
In
computational complexity theory
In theoretical computer science and mathematics, computational complexity theory focuses on classifying computational problems according to their resource usage, and relating these classes to each other. A computational problem is a task solved ...
, an interactive proof system is an
abstract machine
An abstract machine is a computer science theoretical model that allows for a detailed and precise analysis of how a computer system functions. It is analogous to a mathematical function in that it receives inputs and produces outputs based on p ...
that models
computation
Computation is any type of arithmetic or non-arithmetic calculation that follows a well-defined model (e.g., an algorithm).
Mechanical or electronic devices (or, historically, people) that perform computations are known as '' computers''. An esp ...
as the exchange of messages between two parties: a ''prover'' and a ''verifier''. The parties interact by exchanging messages in order to ascertain whether a given
string
String or strings may refer to:
*String (structure), a long flexible structure made from threads twisted together, which is used to tie, bind, or hang other objects
Arts, entertainment, and media Films
* ''Strings'' (1991 film), a Canadian anim ...
belongs to a
language
Language is a structured system of communication. The structure of a language is its grammar and the free components are its vocabulary. Languages are the primary means by which humans communicate, and may be conveyed through a variety of ...
or not. The prover possesses unlimited computational resources but cannot be trusted, while the verifier has bounded computation power but is assumed to be always honest. Messages are sent between the verifier and prover until the verifier has an answer to the problem and has "convinced" itself that it is correct.
All interactive proof systems have two requirements:
* Completeness: if the statement is true, the honest prover (that is, one following the protocol properly) can convince the honest verifier that it is indeed true.
* Soundness: if the statement is false, no prover, even if it doesn't follow the protocol, can convince the honest verifier that it is true, except with some small
probability
Probability is the branch of mathematics concerning numerical descriptions of how likely an Event (probability theory), event is to occur, or how likely it is that a proposition is true. The probability of an event is a number between 0 and ...
.
The specific nature of the system, and so the
complexity class
In computational complexity theory, a complexity class is a set of computational problems of related resource-based complexity. The two most commonly analyzed resources are time and memory.
In general, a complexity class is defined in terms ...
of languages it can recognize, depends on what sort of bounds are put on the verifier, as well as what abilities it is given—for example, most interactive proof systems depend critically on the verifier's ability to make random choices. It also depends on the nature of the messages exchanged—how many and what they can contain. Interactive proof systems have been found to have some important implications for traditional complexity classes defined using only one machine. The main complexity classes describing interactive proof systems are
AM and
IP.
Background
Every interactive proof system defines a
formal language
In logic, mathematics, computer science, and linguistics, a formal language consists of words whose letters are taken from an alphabet and are well-formed according to a specific set of rules.
The alphabet of a formal language consists of s ...
of strings
. Soundness of the proof system refers to the property that no prover can make the verifier accept for the wrong statement
except with some small probability. The upper bound of this probability is referred to as the soundness error of a proof system. More formally, for every prover
, and every
:
:
for some
.
As long as the soundness error is bounded by a polynomial fraction of the potential running time of the verifier (i.e.
), it is always possible to amplify soundness until the soundness error becomes
negligible function relative to the running time of the verifier. This is achieved by repeating the proof and accepting only if all proofs verify. After
repetitions, a soundness error
will be reduced to
.
Classes of interactive proofs
NP
The complexity class
NP may be viewed as a very simple proof system. In this system, the verifier is a deterministic, polynomial-time machine (a
P machine). The protocol is:
* The prover looks at the input and computes the solution using its unlimited power and returns a polynomial-size proof certificate.
* The verifier verifies that the certificate is valid in deterministic polynomial time. If it is valid, it accepts; otherwise, it rejects.
In the case where a valid proof certificate exists, the prover is always able to make the verifier accept by giving it that certificate. In the case where there is no valid proof certificate, however, the input is not in the language, and no prover, however malicious it is, can convince the verifier otherwise, because any proof certificate will be rejected.
Arthur–Merlin and Merlin–Arthur protocols
Although NP may be viewed as using interaction, it wasn't until 1985 that the concept of computation through interaction was conceived (in the context of complexity theory) by two independent groups of researchers. One approach, by
László Babai, who published "Trading group theory for randomness", defined the ''Arthur–Merlin'' (AM) class hierarchy. In this presentation, Arthur (the verifier) is a
probabilistic
Probability is the branch of mathematics concerning numerical descriptions of how likely an event is to occur, or how likely it is that a proposition is true. The probability of an event is a number between 0 and 1, where, roughly speaking, ...
, polynomial-time machine, while Merlin (the prover) has unbounded resources.
The class MA in particular is a simple generalization of the NP interaction above in which the verifier is probabilistic instead of deterministic. Also, instead of requiring that the verifier always accept valid certificates and reject invalid certificates, it is more lenient:
* Completeness: if the string is in the language, the prover must be able to give a certificate such that the verifier will accept with probability at least 2/3 (depending on the verifier's random choices).
* Soundness: if the string is not in the language, no prover, however malicious, will be able to convince the verifier to accept the string with probability exceeding 1/3.
This machine is potentially more powerful than an ordinary NP
interaction protocol
Within the fields of computer science and robotics, interaction protocols are possible communication scenarios between individual agents in multi-agent systems. Some protocols are described quite qualitatively (for example, many parts of the traffi ...
, and the certificates are no less practical to verify, since BPP algorithms are considered as abstracting practical computation (see
BPP).
Public coin protocol versus private coin protocol
In a ''public coin'' protocol, the random choices made by the verifier are made public. They remain private in a private coin protocol.
In the same conference where Babai defined his proof system for MA,
Shafi Goldwasser
en, Shafrira Goldwasser
, name = Shafi Goldwasser
, image = Shafi Goldwasser.JPG
, caption = Shafi Goldwasser in 2010
, birth_place = New York City, New York, U.S.
, birth_date =
, death_dat ...
,
Silvio Micali
Silvio Micali (born October 13, 1954) is an Italian computer scientist, professor at the Massachusetts Institute of Technology and the founder of Algorand. Micali's research centers on cryptography and information security.
In 2012, he receive ...
and
Charles Rackoff published a paper defining the interactive proof system IP
'f''(''n'') This has the same machines as the MA protocol, except that ''f''(''n'') ''rounds'' are allowed for an input of size ''n''. In each round, the verifier performs computation and passes a message to the prover, and the prover performs computation and passes information back to the verifier. At the end the verifier must make its decision. For example, in an IP
protocol, the sequence would be VPVPVPV, where V is a verifier turn and P is a prover turn.
In Arthur–Merlin protocols, Babai defined a similar class AM
'f''(''n'')which allowed ''f''(''n'') rounds, but he put one extra condition on the machine: the verifier must show the prover all the random bits it uses in its computation. The result is that the verifier cannot "hide" anything from the prover, because the prover is powerful enough to simulate everything the verifier does if it knows what random bits it used. This is called a ''public coin'' protocol, because the random bits ("coin flips") are visible to both machines. The IP approach is called a ''private coin'' protocol by contrast.
The essential problem with public coins is that if the prover wishes to maliciously convince the verifier to accept a string which is not in the language, it seems like the verifier might be able to thwart its plans if it can hide its internal state from it. This was a primary motivation in defining the IP proof systems.
In 1986, Goldwasser and
Sipser showed, perhaps surprisingly, that the verifier's ability to hide coin flips from the prover does it little good after all, in that an Arthur–Merlin public coin protocol with only two more rounds can recognize all the same languages. The result is that public-coin and private-coin protocols are roughly equivalent. In fact, as Babai shows in 1988, AM
'k''AM for all constant ''k'', so the IP
'k''have no advantage over AM.
To demonstrate the power of these classes, consider the
graph isomorphism problem
The graph isomorphism problem is the computational problem of determining whether two finite graphs are isomorphic.
The problem is not known to be solvable in polynomial time nor to be NP-complete, and therefore may be in the computational comp ...
, the problem of determining whether it is possible to permute the vertices of one graph so that it is identical to another graph. This problem is in NP, since the proof certificate is the permutation which makes the graphs equal. It turns out that the
complement
A complement is something that completes something else.
