Skip to main content

Showing 1–27 of 27 results for author: Raz, R

.
  1. arXiv:2307.11083  [pdf, ps, other

    quant-ph cs.CC

    Quantum Logspace Computations are Verifiable

    Authors: Uma Girish, Ran Raz, Wei Zhan

    Abstract: In this note, we observe that quantum logspace computations are verifiable by classical logspace algorithms, with unconditional security. More precisely, every language in BQL has an (information-theoretically secure) streaming proof with a quantum logspace prover and a classical logspace verifier. The prover provides a polynomial-length proof that is streamed to the verifier. The verifier has a r… ▽ More

    Submitted 20 July, 2023; originally announced July 2023.

  2. arXiv:2307.09524  [pdf, other

    cs.CC math.HO

    On the works of Avi Wigderson

    Authors: Boaz Barak, Yael Kalai, Ran Raz, Salil Vadhan, Nisheeth K. Vishnoi

    Abstract: This is an overview of some of the works of Avi Wigderson, 2021 Abel prize laureate. Wigderson's contributions span many fields of computer science and mathematics. In this survey we focus on four subfields: cryptography, pseudorandomness, computational complexity lower bounds, and the theory of optimization over symmetric manifolds. Even within those fields, we are not able to mention all of Wigd… ▽ More

    Submitted 18 July, 2023; originally announced July 2023.

    Comments: To appear in The Abel Laureates 2018-2022. Editors: H. Holden, R. Piene

  3. arXiv:2303.16413  [pdf, ps, other

    cs.CC cs.DS

    Certified Hardness vs. Randomness for Log-Space

    Authors: Edward Pyne, Ran Raz, Wei Zhan

    Abstract: Let $\mathcal{L}$ be a language that can be decided in linear space and let $ε>0$ be any constant. Let $\mathcal{A}$ be the exponential hardness assumption that for every $n$, membership in $\mathcal{L}$ for inputs of length~$n$ cannot be decided by circuits of size smaller than $2^{εn}$. We prove that for every function $f :\{0,1\}^* \rightarrow \{0,1\}$, computable by a randomized logspace algor… ▽ More

    Submitted 28 March, 2023; originally announced March 2023.

    Comments: Abstract shortened to fit arXiv requirements

  4. arXiv:2303.00209  [pdf, ps, other

    quant-ph cs.CC

    Memory-Sample Lower Bounds for Learning with Classical-Quantum Hybrid Memory

    Authors: Qipeng Liu, Ran Raz, Wei Zhan

    Abstract: In a work by Raz (J. ACM and FOCS 16), it was proved that any algorithm for parity learning on $n$ bits requires either $Ω(n^2)$ bits of classical memory or an exponential number (in~$n$) of random samples. A line of recent works continued that research direction and showed that for a large collection of classical learning tasks, either super-linear classical memory size or super-polynomially many… ▽ More

    Submitted 28 February, 2023; originally announced March 2023.

    Comments: Accepted to STOC'23

  5. arXiv:2204.00858  [pdf, ps, other

    cs.CC

    Polynomial Bounds On Parallel Repetition For All 3-Player Games With Binary Inputs

    Authors: Uma Girish, Kunal Mittal, Ran Raz, Wei Zhan

    Abstract: We prove that for every 3-player (3-prover) game $\mathcal G$ with value less than one, whose query distribution has the support $\mathcal S = \{(1,0,0), (0,1,0), (0,0,1)\}$ of hamming weight one vectors, the value of the $n$-fold parallel repetition $\mathcal G^{\otimes n}$ decays polynomially fast to zero; that is, there is a constant $c = c(\mathcal G)>0$ such that the value of the game… ▽ More

    Submitted 2 April, 2022; originally announced April 2022.

  6. arXiv:2202.06826  [pdf, ps, other

    cs.CC

    Parallel Repetition For All 3-Player Games Over Binary Alphabet

    Authors: Uma Girish, Justin Holmgren, Kunal Mittal, Ran Raz, Wei Zhan

    Abstract: We prove that for every 3-player game with binary questions and answers and value $<1$, the value of the $n$-fold parallel repetition of the game decays polynomially fast to 0. That is, for every such game, there exists a constant $c>0$, such that the value of the $n$-fold parallel repetition of the game is at most $n^{-c}$. Along the way to proving this theorem, we prove two additional parallel r… ▽ More

    Submitted 14 February, 2022; originally announced February 2022.

  7. arXiv:2107.06156  [pdf, ps, other

    cs.CC

    Parallel Repetition for the GHZ Game: A Simpler Proof

    Authors: Uma Girish, Justin Holmgren, Kunal Mittal, Ran Raz, Wei Zhan

    Abstract: We give a new proof of the fact that the parallel repetition of the (3-player) GHZ game reduces the value of the game to zero polynomially quickly. That is, we show that the value of the $n$-fold GHZ game is at most $n^{-Ω(1)}$. This was first established by Holmgren and Raz [HR20]. We present a new proof of this theorem that we believe to be simpler and more direct. Unlike most previous works on… ▽ More

    Submitted 13 July, 2021; originally announced July 2021.

  8. arXiv:2107.02320  [pdf, ps, other

    cs.LG cs.CC

    Memory-Sample Lower Bounds for Learning Parity with Noise

    Authors: Sumegha Garg, Pravesh K. Kothari, Pengda Liu, Ran Raz

    Abstract: In this work, we show, for the well-studied problem of learning parity under noise, where a learner tries to learn $x=(x_1,\ldots,x_n) \in \{0,1\}^n$ from a stream of random linear equations over $\mathrm{F}_2$ that are correct with probability $\frac{1}{2}+\varepsilon$ and flipped with probability $\frac{1}{2}-\varepsilon$, that any learning algorithm requires either a memory of size… ▽ More

    Submitted 5 July, 2021; originally announced July 2021.

    Comments: 19 pages. To appear in RANDOM 2021. arXiv admin note: substantial text overlap with arXiv:1708.02639

    ACM Class: F.2.3

  9. arXiv:2106.11877  [pdf, ps, other

    quant-ph cs.CC

    Eliminating Intermediate Measurements using Pseudorandom Generators

    Authors: Uma Girish, Ran Raz

    Abstract: We show that quantum algorithms of time $T$ and space $S\ge \log T$ with unitary operations and intermediate measurements can be simulated by quantum algorithms of time $T \cdot \mathrm{poly} (S)$ and space $ {O}(S\cdot \log T)$ with unitary operations and without intermediate measurements. The best results prior to this work required either $Ω(T)$ space (by the deferred measurement principle) or… ▽ More

    Submitted 27 August, 2021; v1 submitted 22 June, 2021; originally announced June 2021.

  10. arXiv:2011.09093  [pdf, ps, other

    cs.CC

    Block Rigidity: Strong Multiplayer Parallel Repetition implies Super-Linear Lower Bounds for Turing Machines

    Authors: Kunal Mittal, Ran Raz

    Abstract: We prove that a sufficiently strong parallel repetition theorem for a special case of multiplayer (multiprover) games implies super-linear lower bounds for multi-tape Turing machines with advice. To the best of our knowledge, this is the first connection between parallel repetition and lower bounds for time complexity and the first major potential implication of a parallel repetition theorem with… ▽ More

    Submitted 26 November, 2020; v1 submitted 18 November, 2020; originally announced November 2020.

    Comments: 17 pages, ITCS 2021

  11. arXiv:2009.01161  [pdf, ps, other

    cs.DS cs.CC

    Near-Quadratic Lower Bounds for Two-Pass Graph Streaming Algorithms

    Authors: Sepehr Assadi, Ran Raz

    Abstract: We prove that any two-pass graph streaming algorithm for the $s$-$t$ reachability problem in $n$-vertex directed graphs requires near-quadratic space of $n^{2-o(1)}$ bits. As a corollary, we also obtain near-quadratic space lower bounds for several other fundamental problems including maximum bipartite matching and (approximate) shortest path in undirected graphs. Our results collectively imply… ▽ More

    Submitted 13 April, 2023; v1 submitted 2 September, 2020; originally announced September 2020.

