Skip to main content
Springer logoLink to Springer
. 2022 Jul 14;84(12):3655–3685. doi: 10.1007/s00453-022-01000-3

Monotone Circuit Lower Bounds from Robust Sunflowers

Bruno Pasqualotto Cavalar 1,, Mrinal Kumar 2, Benjamin Rossman 3
PMCID: PMC9705498  PMID: 36465838

Abstract

Robust sunflowers are a generalization of combinatorial sunflowers that have applications in monotone circuit complexity Rossman (SIAM J. Comput. 43:256–279, 2014), DNF sparsification Gopalan et al. (Comput. Complex. 22:275–310 2013), randomness extractors Li et al. (In: APPROX-RANDOM, LIPIcs 116:51:1–13, 2018), and recent advances on the Erdős-Rado sunflower conjecture Alweiss et al. (In: Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, STOC. Association for Computing Machinery, New York, NY, USA, 2020) Lovett et al. (From dnf compression to sunflower theorems via regularity, 2019) Rao (Discrete Anal. 8,2020). The recent breakthrough of Alweiss, Lovett, Wu and Zhang Alweiss et al. (In: Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, STOC. Association for Computing Machinery, New York, NY, USA, 2020) gives an improved bound on the maximum size of a w-set system that excludes a robust sunflower. In this paper, we use this result to obtain an exp(n1/2-o(1)) lower bound on the monotone circuit size of an explicit n-variate monotone function, improving the previous best known exp(n1/3-o(1)) due to Andreev (Algebra and Logic, 26:1–18, 1987) and Harnik and Raz (In: Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, ACM, New York, 2000). We also show an exp(Ω(n)) lower bound on the monotone arithmetic circuit size of a related polynomial via a very simple proof. Finally, we introduce a notion of robust clique-sunflowers and use this to prove an nΩ(k) lower bound on the monotone circuit size of the CLIQUE function for all kn1/3-o(1), strengthening the bound of Alon and Boppana (Combinatorica, 7:1–22, 1987).

Keywords: Monotone circuit complexity, Robust sunflower lemma, Sunflowers, Circuit complexity, Computational complexity, Extremal combinatorics, Monotone arithmetic circuits, Arithmetic circuit complexity

Introduction

A monotone Boolean circuit is a Boolean circuit with AND and OR gates but no negations (NOT gates). Although a restricted model of computation, monotone Boolean circuits seem a very natural model to work with when computing monotone Boolean functions, i.e., Boolean functions f:{0,1}n{0,1} such that for all pairs of inputs (a1,a2,,an),(b1,b2,,bn){0,1}n where aibi for every i, we have f(a1,a2,,an)f(b1,b2,,bn). Many natural and well-studied Boolean functions such as Clique and Majority are monotone.

Monotone Boolean circuits have been very well studied in Computational Complexity over the years, and continue to be one of the few seemingly largest natural sub-classes of Boolean circuits for which we have exponential lower bounds. This line of work started with an influential paper of Razborov [23] from 1985 which proved an nΩ(k) lower bound on the size of monotone circuits computing the Cliquek,n function on n-vertex graphs for klogn; this bound is super-polynomial for k=logn. Prior to Razborov’s result, super-linear lower bounds for monotone circuits were unknown, with the best bound being a lower bound of 4n due to Tiekenheinrich [29]. Further progress in this line of work included the results of Andreev [5] who proved an exponential lower bound for another explicit function. Alon and Boppana [2] extended Razborov’s result by proving an nΩ(k) lower bound for Cliquek,n for all kn2/3-o(1). A second paper of Andreev [4] from the same time period proved an 2Ω(n1/3/logn) lower bound for an explicit n-variate monotone function. Using a different technique, Harnik and Raz [12] proved a lower bound of 2Ω((n/logn)1/3) for a family of explicit n-variate functions defined using a small probability space of random variables with bounded independence. However, modulo improvements to the polylog factor in this exponent, the state of art monotone circuit lower bounds have been stuck at 2Ω(n1/3-o(1)) since 1987.1 To this day, the question of proving truly exponential lower bounds for monotone circuits (of the form 2Ω(n)) for an explicit n-variate function) remains open! (Truly exponential lower bounds for monotone formulas were obtained only recently [20].)

In the present paper, we are able to improve the best known lower bound for monotone circuits by proving an 2Ω(n1/2/logn) lower bound for an explicit n-variate monotone Boolean function (Sect. 2). The function is based on the same construction first considered by Harnik and Raz, but our argument employs the approximation method of Razborov with recent improvements on robust sunflower bounds [3, 21]. By applying the same technique with a variant of robust sunflowers that we call clique-sunflowers, we are able to prove an nΩ(k) lower bound for the Cliquek,n function when kn1/3-o(1), thus improving the result of Alon and Boppana when k is in this range (Sect. 3). Finally, we are able to prove truly exponential lower bounds in the monotone arithmetic setting to a fairly general family of polynomials, which shares some similarities to the functions considered by Andreev and Harnik and Raz (Sect. 4).

Monotone Circuit Lower Bounds and Sunflowers

The original lower bound for Cliquek,n due to Razborov employed a technique which came to be known as the approximation method. Given a monotone circuit C of “small size”, it consists into constructing gate-by-gate, in a bottom-up fashion, another circuit C~ that approximates C on most inputs of interest. One then exploits the structure of this approximator circuit to prove that it differs from Cliquek,n on most inputs of interest, thus implying that no “small” circuit can compute this function. This technique was leveraged to obtain lower bounds for a host of other monotone problems [2].

A crucial step in Razborov’s proof involved the sunflower lemma due to Erdős and Rado. A family F of subsets of [n] is called a sunflower if there exists a set Y such that F1F2=Y for every F1,F2F. The sets of F are called petals and the set Y=F is called the core. We say that the family F is -uniform if every set in the family has size .

Theorem 1

(Erdős and Rado [8]) Let F be a -uniform family of subsets of [n]. If F>!(r-1), then F contains a sunflower of r petals.

Informally, the sunflower lemma allows one to prove that a monotone function can be approximated by one with fewer minterms by means of the “plucking” procedure: if the function has too many (more than !(r-1)) minterms of size , then it contains a sunflower with r petals; remove all the petals, replacing them with the core. One can then prove that this procedure does not introduce many errors.

The notion of robust sunflowers was introduced by the third author in [24], to achieve better bounds via the approximation method on the monotone circuit size of Cliquek,n when the negative instances are Erdős-Rényi random graphs Gn,p below the k-clique threshold.2 A family F2[n] is called a (p,ε)-robust sunflower if

PWp[n]FF:FWY>1-ε,

where Y:=F and W is a p-random subset of [n] (i.e., every element of [n] is contained in W independently with probability p).

As remarked in [24], every -uniform sunflower of r petals is a (p,e-rp)-robust sunflower. Moreover, as observed in [18], every (1/r, 1/r)-robust sunflower contains a sunflower of r petals. A corresponding bound for the appearance of robust sunflowers in large families was also proved in [24].

Theorem 2

([24]) Let F be a -uniform family such that F!(2log(1/ε)/p). Then F contains a (p,ε)-robust sunflower.

For many choice of parameters p and ε, this bound is better than the one by Erdős and Rado, thus leading to better approximation bounds. In a recent breakthrough, this result was significantly improved by Alweiss, Lovett, Wu and Zhang [3]. Soon afterwards, alternative proofs with slightly improved bounds were given by Rao3 [21] and Tao [28]. A more detailed discussion can be found in a note by Bell, Suchakree and Warnke [6].

Theorem 3

([3, 6, 21, 28]) There exists a constant B>0 such that the following holds for all p,ε(0,1/2]. Let F be an -uniform family such that F(Blog(/ε)/p). Then F contains a (p,ε)-robust sunflower.

Theorem 3 can be verified by combining the basic structure of Rossman’s original argument [24] with the main technical estimate of Rao [21]. Since the proof does not appear explicitly in any of those papers, for completeness we give a proof on Appendix A.

Preliminaries

We denote by 0,1=mn0,1n the set of all n-bit binary vectors with Hamming weight exactly m. We extend the logical operators and to binary strings x,y0,1n, as follows:

  • (xy)i=xiyi, for every i[n];

  • (xy)i=xiyi, for every i[n].

We will say that a distribution X with support in 0,1n is p-biased or p-random if the random variables X1,,Xn are mutually independent and satisfy P[Xi=1]=p for all i. If a distribution U has support in 2[n], we will say that U is p-biased or p-random if the random Boolean string X such that Xi=1iU is p-biased. We sometimes write Up[n] to denote that U is a p-biased subset of [n].

