Circuit principles and weak pigeonhole variants

  • Authors:
  • Chris Pollett;Norman Danner

  • Affiliations:
  • Department of Computer Science, San Jose State University, San Jose CA 95192, United States;Department of Mathematics and Computer Science, Wesleyan University, Middletown, CT 06549, United States

  • Venue:
  • Theoretical Computer Science
  • Year:
  • 2007

Quantified Score

Hi-index 5.23

Visualization

Abstract

This paper considers the relational versions of the surjective, partial surjective, and multifunction weak pigeonhole principles for PV, @?"1^b, @?"1^b, and B(@?"1^b) formulas as well as relativizations of these formulas to higher levels of the bounded arithmetic hierarchy. We show that the partial surjective weak pigeonhole principle for @?"1^b formulas implies that for each k there is a string of length 2^2^n^^^k which is hard to block-recognize by circuits of size n^k. These principles in turn imply the partial surjective principle for @?"1^b formulas. We show that the surjective weak pigeonhole principle for B(@?"1^b) formulas in S"2^1 implies our hard-string principle which in turn implies the surjective weak pigeonhole principle for @?"1^b formulas. We introduce a class of predicates corresponding to poly-log length iterates of polynomial time computable predicates and show that over S"2^1, the multifunction weak pigeonhole principle for such predicates is equivalent to an ''iterative'' circuit block-recognition principle. A consequence of this is that if S"2^1 proves this principle then RSA is vulnerable to polynomial time attacks.