    Journal ref: 61st IEEE Annual Symposium on Foundations of Computer Science, FOCS 2020

  12. arXiv:2008.05059  [pdf, ps, other

    cs.CC quant-ph

    A Parallel Repetition Theorem for the GHZ Game

    Authors: Justin Holmgren, Ran Raz

    Abstract: We prove that parallel repetition of the (3-player) GHZ game reduces the value of the game polynomially fast to 0. That is, the value of the GHZ game repeated in parallel $t$ times is at most $t^{-Ω(1)}$. Previously, only a bound of $\approx \frac{1}{α(t)}$, where $α$ is the inverse Ackermann function, was known. The GHZ game was recently identified by Dinur, Harsha, Venkat and Yuen as a multi-p… ▽ More

    Submitted 11 August, 2020; originally announced August 2020.

    Comments: 22 pages, no figures

  13. arXiv:2007.03631  [pdf, ps, other

    cs.CC quant-ph

    Lower Bounds for XOR of Forrelations

    Authors: Uma Girish, Ran Raz, Wei Zhan

    Abstract: The Forrelation problem, introduced by Aaronson [A10] and Aaronson and Ambainis [AA15], is a well studied problem in the context of separating quantum and classical models. Variants of this problem were used to give exponential separations between quantum and classical query complexity [A10, AA15]; quantum query complexity and bounded-depth circuits [RT19]; and quantum and classical communication… ▽ More

    Submitted 7 July, 2020; originally announced July 2020.

  14. arXiv:2006.04880  [pdf, ps, other

    cs.CC quant-ph

    Quantum Logspace Algorithm for Powering Matrices with Bounded Norm

    Authors: Uma Girish, Ran Raz, Wei Zhan

    Abstract: We give a quantum logspace algorithm for powering contraction matrices, that is, matrices with spectral norm at most~1. The algorithm gets as an input an arbitrary $n\times n$ contraction matrix $A$, and a parameter $T \leq \mathrm{poly}(n)$ and outputs the entries of $A^T$, up to (arbitrary) polynomially small additive error. The algorithm applies only unitary operators, without intermediate meas… ▽ More

    Submitted 6 May, 2021; v1 submitted 8 June, 2020; originally announced June 2020.

  15. arXiv:2002.07235  [pdf, ps, other

    cs.CC cs.CR

    Time-Space Tradeoffs for Distinguishing Distributions and Applications to Security of Goldreich's PRG

    Authors: Sumegha Garg, Pravesh K. Kothari, Ran Raz

    Abstract: In this work, we establish lower-bounds against memory bounded algorithms for distinguishing between natural pairs of related distributions from samples that arrive in a streaming setting. In our first result, we show that any algorithm that distinguishes between uniform distribution on $\{0,1\}^n$ and uniform distribution on an $n/2$-dimensional linear subspace of $\{0,1\}^n$ with non-negligibl… ▽ More

    Submitted 17 February, 2020; originally announced February 2020.

    Comments: 35 pages

  16. arXiv:1911.02218  [pdf, ps, other

    quant-ph cs.CC

    Quantum versus Randomized Communication Complexity, with Efficient Players

    Authors: Uma Girish, Ran Raz, Avishay Tal

    Abstract: We study a new type of separation between quantum and classical communication complexity which is obtained using quantum protocols where all parties are efficient, in the sense that they can be implemented by small quantum circuits with oracle access to their inputs. More precisely, we give an explicit partial Boolean function that can be computed in the quantum-simultaneous-with-entanglement mode… ▽ More

    Submitted 6 November, 2019; originally announced November 2019.

