1 Introduction

The SAT problem is one of the most fundamental \(\mathsf {NP}\)-complete problems. Paturi, Pudlák and Zane [20] proved tight depth-3 circuit lower bounds and from their technique they obtained a k-SAT algorithm which beats exhaustive search. Along similar lines, Santhanam [25] modified a lower bound argument to obtain improved satisfiability algorithms for De Morgan formulas of linear size. Employing stronger lower bound arguments, satisfiability algorithms were given for formulas of larger size in [9] and [10]. In a different direction, Williams [29] showed that even small improvements over exhaustive search for satisfiability on certain circuit classes implies a lower bound against that class. In fact he obtained his seminal \(\mathsf {NEXP} \not \subseteq \mathsf {ACC}^0\) result in [30] by giving a non-trivial \(\mathsf {ACC}^0\)-SAT algorithm.

In this paper we focus on the k-SAT problem. There are several non-trivial algorithms known for this problem, see e.g. [13, 19, 20, 26]. Despite this however, the exact complexity of k-SAT under suitable assumptions remains unknown. Formalizing what this complexity could be, Impagliazzo and Paturi [17] formulated the following two hypotheses. The Exponential Time Hypothesis (ETH) which states that the are no sub-exponential time algorithms for the k-SAT problem, for any k. The Strong Exponential Time Hypothesis (SETH) which states that the complexity of k-SAT grows as k increases and the running time of the best k-SAT algorithms approach that of exhaustive search. More formally, it says that k-SAT requires running time \(2^{(1 - \epsilon _k)n}\) where \(\epsilon _k \rightarrow 0\) as \(k \rightarrow \infty \).

Both ETH and SETH are stronger than \(\mathsf {P} \ne \mathsf {NP}\) and hence we do not expect to be able to verify either of them in any new future. We can however ask whether known algorithms are consistent with these hypotheses. For the PPSZ algorithm [19] strong lower bounds were proved in [11] supporting SETH. But one may ask for such a result that holds for a class of algorithms rather than for a specific one. Proof complexity provides a framework to do this. One can think of the run of a SAT algorithm on an unsatisfiable instance as a proof of unsatisfiability hence, if this proof is structured enough, we can employ tools from proof complexity and obtain lower bounds.

For instance practical SAT-solvers are based on the Davis-Putnam-Logemann-Loveland algorithm (DPLL) that is a backtracking method introduced by [14, 15] to search for assignments satisfying a CNF formula. It is a well known result that DPLL is equivalent to tree-like Resolution, a sub-system of the proof system Resolution where only proofs having a tree structure are allowed. Hence size tree-like Resolution lower bounds transfer to lower bounds for the running time of the DPLL algorithm. In a series of works, [3, 18, 27] introduced the idea of Conflict Driven Clause Learning (CDCL) as a way for DPLL SAT-solvers to cut the search space and avoid duplicated work. This is done by performing a conflict analysis when the search for an assignments leads to a contradiction and then learning a clause encoding a reason for that failure. By definition Resolution (polynomially) simulates runs of CDCL solvers over unsatisfiable instances, hence lower bounds for Resolution transfer to lower bounds for CDCL solvers. We recall that the converse also holds under certain assumptions on the behaviour of the CDCL solver, see [21] and [2].

1.1 Previous Work

Exponential lower bounds supporting ETH have long been known for natural proof systems such as Resolution since mid 1980s, see e.g. [28]. These are \(2^{\Omega (n)}\) lower bounds for k-CNF formulas on n variables and hence not strong enough to support SETH. Some thirteen years passed until the first lower bounds supporting SETH were shown. Pudlák and Impagliazzo [23] proved such lower bounds for tree-like Resolution via Prover-Delayer games. Another thirteen years later, Beck and Impagliazzo [5] obtained a very strong width lower bound which simplified and improved the result of [23] for tree-like Resolution and they were able to prove lower bounds supporting SETH for regular Resolution, a sub-system of Resolution. Beck and Impagliazzo in [5] showed that there are unsatisfiable k-CNF formulas in n variables requiring refutations of size at least \(2^{n(1-\epsilon _k)}\) in regular Resolution. Their proof is an adaptation of a probabilistic technique from [4] and, from an high level, it can be seen as a variation of the bottleneck counting of Haken in [16]. In their argument a rule is given which maps assignments to particular clauses of the proof, at which a significant amount of ‘work’ is done.

Prior to this work, the strongest proof system with lower bounds supporting SETH was regular Resolution [5]. This work proves lower bounds supporting SETH in a subsystem of Resolution stronger than regular Resolution and moreover it gives a different, conceptually simpler, game-theoretic proof of the fact that SETH is consistent with regular Resolution.

1.2 Results

In this work we consider proof systems that are intermediate between regular Resolution and Resolution. The Resolution proof system [7, 24] is a proof system for refuting unsatisfiable CNF formulas. A Resolution refutation of a CNF formula \(\varphi \) is a sequence of clauses ending with the empty clause such that each clause is either a clause from \(\varphi \) or it is derived from previous clauses in the sequence according to the following inference rule:

$$\begin{aligned} \frac{C \vee x, \quad D \vee \lnot x}{C \vee D}, \end{aligned}$$

where C and D are clauses and x is a variable. Clearly a Resolution refutation can be annotated with directed edges keeping track of the applications of the inference rule, in particular each clause in the sequence will have either 0 or 2 predecessors according to if it is a clause from \(\varphi \) or an inferred clause. The resulting directed graph is a DAG and the sequence of clauses in the Resolution refutation is a topological ordering of it. Notice that given a resolution Refutation the DAG we can associate is not uniquely determined. Anyway, when defining subsystems of Resolution based on restrictions on the DAG structures allowed for a proof, it is customary to consider a Resolution refutation directly as a DAG with vertices labeled with clauses. This is the case for tree-like Resolution where are allowed as valid Resolution refutations only the ones with a tree-like structure.

A \(\delta \)-regular Resolution refutation of a formula \(\varphi \) is a Resolution derivation in which along any path of the refutation DAG at most a fraction \(\delta \) of the variables of \(\varphi \) are resolved multiple times. Hence a 0-regular Resolution refutation is just a standard regular Resolution refutation, that is a Resolution refutation where no variable is resolved multiple times along any path. A 1-regular Resolution refutation is just one without any constraint. A more formal definition of Resolution and \(\delta \)-regular Resolution is given in Sect. 2 together with all the other necessary preliminaries.

The main result of this work is the following.

Theorem 1.1

(Main theorem) For any large n and k, there exists an unsatisfiable k-CNF formula \(\psi \) on \(n'\ge n\) variables such that any \(\delta \)-regular Resolution refutation of \(\psi \) requires size at least \(2^{(1-\epsilon _{k})n}\) where both \(\epsilon _k\) and \(\delta \) are \(\widetilde{O}(k^{-1/4})\).

We recall that the width of a Resolution refutation is the number of literals in the largest clause appearing in the refutation. The way we prove this result is via a strong width lower bound, that is a lower bound of the form \((1-\epsilon _k)n\), with \(\epsilon _k\rightarrow 0\), relative to Resolution refutations of some particular k-CNFs in n variables. Width lower bounds of this form were proved in [5] and improved in the asymptotic in [8] (see Theorem 4.1 for the precise statement we are going to use).

The reader could be tempted to think that once we are given a strong Resolution width of the form above then a size lower bound as in Theorem 1.1 will follow by the standard relation between width and size by Ben-Sasson and Wigderson [6]. In [6] the authors showed that if a formula requires refutations of large width, it also requires refutations with many clauses. More precisely they showed that if a k-CNF formula can only have Resolution refutations of width at least W, then it requires Resolution size at least \(2^{{(W - k)^2}/{16n}}\), where n is the number of variables. The constant loss in the exponent is the reason why we do not immediately get \(2^{(1 - \epsilon _k)n}\) size lower bounds from strong width lower bounds. However, the result in [6] holds for any k-CNF without any particular assumption. If the formula is structured in some sense, for instance if it is a xorification, we show we can avoid this loss (in a subsystem of Resolution).

The \(\ell \)-xorification of a CNF formula \(\varphi \) in n variables is a new CNF formula in \(n\ell \) variables obtained substituting each variable \(x_i\) in \(\varphi \) with \(\ell \) new variables \(y^1_i\oplus \cdots \oplus y^\ell _i\) and then expanding again as a CNF. We denote the CNF resulting from such operation \(\varphi [\oplus ^\ell ]\). Our main technical result, Theorem 1.2 informally states that if a k-CNF \(\varphi \) requires width w to be refuted in Resolution, then any \(\delta \)-regular Resolution refutation of \(\varphi [\oplus ^\ell ]\) requires size \(2^{(1-\epsilon )n\ell }\), where \(\epsilon \) is a function of \(k, \ell ,\delta \) and w. More precisely we prove the following:

Theorem 1.2

Let \(\varphi \) be an unsatisfiable CNF formula in n variables and w, \(\delta \) and \(\ell \) be parameters. If the width to refute \(\varphi \) is Resolution is at least w then the size to refute \(\varphi [\oplus ^\ell ]\) in \(\delta \)-regular Resolution is at least \(2^{(1-\epsilon )w\ell }\), where \(\epsilon =\frac{1}{\ell }\log (\frac{e^3 \ell n}{w})+\frac{\delta n}{w}\log \frac{e^3\ell }{\delta }\).

Once we have proved this result then Theorem 1.1 follows just by carefully tuning the parameters.

The way we prove Theorem 1.2 relies on two known games characterizations: the Pudlák game characterizing Resolution size [22] and the Atserias-Dalmau game characterizing Resolution width [1]. In Sect. 3 we give a precise account for both games in a common setting and terminology, see Definition 3.1. We conclude this introductory part giving some intuition behind those games and the proof of Theorem 1.2.

