the advice strings
As advice we need (H1, π1), (H2, π2), . . . , (H , π ).
The advice ensures that
Wrap-up
Design the advice strings
As advice we need (H1, π1), (H2, π2), . . . , (H , π ).
The advice ensures thatif G ∈ YesReach then there is an Hi such that
Hi ∈ YesReach and πi is corresponding path.
Wrap-up
Design the advice strings
As advice we need (H1, π1), (H2, π2), . . . , (H , π ).
The advice ensures thatif G ∈ YesReach then there is an Hi such that
Hi ∈ YesReach and πi is corresponding path.
If G ∈ NoReach, then each Hi ∈ NoReach.
Wrap-up
Design the advice strings
As advice we need (H1, π1), (H2, π2), . . . , (H , π ).
The advice ensures thatif G ∈ YesReach then there is an Hi such that
Hi ∈ YesReach and πi is corresponding path.
If G ∈ NoReach, then each Hi ∈ NoReach.
Putting it together
Overall, this gives a L/poly algorithm for PrUReach.
Thank You!

More Related Content

What's hot

Theory of Computation Lecture Notes
Theory of Computation Lecture NotesTheory of Computation Lecture Notes
Theory of Computation Lecture Notes
FellowBuddy.com
 
Formal Languages and Automata Theory unit 5
Formal Languages and Automata Theory unit 5Formal Languages and Automata Theory unit 5
Formal Languages and Automata Theory unit 5
Srimatre K
 
1.3.2 non deterministic finite automaton
1.3.2 non deterministic finite automaton1.3.2 non deterministic finite automaton
1.3.2 non deterministic finite automaton
Sampath Kumar S
 
Nondeterministic Finite Automata
Nondeterministic Finite AutomataNondeterministic Finite Automata
Nondeterministic Finite Automata
Adel Al-Ofairi
 
AI Lesson 17
AI Lesson 17AI Lesson 17
AI Lesson 17
Assistant Professor
 
Finite automata
Finite automataFinite automata
Finite automata
Dr. Abhineet Anand
 
Theory of computation and automata
Theory of computation and automataTheory of computation and automata
Theory of computation and automata
Prof. Dr. K. Adisesha
 
Introduction to fa and dfa
Introduction to fa  and dfaIntroduction to fa  and dfa
Introduction to fa and dfa
deepinderbedi
 
AI Lesson 16
AI Lesson 16AI Lesson 16
AI Lesson 16
Assistant Professor
 
13 propositional calculus
13 propositional calculus13 propositional calculus
13 propositional calculus
Tianlu Wang
 
Generazione Automatica di Test - S. Vuotto (Università di Sassari)
Generazione Automatica di Test - S. Vuotto (Università di Sassari)Generazione Automatica di Test - S. Vuotto (Università di Sassari)
Generazione Automatica di Test - S. Vuotto (Università di Sassari)
Sardegna Ricerche
 
Formal methods 1 - introduction
Formal methods   1 - introductionFormal methods   1 - introduction
Formal methods 1 - introduction
Vlad Patryshev
 
Automata
AutomataAutomata
Automata
Gaditek
 
Ch2 finite automaton
Ch2 finite automatonCh2 finite automaton
Ch2 finite automaton
meresie tesfay
 
Automata theory
Automata theoryAutomata theory
Automata theory
Pardeep Vats
 
Unit ii
Unit iiUnit ii
Unit ii
TPLatchoumi
 
AUTOMATA THEORY - SHORT NOTES
AUTOMATA THEORY - SHORT NOTESAUTOMATA THEORY - SHORT NOTES
AUTOMATA THEORY - SHORT NOTES
suthi
 
Unit v
Unit vUnit v
Unit v
TPLatchoumi
 
2. context free langauages
2. context free langauages2. context free langauages
2. context free langauages
danhumble
 

What's hot (19)

Theory of Computation Lecture Notes
Theory of Computation Lecture NotesTheory of Computation Lecture Notes
Theory of Computation Lecture Notes
 
Formal Languages and Automata Theory unit 5
Formal Languages and Automata Theory unit 5Formal Languages and Automata Theory unit 5
Formal Languages and Automata Theory unit 5
 
1.3.2 non deterministic finite automaton
1.3.2 non deterministic finite automaton1.3.2 non deterministic finite automaton
1.3.2 non deterministic finite automaton
 
Nondeterministic Finite Automata
Nondeterministic Finite AutomataNondeterministic Finite Automata
Nondeterministic Finite Automata
 
AI Lesson 17
AI Lesson 17AI Lesson 17
AI Lesson 17
 
Finite automata
Finite automataFinite automata
Finite automata
 
Theory of computation and automata
Theory of computation and automataTheory of computation and automata
Theory of computation and automata
 
Introduction to fa and dfa
Introduction to fa  and dfaIntroduction to fa  and dfa
Introduction to fa and dfa
 
AI Lesson 16
AI Lesson 16AI Lesson 16
AI Lesson 16
 
13 propositional calculus
13 propositional calculus13 propositional calculus
13 propositional calculus
 
Generazione Automatica di Test - S. Vuotto (Università di Sassari)
Generazione Automatica di Test - S. Vuotto (Università di Sassari)Generazione Automatica di Test - S. Vuotto (Università di Sassari)
Generazione Automatica di Test - S. Vuotto (Università di Sassari)
 
Formal methods 1 - introduction
Formal methods   1 - introductionFormal methods   1 - introduction
Formal methods 1 - introduction
 
Automata
AutomataAutomata
Automata
 
Ch2 finite automaton
Ch2 finite automatonCh2 finite automaton
Ch2 finite automaton
 
Automata theory
Automata theoryAutomata theory
Automata theory
 
Unit ii
Unit iiUnit ii
Unit ii
 
AUTOMATA THEORY - SHORT NOTES
AUTOMATA THEORY - SHORT NOTESAUTOMATA THEORY - SHORT NOTES
AUTOMATA THEORY - SHORT NOTES
 
Unit v
Unit vUnit v
Unit v
 
2. context free langauages
2. context free langauages2. context free langauages
2. context free langauages
 

Viewers also liked

CNUNE Summit George Proakis
CNUNE Summit George ProakisCNUNE Summit George Proakis
सुख-दुख
सुख-दुखसुख-दुख
सुख-दुख
vijeendracu
 
F
FF
Yourprezi
YourpreziYourprezi
Yourprezi
Anu M Vijayan
 
euler characteristic theorem
euler characteristic theoremeuler characteristic theorem
euler characteristic theorem
Jeneva Clark
 
Multiplayer Online Games over Scale-Free Networks: a Viable Solution?
Multiplayer Online Games over Scale-Free Networks: a Viable Solution?Multiplayer Online Games over Scale-Free Networks: a Viable Solution?
Multiplayer Online Games over Scale-Free Networks: a Viable Solution?
Gabriele D'Angelo
 
June19_PMINJ LCI_v0.2
June19_PMINJ LCI_v0.2June19_PMINJ LCI_v0.2
June19_PMINJ LCI_v0.2
Nitin Khanna, Scrum Coach
 
Impacthiringhowdatawilltransformyouthemployment 151222142209
Impacthiringhowdatawilltransformyouthemployment 151222142209Impacthiringhowdatawilltransformyouthemployment 151222142209
Impacthiringhowdatawilltransformyouthemployment 151222142209
John Stinnett
 
Basic lisp
Basic lispBasic lisp
Basic lisp
Arvind sahu
 
Advance LISP (Artificial Intelligence)
Advance LISP (Artificial Intelligence) Advance LISP (Artificial Intelligence)
Advance LISP (Artificial Intelligence)
wahab khan
 
testing
testingtesting
testing
Ram Ji D R
 
Dynamic Parameterized Problems - Algorithms and Complexity
Dynamic Parameterized Problems - Algorithms and ComplexityDynamic Parameterized Problems - Algorithms and Complexity
Dynamic Parameterized Problems - Algorithms and Complexity
cseiitgn
 
Killing Agile Software Development : Presented by Rizky Syaiful
Killing Agile Software Development : Presented by Rizky Syaiful Killing Agile Software Development : Presented by Rizky Syaiful
Killing Agile Software Development : Presented by Rizky Syaiful
oGuild .
 
descon cretificate
descon  cretificatedescon  cretificate
descon cretificate
muhammad nazeer taj tanoli
 
fluig Fórum Serviços #2 - Integração do fluig com o Protheus
fluig Fórum Serviços #2 - Integração do fluig com o Protheusfluig Fórum Serviços #2 - Integração do fluig com o Protheus
fluig Fórum Serviços #2 - Integração do fluig com o Protheus
Fluig
 
fluig Webinar #9 - Como produzir mais e melhor com os mesmos recursos?
fluig Webinar #9 - Como produzir mais e melhor com os mesmos recursos?fluig Webinar #9 - Como produzir mais e melhor com os mesmos recursos?
fluig Webinar #9 - Como produzir mais e melhor com os mesmos recursos?
Fluig
 
Housing and planning slides
Housing and planning slidesHousing and planning slides
Housing and planning slides
West of England: building our future
 
Rail Directions Workshop: Transport NSW
Rail Directions Workshop: Transport NSWRail Directions Workshop: Transport NSW
Rail Directions Workshop: Transport NSW
SMART Infrastructure Facility
 

Viewers also liked (19)

CNUNE Summit George Proakis
CNUNE Summit George ProakisCNUNE Summit George Proakis
CNUNE Summit George Proakis
 
सुख-दुख
सुख-दुखसुख-दुख
सुख-दुख
 
F
FF
F
 
Yourprezi
YourpreziYourprezi
Yourprezi
 
euler characteristic theorem
euler characteristic theoremeuler characteristic theorem
euler characteristic theorem
 
Multiplayer Online Games over Scale-Free Networks: a Viable Solution?
Multiplayer Online Games over Scale-Free Networks: a Viable Solution?Multiplayer Online Games over Scale-Free Networks: a Viable Solution?
Multiplayer Online Games over Scale-Free Networks: a Viable Solution?
 
June19_PMINJ LCI_v0.2
June19_PMINJ LCI_v0.2June19_PMINJ LCI_v0.2
June19_PMINJ LCI_v0.2
 
Matriculation Certificate
Matriculation CertificateMatriculation Certificate
Matriculation Certificate
 
Impacthiringhowdatawilltransformyouthemployment 151222142209
Impacthiringhowdatawilltransformyouthemployment 151222142209Impacthiringhowdatawilltransformyouthemployment 151222142209
Impacthiringhowdatawilltransformyouthemployment 151222142209
 
Basic lisp
Basic lispBasic lisp
Basic lisp
 
Advance LISP (Artificial Intelligence)
Advance LISP (Artificial Intelligence) Advance LISP (Artificial Intelligence)
Advance LISP (Artificial Intelligence)
 
testing
testingtesting
testing
 
Dynamic Parameterized Problems - Algorithms and Complexity
Dynamic Parameterized Problems - Algorithms and ComplexityDynamic Parameterized Problems - Algorithms and Complexity
Dynamic Parameterized Problems - Algorithms and Complexity
 
Killing Agile Software Development : Presented by Rizky Syaiful
Killing Agile Software Development : Presented by Rizky Syaiful Killing Agile Software Development : Presented by Rizky Syaiful
Killing Agile Software Development : Presented by Rizky Syaiful
 
descon cretificate
descon  cretificatedescon  cretificate
descon cretificate
 
fluig Fórum Serviços #2 - Integração do fluig com o Protheus
fluig Fórum Serviços #2 - Integração do fluig com o Protheusfluig Fórum Serviços #2 - Integração do fluig com o Protheus
fluig Fórum Serviços #2 - Integração do fluig com o Protheus
 
fluig Webinar #9 - Como produzir mais e melhor com os mesmos recursos?
fluig Webinar #9 - Como produzir mais e melhor com os mesmos recursos?fluig Webinar #9 - Como produzir mais e melhor com os mesmos recursos?
fluig Webinar #9 - Como produzir mais e melhor com os mesmos recursos?
 
Housing and planning slides
Housing and planning slidesHousing and planning slides
Housing and planning slides
 
Rail Directions Workshop: Transport NSW
Rail Directions Workshop: Transport NSWRail Directions Workshop: Transport NSW
Rail Directions Workshop: Transport NSW
 

Similar to Isolation Lemma for Directed Reachability and NL vs. L

Np completeness h4
Np completeness  h4Np completeness  h4
Np completeness h4
Rajendran
 
P, NP and NP-Complete, Theory of NP-Completeness V2
P, NP and NP-Complete, Theory of NP-Completeness V2P, NP and NP-Complete, Theory of NP-Completeness V2
P, NP and NP-Complete, Theory of NP-Completeness V2
S.Shayan Daneshvar
 
Thr russian doll search
Thr russian doll searchThr russian doll search
General methodin Data Structure for UG.pptx
General methodin Data Structure for UG.pptxGeneral methodin Data Structure for UG.pptx
General methodin Data Structure for UG.pptx
LakshmiSamivel
 
class23.ppt
class23.pptclass23.ppt
class23.ppt
AjayPratap828815
 
NP completeness
NP completenessNP completeness
NP completeness
Amrinder Arora
 
UNIT-V.pdf daa unit material 5 th unit ppt
UNIT-V.pdf daa unit material 5 th unit pptUNIT-V.pdf daa unit material 5 th unit ppt
UNIT-V.pdf daa unit material 5 th unit ppt
JyoReddy9
 
Chap05
Chap05Chap05
Reductions
ReductionsReductions
Reductions
Muhammad Alhalaby
 
lect5-1.ppt
lect5-1.pptlect5-1.ppt
Variational Bayes: A Gentle Introduction
Variational Bayes: A Gentle IntroductionVariational Bayes: A Gentle Introduction
Variational Bayes: A Gentle Introduction
Flavio Morelli
 