We consistently write random objects using boldface symbols (such as W, Gn,p, etc). Everything that is not written in boldface is not random. When taking probabilities or expectation, the underlying distribution is always the one referred to by the boldface symbol. For instance, when i[n] and W is a p-biased subset of [n], the event iW denotes that the non-random element i is contained in the random set W.

For a Boolean function f and a probability distribution μ on the inputs on f, we write f(μ) to denote the random variable which evaluates f on a random instance of μ.

In what follows, we will mostly ignore ceilings and floors for the sake of convenience, since these do not make any substantial difference in the final calculations.

Harnik-Raz Function

The strongest lower bound known for monotone circuits computing an explicit n-variate monotone Boolean function is exp(Ω((n/logn)1/3)), and it was obtained by Harnik and Raz [12]. In this section, we will prove a lower bound of exp(Ω(n1/2/logn)) for the same Boolean function they considered. We apply the method of approximations [23] and the new robust sunflower bound [3, 21]. We do not expect that a lower bound better than exp(n1/2-o(1)) can be obtained by the approximation method with robust sunflowers. This limitation is discussed with more detail in Sect. 2.8.

We start by giving a high level outline of the proof. We define the Harnik-Raz function fHR:0,1n0,1 and find two distributions Y and N with support in 0,1n satisfying the following properties:

  • fHR outputs 1 on Y with high probability (Lemma 1);

  • fHR outputs 0 on N with high probability (Lemma 2).

Because of these properties, the distribution Y is called the positive test distribution, and N is called the negative test distribution. We also define a set of monotone Boolean functions called approximators, and we show that:

  • every approximator commits many mistakes on either Y or N with high probability (Lemma 9);

  • every Boolean function computed by a “small” monotone circuit agrees with an approximator on both Y and N with high probability (Lemma 10).

Together these suffice for proving that “small” circuits cannot compute fHR. The crucial part where the robust sunflower result comes into play is in the last two items.

Notation for this Section

For A[n], let xA0,1n be the binary vector with support in A. For a set A[n], let A be the indicator function satisfying

A(x)=1xAx.

For a monotone Boolean function f:0,1n0,1, let M(f) denote the set of minterms of f, and let M(f):=M(f)0,1=n. Elements of M(f) are called -minterms of f.

This notation is valid only in Sect. 2 and will be slightly tweaked in Sect. 3 (Lower Bound for Cliquek,n) for the sake of uniformity of exposition.

The Function

We now describe the construction of the function fHR:0,1n0,1 considered by Harnik and Raz [12]. First observe that, for every n-bit monotone Boolean function f, there exists a family S2[n] such that

f(x1,,xn)=DS(x1,,xn):=SSjSxj.

Indeed, S can be chosen to be the family of the coordinate-sets of minterms of f. Now, in order to construct the Harnik-Raz function, we will suppose n is a prime number and let Fn=0,1,,n-1 be the field of n elements. Moreover, we fix two positive integers c and k with c<k<n. For a polynomial PFn[x], we let SP be the set of the valuations of P in each element of 1,2,,k (in other words, SP=P(1),,P(k)). Observe that it is not necessarily the case that SP=k, since it may happen that P(i)=P(j) for some ij such that ij. Finally, we consider the family SHR defined as

SHR:=SP:PFn[x],Phas degree at mostc-1andSPk/2.

We thus define fHR as fHR:=DSHR.

We now explain the choice of SHR. First, the choice for valuations of polynomials with degree at most c-1 is explained by a fact observed in [1]. If a polynomial PFn[x] with degree c-1 is chosen uniformly at random, they observed that the random variables P(1),,P(k) are c-wise independent, and are each uniform in [n]. This allows us to define a distribution on the inputs (the positive test distribution) that has high agreement with fHR and is easy to analyze. Observe further that, since SHRnc, the monotone complexity of fHR is at most 2O(clogn). Later we will choose c to be roughly n1/2, and prove that the monotone complexity of fHR is 2Ω(c).

Finally, the restriction SPk/2 is a truncation made to ensure that no minterm of fHR is very small. Otherwise, if fHR had small minterms, it might have been a function that almost always outputs 1. Such functions have very few maxterms and are therefore computed by a small CNF. Since we desire fHR to have high complexity, this is an undesirable property. The fact that fHR doesn’t have small minterms is important in the proof that fHR almost surely outputs 0 in the negative test distribution (Lemma 2).

Remark 1

(Parameters are now fixed) Formally, the function fHR depends on the choice of the parameters c and k. In other words, for every choice of positive integers ck such that c<k<n, we obtain a different function fHR(c,k). For the rest of Sect. 2, we will let c and k be fixed parameters, and we will refer to fHR unambiguously, always with respect to the fixed parameters c and k. We will make our choice of c and k explicit in Sect. 2.7, but before then we will make no assumptions about c and k other than c<k<n.

Test Distributions

We now define the positive and negative test distributions.

Definition 1

(Test distributions) Let Y0,1n be the random variable which chooses a polynomial PFn[x] with degree at most c-1 uniformly at random, and maps it into the binary input xSP0,1n. Let also N be the (1/2)-biased distribution on 0,1n (i.e., each bit is equal to 1 with probablity 1/2, independently of all the others). Equivalently, N is the uniform distribution on 0,1n.

Harnik and Raz proved that fHR outputs 1 on Y with high probability. For completeness, we include their proof.

Lemma 1

(Claim 4.1 in [12]) We have P[fHR(Y)=1]1-(k-1)/n.

Proof

Let P be the polynomial randomly chosen by Y. Call a pair i,j[k] with ij coinciding if P(i)=P(j). Because the random variables P(i) and P(j) are uniformly distributed in [n] and independent for ij, we have that P[P(i)=P(j)]=1/n for ij. Therefore, the expected number Num(P) of coiciding pairs is k2/n. Observe now that fHR(Y)=0 if and only if P(1),,P(k)<k/2, which occurs only if there exists more than k/2 coinciding pairs. Therefore, by Markov’s inequality, we have

PfHR(Y)=0PNum(P)>k/2k2/nk/2=k-1n.

We now claim that fHR also outputs 0 on N with high probability.

Lemma 2

We have P[fHR(N)=0]1-2-(k/2-c·log2n).

Proof

Let xA be an input sampled from N. Observe that fHR(xA)=1 only if there exists a minterm x of fHR such that xxA. Since all minterms of fHR have Hamming weight at least k/2 and fHR has at most nc minterms, we have

P[fHR(N)=1]nc·2-k/2=2-(k/2-c·log2n).

We will also need the following property about the positive test distribution.

Lemma 3

For every c and A[n] such that A=, we have

P[xAY]k/n.

Proof

Recall that the distribution Y takes a polynomial PFn[x] with degree at most c-1 uniformly at random and returns the binary vector xP(1),P(2),,P(k)0,1n. Let A[n] for c. Observe that xAY if and only if AP(1),P(2),,P(k). Therefore, if xAY, then there exists indices j1,,j such that P(j1),P(j2),,P(j)=A. Since c, we get by the c-wise independence of P(1),,P(k) that the random variables P(j1),P(j2),,P(j) are independent. It follows that

P[P(j1),P(j2),,P(j)=A]=!n.

Therefore, we have

P[xAY]=P[AP(1),P(2),,P(k)]k!nkn.

A Closure Operator

In this section, we describe a closure operator in the lattice of monotone Boolean functions. We prove that the closure of a monotone Boolean function f is a good approximation for f on the negative test distribution (Lemma 4), and we give a bound on the size of the set of minterms of closed monotone functions. This bound makes use of the robust sunflower lemma (Theorem 3), and is crucial to bounding errors of approximation (Lemma 8). Finally, we observe that input functions are closed (Lemma 6). From now on, we let

ε:=n-2c. 1

Definition 2

(Closed function) We say that a monotone function f:0,1n0,1 is closed if, for every A[n]c, we have

P[f(NxA)=1]>1-εf(xA)=1.

This means that for, a closed function, we always have P[f(NxA)=1](1-ε,1) when Ac.

Remark 2

[On the parametrization of closedness] We remark that the definition of a closed function depends on two parameters: the parameter ε, defined in (1), and the parameter c, used in the construction of fHR (see Remark 1). Since both of these parameters are fixed throughout Sect. 2, it is safe to omit them without risk of confusion. Therefore, we will henceforth say that some function is closed without any further specification about the parameters. However, the reader must bear in mind that, whenever a function is said to be closed, the fixed parameters c and ε are in view.

Definition 3

(Closure operator) Let f be a monotone Boolean function. We denote by cl(f) the unique minimal closed monotone Boolean function such that fcl(f). In other words, the function cl(f) is the unique closed monotone function such that, whenever fg and g is monotone and closed, we have fcl(f)g.

