Share to: share facebook share twitter share wa share telegram print page

Interactive proof system

General representation of an interactive proof protocol.

In computational complexity theory, an interactive proof system is an abstract machine that models computation as the exchange of messages between two parties: a prover and a verifier. The parties interact by exchanging messages in order to ascertain whether a given string belongs to a language or not. The prover possesses unlimited computational resources but cannot be trusted, while the verifier has bounded computation power but is assumed to be always honest. Messages are sent between the verifier and prover until the verifier has an answer to the problem and has "convinced" itself that it is correct.

All interactive proof systems have two requirements:

  • Completeness: if the statement is true, the honest prover (that is, one following the protocol properly) can convince the honest verifier that it is indeed true.
  • Soundness: if the statement is false, no prover, even if it doesn't follow the protocol, can convince the honest verifier that it is true, except with some small probability.

The specific nature of the system, and so the complexity class of languages it can recognize, depends on what sort of bounds are put on the verifier, as well as what abilities it is given—for example, most interactive proof systems depend critically on the verifier's ability to make random choices. It also depends on the nature of the messages exchanged—how many and what they can contain. Interactive proof systems have been found to have some important implications for traditional complexity classes defined using only one machine. The main complexity classes describing interactive proof systems are AM and IP.

Background

Every interactive proof system defines a formal language of strings . Soundness of the proof system refers to the property that no prover can make the verifier accept for the wrong statement except with some small probability. The upper bound of this probability is referred to as the soundness error of a proof system. More formally, for every prover , and every :

for some . As long as the soundness error is bounded by a polynomial fraction of the potential running time of the verifier (i.e. ), it is always possible to amplify soundness until the soundness error becomes negligible function relative to the running time of the verifier. This is achieved by repeating the proof and accepting only if all proofs verify. After repetitions, a soundness error will be reduced to .[1]

Classes of interactive proofs

NP

The complexity class NP may be viewed as a very simple proof system. In this system, the verifier is a deterministic, polynomial-time machine (a P machine). The protocol is:

  • The prover looks at the input and computes the solution using its unlimited power and returns a polynomial-size proof certificate.
  • The verifier verifies that the certificate is valid in deterministic polynomial time. If it is valid, it accepts; otherwise, it rejects.

In the case where a valid proof certificate exists, the prover is always able to make the verifier accept by giving it that certificate. In the case where there is no valid proof certificate, however, the input is not in the language, and no prover, however malicious it is, can convince the verifier otherwise, because any proof certificate will be rejected.

Arthur–Merlin and Merlin–Arthur protocols

Although NP may be viewed as using interaction, it wasn't until 1985 that the concept of computation through interaction was conceived (in the context of complexity theory) by two independent groups of researchers. One approach, by László Babai, who published "Trading group theory for randomness",[2] defined the Arthur–Merlin (AM) class hierarchy. In this presentation, Arthur (the verifier) is a probabilistic, polynomial-time machine, while Merlin (the prover) has unbounded resources.

The class MA in particular is a simple generalization of the NP interaction above in which the verifier is probabilistic instead of deterministic. Also, instead of requiring that the verifier always accept valid certificates and reject invalid certificates, it is more lenient:

  • Completeness: if the string is in the language, the prover must be able to give a certificate such that the verifier will accept with probability at least 2/3 (depending on the verifier's random choices).
  • Soundness: if the string is not in the language, no prover, however malicious, will be able to convince the verifier to accept the string with probability exceeding 1/3.

This machine is potentially more powerful than an ordinary NP interaction protocol, and the certificates are no less practical to verify, since BPP algorithms are considered as abstracting practical computation (see BPP).

Public coin protocol versus private coin protocol

In a public coin protocol, the random choices made by the verifier are made public. They remain private in a private coin protocol.

In the same conference where Babai defined his proof system for MA, Shafi Goldwasser, Silvio Micali and Charles Rackoff[3] published a paper defining the interactive proof system IP[f(n)]. This has the same machines as the MA protocol, except that f(n) rounds are allowed for an input of size n. In each round, the verifier performs computation and passes a message to the prover, and the prover performs computation and passes information back to the verifier. At the end the verifier must make its decision. For example, in an IP[3] protocol, the sequence would be VPVPVPV, where V is a verifier turn and P is a prover turn.