Graph Methods for Generating Test Cases with Universal and Existential Constr...
Graph Methods for Generating Test Cases with Universal and Existential Constr...Graph Methods for Generating Test Cases with Universal and Existential Constr...
Graph Methods for Generating Test Cases with Universal and Existential Constr...
Sylvain Hallé
 
Value Function Geometry and Gradient TD
Value Function Geometry and Gradient TDValue Function Geometry and Gradient TD
Value Function Geometry and Gradient TD
Ashwin Rao
 
Secure Domination in graphs
Secure Domination in graphsSecure Domination in graphs
Secure Domination in graphs
Mahesh Gadhwal
 
Winter 10 Undecidability.pptx
Winter 10 Undecidability.pptxWinter 10 Undecidability.pptx
Winter 10 Undecidability.pptx
HarisPrince
 
Sat
SatSat
PNP.pptx
PNP.pptxPNP.pptx
PNP.pptx
RishuRaj953240
 
PNP.pptx
PNP.pptxPNP.pptx
teteuueieoeofhfhfjffkkkfkfflflflhshssnnvmvvmvv,v,v,nnxmxxm
teteuueieoeofhfhfjffkkkfkfflflflhshssnnvmvvmvv,v,v,nnxmxxmteteuueieoeofhfhfjffkkkfkfflflflhshssnnvmvvmvv,v,v,nnxmxxm
teteuueieoeofhfhfjffkkkfkfflflflhshssnnvmvvmvv,v,v,nnxmxxm
zoobiarana76
 
Complexity theory
Complexity theory Complexity theory
Complexity theory
Dr Shashikant Athawale
 

Similar to Isolation Lemma for Directed Reachability and NL vs. L (20)

Np completeness h4
Np completeness  h4Np completeness  h4
Np completeness h4
 
P, NP and NP-Complete, Theory of NP-Completeness V2
P, NP and NP-Complete, Theory of NP-Completeness V2P, NP and NP-Complete, Theory of NP-Completeness V2
P, NP and NP-Complete, Theory of NP-Completeness V2
 
Thr russian doll search
Thr russian doll searchThr russian doll search
Thr russian doll search
 
General methodin Data Structure for UG.pptx
General methodin Data Structure for UG.pptxGeneral methodin Data Structure for UG.pptx
General methodin Data Structure for UG.pptx
 
class23.ppt
class23.pptclass23.ppt
class23.ppt
 
NP completeness
NP completenessNP completeness
NP completeness
 
UNIT-V.pdf daa unit material 5 th unit ppt
UNIT-V.pdf daa unit material 5 th unit pptUNIT-V.pdf daa unit material 5 th unit ppt
UNIT-V.pdf daa unit material 5 th unit ppt
 
Chap05
Chap05Chap05
Chap05
 
Reductions
ReductionsReductions
Reductions
 
lect5-1.ppt
lect5-1.pptlect5-1.ppt
lect5-1.ppt
 
Variational Bayes: A Gentle Introduction
Variational Bayes: A Gentle IntroductionVariational Bayes: A Gentle Introduction
Variational Bayes: A Gentle Introduction
 
Graph Methods for Generating Test Cases with Universal and Existential Constr...
Graph Methods for Generating Test Cases with Universal and Existential Constr...Graph Methods for Generating Test Cases with Universal and Existential Constr...
Graph Methods for Generating Test Cases with Universal and Existential Constr...
 
Value Function Geometry and Gradient TD
Value Function Geometry and Gradient TDValue Function Geometry and Gradient TD
Value Function Geometry and Gradient TD
 
Secure Domination in graphs
Secure Domination in graphsSecure Domination in graphs
Secure Domination in graphs
 
Winter 10 Undecidability.pptx
Winter 10 Undecidability.pptxWinter 10 Undecidability.pptx
Winter 10 Undecidability.pptx
 
Sat
SatSat
Sat
 
PNP.pptx
PNP.pptxPNP.pptx
PNP.pptx
 
PNP.pptx
PNP.pptxPNP.pptx
PNP.pptx
 
teteuueieoeofhfhfjffkkkfkfflflflhshssnnvmvvmvv,v,v,nnxmxxm
teteuueieoeofhfhfjffkkkfkfflflflhshssnnvmvvmvv,v,v,nnxmxxmteteuueieoeofhfhfjffkkkfkfflflflhshssnnvmvvmvv,v,v,nnxmxxm
teteuueieoeofhfhfjffkkkfkfflflflhshssnnvmvvmvv,v,v,nnxmxxm
 
Complexity theory
Complexity theory Complexity theory
Complexity theory
 

More from cseiitgn

A Quest for Subexponential Time Parameterized Algorithms for Planar-k-Path: F...
A Quest for Subexponential Time Parameterized Algorithms for Planar-k-Path: F...A Quest for Subexponential Time Parameterized Algorithms for Planar-k-Path: F...
A Quest for Subexponential Time Parameterized Algorithms for Planar-k-Path: F...
cseiitgn
 
Alternate Parameterizations
Alternate ParameterizationsAlternate Parameterizations
Alternate Parameterizations
cseiitgn
 
Space-efficient Approximation Scheme for Maximum Matching in Sparse Graphs
Space-efficient Approximation Scheme for Maximum Matching in Sparse GraphsSpace-efficient Approximation Scheme for Maximum Matching in Sparse Graphs
Space-efficient Approximation Scheme for Maximum Matching in Sparse Graphs
cseiitgn
 
Hardness of multiple choice problems
Hardness of multiple choice problemsHardness of multiple choice problems
Hardness of multiple choice problems
cseiitgn
 
The Chasm at Depth Four, and Tensor Rank : Old results, new insights
The Chasm at Depth Four, and Tensor Rank : Old results, new insightsThe Chasm at Depth Four, and Tensor Rank : Old results, new insights
The Chasm at Depth Four, and Tensor Rank : Old results, new insights
cseiitgn
 
Unbounded Error Communication Complexity of XOR Functions
Unbounded Error Communication Complexity of XOR FunctionsUnbounded Error Communication Complexity of XOR Functions
Unbounded Error Communication Complexity of XOR Functions
cseiitgn
 
Color Coding-Related Techniques
Color Coding-Related TechniquesColor Coding-Related Techniques
Color Coding-Related Techniques
cseiitgn
 
Solving connectivity problems via basic Linear Algebra
Solving connectivity problems via basic Linear AlgebraSolving connectivity problems via basic Linear Algebra
Solving connectivity problems via basic Linear Algebra
cseiitgn
 
Topology Matters in Communication
Topology Matters in CommunicationTopology Matters in Communication
Topology Matters in Communication
cseiitgn
 
Space-efficient Approximation Scheme for Maximum Matching in Sparse Graphs
Space-efficient Approximation Scheme for Maximum Matching in Sparse GraphsSpace-efficient Approximation Scheme for Maximum Matching in Sparse Graphs
Space-efficient Approximation Scheme for Maximum Matching in Sparse Graphs
cseiitgn
 
Efficiently decoding Reed-Muller codes from random errors
Efficiently decoding Reed-Muller codes from random errorsEfficiently decoding Reed-Muller codes from random errors
Efficiently decoding Reed-Muller codes from random errors
cseiitgn
 
Complexity Classes and the Graph Isomorphism Problem
Complexity Classes and the Graph Isomorphism ProblemComplexity Classes and the Graph Isomorphism Problem
Complexity Classes and the Graph Isomorphism Problem
cseiitgn
 

More from cseiitgn (12)

A Quest for Subexponential Time Parameterized Algorithms for Planar-k-Path: F...
A Quest for Subexponential Time Parameterized Algorithms for Planar-k-Path: F...A Quest for Subexponential Time Parameterized Algorithms for Planar-k-Path: F...
A Quest for Subexponential Time Parameterized Algorithms for Planar-k-Path: F...
 