Remark 3

(On closure) Note that cl(f) is well-defined, since the constant Boolean function that outputs 1 is closed and, if fg are both closed monotone Boolean functions, then so is fg. Furthermore, just as with the definition of closed functions (see Remark 2), the closure operator cl(·) depends crucially on the parameters ε and c, which are fixed throughout Sect. 2.

We now give a bound on the error of approximating f by cl(f) under the distribution N.

Lemma 4

(Approximation by closure) For every monotone f:0,1n0,1, we have

Pf(N)=0andcl(f)(N)=1n-c.

Proof

We first prove that there exists a positive integer t and sets A1,,At and monotone functions h0,h1,,ht:0,1n0,1 such that

  1. h0=f,

  2. hi=hi-1Ai,

  3. P[hi-1(NxAi)=1]1-ε,

  4. ht=cl(f).

Indeed, if hi-1 is not closed, there exists Ai[n]c such that P[hi-1(NxAi)=1]1-ε but hi-1(xAi)=0. We let hi:=hi-1Ai. Clearly, we have that ht is closed, and that the value of t is at most the number of subsets of [n] of size at most c. Therefore, we get tj=0cnj. Moreover, by induction we obtain that hicl(f) for every i[t]. It follows that ht=cl(f). Now, observe that

Pf(N)=0andcl(f)(N)=1i=1tPhi-1(N)=0andhi(N)=1=i=1tPhi-1(N)=0andxAiNi=1tPhi-1(NxAi)=0εj=0cnjn-c.

We now bound the size of the set of -minterms of a closed function. This bound depends on the robust sunflower theorem (Theorem 3).

Lemma 5

(Closed functions have few minterms) Let B>0 be as in Theorem 3. If a monotone function f:0,1n0,1 is closed, then, for all [c], we have

M(f)(6Bclogn)

Proof

Fix [c]. For convenience, let p=1/2 and recall from (3) that ε=n-2c. We will begin by proving that M(f)(Blog(/ε)/p).

For a contradiction, suppose we have M(f)>(Blog(/ε)/p). Consider the family F:=A[n]:xAM(f). Observe that F=M(f). By Theorem 3, there exists a (p,ε)-robust sunflower FF. Let Y:=F and let Wp[n]. We have

P[f(NxY)=1]P[xM(f):xNxY]=P[FF:FWY]P[FF:FWY]>1-ε.

Therefore, since f is closed, we get that f(xY)=1. However, since Y=F, there exists FF such that YF. This is a contradiction, because xF is a minterm of f. We conclude that

M(f)(Blog(/ε)/p)(2Blog(cn2c))(6Bclogn).

Lemma 6

(Input functions are closed) For all i[n] and large enough n, the Boolean functions i are closed.

Proof

Fix i[n]. Let A[n] be such that Ac and suppose that i(xA)=0. Note that i(xA)=0 is equivalent to (xA)i=0. We have

P[i(NxA)=1]=P[(NxA)i=1]=P[Ni=1]=1/21-n-2c=1-ε,

since N is (1/2)-biased (Definition 1) and ε=n-2c (as fixed in (3)). Therefore, i is closed.

Trimmed Monotone Functions

In this section, we define a trimming operation for Boolean functions. We will bound the probability that a trimmed function gives the correct output on the distribution Y, and we will give a bound on the error of approximating a Boolean function f by the trimming of f on that same distribution.

Definition 4

(Trimmed functions) We say that a monotone function f0,1n0,1 is trimmed if all the minterms of f have size at most c/2. We define the trimming operation trim(f) as follows:

trim(f):==0c/2AM(f)A.

That is, the trim operation takes out from f all the minterms of size larger than c/2, yielding a trimmed function.

Remark 4

(Parametrization of trim(·) and other remarks) We remark that the definition of trimmed functions depends on the choice of the parameter c. As this parameter is fixed (see Remark 1), the operator trim(·) is well-defined. Moreover, if all minterms of f have Hamming weight larger than c/2 (i.e., if M(f)= for all 0,1,,c/2), then trim(f) is the constant function that outputs 0. Finally, if f is the constant function 1, then trim(f)=1, because 1 contains a minterm of Hamming weight equal to 0.

We are now able to bound the probability that a trimmed Boolean function gives the correct output on distribution Y and give a bound on the approximation error of the trimming operation.

Lemma 7

(Trimmed functions are inaccurate in the positive distribution) If a monotone function f0,1n0,1 is trimmed and f1 (i.e., f is not identically 1), then

Pf(Y)=1=1c/2knM(f).

Proof

It suffices to see that, since f is trimmed, if f(Y)=1 and f1 then there exists a minterm x of f with Hamming weight between 1 and c/2 such that xY. The result follows from Lemma 3 and the union bound.

Lemma 8

(Approximation by trimming) Let f0,1n0,1 be a monotone function, all of whose minterms have Hamming weight at most c. We have

Pf(Y)=1andtrim(f)(Y)=0=c/2cknM(f).

Proof

If we have f(Y)=1 and trim(f)(Y)=0, then there was a minterm x of f with Hamming weight larger than c/2 that was removed by the trimming process. Therefore, since xc by assumption, the result follows from Lemma 3 and the union bound.

The Approximators

Let A:=trim(cl(f)):f:0,1n0,1is monotone. Functions in A will be called approximators. We define the approximating operations ,:A×AA as follows: for f,gA, let

fg:=trim(cl(fg)),fg:=trim(cl(fg)).

We now observe that every input function is an approximator. Indeed, since every input i is closed and trivially trimmed (Lemma 6), we have trim(cl(i))=trim(i)=i. Thus, iA for all i[n]. Therefore, we can replace each gate of a monotone ,-circuit C by its corresponding approximating gate, thus obtaining a ,-circuit CA computing an approximator.

The rationale for choosing this set of approximators is as follows. By letting approximators be the trimming of a closed function, we are able to plug the bound on the set of -minterms given by the robust sunflower lemma (Lemma 5) on Lemmas 7 and 8 , since the trimming operation can only reduce the set of minterms. Moreover, since trimmings can only help to get a negative answer on the negative test distribution, we can safely apply Lemma 4 when bounding the errors of approximation.

The Lower Bound

In this section, we prove that the function fHR requires monotone circuits of size 2Ω(c). By properly choosing c and k, this will imply the promised exp(Ω(n1/2-o(1))) lower bound for the Harnik-Raz function. First, we fix some parameters. Choose B as in Lemma 5. Let T:=18B. We also let

k:=n1/2,c:=1T·(k/logn)=k18B·logn.

For simplicity, we assume these values are integers. Note that c=Θ(k/logn)k.

Lemma 9

(Approximators make many errors) For every approximator fA, we have

P[f(Y)=1]+P[f(N)=0]3/2.

Proof

Let fA. By definition, there exists a closed function h such that f=trim(h). Observe that M(f)M(h) for every [c]. From Lemma 5, we get

M(h)(6Bclogn)=(n/3k).

Hence, applying Lemma 7, we obtain that, if f1, we have

P[f(Y)=1]=1c/2knM(h)=1c/23-1/2.

Therefore, for every fA we have P[f(Y)=1]+P[f(N)=0]1+1/23/2.

Lemma 10

(C is well-approximated by CA) Let C be a monotone circuit. We have

P[C(Y)=1andCA(Y)=0]+P[C(N)=0andCA(N)=1]size(C)·2-Ω(c).

Proof

We begin by bounding the approximation errors under the distribution Y. We will show that, for two approximators f,gA, if fg accepts an input from Y, then fg rejects that input with probability at most 2-Ω(c), and that the same holds for the approximation fg.

First note that, if f,gA, then all the minterms of both fg and fg have Hamming weight at most c, since f and g are trimmed. Let now h=cl(fg). We have (fg)(x)<(fg)(x) only if trim(h)(x)<h(x). Since h is closed, we get from Lemma 5 that, for all [c], we have

M(h)(6Bclogn)=(n/3k).

We then obtain the following inequality by Lemma 8:

P(fg)(Y)=1and(fg)(Y)=0=c/2cknM(h)=c/2c3-=2-Ω(c).

The same argument shows P(fg)(Y)=1and(fg)(Y)=0=2-Ω(c). Since there are size(C) gates in C, this implies that P[C(Y)=1andCA(Y)=0]size(C)·2-Ω(c).

To bound the approximation errors under N, note that (fg)(x)=0 and (fg)(x)=1 only if cl(fg)(x)(fg)(x), since trimming a Boolean function cannot decrease the probability that it rejects an input. Therefore, by Lemma 4 we obtain

P(fg)(N)=0and(fg)(N)=1n-c=2-Ω(c).