In Arthur–Merlin protocols, Babai defined a similar class AM[f(n)] which allowed f(n) rounds, but he put one extra condition on the machine: the verifier must show the prover all the random bits it uses in its computation. The result is that the verifier cannot "hide" anything from the prover, because the prover is powerful enough to simulate everything the verifier does if it knows what random bits it used. This is called a public coin protocol, because the random bits ("coin flips") are visible to both machines. The IP approach is called a private coin protocol by contrast.

The essential problem with public coins is that if the prover wishes to maliciously convince the verifier to accept a string which is not in the language, it seems like the verifier might be able to thwart its plans if it can hide its internal state from it. This was a primary motivation in defining the IP proof systems.

In 1986, Goldwasser and Sipser[4] showed, perhaps surprisingly, that the verifier's ability to hide coin flips from the prover does it little good after all, in that an Arthur–Merlin public coin protocol with only two more rounds can recognize all the same languages. The result is that public-coin and private-coin protocols are roughly equivalent. In fact, as Babai shows in 1988, AM[k]=AM for all constant k, so the IP[k] have no advantage over AM.[5]

To demonstrate the power of these classes, consider the graph isomorphism problem, the problem of determining whether it is possible to permute the vertices of one graph so that it is identical to another graph. This problem is in NP, since the proof certificate is the permutation which makes the graphs equal. It turns out that the complement of the graph isomorphism problem, a co-NP problem not known to be in NP, has an AM algorithm and the best way to see it is via a private coins algorithm.[6]

IP

Private coins may not be helpful, but more rounds of interaction are helpful. If we allow the probabilistic verifier machine and the all-powerful prover to interact for a polynomial number of rounds, we get the class of problems called IP. In 1992, Adi Shamir revealed in one of the central results of complexity theory that IP equals PSPACE, the class of problems solvable by an ordinary deterministic Turing machine in polynomial space.[7]

QIP

If we allow the elements of the system to use quantum computation, the system is called a quantum interactive proof system, and the corresponding complexity class is called QIP.[8] A series of results culminated in a 2010 breakthrough that QIP = PSPACE.[9][10]

Zero knowledge

Not only can interactive proof systems solve problems not believed to be in NP, but under assumptions about the existence of one-way functions, a prover can convince the verifier of the solution without ever giving the verifier information about the solution. This is important when the verifier cannot be trusted with the full solution. At first it seems impossible that the verifier could be convinced that there is a solution when the verifier has not seen a certificate, but such proofs, known as zero-knowledge proofs are in fact believed to exist for all problems in NP and are valuable in cryptography. Zero-knowledge proofs were first mentioned in the original 1985 paper on IP by Goldwasser, Micali and Rackoff for specific number theoretic languages. The extent of their power was however shown by Oded Goldreich, Silvio Micali and Avi Wigderson.[6] for all of NP, and this was first extended by Russell Impagliazzo and Moti Yung to all IP.[11]

MIP

One goal of IP's designers was to create the most powerful possible interactive proof system, and at first it seems like it cannot be made more powerful without making the verifier more powerful and so impractical. Goldwasser et al. overcame this in their 1988 "Multi prover interactive proofs: How to remove intractability assumptions", which defines a variant of IP called MIP in which there are two independent provers.[12] The two provers cannot communicate once the verifier has begun sending messages to them. Just as it's easier to tell if a criminal is lying if he and his partner are interrogated in separate rooms, it's considerably easier to detect a malicious prover trying to trick the verifier into accepting a string not in the language if there is another prover it can double-check with.

In fact, this is so helpful that Babai, Fortnow, and Lund were able to show that MIP = NEXPTIME, the class of all problems solvable by a nondeterministic machine in exponential time, a very large class.[13] NEXPTIME contains PSPACE, and is believed to strictly contain PSPACE. Adding a constant number of additional provers beyond two does not enable recognition of any more languages. This result paved the way for the celebrated PCP theorem, which can be considered to be a "scaled-down" version of this theorem.