Alternate Parameterizations
Alternate ParameterizationsAlternate Parameterizations
Alternate Parameterizations
 
Space-efficient Approximation Scheme for Maximum Matching in Sparse Graphs
Space-efficient Approximation Scheme for Maximum Matching in Sparse GraphsSpace-efficient Approximation Scheme for Maximum Matching in Sparse Graphs
Space-efficient Approximation Scheme for Maximum Matching in Sparse Graphs
 
Hardness of multiple choice problems
Hardness of multiple choice problemsHardness of multiple choice problems
Hardness of multiple choice problems
 
The Chasm at Depth Four, and Tensor Rank : Old results, new insights
The Chasm at Depth Four, and Tensor Rank : Old results, new insightsThe Chasm at Depth Four, and Tensor Rank : Old results, new insights
The Chasm at Depth Four, and Tensor Rank : Old results, new insights
 
Unbounded Error Communication Complexity of XOR Functions
Unbounded Error Communication Complexity of XOR FunctionsUnbounded Error Communication Complexity of XOR Functions
Unbounded Error Communication Complexity of XOR Functions
 
Color Coding-Related Techniques
Color Coding-Related TechniquesColor Coding-Related Techniques
Color Coding-Related Techniques
 
Solving connectivity problems via basic Linear Algebra
Solving connectivity problems via basic Linear AlgebraSolving connectivity problems via basic Linear Algebra
Solving connectivity problems via basic Linear Algebra
 
Topology Matters in Communication
Topology Matters in CommunicationTopology Matters in Communication
Topology Matters in Communication
 
Space-efficient Approximation Scheme for Maximum Matching in Sparse Graphs
Space-efficient Approximation Scheme for Maximum Matching in Sparse GraphsSpace-efficient Approximation Scheme for Maximum Matching in Sparse Graphs
Space-efficient Approximation Scheme for Maximum Matching in Sparse Graphs
 
Efficiently decoding Reed-Muller codes from random errors
Efficiently decoding Reed-Muller codes from random errorsEfficiently decoding Reed-Muller codes from random errors
Efficiently decoding Reed-Muller codes from random errors
 
Complexity Classes and the Graph Isomorphism Problem
Complexity Classes and the Graph Isomorphism ProblemComplexity Classes and the Graph Isomorphism Problem
Complexity Classes and the Graph Isomorphism Problem
 

Recently uploaded

ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 

Recently uploaded (20)

ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 

Isolation Lemma for Directed Reachability and NL vs. L

  • 1. Isolation Lemma for Directed Reachability and NL vs. L Nutan Limaye (IIT Bombay) Joint work with Vaibhav Krishan Indian National Mathematics Initiative Workshop on Complexity Theory Nov 04 - Nov 06, 2016
  • 2. Isolation lemma for NP SAT Given a Boolean formula φ determine whether φ has a satisfying assignment.
  • 3. Isolation lemma for NP SAT Given a Boolean formula φ determine whether φ has a satisfying assignment. Isolation Procedure for SAT
  • 4. Isolation lemma for NP SAT Given a Boolean formula φ determine whether φ has a satisfying assignment. Isolation Procedure for SAT Given: a Boolean forumla φ on n input variables,
  • 5. Isolation lemma for NP SAT Given a Boolean formula φ determine whether φ has a satisfying assignment. Isolation Procedure for SAT Given: a Boolean forumla φ on n input variables, Output: a new formula ψ on the same n variables such that
  • 6. Isolation lemma for NP SAT Given a Boolean formula φ determine whether φ has a satisfying assignment. Isolation Procedure for SAT Given: a Boolean forumla φ on n input variables, Output: a new formula ψ on the same n variables such that every satisfying assignment of ψ also satisfies φ
  • 7. Isolation lemma for NP SAT Given a Boolean formula φ determine whether φ has a satisfying assignment. Isolation Procedure for SAT Given: a Boolean forumla φ on n input variables, Output: a new formula ψ on the same n variables such that every satisfying assignment of ψ also satisfies φ This implies that if φ is not satisfiable then ψ is also not satisfiable.
  • 8. Isolation lemma for NP SAT Given a Boolean formula φ determine whether φ has a satisfying assignment. Isolation Procedure for SAT Given: a Boolean forumla φ on n input variables, Output: a new formula ψ on the same n variables such that every satisfying assignment of ψ also satisfies φ This implies that if φ is not satisfiable then ψ is also not satisfiable. if φ is satisfiable, then ψ has exactly one satisfying assignment.
  • 9. Isolation lemma for NP SAT Given a Boolean formula φ determine whether φ has a satisfying assignment. Isolation Procedure for SAT Given: a Boolean forumla φ on n input variables, Output: a new formula ψ on the same n variables such that every satisfying assignment of ψ also satisfies φ This implies that if φ is not satisfiable then ψ is also not satisfiable. if φ is satisfiable, then ψ has exactly one satisfying assignment. Valiant Vazirani Isolation Lemma
  • 10. Isolation lemma for NP SAT Given a Boolean formula φ determine whether φ has a satisfying assignment. Isolation Procedure for SAT Given: a Boolean forumla φ on n input variables, Output: a new formula ψ on the same n variables such that every satisfying assignment of ψ also satisfies φ This implies that if φ is not satisfiable then ψ is also not satisfiable. if φ is satisfiable, then ψ has exactly one satisfying assignment. Valiant Vazirani Isolation Lemma There is a randomized polynomial time isolation procedure for SAT with success probability Ω(1 n )
  • 11. Bumping up the success probability Determinizing Isolation Procedure for SAT Can one get rid of the randomness in the Isolation Procedure for SAT?
  • 12. Bumping up the success probability Determinizing Isolation Procedure for SAT Can one get rid of the randomness in the Isolation Procedure for SAT? Open! Success probability of the Isolation Procedure for SAT
  • 13. Bumping up the success probability Determinizing Isolation Procedure for SAT Can one get rid of the randomness in the Isolation Procedure for SAT? Open! Success probability of the Isolation Procedure for SAT Can one make the success probability of the Isolation Procedure higher?
  • 14. Bumping up the success probability Determinizing Isolation Procedure for SAT Can one get rid of the randomness in the Isolation Procedure for SAT? Open! Success probability of the Isolation Procedure for SAT Can one make the success probability of the Isolation Procedure higher? The success probability of the Isolation Procedure for SAT can be made greater than 2/3 if and only if NP ⊆ P/poly.
  • 15. Bumping up the success probability Determinizing Isolation Procedure for SAT Can one get rid of the randomness in the Isolation Procedure for SAT? Open! Success probability of the Isolation Procedure for SAT Can one make the success probability of the Isolation Procedure higher? The success probability of the Isolation Procedure for SAT can be made greater than 2/3 if and only if NP ⊆ P/poly. [DKvMW] Is Valiant Vazinai’s isolation probability improvable? Dell, Kabanets, van Melkebeek, Watanabe, Computational Complexity, 2013.
  • 16. NL, L, Directed Reachability, L/poly Complexity classes NL, L, L/poly
  • 17. NL, L, Directed Reachability, L/poly Complexity classes NL, L, L/poly L: the class of decision problems decidable by dereministic Turing machines using O(log n) space, where n is the length of the input.
  • 18. NL, L, Directed Reachability, L/poly Complexity classes NL, L, L/poly L: the class of decision problems decidable by dereministic Turing machines using O(log n) space, where n is the length of the input. NL: the class of decision problems decidable by non-dereministic Turing machine using O(log n) space, where n is the length of the input.
  • 19. NL, L, Directed Reachability, L/poly Complexity classes NL, L, L/poly L: the class of decision problems decidable by dereministic Turing machines using O(log n) space, where n is the length of the input. NL: the class of decision problems decidable by non-dereministic Turing machine using O(log n) space, where n is the length of the input. L/poly: the class of decision problems decidable by dereministic Turing machine using O(log n) space and poly(n) amount of advice, where n is the length of the input.
  • 20. NL, L, Directed Reachability, L/poly Complexity classes NL, L, L/poly L: the class of decision problems decidable by dereministic Turing machines using O(log n) space, where n is the length of the input. NL: the class of decision problems decidable by non-dereministic Turing machine using O(log n) space, where n is the length of the input. L/poly: the class of decision problems decidable by dereministic Turing machine using O(log n) space and poly(n) amount of advice, where n is the length of the input. Directed Reachability, Reach Given: A directed graph G = (V , E) and two designated vertices s, t
  • 21. NL, L, Directed Reachability, L/poly Complexity classes NL, L, L/poly L: the class of decision problems decidable by dereministic Turing machines using O(log n) space, where n is the length of the input. NL: the class of decision problems decidable by non-dereministic Turing machine using O(log n) space, where n is the length of the input. L/poly: the class of decision problems decidable by dereministic Turing machine using O(log n) space and poly(n) amount of advice, where n is the length of the input. Directed Reachability, Reach Given: A directed graph G = (V , E) and two designated vertices s, t Output: yes if and only if there is a directed path from s to t in G.
  • 22. Our result Isolation Procedure for Directed Reachability
  • 23. Our result Isolation Procedure for Directed Reachability Given: a graph G on n input vertices, and two designated vertices s, t
  • 24. Our result Isolation Procedure for Directed Reachability Given: a graph G on n input vertices, and two designated vertices s, t Output: a new graph H on the same n variables such that