The same argument shows P(fg)(N)=0and(fg)(N)=1=2-Ω(c). Once again, doing this approximation for every gate in C allows us to conclude P[C(N)=0andCA(N)=1]size(C)·2-Ω(c). This finishes the proof.

Theorem 4

Any monotone circuit computing fHR has size 2Ω(c)=2Ω(n1/2/logn).

Proof

Let C be a monotone circuit computing fHR. Since k/2-clog2n=Ω(k) and kn, for large enough n we obtain from Lemmas 1 and 2 that

P[fHR(Y)=1]+P[fHR(N)=0]2-(k-1)/n-2-(k/2-clog2n)9/5.

We then obtain from Lemmas 9 and 10 :

9/5P[fHR(Y)=1]+P[fHR(N)=0]P[C(Y)=1andCA(Y)=0]+P[CA(Y)=1]+P[C(N)=0andCA(N)=1]+P[CA(N)=0]3/2+size(C)2-Ω(c).

This implies size(C)=2Ω(c).

Are Better Lower Bounds Possible with Robust Sunflowers?

In this section, we allow some degree of imprecision for the sake of brevity and clarity, in order to highlight the main technical ideas of the proof.

A rough outline of how we just proved Theorem 4 is as follows. First, we noted that the minterms of fHR are “well-spread”. This is Lemma 3, which states that the probability that a fixed set A[n] is contained in a random minterm4 of fHR is at most rA, where r=k/n. Moreover, we observed that fHR outputs 0 with high probability in a p-biased distribution (Lemma 2), where p=1/2.

In the rest of the proof, we roughly showed how this implies that DNFs of size approximately s=cc/2 and width w=c/2 cannot approximate fHR (Lemma 9).5 We also observed that we can approximate the and of width-w, size-s DNFs by another width-w, size-s DNF, bounding the error of approximation by rc/2·cc/2. This was proved by noting that conjunctions of width c/2 accept a positive input with probability at most rc/2, and there are at most cc/2 of them. When ckn, we have (rc)c/2=2-Ω(c), and thus we can approximate circuits of size 2o(c) with width-w, size-s DNFs (Lemma 10). This yields the lower bound.

There are two essential numerical components in the proof. First, the “spreadness rate” of the function fHR. A simple counting argument can show that the upper bound of (k/n)A to the probability P[xAY] is nearly best possible when the support of Y is contained in 0,1=kn and k=o(n). So this can hardly be improved with the choice of another Boolean function. Secondly, the bounds for the size and width of the DNF approximators come from the robust sunflower lemma (Theorem 3), which was used to employ the approximation method on p-biased distributions. Since the bound of Theorem 3 is essentially best possible as well, as observed in [3], we cannot hope to get better approximation bounds on a p-biased distribution from sunflowers. Therefore, there does not seem to be much room for getting better lower bounds for monotone circuits using the classical approximation method with sunflowers, if we use p-biased distributions. To get beyond 2Ω(n), another approach seems to be required.

Lower Bound for Cliquek,n

Recall that the Boolean function Cliquek,n:{0,1}n2{0,1} receives a graph on n vertices as an input and outputs a 1 if this graph contains a clique on k vertices. In this section, we prove an nΩ(δ2k) lower bound on the monotone circuit size of Cliquek,n for kn(1/3)-δ.

We note that the first superpolynomial lower bound for the monotone circuit complexity of Cliquek,n was given by Razborov [23], who proved a nΩ(k) lower bound for klogn. Soon after, Alon and Boppana [2] proved a nΩ(k) for Cliquek,n when kn2/3-o(1). This exponential lower bound was better than Razborov’s, as it could be applied to a larger range of k, but it was short of the obvious upper bound of nO(k). Our result finally closes that gap, by proving that the monotone complexity of Cliquek,n is nΘ(k) even for large k.

As in Sect. 2, we will follow the approximation method. However, instead of using sunflowers as in [2, 23] or robust sunflowers as in [24], we introduce a notion of clique-sunflowers and employ it to bound the errors of approximation.

Notation for this Section

In this section, we will often refer to graphs on n vertices and Boolean strings in 0,1n2 interchangeably. For A[n], let KA be the graph on n vertices with a clique on A and no other edges. When A1, the graph KA is the empty graph with n vertices and 0 edges (corresponding to the Boolean string all of which n2 entries are equal to 0.) The size of KA is A. Let also A:0,1n20,1 denote the indicator function of containing KA, which satisfies

A(G)=1KAG.

Functions of the forms A are called clique-indicators. Moreover, if A=, we say that A is a clique-indicator of size equal to . When A1, the function A is the constant function 1.

For p(0,1), we denote by Gn,p the Erdős-Rényi random graph, a random graph on n vertices in which each edge appears independently with probability p.

Let f:0,1n20,1 be monotone and suppose 1,,δk. We define

M(f):={A[n]:f(KA)=1andf(KA\{a})=0for allaA}.

Elements of M(f) are called -clique-minterms of f.

Clique-Sunflowers

Here we introduce the notion of clique-sunflowers, which is analogous to that of robust sunflowers for “clique-shaped” set systems.

Definition 5

(Clique-sunflowers) Let ε,p(0,1). Let S be a family of subsets of [n] and let Y:=S. The family S is called a (p,ε)-clique-sunflower if

PAS:KAGn,pKY>1-ε.

Equivalently, the family S is a clique-sunflower if the family KA:AS[n]2 is a (p,ε)-robust sunflower, since KAKB=KAB.

Though clique-sunflowers may seem similar to regular sunflowers, the importance of this definition is that it allows us to explore the “clique-shaped” structure of the sets of the family, and thus obtain an asymptotically better upper bound on the size of sets that do not contain a clique-sunflower.

Lemma 11

(Clique-sunflower lemma) Let ε<e-1/2 and let S[n]. If the family S satisfies S>!(2ln(1/ε))(1/p)2, then S contains a (p,ε)-clique-sunflower.

Observe that, whereas the bounds for “standard” robust sunflowers (Theorems 2 and 3) would give us an exponent of 2 on the log(1/ε) factor, Lemma 11 give us only an at the exponent. As we shall see, this is asymptotically better for our choice of parameters.

We defer the proof of Lemma 11 to Sect. 3.8. The proof is based on an application of Janson’s inequality [13], as in the original robust sunflower lemma of [24] (Theorem 2).

Test Distributions

We now define the positive and negative test distributions. First, we fix some parameters that will be used throughout the proof. Fix δ(0,1/3). Let

k=n1/3-δandp:=n-2/(k-1). 2

For simplicity, we will assume from now on that δk and δk/2 are integers.

Remark 5

(Parameters are now fixed) From now on until the end of Sect. 3.7, the symbols p,δ and k refer to fixed parameters, and will always unambiguously refer to the values just fixed. This will only change in Sect. 3.8, which is independent of the proof of the lower bound for Cliquek,n, and in which we will permit ourselves to reuse some of these symbols for other purposes. This means that, whenever p,δ and k appear in the following discussion, the reader must bear in mind that p=n-2/(k-1), δ is a fixed number inside (0, 1/3) and k is fixed to be k=n1/3-δ.

We observe that the probability that Gn,p has a k-clique is bounded away from 1.

Lemma 12

We have P[Gn,pcontains a k-clique]3/4.

Proof

There are nk(en/k)k potential k-cliques, each present in Gn,p with probability pk2=n-k. By a union bound, we have P[Gn,pcontains a k-clique](e/k)k(e/3)33/4.

Definition 6

Let Y be the uniform random graph chosen from all possible KA, where A=k. In other words, the distribution Y samples a random minterm of Cliquek,n. We call Y the positive test distribution. Let also N:=Gn,p. We call N the negative test distribution.

From Lemma 12, we easily obtain the following corollary.

Corollary 1

We have P[Cliquek,n(Y)=1]+P[Cliquek,n(N)=0]5/4.

We now prove an analogous result to that of Lemma 3, which shows that the positive distribution Y is unlikely to contain a large fixed clique.

Lemma 13

For every k and A[n] such that A=, we have

P[KAY]k/n.

Proof

The distribution Y samples a set B uniformly at random from [n]k and returns the graph KB. Note that KAKB if and only if AB. We have

P[KAY]=P[AB]=n-kk-nkkn.

A Closure Operator

As in Sect. 2.4, we define here a closure operator in the lattice of monotone Boolean functions. We will again prove that the closure of a function will be a good approximation for it on the negative test distribution. However, unlike Sect. 2.4, instead of bounding the set of minterms, we will bound the set of “clique-shaped” minterms, as we shall see. Finally, we will observe that input functions are also closed. Henceforth, we fix the error parameter

ε:=n-k. 3

Definition 7

(Closed functions) We say that f0,1n20,1 is closed if, for every A[n] such that A2,,δk, we have

P[f(NKA)=1]>1-εf(KA)=1.

