Abstract
The Exponential-Time Hypothesis (ETH) is a strengthening of the ĝ conjecture, stating that 3-SAT on n variables cannot be solved in (uniform) time 2ϵċn, for some ϵ > 0. In recent years, analogous hypotheses that are "exponentially strong"forms of other classical complexity conjectures (such as ĝ ĝ., or coĝ ) have also been introduced and have become widely influential.In this work, we focus on the interaction of exponential-time hypotheses with the fundamental and closely related questions of derandomization and circuit lower bounds. We show that even relatively mild variants of exponential-time hypotheses have far-reaching implications to derandomization, circuit lower bounds, and the connections between the two. Specifically, we prove that:(1)The Randomized Exponential-Time Hypothesis (rETH) implies that ĝ., can be simulated on "average-case"in deterministic (nearly-)polynomial-time (i.e., in time 2Õ(log(n)) = nloglog(n)O(1)). The derandomization relies on a conditional construction of a pseudorandom generator with near-exponential stretch (i.e., with seed length Õ(log (n))); this significantly improves the state-of-the-art in uniform "hardness-to-randomness"results, which previously only yielded pseudorandom generators with sub-exponential stretch from such hypotheses.(2)The Non-Deterministic Exponential-Time Hypothesis (NETH) implies that derandomization of ĝ., is completely equivalent to circuit lower bounds against ĝ.,°, and in particular that pseudorandom generators are necessary for derandomization. In fact, we show that the foregoing equivalence follows from a very weak version of NETH, and we also show that this very weak version is necessary to prove a slightly stronger conclusion that we deduce from it.Last, we show that disproving certain exponential-time hypotheses requires proving breakthrough circuit lower bounds. In particular, if CircuitSAT for circuits over n bits of size poly(n) can be solved by probabilistic algorithms in time 2n/polylog(n), then ĝ.,ĝ.,° does not have circuits of quasilinear size.
Original language | English |
---|---|
Article number | 3593581 |
Journal | Journal of the ACM |
Volume | 70 |
Issue number | 4 |
DOIs | |
State | Published - 12 Aug 2023 |
Bibliographical note
Publisher Copyright:© 2023 Copyright held by the owner/author(s). Publication rights licensed to ACM.
Funding
Lijie Chen is supported by NSF CCF-1741615, NSF CCF-2127597, a Google Faculty Research Award, an IBM Fellowship, and a Miller Research Fellowship. Part of this work was done while Lijie Chen was at MIT. Ron Rothblum is supported in part by a Milgrom family grant, by the Israeli Science Foundation (Grant No. 1262/18), the Technion Hiroshi Fujiwara cyber center, and by the European Union (ERC, FASTPROOF, 101041208). Roei Tell is supported by funding from the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (grant agreement No. 819702), and by the National Science Foundation under grant number CCF-1445755 and under grant number CCF-1900460. Part of this work was done while Roei Tell was at the Weizmann Institute of Science and at MIT. Eylon Yogev is supported by an Alon Young Faculty Fellowship, by the Israel Science Foundation (Grant No. 2893/22), and by the BIU Center for Research in Applied Cryptography and Cyber Security in conjunction with the Israel National Cyber Bureau in the Prime Minister’s Office. Lijie Chen is supported by NSF CCF-1741615, NSF CCF-2127597, a Google Faculty Research Award, an IBM Fellowship, and a Miller Research Fellowship. Part of this work was done while Lijie Chen was at MIT. Ron Rothblum is supported in part by a Milgrom family grant, by the Israeli Science Foundation (Grant No. 1262/18), the Technion Hiroshi Fujiwara cyber center, and by the European Union (ERC, FASTPROOF, 101041208). Roei Tell is supported by funding from the European Research Council (ERC) under the European Union's Horizon 2020 research and innovation programme (grant agreement No. 819702), and by the National Science Foundation under grant number CCF-1445755 and under grant number CCF-1900460. Part of this work was done while Roei Tell was at the Weizmann Institute of Science and at MIT. Eylon Yogev is supported by an Alon Young Faculty Fellowship, by the Israel Science Foundation (Grant No. 2893/22), and by the BIU Center for Research in Applied Cryptography and Cyber Security in conjunction with the Israel National Cyber Bureau in the Prime Minister's Office
Funders | Funder number |
---|---|
Alon Young Faculty Fellowship | |
FASTPROOF | 101041208 |
Technion Hiroshi Fujiwara cyber center | |
National Science Foundation | CCF-1900460, CCF-2127597, CCF-1445755, CCF-1741615 |
International Business Machines Corporation | |
Massachusetts Institute of Technology | |
Horizon 2020 Framework Programme | |
European Commission | |
European Commission | |
Weizmann Institute of Science | |
Israel Science Foundation | 1262/18, 2893/22 |
Horizon 2020 | 819702 |
Keywords
- Additional Key Words and PhrasesExponential-time hypothesis
- circuit lower bounds
- derandomization