  • 25. Our result Isolation Procedure for Directed Reachability Given: a graph G on n input vertices, and two designated vertices s, t Output: a new graph H on the same n variables such that every s to t path in H is also a path in G
  • 26. Our result Isolation Procedure for Directed Reachability Given: a graph G on n input vertices, and two designated vertices s, t Output: a new graph H on the same n variables such that every s to t path in H is also a path in G This implies that in G if t is not reachable from s then in H as well there is no s to t path.
  • 27. Our result Isolation Procedure for Directed Reachability Given: a graph G on n input vertices, and two designated vertices s, t Output: a new graph H on the same n variables such that every s to t path in H is also a path in G This implies that in G if t is not reachable from s then in H as well there is no s to t path. if G has an s to t path, then H has exactly one s to t path.
  • 28. Our result Isolation Procedure for Directed Reachability Given: a graph G on n input vertices, and two designated vertices s, t Output: a new graph H on the same n variables such that every s to t path in H is also a path in G This implies that in G if t is not reachable from s then in H as well there is no s to t path. if G has an s to t path, then H has exactly one s to t path. Success probability of the Isolation Procedure for Reach Theorem (Main result) There exists a randomized isolation procedure for Reach with success probability greater than 2/3 if and only if NL ⊆ L/poly.
  • 29. Isolation for other classes Isolation for LogCFL
  • 30. Isolation for other classes Isolation for LogCFL There exists a randomized isolation procedure for a hard problem in LogCFL that runs in L/poly with success probability greater than 2/3 if and only if LogCFL ⊆ L/poly.
  • 31. Isolation for other classes Isolation for LogCFL There exists a randomized isolation procedure for a hard problem in LogCFL that runs in L/poly with success probability greater than 2/3 if and only if LogCFL ⊆ L/poly. Isolation for NP There exists a randomized isolation procedure for SAT that runs in L/poly with success probability greater than 2/3 if and only if NP ⊆ L/poly.
  • 32. Proof outline The proofs follows a similar structure as in [DKvMW]
  • 33. Proof outline The proofs follows a similar structure as in [DKvMW] We will start with some definitions.
  • 34. Proof outline The proofs follows a similar structure as in [DKvMW] We will start with some definitions. Definition (Promise sets for a version of Reach)
  • 35. Proof outline The proofs follows a similar structure as in [DKvMW] We will start with some definitions. Definition (Promise sets for a version of Reach) YesReach = {(G, s, t) | unique reachable path between s and t},
  • 36. Proof outline The proofs follows a similar structure as in [DKvMW] We will start with some definitions. Definition (Promise sets for a version of Reach) YesReach = {(G, s, t) | unique reachable path between s and t}, and NoReach = {(G, s, t) | no path between s and t}
  • 37. Proof outline The proofs follows a similar structure as in [DKvMW] We will start with some definitions. Definition (Promise sets for a version of Reach) YesReach = {(G, s, t) | unique reachable path between s and t}, and NoReach = {(G, s, t) | no path between s and t} Definition (PrUReach)
  • 38. Proof outline The proofs follows a similar structure as in [DKvMW] We will start with some definitions. Definition (Promise sets for a version of Reach) YesReach = {(G, s, t) | unique reachable path between s and t}, and NoReach = {(G, s, t) | no path between s and t} Definition (PrUReach) Given: G ∈ YesReach ∪ NoReach
  • 39. Proof outline The proofs follows a similar structure as in [DKvMW] We will start with some definitions. Definition (Promise sets for a version of Reach) YesReach = {(G, s, t) | unique reachable path between s and t}, and NoReach = {(G, s, t) | no path between s and t} Definition (PrUReach) Given: G ∈ YesReach ∪ NoReach Output: yes if and only if G ∈ YesReach.
  • 40. Proof outline Recall the statement we wish to prove
  • 41. Proof outline Recall the statement we wish to prove Theorem (Main result) There exists a randomized isolation procedure for Reach with success probability greater than 2/3 if and only if NL ⊆ L/poly.
  • 42. Proof outline Recall the statement we wish to prove Theorem (Main result) There exists a randomized isolation procedure for Reach with success probability greater than 2/3 if and only if NL ⊆ L/poly. Step 1 Prove that NL ⊆ L/poly if and only if PrUReach ∈ L/poly.
  • 43. Proof outline Recall the statement we wish to prove Theorem (Main result) There exists a randomized isolation procedure for Reach with success probability greater than 2/3 if and only if NL ⊆ L/poly. Step 1 Prove that NL ⊆ L/poly if and only if PrUReach ∈ L/poly. Step 2 Prove the following statement:
  • 44. Proof outline Recall the statement we wish to prove Theorem (Main result) There exists a randomized isolation procedure for Reach with success probability greater than 2/3 if and only if NL ⊆ L/poly. Step 1 Prove that NL ⊆ L/poly if and only if PrUReach ∈ L/poly. Step 2 Prove the following statement: There exists a randomized isolation procedure for Reach with success probability greater than 2/3 if and only if PrUReach ∈ L/poly.
  • 45. Proof outline Recall the statement we wish to prove Theorem (Main result) There exists a randomized isolation procedure for Reach with success probability greater than 2/3 if and only if NL ⊆ L/poly. Step 1 Prove that NL ⊆ L/poly if and only if PrUReach ∈ L/poly. Step 2 Prove the following statement: There exists a randomized isolation procedure for Reach with success probability greater than 2/3 if and only if PrUReach ∈ L/poly.
  • 46. Details of Step 1 NL ⊆ L/poly ⇔ PrUReach ∈ L/poly
  • 47. Details of Step 1 NL ⊆ L/poly ⇔ PrUReach ∈ L/poly ⇒ This direction is trivial.
  • 48. Details of Step 1 NL ⊆ L/poly ⇔ PrUReach ∈ L/poly ⇒ This direction is trivial. ⇐ Uses an algorithm developed in the following work.
  • 49. Details of Step 1 NL ⊆ L/poly ⇔ PrUReach ∈ L/poly ⇒ This direction is trivial. ⇐ Uses an algorithm developed in the following work. [RA] Making Nondeterminism Unambiguous, Reinhardt, Allender, SIAM Journal of Computing, 2000.
  • 50. Details of Step 1 NL ⊆ L/poly ⇔ PrUReach ∈ L/poly ⇒ This direction is trivial. ⇐ Uses an algorithm developed in the following work. [RA] Making Nondeterminism Unambiguous, Reinhardt, Allender, SIAM Journal of Computing, 2000. We need one more definition.
  • 51. Details of Step 1 NL ⊆ L/poly ⇔ PrUReach ∈ L/poly ⇒ This direction is trivial. ⇐ Uses an algorithm developed in the following work. [RA] Making Nondeterminism Unambiguous, Reinhardt, Allender, SIAM Journal of Computing, 2000. We need one more definition. Definition (Min-unique graph [GW, RA] )
  • 52. Details of Step 1 NL ⊆ L/poly ⇔ PrUReach ∈ L/poly ⇒ This direction is trivial. ⇐ Uses an algorithm developed in the following work. [RA] Making Nondeterminism Unambiguous, Reinhardt, Allender, SIAM Journal of Computing, 2000. We need one more definition. Definition (Min-unique graph [GW, RA] ) A weighted directed graph G = (V , E) with weight function w : E → N is said to be min-unique if between every pair of vertices the minimum weight path is unique.
  • 53. Breaking down Step 1 Step 1.1: Generating min-unique graph using advice
  • 54. Breaking down Step 1 Step 1.1: Generating min-unique graph using advice Given a graph G on n vertices a procedure P1 generates graphs G1, G2, . . . , Gn2 For all 1 ≤ i ≤ n2 , Gi is on the same set of vertices as G.
