Abstract
We prove three results on the dimension structure of complexity classes. (1) The Point-to-Set Principle, which has recently been used to prove several new theorems in fractal geometry, has resource-bounded instances. These instances characterize the resource-bounded dimension of a set X of languages in terms of the relativized resource-bounded dimensions of the individual elements of X, provided that the former resource bound is large enough to parametrize the latter. Thus for example, the dimension of a class X of languages in EXP is characterized in terms of the relativized p-dimensions of the individual elements of X. (2) Every language that is \({\leq ^{P}_{m}}\)-reducible to a p-selective set has p-dimension 0, and this fact holds relative to arbitrary oracles. Combined with a resource-bounded instance of the Point-to-Set Principle, this implies that if NP has positive dimension in EXP, then no quasipolynomial time selective language is \({\leq ^{P}_{m}}\)-hard for NP. (3) If the set of all disjoint pairs of NP languages has dimension 1 in the set of all disjoint pairs of EXP languages, then NP has positive dimension in EXP.
Similar content being viewed by others
Avoid common mistakes on your manuscript.
1 Introduction
Alan Selman was a pioneer and a leader in elucidating the structure of complexity classes. He initiated many of the most important concepts of structural complexity theory, he investigated them brilliantly, and he inspired generations of computer scientists to contribute to this endeavor.
Our objective in this paper is to show how resource-bounded dimension, which is a generalization of classical Hausdorff dimension, can extend Selman’s research program in fruitful new directions. To this end, we present three new results, one bringing the Point-to-Set Principle into complexity classes, one on dimension and p-selective sets, and one on dimension and disjoint NP pairs. The rest of this introduction motivates and explains these three results.
Hausdorff dimension, developed in 1919 [6, 16], is a scheme for assigning a dimension \({\dim }_{\mathrm {H}}(E)\) to every subset E of a given metric space. Assume for a moment that this metric space is a Euclidean space \(\mathbb {R}^{n}\). Then \({\dim }_{\mathrm {H}}(\mathbb {R}^{n}) = n\), and the Hausdorff dimension is monotone, i.e., \(E \subseteq F\) implies that \({\dim }_{\mathrm {H}}(E) \leq {\dim }_{\mathrm {H}}(F)\). For integers d = 0,…,n, subsets E of \(\mathbb {R}^{n}\) that are intuitively d-dimensional have \({\dim }_{\mathrm {H}}(E) = d\). However, every real number s ∈ [0,n] is the Hausdorff dimension of infinitely many (in fact, \(2^{|\mathbb {R}|}\) many) subsets of \(\mathbb {R}^{n}\). In general, \({\dim }_{\mathrm {H}}(E) < n\) implies that E is a Lebesgue measure 0 subset of \(\mathbb {R}^{n}\). (The converse does not hold.) Hausdorff dimension can thus be regarded as a measure of the “sizes” of Lebesgue measure 0 subsets of \(\mathbb {R}^{n}\). Hausdorff dimension has become a powerful tool for investigations in fractal geometry, probability theory, and other areas of mathematical analysis [2, 6, 35, 40].
We momentarily shift the focus of our discussion from Euclidean spaces \(\mathbb {R}^{n}\) to another metric space, the Cantor space C consisting of all decision problems, which are equivalently regarded as subsets of {0,1}∗ or as infinite binary sequences. At the beginning of the present century, the first author proved a theorem characterizing Hausdorff dimension in C in terms of betting strategies called gales, which are minor but convenient generalization of martingales. Based on this characterization, he introduced two related methods for effectivizing Hausdorff dimension, i.e., imposing computability or complexity constraints on these gales. The first of these methods [24], called resource-bounded dimension imposes Hausdorff dimension structure on complexity classes. For example this theory defines, for every subset X of C, a quasipolynomial-time (i.e., npolylogn-time) dimension \({\dim }_{\text {qp}}(X)\) in such a way that \({\dim }(X\mid \text {EXP}) = {\dim }_{\text {qp}}(X \cap \text {EXP})\) is a coherent notion of the dimension of X within the complexity class EXP = TIME(2polynomial). The second method [25], algorithmic dimension (also called constructive dimension or effective dimension) has to date been more widely investigated, partly because of its interactions with algorithmic randomness (i.e., Martin-Löf randomness [34]) and partly because of its applications to classical fractal geometry [29, 30]. Algorithmic dimension plays a motivating role in this paper, but resource-bounded dimension is our main topic.
Several recent results in algorithmic fractal dimensions are based on the 2017 Point-to-Set Principle introduced by the first two authors [28]. This principle is a family of theorems, the first of which says that, for any set \(E \subseteq \mathbb {R}^{n}\),
where \({\dim }^{A}(x)\) is the algorithmic dimension of the individual point x relative to the oracle A. This theorem completely characterizes the classical Hausdorff dimensions of sets E in terms of the relativized algorithmic dimensions of their elements x. The term “classical” here does not mean “old,” but rather refers to mathematical concepts and theorems that, like Hausdorff dimension, do not involve computability or logic in their formulations. Thus the left-hand side of (1.1) is classical, but the right-hand side, involving computability, is not. The characterization theorem (1.1) is called the Point-to-Set Principle for Hausdorff dimension, because it enables one to prove lower bounds on the Hausdorff dimensions of sets by reasoning about the relativized algorithmic dimensions of judiciously chosen individual points in those sets. The paper [28] also proved a second instance of the Point-to-Set Principle that characterizes another classical fractal dimension, the packing dimension [6], in a manner dual to (1.1). These instances of the Point-to-Set Principle have recently been used to prove several new theorems in classical fractal geometry [27, 31,32,33]. The authors also recently extended (1.1) and its dual from \(\mathbb {R}^{n}\) to arbitrary separable metric spaces and to Hausdorff and packing dimensions with very general gauge families [31].
