Bounded-Error Probabilistic Polynomial-Time
The class of decision problems solvable by a probabilistic polynomial-time Turing machine with two-sided bounded error:
- If the answer is “yes,” the machine accepts with probability at least 2/3.
- If the answer is “no,” the machine accepts with probability at most 1/3.
The constants 2/3 and 1/3 are not special: by running the machine independently times and taking a majority vote, the error probability can be reduced to . BPP is the standard complexity-theoretic model of efficient randomized computation.
See the complexity zoo entry here.
Known relationships
- : deterministic algorithms are a special case of Las Vegas, which are a special case of one-sided error, which are a special case of two-sided error.
- : BPP problems have trivial one-message Arthur-Merlin protocols (Arthur decides without Merlin) — GS86.
- : for any BPP machine, a majority-vote argument shows that a fixed random string works for all inputs of a given length; that string serves as the advice — TODO citation.
- : randomized computation can be simulated deterministically in polynomial space by trying all random strings.
- Derandomization conjecture: . This is widely believed and would follow from sufficiently strong circuit lower bounds (e.g., if requires exponential-size circuits). Under plausible hardness assumptions, has subexponential-time simulations — TODO citation.
Relevance to cryptography
In cryptography, efficient adversaries are modeled as probabilistic polynomial-time () algorithms — the uniform version of BPP. Security definitions quantify over all adversaries.
If (the derandomization conjecture), then any cryptographic protocol secure against deterministic polynomial-time adversaries is also secure against randomized ones — but this would not render cryptography trivial, since it says nothing about the hardness of breaking schemes. Crucially, pseudorandom generators (PRGs) can be viewed as a crypto-primitive that witnesses : a PRG secure against all adversaries implies .