Remark 6

(On the parametrization of closedness) Similarly to the Harnik-Raz case (see Remark 2), the definition of a closed function depends on three parameters: the probability p, which controls the distribution N (as discussed in Definition 6), the parameter ε, defined in (3), and the parameter k. Since all of these three parameters are fixed until the end of Sect. 3.7 (see Remark 5), and no other reference to closed functions will be made after that, it is safe to omit them without risk of confusion. Therefore, we will henceforth say that some function is closed without any further specification about the parameters. However, the reader must bear in mind that, whenever a function is said to be closed, the fixed parameters p,ε and k are in view.

Remark 7

(Definitions of closedness compared) Definition 8 bears great resemblance to Definition 3, which also talks about a notion of closed monotone functions in the context of lower bounds for the function of Harnik and Raz. Apart from the different parametrizations, the main difference between those two definitions is that, whereas Definition 3 looks into all inputs of Hamming weight at most c, here we only care about clique-shaped inputs of size at most δk.

As before, we can define the closure of a monotone Boolean function f.

Definition 8

(Closure operator) Let f be a monotone Boolean function. We denote by cl(f) the unique minimal closed monotone Boolean function such that fcl(f).

Remark 8

(On closure) We note again that cl(f) is well-defined (the same arguments of Remark 3 apply here) and remark that its definition also depends on the parameters p,ε and k (see Remark 6), which are fixed throughout the proof, and therefore can be safely omitted.

Lemma 14

(Approximation by closure) For every monotone f:0,1n20,1, we have

Pf(N)=0andcl(f)(N)=1n-(2/3)k.

Proof

We repeat the same argument as that of Lemma 4. Since there are at most nδk graphs KA such that Aδk and ε=n-k, the final bound then becomes n-k·nδkn-(2/3)k.

By employing the clique-sunflower lemma (Lemma 11), we are able to bound the set of -clique-minterms of closed monotone functions.

Lemma 15

(Closed functions have few minterms) If a monotone function f:0,1n20,1 is closed, then, for all 2,,δk, we have

M(f)n2/3.

Proof

Recall that p=n-2/(k-1) and ε=n-k (see (2) and (3)). Applying the same strategy of Lemma 5, replacing the application of Theorem 3 (robust sunflower theorem) by Lemma 11 (clique-sunflower lemma), we obtain

M(f)!(2log(1/ε))(1/p)2(2klogn)·p-2(2δk2logn)·n22/(k-1)(n2/3-2δlogn)·nδn2/3.

Lemma 16

(Input functions are closed) Let i,j[n] be such that ij. For large enough n, the Boolean function i,j is closed.

Proof

Fix i,j[n] such that ij. Let A[n] be such that Aδk and suppose that i,j(KA)=0. Note that i,j(KA)=0 is equivalent to i,jA. This implies that i,j is an edge of NKA if and only if i,j is an edge of N. Therefore, we have

P[i,j(NKA)=1]=P[i,j(N)=1]=P[i,jis an edge ofGn,p]=n-2/(k-1),

since N=Gn,p and p=n-2/(k-1) (see (2), Remark 5 and Definiton 6). It now suffices to show that, for large enough n, we have p1-ε=1-n-k (recall from (3) that ε=n-k).

For convenience, let α=1/3-δ. Note that k=nα. For large enough n, we have

2·lognnα-1n-nα+n-2nα.

Using the inequality log(1-x)-x-x2 for x[0,1/2], we get

2·lognk-1=2·lognnα-1n-nα+n-2nα-log(1-n-nα)=-log(1-n-k).

Therefore, we have

n-2/(k-1)1-n-k,

and we conclude that i,j is closed.

Trimmed Monotone Functions

In this section, we define again a trimming operation for Boolean functions and prove analogous bounds to that of Sect. 2.5.

Definition 9

(Clique-shaped and trimmed functions) We say that a function f:0,1n20,1 is clique-shaped if, for every minterm x of f, there exists A[n] such that x=KA. Moreover, we say that f is trimmed if f is clique-shaped and all the clique-minterms of f have size at most δk/2. For a clique-shaped function f, we define the trimming operation trim(f) as follows:

trim(f):==1δk/2AM(f)A.

That is, the trim operation takes out from f all the clique-indicators of size larger than δk/2, yielding a trimmed function.

Remark 9

(Parametrization of trim(·) and other remarks) Analogously to the Harnik-Raz case (see Remark 4), the definition of trimmed functions depends on the choice of the parameters δ and k. As these parameters are fixed (see Remark 5), the operator trim(·) is well-defined. Moreover, if all clique-minterms of f have size larger than δk/2 (i.e., if M(f)= for all [δk/2]), then trim(f) is the constant function that outputs 0. Finally, if f is the constant function 1, then trim(f)=1, because 1 contains a clique-minterm of size equal to 1 (a clique containing one vertex and no edges).

Imitating the proofs of Lemmas 7 and 8 , replacing Lemma 3 by Lemma 13, we may now obtain the following lemmas.

Lemma 17

(Trimmed functions are inaccurate in the positive distribution) If a monotone function f:0,1n20,1 is a trimmed clique-shaped function such that f1, then

Pf(Y)=1=2δk/2knM(f).

Lemma 18

(Approximation by trimming) Let f:0,1n20,1 be a clique-shaped monotone function, all of whose clique-minterms have size at most δk. We have

Pf(Y)=1andtrim(f)(Y)=0=δk/2δkknM(f).

Approximators

Similarly as in Sect. 2.6, we will consider a set of approximators A. Let

A:={trim(cl(f)):f0,1n20,1is monotone and clique-shaped}.

Functions in A are called approximators. Note that every function in A is clique-shaped and is the trimming of a closed function. Moreover, observe that every edge-indicator u,v belongs to A, since every edge-indicator is closed by Lemma 16.

Let f,gA such that f=i=1tAi and g=j=1sBj. We define (f,g):=i=1tj=1sAiBj. We also define operations ,:A×AA as follows:

fg:=trim(cl(fg)),fg:=trimcl(f,g).

It’s easy to see that, if f,gA, then fgA. To see that fgA, note that (f,g) is also a monotone clique-shaped function.

Remark 10

(Reason for definition of ) The reason for defining in that way is as follows. First observe that fg=i=1tj=1s(AiBj). We simply replace each AiBj with AiBj, thus obtaining fg. In general, since AiBj is a larger conjunction than AiBj, we have (f,g)fg. However, note that, for every A[n], we have (f,g)(KA)=(fg)(KA). Thus, the transformation from fg to (f,g) incurs no mistakes in the positive distribution Y.

If C is a monotone ,-circuit, let CA be the corresponding ,-circuit, obtained by replacing each -gate by a -gate, and each -gate by an -gate. Note that CA computes an approximator.

The Lower Bound

In this section we obtain the lower bound for the clique function. Recall that k=n1/3-δ. We will prove that the monotone complexity of Cliquek,n is nΩ(δ2k).

Repeating the same arguments of Lemmas 9 and 10 , we obtain the following analogous lemmas.

Lemma 19

(Approximators make many errors) For every fA, we have

P[f(Y)=1]+P[f(N)=0]1+o(1).

Proof

Let fA. By definition, there exists a closed function h such that f=trim(h). Observe that M(f)M(h) for every 2,,δk/2. By Lemmas 15 and 17 , if fA is such that f1, then

P[f(Y)=1]=2δk/2knM(h)=2δk/2kn1/3=2δk/2n-δ=o(1).

Therefore, for every fA we have P[f(Y)=1]+P[f(N)=0]1+o(1).

Lemma 20

(C is well-approximated by CA) Let C be a monotone circuit. We have

P[C(Y)=1andCA(Y)=0]+P[C(N)=0andCA(N)=1]size(C)·O(n-δ2k/2).

Proof

To bound the approximation errors under the distribution Y, first note that, if f,gA, then all the clique-minterms of both fg and fg have size at most δk. Moreover, if (fg)(x)=1 but (fg)(x)=0, then trim(cl(fg)(x))cl(fg)(x). Therefore, we obtain by Lemmas 15 and 18 that, for f,gA, we have

P(fg)(Y)=1and(fg)(Y)=0=δk/2δkknM(cl(fg))=δk/2δkn-δ=O(n-δ2k/2).

As observed in Remark 10, we have (f,g)(Y)=(fg)(Y). Thus, once again, the only approximation mistakes incurred by changing a -gate for a -gate comes from the trimming operation. Again, we conclude

P(fg)(Y)=1and(fg)(Y)=0=O(n-δ2k/2),

which implies

P[C(Y)=1andCA(Y)=0]size(C)·O(n-δ2k/2).

Similarly, to bound the approximation errors under N, note that (fg)(x)=0 and (fg)(x)=1 only if cl(fg)(x)(fg)(x). Therefore, we obtain by Lemma 14 that, for f,gA, we have

P(fg)(N)=0and(fg)(N)=1n-(2/3)k.

Moreover, note that (f,g)fg. As fg=trim(cl((f,g))), we obtain that (fg)(x)=0 and (fg)(x)=1 only if cl((f,g))(x)>(f,g)(x). Therefore, we also have

P(fg)(N)=0and(fg)(N)=1n-(2/3)k.

By the union bound, we conclude:

P[C(N)=0andCA(N)=1]size(C)·n-(2/3)k.

This finishes the proof.

We now prove the lower bound for the clique function.

Theorem 5

Let δ(0,1/3) and k=n1/3-δ. The monotone circuit complexity of Cliquek,n is Ω(nδ2k/2).

Proof

Let C be a monotone circuit computing Cliquek,n. For large n, we obtain from Corollary 1 and Lemmas 19 and 20

5/4P[Cliquek,n(Y)]+P[Cliquek,n(N)]P[C(Y)=1andCA(Y)=0]+P[CA(Y)=1]+P[C(N)=0andCA(N)=1]+P[CA(N)=1]1+o(1)+size(C)·O(n-δ2k/2).

This implies size(C)=Ω(nδ2k/2).

Proof of Lemma 11 (Clique-Sunflowers)

In this section, we give the proof of Lemma 11. The proof is essentially the same as the one given by Rossman for Theorem 2 in [24]. We will rely on an inequality due to Janson [13] (see also Theorem 2.18 in [14]).

Lemma 21

(Janson’s inequality [13]) Let F be a nonempty hypergraph on [n] and let Wp[n]. Define μ and Δ in the following way:

μ:=FFP[FW],Δ:=F,HFFHP[FHW].

Then we have

P[FF:FW]exp{-μ2/Δ}.

The following estimates appear in an unpublished note due to Rossman [25], and a slightly weaker form appears implicitly in [24]. We reproduce the proof for completeness.

Lemma 22

(Lemma 8 of [25]) Let s0(t),s1(t), be the sequence of polynomials defined by

s0(t):=1ands(t):=tj=0-1jsj(t).

For all t>0, we have s(t)!(t+1/2).

Proof

We first prove by induction on that s(t)!(log(1/t+1))-, as follows:

s(t)=tj=0-1jsj(t)tj=0-1jj!(log(1/t+1))-j=t!(log(1/t+1))-j=0-1(log(1/t+1))-j(-j)!t!(log(1/t+1))--1+j=0(log(1/t+1))jj!=t!(log(1/t+1))-(-1+exp(log(1/t+1)))=!(log(1/t+1))-.

To conclude the proof, we apply the inequality 1/log(1/t+1)<t+1/2 for all t>0.

We will also need the following auxiliary definition.

Definition 10

Let ε,p,q(0,1). Let Un,q[n] be a q-random subset of [n] independent of Gn,p. Let S be a family of subsets of [n] and let B:=S. The family S is called a (p,q,ε)-clique-sunflower if

PAS:KAGn,pKBandAUn,qB>1-ε.

The set B is called core.

Clearly, a (p,1,ε)-clique sunflower is a (p,ε)-clique sunflower. By taking q=1 in the following lemma, and observing that s(log(1/ε))log(1/ε)+1/22log(1/ε) for εe-1/2, we obtain Lemma 11.

Lemma 23

For all {1,,n} and S[n], if S>s(log(1/ε))·(1/q)(1/p)2, then S contains a (p,q,ε)-clique sunflower.

Proof

By induction on . In the base case =1, we have by independence that

P[AS:KAGn,porAUn,q]=P[AS:AUn,q]=ASP[AUn,q]=(1-q)|S|<(1-q)ln(1/ε)/qe-ln(1/ε)=ε.

Thus S is itself a (p,q,ε)-clique sunflower.

Let now 2 and assume that the claim holds for t1,,-1. For convenience, let

cj:=sj(log(1/ε)),

for every j0,1,,-1.

Case 1. There exists j{1,,-1} and B[n]j such that

|{AS:BA}|c-j(1/qpj)-j(1/p)-j2.

Let T={A\B:ASsuch thatBA}[n]-j. By the induction hypothesis, there exists a (p,qpj,ε)-clique sunflower TT with core a D satisfying D[n]\B<-j. We will now show that S:=BC:CTS is a (p,q,ε)-clique sunflower contained in S with core BD. We have

P[AS:KAGn,pKBDorAUn,qBD]=P[CT:KBCGn,pKBDorBCUn,qBD]=P[CT:KBCGn,pKBDorCUn,qD]=P[CT:KCGn,pKDor&C{vUn,q:{v,w}E(Gn,p)for allwB}D]P[CT:KCGn,pKDorCUn,qpjD]<ε.

Therefore, S is a (p,q,ε)-clique sunflower contained in S.

Case 2. For all j{1,,-1} and B[n]j, we have

|{AS:BA}|c-j(1/qpj)-j(1/p)-j2.

In this case, we show that the bound of the lemma holds with B=. Let

μ:=Sqp2>c,Δ¯:=j=1-1(A,A)S2:|AA|=jq2-jp22-j2.

Note that Δ¯ excludes j= from the sum, which corresponds to pairs (A,A) such that A=A, in which case the summand becomes μ. In other words, the number Δ of Janson’s inequality (Lemma 21) satisfies Δ=μ+Δ¯. Janson’s Inequality now gives the following bound:

P[AS:KAGn,porAUn,q]exp-μ2μ+Δ¯. 4

We bound Δ¯ as follows:

Δ¯j=1-1q2-jp22-j2B[n]j|{AS:BA}|2j=1-1q2-jp22-j2B[n]j|{AS:BA}|·c-j(1/q)-j(1/p)-j2qp2j=1-1c-jB[n]j|{AS:BA}|=qp2j=1-1c-jASBAj1=|S|qp2j=1-1jc-j=μj=1-1jcj=μj=0-1jcj-μ.

Therefore,

μ2μ+Δ¯μj=0-1jcj=μc/(log(1/ε))>log(1/ε).

Finally, from (4) we get

P[AS:KAGn,porAUn,q]exp-μ2μ+Δ¯<ε.

Therefore, the family S is a (p,q,ε)-clique sunflower with an empty core.

Monotone Arithmetic Circuits

In this section, we give a short and simple proof of a truly exponential (exp(Ω(n))) lower bound for real monotone arithmetic circuits computing a multilinear n variate polynomial. Real monotone arithmetic circuits are arithmetic circuits over the reals that use only positive numbers as coefficients. As we shall see, the lower bound argument holds for a general family of multilinear polynomials constructed in a very natural way from error correcting codes, and the similarities to the hard function used by Harnik and Raz in the Boolean setting is quite evident (see Sect. 2.2). In particular, our lower bound just depends on the rate and relative distance of the underlying code. We note that exponential lower bounds for monotone arithmetic circuits are not new, and have been known since the 80’s with various quantitative bounds. More precisely, Jerrum and Snir proved an exp(Ω(n)) lower bound for an n variate polynomial in [15]. This bound was subsequently improved to a lower bound of exp(Ω(n)) by Raz and Yehudayoff in [22], via an extremely clever argument, which relied on deep and beautiful results on character sums over finite fields. A similar lower bound of exp(Ω(n)) was shown by Srinivasan [26] using more elementary techniques building on a work of Yehudayoff [30]. In a recent personal communication Igor Sergeev pointed out to us that truly exponential lower bounds for monotone arithmetic circuits had also been proved in the 1980’s in the erstwhile Soviet Union by several authors, including the works of Kasim-Zade, Kuznetsov and Gashkov. We refer the reader to [10] for a detailed discussion on this line of work.

We show a similar lower bound of exp(Ω(n)) via a simple and short argument, which holds in a somewhat general setting. Our contribution is just the simplicity, the (lack of) length of the argument and the observation that it holds for families of polynomials that can be constructed from any sufficiently good error correcting codes.

Definition 11

(Monotone, multilinear, homogeneous) A real polynomial is said to monotone if all of its coefficients are positive. A real arithmetic circuit is said to be monotone if it uses only positive numbers as coefficients. A polynomial P is said to be multilinear if the degree of each variable of P is at most 1 in all of the monomials of P. A polynomial P is said to be homogeneous if all the monomials of P have the same degree. An arithmetic circuit C is said to be to homogeneous (multilinear) if the polynomial computed in each of the gates of C is homogeneous (multilinear).