In the Pudlák game, informally, we have two players, \(\mathsf {Prover}\)  and \(\mathsf {Delayer}_{}\)  , that play on some formula \(\varphi \). \(\mathsf {Prover}\)  has the objective of showing that the formula \(\varphi \) is unsatisfiable by querying variables. \(\mathsf {Delayer}_{}\)  on the other hand wants to play as long as possible before the formula is falsified while answering to the queries \(\mathsf {Prover}\)  asks her. The size of Resolution proofs of \(\varphi \) is then characterized as the minimal number of records, i.e. partial assignments, \(\mathsf {Prover}\)  has to consider in a winning strategy [22]. If we force the \(\mathsf {Prover}\)  in each game to re-query a fraction of at most \(\delta \) variables from \(\varphi \) then the minimal number of records such \(\mathsf {Prover}\)  has to consider in a winning strategy characterize the size in \(\delta \)-regular Resolution. This is the content of Theorem 3.3 which we leave without proof since it is a trivial observation over the result in [22].

Hence to prove a Resolution (or a \(\delta \)-regular Resolution) size lower bound we show that, in order to win, \(\mathsf {Prover}\)  must keep a large number of records and we can do that by producing a lot of sufficiently different strategies for \(\mathsf {Delayer}_{}\)  . \(\mathsf {Prover}\)  must win against each of them, hence in his winning strategy he must have a lot of distinct records, since the strategies of \(\mathsf {Delayer}_{}\)  are sufficiently different. In the literature this is done essentially by making \(\mathsf {Prover}\)  play against a \(\mathsf {Delayer}_{}\)  that plays accordingly to a random strategy [12, 22]. Then the size lower bound, that is a lower bound on the number of records that \(\mathsf {Prover}\)  must have in a winning strategy, is obtained by probabilistic arguments. This may very likely lead to some loss in the constants that we need to avoid to prove a SETH lower bound for Resolution size so we choose another way: we play the Pudlák game over a xorified formula \(\varphi [\oplus ^\ell ]\).

The construction of multiple strategies for \(\mathsf {Delayer}_{}\)  relies on the characterization of Resolution width as a game [1] where again we have a \(\mathsf {Prover}\)  and a \(\mathsf {Delayer}_{}\)  , the goal of the prover is to falsify the formula \(\varphi \) but he can use assignments with a bounded number of variables. At a very high level, a winning strategy for \(\mathsf {Delayer}_{}\)  in the width game on \(\varphi \) gives rise to a multitude of strategies for \(\mathsf {Delayer}_{}\)  on the Pudlák game on \(\varphi [\oplus ^\ell ]\). The new strategies act differently from each other on \(\varphi [\oplus ^\ell ]\), but in a sense they all act the same as the original strategy for \(\mathsf {Delayer}_{}\)  in the width game on the original formula \(\varphi \). The size lower bound then follows by a counting argument exploiting the combinatorial properties of the xorified formula in such a way that the number of \(\mathsf {Delayer}_{}\)  strategies, for the Pudlák game played on \(\varphi [\oplus ^\ell ]\), does indeed hugely amplify.

Notice that Theorem 1.2 does not depend on the particular formula we choose to apply it but, to get the result in Theorem 1.1, we need to apply it to a particular formula \(\varphi \) for which we have strong width lower bounds, such formulas are provided by [5] and, with better asymptotic, by [8].

1.3 Outline of Paper

In the next Section we give some preliminaries and notations about Resolution and \(\delta \)-regular Resolution. Section 3 contains the common framework for Pudlák games [22] characterizing size in Resolution and the Atserias and Dalmau games [1] characterizing width in Resolution. Section 4 contains the core results of this work (Theorem 1.1 and Theorem 1.2).

1.4 Open Problems

In this work we prove that there exist unsatisfiable k-CNF formulas in n variables that require \(\delta \)-regular Resolution refutations of size at least \(2^{(1-\epsilon )n}\), where \(k=\widetilde{O}(\epsilon ^{-4})\) and where \(\delta =\widetilde{O}(\epsilon ^{-4})\). Hence a natural question is whether it is possible to improve the dependency of \(\delta \) and k on \(\epsilon \).

More generally, we have some proof systems stronger than \(\delta \)-regular Resolution, such as Resolution itself, Polynomial Calculus + Resolution, RES(k), Cutting Planes, for which we know that there are some unsatisfiable CNFs in n variables which require refutations of size \(2^{\Omega (n)}\). Are those proof systems consistent with SETH?

2 Preliminaries

A literal is either a variable x or its negation \(\lnot x\). A clause C is a disjunction of literals and by its width we mean the number of literals appearing in C and we denote this by |C|. A Conjunctive Normal Form (CNF) formula is a conjunction of a set of clauses.