MIP also has the helpful property that zero-knowledge proofs for every language in NP can be described without the assumption of one-way functions that IP must make. This has bearing on the design of provably unbreakable cryptographic algorithms.[12] Moreover, a MIP protocol can recognize all languages in IP in only a constant number of rounds, and if a third prover is added, it can recognize all languages in NEXPTIME in a constant number of rounds, showing again its power over IP.

It is known that for any constant k, a MIP system with k provers and polynomially many rounds can be turned into an equivalent system with only 2 provers, and a constant number of rounds.[14]

PCP

While the designers of IP considered generalizations of Babai's interactive proof systems, others considered restrictions. A very useful interactive proof system is PCP(f(n), g(n)), which is a restriction of MA where Arthur can only use f(n) random bits and can only examine g(n) bits of the proof certificate sent by Merlin (essentially using random access).

There are a number of easy-to-prove results about various PCP classes. , the class of polynomial-time machines with no randomness but access to a certificate, is just NP. , the class of polynomial-time machines with access to polynomially many random bits is co-RP. Arora and Safra's first major result was that ; put another way, if the verifier in the NP protocol is constrained to choose only bits of the proof certificate to look at, this won't make any difference as long as it has random bits to use.[15]

Furthermore, the PCP theorem asserts that the number of proof accesses can be brought all the way down to a constant. That is, .[16] They used this valuable characterization of NP to prove that approximation algorithms do not exist for the optimization versions of certain NP-complete problems unless P = NP. Such problems are now studied in the field known as hardness of approximation.

See also

References

  1. ^ Goldreich, Oded (2002), Zero-Knowledge twenty years after its invention, ECCC TR02-063.
  2. ^ László Babai. Trading group theory for randomness. Proceedings of the Seventeenth Annual Symposium on the Theory of Computing, ACM. 1985.
  3. ^ Goldwasser, S.; Micali, S.; Rackoff, C. (1989). "The knowledge complexity of interactive proof systems" (PDF). SIAM Journal on Computing. 18 (1): 186–208. doi:10.1137/0218012. ISSN 1095-7111. Extended abstract
  4. ^ Shafi Goldwasser and Michael Sipser. Private coins versus public coins in interactive proof systems. Proceedings of ACM STOC'86, pp. 58–68. 1986.
  5. ^ László Babai and Shlomo Moran. Arthur–Merlin games: a randomized proof system, and a hierarchy of complexity classes. Journal of Computer and System Sciences, 36: p.254–276. 1988.
  6. ^ a b O. Goldreich, S. Micali, A. Wigderson. Proofs that yield nothing but their validity. Journal of the ACM, volume 38, issue 3, p.690–728. July 1991.
  7. ^ Adi Shamir. IP = PSPACE. Journal of the ACM, volume 39, issue 4, p.869–877. October 1992.
  8. ^ Tsuyoshi Ito; Hirotada Kobayashi; John Watrous (2010). "Quantum interactive proofs with weak error bounds". arXiv:1012.4427v2 [quant-ph].
  9. ^ Jain, Rahul; Ji, Zhengfeng; Upadhyay, Sarvagya; Watrous, John (2010). "QIP = PSPACE". STOC '10: Proceedings of the 42nd ACM symposium on Theory of computing. ACM. pp. 573–582. ISBN 978-1-4503-0050-6.
  10. ^ Aaronson, S. (2010). "QIP = PSPACE breakthrough". Communications of the ACM. 53 (12): 101. doi:10.1145/1859204.1859230. S2CID 34380788.
  11. ^ Russell Impagliazzo, Moti Yung: Direct Minimum-Knowledge Computations. CRYPTO 1987: 40-51 [1]
  12. ^ a b M. Ben-or, Shafi Goldwasser, J. Kilian, and A. Wigderson. Multi prover interactive proofs: How to remove intractability assumptions. Proceedings of the 20th ACM Symposium on Theory of Computing, pp. 113–121. 1988.
  13. ^ László Babai; L. Fortnow; C. Lund (1991). "Non-deterministic exponential time has two-prover interactive protocols. Computational Complexity". pp. 3–40. Archived from the original on 8 February 2007.
  14. ^ Ben-Or, Michael; Goldwasser, Shafi; Kilian, Joe; Widgerson, Avi (1988). "Multi-prover interactive proofs: How to remove intractability" (PDF). Proceedings of the twentieth annual ACM symposium on Theory of computing - STOC '88. pp. 113–131. doi:10.1145/62212.62223. ISBN 0897912640. S2CID 11008365. Archived from the original (PDF) on 13 July 2010. Retrieved 17 November 2022.
  15. ^ Sanjeev Arora and Shmuel Safra. Probabilistic Checking of Proofs: A New Characterization of NP. Journal of the ACM, volume 45, issue 1, pp. 70–122. January 1998.
  16. ^ Sanjeev Arora, C. Lund, R. Motwani, M. Sudan, and M. Szegedy. Proof Verification and the Hardness of Approximation Problems. Proceedings of the 33rd IEEE Symposium on Foundations of Computer Science, pp. 13–22. 1992.