The above instances of the Point-to-Set Principle characterize classical fractal dimensions of sets in terms of the relativized algorithmic dimensions of the individual elements of those sets. In Section 4 below, we prove more general instances of the Point-to-Set Principle that characterize the classical or perhaps somewhat effective dimensions of sets in C in terms of the relativized more effective dimensions of the individual elements of those sets. One example of this says that, for every subset X of C,
That is, we can replace the algorithmic dimension on the right-hand side of (1.1) by the more effective polynomial-time dimension. Another example characterizes the quasipolynomial-time dimension of each subset X of C by
i.e., in terms of the more effective polynomial-time dimensions of the individual elements A of X. The instances (1.2) and (1.3) are special cases of Theorem 4.2 in Section 4.
In 1979, Alan Selman adapted Jockusch’s computability-theoretic notion of semirecursive sets [19], creating the complexity-theoretic notion of p-selective sets [37]. Briefly, a decision problem \(A \subseteq \{0,1\}^{*}\) is p-selective, and we write A ∈p-SEL, if there is a polynomial-time algorithm that, given an ordered pair (x,y) of strings x,y ∈{0,1}∗, outputs a string z ∈{x,y} such that {x,y}∖ A≠∅ ⇒ z ∈ A. (We note that the terms“p-selective” and “P-selective” have both been widely used for this notion. In fact, both have been used in papers with Selman as an author.) Every set A ∈ P is clearly p-selective, but there are uncountably many p-selective sets, so the converse does not hold. There is an extensive literature on p-selective sets and the related notions that they have spawned. We especially refer the reader to the books by Hemaspaandra and Torenvliet [17] and Zimand [42] and the references therein.
Selman [37] proved that no p-selective set can be \({\leq ^{P}_{m}}\)-hard for EXP and that, if P≠NP, then no p-selective set can be \({\leq ^{P}_{m}}\)-hard for NP. In order to extend the class of provably intractable problems, the first author [21] defined a language H to be weakly \({\leq ^{P}_{m}}\)-hard for EXP if μ(Pm(H)∣EXP)≠ 0, i.e., if the set Pm(H) of languages A such that \(A{\leq ^{P}_{m}} H\) does not have measure 0 in EXP in the sense of resource-bounded measure [22, 23, 42]. Buhrman and Longpré [3] and, independently, Wang [41] proved that μ(Pm(p-SEL)∣EXP) = 0, where for a class \(X\subseteq \mathbf {C}\), \(P_{m}(X)=\bigcup _{H\in X}(P_{m}(H))\). It follows that no p-selective set can be weakly \({\leq ^{P}_{m}}\)-hard for EXP. (They in fact proved the stronger fact that this also holds for \(\leq ^{P}_{tt}\)-reductions.) See [42] for a host of related results.
After the development of resource-bounded dimension [24], Ambos-Spies, Merkle, Reimann, and Stephan [1] defined a language H to be partially \({\leq ^{P}_{m}}\)-hard for EXP if \({\dim }(P_{m}(H)\mid \text {EXP}) > 0\). It is clear that weak hardness implies partial hardness, and it was shown in [1] that the converse does not hold. In Section 5 we use Theorem 4.2 (i.e., the Point-to-Set Principle) to prove that \({\dim }(P_{m}(\text {qp}\)-SEL)∣EXP) = 0, where the set qp-SEL of qp-selective sets is the obvious quasipolynomial-time analog of p-SEL. This implies that no qp-selective set can be partially \({\leq ^{P}_{m}}\)-hard for EXP and that, if \({\dim }(\text {NP}\mid \text {EXP}) > 0\), then no qp-selective set can be \({\leq ^{P}_{m}}\)-hard for NP.
In 1984, Even, Selman, and Yacobi [5] defined a promise problem to be an ordered pair (A,B) of disjoint languages. A solution of a promise problem (A,B) is an algorithm or other device that decides any separator of (A,B), i.e., any language S such that \(A \subseteq S\) and S ∩ B = ∅. Intuitively, we are promised that every input will be an element of A ∪ B, so we are only required to correctly distinguish inputs in A from inputs in B.
A disjoint NP pair is a promise problem (A,B) with A,B ∈NP. Disjoint NP pairs were first investigated by Selman and collaborators to better understand public key cryptosystems [5, 13, 18, 38]. Razborov [36] later established a deep connection between disjoint NP pairs and propositional proof systems, associating with each propositional proof system a canonical disjoint NP pair. Glaßer, Selman, Sengupta, and Zhang [8,9,10,11] investigated this connection further, and it is now known that the degree structure of propositional proof systems under the natural notion of proof simulation is identical to the degree structure of disjoint NP pairs under reducibility of separators. See [12] for a survey of this and related results and [4] for more recent work.
In 2012, Fortnow, the first author, and the third author [7] investigated strong hypotheses involving the intractability of disjoint NP pairs. Among other things, this paper proved that
and that μ(NP∣EXP)≠ 0 implies the existence, for every k, of disjoint NP pairs that cannot be separated in \(2^{n^{k}}\) time. (Here disjNP is the set of disjoint NP pairs, and disjEXP is the set of disjoint EXP pairs, the latter endowed with a natural measure.)
In Section 6, we prove a dimension-theoretic analog of (1.4), namely that
Our proof of (1.5) is somewhat simplified by the use of Theorem 4.2 (i.e., the Point-to-Set Principle).
2 Resource Bounds
We work in the Cantor space C consisting of all decision problems (i.e., languages) \(A\subseteq \{0,1\}^{*}\). We identify each decision problem A with its characteristic sequence
where s0,s1,s2,… is the standard enumeration of {0,1}∗ and
is the Boolean value of a statement φ. We thus regard C as either the power set \(\mathcal {P}(\{0,1\}^{*})\) of {0,1}∗ or as the set {0,1}ω of all infinite binary sequences, whichever is most convenient in a given context.
A resource bound in this paper is any one of several classes of functions from {0,1}∗ to {0,1}∗ that we now specify.
The largest resource bound is the set
We also use the resource bound
As in [20, 22, 24], we define a hierarchy G0,G1,G2,… of classes of growth rates \(f:\mathbb {N}\to \mathbb {N}\) by the following recursion. (All logarithms in this paper are base-2.)
Note that G0 is the class of O(n) growth rates and that G1 is the class of polynomially bounded growth rates. For each \(i\in \mathbb {N}\), define a canonical growth rate \(\hat {g}_{i}\in G_{i}\) by \(\hat {g}_{0}(n)=2n\) and \(\hat {g}_{i+1}(n)=2^{\hat {g}_{i}(\log n)}\). It is easy to verify that each Gi is closed under composition, that each f ∈ Gi is \(o(\hat {g}_{i+1})\), and that each \(\hat {g}_{i}\) is o(2n). Thus all growth rates in the Gi-hierarchy are subexponential.
Within the resource bound comp, we use the resource bounds
and
(The length of the output is included as part of the space used in computing f.) We write p for the polynomial-time resource bound p1 and qp for the quasipolynomial-time resource bound p2. Similarly the notations pspace and qpspace denote the space resource bounds p1space and p2space, respectively.
In this paper, a resource bound Γ or Δ is one of the classes all, comp, pi (i ≥ 1), pispace (i ≥ 1) defined above. We will also use relativizations ΔA or Δg of a resource bound Δ to oracles \(A\subseteq \{0,1\}^{*}\) or function oracles g : {0,1}∗→{0,1}∗.
A constructor is a function δ : {0,1}∗→{0,1}∗ such that δ(w) is a proper extension of w (i.e., w is a proper prefix of δ(w)) for all w ∈{0,1}∗. The result of a constructor δ is the unique sequence R(δ) ∈C such that δn(λ) is a prefix of R(δ) for all \(n\in \mathbb {N}\). (Here δn(λ) is the n-fold application of δ to the empty string λ.)
The result class of a resource bound Δ is the class R(Δ) consisting of all languages R(δ) such that δ ∈Δ is a constructor. The following facts are easily verified.
-
1.
R(all) = C.
-
2.
R(comp) = DEC, the set of all decidable languages.
-
3.
For all i ≥ 1,
$$R(\text{p}_{i})=\text{E}_{i}=\text{TIME}(2^{G_{i-1}}).$$In particular,
$$R(\text{p})=\text{E}=\text{TIME}(2^{\text{linear}})$$and
$$R(\text{qp})=\text{EXP}=\text{TIME}(2^{\text{poly}}).$$ -
4.
For all i ≥ 1,
$$R(\text{p}_{i}\text{space})=\text{E}_{i}\text{SPACE}=\text{SPACE}(2^{G_{i-1}}).$$In particular,
$$R(\text{p}\text{space})=\text{ESPACE}=\text{SPACE}(2^{\text{linear}})$$and
$$R(\text{qp}\text{space})=\text{EXPSPACE}=\text{SPACE}(2^{\text{poly}}).$$
Many of our functions will be of the form \(f:D\to [0,\infty )\), where D is a discrete domain such as {0,1}∗ or \(\mathbb {N}\times \{0,1\}^{*}\) and \([0,\infty )\) is the set of nonnegative real numbers. If Δ is a resource bound, then such a function f is Δ-computable if there is a rational-valued function \(\hat {f}:D\times \mathbb {N}\to \mathbb {Q}\cap [0,\infty )\) such that \(\lvert \hat {f}(r,x)-f(x)\rvert \leq 2^{-r}\) for all x ∈ D and \(r\in \mathbb {N}\) and \(\hat {f}\in {\varDelta }\) (with r coded in unary and \(\hat {f}(x,r)\) coded in binary).
We say that f is lower semicomputable if there is a computable function \(\hat {f}:D\times \mathbb {N}\to \mathbb {Q}\cap [0,\infty )\) such that the following two conditions hold for all x ∈ D.
-
(i)
For all \(t\in \mathbb {N}\), \(\hat {f}(x,t)\leq \hat {f}(x,t+1)\leq f(x)\).
-
(ii)
\(\displaystyle \lim _{t\to \infty }\hat {f}(x,t)=f(x)\).
3 Resource-Bounded Dimensions
This section briefly reviews the elements of resource-bounded dimension developed in [24].
Definition 1
-
1.
For \(s\in [0,\infty )\), an s-gale is a function \(d:\{0,1\}^{*}\to [0,\infty )\) such that, for all w ∈{0,1}∗,
$$d(w)=2^{-s}[d(w0)+d(w1)].$$ -
2.
A martingale is a 1-gale.
Observation 3.1
[25] A function \(d:\{0,1\}^{*}\to [0,\infty )\) is an s-gale if and only if the function \(d^{\prime }:\{0,1\}^{*}\to [0,\infty )\) defined by \(d^{\prime }(w)=2^{(1-s)|w|}d(w)\) is a martingale.
An s-gale d succeeds on a language \(A\subseteq \{0,1\}^{*}\), and we write \(A\in S^{\infty }[d]\), if
where the limit superior is taken over successively longer prefixes of A.
Notation 1
For \(X\subseteq \mathbf {C}\), let \(\mathcal {G}(X)\) be the set of all \(s\in [0,\infty )\) such that there is an s-gale d for which \(X\subseteq S^{\infty }[d]\).
Readers unfamiliar with fractal geometry can safely use the following characterization as the definition of the Hausdorff dimension \({\dim }_{\mathrm {H}}(X)\) of each set \(X\subseteq \mathbf {C}\).