Given a boolean function f on a set of variables X, a partial assignment is a function \(\rho : X \rightarrow \{0, 1, *\}\). We call domain of \(\rho \), \({{\mathrm{\mathrm {dom}}}}(\rho )\) the set \(\rho ^{-1}(\{0,1\})\). The restriction of f to \(\rho \) denoted by \(f|_{\rho }\) is a function on \(\rho ^{-1}(*)\) obtained from f by fixing the value of all variables in \(\rho ^{-1}(0) \cup \rho ^{-1}(1)\) according to \(\rho \). We write \(\rho \subseteq \sigma \) if for all \(x \in X\), \(\rho (x) \ne *\) implies \(\sigma (x) = \rho (x)\). For a partial assignment \(\rho \) for which \(\rho (x) = *\), by \(\rho \cup \{(x, b)\}\) we denote a partial assignment \(\rho '\) such that for all \(y \ne x\), \(\rho '(y) = \rho (y)\) and \(\rho '(x) = b\). Given a (partial) assignment \(\rho \) and a subset \(B \subseteq X\), \(\rho |_B\) is a partial assignment defined only on the variables in B such that for all \(x \in B\), \(\rho |_B(x) = \rho (x)\).

Resolution [7, 24] is a proof system for refuting unsatisfiable CNF formulas. The only inference rule in Resolution is given as follows

$$\begin{aligned} \frac{C \vee x, \quad D \vee \lnot x}{C \vee D}, \end{aligned}$$

where C and D are clauses and x is a variable. We say that x is resolved and \(C \vee D\) is called the resolvant of \(C \vee x\) and \(D \vee \lnot x\). A Resolution derivation of a clause D from a CNF \(\varphi \) is a sequence \(\Pi = \langle C_1, \ldots , C_\tau \rangle \) of clauses such that \(C_\tau = D\) and each \(C_i\) is either an axiom, that is a clause from \(\varphi \), or it is derived by applying the Resolution rule on some clause \(C_j\) and \(C_{j'}\) such that \(j, j' < i\). We will denote this by \(\Pi : \varphi \vdash D\). When defining subsystems of Resolution we consider hardcoded in the sequence of clauses \(\Pi \) also a function providing from which previous clauses a clause in \(\Pi \) is inferred or if it is a clause from \(\varphi \). Having at hand such function then a Resolution derivation \(\Pi \) is given a structure of a DAG and hence we can talk of paths in the derivation intending paths in the DAG associated to the derivation. If \(\varphi \) is an unsatisfiable formula, a Resolution refutation of \(\varphi \) is a derivation of \(\bot \), the empty clause, from \(\varphi \). Resolution is sound and complete, that is we can derive \(\bot \) from a CNF formula if and only if it is unsatisfiable.

A \(\delta \)-regular Resolution derivation of a clause D from a formula \(\varphi \) in n variables is a Resolution derivation in which along any derivation path at most a fraction of \(\delta \) variables are resolved multiple times. Hence a 0-regular Resolution refutation is just a standard regular refutation and a 1-regular Resolution refutation is one without any constraint.

The size of a Resolution derivation is the number of clauses appearing in it. We denote the minimum size of a derivation of D from \(\varphi \) by \({{\mathrm{\mathsf {size}}}}(\varphi \vdash D)\). We also denote the minimum size of a \(\delta \)-regular derivation of D from \(\varphi \) by \({{\mathrm{\mathsf {size}}}}_\delta (\varphi \vdash D)\). Similarly we define the width of a derivation to be the width of the largest clause appearing in it. We denote the minimum width of a derivation of D from \(\varphi \) by \({{\mathrm{\mathsf {width}}}}(\varphi \vdash D)\).

3 A Game View of Resolution

In this section we present a common framework, Definition 3.1, for the games described by Atserias and Dalmau [1] and Pudlák [22] and then we recall the characterizations of width and size in Resolution.

Definition 3.1

(\(\mathsf {Game}_{}(\varphi ,\mathcal {R}\,\,)\)  ). Given an unsatisfiable CNF formula \(\varphi \) in n variables and a set of partial assignments \(\mathcal {R}\)  containing the empty assignment, we define a game, \(\mathsf {Game}_{}(\varphi ,\mathcal {R}\,\,)\)  , between two players \(\mathsf {Prover}\)  (he) and \(\mathsf {Delayer}_{}\)  (she).

At each step i of the game a partial assignment \(\alpha _i\in \mathcal {R}\,\,\) is maintained (\(\alpha _0\) is the empty partial assignment), then at step \(i+1\) the following moves take place:

  1. 1.

    \(\mathsf {Prover}\)  picks some variable \(x\not \in {{\mathrm{\mathrm {dom}}}}(\alpha _i)\).

  2. 2.

    \(\mathsf {Delayer}_{}\)  then has to answer \(x = b\) for some bit \(b\in \{0,1\}\).

  3. 3.

    \(\mathsf {Prover}\)  set \(\alpha _{i+1}\in \mathcal {R}\,\,\) such that \(\alpha _{i+1} \subseteq \alpha _i \cup \{(x, b)\}\).

If at any point in the game \(\alpha _i\) falsifies \(\varphi \) then \(\mathsf {Prover}\)  wins; otherwise we say that \(\mathsf {Delayer}_{}\)  wins. As customary, we say that \(\mathsf {Prover}\)  has a winning strategy for the game if for any strategy of \(\mathsf {Delayer}_{}\)  , he can play so that he wins the game. Otherwise we say that \(\mathsf {Delayer}_{}\)  has a winning strategy.

If in each run of the game \(\mathsf {Prover}\)  can query at most a fraction of \(\delta \) variables, we call the corresponding game \(\mathsf {Game}_{\delta }(\varphi , \mathcal {R}\,\,)\,\,\).

For a suitable choice of \(\mathcal {R}\)  the \(\mathsf {Game}_{}(\varphi ,\mathcal {R}\,\,)\)   is exactly the one used by Atserias and Dalmau [1] to characterise the minimal width of Resolution refutations of \(\varphi \). In particular in [1] the following result is shown (rephrased here with the notations we just set up).

Theorem 3.2

(Atserias and Dalmau [1]). Let \(\varphi \) be an unsatisfiable CNF formula and let \(\mathcal {R}\)  be the set of all possible partial assignments with a domain of size strictly less than w. The following are equivalent

  1. 1.

    \(\mathsf {Prover}\)  has a winning strategy for \(\mathsf {Game}_{}(\varphi ,\mathcal {R}\,\,)\)  ;

  2. 2.

    \({{\mathrm{\mathsf {width}}}}(\varphi \vdash \bot )< w\).

Due to this equivalence, for this particular choice of \(\mathcal {R}\)  , we will denote \(\mathsf {Game}_{}(\varphi , \mathcal {R}\,\,)\)   by \(\mathsf {width\text {-}Game}(\varphi ,w)\)  .

The next result is essentially due to Pudlák [22]: he shows that we can also characterize the minimal size of Resolution refutations of \(\varphi \) in terms of these games. From a Resolution refutation \(\Pi \) we can construct a winning strategy for \(\mathsf {Prover}\)  with a set \(\mathcal {R}\,\,\) of the same size of \(\Pi \) and vice versa. Moreover a play of the \(\mathsf {Game}_{\delta }(\varphi ,\mathcal {R}\,\,)\,\,\) corresponds to a path in \(\Pi \) and, if \(\Pi \) is \(\delta \)-regular, in each run the set of variables \(\mathsf {Prover}\)  is going to query many times is at most a \(\delta \) fraction of the total number of variables.

Theorem 3.3

Let \(\varphi \) be an unsatisfiable CNF and let \(\delta \) be any real in the interval [0, 1]. The following are equivalent

  1. 1.

    there exists a set of partial assignments \(\mathcal {R}\)  such that \(|\mathcal {R}\,\,|\le s\) for which \(\mathsf {Prover}\)  has a winning strategy for \(\mathsf {Game}_{\delta }(\varphi ,\mathcal {R}\,\,)\,\,\);

  2. 2.

    \({{\mathrm{\mathsf {size}}}}_\delta (\varphi \vdash \bot )\le s\).

Notice that this Theorem states an equivalence but in what follows we will only use the fact that (2) implies (1).

4 Games and Xorifications

Given a CNF formula \(\varphi \) on the variables \(x_1, \ldots , x_n\), we define the \(\ell \)-xorification of \(\varphi \) as follows: it is a formula on the new variables \(y^j_i\), where \(1 \le i \le n\) and \(1 \le j \le \ell \) and it is obtained by replacing each \(x_i\) with \(y_i^1 \oplus \cdots \oplus y_i^{\ell }\) and expanding the formula as a CNF formula. We denote the obtained CNF formula by \(\varphi [\oplus ^{\ell }]\) and note that if \(\varphi \) is a k-CNF in n variables, then \(\varphi [\oplus ^{\ell }]\) is a \(k\ell \)-CNF in \(n\ell \) variables. Due to this notation we will refer to the variables of \(\varphi \) as the x-variables and to the variables of \(\varphi [\oplus ^\ell ]\) as the y-variables. Moreover we say that all the y-variables \(y_i^1 , \ldots , y_i^{\ell }\) form a block of variables corresponding to the x-variable \(x_i\). We say that a partial assignment over the y-variables fixes a value for a x-variable \(x_i\) if it assigns all the y-variables in the block corresponding to \(x_i\).

Restated Theorem 1.2

Let \(\varphi \) be an unsatisfiable CNF formula in n variables and w, \(\delta \) and \(\ell \) be parameters. If the width to refute \(\varphi \) is Resolution is at least w then the size to refute \(\varphi [\oplus ^\ell ]\) in \(\delta \)-regular Resolution is at least \(2^{(1-\epsilon )w\ell }\), where \(\epsilon =\frac{1}{\ell }\log (\frac{e^3 \ell n}{w})+\frac{\delta n}{w}\log \frac{e^3\ell }{\delta }\).