Complement may refer specifically to:
The arts
* Complement (music), an interval that, when added to another, spans an octave
** Aggregate complementation, the separation of pitch-clas ...
of the graph isomorphism problem, a co-NP problem not known to be in NP, has an AM algorithm and the best way to see it is via a private coins algorithm.
[O. Goldreich, S. Micali, A. Wigderson]
Proofs that yield nothing but their validity
''Journal of the ACM'', volume 38, issue 3, p.690–728. July 1991.
IP
Private coins may not be helpful, but more rounds of interaction are helpful. If we allow the probabilistic verifier machine and the all-powerful prover to interact for a polynomial number of rounds, we get the class of problems called IP.
In 1992,
Adi Shamir
Adi Shamir ( he, עדי שמיר; born July 6, 1952) is an Israeli cryptographer. He is a co-inventor of the Rivest–Shamir–Adleman (RSA) algorithm (along with Ron Rivest and Len Adleman), a co-inventor of the Feige–Fiat–Shamir identifica ...
revealed in one of the central results of complexity theory that IP equals
PSPACE, the class of problems solvable by an ordinary
deterministic Turing machine
A Turing machine is a mathematical model of computation describing an abstract machine that manipulates symbols on a strip of tape according to a table of rules. Despite the model's simplicity, it is capable of implementing any computer algor ...
in polynomial space.
QIP
If we allow the elements of the system to use
quantum computation
Quantum computing is a type of computation whose operations can harness the phenomena of quantum mechanics, such as superposition, interference, and entanglement. Devices that perform quantum computations are known as quantum computers. Thoug ...
, the system is called a quantum interactive proof system, and the corresponding complexity class is called QIP. A series of results culminated in a 2010 breakthrough that QIP = PSPACE.
Zero knowledge
Not only can interactive proof systems solve problems not believed to be in NP, but under assumptions about the existence of
one-way functions, a prover can convince the verifier of the solution without ever giving the verifier information about the solution. This is important when the verifier cannot be trusted with the full solution. At first it seems impossible that the verifier could be convinced that there is a solution when the verifier has not seen a certificate, but such proofs, known as
zero-knowledge proofs are in fact believed to exist for all problems in NP and are valuable in
cryptography
Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adve ...
. Zero-knowledge proofs were first mentioned in the original 1985 paper on IP by Goldwasser, Micali and Rackoff, but the extent of their power was shown by
Oded Goldreich,
Silvio Micali
Silvio Micali (born October 13, 1954) is an Italian computer scientist, professor at the Massachusetts Institute of Technology and the founder of Algorand. Micali's research centers on cryptography and information security.
In 2012, he receive ...
and
Avi Wigderson.
MIP
One goal of IP's designers was to create the most powerful possible interactive proof system, and at first it seems like it cannot be made more powerful without making the verifier more powerful and so impractical. Goldwasser et al. overcame this in their 1988 "Multi prover interactive proofs: How to remove intractability assumptions", which defines a variant of IP called MIP in which there are ''two'' independent provers.
[M. Ben-or, Shafi Goldwasser, J. Kilian, and A. Wigderson]
Multi prover interactive proofs: How to remove intractability assumptions
''Proceedings of the 20th ACM Symposium on Theory of Computing'', pp. 113–121. 1988. The two provers cannot communicate once the verifier has begun sending messages to them. Just as it's easier to tell if a criminal is lying if he and his partner are interrogated in separate rooms, it's considerably easier to detect a malicious prover trying to trick the verifier into accepting a string not in the language if there is another prover it can double-check with.
In fact, this is so helpful that Babai, Fortnow, and Lund were able to show that MIP =
NEXPTIME, the class of all problems solvable by a
nondeterministic
Nondeterminism or nondeterministic may refer to:
Computer science
* Nondeterministic programming
*Nondeterministic algorithm
In computer programming, a nondeterministic algorithm is an algorithm that, even for the same input, can exhibit diffe ...
machine in ''exponential time'', a very large class. NEXPTIME contains PSPACE, and is believed to strictly contain PSPACE. Adding a constant number of additional provers beyond two does not enable recognition of any more languages. This result paved the way for the celebrated
PCP theorem, which can be considered to be a "scaled-down" version of this theorem.