Definition 12

(From sets of vectors to polynomials) Let CFqn be an arbitrary subset of Fqn. Then, the polynomial PC is a multilinear homogeneous polynomialof degree n on qn variables {xi,j:i[q],j[n]} and is defined as follows:

PC=cCj[n]xc(j),j.

Here, c(j) is the jth coordinate of c which is an element of Fq, which we bijectively identify with the set [q].

Here, we will be interested in the polynomial PC when the set C is a good code, i.e it has high rate and high relative distance. The following observation summarizes the properties of PC and relations between the properties of C and PC.

Observation 6

(Codes vs Polynomials) Let C be any subset of Fqn and let PC be the polynomial as defined in Definition 12. Then, the following statements are true:

  • PC is a multilinear homogeneous polynomial of degree equal to n with every coefficient being either 0 or 1.

  • The number of monomials with non-zero coefficients in PC is equal to the cardinality of C.

  • If any two distinct vectors in C agree on at most k coordinates (i.e. C is a code of distance n-k), then the intersection of the support of any two monomials with non-zero coefficients in PC has size at most k.

The observation immediately follows from Definition 12. We note that we will work with monotone arithmetic circuits here, and hence will interpret the polynomial PC as a polynomial over the field of real numbers.

We now prove the following theorem, which essentially shows that for every code C with sufficiently good distance, any monotone arithmetic circuit computing PC must essentially compute it by computing each of its monomials separately, and taking their sum.

Theorem 7

If any two distinct vectors in C agree on at most n/3-1 locations, then any monotone arithmetic circuit for PC has size at least |C|.

The proof of this theorem crucially uses the following well known structural lemma about arithmetic circuits. This lemma also plays a crucial role in the other proofs of exponential lower bounds for monotone arithmetic circuits (e.g. [15, 22, 26, 30]).

Lemma 24

(See Lemma 3.3 in [22]) Let Q be a homogeneous multilinear polynomial of degree d computable by a homogeneous arithmetic circuit of size s. Then, there are homogeneous polynomials g0,g1,g2,,gs,h0,h1,h2,,hs of degree at least d/3 and at most 2d/3-1 such that

Q=i=0sgi·hi.

Moreover, if the circuit for Q is monotone, then each gi and hi is multilinear, variable disjoint and each one their non-zero coefficients is a positive real number.

We now use this lemma to prove Theorem 7.

Proof of Theorem 7

Let B be a monotone arithmetic circuit for PC of size s. We know from Observation 6 that PC is a multilinear homogeneous polynomial of degree equal to n. This along with the monotonicity of B implies that B must be homogeneous and multilinear since there can be no cancellations in B. Thus, from (the moreover part of) Lemma 24 we know that PC has a monotone decomposition of the form

PC=i=0sgi·hi,

where, each gi and hi is multilinear, homogeneous with degree between n/3 and 2n/3-1, gi and hi are variable disjoint. We now make the following claim.

Claim

Each gi and hi has at most one non-zero monomial.

We first observe that the claim immediately implies theorem 7: since every gi and hi has at most one non-zero monomial, their product gihi is just a monomial. Thus, the number of summands s needed in the decomposition above must be equal to the number of monomials in PC, which is equal to |C| from the second item in Observation 6.

We now prove the Claim.

Proof of Claim

The proof of the claim will be via contradiction. To this end, let us assume that there is an i{0,1,2,,s} such that gi has at least two distinct monomials with non-zero coefficients and let α and β be two of these monomials. Let γ be a monomial with non-zero coefficient in hi . Since hi is homogeneous with degree between n/3 and 2n/3-1, we know that the degree of γ is at least n/3. Since we are in the monotone setting, we also know that each non-zero coefficient in any of the gj and hj is a positive real number. Thus, the monomials α·γ and β·γ which have non-zero coefficients in the product gi·hi must have non-zero coefficient in PC as well (since a monomial once computed cannot be cancelled out). But, the supports of αγ and βγ overlap on γ which has degree at least n/3. This contradicts the fact that no two distinct monomials with non-zero coefficients in PC share a sub-monomial of degree at least n/3 from the distance of C and the third item in Observation 6.

Theorem 7 when instantiated with an appropriate choice of the code C, immediately implies an exponential lower bound on the size of monotone arithmetic circuits computing the polynomial PC. Observe that the total number of variables in PC is N=qn and therefore, for the lower bound for PC to be of the form exp(Ω(N)), we would require q, the underlying field size to be a constant. In other words, for any code of relative distance at least 2/3 over a constant size alphabet which has exponentially many code words, we have a truly exponential lower bound.

The following theorem of Garcia and Stichtenoth [9] implies an explicit construction of such codes. The statement below is a restatement of their result by Cohen et al. [7].

Theorem 8

([9] and [27]) Let p be a prime number and let mN be even. Then, for every 0<ρ<1 and a large enough integer n, there exists an explicit rate ρ linear error correcting block code C:FpmnFpmn/ρ with distance

δ1-ρ-1pm/2-1.

The theorem has the following immediate corollary.

Corollary 2

For every large enough constant q which is an even power of a prime, and for all large enough n, there exist explicit construction of codes CFqn which have relative distance at least 2/3 and |C|exp(Ω(n)).

By an explicit construction here, we mean that given a vector v of length n over Fq, we can decide in deterministic polynomial time if vC. In the arithmetic complexity literature, a polynomial P is said to be explicit, if given the exponent vector of a monomial, its coefficient in P can be computed in deterministic polynomial time. Thus, if a code C is explicit, then the corresponding polynomial PC is also explicit in the sense described above. Therefore, we have the following corollary of Corollary 2 and Theorem 7.

Corollary 3

There exists an explicit family {Pn} of homogeneous multilinear polynomials such that for every large enough n, any monotone arithmetic circuit computing the n variate polynomial Pn has size at least exp(Ω(n)).

Further Directions

In this paper, we obtained the first monotone circuit lower bound of the form exp(Ω(n1/2/logn)) for an explicit n-bit monotone Boolean function. It’s natural to ask if we can do better. Ideally, we would like to achieve a truly exponential bound for Boolean monotone circuits, like the one achieved for arithmetic monotone circuits in Sect. 4. However, as discussed in Sect. 2.8, the n exponent seems to be at the limit of what current techniques can achieve.

An important open-ended direction is to develop sharper techniques for proving monotone circuit lower bounds. Sticking to the approximation method, it is not yet known whether there exists another “sunflower-type” notion which still allows for good approximation bounds and yet admits significantly better bounds than what is possible for robust sunflowers.

One approach can be to try to weaken the requirement of the core, and ask only that the core of a “sunflower-type” set system F is properly contained in one of the elements of F. A weaker notion of robust sunflowers with this weakened core could still be used succesfully in the proof of the lower bound of Sect. 2, but it’s not yet clear whether this weaker notion admits stronger bounds or not.

Moreover, perhaps developing specialised sunflowers for specific functions, such as done for Cliquek,n in Sect. 3, could help here. One could also consider distributions which are not p-biased, as perhaps better bounds are possible in different regimes.

Finally, as noted before, our proof of the clique-sunflower lemma follows the approach of Rossman in [24]. We expect that a proof along the lines of the work of Alweiss, Lovett, Wu and Zhang [3] and Rao [21] should give us an even better bound on the size of set systems without clique-sunflowers, removing the ! factor. This would extend our nΩ(δ2k) lower bound to kn1/2-δ.

Acknowledgements

We are grateful to Stasys Junka for bringing the lower bound of Andreev [4] to our attention and to the anonymous referees of LATIN 2020 for numerous helpful suggestions. We also thank Igor Sergeev for bringing [10] and the references therein to our attention which show that truly exponential lower bounds for monotone arithmetic circuits had already been proved in the 1980s. Finally, we thank the anonymous reviewers of Algorithmica for careful proofreading and many helpful suggestions and comments.

Bruno Pasqualotto Cavalar was supported by São Paulo Research Foundation (FAPESP), grants #2018/22257-7 and #2018/05557-7, and he acknowledges CAPES (PROEX) for partial support of this work. A part of this work was done during a research internship of Bruno Pasqualotto Cavalar and a postdoctoral stay of Mrinal Kumar at the University of Toronto. Benjamin Rossman was supported by NSERC and Sloan Research Fellowship.

Proof of Theorem 3

We say that a family F of sets is r-spread if there are most F/rT sets in F containing any given non-empty set T. The following theorem is a p-biased variant of the main technical lemma of Rao [21]. A full proof is given in the appendix of [6].