Proof

For each partial assignment \(\alpha \) over the y-variables there is naturally associated a partial assignment \(\alpha '\) over the x-variables, defined as follows

$$\begin{aligned} \alpha '(x_i)={\left\{ \begin{array}{ll} \alpha (y_i^1)\oplus \cdots \oplus \alpha _r(y_i^\ell ) &{} \text { if } \forall j=1,\ldots ,\ell ,\ y^j_i\in {{\mathrm{\mathrm {dom}}}}(\alpha ),\\ * &{} \text {otherwise.} \end{array}\right. } \end{aligned}$$

By Theorem 3.3, it is enough to show that if \(\mathsf {Prover}\)  wins \(\mathsf {Game}_{\delta }(\varphi [\oplus ^{\ell }], \mathcal {R}\,\,)\,\,\) then

$$\begin{aligned} |\mathcal {R}\,\,| \ge 2^{w(\ell - \log (\frac{e^3 \ell n}{w})-\frac{\delta \ell n}{w}\log \frac{e^3\ell }{\delta })}. \end{aligned}$$

So suppose \(\mathsf {Prover}\)  wins \(\mathsf {Game}_{\delta }(\varphi [\oplus ^{\ell }], \mathcal {R}\,\,)\,\,\) for some set of partial assignments \(\mathcal {R}\,\,\). Since \({{\mathrm{\mathsf {width}}}}(\varphi \vdash \bot ) \ge w\), by Theorem 3.2, there is a winning strategy \(\sigma \) for \(\mathsf {Delayer}_{}\)  in the game \(\mathsf {width\text {-}Game}(\varphi , w)\)  .

For each total assignment \(\beta \) on the y-variables, consider a strategy \(\sigma _{\beta }\) for \(\mathsf {Delayer}_{}\)  in the game \(\mathsf {Game}_{\delta }(\varphi [\oplus ^{\ell }], \mathcal {R}\,\,)\)   as follows. Let \(\alpha _r\) be the partial assignment on y-variables at stage r of the game \(\mathsf {Game}_{\delta }(\varphi [\oplus ^{\ell }], \mathcal {R}\,\,)\)   and \(y^i_j\) the variable queried by \(\mathsf {Prover}\)  at stage \(r + 1\). Then the strategy \(\sigma _\beta \) for \(\mathsf {Delayer}_{}\)  goes as follows:

  1. 1.

    if there exists \(j'\ne j\) such that \(y_i^{j'}\not \in {{\mathrm{\mathrm {dom}}}}(\alpha _r)\), set \(y_i^j\) to \(\beta (y^i_j)\);

  2. 2.

    otherwise, if for all \(j'\ne j\), \(y_i^{j'}\in {{\mathrm{\mathrm {dom}}}}(\alpha _r)\), then look at the value \(b\in \{0,1\}\) the strategy \(\sigma \) sets the variable \(x_i\) when given the partial assignment \(\alpha '_r\). Then set \(y_i^j\) to \(q\in \{0,1\}\) such that

    $$\begin{aligned} q \oplus \bigoplus _{j'\ne j}\alpha _r(y_i^j)=b. \end{aligned}$$

This can be done since \(x_i\equiv y_i^1\oplus \cdots \oplus y_i^\ell \) and the value of \(x_i\) can be set freely to 0 or 1 appropriately even after all but one of \(y_i^1, \ldots , y_i^\ell \) have been set. Moreover, by induction on r, it is easy to see that the strategy \(\sigma \) must provide an answer when challenged by \(\mathsf {Prover}\)  by any variable \(x_i\) not on the record \(\alpha _r\), hence \(\sigma _\beta \) is well-defined.

Moreover, it is easy to see that for each total assignment \(\beta \) over the y-variables, \(\sigma _\beta \) is a winning strategy for \(\mathsf {Delayer}_{}\)  in the game \(\mathsf {width\text {-}Game}(\varphi [\oplus ^\ell ],w\ell )\)  . Since we are assuming that \(\mathsf {Prover}\)  has a winning strategy for \(\mathsf {Game}_{\delta }(\varphi [\oplus ^{\ell }], \mathcal {R}\,\,)\)  , in particular, this means that for any \(\beta \) he wins against the \(\mathsf {Delayer}_{}\)  ’s strategy \(\sigma _{\beta }\). This means that for each total assignment \(\beta \) over the y-variables, \(\mathcal {R}\,\,\) must contain some partial assignment, denoted by \(\rho _{\beta }\), with domain of size at least \(w\ell \) and such that at least w blocks of y-variables are completely fixed by \(\rho _\beta \). Without loss of generality we assume that each \(\rho _{\beta }\) fixes exactly w blocks of y-variables, that is if \(\rho _\beta \) is setting more y-variables we simply ignore some of the variables and only consider w blocks. Our goal is to show that we have ‘many distinct’ such partial assignments \(\rho _\beta \).