Theorem 3.2 (Gale Characterization of Hausdorff Dimension 24)
For all \(X\subseteq \mathbf {C}\),
Intuitively, an s-gale is a strategy for betting on the successive bits of languages A ∈C. The payoffs of these bets are fair if s = 1 and unfair if s < 1. Intuitively and roughly, Theorem 3.2 says that the Hausdorff dimension of X is the most hostile betting environment in which a gambler can succeed on every language A ∈ X.
Motivated by the above characterization of classical Hausdorff dimension, the first author defined resource-bounded dimensions and algorithmic dimensions as follows.
Notation 2
[24, 25] Let Δ be a resource bound, and let \(X\subseteq \mathbf {C}\).
-
1.
\(\mathcal {G}_{{\varDelta }}(X)\) is the set of all \(s\in [0,\infty )\) such that there is a Δ-computable s-gale d for which \(X\subseteq S^{\infty }[d]\).
-
2.
\(\mathcal {G}_{\text {alg}}(X)\) is the set of all \(s\in [0,\infty )\) such that there is a lower semicomputable s-gale d for which \(X\subseteq S^{\infty }[d]\).
Definition 2
[24, 25] Let Δ be a resource bound, let \(X\subseteq \mathbf {C}\), and let A ∈C.
-
1.
The Δ-dimension of X is
$${\dim}_{{\varDelta}}(X)=\inf\mathcal{G}_{{\varDelta}}(X).$$ -
2.
The Δ-dimension of X in R(Δ) is
$${\dim}(X\mid R({\varDelta}))={\dim}_{{\varDelta}}(X\cap R({\varDelta})).$$ -
3.
The Δ-dimension of A is
$${\dim}_{{\varDelta}}(A)={\dim}_{{\varDelta}}(\{A\}).$$ -
4.
The algorithmic dimension of X is
$${\dim}_{\text{alg}}(X)=\inf\mathcal{G}_{\text{alg}}(X).$$ -
5.
The algorithmic dimension of A is
$${\dim}(A)={\dim}_{\text{alg}}(\{A\}).$$
(Algorithmic dimension has also been called constructive dimension and effective dimension.)
The papers [24, 25] showed that the above-defined dimensions are coherent, well-behaved “versions” of Hausdorff dimension. All the defined dimensions lie in [0,1], and all can take any real value in [0,1]. The dimensions 1., 2., and 4., have the crucial dimension properties that they are monotone in X and that they are stable in the sense that the dimension of X ∪ Y is the maximum of the dimensions of X and Y. Classical Hausdorff dimension (i.e., \({\dim }_{\mathrm {H}}={\dim }_{\text {all}}\)) is also countably stable, meaning that
holds for all countable index sets I. The dimensions 1. and 2. are not countably stable for Δ smaller than all, but they are Δ-countably stable in that (3.1) holds if the countable union is “Δ-effective.” The algorithmic dimension 4. is absolutely stable in the sense that (3.1) holds, regardless of whether I is countable. In particular, this implies that, for all \(X\subseteq \mathbf {C}\),
As a consequence of (3.2), investigations of algorithmic dimension focus almost entirely on the dimensions \({\dim }(A)\) of individual languages (or, in other contexts, individual sequences or individual points in a metric space) A.
Turning to complexity classes, i.e., the cases where Δ is some resource bound pi or pispace, the dimension 2. is non-degenerate in the sense that \({\dim }(R({\varDelta })\mid R({\varDelta }))=1\). If \(X\subseteq R({\varDelta })\) is finite or even “Δ-countable,” then \({\dim }(X\mid R({\varDelta }))=0\). This implies for example that, for each fixed \(k\in \mathbb {N}\),
Finally, we mention interactions of dimensions with randomness. A language A ∈C is Δ-random if no Δ-computable martingale succeeds on it [22]. A language A ∈C is algorithmically random (or Martin-Löf random [34]) if no lower semicomputable martingale succeeds on it. Since a martingale is a 1-gale, this implies that \({\dim }_{{\varDelta }}(A)=1\) holds for every Δ-random language and \({\dim }(A)=1\) holds for every algorithmically random language. In neither case does the converse hold.
4 The Point-to-Set Principle
As noted in the introduction, previous instances of the Point-to-Set Principle have characterized classical fractal dimensions of sets in terms of the relativized algorithmic dimensions of the elements of these sets. Here we make the Point-to-Set Principle more widely applicable by proving instances of it in which “classical” and “algorithmic” are replaced by resource bounds Δ and Γ, respectively, with Γ smaller (“more effective”) than Δ.
To this end, we partially order our resource bounds by
and
for all i ≤ 1 and
Aside from reflecting current knowledge about the inclusions among these classes, this ordering has the crucial property that, if Γ and Δ are resource bounds with Γ < Δ, then Δ parametrizesΓ in the sense that there is a function f ∈Δ such that
where each \(f_{k}:\{0,1\}^{*}\to \{0,1\}^{*}\) is the k th slice of f, defined by fk(x) = f(0k1x) for all x ∈{0,1}∗. Moreover, this parametrization relativizes in the sense that, for each function oracle g : {0,1}∗→{0,1}∗, there is a function fg ∈Δg such that
Theorem 4.1
If Γ and Δ are resource bounds with Γ < Δ, then for each function oracle g : {0,1}∗→{0,1}∗, there is a Δg-computable function dg such that \(\{{d_{k}^{g}}\mid k\in \mathbb {N}\}\) is the set of all martingales that are Γg-computable and satisfy \({d_{k}^{g}}(\lambda )\leq 1\).
Proof
This is implicit in the proofs of the time and space hierarchy theorems [15, 39] (minus the “disagreement” step of the diagonalizations), together with the well-known fact that these proofs relativize. □
The following theorem is the main result of this section.
