Making = Practical: Efficient Interactive Protocols for BDD Algorithms

05/19/2023
by   Eszter Couillard, et al.
0

We show that interactive protocols between a prover and a verifier, a well-known tool of complexity theory, can be used in practice to certify the correctness of automated reasoning tools. Theoretically, interactive protocols exist for all problems. The verifier of a protocol checks the prover's answer to a problem instance in probabilistic polynomial time, with polynomially many bits of communication, and with exponentially small probability of error. (The prover may need exponential time.) Existing interactive protocols are not used in practice because their provers use naive algorithms, inefficient even for small instances, that are incompatible with practical implementations of automated reasoning. We bridge the gap between theory and practice by means of an interactive protocol whose prover uses BDDs. We consider the problem of counting the number of assignments to a QBF instance (#CP), which has a natural BDD-based algorithm. We give an interactive protocol for #CP whose prover is implemented on top of an extended BDD library. The prover has only a linear overhead in computation time over the natural algorithm. We have implemented our protocol in , a certifying tool for #CP. Experiments on standard QBF benchmarks show that is competitive with state-of-the-art QBF-solvers. The run time of the verifier is negligible. While loss of absolute certainty can be concerning, the error probability in our experiments is at most 10^-10 and reduces to 10^-10k by repeating the verification k times.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/14/2019

Classification in a Large Network

We construct and analyze the communication cost of protocols (interactiv...
research
07/03/2018

Interactive Certificates for Polynomial Matrices with Sub-Linear Communication

We develop and analyze new protocols to verify the correctness of variou...
research
07/03/2018

Efficient Rational Proofs with Strong Utility-Gap Guarantees

As modern computing moves towards smaller devices and powerful cloud pla...
research
07/03/2018

Verification Protocols with Sub-Linear Communication for Polynomial Matrix Operations

We design and analyze new protocols to verify the correctness of various...
research
11/24/2020

New method of verifying cryptographic protocols based on the process model

A cryptographic protocol (CP) is a distributed algorithm designed to pro...
research
11/06/2022

DeepSec: Deciding Equivalence Properties for Security Protocols – Improved theory and practice

Automated verification has become an essential part in the security eval...
research
12/30/2017

Shannon Capacity is Achievable for Binary Interactive First-Order Markovian Protocols

We address the problem of simulating an arbitrary binary interactive fir...

Please sign up or login with your details

Forgot password? Click here to reset