On Exponential-time Hypotheses, Derandomization, and Circuit Lower Bounds

Lijie Chen, Ron D. Rothblum, Roei Tell, Eylon Yogev

Research output: Contribution to journalArticlepeer-review

Abstract

The Exponential-Time Hypothesis (ETH) is a strengthening of the ĝ conjecture, stating that 3-SAT on n variables cannot be solved in (uniform) time 2ϵċn, for some ϵ > 0. In recent years, analogous hypotheses that are "exponentially strong"forms of other classical complexity conjectures (such as ĝ ĝ., or coĝ ) have also been introduced and have become widely influential.In this work, we focus on the interaction of exponential-time hypotheses with the fundamental and closely related questions of derandomization and circuit lower bounds. We show that even relatively mild variants of exponential-time hypotheses have far-reaching implications to derandomization, circuit lower bounds, and the connections between the two. Specifically, we prove that:(1)The Randomized Exponential-Time Hypothesis (rETH) implies that ĝ., can be simulated on "average-case"in deterministic (nearly-)polynomial-time (i.e., in time 2Õ(log(n)) = nloglog(n)O(1)). The derandomization relies on a conditional construction of a pseudorandom generator with near-exponential stretch (i.e., with seed length Õ(log (n))); this significantly improves the state-of-the-art in uniform "hardness-to-randomness"results, which previously only yielded pseudorandom generators with sub-exponential stretch from such hypotheses.(2)The Non-Deterministic Exponential-Time Hypothesis (NETH) implies that derandomization of ĝ., is completely equivalent to circuit lower bounds against ĝ.,°, and in particular that pseudorandom generators are necessary for derandomization. In fact, we show that the foregoing equivalence follows from a very weak version of NETH, and we also show that this very weak version is necessary to prove a slightly stronger conclusion that we deduce from it.Last, we show that disproving certain exponential-time hypotheses requires proving breakthrough circuit lower bounds. In particular, if CircuitSAT for circuits over n bits of size poly(n) can be solved by probabilistic algorithms in time 2n/polylog(n), then ĝ.,ĝ.,° does not have circuits of quasilinear size.

Original languageEnglish
Article number3593581
JournalJournal of the ACM
Volume70
Issue number4
DOIs
StatePublished - 12 Aug 2023

Bibliographical note

Publisher Copyright:
© 2023 Copyright held by the owner/author(s). Publication rights licensed to ACM.

Funding

Lijie Chen is supported by NSF CCF-1741615, NSF CCF-2127597, a Google Faculty Research Award, an IBM Fellowship, and a Miller Research Fellowship. Part of this work was done while Lijie Chen was at MIT. Ron Rothblum is supported in part by a Milgrom family grant, by the Israeli Science Foundation (Grant No. 1262/18), the Technion Hiroshi Fujiwara cyber center, and by the European Union (ERC, FASTPROOF, 101041208). Roei Tell is supported by funding from the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (grant agreement No. 819702), and by the National Science Foundation under grant number CCF-1445755 and under grant number CCF-1900460. Part of this work was done while Roei Tell was at the Weizmann Institute of Science and at MIT. Eylon Yogev is supported by an Alon Young Faculty Fellowship, by the Israel Science Foundation (Grant No. 2893/22), and by the BIU Center for Research in Applied Cryptography and Cyber Security in conjunction with the Israel National Cyber Bureau in the Prime Minister’s Office. Lijie Chen is supported by NSF CCF-1741615, NSF CCF-2127597, a Google Faculty Research Award, an IBM Fellowship, and a Miller Research Fellowship. Part of this work was done while Lijie Chen was at MIT. Ron Rothblum is supported in part by a Milgrom family grant, by the Israeli Science Foundation (Grant No. 1262/18), the Technion Hiroshi Fujiwara cyber center, and by the European Union (ERC, FASTPROOF, 101041208). Roei Tell is supported by funding from the European Research Council (ERC) under the European Union's Horizon 2020 research and innovation programme (grant agreement No. 819702), and by the National Science Foundation under grant number CCF-1445755 and under grant number CCF-1900460. Part of this work was done while Roei Tell was at the Weizmann Institute of Science and at MIT. Eylon Yogev is supported by an Alon Young Faculty Fellowship, by the Israel Science Foundation (Grant No. 2893/22), and by the BIU Center for Research in Applied Cryptography and Cyber Security in conjunction with the Israel National Cyber Bureau in the Prime Minister's Office

FundersFunder number
Alon Young Faculty Fellowship
FASTPROOF101041208
Technion Hiroshi Fujiwara cyber center
National Science FoundationCCF-1900460, CCF-2127597, CCF-1445755, CCF-1741615
International Business Machines Corporation
Google
Massachusetts Institute of Technology
Horizon 2020 Framework Programme
European Commission
European Commission
Weizmann Institute of Science
Israel Science Foundation1262/18, 2893/22
Horizon 2020819702

    Keywords

    • Additional Key Words and PhrasesExponential-time hypothesis
    • circuit lower bounds
    • derandomization

    Fingerprint

    Dive into the research topics of 'On Exponential-time Hypotheses, Derandomization, and Circuit Lower Bounds'. Together they form a unique fingerprint.

    Cite this