Keyboard shortcuts

Press or to navigate between chapters

Press S or / to search in the book

Press ? to show this help

Press Esc to hide this help

Lecture 20

In-class notes: CS 505 Spring 2025 Lecture 20

Set Lower Bound IP

Building off of our discussion from last lecture, what we want is a set lower bound protocol. Let be some set that is known to both the prover and verifier , in the following sense.

  • knows explicitly.
  • can certify membership in with a certificate (e.g., like an NP language).

The set lower bound protocol, due to Goldwasser and Sipser, will be a public coin protocol that proves for some . The protocol will have the following guarantees:

  1. If , then accepts with probability at least ;
  2. If , then rejects with probability at least for any prover strategy .

Tool: Pairwise-Independent Hash Functions

Before we can describe the protocol, we need a technical tool. The protocol will require something called a pairwise-independent hash function family (also known as -wise independent or -universal).

Definition. Let be a family of functions . We say that is pairwise-indepedent if for all and for all , it holds that

Example. The following hash function family is pairwise independent. Let be a finite field of size .1 Define a hash function family as follows. In fact, we can define it as for any , where it is identical to except each function truncates the output to bits.

The Set LB Protocol

We now describe the protocol.

Setup.

  • Let for some be a set with efficient membership certification (i.e., an NP language).
  • Let be a parameter and let such that .
  • Let be a pairwise-independent hash function family.

Goal. If , then accepts with probability , and if , then rejects with probability .

Protocol.

  1. samples and . sends to .
  2. computes a certificate for the statement “”, and finds such that . sends to .
  3. outputs if and only if and is a valid certificate for .

Completeness and Soundness. Showing completeness and soundness of this protocol will rely on the following claim.

Claim. If , then for , we have where and , and the probability is taken to be uniform.

Proof. First, we show the upper bound. Notice that for any function , we have that ; that is, . In other words, it doesn’t matter which we sample from . This tells us

Now, we show the upper bound. For , let be the event “” Then, we can rewrite the probability as By the inclusion-exclusion principle, we can lower bound this as Recall that is the event “.” Therefore, is the event “” for . By definition, is drawn from a family of pairwise independent hash functions, so we have

Therefore, we have This establishes the lower bound.

So, what does this tell us? Well, as in the protocol, let be an integer such that .

  1. If , then we know that Note that this case corresponds to the honest prover case, and we can boost to greater than probability using a constant number of parallel repetitions.

  2. If , then Note that this case corresponds to any dishonest prover.

Final Public-coin GNI Protocol

With the set lower bound protocol, we can now give a public-coin protocol for GNI. To do so, we first modify the definition of the set from before to the following set. Here, is an automorphism of ; that is, is a permutation such that and is not the identity permutation. We need this set of pairs explicitly to handle the case when or have less than equivalent graphs. Notice also that membership in is again easy (i.e., polynomial-time) verifiable given some certificate (i.e., and some other permutation for isomorphism between and one of the graphs).

Under our new definition of , we have that if and if . Notice there is a factor of two difference between these two cases, so we will be able to use the set lower bound protocol to prove that .

Setup.

  • Set and choose such that .
  • Choose some pairwise independent hash function family , where is the maximum number of bits needed to encode any element .

The Protocol.

  1. The verifier samples and uniformly at random. sends to the prover .
  2. finds a pair such that , and computes such that or . sends to .
  3. checks (a) ; (b) , (c) ; and (d) or .

Note this is just the set lower bound protocol! In particular, we have shown:

Theorem. .

We’ll now define what the class is.

Arthur-Merlin Protocols

Arthur-Merlin protocols (named after the fabled King of England and his court Wizard) are simply public-coin interactive proofs, like we saw above.

Definition. For any , with the following properties:

  1. sends the first message and and exchange exactly messages;
  2. All of ’s messages are uniformly and independently random bits; and
  3. ’s output only depends on these random coins, ’s messages, and the common public input (i.e., has no hidden state to make its decision).

The following is commonly used notation for protocols.

Note that there is also the class , which is identical to except the prover speaks first.

Properties of AM Protocols

  1. does not see all the randomness sampled by all at once; it gets it in a round-by-round fashion.
  2. You are asked to show on your homework that . Notably, it also holds that .
  3. For all , it holds that . This is surprising since has a -like structure.
  4. For any slowly growing function (e.g., ), it is unknown if has any “nice” characterization.

Equivalence of Public- and Private-coin Protocols

By definition, . And on an intuitive level, it feels that private-coin protocols should have more power than public-coin ones. However, we have already seen an example where they are equivalent: the public-coin protocol for GNI. We’ll see in our next lecture that public- and private-coin protocols are equivalent. Namely, we’ll show the following.

Theorem. For all computable in time, it holds that .


  1. For example, .