Let \(B\subseteq [n]\) denote a generic set of size w and consider for each possible such B the set \(S_B\) of the total assignments \(\beta \)s such that \(\rho _\beta \) is fixing all the \(y_i^1,\ldots , y_i^\ell \) corresponding to some i in B. There are \(2^{n\ell }\) possible total assignments \(\beta \) and \(\left( {\begin{array}{c}n\\ w\end{array}}\right) \) possible sets B, hence by the pigeonhole principle, there is a set \(B^*\subseteq [n]\) of size w such that

$$\begin{aligned} |S_{B^*}|\ge \frac{2^{n \ell }}{\left( {\begin{array}{c}n\\ w\end{array}}\right) }. \end{aligned}$$
(1)

Let \(S'_{B^*}\) be the set of partial assignments \(\beta |_{B^*}\) where \(\beta \in S_{B^*}\). We clearly have that

$$\begin{aligned} |S_{B^*}| \le |S'_{B^*}|\cdot 2^{n \ell - \ell |B^*|}=|S'_{B^*}|\cdot 2^{n \ell - w\ell }. \end{aligned}$$

By Eq. (1), we get

$$\begin{aligned} |S'_{B^*}| \ge \frac{2^{w \ell }}{\left( {\begin{array}{c}n\\ w\end{array}}\right) }. \end{aligned}$$
(2)

We have now that both \(S'_{B^*}\) and \(\{\rho _\beta \in \mathcal {R}\,\,: \beta \in S_{B^*}\}\) consist of assignments with domain the y-variables \(y_i^j\) such that \(i \in B^*\) and \(1\le j\le \ell \). We show that \(|\{\rho _\beta \in \mathcal {R}\,\,: \beta \in S_{B^*}\}|\) cannot be too small compared to \(|S'_{B^*}|\), this will be, intuitively, due to the fact that the \(\beta \)s we start with are very different.

Let \(Z^{\beta }\) be the set of variables that \(\mathsf {Prover}\)  re-queried when playing against \(\sigma _{\beta }\) and for any \(i=1,\ldots ,n\) let \(Z^\beta _i = Z^\beta \cap \{y_i^1, \ldots , y_i^\ell \}\). By hypothesis, \(\mathsf {Prover}\)  is allowed to re-query in each game at most a \(\delta \) fraction of variables, hence \(|Z^\beta |\le \delta \ell n\).

When \(\mathsf {Delayer}_{}\)  follows the strategy \(\sigma _\beta \) and fixes all y-variables in a block corresponding to \(x_i\), the assignment produced \(\rho _\beta \) is within Hamming distance \(|Z^{\beta }_i|+1\) from \(\beta \) in that block. This means that for each \(\beta \in S_{B^*}\) and for each i, \(\rho _\beta |_{\{y^i_1,\ldots , y^i_\ell \}}\) has Hamming distance at most \(|Z^{\beta }_i|+1\) from some partial assignment in \(S'_{B^*}\) restricted to \(\{y^i_1,\ldots , y^i_\ell \}\). Let \(\mathcal {Z}\) be the set of all possible sets Z that are subsets of the y-variables of size \(\delta \ell n\) and such that there exists \(\beta \in S_{B^*}\) with \(Z^\beta \subseteq Z\). For any \(i=1,\ldots ,n\) let \(Z_i = Z \cap \{y_i^1, \ldots , y_i^\ell \}\). Then, by counting the variables where \(\rho _\beta \) and an assignment in \(S'_{B^*}\) could differ, we have that

$$\begin{aligned} |S'_{B^*}| \le |\{\rho _{\beta }\in \mathcal {R}\,\,: \beta \in S_{B^*}\}| \cdot \sum _{Z \in \mathcal {Z}}\prod _{i\in B^*}2^{|Z_i|+1}\left( {\begin{array}{c}\ell \\ |Z_i|+1\end{array}}\right) . \end{aligned}$$
(3)

Hence we have the following chain of inequalities

$$\begin{aligned} |S'_{B^*}|&\mathop {\le }\limits ^{eq.(3)} |\{\rho _{\beta }\in \mathcal {R}\,\,: \beta \in S_{B^*}\}| \cdot \sum _{Z \in \mathcal {Z}}\prod _{i\in B^*}2^{|Z_i|+1}\left( {\begin{array}{c}\ell \\ |Z_i|+1\end{array}}\right) \end{aligned}$$
(4)
$$\begin{aligned}&\le |\{\rho _{\beta }\in \mathcal {R}\,\,: \beta \in S_{B^*}\}| \cdot \sum _{Z \in \mathcal {Z}}\prod _{i\in B^*}\left( \frac{e^2\ell }{|Z_i|+1}\right) ^{|Z_i|+1} \end{aligned}$$
(5)
$$\begin{aligned}&\le |\{\rho _{\beta }\in \mathcal {R}\,\,: \beta \in S_{B^*}\}| \cdot \sum _{Z \in \mathcal {Z}}\left( \frac{ \sum _{i\in B^*}e^2\ell }{\sum _{i\in B^*}(|Z_i|+1)}\right) ^{\sum _{i\in B^*}(|Z_i|+1)} \end{aligned}$$
(6)
$$\begin{aligned}&\le |\{\rho _{\beta }\in \mathcal {R}\,\,: \beta \in S_{B^*}\}| \cdot \left( {\begin{array}{c}\ell n\\ \delta \ell n\end{array}}\right) \cdot \left( \frac{\sum _{i\in B^*}e^2\ell }{w}\right) ^{\delta \ell n +w} \end{aligned}$$
(7)
$$\begin{aligned}&= |\{\rho _{\beta }\in \mathcal {R}\,\,: \beta \in S_{B^*}\}| \cdot \left( {\begin{array}{c}\ell n\\ \delta \ell n\end{array}}\right) \cdot \left( e^2\ell \right) ^{\delta \ell n +w} \end{aligned}$$
(8)