Theorem 4.2 (Point-to-Set Principle for Resource-Bounded Dimensions)
If Γ and Δ are resource bounds with Γ < Δ, then, for all \(X\subseteq \mathbf {C}\),
Theorem 4.2 follows immediately from the following two lemmas, which we prove separately.
Lemma 4.3
If Γ, Δ, and X are as in Theorem 4.2 and g ∈Δ, then
Lemma 4.4
If Γ, Δ, and X are as in Theorem 4.2, then there exists g ∈Δ such that, for all A ∈ X,
Proof Proof of Lemma 4.3
Let Γ, Δ, X, and g be as given, and let \(s\in \mathbb {Q}\) satisfying
It suffices to show that
Since Γ < Δ, Theorem 4.1 tells us that there is a Δg-computable function \(d^{g}:\{0,1\}^{*}\to [0,\infty )\) such that the set \(\{{d_{k}^{g}}\mid k\in \mathbb {N}\}\) of all slices of dg is the set of all martingales that are Γg-computable and satisfy \({d_{k}^{g}}(\lambda )\leq 1\). In fact, since g ∈Δ, this function dg is Δ-computable. Define the function \(d^{g,s}:\{0,1\}^{*}\to [0,\infty )\) so that
holds for all \(k\in \mathbb {N}\) and x ∈{0,1}∗. Then dg,s is Δ-computable, and Observation 3.1 tells us that \(\{d_{k}^{g,s}\mid k\in \mathbb {N}\}\) is the set of all Γg-computable s-gales that satisfy \(d_{k}^{g,s}(\lambda )\leq 1\). Define \(d:\{0,1\}^{*}\to [0,\infty )\) by
Then d is a Δ-computable s-gale, so to confirm (4.5) it suffices to show that
For this, let A ∈ X. Then, by (4.4), there is a Γg-computable s-gale \(\tilde {d}\) such that \(A\in S^{\infty }[\tilde {d}]\). Then there exists \(k\in \mathbb {N}\) such that \(d_{k}^{g,s}=\tilde {d}\), whence \(A\in S^{\infty }[d_{k}^{g,s}]\). But then (4.6) tells us that
whence (4.7) holds. □
Proof Proof of Lemma 4.4
Let Γ, Δ, and X be as given, and let \(s\in \mathbb {Q}\) satisfy
If suffices to exhibit g ∈Δ such that, for all A ∈ X,
By (4.8), there is a Δ-computable s-gale d such that
Observation: d can be chosen to be linearly bounded, that is, |d(w)| = O(|w|). Let \(g=\hat {d}\in {\varDelta }\) testify to the Δ-computability of d as defined in Section 2. Then d is a Γg-computable s-gale, and (4.10) tells us that, for all A ∈ X, \(A\in S^{\infty }[d]\), whence (4.9) holds.□
This completes the proof of Theorem 4.2.
The Point-to-Set Principle for Hausdorff dimension [28], stated in the context of C, says that, for all \(X\subseteq \mathbf {C}\),
thus characterizing the classical Hausdorff dimension of X in terms of the relativized algorithmic dimensions of its individual elements. Since \({\dim }_{\text {all}}={\dim }_{\mathrm {H}}\), Theorem 4.2 tells us, for example, that we also have, for all \(X\subseteq C\),
5 Selectivity
Definition 3
[37] For any resource bound Δ, a language \(A\subseteq \{0,1\}^{*}\) is Δ-selective if there is a selector function f ∈Δ such that, for all pairs a,b ∈{0,1}∗, we have f(〈a,b〉) ∈{a,b} and
where 〈⋅,⋅〉 : {0,1}∗×{0,1}∗→{0,1}∗ is a standard pairing function.
Theorem 5.1
If A,B ∈C and g : {0,1}∗→{0,1}∗ are such that B is pg-selective and \(A{\leq _{m}^{P}} B\), then \({\dim }_{\text {p}}^{g}(A)=0\).
Proof
Let A, B, and g be as in the theorem statement. Let f ∈pg be a selector for A, let h : {0,1}∗→{0,1}∗ be a \({\leq _{m}^{P}}\)-reduction from A to B, and let s > 0. We will show that \({\dim }_{\text {p}}^{g}(A)\leq s\) by constructing an s-gale that succeeds on A and is computable in polynomial time relative to g.
Let \(k\in \mathbb {N}\) be sufficiently large so that
We will consider blocks of k consecutive strings. For each \(q\in \mathbb {N}\), define the directed graph Gq whose vertex set is {0,…,k − 1} and edge set is
Notice that if sqk+i ∈ A and sqk+j∉A, then h(sqk+i) ∈ B and h(sqk+j)∉B. In this situation, the edge (i,j) cannot be present in Gq, and more generally there cannot be any path from i to j in Gq.
Let \(G^{\prime }_{q}\) be the directed acyclic graph obtained by contracting each strongly connected component of Gq to a single vertex. Define a linear order ≺q on {0,…,k − 1} by topologically sorting \(G^{\prime }_{q}\), breaking ties within each strongly connected component arbitrarily. In this order, i ≼qj implies that there is a path from i to j in Gq.
Thus, if i ≼qj and sqk+i ∈ A, then sqk+j ∈ A. Extending ≺q by defining i ≺qk for all i ∈{0,…,k − 1}, it follows that
for some i ∈{0,…,k}.
Define \(d:\{0,1\}^{*}\to [0,\infty )\) and, for each i ∈{0,…,k}, \(d_{i}:\{0,1\}^{*}\to [0,\infty )\) recursively as follows. For w ∈{0,1}∗, let qk + j = |w|, where j ∈{0,…,k − 1}.
-
For all i ∈{0,…,k}, di(λ) = d(λ) = 1.
-
\(d(w)=\frac {1}{k+1}{\sum }_{i=0}^{k} d_{i}(w)\).