  17. arXiv:1708.02639  [pdf, ps, other

    cs.LG cs.CC

    Extractor-Based Time-Space Lower Bounds for Learning

    Authors: Sumegha Garg, Ran Raz, Avishay Tal

    Abstract: A matrix $M: A \times X \rightarrow \{-1,1\}$ corresponds to the following learning problem: An unknown element $x \in X$ is chosen uniformly at random. A learner tries to learn $x$ from a stream of samples, $(a_1, b_1), (a_2, b_2) \ldots$, where for every $i$, $a_i \in A$ is chosen uniformly at random and $b_i = M(a_i,x)$. Assume that $k,\ell, r$ are such that any submatrix of $M$ of at least… ▽ More

    Submitted 8 August, 2017; originally announced August 2017.

  18. arXiv:1602.05161  [pdf, ps, other

    cs.LG cs.CC cs.CR

    Fast Learning Requires Good Memory: A Time-Space Lower Bound for Parity Learning

    Authors: Ran Raz

    Abstract: We prove that any algorithm for learning parities requires either a memory of quadratic size or an exponential number of samples. This proves a recent conjecture of Steinhardt, Valiant and Wager and shows that for some learning problems a large storage space is crucial. More formally, in the problem of parity learning, an unknown string $x \in \{0,1\}^n$ was chosen uniformly at random. A learner… ▽ More

    Submitted 16 February, 2016; originally announced February 2016.

  19. arXiv:1504.01780  [pdf, ps, other

    cs.GT

    Welfare Maximization with Limited Interaction

    Authors: Noga Alon, Noam Nisan, Ran Raz, Omri Weinstein

    Abstract: We continue the study of welfare maximization in unit-demand (matching) markets, in a distributed information model where agent's valuations are unknown to the central planner, and therefore communication is required to determine an efficient allocation. Dobzinski, Nisan and Oren (STOC'14) showed that if the market size is $n$, then $r$ rounds of interaction (with logarithmic bandwidth) suffice to… ▽ More

    Submitted 7 April, 2015; originally announced April 2015.

    ACM Class: C.2.4; F.2.3; H.1.1

  20. arXiv:1302.0418  [pdf, ps, other

    cs.CC cs.DS

    Arthur-Merlin Streaming Complexity

    Authors: Tom Gur, Ran Raz

    Abstract: We study the power of Arthur-Merlin probabilistic proof systems in the data stream model. We show a canonical $\mathcal{AM}$ streaming algorithm for a wide class of data stream problems. The algorithm offers a tradeoff between the length of the proof and the space complexity that is needed to verify it. As an application, we give an $\mathcal{AM}$ streaming algorithm for the \emph{Distinct Eleme… ▽ More

    Submitted 2 February, 2013; originally announced February 2013.

  21. arXiv:1203.0224  [pdf, ps, other

    cs.DS cs.CC

    Label Cover instances with large girth and the hardness of approximating basic k-spanner

    Authors: Michael Dinitz, Guy Kortsarz, Ran Raz

    Abstract: We study the well-known Label Cover problem under the additional requirement that problem instances have large girth. We show that if the girth is some $k$, the problem is roughly $2^{\log^{1-ε} n/k}$ hard to approximate for all constant $ε> 0$. A similar theorem was claimed by Elkin and Peleg [ICALP 2000], but their proof was later found to have a fundamental error. We use the new proof to show i… ▽ More

    Submitted 5 March, 2012; v1 submitted 1 March, 2012; originally announced March 2012.

    Comments: 16 pages, revised to add a reference

  22. arXiv:1011.4974  [pdf, ps, other

    math.LO cs.CC cs.LO

    The Surprise Examination Paradox and the Second Incompleteness Theorem

    Authors: Shira Kritchman, Ran Raz

    Abstract: We give a new proof for Godel's second incompleteness theorem, based on Kolmogorov complexity, Chaitin's incompleteness theorem, and an argument that resembles the surprise examination paradox. We then go the other way around and suggest that the second incompleteness theorem gives a possible resolution of the surprise examination paradox. Roughly speaking, we argue that the flaw in the derivation… ▽ More

    Submitted 22 November, 2010; originally announced November 2010.