Textbooks

External links

Read more information:

Adiparwa versi Jawa Kuno yang diterbitkan oleh Dinas Pendidikan Provinsi Bali. Adiparwa (bahasa Sanskerta: आदिपर्व, Ādiparva) adalah buku pertama atau bagian (parwa) pertama dari kisah Mahabharata. Pada dasarnya bagian ini berisi ringkasan keseluruhan cerita Mahabharata, kisah-kisah mengenai latar belakang cerita, nenek moyang keluarga Bharata, hingga masa muda Korawa dan Pandawa). Kisahnya dituturkan dalam sebuah cerita bingkai dan alur ceritanya meloncat-loncat sehingga tidak me…

BMXStruktur yang tersediaPDBPencarian Ortolog: PDBe RCSB Daftar kode id PDB2EKX, 2YS2, 3SXR, 3SXSPengidentifikasiAliasBMX, ETK, PSCTK2, PSCTK3, BMX non-receptor tyrosine kinaseID eksternalOMIM: 300101 MGI: 1101778 HomoloGene: 20411 GeneCards: BMX Lokasi gen (Tikus)Kr.X chromosome (tikus)[1]PitaX|X F5Awal162,975,838 bp[1]Akhir163,041,189 bp[1]Pola ekspresi RNAReferensi data ekspresi selengkapnyaOntologi genFungsi molekuler• transferase activity• nucleotide bi…

Beauty and the BeastPoster TeatrikalSutradaraChristophe GansProduserRichard GrandpierreDitulis olehChristophe GansSandra Vo-AnhBerdasarkanSi Cantik dan Buruk Rupa olehGabrielle-Suzanne Barbot de VilleneuvePemeranVincent CasselLéa SeydouxAndré DussollierPenata musikPierre AdenotSinematograferChristophe BeaucarnePenyuntingSébastien PrangèrePerusahaanproduksiEskwadPathéStudio BabelsbergDistributorPathéTanggal rilis 12 Februari 2014 (2014-02-12) (Prancis) 14 Februari 2014&#…

Cari artikel bahasa  Cari berdasarkan kode ISO 639 (Uji coba)  Kolom pencarian ini hanya didukung oleh beberapa antarmuka Halaman bahasa acak Bahasa Numidia Timur Libya Kuno Dituturkan diProvinsi Numidia dan AfrikaEtnisMaesuliaEraSekitar 200 SM Rumpun bahasaAfroasiatik ? Libiko-BerberNumidia Timur Sistem penulisanLibiko-Berber (Proto-Tifinagh)Kode bahasaISO 639-3nxmLINGUIST ListnxmGlottolognumi1241[1] Status konservasi Punah EXSingkatan dari Extinct (Punah)Terancam CRSingk…

Taken 2Theatrical release posterSutradaraOlivier MegatonProduserLuc BessonDitulis olehLuc BessonRobert Mark KamenPemeranLiam NeesonMaggie GraceFamke JanssenRade ŠerbedžijaPenata musikNathaniel Méchaly [fr]SinematograferRomain LacourbasPenyuntingCamille DelamarreVincent TabaillonPerusahaanproduksiEuropaCorpGrive ProductionsCanal+M6 FilmsCiné+Dune EntertainmentDistributor20th Century Fox (US) EuropaCorp (France)Tanggal rilis 07 September 2012 (2012-09-07) (Deauville…