-
For all i ∈{0,…,k} and j = 0,
$$ \begin{array}{@{}rcl@{}} d_{i}(w0)&= \left\{\begin{array}{ll} 0&\text{if}\ i\preceq_{q} j\\ 2^{s}d(w)&\text{otherwise}, \end{array}\right.\\ d_{i}(w1)&= \left\{\begin{array}{ll} 2^{s}d(w)&\text{if}\ i\preceq_{q} j\\ 0&\text{otherwise}. \end{array}\right. \end{array} $$ -
For all i ∈{0,…,k} and j ∈{1,…,k − 1},
$$ \begin{array}{@{}rcl@{}} d_{i}(w0)&= \left\{\begin{array}{ll} 0&\text{if}\ i\preceq_{q} j\\ 2^{s}d_{i}(w)&\text{otherwise}, \end{array}\right.\\ d_{i}(w1)&= \left\{\begin{array}{ll} 2^{s}d_{i}(w)&\text{if}\ i\preceq_{q} j\\ 0&\text{otherwise}. \end{array}\right. \end{array} $$
Informally, each di represents a betting strategy, and d is an aggregate betting strategy that evenly re-allocates between the di after each block of k bits. Observe that d is an s-gale, although the individual di are not.
Now consider \(d(A\upharpoonright n)\). If n = 0, then \(d(A\upharpoonright n)=1\). Otherwise, n = qk + j for some \(q\in \mathbb {N}\) and j ∈{1,…,k}. Let i ∈{0,…,k} be the value satisfying (5.2) for this q. Then
By inequality (5.1), this lower bound is monotonically increasing and unbounded, so \(\liminf _{n\to \infty }d(A\upharpoonright n)=\infty \). Therefore the s-gale d succeeds on A. Furthermore, for all w ∈{0,1}∗, the value d(w) can be computed in polynomial time relative to g by:
-
k calls to the polynomial-time reduction function h on inputs
$$s_{qk},\ldots,s_{qk+k-1},$$each of which has length \(O(\log |w|)\);
-
k2 calls, for each ordered pairs from {sqk,…,sqk+k− 1}, to the selector function f, which runs in polynomial time relative to g; and
-
standard graph algorithms on Gq, which has k = O(1) vertices.
We conclude that \({\dim }_{\text {p}}^{g}(A)<s\), and the theorem follows immediately. □
Lemma 5.2
Let \(\text {qp}^{\prime }\) be the set of all functions in qp whose output length is polynomially bounded. There is a function \(h\in \text {qp}^{\prime }\) such that \(\text {qp}^{\prime }=\text {p}^{h}\).
Proof
By standard techniques of clocking Turing machines and bounding their running times and output lengths, we can form an enumeration M0,M1,M2,… of Turing machines such that \(\text {qp}^{\prime }\) is exactly the set of functions computed by Turing machines in this list. Define h : {0,1}∗→{0,1}∗ by
It is clear that \(\text {p}^{h}=\text {qp}^{\prime }\).□
Theorem 5.3
\({\dim }(P_{m}(\text {qp-SEL})\mid \text {EXP})=0\).
Proof
Let h be as in Lemma 5.2, and let A ∈ Pm(qp-SEL). Then there exists some language B ∈C and function \(g\in \text {qp}^{\prime }=\text {p}^{h}\) such that \(A{\leq _{m}^{P}} B\) and g is a selector for B, i.e., B is ph-selective. By Theorem 5.1, then, \({\dim }_{\text {p}}^{h}(A)=0\). This holds for all A ∈ Pm(qp-SEL), so we can apply Theorem 4.2:
Since \({\dim }(P_{m}(\text {qp-SEL})\mid \text {EXP})\) is defined as
this completes the proof. □
Corollary 5.4
No qp-selective set is partially \({\leq _{m}^{P}}\)-hard for EXP.
Corollary 5.5
If \({\dim }(\text {NP}\mid \text {EXP})>0\), then no qp-selective set is \({\leq ^{P}_{m}}\)-hard for NP.
6 Disjoint NP Pairs
In this section we improve the results in [7] by proving that the dimension of disjNP in disjEXP is related to the dimension of NP inside EXP.
Definition 4
[14, 26] For \(s\in [0,\infty )\) and distribution β on alphabet Σ, a β-s-gale is a function \(d:{\varSigma }^{*}\to [0,\infty )\) such that, for all w ∈Σ∗,
A β-s-gale succeeds on a language \(A\subseteq {\varSigma }^{*}\), and we write \(A\in S^{\infty }[d]\), if
Let Δ be a resource bound, β a distribution on alphabet Σ, and \(X\subseteq \mathcal {P}({\varSigma }^{*})\). Then \(\mathcal {G}_{{\varDelta },\beta }(X)\) denotes the set of all \(s\in [0,\infty )\) such that there is a Δ-computable β-s-gale d for which \(X\subseteq S^{\infty }[d]\), and the Δ − β-dimension of X is
We code disjoint pairs as in [7], using the alphabet {0,1,− 1}. For a pair (A,B), 1 corresponds to A, − 1 to B, and 0 to (A ∪ B)c.
We fix a probability distribution γ0 on {0,1,− 1} as γ0(0) = 1/4, γ0(1) = γ0(− 1) = 3/8, that is the natural distribution used in [7]. For disjoint pairs we write \({\dim }_{{\varDelta }}(X)\) for \({\dim }_{{\varDelta },\gamma _{0}}(X)\). Theorem 4.2 extends routinely to this setting.
The main theorem of this section is the following
Theorem 6.1
If \({\dim }(\text {disjNP}\mid \text {disjEXP})=1\), then \({\dim }(\text {NP}\mid \text {EXP})>0\).
The proof of Theorem 6.1 is based on the following two results and Theorem 4.2.
Theorem 6.2
Let β be a positive distribution on {0,1}, \(X\subseteq \mathbf {C}\), and g : {0,1}∗→{0,1}∗. If \({\dim }_{\text {p}}^{g}(X)=0\), then \({\dim }_{\text {p},\beta }^{g}(X)<1\).
Theorem 6.3
Let β = (1/4,3/4) and g : {0,1}∗→{0,1}∗. If \({\dim }_{\text {p},\beta }^{g}(\text {NP}) < 1\), then \({\dim }_{\text {p}}^{g}(\text {disjNP})<1\).
Theorem 6.2 is a consequence of the following lemma.
Lemma 6.4
Let g : {0,1}∗→{0,1}∗, let s be such that \({\dim }_{\text {p}}^{g}(X)<s\), and let β be a distribution on {0,1}. If \(\max \limits (\beta (0), \beta (1))< 2^{-s}\), then \({\dim }_{\text {p},\beta }^{g}(X)<1\).
Proof Proof of Lemma 6.4
Let \(s^{\prime }> s\) and t ∈ (0,1) be such that \(\max \limits (\beta (0), \beta (1))<2^{-s^{\prime }/t}\). Let d be a pg-computable s-gale. Define
Then \(d^{\prime }\) is a pg-computable β-t-gale. Furthermore,
and therefore \(S^{\infty }[d]\subseteq S^{\infty }[d^{\prime }]\). □
Theorem 6.3 is a consequence of the following lemma.
Lemma 6.5
Let g : {0,1}∗→{0,1}∗, γ a positive distribution on {0,1,− 1}, β a distribution on {0,1} with β(0) = γ(0), and \(X\subseteq \mathbf {C}\) a class that is closed under union. If \({\dim }_{\text {p},\beta }^{g}(X)<1\), then \({\dim }_{\text {p},\gamma }^{g}(\text {disj} X)<1\).
Proof Proof of Lemma 6.5
If \({\dim }_{\text {p},\beta }^{g}(X)<s<1\) and d is a pg-computable β-s gale succeeding on X, let \( s^{\prime } \in (0,1)\) with \(\beta (1)^{s} \ge \gamma (1)^{s^{\prime }}+ \gamma (-1)^{s^{\prime }}\) and \(\beta (0)^{s}\ge \gamma (0)^{s^{\prime }}\).
We define a pg-computable γ-\(s^{\prime }\) gale D by
where
That is, if w is a prefix of (A,B) then \(\overline {w}\) is a prefix of A ∪ B.
Notice that \(D(w)\ge d(\overline {w})\) for every w.
Thus if (A,B) ∈disjX, then A ∪ B ∈ X and D succeeds on (A,B).□
Proof Proof of Theorem 6.1
We prove the contrapositive. Suppose that \({\dim }(\text {NP}\mid \text {EXP})=0\). By Theorem 4.2, there is a g ∈qp such that \({\dim }_{\text {p}}^{g}(\text {NP})=0\).
Let β = (1/4,3/4). By Theorem 6.2, \({\dim }_{\text {p},\beta }^{g}(\text {NP})<1\). By Theorem 6.3, \({\dim }_{\text {p}}^{g}(\text {disjNP})<1\).
Using Theorem 4.2 again, \({\dim }(\text {disjNP}\mid \text {disjEXP})= {\dim }_{\text {qp}}(\text {disjNP})<1\).□
References
Ambos-Spies, K., Merkle, W., Reimann, J., Stephan, F.: Hausdorff dimension in exponential time. In: Proceedings of the 16th Annual IEEE Conference on Computational Complexity, Chicago, Illinois, USA, June 18–21, 2001, pp 210–217. IEEE Computer Society (2001)
Bishop, C. J., Peres, Y.: Fractals in Probability and Analysis. Cambridge University Press, Cambridge (2017)
Buhrman, H., Longpré, L.: Compressibility and resource bounded measure. In: Proceedings of the Thirteenth Symposium on Theoretical Aspects of Computer Science, pp 13–24. Springer, Berlin (1996)
Dose, T., Glaßer, C.: NP-Completeness, Proof Systems, and Disjoint NP-Pairs. In: C. Paul, M. Bläser (eds.) 37th International Symposium on Theoretical Aspects of Computer Science, STACS 2020, March 10–13, 2020, Montpellier, France, LIPIcs, vol. 154, pp 9:1–9:18. Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2020)
Even, S., Selman, A. L., Yacobi, Y.: The complexity of promise problems with applications to public-key cryptography. Inf. Control. 61(2), 159–173 (1984)
Falconer, K.: Fractal Geometry: Mathematical Foundations and Applications, 3rd edn. Wiley, New York (2014)
Fortnow, L., Lutz, J. H., Mayordomo, E.: Inseparability and strong hypotheses for disjoint NP pairs. Theory Comput. Syst. 51, 229–247 (2012)
Glaßer, C., Selman, A.L., Sengupta, S., Zhang, L.: Disjoint NP-pairs. SIAM J. Comput. 33, 1369–1416 (2004)
Glaßer, C., Selman, A.L., Sengupta, S.: Reductions between disjoint NP-pairs. Inf. Comput. 200, 247–267 (2005)
Glaßer, C., Selman, A.L., Zhang, L.: Canonical disjoint NP-pairs of propositional proof systems. Theor. Comput. Sci. 370, 60–73 (2007)
Glaßer, C., Selman, A.L., Zhang, L.: The informational content of canonical disjoint NP-pairs. Int. J. Found. Comput. Sci. 20(3), 501–522 (2009)
Glaßer, C., Hughes, A., Selman, A.L., Wisiol, N.: Disjoint NP-pairs and propositional proof systems. SIGACT News 45(4), 59–75 (2014)
Grollmann, J., Selman, A.: Complexity measures for public-key cryptosystems. SIAM J. Comput. 11, 309–335 (1988)
Gu, X., Lutz, J., Mayordomo, E., Moser, P.: Dimension spectra of random subfractals of self-similar fractals. Ann. Pure Appl. Logic 165, 1707–1726 (2014)
Hartmanis, J., Stearns, R.: On the computational complexity of algorithms. Trans. Am. Math. Soc. 117, 285–306 (1965)
Hausdorff, F.: Dimension und äußeres Maß. Math. Ann. 79, 157–179 (1919)
Hemaspaandra, L. A., Torenvliet, L.: Theory of Semi-Feasible Algorithms. Springer, Berlin (2002)
