Computer Science Journal
Computer Science Journal
Computer Science
MIT Press
• http://www-mitpress.mit.edu/jrnls-catalog/chicago.html/
• http://www.cs.uchicago.edu/publications/cjtcs/
• gopher.mit.edu
• gopher.cs.uchicago.edu
c
1995 by Massachusetts Institute of Technology. Subscribers are licensed to
use journal articles in a variety of ways, limited only as required to insure fair
attribution to authors and the journal, and to prohibit use in a competing
commercial product. See the journal’s World Wide Web site for further
details. Address inquiries to the Subsidiary Rights Manager, MIT Press
Journals; (617)253-2864; [email protected].
[ii]
Abstract
Abstract-1 We present a Logspace, many-one reduction from the undirected
s–t connectivity problem to its complement. This shows that SL =
coSL.
1 Introduction
1-1 This paper deals with the complexity class symmetric Logspace, SL, defined
by Lewis and Papadimitriou in [LP82]. This class can be defined in several
equivalent ways:
L ⊆ SL ⊆ RL ⊆ NL
Theorem 1 SL = coSL
It should be noted that the monotone analogs (see [GS91]) of SL and coSL
are known to be different [KW88].
1-5 As a direct corollary of our theorem, we obtain LhSLi = SL where LhSLi
is the class of languages accepted by Logspace oracle Turing machines with
oracle from SL, using the oracle model of [RST84].
2 Proof of Theorem
2.1 Overview of proof
2.1-1 We design a many-one reduction from coUSTCON to USTCON . We start
by developing simple tools for combining reductions in subsection 2.2. In
particular, these tools will allow us to use the AKS sorting networks in order
to “count.” At this point, the main ingredient of the reduction will be the
calculation of the number of the connected components of a graph. An upper
bound to this number is easily obtained using transitive closure, while the
main idea of the proof is to obtain a lower bound by computing a spanning
forest of the graph. We do this in subsection 2.3. Everything is put together
in subsection 2.4.
Notation 2.1 Given f : {0, 1}∗ → {0, 1}∗ , denote by fn : {0, 1}n → {0, 1}∗ the
restriction of f to inputs of length n. Denote by fn,k the kth bit function of
fn (i.e., if fn : {0, 1}n → {0, 1}m , then fn (~x) = (fn,1 (~x), . . . , fn,m (~x))).
Notation 2.2 We represent an n-node undirected graph G using n2 vari-
ables ~x = (xi,j )1≤i<j≤n s.t. xi,j is 1 iff (i, j) ∈ E(G). If f (~x) operates on
graphs,we will write f (G), meaning that the input to f is a binary vector of
n
length 2 representing G.
2.2-2 We say that f : {0, 1}∗ → {0, 1}∗ reduces to USTCON (m) if we can,
uniformly and in Logspace, label the edges of a graph of size m with
{ 0, 1, xi , ¬xi | 1 ≤ i ≤ n }, s.t. fn,k (~x) = 1 if and only if there is a path from
1 to k in the corresponding graph. We may formalize this with a definition.
Definition 2.1 We say that f : {0, 1}∗ → {0, 1}∗ reduces to USTCON (m),
m = m(n), if there is a uniform family of Space(log(n)) functions {σn,k } s.t.
for all n and k:
Definition 2.2 Sort: {0, 1}n → {0, 1}n is the Boolean sorting function (i.e.,
it moves all the zeros to the beginning of the string).
Using the AKS sorting networks [AKS83], which belong to NC 1 , we derive
the following corollary.
Corollary 2.2 Sort is monotonically reducible to USTCON (poly).
4
(
0 (i, j) ∈ LFF (G)
SF i,j (G) =
1 otherwise
5
(=⇒) e ∈ F and therefore, e does not close a cycle in Fe , but then e does
not close a cycle in the transitive closure of Fe , and in particular e does not
close a cycle in Ge .
(⇐=) e does not close a cycle in Ge therefore, e does not close a cycle in
Fe and e ∈ F .
Proof of Claim 2.4.1 2
W
Proof of Lemma 2.5 LI i (G) = nj=i+1 (i is connected to j in G). So LI is
a simple monotone formula over connectivity problems, and LI reduces to
USTCON by lemmas 2.1 and 2.3. This is, actually, a monotone reduction.
2.4-2 Using the spanning forest and the LI function, we can exactly compute
the number of connected components of G (i.e., given G, we can compute
a function NCC i which is 1 iff there are exactly i connected components
in G).
Then:
fi (G) = 1 =⇒ k < i
gi (G) = 1 =⇒ n − k < i =⇒ k > n − i,
and thus:
NCC i (G) = fi+1 (G) ∧ gn−i+1 (G)
Therefore, applying lemmas 2.1, 2.2, 2.3, 2.4, and 2.5 proves the lemma.
Proof of Lemma 2.7 Given (G, s, t), define G+ to be the graph G∪{(s, t)}.
Denote by #CC (H) the number of connected components in the undirected
graph H.
s is not connected to t in G ⇐⇒ #CC (G+ ) = #CC (G) − 1
n
_
⇐⇒ NCC i (G) ∧ NCC i−1 (G+ )
i=2
Therefore, applying lemmas 2.1, 2.3, and 2.6 proves the lemma.
Proof of Lemma 2.7 2
3 Extensions
3-1 Denote by LhSLi the class of languages accepted by Logspace oracle Turing
machines with an oracle from SL. An oracle Turing machine has a work tape
and a write-only query tape (with unlimited length) which is initialized after
every query. We get:
Corollary 3.1 LhSLi = SL.
Corollary 3.1 Proof-1 Proof of Corollary 3.1 Let M be an oracle Turing Machine running in
LhSLi , and fix an input ~x to M . We build the “configuration” graph G(V, E)
of M using the following process:
• Let V contain all possible configurations.
• Then, (v, w) ∈ E with the label “q is (not) s–t connected,” if, starting
from configuration v, the next query is q. If the oracle answers that “q
is (not) connected,” then the machine moves to configuration w.
Corollary 3.1 Proof-2 Notice that we can ignore the direction of the edges, as backward edges
do not benefit us. The reason is that from any vertex v there is only one
forward edge leaving v that can be traversed (i.e., whose label matches the
oracle’s answer). Therefore, if we reach v using a “backward edge” w→v,
then the only forward edge leaving v that can be traversed is v→w.
Corollary 3.1 Proof-3 Now we can replace query edges labeled “q is connected” with the s–t
connectivity problem q, and edges labeled “q is not connected” with the s–t
connectivity problem obtained using our theorem that SL = coSL, resulting
in one, not too big, s–t connectivity problem. It is also clear that this can
be done in Logspace, completing the proof.
Proof of Corollary 3.1 2
8
4 Acknowledgments
4-1 We would like to thank Amos Beimel, Allan Borodin, Assaf Schuster, Robert
Szelepcsényi, and Avi Wigderson for helpful discussions.
References
[AKL+ 79] R. Aleliunas, R. M. Karp, R. J. Lipton, L. Lovasz, and C. Rackoff.
Random walks, universal sequences and the complexity of maze
problems. In Proceedings of the 20th Annual IEEE Symposium on
the Foundations of Computer Science. Institute of Electrical and
Electronics Engineers, 1979.
11