The inequality (6) follows from the weighted AM-GM inequalityFootnote 1 and the inequality (7) follows from the fact that \(w\le \sum _{i\in B^*}(|Z_i|+1)\le \delta \ell n +w\). Putting all together we have that

$$\begin{aligned} |\mathcal {R}\,\,| \mathop {\ge }\limits ^{(\dagger \dagger )} |\{\rho _{\beta }\in \mathcal {R}\,\,: \beta \in S_{B^*}\}| \ge \frac{|S'_{B^*}|}{\left( {\begin{array}{c}n \ell \\ \delta \ell n\end{array}}\right) \left( e^2\ell \right) ^{\delta \ell n +w}}&\mathop {\ge }\limits ^{\text {(eq. 2)}} \frac{2^{w\ell }}{\left( {\begin{array}{c}n\\ w\end{array}}\right) \left( {\begin{array}{c}\ell n\\ \delta \ell n\end{array}}\right) \left( e^2\ell \right) ^{\delta \ell n +w}}\\&\ge {\frac{2^{w \ell }}{(\frac{e n}{w})^w\left( \frac{e}{\delta }\right) ^{\delta \ell n} \left( e^2\ell \right) ^{\delta \ell n +w}}}\\&= 2^{w(\ell - \log (\frac{e^3 \ell n}{w})-\frac{\delta \ell n}{w}\log \frac{e^3\ell }{\delta })}, \end{aligned}$$

where the inequality \((\dagger \dagger )\) follows by the definition of \(\rho _\beta \). \(\square \)

The next step now is to obtain formulas which require very large Resolution width. Such a construction is given by Beck and Impagliazzo in [5] and improved in [8].

Theorem 4.1

([8]) For any large n and k, there exist an unsatisfiable k-CNF formula \(\varphi \) on n variables and some \(\zeta _k = \widetilde{O}(k^{-1/3})\) such that

$$\begin{aligned} {{\mathrm{\mathsf {width}}}}(\varphi \vdash \bot ) \ge (1 - \zeta _k)n. \end{aligned}$$

Now, we have set all the preliminary results to prove Theorem 1.1 and in particular, our SETH lower bound for Resolution will follow from the existence of a CNF formula requiring very high Resolution width (Theorem 4.1) and the previous theorem about xorifications (Theorem 1.2).

Restated Theorem 1.1

(Main theorem) For any large n and k, there exists an unsatisfiable k-CNF formula \(\psi \) on \(n'\ge n\) variables such that any \(\delta \)-regular Resolution refutation of \(\psi \) requires size at least \(2^{(1-\epsilon _{k})n}\) where both \(\epsilon _k\) and \(\delta \) are \(\widetilde{O}(k^{-1/4})\).

Proof

Let \(\varphi \) be the k-CNF formula given by Theorem 4.1, in particular \({{\mathrm{\mathsf {width}}}}(\varphi \vdash \bot )\ge (1-\zeta _k)n\) where \(\zeta _k = \widetilde{O}(k^{-1/3})\). Then \( \varphi [\oplus ^{\ell }]\) is a \(k'\)-CNF formula on \(n\ell \) variables where \(k'=k\ell \). By the choice of \(\ell =\widetilde{\Theta }(k^{1/3})\), \(\delta =\widetilde{O}(k^{-1/3})\) and by Theorem 1.2, it follows that

$$\begin{aligned} {{\mathrm{\mathsf {size}}}}_\delta (\varphi [\oplus ^\ell ] \vdash \bot )&\ge 2^{(1-\zeta _k)n(\ell - \log (\frac{e^3 \ell n}{w})-\frac{\delta \ell n}{w}\log \frac{e^3\ell }{\delta })}\\&\mathop {=}\limits ^{(\dagger )} 2^{(1 - \zeta _k)n(\ell -O(\log k)-\ell \widetilde{O}(k^{-1/3}))} = 2^{(1-\widetilde{O}(k^{-1/3}))n\ell }\\&= 2^{(1 - \epsilon _{k'})n\ell }. \end{aligned}$$

In particular the equality \((\dagger )\) follows from the choice of \(\ell =\widetilde{\Theta }(k^{1/3})\) and \(\delta =\widetilde{O}(k^{-1/3})\). To obtain the asymptotic behaviour of \(\epsilon _{k'}\) with respect to \(k'\), just observe that \(k'=k\ell =\widetilde{\Theta }(k^{4/3})\) and \(\epsilon _{k'} =\widetilde{O}(k^{-1/3})\), hence \(\epsilon _{k'} = \widetilde{O}(k'^{-1/4})\). Similarly we get the asymptotic behaviour of \(\delta \) as a function of \(k'\). So the formula \(\psi \) in the statement is the constructed formula \(\varphi [\oplus ^\ell ]\). \(\square \)