MIP also has the helpful property that zero-knowledge proofs for every language in NP can be described without the assumption of one-way functions that IP must make. This has bearing on the design of provably unbreakable cryptographic algorithms.
Moreover, a MIP protocol can recognize all languages in IP in only a constant number of rounds, and if a third prover is added, it can recognize all languages in NEXPTIME in a constant number of rounds, showing again its power over IP.
It is known that for any constant ''k'', a MIP system with ''k'' provers and polynomially many rounds can be turned into an equivalent system with only 2 provers, and a constant number of rounds.
PCP
While the designers of IP considered generalizations of Babai's interactive proof systems, others considered restrictions. A very useful interactive proof system is PCP(''f''(''n''), ''g''(''n'')), which is a restriction of MA where Arthur can only use ''f''(''n'') random bits and can only examine ''g''(''n'') bits of the proof certificate sent by Merlin (essentially using
random access
Random access (more precisely and more generally called direct access) is the ability to access an arbitrary element of a sequence in equal time or any datum from a population of addressable elements roughly as easily and efficiently as any othe ...
).
There are a number of easy-to-prove results about various PCP classes. , the class of polynomial-time machines with no randomness but access to a certificate, is just NP. , the class of polynomial-time machines with access to polynomially many random bits is co-
RP. Arora and Safra's first major result was that ; put another way, if the verifier in the NP protocol is constrained to choose only bits of the proof certificate to look at, this won't make any difference as long as it has random bits to use.
Furthermore, the
PCP theorem asserts that the number of proof accesses can be brought all the way down to a constant. That is, .
[Sanjeev Arora, C. Lund, R. Motwani, M. Sudan, and M. Szegedy]
Proof Verification and the Hardness of Approximation Problems
Proceedings of the 33rd IEEE Symposium on Foundations of Computer Science, pp. 13–22. 1992. They used this valuable characterization of NP to prove that
approximation algorithm
In computer science and operations research, approximation algorithms are efficient algorithms that find approximate solutions to optimization problems (in particular NP-hard problems) with provable guarantees on the distance of the returned solu ...
s do not exist for the optimization versions of certain
NP-complete
In computational complexity theory, a problem is NP-complete when:
# it is a problem for which the correctness of each solution can be verified quickly (namely, in polynomial time) and a brute-force search algorithm can find a solution by tryin ...
problems unless
P = NP
The P versus NP problem is a major unsolved problem in theoretical computer science. In informal terms, it asks whether every problem whose solution can be quickly verified can also be quickly solved.
The informal term ''quickly'', used above ...
. Such problems are now studied in the field known as
hardness of approximation In computer science, hardness of approximation is a field that studies the algorithmic complexity of finding near-optimal solutions to optimization problems.
Scope
Hardness of approximation complements the study of approximation algorithms by pro ...
.
See also
*
Oracle machine
*
Proof of knowledge
References
Textbooks
* Arora, Sanjeev; Barak, Boaz
"Complexity Theory: A Modern Approach" Cambridge University Press, March 2009.
* Section 10.4: Interactive Proof Systems, pp. 354–366.
* Section 19.2: Games against nature and interactive protocols, pp. 469–480.
External links
* Dexter Kozen
Interactive Proofs CS682 Spring 2004 lecture notes. Department of Computer Science, Cornell University.
*
Complexity Zoo
Scott Joel Aaronson (born May 21, 1981) is an American Theoretical computer science, theoretical computer scientist and David J. Bruton Jr. Centennial Professor of Computer Science at the University of Texas at Austin. His primary areas of res ...
:
*
MAMA'MAEXPMAE*
AMAMEXPAM intersect co-AMAM[polylog/nowiki>">olylog">AM
[polylog
/nowiki>br>coAM
BP•NP
*
QMA
QMA+
QMA(2)
QMAlog
QMAM
*
IP
MIP
IPP
QIP
QIP(2)
compIP
frIP
*
PCP(r(n),q(n))
* Larry Gonick.
Proof Positive?
. A comic strip about interactive proof systems.
{{DEFAULTSORT:Interactive Proof System
Computational complexity theory