  • 55. Breaking down Step 1 Step 1.1: Generating min-unique graph using advice Given a graph G on n vertices a procedure P1 generates graphs G1, G2, . . . , Gn2 For all 1 ≤ i ≤ n2 , Gi is on the same set of vertices as G. G has an s to t path iff ∀i ∈ [n2 ], Gi has an s to t path.
  • 56. Breaking down Step 1 Step 1.1: Generating min-unique graph using advice Given a graph G on n vertices a procedure P1 generates graphs G1, G2, . . . , Gn2 For all 1 ≤ i ≤ n2 , Gi is on the same set of vertices as G. G has an s to t path iff ∀i ∈ [n2 ], Gi has an s to t path. If G has an s to t path then ∃i ∈ [n2 ] : such that Gi is min-unique.
  • 57. Breaking down Step 1 Step 1.1: Generating min-unique graph using advice Given a graph G on n vertices a procedure P1 generates graphs G1, G2, . . . , Gn2 For all 1 ≤ i ≤ n2 , Gi is on the same set of vertices as G. G has an s to t path iff ∀i ∈ [n2 ], Gi has an s to t path. If G has an s to t path then ∃i ∈ [n2 ] : such that Gi is min-unique. P1 has an L/poly algorithm.
  • 58. Breaking down Step 1 Step 1.1: Generating min-unique graph using advice Given a graph G on n vertices a procedure P1 generates graphs G1, G2, . . . , Gn2 For all 1 ≤ i ≤ n2 , Gi is on the same set of vertices as G. G has an s to t path iff ∀i ∈ [n2 ], Gi has an s to t path. If G has an s to t path then ∃i ∈ [n2 ] : such that Gi is min-unique. P1 has an L/poly algorithm. P1 advice string G1, G2, . . . , Gn2 G
  • 59. Breaking down Step 1 Step 1.2: Generating G ∈ YesReach ∪ NoReach given a min-unique G
  • 60. Breaking down Step 1 Step 1.2: Generating G ∈ YesReach ∪ NoReach given a min-unique G Given a min-unique graph G on n vertices a procedure P2 generates a graph CG
  • 61. Breaking down Step 1 Step 1.2: Generating G ∈ YesReach ∪ NoReach given a min-unique G Given a min-unique graph G on n vertices a procedure P2 generates a graph CG On input (G, s, t), (CG , s , t ) is produced.
  • 62. Breaking down Step 1 Step 1.2: Generating G ∈ YesReach ∪ NoReach given a min-unique G Given a min-unique graph G on n vertices a procedure P2 generates a graph CG On input (G, s, t), (CG , s , t ) is produced. G has an s to t path if and only if CG has an s to t path.
  • 63. Breaking down Step 1 Step 1.2: Generating G ∈ YesReach ∪ NoReach given a min-unique G Given a min-unique graph G on n vertices a procedure P2 generates a graph CG On input (G, s, t), (CG , s , t ) is produced. G has an s to t path if and only if CG has an s to t path. If G is min-unique and has an s to t path then there is a unique path from s to t .
  • 64. Breaking down Step 1 Step 1.2: Generating G ∈ YesReach ∪ NoReach given a min-unique G Given a min-unique graph G on n vertices a procedure P2 generates a graph CG On input (G, s, t), (CG , s , t ) is produced. G has an s to t path if and only if CG has an s to t path. If G is min-unique and has an s to t path then there is a unique path from s to t . P2 has an L/poly algorithm.
  • 65. Breaking down Step 1 Step 1.2: Generating G ∈ YesReach ∪ NoReach given a min-unique G Given a min-unique graph G on n vertices a procedure P2 generates a graph CG On input (G, s, t), (CG , s , t ) is produced. G has an s to t path if and only if CG has an s to t path. If G is min-unique and has an s to t path then there is a unique path from s to t . P2 has an L/poly algorithm. P2 advice string (CG , s , t ) (G, s, t)
  • 66. Breaking down Step 1 Step 1.3: Using P1, P2 to solve Reach.
  • 67. Breaking down Step 1 Step 1.3: Using P1, P2 to solve Reach. P be the algorithm that solves PrUReach in L/poly.
  • 68. Breaking down Step 1 Step 1.3: Using P1, P2 to solve Reach. P be the algorithm that solves PrUReach in L/poly. G P1 G1 G2 P2 CG1 P2 CG2 ... ... ... Gn2 P2 CGn2 P Yes iff P ac- cepts one of the graphs
  • 69. Breaking down Step 1 Step 1.3: Using P1, P2 to solve Reach. P be the algorithm that solves PrUReach in L/poly. G P1 G1 G2 P2 CG1 P2 CG2 ... ... ... Gn2 P2 CGn2 P Yes iff P ac- cepts one of the graphs If G does not have an s to t path, we reject.
  • 70. Breaking down Step 1 Step 1.3: Using P1, P2 to solve Reach. P be the algorithm that solves PrUReach in L/poly. G P1 G1 G2 P2 CG1 P2 CG2 ... ... ... Gn2 P2 CGn2 P Yes iff P ac- cepts one of the graphs If G does not have an s to t path, we reject. If G has an s to t path,
  • 71. Breaking down Step 1 Step 1.3: Using P1, P2 to solve Reach. P be the algorithm that solves PrUReach in L/poly. G P1 G1 G2 P2 CG1 P2 CG2 ... ... ... Gn2 P2 CGn2 P Yes iff P ac- cepts one of the graphs If G does not have an s to t path, we reject. If G has an s to t path, at least one of the Gi is min-unique.
  • 72. Breaking down Step 1 Step 1.3: Using P1, P2 to solve Reach. P be the algorithm that solves PrUReach in L/poly. G P1 G1 G2 P2 CG1 P2 CG2 ... ... ... Gn2 P2 CGn2 P Yes iff P ac- cepts one of the graphs If G does not have an s to t path, we reject. If G has an s to t path, at least one of the Gi is min-unique. The corresponding CGi ∈ YesReach.
  • 73. Details about Step 1.2 Step 1.2: Generating G ∈ YesReach ∪ NoReach given a min-unique G
  • 74. Details about Step 1.2 Step 1.2: Generating G ∈ YesReach ∪ NoReach given a min-unique G Given a min-unique graph G on n vertices On input (G, s, t), (CG , s , t ) is produced. G has an s to t path if and only if CG has an s to t path.
  • 75. Details about Step 1.2 Step 1.2: Generating G ∈ YesReach ∪ NoReach given a min-unique G Given a min-unique graph G on n vertices On input (G, s, t), (CG , s , t ) is produced. G has an s to t path if and only if CG has an s to t path. If G is min-unique then there is a unique path from s to t .
  • 76. Details about Step 1.2 Step 1.2: Generating G ∈ YesReach ∪ NoReach given a min-unique G Given a min-unique graph G on n vertices On input (G, s, t), (CG , s , t ) is produced. G has an s to t path if and only if CG has an s to t path. If G is min-unique then there is a unique path from s to t . [RA] If G is min-unqiue then there is a UL algorithm that decides the reachability in G.
  • 77. Details about Step 1.2 Step 1.2: Generating G ∈ YesReach ∪ NoReach given a min-unique G Given a min-unique graph G on n vertices On input (G, s, t), (CG , s , t ) is produced. G has an s to t path if and only if CG has an s to t path. If G is min-unique then there is a unique path from s to t . [RA] If G is min-unqiue then there is a UL algorithm that decides the reachability in G. CG is the configuration graph of the UL algorithm on input G.
  • 78. Details about Step 1.2 Step 1.2: Generating G ∈ YesReach ∪ NoReach given a min-unique G Given a min-unique graph G on n vertices On input (G, s, t), (CG , s , t ) is produced. G has an s to t path if and only if CG has an s to t path. If G is min-unique then there is a unique path from s to t . [RA] If G is min-unqiue then there is a UL algorithm that decides the reachability in G. CG is the configuration graph of the UL algorithm on input G. CG can be computed in L.
  • 79. Proof outline Recall the statement we wish to prove
  • 80. Proof outline Recall the statement we wish to prove Theorem (Main result) There exists a randomized isolation procedure for Reach with success probability greater than 2/3 if and only if NL ⊆ L/poly.
  • 81. Proof outline Recall the statement we wish to prove Theorem (Main result) There exists a randomized isolation procedure for Reach with success probability greater than 2/3 if and only if NL ⊆ L/poly. Step 1 Prove that NL ⊆ L/poly if and only if PrUReach ∈ L/poly.
  • 82. Proof outline Recall the statement we wish to prove Theorem (Main result) There exists a randomized isolation procedure for Reach with success probability greater than 2/3 if and only if NL ⊆ L/poly. Step 1 Prove that NL ⊆ L/poly if and only if PrUReach ∈ L/poly. Step 2 Prove the following statement:
  • 83. Proof outline Recall the statement we wish to prove Theorem (Main result) There exists a randomized isolation procedure for Reach with success probability greater than 2/3 if and only if NL ⊆ L/poly. Step 1 Prove that NL ⊆ L/poly if and only if PrUReach ∈ L/poly. Step 2 Prove the following statement: There exists a randomized isolation procedure for Reach with success probability greater than 2/3 if and only if PrUReach ∈ L/poly.
  • 84. Proof outline Recall the statement we wish to prove Theorem (Main result) There exists a randomized isolation procedure for Reach with success probability greater than 2/3 if and only if NL ⊆ L/poly. Step 1 Prove that NL ⊆ L/poly if and only if PrUReach ∈ L/poly. Step 2 Prove the following statement: There exists a randomized isolation procedure for Reach with success probability greater than 2/3 if and only if PrUReach ∈ L/poly.
  • 85. Details about Step 2 From the hypothesis we can show that there is an L/poly procedure, say B s.t.
  • 86. Details about Step 2 From the hypothesis we can show that there is an L/poly procedure, say B s.t. Given a graph G as input, it outputs G1, G2, . . . , Gt such that > 2/3 fraction of the Gi s have unique s to t paths.
  • 87. Details about Step 2 From the hypothesis we can show that there is an L/poly procedure, say B s.t. Given a graph G as input, it outputs G1, G2, . . . , Gt such that > 2/3 fraction of the Gi s have unique s to t paths. B advice string G1, G2, . . . , Gt G
  • 88. Details about Step 2 From the hypothesis we can show that there is an L/poly procedure, say B s.t. Given a graph G as input, it outputs G1, G2, . . . , Gt such that > 2/3 fraction of the Gi s have unique s to t paths. B advice string G1, G2, . . . , Gt G H be a graph with π as its s to t path.
  • 89. Details about Step 2 From the hypothesis we can show that there is an L/poly procedure, say B s.t. Given a graph G as input, it outputs G1, G2, . . . , Gt such that > 2/3 fraction of the Gi s have unique s to t paths. B advice string G1, G2, . . . , Gt G H be a graph with π as its s to t path. For two graph G, H we say that (G, H) is good if π is a reachable path in < 2/3 fraction of graphs in B(G + H).
  • 90. Details about Step 2 From the hypothesis we can show that there is an L/poly procedure, say B s.t. Given a graph G as input, it outputs G1, G2, . . . , Gt such that > 2/3 fraction of the Gi s have unique s to t paths. B advice string G1, G2, . . . , Gt G H be a graph with π as its s to t path. For two graph G, H we say that (G, H) is good if π is a reachable path in < 2/3 fraction of graphs in B(G + H). Let B(G + H) = G1, G2, . . . , Gt .
  • 91. Details about Step 2 Properties of a good pair (G, H)
  • 92. Details about Step 2 Properties of a good pair (G, H) If (G, H) is good then G ∈ YesReach.
  • 93. Details about Step 2 Properties of a good pair (G, H) If (G, H) is good then G ∈ YesReach. If (G, H) good then there is a ρ such that ρ = π
  • 94. Details about Step 2 Properties of a good pair (G, H) If (G, H) is good then G ∈ YesReach. If (G, H) good then there is a ρ such that ρ = π and ρ is a unique reachable path in some Gi
  • 95. Details about Step 2 Properties of a good pair (G, H) If (G, H) is good then G ∈ YesReach. If (G, H) good then there is a ρ such that ρ = π and ρ is a unique reachable path in some Gi , that ρ is a reachable path in G.
  • 96. Details about Step 2 Properties of a good pair (G, H) If (G, H) is good then G ∈ YesReach. If (G, H) good then there is a ρ such that ρ = π and ρ is a unique reachable path in some Gi , that ρ is a reachable path in G. Therefore G ∈ YesReach.
  • 97. Details about Step 2 Properties of a good pair (G, H) If (G, H) is good then G ∈ YesReach. If (G, H) good then there is a ρ such that ρ = π and ρ is a unique reachable path in some Gi , that ρ is a reachable path in G. Therefore G ∈ YesReach. If G, H are both in YesReach then either (G, H) or (H, G) is good. Let π, ρ be unique s to t paths in H, G, respectively.
  • 98. Details about Step 2 Properties of a good pair (G, H) If (G, H) is good then G ∈ YesReach. If (G, H) good then there is a ρ such that ρ = π and ρ is a unique reachable path in some Gi , that ρ is a reachable path in G. Therefore G ∈ YesReach. If G, H are both in YesReach then either (G, H) or (H, G) is good. Let π, ρ be unique s to t paths in H, G, respectively. (π = ρ).
  • 99. Details about Step 2 Properties of a good pair (G, H) If (G, H) is good then G ∈ YesReach. If (G, H) good then there is a ρ such that ρ = π and ρ is a unique reachable path in some Gi , that ρ is a reachable path in G. Therefore G ∈ YesReach. If G, H are both in YesReach then either (G, H) or (H, G) is good. Let π, ρ be unique s to t paths in H, G, respectively. (π = ρ). If neither good, then each π and ρ are reachable paths in 2/3 of the Gi s.
  • 100. Details about Step 2 Properties of a good pair (G, H) If (G, H) is good then G ∈ YesReach. If (G, H) good then there is a ρ such that ρ = π and ρ is a unique reachable path in some Gi , that ρ is a reachable path in G. Therefore G ∈ YesReach. If G, H are both in YesReach then either (G, H) or (H, G) is good. Let π, ρ be unique s to t paths in H, G, respectively. (π = ρ). If neither good, then each π and ρ are reachable paths in 2/3 of the Gi s. This means > 1/3 of Gi s have two distinct s to t paths.
  • 101. Details about Step 2 Properties of a good pair (G, H) If (G, H) is good then G ∈ YesReach. If (G, H) good then there is a ρ such that ρ = π and ρ is a unique reachable path in some Gi , that ρ is a reachable path in G. Therefore G ∈ YesReach. If G, H are both in YesReach then either (G, H) or (H, G) is good. Let π, ρ be unique s to t paths in H, G, respectively. (π = ρ). If neither good, then each π and ρ are reachable paths in 2/3 of the Gi s. This means > 1/3 of Gi s have two distinct s to t paths. This contradicts the hypothesis of B.
  • 102. Details about Step 2 Properties of a good pair (G, H) If (G, H) is good then G ∈ YesReach. If (G, H) good then there is a ρ such that ρ = π and ρ is a unique reachable path in some Gi , that ρ is a reachable path in G. Therefore G ∈ YesReach. If G, H are both in YesReach then either (G, H) or (H, G) is good. Let π, ρ be unique s to t paths in H, G, respectively. (π = ρ). If neither good, then each π and ρ are reachable paths in 2/3 of the Gi s. This means > 1/3 of Gi s have two distinct s to t paths. This contradicts the hypothesis of B. Given H, π as advice and G as input, whether (G, H) is good or not can be decided in L/poly.
  • 103. Wrap-up Design the advice strings As advice we need (H1, π1), (H2, π2), . . . , (H , π ).
  • 104. Wrap-up Design the advice strings As advice we need (H1, π1), (H2, π2), . . . , (H , π ). The advice ensures that
  • 105. Wrap-up Design the advice strings As advice we need (H1, π1), (H2, π2), . . . , (H , π ). The advice ensures thatif G ∈ YesReach then there is an Hi such that Hi ∈ YesReach and πi is corresponding path.
  • 106. Wrap-up Design the advice strings As advice we need (H1, π1), (H2, π2), . . . , (H , π ). The advice ensures thatif G ∈ YesReach then there is an Hi such that Hi ∈ YesReach and πi is corresponding path. If G ∈ NoReach, then each Hi ∈ NoReach.
  • 107. Wrap-up Design the advice strings As advice we need (H1, π1), (H2, π2), . . . , (H , π ). The advice ensures thatif G ∈ YesReach then there is an Hi such that Hi ∈ YesReach and πi is corresponding path. If G ∈ NoReach, then each Hi ∈ NoReach. Putting it together Overall, this gives a L/poly algorithm for PrUReach.