skip to main content
10.1145/800061.808762acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free Access

A complexity theoretic approach to randomness

Published:01 December 1983Publication History

ABSTRACT

We study a time bounded variant of Kolmogorov complexity. This notion, together with universal hashing, can be used to show that problems solvable probabilistically in polynomial time are all within the second level of the polynomial time hierarchy. We also discuss applications to the theory of probabilistic constructions.

References

  1. 1.L. Adleman, "Two theorems on random polynomial time," 19th FOCS, 1978, 75-83.Google ScholarGoogle Scholar
  2. 2.L. Adleman, "Time, space and randomness," MIT/LCS/TM-131, 1979.Google ScholarGoogle Scholar
  3. 3.R. Aleliunas, R.M. Karp, R. Lipton, L. Lovasz, and C. Rackoff, "Random walks, universal traversal sequences, and complexity of mazeproblems," 20th FOCS, 218-223, 1979.Google ScholarGoogle Scholar
  4. 4.L. Blum, M. Blum, M. Shub, "A simple, secure pseudo-random number generator," CRYPTO 1982.Google ScholarGoogle Scholar
  5. 5.C.H. Bennett and J. Gill, "Relative to a random oracle A, pA@@@@NPA@@@@co-NPA with probability one," SKOMP, to appear.Google ScholarGoogle Scholar
  6. 6.G.J. Chaitin, "On the length of programs for computing finite binary sequences," JACM 13, 1966, 547-569 and JACM 16, 1969, 145-159. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7.G.J. Chaitin, "A theory of program size formally identical to information theory," JACM 22, 329-340. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.J.L. Carter and M.N. Wegman, "Universal classes of hash function," JCSS 18, no 2, 143-154, 1979.Google ScholarGoogle ScholarCross RefCross Ref
  9. 9.R.P. Daley, "On the inference of optimal descriptions," TCS 4, 301-319, 1977.Google ScholarGoogle ScholarCross RefCross Ref
  10. 10.J. Gill, "Complexity of probabilistic Turing machines," SIAM J. of Computing 6, 675-695.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11.O. Gabber and Z. Galil, "Explicit constructions of linear size super-concentrators," 20th FOCS, 364-370, 1979.Google ScholarGoogle Scholar
  12. 12.S. Goldwasser, S. Micali, and P. Tong, "Why and how to establish a private code on a public network," 23rd FOCS, 134-144, 1982.Google ScholarGoogle Scholar
  13. 13.M. Furst, J.B. Saxe, M. Sipser, "Parity, circuits, and the polynomial time hierarchy," 22nd FOCS, 260-270, 1981.Google ScholarGoogle Scholar
  14. 14.R. Karp, "Probabilistic analysis of partitioning algorithms for the travelling-salesman problem in the plan," Math. Op. Res. 2, 209-224.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. 15.H. Katseff and M. Sipser, "Several results in program size and complexity," 18th FOCS, 1977, 82-89.Google ScholarGoogle Scholar
  16. 16.K. Ko "Resource-bounded program-size complexity and pseudo-random sequences," to appear.Google ScholarGoogle Scholar
  17. 17.A.N. Kolmogorov, "Three approaches for defining the concept of information quantity," Prob. Inform. Trans. 1, 1-7, 1965.Google ScholarGoogle Scholar
  18. 18.L. Levin, "Universal sequential search problems," Prob. Info. Trans. 9, 1973, 265-266.Google ScholarGoogle Scholar
  19. 19.A.R. Meyer and E.M. McCreight, "Computationally complex and pseudo-random zero-one valued functions," in Theory of Machines and Computations, Z. Kohavi and A. Paz, eds. Academic Press, 19-42, 1971.Google ScholarGoogle Scholar
  20. 20.G. Miller, "Rieman's hypothesis and tests for primality," 7th SIGACT, 1975, 234-239. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. 21.G.L. Peterson, "Succinct representations, random strings, and complexity classes," 21st FOCS, 86-95, 1980.Google ScholarGoogle Scholar
  22. 22.N. Pippenger, "Superconcentrators," SIAM J. Comput. 6, 298-304, 1972.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. 23.N. Pippenger and A. Yao, "Rearrangeable networks with limited depth," SIAM J. Alg. and Disc. Meth. 3, 411-417, 1982.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. 24.W. Paul, J. Seiferas, and J. Simon, "An information-theoretic approach to time bounds for on-line-computations," 12th STOC, 357-367, 1980. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. 25.M. Rabin, "Probabilistic algorithms in finite fields," MIT/CCS/TR-213. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. 26.M. Rabin, "N-process synchronization by 4 log N-valued shared variable," 21st FOCS, 1980, 4-7-410.Google ScholarGoogle Scholar
  27. 27.C. Schnorr, "the network complexity and Turing Machine complexity of finite functions," Acts Informa. 7, 1976, 95-107.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. 28.A. Shamir, "On the generation of cryptographically strong pseudo-random sequences," 8th ICALP, 545-550, 1981. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. 29.M. Sipser, "Borel sets and circuit complexith," 15th STOC, 1983. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. 30.M. Sipser, "Three approaches to a definition of finite state randomness," unpublished manuscript.Google ScholarGoogle Scholar
  31. 31.R. Solovay and V. Strassen, "A fast Monte-Carol test for primality," SIAM J. on Comput. 6, 1977, 84-85.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. 32.L. Stockmeyer, "The polynomial time hierarchy," TCS 3, no.1, 1-22, 1976.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. A complexity theoretic approach to randomness

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        STOC '83: Proceedings of the fifteenth annual ACM symposium on Theory of computing
        December 1983
        487 pages

        Copyright © 1983 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 December 1983

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate1,469of4,586submissions,32%

        Upcoming Conference

        STOC '24
        56th Annual ACM Symposium on Theory of Computing (STOC 2024)
        June 24 - 28, 2024
        Vancouver , BC , Canada

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader