Remember to take a look at the grading guidelines.

In solving the problem sets, you are allowed to collaborate with fellow students taking the class, but remember that each submission can have at most one author. If you do collaborate in any way, you must acknowledge, for each problem, the people you worked with on that problem.

The problems have been carefully chosen for their pedagogical value, and hence might be similar to those given in past offerings of this course at UW, or similar to other courses at other schools. Using any pre-existing solutions from these sources, for from the web, constitutes a violation of the academic integrity you are expected to exemplify, and is strictly prohibited.

Most of the problems only require one or two key ideas for their solution. It will help you a lot to spell out these main ideas so that you can get most of the credit for a problem even if you err on the finer details.

A final piece of advice: Start working on the problem sets early! Don’t wait until the day (or few days) before they’re due.

Each problem is worth 15 points.

- Prove that for every protocol for a language , if the prover and the verifier repeat the protocol times in parallel (verifier runs independent random strings for each message) and the verifier accepts only if all copies accept, then the probability that the verifier accepts is at most . (Note that you cannot assume the prover is acting independently in each execution.)
- Prove that for every constant , . Hint: first prove that by repeating the proof in parallel and using the union bound. Then argue about general proofs.
- Show that computing the permanent for matrices with integer entries is in .
- Define SimpleIP to the class of languages that have an interactive protocol where the prover sends a single message and then the verifier makes an accept/reject decision based on this message (so there is in fact no interaction). Prove that SimpleIP is unlikely to equal IP by showing SimpleIP . Hint: Try to use the same ideas as in the proof that BPP is in the second level of the polynomial hierarchy.

Remember to take a look at the grading guidelines.

In solving the problem sets, you are allowed to collaborate with fellow students taking the class, but remember that each submission can have at most one author. If you do collaborate in any way, you must acknowledge, for each problem, the people you worked with on that problem.

The problems have been carefully chosen for their pedagogical value, and hence might be similar to those given in past offerings of this course at UW, or similar to other courses at other schools. Using any pre-existing solutions from these sources, for from the web, constitutes a violation of the academic integrity you are expected to exemplify, and is strictly prohibited.

Most of the problems only require one or two key ideas for their solution. It will help you a lot to spell out these main ideas so that you can get most of the credit for a problem even if you err on the finer details.

A final piece of advice: Start working on the problem sets early! Don’t wait until the day (or few days) before they’re due.

Each problem is worth 15 points unless otherwise noted.

- Show that any boolean function on bits can be computed by a circuit of size less than . Hint: In class we saw a recursive way to give a circuit of size for any boolean function. Try to use the same method, but stop after levels of the recursion. At this point, use the fact that there are only a few functions on bits, to complete the evaluation of the overall function.
- A language is sparse if there is a polynomial such that for every . Show that every sparse language is in .
- Call a multiset of bit strings -pseudorandom for circuits of size , if for every circuit (with one bit output) of size , cannot distinguish a random element from from a truly random string, in the following sense. If is a uniformly random element of , and is a uniformly random bit string, then . Show that for every , there is an -pseudorandom set with . Hint: try to pick randomly, and then argue that simultaneously fools all circuits of size with positive probability.
- Suppose there is a randomized polynomial time algorithm that takes as input a , and outputs another with the property that if the input is satisfiable, then the output is not satisfiable with probability at least , and if the input is unsatisfiable, then the output is satisfiable with probability at least . Show that this would imply that the polynomial hierarchy collapses to . Hint: follow the proof that if has polynomial sized circuits, then the hierarchy collapses to the second level.

Remember to take a look at the grading guidelines.

In solving the problem sets, you are allowed to collaborate with fellow students taking the class, but remember that each submission can have at most one author. If you do collaborate in any way, you must acknowledge, for each problem, the people you worked with on that problem.

The problems have been carefully chosen for their pedagogical value, and hence might be similar to those given in past offerings of this course at UW, or similar to other courses at other schools. Using any pre-existing solutions from these sources, for from the web, constitutes a violation of the academic integrity you are expected to exemplify, and is strictly prohibited.

Most of the problems only require one or two key ideas for their solution. It will help you a lot to spell out these main ideas so that you can get most of the credit for a problem even if you err on the finer details.

A final piece of advice: Start working on the problem sets early! Don’t wait until the day (or few days) before they’re due.

Each problem is worth 15 points unless otherwise noted.

- Let be the language of properly nested parentheses. For example (()) and (()()(())) are in , but )( is not. Show that is in L.
- Let CONNECTED denote the language consisting of directed graphs which are strongly connected: there is a path from to , for every pair of vertices . Show that CONNECTED is NL-complete.
- An undirected graph is bipartite if the vertices can be partitioned into two sets such that all edges go from a node in one set to a node in the other. A graph is bipartite if and only if it does not have any cycles of odd length. Let BIPARTITE denote the language consisting of bipartite graphs. Show that BIPARTITE NL.
- Show that SAT for all constants such that .
- If is a collection of subsets of a finite set , the VC dimension of is the size of the largest set such that for every , there is a set in for which . A boolean circuit represents collection if consists of exactly those elements for which . Define the language VC-DIMENSION to consist of those pairs such that is a circuit representing a family of VC dimension at least . Show that VC-DIMENSION is in , and is complete for this class.

Remember to take a look at the grading guidelines.

Each problem is worth 15 points unless otherwise noted.

- Exercise 2.8 from the text: Let HALT be the Halting Language defined in Theorem 1.11 of the text: HALT = . Show that HALT is NP-hard. Is it NP-complete?
- Exercise 2.10 from the text: Suppose are in NP. Then is in NP? What about ?
- Exercise 2.15 from the text: A clique of an undirected graph is a set of vertices in which every two vertices have an edge between them. A vertex cover is a subset such that every edge of the graph is incident to one of the vertices from the set. Let CLIQUE be language , and let VERTEX COVER be the language . Prove that both of these problems are NP-complete.
- Exercise 3.9 from the text: Suppose we pick a random language C by choosing every string to be in C independently with probability . Prove that with high probability is not the same as .
- A digital signature scheme is a triple of randomized polynomial time algorithms: Generate, Sign, and Check, with the following properties. On input , Generate outputs a pair of strings (public, secret), such that for any message m, Check(m,Sign(m,secret),public) always outputs 1, yet for any polynomial time algorithm A, the probability that Check(m,A(m,public),public) outputs 1 is at most . Show that such a scheme cannot exist if P=NP.