Location of Cass County in Indiana This is a list of the National Register of Historic Places listings in Cass County, Indiana. This is intended to be a complete list of the properties and districts on the National Register of Historic Places in Cass County, Indiana, United States. Latitude and longitude coordinates are provided for many National Register properties and districts; these locations may be seen together in a map.[1] There are 16 properties and districts listed on the Nation…

Untuk provinsi yang bernama sama, lihat Provinsi Santiago de Cuba.Santiago de CubaMunisipalitasNegaraKubaProvinsiSantiago de CubaBerdiri1514Luas • Total1.023,8 km2 (3,953 sq mi)Ketinggian82 m (269 ft)Populasi (2004)[1] • Total472.255 • Kepadatan461,3/km2 (11,950/sq mi)Kode area telepon+53-22Situs webSantiago.cu Santiago de Cuba adalah sebuah kota di Kuba yang merupakan ibu kota provinsi Santiago de Cuba, 870 kilometer…

Ancient granite-greenstone terrane in South Africa Location of the Barberton Greenstone Belt. The Barberton Greenstone Belt is situated on the eastern edge of the Kaapvaal Craton in South Africa. It is known for its gold mineralisation and for its komatiites, an unusual type of ultramafic volcanic rock named after the Komati River that flows through the belt. Some of the oldest exposed rocks on Earth (greater than 3.6 Ga) are located in the Barberton Greenstone Belt of the Eswatini–Barberton a…

Canadian evolutionary psychologist Gad SaadSaad in 2010Born (1964-10-13) 13 October 1964 (age 59)Beirut, LebanonNationalityLebanese, CanadianEducationMcGill University (BSc, MBA)Cornell University (MSc, PhD)Scientific careerFieldsMarketing, consumer behaviourInstitutionsConcordia UniversityThesisThe adaptive use of stopping policies in sequential consumer choice (1994)Doctoral advisorEdward Russo YouTube informationChannel GadSaad Subscribers298 thousand[1]Total views33.37…

Mandarin Oriental Hotel GroupMandarin Oriental JakartaJenisUmum (SGX: M04 LSE: MDO)IndustriPenginapan, pariwisataDidirikan1963; 61 tahun lalu (1963)Kantorpusat33-35 Reid Street, Hamilton, BermudaCabang38 (2024)ProdukHotelPendapatanUS$404 juta (2006)Laba operasiUS$122 juta (2006)Laba bersihUS$80 juta (2006)IndukJardine MathesonSitus webwww.mandarinoriental.com Mandarin Oriental Hotel Group (MOHG) adalah perusahaan perhotelan yang merupakan anak usaha Jardine Matheson. Didirikan di Hong Kong …

Private residence in Rhode Island, USMiramarPostcard image of Miramar circa 1915General informationTypePrivate residenceArchitectural styleFrench neoclassicalLocationAquidneck Island, Newport, Rhode Island, USAddress646 Bellevue AvenueCoordinates41°27′30″N 71°18′17″W / 41.458285°N 71.304767°W / 41.458285; -71.304767Construction started1911Completed1915InauguratedAugust 20, 1915ClientGeorge & Eleanor Elkins WidenerTechnical detailsFloor count3Floor area30,0…

Bride WarsPoster bioskopSutradaraGary WinickProduserKate HudsonMatt LuberAlan RichePeter RicheJulie YornDitulis olehGreg DePaulJune RaphaelCasey WilsonKaren McCullah LutzKirsten SmithPemeranKate HudsonAnne HathawayCandice BergenChris PrattBryan GreenbergSteve HoweyKristen JohnstonPenata musikEdward ShearmurPerusahaanproduksiRegency EnterprisesNew RegencyFirm FilmsDistributor20th Century FoxTanggal rilis9 Januari 2009Durasi89 menitNegaraAmerika SerikatBahasaInggrisAnggaran$30 jutaPendapatan…

  هذه المقالة عن العقلانية في الفلسفة. لمفاهيم أخرى للعقلانية، طالع عقلانية (توضيح). عقلانيةمعلومات عامةجزء من مصطلحات علم النفس النقيض تجريبية تعديل - تعديل مصدري - تعديل ويكي بيانات رينيه ديكارتباروخ سبينوزاغوتفريد لايبنتس في الفلسفة، العقلانية هي النظرة المعرفية ال…

Chemical compound EA-3580Identifiers IUPAC name (1-methylpiperidin-4-yl) 2-cyclobutyl-2-hydroxy-2-phenylacetate CAS Number54390-94-2 YPubChem CID171342ChemSpider149791UNIIRF3SNA5PA2CompTox Dashboard (EPA)DTXSID30969510 Chemical and physical dataFormulaC18H25NO3Molar mass303.402 g·mol−13D model (JSmol)Interactive image SMILES c3ccccc3C(O)(C2CCC2)C(=O)OC1CCN(C)CC1 InChI InChI=1S/C18H25NO3/c1-19-12-10-16(11-13-19)22-17(20)18(21,15-8-5-9-15)14-6-3-2-4-7-14/h2-4,6-7,15-16,21H,5,8-13H2,1H…

Marcello Lippi Lippi nel 2010 Nazionalità  Italia Altezza 182 cm Peso 78 kg Calcio Ruolo Allenatore (ex difensore) Termine carriera 1982 - giocatore22 ottobre 2020 - allenatore Carriera Giovanili 1963-1969 Viareggio Squadre di club1 1969 Sampdoria0 (0)1969-1970→  Savona21 (2)1970-1979 Sampdoria274 (5)1979-1981 Pistoiese45 (0)1981-1982 Lucchese23 (0) Nazionale 1971 Italia U-232 (0) Carriera da allenatore 1982-1985 SampdoriaGiovanili1985-1986 Pontede…

Voce principale: Unione Sportiva Dilettantistica Arezzo. Unione Sportiva ArezzoStagione 1971-1972 Sport calcio Squadra Arezzo Allenatore Dino Ballacci Presidente Luigi Montaini Serie B15º posto Coppa ItaliaPrimo turno Maggiori presenzeCampionato: Tonani (38) Miglior marcatoreCampionato: Incerti (9) 1970-1971 1972-1973 Si invita a seguire il modello di voce Questa voce raccoglie le informazioni riguardanti l'Unione Sportiva Arezzo nelle competizioni ufficiali della stagione 1971-1972. Indic…

Reform Jewish synagogue in San Rafael, California, US This article uses bare URLs, which are uninformative and vulnerable to link rot. Please consider converting them to full citations to ensure the article remains verifiable and maintains a consistent citation style. Several templates and tools are available to assist in formatting, such as reFill (documentation) and Citation bot (documentation). (September 2022) (Learn how and when to remove this template message) Congregation Rodef SholomThe …

2020 US science fiction thriller film by Adam Mason SongbirdTheatrical release posterDirected byAdam MasonWritten by Adam Mason Simon Boyes Produced by Michael Bay Marcei A. Brown Jason Clark Jeanette Volturno Adam Goodman Andrew Sugerman Eben Davidson Starring KJ Apa Sofia Carson Craig Robinson Bradley Whitford Peter Stormare Alexandra Daddario Paul Walter Hauser Demi Moore CinematographyJacques JouffretEdited byGeoffrey O'BrienMusic byLorne BalfeProductioncompanies Invisible Narratives Platinu…

Constituency of Madhya Pradesh legislative assembly in India Indore-2Constituency No. 205 for the Madhya Pradesh Legislative AssemblyConstituency detailsCountryIndiaRegionCentral IndiaStateMadhya PradeshDistrictIndoreLS constituencyIndoreEstablished1967ReservationNoneMember of Legislative Assembly16th Madhya Pradesh Legislative AssemblyIncumbent Ramesh Mendola PartyBharatiya Janta Party Indore-2 Assembly constituency is one of the 230 Vidhan Sabha (Legislative Assembly) constituencies of Madhya …

MöslestadionThe Möslestadion in FreiburgLocationFreiburg, GermanyCapacity5,400 (1000 in covered seating area)SurfaceGrassConstructionOpenedOctober 1st, 1922RenovatedJune–August, 2013TenantsSC Freiburg second men's teamFreiburg Soccer SchoolSC Freiburg (women) The Möslestadion is a soccer stadium in Freiburg im Breisgau. The stadium used to be home to the Freiburger FC. Today it is used by the second men's team and the Freiburg soccer school of the SC Freiburg. Since the 2008/09 season, the …

Kembali kehalaman sebelumnya