    Comments: 8 pages

    Journal ref: Notices of the AMS volume 57 number 11 (December 2010), published by the American Mathematical Society

  23. Resolution over Linear Equations and Multilinear Proofs

    Authors: Ran Raz, Iddo Tzameret

    Abstract: We develop and study the complexity of propositional proof systems of varying strength extending resolution by allowing it to operate with disjunctions of linear equations instead of clauses. We demonstrate polynomial-size refutations for hard tautologies like the pigeonhole principle, Tseitin graph tautologies and the clique-coloring tautologies in these proof systems. Using the (monotone) inte… ▽ More

    Submitted 10 August, 2007; originally announced August 2007.

    Comments: 44 pages

    ACM Class: F.2.2; F.4.1

    Journal ref: Annals of Pure and Applied Logic , 155(3):194-224, 2008;

  24. arXiv:quant-ph/0611209  [pdf, ps, other

    quant-ph

    Exponential separations for one-way quantum communication complexity, with applications to cryptography

    Authors: Dmytro Gavinsky, Julia Kempe, Iordanis Kerenidis, Ran Raz, Ronald de Wolf

    Abstract: We give an exponential separation between one-way quantum and classical communication protocols for a partial Boolean function (a variant of the Boolean Hidden Matching Problem of Bar-Yossef et al.) Earlier such an exponential separation was known only for a relational problem. The communication problem corresponds to a \emph{strong extractor} that fails against a small amount of \emph{quantum}… ▽ More

    Submitted 13 February, 2008; v1 submitted 20 November, 2006; originally announced November 2006.

    Comments: 16 pages, improved version, supersedes quant-ph/0607173 and quant-ph/0607174 although some proofs are different

    Journal ref: Proc. 39th STOC, p. 516-525 (2007)

  25. arXiv:quant-ph/0607173  [pdf, ps, other

    quant-ph cs.CC

    The one-way communication complexity of the Boolean Hidden Matching Problem

    Authors: Iordanis Kerenidis, Ran Raz

    Abstract: We give a tight lower bound of Omega(\sqrt{n}) for the randomized one-way communication complexity of the Boolean Hidden Matching Problem [BJK04]. Since there is a quantum one-way communication complexity protocol of O(\log n) qubits for this problem, we obtain an exponential separation of quantum and classical one-way communication complexity for partial functions. A similar result was independ… ▽ More

    Submitted 25 July, 2006; originally announced July 2006.

  26. arXiv:quant-ph/0504075  [pdf, ps, other

    quant-ph

    Quantum Information and the PCP Theorem

    Authors: Ran Raz

    Abstract: We show how to encode $2^n$ (classical) bits $a_1,...,a_{2^n}$ by a single quantum state $|Ψ>$ of size O(n) qubits, such that: for any constant $k$ and any $i_1,...,i_k \in \{1,...,2^n\}$, the values of the bits $a_{i_1},...,a_{i_k}$ can be retrieved from $|Ψ>$ by a one-round Arthur-Merlin interactive protocol of size polynomial in $n$. This shows how to go around Holevo-Nayak's Theorem, using A… ▽ More

    Submitted 10 April, 2005; originally announced April 2005.

    Comments: 30 pages

  27. arXiv:cs/0304041  [pdf, ps, other

    cs.CC

    $P \ne NP$, propositional proof complexity, and resolution lower bounds for the weak pigeonhole principle

    Authors: Ran Raz

    Abstract: Recent results established exponential lower bounds for the length of any Resolution proof for the weak pigeonhole principle. More formally, it was proved that any Resolution proof for the weak pigeonhole principle, with $n$ holes and any number of pigeons, is of length $Ω(2^{n^ε})$, (for a constant $ε= 1/3$). One corollary is that certain propositional formulations of the statement $P \ne NP$ d… ▽ More

    Submitted 28 April, 2003; originally announced April 2003.

    MSC Class: 68Q15; 68Q17; 03F20; 03D15 ACM Class: F.1, F.4

    Journal ref: Proceedings of the ICM, Bei**g 2002, vol. 3, 685--696