Homer, S., Selman, A. L.: Oracles for structural properties: the isomorphism problem and public-key cryptography. J. Comput. Syst. Sci. 44, 287–301 (1992)
Jockusch, C. G.: Semirecursive sets and positive reducibility. Trans. Am. Math. Soc. 131, 420–436 (1968)
Lutz, J. H.: Resource-bounded category and measure in exponential complexity classes. Ph.D. thesis California Institute of Technology (1987)
Lutz, J. H.: Category and measure in complexity classes. SIAM J. Comput. 19, 1100–1131 (1990)
Lutz, J. H.: Almost everywhere high nonuniform complexity. J. Comput. Syst. Sci. 44(2), 220–258 (1992)
Lutz, J. H.: The quantitative structure of exponential time. In: Hemaspaandra, L.A., Selman, A.L. (eds.) Complexity Theory Retrospective II, pp 225–254. Springer (1997)
Lutz, J. H.: Dimension in complexity classes. SIAM J. Comput. 32(5), 1236–1259 (2003)
Lutz, J. H.: The dimensions of individual strings and sequences. Inf. Comput. 187(1), 49–79 (2003)
Lutz, J. H.: A divergence formula for randomness and dimension. Theor. Comput. Sci. 412, 166–177 (2011)
Lutz, N.: Fractal intersections and products via algorithmic dimension. ACM Trans. Comput Theory 13(3) (2021)
Lutz, J. H., Lutz, N.: Algorithmic information, plane Kakeya sets, and conditional dimension. ACM Trans. Comput. Theory 10(2), 7:1–7:22 (2018)
Lutz, J. H., Lutz, N.: Who asked us? How the theory of computing answers questions about analysis. In: Du, D., Wang, J. (eds.) Complexity and Approximation: in Memory of Ker-I Ko, pp 48–56. Springer (2020)
Lutz, J. H., Mayordomo, E.: Algorithmic fractal dimensions in geometric measure theory. In: Brattka, V., Hertling, P. (eds.) Handbook of Computability and Complexity in Analysis, pp 271–302. Springer (2021)
Lutz, J. H., Lutz, N., Mayordomo, E.: Extending the reach of the point-to-set principle. In: Berenbrink, P., Monmege, B. (eds.) 39th International Symposium on Theoretical Aspects of Computer Science, STACS 2022, March 15–18, 2022, Marseille, France (Virtual Conference), LIPIcs, vol. 219. https://doi.org/10.4230/LIPIcs.STACS.2022.48, pp 48:1–48:14. Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2022)
Lutz, N., Stull, D. M.: Projection theorems using effective dimension. In: 43rd International Symposium on Mathematical Foundations of Computer Science, MFCS 2018, August 27–31, 2018, Liverpool, UK, pp 71:1–71:15 (2018)
Lutz, N., Stull, D. M.: Bounding the dimension of points on a line. Inf. Comput. 275 (2020)
Martin-Löf, P.: The definition of random sequences. Inf. Control. 9, 602–619 (1966)
Mattila, P.: Fourier Analysis and Hausdorff Dimension. Cambridge Studies in Advanced Mathematics. Cambridge University Press, Cambridge (2015)
Razborov, A.: On provably disjoint NP pairs. Tech. Rep. 94-006 ECCC (1994)
Selman, A.: P-selective sets, tally languages, and the behavior of polynomial time reducibilities on NP. Math. Syst. Theory 13, 55–65 (1979)
Selman, A.: Complexity issues in cryptography. In: Computational Complexity Theory (Atlanta, GA, 1988). Proceedings of Symposia in Applied Mathematics, vol. 38, pp 92–107. American Mathematical Society (1989)
Stearns, R. E., Hartmanis, J., Lewis, P.: Hierarchies of memory limited computations. In: Proceedings of the 6th Annual Symposium on Switching Circuit Theory and Logical Design, pp 179–190 (1965)
Stein, E. M., Shakarchi, R.: Real Analysis: Measure Theory, Integration, and Hilbert Spaces. Princeton Lectures in Analysis. Princeton University Press, Princeton (2005)
Wang, Y.: Randomness and complexity. Ph.D. thesis, Department of Mathematics University of Heidelberg (1996)
Zimand, M.: Computational Complexity: a Quantitative Perspective. Elsevier, Amsterdam (2004)
Acknowledgments
We thank an anonymous reviewer for several small corrections.
Author information
Authors and Affiliations
Corresponding author
Additional information
Dedicated to the memory of Alan L. Selman
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article belongs to the Topical Collection: Commemorative Issue for Alan L. Selman Guest Editors: Mitsunori Ogihara, Elvira Mayordomo, Atri Rudra
The first author’s research was supported in part by National Science Foundation grants 1545028 and 1900716. The third author’s research was supported in part by Spanish Ministry of Science, Innovation and Universities grant PID2019-104358RB-I00 and by the Science dept. of Aragon Government: Group Reference T64_20R (COSMOS research group).
Rights and permissions
About this article
Cite this article
Lutz, J.H., Lutz, N. & Mayordomo, E. Dimension and the Structure of Complexity Classes. Theory Comput Syst 67, 473–490 (2023). https://doi.org/10.1007/s00224-022-10096-7
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00224-022-10096-7