Theorem 9

(Theorem 3 of [6]) There exists a constant B>0 such that the following holds for all p,ε(0,1/2] and all positive integers . Let r=Blog(/ε)/p. Let F be a r-spread -uniform family of subsets of [n] such that Fr. Then PWp[n][FF:FW]>1-ε.

We now combine Theorem 9 with the main argument of the proof of Theorem 4.4 of [24] to finish the proof of Theorem 3.

Proof of Theorem 3

The proof is by induction on . When =1, we have

P[FF:FW]=(1-p)Fe-pF<ε.

Therefore, F itself is a (p,ε)-robust sunflower. We now suppose >1 and that the result holds for every t[-1]. For a set T[n], let FT=F\T:FF,TF. Let r=Blog(/ε)/p, where B is the constant of Theorem 9.

Case 1. The family F is not r-spread. By definition, there exists a nonempty set T[n] such that FT>F/rTr-T. By induction, the family FT contains a (p,ε)-robust sunflower F. It is easy to see that FT:FF is a (p,ε)-robust sunflower contained in F.

Case 2. The family F is r-spread. Therefore, from Theorem 9, it follows that F is itself a (p,ε)-robust sunflower.

Declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Footnotes

1

Stasys Jukna (personal communication) observed that Andreev’s bound [4] can be improved to 2Ω((n/logn)1/3) using the lower bound criterion of [16].

2

Robust sunflowers were called quasi-sunflowers in [11, 17, 18, 24] and approximate sunflowers in [19]. Following Alweiss et al [3], we adopt the new name robust sunflower.

3

Rao’s bound is also slightly stronger in the following sense. He shows that, if the random set W is chosen uniformly at random among all sets of size np, then we also have PFF:FWY>1-ε. However, for our purposes, the p-biased case will suffice.

4

Here, “random minterm” means an input from the distribution Y, which correlates highly with the minterms of fHR.

5

Formally, our approximators have at most O(clogn) terms of width (Lemma 5), and no terms of width larger than c/2 (by trimming).

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Contributor Information

Bruno Pasqualotto Cavalar, Email: Bruno.Pasqualotto-Cavalar@warwick.ac.uk.

Mrinal Kumar, Email: mrinal@cse.iitb.ac.in.

Benjamin Rossman, Email: benjamin.rossman@duke.edu.

References

  • 1.Alon N, Babai L, Itai A. A fast and simple randomized parallel algorithm for the maximal independent set problem. J. Algorithms. 1986;7(4):567–583. doi: 10.1016/0196-6774(86)90019-2. [DOI] [Google Scholar]
  • 2.Alon N, Boppana RB. The monotone circuit complexity of Boolean functions. Combinatorica. 1987;7(1):1–22. doi: 10.1007/BF02579196. [DOI] [Google Scholar]
  • 3.Alweiss, R., Lovett, S., Wu, K., Zhang, J.: Improved bounds for the sunflower lemma. In: Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, STOC 2020, p 624–630. Association for Computing Machinery, New York, NY, USA (2020). 10.1145/3357713.3384234
  • 4.Andreev A. A method for obtaining efficient lower bounds for monotone complexity. Algebra and Logic. 1987;26(1):1–18. doi: 10.1007/BF01978380. [DOI] [Google Scholar]
  • 5.Andreev AE. A method for obtaining lower bounds on the complexity of individual monotone functions. Dokl. Akad. Nauk SSSR. 1985;282(5):1033–1037. [Google Scholar]
  • 6.Bell, T., Chueluecha, S., Warnke, L.: Note on sunflowers. Discrete Mathematics 344(7), 112367 (2021). 10.1016/j.disc.2021.112367. https://www.sciencedirect.com/science/article/pii/S0012365X21000807
  • 7.Cohen, G., Haeupler, B., Schulman, L.J.: Explicit binary tree codes with polylogarithmic size alphabet. In: Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2018, p 535–544. ACM. 10.1145/3188745.3188928. http://doi.acm.org/10.1145/3188745.3188928
  • 8.Erdős P, Rado R. Intersection theorems for systems of sets. J. London Math. Soc. 1960;35:85–90. doi: 10.1112/jlms/s1-35.1.85. [DOI] [Google Scholar]
  • 9.Garcia A, Stichtenoth H. A tower of artin-schreier extensions of function fields attaining the drinfeld-vladut bound. Inventiones Mathematicae. 1995;121(1):211–222. doi: 10.1007/BF01884295. [DOI] [Google Scholar]
  • 10.Gashkov SB, Sergeev I. A method for deriving lower bounds for the complexity of monotone arithmetic circuits computing real polynomials. Sbornik: Mathematics. 2012;203(10):A02. doi: 10.1070/SM2012v203n10ABEH004270. [DOI] [Google Scholar]
  • 11.Gopalan P, Meka R, Reingold O. DNF sparsification and a faster deterministic counting algorithm. Comput. Complex. 2013;22(2):275–310. doi: 10.1007/s00037-013-0068-6. [DOI] [Google Scholar]
  • 12.Harnik, D., Raz, R.: Higher lower bounds on monotone size. In: Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, p 378–387. ACM, New York (2000). 10.1145/335305.335349
  • 13.Janson S. Poisson approximation for large deviations. Random Structures and Algorithms. 1990;1(2):221–229. doi: 10.1002/rsa.3240010209. [DOI] [Google Scholar]
  • 14.Janson, S., Ł uczak, T., Ruciński, A.: Random graphs. Wiley-Interscience Series in Discrete Mathematics and Optimization. Wiley-Interscience, New York (2000). 10.1002/9781118032718. 10.1002/9781118032718 [DOI]
  • 15.Jerrum, M., Snir, M.: Some exact complexity results for straight-line computations over semirings. J. ACM 29(3), 874–897 (1982). 10.1145/322326.322341. http://doi.acm.org/10.1145/322326.322341
  • 16.Jukna S. Combinatorics of monotone computations. Combinatorica. 1999;19(1):65–85. doi: 10.1007/s004930050046. [DOI] [Google Scholar]
  • 17.Li X, Lovett S, Zhang J. Sunflowers and quasi-sunflowers from randomness extractors. In: APPROX-RANDOM, LIPIcs. 2018;116:51–1-13. [Google Scholar]
  • 18.Lovett, S., Solomon, N., Zhang, J.: From dnf compression to sunflower theorems via regularity. arXiv preprint arXiv:1903.00580 (2019)
  • 19.Lovett, S., Zhang, J.: Dnf sparsification beyond sunflowers. In: Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, p 454–460. ACM (2019)
  • 20.Pitassi, T., Robere, R.: Strongly exponential lower bounds for monotone computation. In: Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, p 1246–1255. ACM (2017)
  • 21.Rao, A.: Coding for sunflowers. Discrete Anal. p Paper No. 2, 8 (2020). 10.19086/da
  • 22.Raz R, Yehudayoff A. Multilinear formulas, maximal-partition discrepancy and mixed-sources extractors. J. Comput. Syst. Sci. 2011;77(1):167–190. doi: 10.1016/j.jcss.2010.06.013. [DOI] [Google Scholar]
  • 23.Razborov AA. Lower bounds on the monotone complexity of some Boolean functions. Dokl. Akad. Nauk SSSR. 1985;281(4):798–801. [Google Scholar]
  • 24.Rossman B. The monotone complexity of k-clique on random graphs. SIAM J. Comput. 2014;43(1):256–279. doi: 10.1137/110839059. [DOI] [Google Scholar]
  • 25.Rossman, B.: Approximate sunflowers (2019). Unpublished, available at http://www.math.toronto.edu/rossman/approx-sunflowers.pdf
  • 26.Srinivasan, S.: Strongly exponential separation between monotone VP and monotone VNP. CoRR abs/1903.01630 (2019). arXiv:1903.01630
  • 27.Stichtenoth, H.: Algebraic Function Fields and Codes, vol. 254. Springer Science & Business Media (2009)
  • 28.Tao, T.: The sunflower lemma via shannon entropy. Blogpost (2020). https://terrytao.wordpress.com/2020/07/20/the-sunflower-lemma-via-shannon-entropy/
  • 29.Tiekenheinrich J. A 4n-lower bound on the mononotone network complexity of a oneoutput boolean function. Information Processing Letters. 1984;18:201–201. doi: 10.1016/0020-0190(84)90111-X. [DOI] [Google Scholar]
  • 30.Yehudayoff, A.: Separating monotone VP and VNP. In: Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, STOC 2019, Phoenix, AZ, USA, June 23-26, 2019., p 425–429 (2019). 10.1145/3313276.3316311

Articles from Algorithmica are provided here courtesy of Springer

RESOURCES