This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Applications of Random Algebraic Constructions to
Hardness of Approximation

Boris Bukh Department of Mathematical Sciences, Carnegie Mellon University, Pittsburgh, PA 15213, USA bbukh@math.cmu.edu Karthik C. S Department of Computer Science, Rutgers University, Piscataway, NJ 08854, USA karthik.cs@rutgers.edu  and  Bhargav Narayanan Department of Mathematics, Rutgers University, Piscataway, NJ 08854, USA narayanan@math.rutgers.edu
Abstract.

In this paper, we show how one may (efficiently) construct two types of extremal combinatorial objects whose existence was previously conjectural.

  • Panchromatic Graphs: For fixed kk\in\mathbb{N}, a kk-panchromatic graph is, roughly speaking, a balanced bipartite graph with one partition class equipartitioned into kk colour classes in which the common neighbourhoods of panchromatic kk-sets of vertices are much larger than those of kk-sets that repeat a colour. The question of their existence was raised by Karthik and Manurangsi [Combinatorica 2020].

  • Threshold Graphs: For fixed kk\in\mathbb{N}, a kk-threshold graph is, roughly speaking, a balanced bipartite graph in which the common neighbourhoods of kk-sets of vertices on one side are much larger than those of (k+1)(k+1)-sets. The question of their existence was raised by Lin [JACM 2018].

Concretely, we provide probability distributions over graphs from which we can efficiently sample these objects in near linear time. These probability distributions are defined via varieties cut out by (carefully chosen) random polynomials, and the analysis of these constructions relies on machinery from algebraic geometry (such as the Lang–Weil estimate, for example). The technical tools developed to accomplish this might be of independent interest.

As applications of our constructions, we show the following conditional time lower bounds on the parameterized set intersection problem where, given a collection of nn sets over universe [n][n] and a parameter kk, the goal is to find kk sets with the largest intersection.

  • Assuming 𝖤𝖳𝖧\mathsf{ETH}, for any computable function F:F\colon\mathbb{N}\to\mathbb{N}, no no(k)n^{o(k)}-time algorithm can approximate the parameterized set intersection problem up to factor F(k)F(k). This improves considerably on the previously best-known result under 𝖤𝖳𝖧\mathsf{ETH} due to Lin [JACM 2018], who ruled out any no(k)n^{o(\sqrt{k})} time approximation algorithm for this problem.

  • Assuming 𝖲𝖤𝖳𝖧\mathsf{SETH}, for every ε>0\varepsilon>0 and any computable function F:F\colon\mathbb{N}\to\mathbb{N}, no nkεn^{k-\varepsilon}-time algorithm can approximate the parameterized set intersection problem up to factor F(k)F(k). No result of comparable strength was previously known under 𝖲𝖤𝖳𝖧\mathsf{SETH}, even for solving this problem exactly.

Both these time lower bounds are obtained by composing panchromatic graphs with instances of the coloured variant of the parameterized set intersection problem (for which tight lower bounds were previously known).

1. Introduction

Over the last five decades, a symbiotic relationship has developed between the areas of extremal combinatorics and complexity theory (broadly construed); see the wonderful book of Jukna [43] or one of the surveys of Alon [4, 5, 6, 7] for various applications of extremal combinatorial objects to proving lower bounds in theoretical computer science. In particular, this synergistic exchange with extremal combinatorics can be explicitly seen in subareas such as circuit/formula lower bounds [12, 42], communication complexity [19, 48, 35], error correcting codes [63, 1, 38], and derandomization [2, 58, 23, 27].

In this paper, our first goal is to prove the existence of certain extremal bipartite graphs, namely threshold graphs and panchromatic graphs. The question of their existence was motivated by applications in hardness of approximation, and our second goal is to prove, using these graphs, conditional time lower bounds on the parameterized set intersection problem. Our constructions will rely crucially on random polynomials, and our third goal here is to prove various results, likely of independent interest, about the common zeroes of random polynomials over finite fields. Before we can state our results, it will help to have some background, to which we now turn.

Over the last few years, a new area in theoretical computer science, namely hardness of approximation in 𝖯\mathsf{P}, has benefited significantly from some of the deep results in extremal combinatorics. Hardness of approximation in 𝖯\mathsf{P}, roughly speaking, maybe treated as the union of two subareas, namely, hardness of approximation in parameterized complexity111We only consider the computational problems contained in the complexity class XP while making this statement and also think of the parameter as fixed/constant. and hardness of approximation in fine-grained complexity.

In parameterized complexity, one studies the computational complexity of problems with respect to multiple parameters of the input or output. For example, in the kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} problem, we are given a collection of nn sets over the universe [n][n] and a parameter kk as input, and the goal is to find kk sets in the collection which maximize the intersection size. A problem (with inputs of size nn, along with a parameter kk) is said to be fixed parameter tractable if it can be solved by an algorithm running in time T(k)poly(n)T(k)\cdot\text{poly}(n) for some computable function TT. In many interesting cases, including for the kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} problem, assuming the W[1]\neq𝖥𝖯𝖳\mathsf{FPT} hypothesis, it is possible to show that no such algorithm exists i.e., that the problem is not fixed parameter tractable. In light of this, one could then ask for approximation algorithms. In the case of kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection}, the task would then be to design an approximation algorithm running in time T(k)poly(n)T(k)\cdot\text{poly}(n) that can find kk sets in the collection whose intersection size is at least 1/F(k)1/F(k) of the intersection size of the optimal solution for some pair of computable functions TT and FF. Inapproximability results in parameterized complexity aim to typically rule out such algorithms (under the W[1]\neq𝖥𝖯𝖳\mathsf{FPT} hypothesis) for various classes of functions FF; a notion particularly relevant to this paper is that of total 𝖥𝖯𝖳\mathsf{FPT} inapproximability, in which we rule out F(k)F(k)-approximation algorithms running in T(k)poly(n)T(k)\cdot\text{poly}(n) time for all computable functions TT and FF. We refer the reader to the textbooks [28, 18] for an excellent introduction to the area.

In fine-grained complexity, one aims to refine the Cobham–Edmonds thesis [31, 25] by trying to understand the exact time required to solve problems in 𝖯\mathsf{P}, by basing their conditional time lower bounds on several plausible (and popular) conjectures such as 𝖲𝖤𝖳𝖧\mathsf{SETH} and 𝖤𝖳𝖧\mathsf{ETH} (see Section 2 for definitions). For example, kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} can be naïvely solved by exhaustive search, i.e., by computing the intersection sizes of all kk-tuples of sets from the given collection of nn sets; can we do any better? For instance, is there an algorithm running in time no(k)n^{o(k)} that can solve kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection}? Or even less ambitiously, is there an algorithm running in time nk0.1n^{k-0.1} that can solve kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection}? The theory of fine-grained complexity aims to rule out such algorithms, and inapproximability results in this area aim to prove the same conditional time lower bounds, but now against approximation algorithms. We should emphasise that the area of fine-grained complexity is not simply about proving tighter running time lower bounds for problems considered in parameterized complexity; fine-grained complexity has been successful in explaining the complexity of problems such as closest pair in a point-set [8, 59, 30, 47], edit distance between strings [13, 3], and all pairs shortest paths [65], amongst others, all examples of problems usually considered without any fixed parameters. We direct the interested reader to two recent surveys [60, 32] on hardness of approximation in 𝖯\mathsf{P} for a detailed overview of the area.

A major difficulty addressed by results in hardness of approximation in 𝖯\mathsf{P} is that of generating a gap222There are many results in parameterized and fine-grained inapproximability under gap assumptions such as the Gap Exponential Time Hypothesis [57, 29] and Parameterized Inapproximability Hypothesis [53]. In these results the gap is inherent in the assumption, and the challenge is to construct gap-preserving reductions. These results are not the focus of this paper and we shall not elaborate further on them, and the interested reader may see the recent survey [32] for more details., i.e., one must start with a hard problem with no gap (for which the time lower bound is only against exact algorithms) and reduce it to a problem of interest while generating a non-trivial gap in the process. One of the main approaches to generate the aforementioned gap, and the motivation behind our construction of threshold graphs, is the Threshold Graph Composition (𝖳𝖦𝖢\mathsf{TGC}) framework introduced in the breakthrough work of Lin [51] to show the total 𝖥𝖯𝖳\mathsf{FPT} inapproximability of the kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} problem. This technique was later used to prove the first non-trivial inapproximability result for the kk-𝖲𝖾𝗍𝖢𝗈𝗏𝖾𝗋\mathsf{SetCover} problem [22], and in the proof of the current state-of-the-art inapproximability result for the same [52]. Moreover, the result on the kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} problem in [51] was used by Bhattacharyya et al. [10] as the starting point to prove inapproximability results for problems in coding theory such as the kk-Minimum Distance problem (a.k.a. kk-Even Set problem) and the kk-Nearest Codeword problem, and for lattice problems such as the kk-Shortest Vector problem and the kk-Nearest Vector problem.

At a very high level, in 𝖳𝖦𝖢\mathsf{TGC}, we compose an instance of the input problem that has no gap, with an extremal combinatorial object called a threshold graph (see Section 1.1.1 for definitions), to produce a gap instance of the desired problem. The two main challenges in using this framework are to construct the requisite threshold graph, and to find the right way to compose the input and the threshold graph. Our construction of threshold graphs will address the first of these challenges.

Another key issue that often arises in proving conditional time lower bounds for problems in 𝖯\mathsf{P}  is the following. When trying to prove time lower bounds for a particular problem, it is often natural (and sometimes seemingly necessary) to first prove the lower bound for a coloured version of the same problem, and then reduce it to the uncoloured version of the problem. For instance, if we would like to prove lower bounds based on 𝖲𝖤𝖳𝖧\mathsf{SETH} for a problem Ψ\Psi, then it is almost always the case that we first divide the variable set of size nn (of the 𝖲𝖠𝖳\mathsf{SAT} formula arising from the 𝖲𝖤𝖳𝖧\mathsf{SETH} assumption) into kk equal parts and reduce the problem of deciding 𝖲𝖠𝖳\mathsf{SAT} to a problem in 𝖯\mathsf{P} where, given as input kk collections each containing 2n/k2^{n/k} partial assignments to the subset of n/kn/k variables in that part, we would like to find one partial assignment from each collection that, when stitched together, forms a full satisfying assignment to the original 𝖲𝖠𝖳\mathsf{SAT} instance. From this problem (in 𝖯\mathsf{P}), if we would like to reduce to Ψ\Psi, it is often convenient (and sometimes imperative) to first reduce to a kk-coloured version of Ψ\Psi, and then reduce this coloured version to Ψ\Psi itself. This final task is sometimes easy, such as for problems like kk-𝖲𝖾𝗍𝖢𝗈𝗏𝖾𝗋\mathsf{SetCover} or kk-OrthogonalVectors, but often non-trivial, such as for kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} or closest pair in a point-set. It is worth reiterating here that in the other direction, reducing the uncoloured problem to its coloured version is almost always easy; typically, one can reduce the uncoloured variant to its coloured counterpart via the celebrated colour coding technique of Alon, Yuster and Zwick [9].

In [30, 47], the authors proposed the Panchromatic Graph Composition (𝖯𝖦𝖢\mathsf{PGC}) framework to address this issue, and this serves as the motivation behind our construction of panchromatic graphs (see Section 1.1.1 for definitions). In particular, they outlined how these panchromatic graphs, assuming that they exist, can be composed with the coloured version of a problem to reduce it to the uncoloured version of the same problem. Also, it is worth noting that the same issue arises in proving time lower bounds against approximation algorithms as well, i.e., it is often easier to prove hardness of approximation results for coloured versions of problems than for their uncoloured counterparts. With this in mind, it is desirable to have panchromatic graphs with certain additional gap properties so that we can design gap preserving reductions between problems. Our construction of panchromatic graphs will address all of these challenges.

In summary, the role of extremal combinatorial objects in the existing literature on hardness of approximation in 𝖯\mathsf{P} is twofold: threshold graphs are used in the 𝖳𝖦𝖢\mathsf{TGC} framework to generate gaps in hard problem instances, and panchromatic graphs are used in the 𝖯𝖦𝖢\mathsf{PGC} framework to reduce hard instances of coloured variants of various computational problems to their uncoloured (computationally easier) counterparts.

1.1. Our Contributions

Our contributions are primarily twofold. First, in Section 1.1.1, we show how to efficiently construct threshold graphs and panchromatic graphs; even the existence of such graphs was previously conjectural. Second, in Section 1.1.2, we demonstrate some applications of these graphs (with panchromatic graphs featuring more prominently) to prove tight conditional time lower bounds under 𝖤𝖳𝖧\mathsf{ETH} and 𝖲𝖤𝖳𝖧\mathsf{SETH} for approximating kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection}. Finally, in Section 1.1.3 we briefly detail how our results fit into the bigger picture of hardness of approximation in 𝖯\mathsf{P}.

1.1.1. Constructions of Panchromatic and Threshold Graphs

Here, we describe our main combinatorial results that demonstrate the existence of the aforementioned extremal bipartite graphs.

We start with panchromatic graphs.

Definition 1.1 (Panchromatic Graphs; Informal version of Definition 3.1).

An (n,k,t,s)(n,k,t,s)-panchromatic graph is a bipartite graph G(A,B)G(A,B) where AA is partitioned into kk parts, say A1,,AkA_{1},\ldots,A_{k}, with |A1|==|Ak|=|B|=n|A_{1}|=\dots=|A_{k}|=|B|=n satisfying the following pair of conditions.

Completeness:

Every kk-set {a1,,ak}\{a_{1},\dots,a_{k}\} with aiAia_{i}\in A_{i} for i[k]i\in[k] has at most tt common neighbours in BB, and a positive fraction (depending only on kk) of such kk-sets have exactly tt common neighbours in BB.

Soundness:

For every set XAX\subset A of size kk for which AiXA_{i}\cap X is empty for some i[k]i\in[k], the number of common neighbours of XX in BB is at most ss.

In [47], the authors studied panchromatic graphs333The term ‘panchromatic graph’ was not introduced in [47]. There, the authors constructed dense balanced bipartite graphs with low contact dimension, but that construction can be reinterpreted as construction of panchromatic graphs when k=2k=2; see Section 8 in [47]. when k=2k=2. Using (non-trivial) density properties of Reed–Solomon codes and Algebraic-Geometric codes, they were able to show that (n,2,t,to(1))(n,2,t,t^{o(1)})-panchromatic graphs exist for t=2(logn)1o(1)t=2^{(\log n)^{1-o(1)}}, and that they can be constructed efficiently. They then raised the natural question of existence for general kk, indicating that if such graphs exist, they could then potentially be used to improve hardness and inapproximability results for kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection}. We resolve this open problem from [47] and prove the following result.

Theorem 1.2 (Informal restatement of Theorem 3.3).

For each kk\in\mathbb{N} and any integer λ>1\lambda>1, there exist (n,k,t,t/λ)(n,k,t,t/\lambda)-panchromatic graphs for infinitely many nn\in\mathbb{N}, where t=t(k,λ)>0t=t(k,\lambda)>0 depends only on kk and λ\lambda.

In [47], the authors note that their technique to construct panchromatic graphs is limited to the case of k=2k=2, and remark that one needs to construct objects with more structure than just maximum distance separable codes in a certain sense444To quote [47], “The issue in constructing this graph is that we are now concerned about agreements of more than two vectors, which does not correspond to error-correcting codes anymore and some additional tools are needed to argue for this more general case.”. Our construction, detailed in Section 1.2.1, does just this, introducing new ideas that go beyond standard coding-theoretic properties.

On a different note, it is natural to ask if the requirement in the completeness condition that a positive fraction (depending on kk) of kk-sets have exactly tt-sized common neighbourhoods can be strengthened to demand the same of every such kk-set. It turns out that our result is in fact best-possible in the following sense: as nn\to\infty and for any t=t(k)t=t(k), there do not exist (n,k,t,t1)(n,k,t,t-1)-panchromatic graphs in which a (11/t)\left(1-1/t\right)-fraction of the panchromatic kk-sets have exactly tt-sized common neighbourhoods; this may be shown using the Kövári–-Sós–-Turán theorem and Hölder’s inequality, but we omit the details here.

Next, we turn our attention to threshold graphs.

Definition 1.3 (Threshold Graphs; Informal version of Definition 3.2).

An (n,k,t,s)(n,k,t,s)-threshold graph is a bipartite graph G(A,B)G(A,B) with |A|=|B|=n|A|=|B|=n satisfying the following pair of conditions.

Completeness:

For every kk-set of vertices XAX\subset A, the number of common neighbours of XX in BB is at least tt.

Soundness:

For every (k+1)(k+1)-set of vertices XAX\subset A, the number of common neighbours of XX in BB is at most ss.

These graphs are closely related to constructions for Turán-type problems in extremal graph theory. Indeed, if the completeness condition above is weakened to only require that a positive fraction (depending on kk) of kk-sets XAX\subset A have at least tt common neighbors in BB, then the celebrated norm-graphs of [50, 12] achieve these weakened requirements.

Lin [51] raised the question555To quote [51], “However, at the moment of writing, I do not know how to do that, even probabilistically.” of the existence of threshold graphs, and noted that if threshold graphs exist, then there is a very short proof666Starting with an instance G0(V0,E0)G_{0}(V_{0},E_{0}) of the canonical W[1]-hard kk-clique problem on nn vertices, we combine it with a (n,k,t,s)(n,k,t,s)-threshold graph G(V0,B)G(V_{0},B) to yield an instance of (k2)\binom{k}{2}-SetIntersection with |E0||E_{0}| sets on the universe BB, where for every edge e=(u,v)E0e=(u,v)\in E_{0}, we include the element bBb\in B in the set associated with this edge if and only if bb is a common neighbor of uu and vv in GG. It then follows that if there is a kk-clique in G0G_{0}, then there are (k2)\binom{k}{2} sets whose intersection size is at least tt, and if there is no kk-clique in G0G_{0}, then every (k2)\binom{k}{2} sets have intersection size at most ss. of the total 𝖥𝖯𝖳\mathsf{FPT} inapproximability of kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection}. However, since the existence of threshold graphs was previously unknown, the argument showing total 𝖥𝖯𝖳\mathsf{FPT} inapproximability of kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} in [51] is rather delicate. We resolve this open problem from [51] and show that threshold graphs exist, obtaining a very short proof of the total 𝖥𝖯𝖳\mathsf{FPT} inapproximability of kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} as a byproduct.

Theorem 1.4 (Informal restatement of Theorem 3.4).

For each kk\in\mathbb{N} and for infinitely many nn\in\mathbb{N}, there exist (n,k,nΩ(1/k),kO(k))(n,k,n^{\Omega(1/k)},k^{O(k)})-threshold graphs.

The parameters in this result match the parameters obtainable via norm-graphs, but crucially, our construction also achieves the stronger completeness property discussed earlier. It is possible to improve the kO(k)k^{O(k)} to 2O(k)2^{O(k)} using the arguments in [16], but we avoid the extra complexity of that approach.

1.1.2. Applications to Parameterized Set Intersection Problem

Here, we describe our conditional time lower bounds for the kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} problem. In order to set the context for the complexity of this problem, we briefly recall its complexity in the world of 𝖭𝖯\mathsf{NP}.

In the world of complexity, SetIntersection is well-known as a notorious problem to prove any kind of hardness of approximation result for; that said, there is a general belief that it is a hard problem as no non-trivial polynomial time approximation algorithms for this problem are known. However, to this date, even ruling out a PTAS under the standard 𝖯\mathsf{P} \neq𝖭𝖯\mathsf{NP} hypothesis remains open!777In contrast, it is fairly straightforward to show that the exact version of the problem is 𝖭𝖯\mathsf{NP}-hard [66]. The best inapproximability result for this problem is based on assuming that 𝖲𝖠𝖳\mathsf{SAT} problems of size nn cannot be solved by randomized algorithms in time 2nε2^{n^{\varepsilon}}, under which Xavier [66] shows that there is no polynomial time algorithm which can approximate SetIntersection up to polynomial factor. It is worth noting that to prove this inapproximability result, the author indirectly relies on the highly non-trivial and celebrated quasi-random PCP construction of Khot [45].

Given this context, it was truly a breakthrough when Lin [51], introducing some novel techniques, proved the total 𝖥𝖯𝖳\mathsf{FPT} inapproximability of kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} (under 𝖶[𝟣]𝖥𝖯𝖳\mathsf{W[1]}\neq\mathsf{FPT} hypothesis). Of course, using our construction of threshold graphs (Theorem 1.4), we now have a very short proof of this powerful result (see footnote 6). Lin [51] further refined his inapproximability result and showed, assuming 𝖤𝖳𝖧\mathsf{ETH}, that for sufficiently large kk\in\mathbb{N}, no randomized no(k)n^{o(\sqrt{k})}-time algorithm can approximate kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} to a factor n1/Ω(k)n^{1/\Omega(\sqrt{k})}. Clearly, this result is stronger than ruling out F(k)F(k) approximation algorithms (for some function FF), but the running time lower bound is far from tight. The following result, the first application of our constructions, shows that we can improve on Lin’s result and obtain tight running time lower bounds under 𝖤𝖳𝖧\mathsf{ETH} (albeit for weaker approximation factors).

Theorem 1.5 (Informal restatement of Theorem 6.4).

Let F:F\colon\mathbb{N}\to\mathbb{N} be any computable function. Assuming (randomized) 𝖤𝖳𝖧\mathsf{ETH}, for sufficiently large kk\in\mathbb{N}, no randomized no(k)n^{o(k)}-time algorithm can approximate kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} to a factor F(k)F(k).

In the world of fine-grained complexity, it is also of interest to prove, under stronger assumptions than 𝖤𝖳𝖧\mathsf{ETH}, even tighter running time lower bounds than the no(k)n^{o(k)} bound above. In particular, one would like to rule out nk0.1n^{k-0.1}-time algorithms for kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} under 𝖲𝖤𝖳𝖧\mathsf{SETH}, essentially showing that the naïve exhaustive search algorithm for kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} is optimal. To the best of our knowledge, it was not known earlier if one could even rule out exact algorithms for kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} running in nk0.1n^{k-0.1}-time under 𝖲𝖤𝖳𝖧\mathsf{SETH}. We remedy this situation; the following strong inapproximability result under 𝖲𝖤𝖳𝖧\mathsf{SETH} is the second application of our constructions.

Theorem 1.6 (Informal restatement of Theorem 6.2).

Let F:F\colon\mathbb{N}\to\mathbb{N} be any computable function. Assuming (randomized) 𝖲𝖤𝖳𝖧\mathsf{SETH}, for every ε>0\varepsilon>0 and integer k>1k>1, no randomized nk(1ε)n^{k(1-\varepsilon)}-time algorithm can approximate kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} to a factor F(k)F(k).

Both of these results are crucially reliant on our construction of panchromatic graphs; a broad outline is given in Section 1.2.2. It is worth noting that for the coloured variant of kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection}, one can easily show tight running time lower bounds under 𝖤𝖳𝖧\mathsf{ETH} and 𝖲𝖤𝖳𝖧\mathsf{SETH} against exact algorithms, and by using non-trivial gap creating techniques, these tight running time lower bounds were extended against near polynomial factor approximation algorithms for the coloured variant in [46]. The situation (for the coloured variant) is similar in the world of 𝖭𝖯\mathsf{NP} as well; see [26]. Finally, we remark that by using the hardness of approximation results in [46] under the kk-SUM hypothesis, we can use the 𝖯𝖦𝖢\mathsf{PGC} framework to rule out randomized nk(1/2ε)n^{k(1/2-\varepsilon)}-time F(k)F(k)-factor approximation algorithms for kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} under the kk-SUM hypothesis.

1.1.3. Bigger Picture: Reverse Colour Coding

We conclude this discussion of our results by briefly highlighting a broader implication. For many computational problems, it is often natural to define and study a coloured variant. For some problems, the coloured variant turns out to be even more natural; for example, any kk-CSP (i.e., constraint satisfaction problems of arity kk) on kk variables can be seen as a coloured version of the maximum edge biclique problem. Establishing computational equivalences between coloured and non-coloured variants of problems is thus a basic question worthy of exploration. As noted earlier, for some problems, there is a straightforward equivalence between the two versions. However, there are many important problems for which this equivalence is nontrivial (and potentially not true). The celebrated colour coding technique of Alon, Yuster and Zwick [9] provides an efficient way for a problem to be reduced to its coloured variant. Our construction of panchromatic graphs (when combined with 𝖯𝖦𝖢\mathsf{PGC}, as will be described in Section 1.2.2) now gives us a rather general method to reverse the colour coding technique.

1.2. Our Techniques

Our main technical contribution is the constructions of panchromatic graphs and threshold graphs which we describe in Section 1.2.1. We also provide an overview of how these are used to prove Theorems 1.5 and 1.6 in Section 1.2.2

1.2.1. Constructions of Panchromatic and Threshold Graphs

To motivate our approach, we start by explaining, briefly, why a natural first attempt at constructing threshold graphs fails. It is natural to consider a random bipartite graph where each edge is included independently with an appropriately chosen probability pp. Indeed, it is easy to see that such a construction can ensure that most kk-sets of vertices on one side have fewer common neighbours than most (k+1)(k+1)-sets. However, it is essentially impossible to avoid some exceptional kk-sets and (k+1)(k+1)-sets at the relevant edge density pp. Without getting into the details, the reason for this is simple: the size of the common neighbourhoods in this probability space have long, smoothly-decaying tails, and since there are many sets to consider, it is overwhelmingly likely that exceptional sets exist. For more on this issue, we refer the reader to [15].

When it comes to panchromatic graphs, while there is no immediate natural candidate construction, it seems clear that assuming one wishes to construct such objects randomly, one needs to introduce some level of correlation between different edges, while simultaneously preserving enough independence to allow us to analyse the resulting random graph, a delicate task from a purely probabilistic perspective.

It turns out that there is a natural way to circumvent all the obstacles outlined above, namely, by considering random graphs in which adjacency is determined by a randomly chosen algebraic variety. Concretely, our approach, which works over the finite field 𝔽q\mathbb{F}_{q} for any prime power qq\in\mathbb{N}, is as follows.

  1. (1)

    We construct threshold graphs as follows. We build AA by independently sampling qk+1q^{k+1} random polynomials of degree dd from 𝔽q[X1,,Xk+1]\mathbb{F}_{q}[X_{1},\dotsc,X_{k+1}] for a suitable d=d(k)d=d(k). Then, with B=𝔽qk+1B=\mathbb{F}_{q}^{k+1}, we define a bipartite graph GG between AA and BB by joining fAf\in A to xBx\in B if f(x)=0f(x)=0.

  2. (2)

    To construct panchromatic graphs, we proceed as follows. First, we independently choose random polynomials w1,,wkw_{1},\dots,w_{k} of degree DD from 𝔽q[X1,,Xk]\mathbb{F}_{q}[X_{1},\dotsc,X_{k}] for a suitable D=D(k)D=D(k). Next, for i[k]i\in[k], we take AiA_{i} to be a set of qkq^{k} random polynomials of the form wi+pw_{i}+p, where each such pp is an independently sampled random polynomial of degree dd from 𝔽q[X1,,Xk]\mathbb{F}_{q}[X_{1},\dotsc,X_{k}] for a suitable d=d(k)d=d(k). Finally, with B=𝔽qkB=\mathbb{F}_{q}^{k}, we define a bipartite graph GG between AA and BB by joining fAf\in A to xBx\in B if f(x)=0f(x)=0.

While the random algebraic graphs above are quite easy to describe, their analysis is far from simple; in particular, to prove our main results, we shall rely on Lang–Weil estimate [54], which is a consequence of the Riemann hypothesis for function fields (but see [61] for a relatively elementary proof). Along the way, we shall prove a several results about the zero sets of random polynomials over finite fields that may be of independent interest. An illustrative example is the following probabilistic analogue of Bézout’s theorem over finite fields.

Theorem 1.7.

For k,dk,d\in\mathbb{N} and a prime power qq\in\mathbb{N}, let ZZ be the (random) number of common roots over 𝔽qk\mathbb{F}_{q}^{k} of kk independently chosen kk-variate random 𝔽q\mathbb{F}_{q}-polynomials of degree dd. Then, as qq\to\infty, we have

[Z=dk]1o(1)(dk)!,\mathbb{P}[Z=d^{k}]\geq\frac{1-o(1)}{(d^{k})!},

as well as

[Z>dk]=O(qd).\mathbb{P}[Z>d^{k}]=O(q^{-d}).

To place these techniques in context, it is worth mentioning that the first traces of this random algebraic method go back some way, to work of Matoušek [55] in discrepancy theory, but it is the variant originating in [15] and developed further in [11, 24] that we shall build upon in this paper.

1.2.2. Hardness of Approximating kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection}

The common starting point for both Theorems 1.5 and 1.6 is the Unique kk-MaxCover problem defined in [46]. We refrain from defining it here, but it is immediate from its definition (see Section 2) that it can be easily reformulated as the coloured version of kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} (see Proposition 2.3), hereafter panchromatic kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection}. In panchromatic kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection}, we are given kk collections, each consisting of nn subsets of the universe [n][n], and the goal is to choose one set from each collection such that their intersection size is maximized. From [46], it follows that assuming 𝖲𝖤𝖳𝖧\mathsf{SETH} (respectively 𝖤𝖳𝖧\mathsf{ETH}), there is no nkεn^{k-\varepsilon}-time (respectively no(k)n^{o(k)}-time) algorithm that can approximate panchromatic kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} to an F(k)F(k) factor for any computable function FF.

It is easier to describe the 𝖯𝖦𝖢\mathsf{PGC} technique in terms of graphs, so we reformulate the panchromatic kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} problem as follows: given a bipartite graph H(X,Y)H(X,Y) where X=X1˙˙XkX=X_{1}\dot{\cup}\cdots\dot{\cup}X_{k} corresponds to the kk collections of sets and YY corresponds to the universe (so |X1|==|Xk|=|Y|=n|X_{1}|=\cdots=|X_{k}|=|Y|=n), the goal is to find (x1,,xk)X1××Xk(x_{1},\ldots,x_{k})\in X_{1}\times\cdots\times X_{k} which has the largest sized common neighbourhood in YY. We also consider a (n,k,t,t/λ)(n,k,t,t/\lambda)-panchromatic graph G(X,B)G(X,B) as guaranteed by our Theorem 1.2. Now, given GG and HH as above, the 𝖯𝖦𝖢\mathsf{PGC} technique, roughly speaking, boils down to analyzing the graph H(X,Y×B)H^{*}(X,Y\times B) where if (x,b)Xi×B(x,b)\in X_{i}\times B is an edge in GG and (x,y)Xi×Y(x,y)\in X_{i}\times Y is an edge in HH, then we have the edge (x,(y,b))Xi×Y×B(x,(y,b))\in X_{i}\times Y\times B in HH^{*}.

In the completeness case, if the maximum panchromatic common neighbourhood size in HH was cc, then the same set of vertices would have a common neighbourhood of size tct\cdot c in HH^{*}, whereas in the soundness case, if the maximum panchromatic common neighbourhood size in HH was ss, then the maximum common neighbourhood size is at most tst\cdot s in HH^{*}. From the soundness of the panchromatic graph, we know that if we pick kk vertices in XX not all from different colour classes, then their common neighbourhood is of size at most (t/λ)|Y|(t/\lambda)\cdot|Y|. The results we desire then follow by setting λ\lambda appropriately, and importantly noting that |Y|=O(c)|Y|=O(c) in the hard instances given by [46]; recall that the common neighbourhood problem on HH^{*} where we ignore the colour classes is the kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} problem.

Our composition technique using panchromatic graphs strictly improves on the techniques introduced in [30, 47]. The 𝖯𝖦𝖢\mathsf{PGC} technique described above also improves the inapproximability results of [47], albeit only in the lower order terms, and also simplifies their hardness of approximation proof for the Monochromatic Maximum Inner Product problem.

1.3. Organization of Paper

In Section 2, we formally define the problems and hypotheses of interest in this paper. In Section 3, we carefully define panchromatic and threshold graphs and state our main results about them. In Section 4, we prove some important intermediate results that will be used to analyze our constructions of panchromatic and threshold graphs. In Section 5, we give the constructions of panchromatic graphs and threshold graphs. In Section 6, we prove our fine-grained inapproximability results for kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection}. Finally, in Section 7 we highlight a few important open problems and research directions.

2. Preliminaries

2.1. Notations

For any set XX we denote by 2X2^{X}, the power set of XX. We use the notation Ok()O_{k}(\cdot) (resp. Ωk()\Omega_{k}(\cdot)) to mean F(k)O()F(k)\cdot O(\cdot) (resp. F(k)Ω()F(k)\cdot\Omega(\cdot)) for some function FF.

2.2. Problems and Hypotheses

In this subsection, we formally define all the problems and hypotheses used in the paper.

First, we define the \ell-𝖲𝖠𝖳\mathsf{SAT} problem and then define the two popular fine-grained hypotheses concerning this problem.

\ell-𝖲𝖠𝖳\mathsf{SAT}

In the \ell-𝖲𝖠𝖳\mathsf{SAT} problem, we are given a 𝖢𝖭𝖥\mathsf{CNF} formula φ\varphi over nn variables x1,xnx_{1},\ldots x_{n}, such that each clause contains at most \ell literals. Our goal is to decide if there exist an assignment to x1,xnx_{1},\ldots x_{n} which satisfies φ\varphi.

In this paper, we require a fine-grained notion (of algorithms) in the complexity class RP and a fine-grained notion of Reverse Unfaithful Random (RUR) reductions [41, 56]. An FPT notion of such algorithms and reductions was introduced in [10] and the notion of randomized fine-grained reduction was introduced in [20]. A promise problem Π\Pi is a pair of languages (ΠYES,ΠNO)(\Pi_{\text{YES}},\Pi_{\text{NO}}) such that ΠYESΠNO=\Pi_{\text{YES}}\cap\Pi_{\text{NO}}=\emptyset. A Monte Carlo algorithm 𝒜\mathcal{A} is said to be a (one-sided) randomized algorithm for a (promise) problem Π\Pi if the following holds:

  • (YES) For all xΠYESx\in\Pi_{\text{YES}}, Pr[𝒜(x)=1]1/2\Pr[\mathcal{A}(x)=1]\geq 1/2.

  • (NO) For all xΠNOx\in\Pi_{\text{NO}}, Pr[𝒜(x)=0]=1\Pr[\mathcal{A}(x)=0]=1.

Moreover, we say that 𝒜\mathcal{A} runs in time TT if the running time of 𝒜\mathcal{A} on every randomness is upper bounded by TT.

Hypothesis 2.1 ((Randomized) Exponential Time Hypothesis (𝖤𝖳𝖧\mathsf{ETH}[39, 40, 64]).

There exists an ϵ>0\epsilon>0 such that no Monte Carlo (one-sided) randomized algorithm can solve 3-𝖲𝖠𝖳\mathsf{SAT} on nn variables in time O(2ϵn)O(2^{\epsilon n}). Moreover, this holds even when restricted to formulae in which each variable appears in at most three clauses.

We will also recall a stronger hypothesis called the Strong Exponential Time Hypothesis (𝖲𝖤𝖳𝖧\mathsf{SETH}):

Hypothesis 2.2 ((Randomized) Strong Exponential Time Hypothesis (𝖲𝖤𝖳𝖧\mathsf{SETH}[39, 40]).

For every ε>0\varepsilon>0, there exists =(ε)\ell=\ell(\varepsilon)\in\mathbb{N} such that no Monte Carlo (one-sided) randomized algorithm can solve \ell-𝖲𝖠𝖳\mathsf{SAT} in O(2(1ε)m)O(2^{(1-\varepsilon)m}) time where mm is the number of variables. Moreover, this holds even when the number of clauses is at most c(ε)mc(\varepsilon)m where c(ε)c(\varepsilon) denotes a constant that depends only on ε\varepsilon.

In this paper, we prove tight running time lower bounds for kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} (to be formally defined later in this section) assuming 𝖤𝖳𝖧\mathsf{ETH} (resp. 𝖲𝖤𝖳𝖧\mathsf{SETH}) by providing a fine-grained RUR reduction from 3-𝖲𝖠𝖳\mathsf{SAT} (resp. \ell-𝖲𝖠𝖳\mathsf{SAT}) to kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection}, such that YES instances of 3-𝖲𝖠𝖳\mathsf{SAT} (resp. \ell-𝖲𝖠𝖳\mathsf{SAT}) map to YES instances of kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} with high probability and NO instances of 3-𝖲𝖠𝖳\mathsf{SAT} (resp. \ell-𝖲𝖠𝖳\mathsf{SAT}) always map to NO instances of kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection}. We remark that using standard techniques, fine-grained RUR reductions can be used to transform Monte Carlo one-sided randomized algorithms for kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} to Monte Carlo one-sided randomized algorithms for 𝖲𝖠𝖳\mathsf{SAT} (for example, see Lemma 3.7 in [10]).

Next, we recall the MaxCover problem introduced in [17] which turned out to be the centerpiece of many results in parameterized inapproximability.

kk-MaxCover problem

The kk-MaxCover instance Γ\Gamma consists of a bipartite graph G=(V˙W,E)G=(V\dot{\cup}W,E) such that VV is partitioned into V=V1˙˙VkV=V_{1}\dot{\cup}\cdots\dot{\cup}V_{k} and WW is partitioned into W=W1˙˙WW=W_{1}\dot{\cup}\cdots\dot{\cup}W_{\ell}. We sometimes refer to ViV_{i}’s and WjW_{j}’s as left super-nodes and right super-nodes of Γ\Gamma, respectively.

A solution to kk-MaxCover is called a labeling, which is a subset of vertices v1V1,vkVkv_{1}\in V_{1},\dots v_{k}\in V_{k}. We say that a labeling v1,vkv_{1},\dots v_{k} covers a right super-node WiW_{i}, if there exists a vertex wiWiw_{i}\in W_{i} which is a joint neighbor of all v1,vkv_{1},\dots v_{k}, i.e., (vj,wi)E(v_{j},w_{i})\in E for every j[k]j\in[k]. We denote by MaxCover(Γ)\mbox{\sf MaxCover}(\Gamma) the maximal fraction of right super-nodes that can be simultaneously covered, i.e.,

MaxCover(Γ)=1(maxlabeling v1,vk|{i[]Wi is covered by v1,vk}|).\displaystyle\mbox{\sf MaxCover}(\Gamma)=\frac{1}{\ell}\left(\max_{\text{labeling }v_{1},\dots v_{k}}\bigl{\lvert}\bigl{\{}i\in[\ell]\mid W_{i}\text{ is covered by }v_{1},\dots v_{k}\bigr{\}}\bigr{\rvert}\right).

Given an instance Γ(G,c,s)\Gamma(G,c,s) of the kk-MaxCover problem as input, our goal is to distinguish between the two cases:

Completeness:

MaxCover(Γ)c\mbox{\sf MaxCover}(\Gamma)\geq c.

Soundness:

MaxCover(Γ)s\mbox{\sf MaxCover}(\Gamma)\leq s.

We define Unique MaxCover to be the MaxCover problem with the following additional structure: for every labeling SVS\subseteq V and any right super-node WiW_{i}, there is at most one node in WiW_{i} which is a neighbor to all the nodes in SS.

Next, we define the two central computational problems of attention in this paper, kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} and its coloured variant, panchromatic kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection}.

kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} problem

The kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} instance Γ\Gamma consists of a collection 𝒞\mathcal{C} of nn subsets of a universe 𝒰\mathcal{U} (typically synonymous with [n][n]) and integer parameters c,sc,s (c>sc>s). In the kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} problem, given input Γ(𝒞,c,s)\Gamma(\mathcal{C},c,s), the goal is to distinguish between the two cases:

Completeness:

There exists kk sets Si1,,SikS_{i_{1}},\ldots,S_{i_{k}} in 𝒞\mathcal{C} such that |r[k]Sir|c\left|\underset{{r\in[k]}}{\cap}S_{i_{r}}\right|\geq c.

Soundness:

For every kk sets Si1,,SikS_{i_{1}},\ldots,S_{i_{k}} in 𝒞\mathcal{C} we have |r[k]Sir|s\left|\underset{{r\in[k]}}{\cap}S_{i_{r}}\right|\leq s.

Panchromatic kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} problem

The panchromatic kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} instance Γ\Gamma consists of kk collections 𝒞1,𝒞k\mathcal{C}_{1},\ldots\mathcal{C}_{k} each containing nn subsets of a universe 𝒰\mathcal{U} and integer parameters c,sc,s (c>sc>s). In the panchromatic kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} problem, given input Γ(𝒞1,𝒞k,c,s)\Gamma(\mathcal{C}_{1},\ldots\mathcal{C}_{k},c,s), the goal is to distinguish between the two cases:

Completeness:

There exists kk sets Si1,,SikS_{i_{1}},\ldots,S_{i_{k}} in 𝒞1××𝒞k\mathcal{C}_{1}\times\cdots\times\mathcal{C}_{k} such that |r[k]Sir|c\left|\underset{{r\in[k]}}{\cap}S_{i_{r}}\right|\geq c.

Soundness:

For every kk sets Si1,,SikS_{i_{1}},\ldots,S_{i_{k}} in 𝒞1××𝒞k\mathcal{C}_{1}\times\cdots\times\mathcal{C}_{k} we have |r[k]Sir|s\left|\underset{{r\in[k]}}{\cap}S_{i_{r}}\right|\leq s.

We define an important quantity for instances of panchromatic kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection}, which we call the monochromatic number of Γ\Gamma and is defined to be the following quantity:

maxX𝒞1𝒞k|X|=k|SXS|\max_{\begin{subarray}{c}X\subseteq\mathcal{C}_{1}\cup\cdots\cup\mathcal{C}_{k}\\ |X|=k\end{subarray}}\left|\bigcap_{S\in X}S\right|

Additionally, we make the following connection between Unique kk-MaxCover and panchromatic kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection}.

Proposition 2.3.

Every Unique MaxCover instance

Γ(V:=V1˙˙Vk,W:=W1˙˙W,E,c,s)\Gamma(V:=V_{1}\dot{\cup}\cdots\dot{\cup}V_{k},W:=W_{1}\dot{\cup}\cdots\dot{\cup}W_{\ell},E,c,s)

is also a panchromatic kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} instance Γ(𝒞1,,𝒞k,c,s)\Gamma^{\prime}(\mathcal{C}_{1},\ldots,\mathcal{C}_{k},c^{\prime},s^{\prime}) over universe 𝒰\mathcal{U} with monochromatic number zz where we have (i) |𝒰|=|W||\mathcal{U}|=|W|, (ii) i[k]\forall i\in[k], |𝒞i|=|Vi||\mathcal{C}_{i}|=|V_{i}|, (iii) c=cc^{\prime}=c\cdot\ell, (iv) s=ss^{\prime}=s\cdot\ell, and (v) z|W|z\leq|W|.

Proof.

For every wWw\in W we create a universe element uw𝒰u_{w}\in\mathcal{U}. For every vViv\in V_{i} we create a set Sv𝒞iS_{v}\in\mathcal{C}_{i} and we include uwu_{w} in SvS_{v} if there is an edge between ww and vv in Γ\Gamma. Note that ww is a common neighbor of (v1,,vk)V1×Vk(v_{1},\ldots,v_{k})\in V_{1}\times\cdots V_{k} if and only if uwu_{w} is in i[k]Svi\cap_{i\in[k]}S_{v_{i}}. Furthermore note that since Γ\Gamma is an instance of Unique kk-MaxCover, we have that the quantity (MaxCover(Γ))\ell\cdot\left(\text{\mbox{\sf MaxCover}}(\Gamma)\right) is simply the number of common neighbors of any kk vertices in VV when we pick one vertex from each ViV_{i}. The theorem statement then follows. ∎

Finally, we define a contrapositive version of kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} problem as this variant comes in handy to describe a gap creation approach in Appendix A.

kk-𝖬𝗂𝗇𝖢𝗈𝗏𝖾𝗋𝖺𝗀𝖾\mathsf{MinCoverage} problem

The kk-𝖬𝗂𝗇𝖢𝗈𝗏𝖾𝗋𝖺𝗀𝖾\mathsf{MinCoverage} instance Γ\Gamma consists of a collection 𝒞\mathcal{C} of nn subsets of [n][n] and integer parameters c,sc,s (c<sc<s). In the kk-𝖬𝗂𝗇𝖢𝗈𝗏𝖾𝗋𝖺𝗀𝖾\mathsf{MinCoverage} problem, given input Γ(𝒞,c,s)\Gamma(\mathcal{C},c,s), the goal is to distinguish between the two cases:

Completeness:

There exists kk sets Si1,,SikS_{i_{1}},\ldots,S_{i_{k}} in 𝒞\mathcal{C} such that |r[k]Sir|c\left|\underset{{r\in[k]}}{\cup}S_{i_{r}}\right|\leq c.

Soundness:

For every kk sets Si1,,SikS_{i_{1}},\ldots,S_{i_{k}} in 𝒞\mathcal{C} we have |r[k]Sir|s\left|\underset{{r\in[k]}}{\cup}S_{i_{r}}\right|\geq s.

Panchromatic kk-𝖬𝗂𝗇𝖢𝗈𝗏𝖾𝗋𝖺𝗀𝖾\mathsf{MinCoverage} problem

The panchromatic kk-𝖬𝗂𝗇𝖢𝗈𝗏𝖾𝗋𝖺𝗀𝖾\mathsf{MinCoverage} instance Γ\Gamma consists of kk collections 𝒞1,𝒞k\mathcal{C}_{1},\ldots\mathcal{C}_{k} each containing nn subsets of [n][n] and integer parameters c,sc,s (c<sc<s). In the panchromatic kk-𝖬𝗂𝗇𝖢𝗈𝗏𝖾𝗋𝖺𝗀𝖾\mathsf{MinCoverage} problem, given input Γ(𝒞1,𝒞k,c,s)\Gamma(\mathcal{C}_{1},\ldots\mathcal{C}_{k},c,s), the goal is to distinguish between the two cases:

Completeness::

There exists kk sets Si1,,SikS_{i_{1}},\ldots,S_{i_{k}} in 𝒞1××𝒞k\mathcal{C}_{1}\times\cdots\times\mathcal{C}_{k} such that |r[k]Sir|c\left|\underset{{r\in[k]}}{\cup}S_{i_{r}}\right|\leq c.

Soundness::

For every kk sets Si1,,SikS_{i_{1}},\ldots,S_{i_{k}} in 𝒞1××𝒞k\mathcal{C}_{1}\times\cdots\times\mathcal{C}_{k} we have |r[k]Sir|s\left|\underset{{r\in[k]}}{\cup}S_{i_{r}}\right|\geq s.

3. Panchromatic and Threshold Graphs: Definitions and Results

Here, we define panchromatic and threshold graphs a little more carefully, and also state precisely what our constructions accomplish.

We start with panchromatic graphs.

Definition 3.1 ((n,m,k,t,s,p)(n,m,k,t,s,p)-panchromatic graph).

A bipartite graph G(A,B)G(A,B) where AA is partitioned into kk parts A1,,AkA_{1},\ldots,A_{k} with |A1|==|Ak|=n|A_{1}|=\dots=|A_{k}|=n and |B|m|B|\leq m satisfying the following pair of conditions.

Completeness:

For a pp-fraction of the kk-sets {a1,a2,.,ak}\{a_{1},a_{2},....,a_{k}\} with aiAia_{i}\in A_{i} for i[k]i\in[k], the number of common neighbours of {a1,a2,.,ak}\{a_{1},a_{2},....,a_{k}\} in BB is exactly tt, and every kk-set {a1,a2,.,ak}\{a_{1},a_{2},....,a_{k}\} with aiAia_{i}\in A_{i} for i[k]i\in[k] has at most tt common neighbours in BB.

Soundness:

For every set XAX\subset A of size kk for which AiXA_{i}\cap X is empty for some i[k]i\in[k], the number of common neighbours of XX in BB is at most ss.

Next, we turn to threshold graphs.

Definition 3.2 ((n,m,k,t,s,p)(n,m,k,t,s,p)-threshold graph).

A bipartite graph G(A,B)G(A,B) with |A|=n|A|=n and |B|m|B|\leq m satisfying the following pair of conditions.

Completeness:

For a pp-fraction of kk-sets of vertices {a1,a2,.,ak}A\{a_{1},a_{2},....,a_{k}\}\subset A, the number of common neighbours of {a1,a2,.,ak}\{a_{1},a_{2},....,a_{k}\} in BB is at least tt.

Soundness:

For every (k+1)(k+1)-set of vertices {a1,a2,.,ak+1}\{a_{1},a_{2},....,a_{k+1}\} in AA, the number of common neighbours of {a1,a2,.,ak+1}\{a_{1},a_{2},....,a_{k+1}\} in BB is at most ss.

We show that both types of graphs may be constructed with reasonable dependencies between the various parameters involved. Both constructions are easy to describe, with the edge sets of the graphs in question coming from the varieties cut out by (carefully chosen) random polynomials; the analysis of these constructions is far from trivial however, and relies on some amount of machinery from algebraic geometry.

For panchromatic graphs, we have the following result which, in particular, ensures that such graphs exist.

Theorem 3.3.

For each kk\in\mathbb{N} and any integer λ>1\lambda>1, there is a strictly increasing sequence {ni}i\{n_{i}\in\mathbb{N}\}_{i\in\mathbb{N}} such that for every ii\in\mathbb{N}, there exists a distribution 𝒟k,λ,ni{\mathcal{D}}_{k,\lambda,n_{i}} over bipartite graphs on (k+1)ni(k+1)n_{i} vertices with the following properties.

  1. (1)

    A graph can be sampled from 𝒟k,λ,ni{\mathcal{D}}_{k,\lambda,n_{i}} in Ok(ni2){O}_{k}(n_{i}^{2}) time using Ok(nilogni)O_{k}(n_{i}\log n_{i}) random coins.

  2. (2)

    For G𝒟k,λ,niG\sim{\mathcal{D}}_{k,\lambda,n_{i}}, writing D=λ(k2+2)D=\lambda(k^{2}+2), we have

    (G is a (ni,ni,k,Dk,Dk/λ,(4(Dk)!)1)-panchromatic graph)(4(Dk)!)1.{\mathbb{P}}\left(G\text{ is a }(n_{i},n_{i},k,D^{k},D^{k}/\lambda,(4(D^{k})!)^{-1})\text{-panchromatic graph}\right)\geq(4(D^{k})!)^{-1}.

Moreover, for every nn\in\mathbb{N}, there exists ii\in\mathbb{N} such that nni2knn\leq n_{i}\leq 2^{k}\cdot n.

For threshold graphs, we have the following analogous result, which again, in particular, ensures that such graphs exist.

Theorem 3.4.

For each kk\in\mathbb{N}, there is a strictly increasing sequence {ni}i\{n_{i}\in\mathbb{N}\}_{i\in\mathbb{N}} such that for every ii\in\mathbb{N}, there exists a distribution 𝒟k,ni{\mathcal{D}}_{k,n_{i}} over bipartite graphs on 2ni2n_{i} vertices with the following properties.

  1. (1)

    A graph can be sampled from 𝒟k,ni{\mathcal{D}}_{k,n_{i}} in Ok(ni2){O}_{k}(n_{i}^{2}) time using Ok(nilogni)O_{k}(n_{i}\log n_{i}) random coins.

  2. (2)

    For G𝒟k,niG\sim{\mathcal{D}}_{k,n_{i}}, writing d=(k+1)2+1d=(k+1)^{2}+1, we have

    (G is a (ni,ni,k,ni1/(k+1)/2,dk+1,1)-threshold graph)1o(1).\mathbb{P}\left(G\text{ is a }(n_{i},n_{i},k,n_{i}^{1/(k+1)}/2,d^{k+1},1)\text{-threshold graph}\right)\geq 1-o(1).

Moreover, for every nn\in\mathbb{N}, there exists ii\in\mathbb{N} such that nni2knn\leq n_{i}\leq 2^{k}\cdot n.

4. Zero sets of Random Polynomials

The aim of this section is to collect together the requisite tools from algebraic geometry that we require to prove Theorems 3.3 and 3.4. While we have attempted to keep the presentation self-contained for the most part, some of the arguments (unavoidably) assume some familiarity with algebraic geometry; for more background, we refer the reader to [62, 33].

A variety over an algebraically closed field 𝔽¯\overline{\mathbb{F}} is a set of the form

V={x𝔽¯k:f1(x)==ft(x)=0}V=\{x\in\overline{\mathbb{F}}^{k}:f_{1}(x)=\dots=f_{t}(x)=0\}

for some collection of polynomials f1,,ft:𝔽¯k𝔽¯f_{1},\dots,f_{t}\colon\overline{\mathbb{F}}^{k}\rightarrow\overline{\mathbb{F}}; when we wish to make these polynomials explicit, we write V(f1,,ft)V(f_{1},\dots,f_{t}) for VV. A variety is said to be irreducible if it cannot be written as the union of two proper subvarieties. The dimension dimV\dim V of a variety VV is then the maximum integer dd such that there exists a chain of irreducible subvarieties of VV of the form

V0V1V2VdV,\emptyset\subsetneq V_{0}\subsetneq V_{1}\subsetneq V_{2}\subsetneq\dots\subsetneq V_{d}\subset V,

where V0V_{0} consists of a single point. The degree of an irreducible variety of dimension dd is the number of intersection points of the variety with dd hyperplanes in general position, and for an arbitrary variety VV, we define its degree degV\deg V to be the sum of the degrees of its irreducible components.

We need Bézout’s theorem in the following form; for a proof, see [33, p. 223, Example 12.3.1], for example.

Lemma 4.1.

For a collection of polynomials f1,,fk:𝔽¯k𝔽¯f_{1},\dotsc,f_{k}\colon\overline{\mathbb{F}}^{k}\rightarrow\overline{\mathbb{F}}, if the variety

V={x𝔽¯k:f1(x)==fk(x)=0}V=\{x\in\overline{\mathbb{F}}^{k}:f_{1}(x)=\dots=f_{k}(x)=0\}

has dimV=0\dim V=0, then

|V|i=1kdeg(fi).|V|\leq\prod_{i=1}^{k}\deg(f_{i}).

Moreover, for a collection of polynomials f1,,ft:𝔽¯k𝔽¯f_{1},\dotsc,f_{t}\colon\overline{\mathbb{F}}^{k}\rightarrow\overline{\mathbb{F}}, the variety

V={x𝔽¯k:f1(x)==ft(x)=0}V=\{x\in\overline{\mathbb{F}}^{k}:f_{1}(x)=\dots=f_{t}(x)=0\}

has at most i=1tdeg(fi)\prod_{i=1}^{t}\deg(f_{i}) irreducible components.

In what follows, we let qq be a prime power and work with polynomials over 𝔽q\mathbb{F}_{q}, where 𝔽q\mathbb{F}_{q} is the finite field of order qq. All varieties below are over 𝔸\mathbb{A}, where 𝔸=𝔽¯q\mathbb{A}=\overline{\mathbb{F}}_{q} is the algebraic closure of 𝔽q\mathbb{F}_{q}, unless explicitly specified otherwise. We let 𝔽q[X1,,Xk]d\mathbb{F}_{q}[X_{1},\dots,X_{k}]_{\leq d} be the subset of 𝔽q[X1,,Xk]\mathbb{F}_{q}[X_{1},\dots,X_{k}] of polynomials in kk variables of degree at most dd, i.e., the set of linear combinations over 𝔽q\mathbb{F}_{q} of monomials of the form X1a1XkakX_{1}^{a_{1}}\dots X_{k}^{a_{k}} with i=1kaid\sum_{i=1}^{k}a_{i}\leq d. Let us note that one may sample a uniformly random element of 𝔽q[X1,,Xk]d\mathbb{F}_{q}[X_{1},\dots,X_{k}]_{\leq d} by taking the coefficients of the monomials above to be independent random elements of 𝔽q\mathbb{F}_{q}.

The first lemma we state estimates the probability of a randomly chosen polynomial passing through each of mm distinct points; see [15, 24] for similar statements.

Lemma 4.2.

Suppose that q>(m2)q>\binom{m}{2} and dm1d\geq m-1. Let ff be a uniformly random kk-variate polynomial chosen from 𝔽q[X1,,Xk]d\mathbb{F}_{q}[X_{1},\dots,X_{k}]_{\leq d}.

  1. (1)

    If x1,,xmx_{1},\dots,x_{m} are mm distinct points in 𝔽qk\mathbb{F}_{q}^{k}, then

    (f(xi)=0 for all i=1,,m)=qm.\mathbb{P}\left(f(x_{i})=0\mbox{ for all }i=1,\dots,m\right)=q^{-m}.
  2. (2)

    If x1,,xmx_{1},\dots,x_{m} are mm distinct points in 𝔽¯qk\overline{\mathbb{F}}_{q}^{k}, then

    (f(xi)=0 for all i=1,,m)qm.\mathbb{P}\left(f(x_{i})=0\mbox{ for all }i=1,\dots,m\right)\leq q^{-m}.
Proof.

We prove the first statement below, and later outline the proof of the second statement.

Let xi=(xi,1,,xi,k)x_{i}=(x_{i,1},\dots,x_{i,k}) for each i=1,,mi=1,\dots,m. We choose elements a2,,ak𝔽qa_{2},\dots,a_{k}\in\mathbb{F}_{q} such that xi,1+j=2kajxi,jx_{i,1}+\sum_{j=2}^{k}a_{j}x_{i,j} is distinct for all i=1,,mi=1,\dots,m. To see that this is possible, note that there are exactly (m2)\binom{m}{2} equations

xi,1+j=2kajxi,j=xi,1+j=2kajxi,j,x_{i,1}+\sum_{j=2}^{k}a_{j}x_{i,j}=x_{i^{\prime},1}+\sum_{j=2}^{k}a_{j}x_{i^{\prime},j},

each with at most qk2q^{k-2} solutions (a2,,ak)(a_{2},\dots,a_{k}). Therefore, since the total number of choices for (a2,,ak)(a_{2},\dots,a_{k}) is qk1q^{k-1} and qk1>qk2(m2)q^{k-1}>q^{k-2}\binom{m}{2}, we can make an appropriate choice.

We now consider 𝔽q[Z1,,Zk]d\mathbb{F}_{q}[Z_{1},\dots,Z_{k}]_{\leq d}, the set of polynomials of degree at most dd in the variables Z1,,ZkZ_{1},\dots,Z_{k}, where Z1=X1+j=2kajXjZ_{1}=X_{1}+\sum_{j=2}^{k}a_{j}X_{j} and Zj=XjZ_{j}=X_{j} for all 2jk2\leq j\leq k. Since this change of variables is an invertible linear map, 𝔽q[Z1,,Zk]d\mathbb{F}_{q}[Z_{1},\dots,Z_{k}]_{\leq d} is identical to 𝔽q[X1,,Xk]d\mathbb{F}_{q}[X_{1},\dots,X_{k}]_{\leq d}. It will therefore suffice to show that a randomly chosen polynomial from 𝔽q[Z1,,Zk]d\mathbb{F}_{q}[Z_{1},\dots,Z_{k}]_{\leq d} passes through all of the points z1,,zmz_{1},\dots,z_{m} corresponding to x1,,xmx_{1},\dots,x_{m} with probability exactly qmq^{-m}. For this, we will use the fact that, by our choice above, zi,1zi,1z_{i,1}\neq z_{i^{\prime},1} for any 1i<im1\leq i<i^{\prime}\leq m.

For any ff in 𝔽q[Z1,,Zk]d\mathbb{F}_{q}[Z_{1},\dots,Z_{k}]_{\leq d}, we may write f=g+hf=g+h, where hh contains all monomials of the form Z1jZ_{1}^{j} for j=0,1,,m1j=0,1,\dots,m-1 and gg contains all other monomials. For any fixed choice of gg, there is, by Lagrange interpolation, exactly one choice of hh with coefficients in 𝔽q\mathbb{F}_{q} such that f(zi)=0f(z_{i})=0 for all i=1,,mi=1,\dots,m, namely, the unique polynomial of degree at most m1m-1 which takes the value g(zi)-g(z_{i}) at zi,1z_{i,1} for all i=1,2,,mi=1,2,\dots,m, where uniqueness follows from the fact that the zi,1z_{i,1} are distinct. Since this is out of a total of qmq^{m} possibilities, we see that the probability of ff passing through all of the ziz_{i} is exactly qmq^{-m}, as required.

For the second statement, we may argue identically, now working over 𝔽¯q\overline{\mathbb{F}}_{q} and noting that the unique polynomial of degree at most m1m-1 which takes the value g(zi)-g(z_{i}) at zi,1z_{i,1} for all i=1,2,,mi=1,2,\dots,m may now have coefficients in 𝔽¯q\overline{\mathbb{F}}_{q} as opposed to 𝔽q\mathbb{F}_{q}, whence we get an inequality as opposed to the equality in the first statement. ∎

The next result we prove allows us to upper bound the size of the 𝔽q\mathbb{F}_{q}-variety cut out by multiple random polynomials.

Theorem 4.3.

Fix t,kt,k\in\mathbb{N} with tkt\leq k, and fix positive integers d1,,dtd_{1},\dots,d_{t}\in\mathbb{N}. Independently for each i[t]i\in[t], sample fif_{i} from 𝔽q[X1,,Xk]di\mathbb{F}_{q}[X_{1},\dots,X_{k}]_{\leq d_{i}} uniformly at random. Then

(dimV(f1,,ft)>kt)Ctqmin(d1,,dt)\mathbb{P}\left(\dim V(f_{1},\dots,f_{t})>k-t\right)\leq C_{t}q^{-\min(d_{1},\dots,d_{t})} (1)

for some constant Ct=Ct(d1,,dk)>0C_{t}=C_{t}(d_{1},\dots,d_{k})>0. In particular, if t=kt=k, then

(|V(f1,,fk)𝔽qk|>i=1kdi)Cqmin(d1,,dk)\mathbb{P}\left(\left|V(f_{1},\dots,f_{k})\cap\mathbb{F}_{q}^{k}\right|>\prod_{i=1}^{k}d_{i}\right)\leq Cq^{-\min(d_{1},\dots,d_{k})}

for some constant C=C(d1,,dk)>0C=C(d_{1},\dots,d_{k})>0.

Proof.

For terminology not defined here, and standard facts about dimension that we call upon without proof, see the first and the sixth chapter of [62].

To establish (1) it suffices show that

(dimV(f1,,ft1,ft)>ktdimV(f1,,ft1)=kt+1)qdti=1t1di\mathbb{P}\left(\dim V(f_{1},\dots,f_{t-1},f_{t})>k-t\mid\dim V(f_{1},\dots,f_{t-1})=k-t+1\right)\leq q^{-d_{t}}\prod_{i=1}^{t-1}d_{i} (2)

since (1) follows from (2) by induction on tt.

Now, sample polynomials f1,,ft1f_{1},\dots,f_{t-1}, and assume that the variety U=V(f1,,ft1)U=V(f_{1},\dots,f_{t-1}) is of dimension dt+1d-t+1. By Lemma 4.1, UU has at most d1dt1d_{1}\cdots d_{t-1} components, which we name U1,,UmU_{1},\dots,U_{m}. Note that since dimUidimU=dt+1\dim U_{i}\leq\dim U=d-t+1, and UiU_{i} is intersection of t1t-1 hypersurfaces, each UiU_{i} is of dimension exactly dt+1d-t+1. For each UiU_{i}, pick dtd_{t} distinct points xi,1,,xi,dtx_{i,1},\dots,x_{i,d_{t}} on UiU_{i}.

Since ftf_{t} is a random polynomial of degree dtd_{t}, from Lemma 4.2 we infer that

(UiV(ft))(ft(xi,j)=0 for all j=1,,dt)qdt\mathbb{P}\left(U_{i}\subset V(f_{t})\right)\leq\mathbb{P}\left(f_{t}(x_{i},j)=0\text{ for all }j=1,\dots,d_{t}\right)\leq q^{-d_{t}}

for each 1im1\leq i\leq m. Hence, by the union bound

(dimV(f1,,ft1,ft)>kt)i=1m(UiV(ft))qdti=1t1di.\mathbb{P}\left(\dim V(f_{1},\dots,f_{t-1},f_{t})>k-t\right)\leq\sum_{i=1}^{m}\mathbb{P}\left(U_{i}\subset V(f_{t})\right)\leq q^{-d_{t}}\prod_{i=1}^{t-1}d_{i}.

proving (2), and hence (1).

If t=kt=k, then

(|V(f1,,fk)𝔽qk|>i=1kdi)\displaystyle\mathbb{P}\left(\left|V(f_{1},\dots,f_{k})\cap\mathbb{F}_{q}^{k}\right|>\prod_{i=1}^{k}d_{i}\right) (|V(f1,,fk)|>i=1kdi)\displaystyle\leq\mathbb{P}\left(\lvert V(f_{1},\dots,f_{k})\rvert>\prod_{i=1}^{k}d_{i}\right)
(dimV(f1,,fk)>0)\displaystyle\leq\mathbb{P}(\dim V(f_{1},\dots,f_{k})>0)
Ckqmin(d1,,dk),\displaystyle\leq C_{k}q^{-\min(d_{1},\dots,d_{k})},

where the first inequality is trivial, the second is a consequence of Lemma 4.1, i.e., Bézout’s theorem, and the third is just (1) for t=kt=k. ∎

Finally, we need a way to lower bound the size of the 𝔽q\mathbb{F}_{q}-variety cut out by multiple random polynomials, and the following result gives us what we need. While the arguments thus far have been mostly elementary, this result is more involved.

Theorem 4.4.

Fix positive integers k,d1,,dkk,d_{1},\dots,d_{k}\in\mathbb{N}. Independently for each i[k]i\in[k], sample fif_{i} from 𝔽q[X1,,Xk]di\mathbb{F}_{q}[X_{1},\dotsc,X_{k}]_{\leq d_{i}} uniformly at random. Then

(|V(f1,,fk)𝔽qk|=i=1kdi)1cq1/2(i=1kdi)!\mathbb{P}\left(\left|V(f_{1},\dots,f_{k})\cap\mathbb{F}_{q}^{k}\right|=\prod_{i=1}^{k}d_{i}\right)\geq\frac{1-cq^{-1/2}}{\left(\prod_{i=1}^{k}d_{i}\right)!}

for some constant c=c(d1,,dk)>0c=c(d_{1},\dots,d_{k})>0.

Proof.

For terminology not defined here, and standard results that we quote without proof, see the first three chapters of [62].

We set ri=(k+dik)r_{i}=\binom{k+d_{i}}{k} for 1ik1\leq i\leq k, write r=(r1,,rk)\vec{r}=(r_{1},\dots,r_{k}) and |r|\lvert\vec{r}\rvert for r1++rkr_{1}+\dotsb+r_{k}. For 1ik1\leq i\leq k, we identify 𝔸ri\mathbb{A}^{r_{i}} with 𝔸[X]di\mathbb{A}[X]_{\leq d_{i}}, i.e., the space of polynomials in kk variables of degree at most did_{i} with coefficients in 𝔸\mathbb{A}. For brevity, we write 𝔸r\mathbb{A}^{\vec{r}} in place of 𝔸r1××𝔸rk\mathbb{A}^{r_{1}}\times\dots\times\mathbb{A}^{r_{k}} (and 𝔽qr\mathbb{F}_{q}^{\vec{r}} in place of 𝔽qr1××𝔽qrk\mathbb{F}_{q}^{r_{1}}\times\dots\times\mathbb{F}_{q}^{r_{k}}), and to distinguish the space where we evaluate our polynomials from these spaces of polynomials themselves, we set Y=𝔸kY=\mathbb{A}^{k}.

Also, for 𝐟=(f1,,fk)𝔸r\mathbf{f}=(f_{1},\dots,f_{k})\in\mathbb{A}^{\vec{r}}, we abbreviate the variety V(f1,,fk)YV(f_{1},\dotsc,f_{k})\subset Y by V(𝐟)V({\mathbf{f}}). Now, set t=d1dkt=d_{1}\cdots d_{k} and call 𝐟𝔽qr\mathbf{f}\in\mathbb{F}_{q}^{\vec{r}} good if the variety V(𝐟)V({\mathbf{f}}) is zero-dimensional and has tt distinct points that are defined over 𝔽q\mathbb{F}_{q}. In this language, note that we are trying to show, for large qq, that roughly 1/t!1/t! of all the points in 𝔽qr\mathbb{F}_{q}^{\vec{r}} are good. To this end, we set

W={(𝐟,y1,,yt)𝔸r×Yt:yjV(𝐟) for all j=1,,t},W=\{(\mathbf{f},y_{1},\dots,y_{t})\in\mathbb{A}^{\vec{r}}\times Y^{t}:y_{j}\in V({\mathbf{f}})\text{ for all }j=1,\dots,t\},

and deduce the result from the following claim.

Claim 4.5.

Suppose that (𝐟,𝐲)(\mathbf{f}^{*},\mathbf{y}^{*}) is a simple point of WW such that 𝐟\mathbf{f}^{*} is good and the coordinates of 𝐲=(y1,,yt)\mathbf{y}^{*}=(y_{1}^{*},\dots,y_{t}^{*}) are all distinct, and that for generic 𝐟\mathbf{f}, the variety V(𝐟)V({\mathbf{f}}) is zero-dimensional of degree tt. Then there are at least

1cq1/2t!q|r|\frac{1-cq^{-1/2}}{t!}q^{\lvert\vec{r}\rvert}

good points in 𝔽qr\mathbb{F}_{q}^{\vec{r}}, for some constant c=c(d1,,,dk)>0c=c(d_{1},\dotsc,,d_{k})>0.

Proof.

Since (𝐟,𝐲)(\mathbf{f}^{*},\mathbf{y}^{*}) is simple, the irreducible component of WW containing it is unique. Let W1W_{1} be the irreducible component of WW containing (𝐟,𝐲)(\mathbf{f}^{*},\mathbf{y}^{*}) and note that dimW1=dimW\dim W_{1}=\dim W. Since the variety V(𝐟)V({\mathbf{f}}) is generically zero-dimensional of degree tt, the fibres W𝐟={𝐲Yt:(𝐟,𝐲)W}W_{\mathbf{f}}=\{\mathbf{y}\in Y^{t}:(\mathbf{f},\mathbf{y})\in W\} of WW are generically finite, whence we get dimW1=dimW=|r|\dim W_{1}=\dim W=\lvert\vec{r}\rvert.

Let {W1,,Wm}\{W_{1},\dots,W_{m}\} be the orbit of W1W_{1} under the action of the Frobenius endomorphism. Since WW is defined over 𝔽q\mathbb{F}_{q}, and hence invariant under this action, each such WiW_{i} is an irreducible component of WW. Note that (𝐟,𝐲)Wi(\mathbf{f}^{*},\mathbf{y}^{*})\in W_{i} for each i[m]i\in[m], so if m>1m>1, this contradicts the uniqueness of the component containing (𝐟,𝐲)(\mathbf{f}^{*},\mathbf{y}^{*}). Thus, m=1m=1, i.e., W1W_{1} is defined over 𝔽q\mathbb{F}_{q}.

Since (𝐟,𝐲)W1(\mathbf{f}^{*},\mathbf{y}^{*})\in W_{1}, the variety W1W_{1} is not contained in

U=ij{(𝐟,𝐲):yi=yj}.U=\bigcup_{i\neq j}\{(\mathbf{f},\mathbf{y}):y_{i}=y_{j}\}.

Hence, W1HW_{1}\cap H is a proper subvariety of W1W_{1}, and therefore contains OdegW1(q|r|1)O_{\deg W_{1}}(q^{\lvert\vec{r}\rvert-1}) points by the Schwartz–Zippel lemma for varieties [14, Lemma 14]. Since W1W_{1} is defined over 𝔽q\mathbb{F}_{q} and is irreducible over 𝔸\mathbb{A}, the Lang–Weil estimate [54] implies that W1W_{1} contains at least

qdimW1(1OdegW1(q1/2))q^{\dim W_{1}}\left(1-O_{\deg W_{1}}(q^{-1/2})\right)

points defined over 𝔽q\mathbb{F}_{q}. Hence, W1HW_{1}\setminus H contains at least

q|r|(1OdegW1(q1/2)OdegW1(q1))=q|r|(1OdegW1(q1/2))q^{\lvert\vec{r}\rvert}\left(1-O_{\deg W_{1}}(q^{-1/2})-O_{\deg W_{1}}(q^{-1})\right)=q^{\lvert\vec{r}\rvert}\left(1-O_{\deg W_{1}}(q^{-1/2})\right)

points defined over 𝔽q\mathbb{F}_{q} as well. Since each good point 𝐟\mathbf{f} corresponds to exactly t!t! points of W1HW_{1}\setminus H defined over 𝔽q\mathbb{F}_{q}, the result follows. ∎

To finish, it remains to show that the simplicity and genericity hypotheses in Claim 4.5 are satisfied.

For 1ik1\leq i\leq k, pick an arbitrary set Ai𝔽qA_{i}\subset\mathbb{F}_{q} of size did_{i}. Define 𝐟=(f1,,fk)\mathbf{f}^{*}=(f^{*}_{1},\dots,f^{*}_{k}) by setting fi=aAi(Xia)f_{i}^{*}=\prod_{a\in A_{i}}(X_{i}-a) for 1ik1\leq i\leq k and let 𝐲\mathbf{y}^{*} be the vector of length d1dkd_{1}\cdots d_{k} whose coordinates are all the elements of A1××AkA_{1}\times\dots\times A_{k}.

To prove that (𝐟,𝐲)(\mathbf{f}^{*},\mathbf{y}^{*}) is simple, consider the tangent space of WW at (𝐟,𝐲)(\mathbf{f}^{*},\mathbf{y}^{*}), which we denote TWT_{*}W. An element (δ𝐟,δ𝐲)𝔸r×Yt(\delta\mathbf{f},\delta\mathbf{y})\in\mathbb{A}^{\vec{r}}\times Y^{t} is in TWT_{*}W if it is a solution to the system of equations

δfi(yj)+fixi(yj)(δyj)i=0\delta f_{i}(y_{j}^{*})+\frac{\partial f_{i}}{\partial x_{i}}(y_{j}^{*})(\delta y_{j})_{i}=0

for all i[k]i\in[k] and j[t]j\in[t]. From these equations, it is clear that for every δ𝐟𝔸r\delta\mathbf{f}\in\mathbb{A}^{\vec{r}} there is a unique δ𝐲\delta\mathbf{y} such that (δ𝐟,δ𝐲)(\delta\mathbf{f},\delta\mathbf{y}) is in the tangent space. Hence dimTW=dim𝔸r=dimW\dim T_{*}W=\dim\mathbb{A}^{\vec{r}}=\dim W, so it follows that (𝐟,𝐲)(\mathbf{f}^{*},\mathbf{y}^{*}) is simple.

Next, the statement that for generic 𝐟\mathbf{f}, the variety V(𝐟)V({\mathbf{f}}) (is zero-dimensional and) has at most t=d1dkt=d_{1}\cdots d_{k} points is the generalized Bézout’s theorem. The construction of (𝐟,𝐲)(\mathbf{f}^{*},\mathbf{y}^{*}) above shows that V(𝐟)V({\mathbf{f}}) generically has at least tt points as well.

We have established the hypotheses under which Claim 4.5 applies; the result follows. ∎

5. Constructions of Panchromatic Graphs and Threshold Graphs

First, we give the construction of panchromatic graphs using random polynomials.

Proof of Theorem 3.3.

Let qq be a prime power, and let 𝔽q\mathbb{F}_{q} be the finite field of order qq. We shall assume that kk\in\mathbb{N} and λ>1\lambda>1 are fixed, and that qq is sufficiently large as a function of kk. Finally, let us fix d=k2+2d=k^{2}+2, D=λdD=\lambda d and n=qkn=q^{k}. In the rest of the proof, all asymptotic notation will be in the limit of qq\to\infty.

We shall construct a panchromatic graph between two sets AA and BB as follows. First, choose polynomials w1,,wk𝔽q[X1,,Xk]Dw_{1},\dotsc,w_{k}\in\mathbb{F}_{q}[X_{1},\dotsc,X_{k}]_{\leq D} independently and uniformly at random. Next, for i[k]i\in[k], let AiA_{i} be a set of nn vertices each associated with a polynomial wi+pw_{i}+p, where p𝔽q[X1,,Xk]dp\in\mathbb{F}_{q}[X_{1},\dotsc,X_{k}]_{\leq d} is chosen uniformly at random and independently for each vertex; note here that the distribution of the resulting polynomial wi+pw_{i}+p is also uniform on 𝔽q[X1,,Xk]D\mathbb{F}_{q}[X_{1},\dotsc,X_{k}]_{\leq D}. Let AA be the disjoint union ˙i=1kAi\dot{\cup}_{i=1}^{k}A_{i}, and set B=𝔽qkB=\mathbb{F}_{q}^{k}, so that |A|=kqk|A|=kq^{k} and |B|=qk|B|=q^{k}. Finally, let GG be the (random) graph between AA and BB where a polynomial fAf\in A is joined to a point xBx\in B if f(x)=0f(x)=0. We shall show that GG has the requisite properties with probability at least (4(Dk)!)1{(4(D^{k})!)^{-1}}.

First, we count the number of kk-sets U={f1,f2,,fk}U=\{f_{1},f_{2},\dotsc,f_{k}\} with fiAif_{i}\in A_{i} for which the size of the common neighbourhood N(U)N(U) in GG exceeds DkD^{k}. For such a set UU, observe that N(U)N(U) is the set of 𝔽q\mathbb{F}_{q}-solutions of kk polynomials from 𝔽q[X1,,Xk]D\mathbb{F}_{q}[X_{1},\dotsc,X_{k}]_{\leq D} chosen independently and uniformly at random, so by Theorem 4.3, we have

(|N(U)|>Dk)=O(qD).\mathbb{P}(|N(U)|>D^{k})=O(q^{-D}).

Writing B1B_{1} for the number of such kk-sets, we get

𝔼[B1]=O(nkqD)=O(qk2qλ(k2+2))=O(q2)1/q.\mathbb{E}[B_{1}]=O\left(n^{k}q^{-D}\right)=O\left(q^{k^{2}}q^{-\lambda(k^{2}+2)}\right)=O(q^{-2})\leq 1/q. (3)

Next, we count the number of kk-sets U={f1,f2,.,fk}U=\{f_{1},f_{2},....,f_{k}\} with fiAif_{i}\in A_{i} for i[k]i\in[k] for which size of the common neighbourhood N(U)N(U) in GG is exactly DkD^{k}. As above, for such a set UU, observe that |N(U)||N(U)| is distributed as the number of 𝔽q\mathbb{F}_{q}-solutions of kk polynomials from 𝔽q[X1,Xk]D\mathbb{F}_{q}[X_{1},\dots X_{k}]_{\leq D} chosen independently and uniformly at random, so by Theorem 4.4, we have

(|N(U)|=Dk)(2(Dk)!)1.\mathbb{P}(|N(U)|=D^{k})\geq(2(D^{k})!)^{-1}.

Writing B2B_{2} for the number of such kk-sets, we get

𝔼[B2]nk(2(Dk)!)1.\mathbb{E}[B_{2}]\geq n^{k}(2(D^{k})!)^{-1}. (4)

Finally, we count the number of kk-sets UAU\subset A with AiUA_{i}\cap U being empty for some i[k]i\in[k] for which the size of the common neighbourhood N(U)N(U) in GG exceeds dDk1=Dk/λdD^{k-1}=D^{k}/\lambda. For such a set UU, observe that |N(U)||N(U)| is distributed as the number of 𝔽q\mathbb{F}_{q}-solutions of a collection of kk random polynomials. To understand the distribution of this random collection of polynomials, for each i[k]i\in[k] for which UAiU\cap A_{i}\neq\emptyset, we pick one element UAiU\cap A_{i} and subtract that from every other element of UAiU\cap A_{i}; observe that by doing so, we get a set {g1,,gk}\{g_{1},\dotsc,g_{k}\} of independent random polynomials, each uniform over either 𝔽q[X1,Xk]d\mathbb{F}_{q}[X_{1},\dots X_{k}]_{\leq d} or 𝔽q[X1,,Xk]D\mathbb{F}_{q}[X_{1},\dotsc,X_{k}]_{\leq D}, and at least one of which is uniform over 𝔽q[X1,Xk]d\mathbb{F}_{q}[X_{1},\dots X_{k}]_{\leq d}. Since |N(U)||N(U)| is then number of 𝔽q\mathbb{F}_{q}-solutions of {g1,,gk}\{g_{1},\dotsc,g_{k}\}, we deduce from Theorem 4.3 that

(|N(U)|>dDk1)=O(qd).\mathbb{P}(|N(U)|>dD^{k-1})=O(q^{-d}).

Writing B3B_{3} for the number of such kk-sets, we get

𝔼[B3]=O((kn)kqd)=O(qk2qk22)=O(q2)1/q.\mathbb{E}[B_{3}]=O\left((kn)^{k}q^{-d}\right)=O\left(q^{k^{2}}q^{-k^{2}-2}\right)=O(q^{-2})\leq 1/q. (5)

We combine (3), (4) and (5) as follows. Clearly, 𝔼[B1+B3]=o(1)\mathbb{E}[B_{1}+B_{3}]=o(1), so by Markov’s inequality, both B1B_{1} and B2B_{2} are zero with probability 1o(1)1-o(1). Finally, since B2B_{2} is trivially at most nkn^{k} and 𝔼[B2]nk(2(Dk)!)1\mathbb{E}[B_{2}]\geq n^{k}(2(D^{k})!)^{-1}, it is easily checked that

(B2nk(4(Dk)!)1)(2(Dk)!)1.\mathbb{P}\left(B_{2}\geq n^{k}(4(D^{k})!)^{-1}\right)\geq{(2(D^{k})!)^{-1}}.

By the union bound, we see that GG is a (n,n,k,Dk,Dk/λ,(4(Dk)!)1)(n,n,k,D^{k},D^{k}/\lambda,(4(D^{k})!)^{-1})-panchromatic graph with probability at least (4(Dk)!)1{(4(D^{k})!)^{-1}}, completing the proof. ∎

Next, we give the construction of threshold graphs, once again using random polynomials.

Proof of Theorem 3.4.

As before, let qq be a prime power, and let 𝔽q\mathbb{F}_{q} be the finite field of order qq. We shall assume that kk\in\mathbb{N} is fixed, and that qq is sufficiently large as a function of kk. Let d=(k+1)2+1d=(k+1)^{2}+1 and n=qk+1n=q^{k+1}. We shall construct a threshold graph between two sets AA and BB both of size qk+1q^{k+1}. In the rest of the proof, all asymptotic notation will be in the limit of qq\to\infty.

We construct AA by sampling qk+1q^{k+1} random polynomials from 𝔽q[X1,,Xk+1]d\mathbb{F}_{q}[X_{1},\dotsc,X_{k+1}]_{\leq d} uniformly and independently, set B=𝔽qk+1B=\mathbb{F}_{q}^{k+1}, and define a (random) bipartite graph GG between AA and BB by joining fAf\in A to xBx\in B if f(x)=0f(x)=0. We shall show that GG has the requisite properties with probability 1o(1)1-o(1).

First, we consider the soundness properties of GG. Fix a set UAU\subset A of size k+1k+1. The size of its common neighbourhood N(U)N(U) in GG is distributed as the number of 𝔽q\mathbb{F}_{q}-solutions of k+1k+1 polynomials from 𝔽q[X1,Xk+1]d\mathbb{F}_{q}[X_{1},\dots X_{k+1}]_{\leq d} chosen independently and uniformly at random, so by Theorem 4.3, we have

(|N(U)|>dk+1)=O(qd).\mathbb{P}(|N(U)|>d^{k+1})=O(q^{-d}).

Call a set of k+1k+1 vertices of GG bad if their common neighbourhood has more than dk+1d^{k+1} vertices. The number B1B_{1} of bad (k+1)(k+1)-sets then satisfies

𝔼[B1]=O((nk+1)qd)=O((qk+1k+1)q(k+1)21)=O(q1)=o(1).\mathbb{E}[B_{1}]=O\left(\binom{n}{k+1}q^{-d}\right)=O\left(\binom{q^{k+1}}{k+1}q^{-(k+1)^{2}-1}\right)=O(q^{-1})=o(1). (6)

Next, we turn to the completeness properties of GG. Fix a set UAU\subset A of size kk. For vBv\in B, put I(v)=1I(v)=1 if f(v)=0f(v)=0 for all fUf\in U, and I(v)=0I(v)=0 if f(v)0f(v)\neq 0 for some fUf\in U. For 1md1\leq m\leq d and distinct v1,,vmBv_{1},\dots,v_{m}\in B, we have

(I(v1)I(vm)=1)=fU(f(vj)=0 for all j=1,,m)=qmk,\displaystyle\mathbb{P}\left(I(v_{1})\cdots I(v_{m})=1\right)=\prod_{f\in U}\mathbb{P}\left(f(v_{j})=0\text{ for all }j=1,\dots,m\right)=q^{-mk},

where the first equality is by independence, and the second is by Lemma 4.2. Small moments of the random variable Z=|N(U)|Z=\lvert N(U)\rvert are now easily computed: for 1md1\leq m\leq d, we have

𝔼[Zm]\displaystyle\mathbb{E}\left[Z^{m}\right] =𝔼[(vBI(v))m]\displaystyle=\mathbb{E}\left[\left(\sum_{v\in B}I(v)\right)^{m}\right]
=𝔼[v1,,vmBI(v1)I(vm)]\displaystyle=\mathbb{E}\left[\sum_{v_{1},\dots,v_{m}\in B}I(v_{1})\cdots I(v_{m})\right]
=v1,,vmB𝔼[I(v1)I(vm)]\displaystyle=\sum_{v_{1},\dots,v_{m}\in B}\mathbb{E}[I(v_{1})\cdots I(v_{m})]
=r=1m(qk+1r)Mr,mqrk,\displaystyle=\sum_{r=1}^{m}\binom{q^{k+1}}{r}M_{r,m}q^{-rk}, (7)

where Mr,mM_{r,m} is the number of surjective functions from an mm-element set onto an rr-element set. Combining (5) and some standard identities for the Stirling numbers of the second kind, we get that

𝔼[(Z𝔼[Z])d]=O(q) and 𝔼[Z]=q,\mathbb{E}\left[(Z-\mathbb{E}[Z])^{d}\right]=O(q)\text{ and }\mathbb{E}[Z]=q,

whence it follows that

(Z<q/2)(|Z𝔼[Z]|<q/2)𝔼[(Z𝔼[Z])d](q/2)d=O(q1d).\mathbb{P}(Z<q/2)\leq\mathbb{P}(\lvert Z-\mathbb{E}[Z]\rvert<q/2)\leq\frac{\mathbb{E}\left[(Z-\mathbb{E}[Z])^{d}\right]}{(q/2)^{d}}=O\left(q^{1-d}\right).

Call a set of kk vertices of GG bad if their common neighbourhood has fewer than q/2q/2 vertices. The number B2B_{2} of bad kk-sets then satisfies

𝔼[B2]=O((nk)q1d)=O((qk+1k)q(k+1)2)=O(q1k)=o(1).\mathbb{E}[B_{2}]=O\left(\binom{n}{k}q^{1-d}\right)=O\left(\binom{q^{k+1}}{k}q^{-(k+1)^{2}}\right)=O(q^{-1-k})=o(1). (8)

Combining (6) and (8), we see that

𝔼[B1+B2]=o(1);\mathbb{E}[B_{1}+B_{2}]=o(1);

it follows from Markov’s inequality that B1+B2=0B_{1}+B_{2}=0 (and hence B1=B2=0B_{1}=B_{2}=0) with probability 1o(1)1-o(1), so GG is a (qk+1,qk+1,k,q/2,dk+1,1)(q^{k+1},q^{k+1},k,q/2,d^{k+1},1)-threshold graph with probability 1o(1)1-o(1), completing the proof. ∎

A quantitatively weaker version of Theorem 3.4 can alternately be proved utilising less randomness by building a bipartite graph between two copies of 𝔽qk+1\mathbb{F}_{q}^{k+1} by choosing a single random polynomial ff in 2k+22k+2 variables of degree 2k22k^{2} and joining pairs of points x,y𝔽qk+1x,y\in\mathbb{F}_{q}^{k+1} for which f(x,y)=0f(x,y)=0; however, the analysis of this construction relies on more machinery, and furthermore, yields ineffective parameter dependencies.

6. Conditional Time Lower Bounds for kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection}

In this section we prove the formal versions of Theorems 1.5 and 1.6 in Sections 6.3 and 6.2 respectively. But first, we describe in Section 6.1, the 𝖯𝖦𝖢\mathsf{PGC} framework.

6.1. Panchromatic Graph Composition

Given a panchromatic problem and a panchromatic graph, we would like to compose them in some way such that we obtain a monochromatic version of the panchromatic problem having the property that every optimal solution of the monochromatic version can be traced back to an optimal solution of the panchromatic version. When we say the 𝖯𝖦𝖢\mathsf{PGC} technique, we use it as an umbrella name for this composition operation. Typically the composition would be a product operation as is the case below for the kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} problem.

Theorem 6.1 (Panchromatic Graph Composition).

There is an algorithm that given as input

  1. (1)

    an instance Γ(𝒞1,,𝒞k,c,s)\Gamma(\mathcal{C}_{1},\ldots,\mathcal{C}_{k},c,s) of panchromatic kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} over universe 𝒰\mathcal{U} with monochromatic number zz, and

  2. (2)

    an (n,m,k,t,w,p)-panchromatic graph H(A:=(A1˙˙Ak),B)H(A:=(A_{1}\dot{\cup}\cdots\dot{\cup}A_{k}),B),

then outputs an instance Γ(𝒞,ct,max(st,zw))\Gamma^{\prime}(\mathcal{C}^{\prime},ct,\max(st,zw)) of kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} over universe 𝒰\mathcal{U}^{\prime} such that the following hold:

Size:

|𝒞|=|𝒞1|++|𝒞k||\mathcal{C}^{\prime}|=|\mathcal{C}_{1}|+\cdots+|\mathcal{C}_{k}| and |𝒰|=|𝒰||B||\mathcal{U}^{\prime}|=|\mathcal{U}|\cdot|B|.

Completeness:

If there exists a kk tuple of sets (Si1,,Sik)(S_{i_{1}},\ldots,S_{i_{k}}) in 𝒞1××𝒞k\mathcal{C}_{1}\times\cdots\times\mathcal{C}_{k} such that

|r[k]Sir|c,\left|\underset{{r\in[k]}}{\bigcap}S_{i_{r}}\right|\geq c,

then with probability pp there exists kk sets Si1,,SikS_{i_{1}}^{\prime},\ldots,S_{i_{k}}^{\prime} in 𝒞\mathcal{C}^{\prime} such that

|r[k]Sir|ct.\left|\underset{{r\in[k]}}{\bigcap}S_{i_{r}}^{\prime}\right|\geq ct.
Soundness:

If for every kk tuple of sets (Si1,,Sik)(S_{i_{1}},\ldots,S_{i_{k}}) in 𝒞1××𝒞k\mathcal{C}_{1}\times\cdots\times\mathcal{C}_{k} we have

|r[k]Sir|s,\left|\underset{{r\in[k]}}{\bigcap}S_{i_{r}}\right|\leq s,

then for every kk sets Si1,,SikS_{i_{1}}^{\prime},\ldots,S_{i_{k}}^{\prime} in 𝒞\mathcal{C}^{\prime} we have

|r[k]Sir|max(st,zw).\left|\underset{{r\in[k]}}{\bigcap}S_{i_{r}}^{\prime}\right|\leq\max(st,zw).
Running Time:

The reduction runs in O~(|𝒞||𝒰|)\tilde{O}(|\mathcal{C}^{\prime}|\cdot|\mathcal{U}^{\prime}|) time.

Proof.

We define 𝒰:=𝒰×B\mathcal{U}^{\prime}:=\mathcal{U}\times B. For every r[k]r\in[k], let πr:𝒞rAr\pi_{r}\colon\mathcal{C}_{r}\to A_{r} be a uniformly random one-to-one mapping. Moreover, for every r[k]r\in[k], let ζr:𝒞r2𝒰\zeta_{r}:\mathcal{C}_{r}\to 2^{\mathcal{U}^{\prime}} be a function which maps a set in 𝒞r\mathcal{C}_{r} to a subset of 𝒰\mathcal{U}^{\prime} in 𝒞\mathcal{C}^{\prime} in the following way: For every S𝒞rS\in\mathcal{C}_{r}, we include ζr(S)\zeta_{r}(S) in 𝒞\mathcal{C}^{\prime}, where (u,b)𝒰×B(u,b)\in\mathcal{U}\times B is contained in ζr(S)\zeta_{r}(S) if and only if uSu\in S and (πr(S),b)E(H)(\pi_{r}(S),b)\in E(H).

Let us suppose that there exists a kk tuple of sets (Si1,,Sik)(S_{i_{1}},\ldots,S_{i_{k}}) in 𝒞1××𝒞k\mathcal{C}_{1}\times\cdots\times\mathcal{C}_{k} such that

|r[k]Sir|c,\left|\underset{{r\in[k]}}{\bigcap}S_{i_{r}}\right|\geq c,

then consider the kk-tuple of vertices (π1(Si1),,πk(Sik))(\pi_{1}(S_{i_{1}}),\ldots,\pi_{k}(S_{i_{k}})) in A1××AkA_{1}\times\cdots\times A_{k}. Since π1,,πk\pi_{1},\ldots,\pi_{k} were picked uniformly and independently at random, the aforementioned kk-tuple of vertices in AA are kk uniform random vertices and thus from the completeness of the panchromatic graph, we have that with probability pp there exists a set of tt vertices in BB, denoted by BB^{\prime}, which are all common neighbors of (π1(Si1),,πk(Sik))(\pi_{1}(S_{i_{1}}),\ldots,\pi_{k}(S_{i_{k}})). Let ur[k]Siru\in\underset{{r\in[k]}}{\bigcap}S_{i_{r}} and bBb\in B^{\prime}. It follows that (u,b)ζr(Sir)(u,b)\in\zeta_{r}(S_{i_{r}}). In other words, we have:

|r[k]ζr(Sir)|c|B|ct.\left|\underset{{r\in[k]}}{\bigcap}\zeta_{r}(S_{i_{r}})\right|\geq c\cdot|B^{\prime}|\geq ct.

On the other hand let us suppose that for every kk tuple of sets (Si1,,Sik)(S_{i_{1}},\ldots,S_{i_{k}}) in 𝒞1××𝒞k\mathcal{C}_{1}\times\cdots\times\mathcal{C}_{k} we have

|r[k]Sir|s.\left|\underset{{r\in[k]}}{\bigcap}S_{i_{r}}\right|\leq s.

For the sake of contradiction, let there be kk sets Si1,,SikS_{i_{1}}^{\prime},\ldots,S_{i_{k}}^{\prime} in 𝒞\mathcal{C}^{\prime} such that

|r[k]Sir|>max(st,zw).\left|\underset{{r\in[k]}}{\bigcap}S_{i_{r}}^{\prime}\right|>\max(st,zw).

By construction of 𝒞\mathcal{C}^{\prime}, we have that for every r[k]r\in[k], there exists r[k]\ell_{r}\in[k] and Sir𝒞rS_{i_{r}}\in\mathcal{C}_{\ell_{r}} such that such that ζr(Sir)=Sir\zeta_{\ell_{r}}(S_{i_{r}})=S_{i_{r}}^{\prime}. Let D:={rr[k]}D:=\{\ell_{r}\mid r\in[k]\}. Suppose that |D|=k|D|=k, i.e., for every distinct r1,r2[k]r_{1},r_{2}\in[k] we have that Sir1S_{i_{r_{1}}} and Sir2S_{i_{r_{2}}} are both not in the same collection 𝒞r\mathcal{C}_{r} (for some r[k]r\in[k]). Without loss of generality, we will assume r=r\ell_{r}=r. Consider the kk-tuple of vertices (π1(Si1),,πk(Sik))(\pi_{1}(S_{i_{1}}),\ldots,\pi_{k}(S_{i_{k}})) in A1××AkA_{1}\times\cdots\times A_{k}. From the completeness of the panchromatic graph, we have that the set of common neighbors of (π1(Si1),,πk(Sik))(\pi_{1}(S_{i_{1}}),\ldots,\pi_{k}(S_{i_{k}})) in BB, denoted by BB^{\prime}, is of size at most tt. Thus, we have the following contradiction:

|r[k]Sir||r[k]Sir||B|st.\left|\underset{{r\in[k]}}{\bigcap}S_{i_{r}}^{\prime}\right|\leq\left|\underset{{r\in[k]}}{\bigcap}S_{i_{r}}\right|\cdot|B^{\prime}|\leq st.

Next, we suppose that |D|<k|D|<k. Without loss of generality, we assume that 1=2\ell_{1}=\ell_{2}. Let X:={πr(Sir)r[k]}AX:=\{\pi_{\ell_{r}}(S_{i_{r}})\mid r\in[k]\}\subseteq A. By the soundness of the panchromatic graph, we have that the set of common neighbors of XX in BB, denoted by BB^{\prime} is at most size ww. Thus, we have the following contradiction:

|r[k]Sir||r[k]Sir||B|zw,\left|\underset{{r\in[k]}}{\bigcap}S_{i_{r}}^{\prime}\right|\leq\left|\underset{{r\in[k]}}{\bigcap}S_{i_{r}}\right|\cdot|B^{\prime}|\leq zw,

where zz is the monochromatic number of Γ\Gamma. Finally, from the construction of Γ\Gamma^{\prime}, the claim on the runtime follows immediately. ∎

6.2. 𝖲𝖤𝖳𝖧\mathsf{SETH}-based Time Lower Bound

In this subsection, we prove the following result.

Theorem 6.2.

Let F:F\colon\mathbb{N}\to\mathbb{N} be some computable increasing function. Assuming randomized 𝖲𝖤𝖳𝖧\mathsf{SETH}, for every ε>0\varepsilon>0 and integer k>1k>1, no randomized O(nk(1ε))O(n^{k(1-\varepsilon)})-time algorithm can decide an instance Γ(𝒞,c,c/F(k))\Gamma(\mathcal{C},c,c/F(k)) of kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} over universe [n1+o(1)][n^{1+o(1)}], where |𝒞|=n|\mathcal{C}|=n.

Our proof builds on the following 𝖲𝖤𝖳𝖧\mathsf{SETH} based lower bound for gap kk-MaxCover proved in [46].

Theorem 6.3 ([46]).

Let F:F\colon\mathbb{N}\to\mathbb{N} be some computable increasing function. Assuming 𝖲𝖤𝖳𝖧\mathsf{SETH}, for every ε>0\varepsilon>0 and integer k>1k>1, no randomized O(nk(1ε))O(n^{k(1-\varepsilon)})-time algorithm can decide an instance Γ(G=(V˙W,E),1,1/F(k))\Gamma(G=(V\dot{\cup}W,E),1,1/F(k)) of Unique kk-MaxCover. This holds even in the following setting:

  • V:=V1˙˙VkV:=V_{1}\dot{\cup}\cdots\dot{\cup}V_{k}, where j[k]\forall j\in[k], |Vj|=n|V_{j}|=n.

  • W:=W1˙˙WW:=W_{1}\dot{\cup}\cdots\dot{\cup}W_{\ell}, where =(logn)Ok(1)\ell=(\log n)^{O_{k}(1)} and i[k]\forall i\in[k], |Wi|=Ok,ε(1)|W_{i}|=O_{k,\varepsilon}(1).

Proof Sketch.

The proof of the theorem statement is by contradiction. Suppose there is a randomized O(nk(1ε))O(n^{k(1-\varepsilon)})-time algorithm that can decide every instance Γ(G=(V˙W,E),1,1/F(k))\Gamma(G=(V\dot{\cup}W,E),1,1/F(k)) of kk-MaxCover for some fixed constant ε>0\varepsilon>0 and integer k>1k>1. All the references here are using the labels in [46]. First we apply Proposition 5.1 to Theorem 6.1 with z=log2(F(k))z=\log_{2}(F(k)) to obtain an (m/α,Ok(log2m),Ok,ε(1),1/F(k))(m/\alpha,O_{k}(\log_{2}m),O_{k,\varepsilon}(1),1/F(k))-efficient protocol for kk-player 𝖣𝗂𝗌𝗃m,k\mathsf{Disj}_{m,k} in the SMP model. The proof of the theorem then follows by plugging in the parameters of the protocol to Corollary 5.3. To note that the instance constructed is that of Unique kk-MaxCover, see the remarks in Appendix B. ∎

We now return to the proof of Theorem 6.2.

Proof of Theorem 6.2.

Fix F:F\colon\mathbb{N}\to\mathbb{N}. Suppose there is a randomized O(nk(1ε))O(n^{k(1-\varepsilon)})-time algorithm that can decide every instance Γ(𝒞,c,c/F(k))\Gamma(\mathcal{C},c,c/F(k)) of kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} over universe [n1+o(1)][n^{1+o(1)}] (where |𝒞|=n|\mathcal{C}|=n) for some fixed constant ε>0\varepsilon>0 and integer888The case k=2k=2 can be easily handled here by standard input subdividing tricks used previously in [59, 47]. At the same time the case k=2k=2 was already proved in [47]. k>2k>2. We claim that the algorithm can be used to solve every hard instance Γ(G=(V˙W,E),1,1/F(k))\Gamma^{\prime}(G=(V\dot{\cup}W,E),1,1/F(k)) of kk-MaxCover, as given in Theorem 6.3, in time O(nk(1ε))O(n^{k(1-\varepsilon)}) where

  • V:=V1˙˙VkV:=V_{1}\dot{\cup}\cdots\dot{\cup}V_{k}, where j[k]\forall j\in[k], |Vj|=n|V_{j}|=n.

  • W:=W1˙˙WW:=W_{1}\dot{\cup}\cdots\dot{\cup}W_{\ell}, where =(logn)Ok(1)\ell=(\log n)^{O_{k}(1)} and i[k]\forall i\in[k], |Wi|=Ok,ε(1)|W_{i}|=O_{k,\varepsilon}(1).

This would then contradict Theorem 6.3.

Fix Γ(G=(V˙W,E),1,1/F(k))\Gamma^{\prime}(G=(V\dot{\cup}W,E),1,1/F(k)). By applying Proposition 2.3 to Γ\Gamma^{\prime} we obtain an instance Γ′′(𝒞1,,𝒞k,,/F(k))\Gamma^{\prime\prime}(\mathcal{C}_{1},\ldots,\mathcal{C}_{k},\ell,\ell/F(k)) of panchromatic kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} over universe of size Oε((logn)Ok(1))O_{\varepsilon}((\log n)^{O_{k}(1)}) with monochromatic number also bounded above by ck,εc_{k,\varepsilon}\cdot\ell for some constant ck,εc_{k,\varepsilon} depending only on kk and ε\varepsilon.

Let m:=nm:=\sqrt{n}. In Theorem 3.3, let ii^{*}\in\mathbb{N} be such that mni2kmm\leq n_{i^{*}}\leq 2^{k}\cdot m. We sample w:=Ω~(4(Dk)!)w:=\widetilde{\Omega}(4(D^{k})!) many graphs G1,,GwG_{1},\ldots,G_{w} from 𝒟k,ckF(k),ni\mathcal{D}_{k,c_{k}\cdot F(k),n_{i^{*}}} in time Ok(n)O_{k}(n). By Theorem 3.3, we know that one of these graphs is a (ni,ni,k,Dk,Dk/(ckF(k)),(4(Dk)!)1)(n_{i^{*}},n_{i^{*}},k,D^{k},D^{k}/(c_{k}\cdot F(k)),(4(D^{k})!)^{-1})-panchromatic graph with high probability and we find it in time wnik+1=Ok(nk2+1)w\cdot n_{i^{*}}^{k+1}=O_{k}(n^{\frac{k}{2}+1}). Let GG^{*} be one of the sampled graphs which is a (ni,ni,k,Dk,Dk/(ckF(k)),(4(Dk)!)1)(n_{i^{*}},n_{i^{*}},k,D^{k},D^{k}/(c_{k}\cdot F(k)),(4(D^{k})!)^{-1})-panchromatic graph. We randomly delete nimn_{i^{*}}-m many vertices in each colour class of GG^{*} to obtain a (m,ni,k,Dk,Dk/(ckF(k)),(4(Dk)!)1)(m,n_{i^{*}},k,D^{k},D^{k}/(c_{k}\cdot F(k)),(4(D^{k})!)^{-1})-panchromatic graph.

For every i[k]i\in[k], arbitrarily equipartition 𝒞i\mathcal{C}_{i} into 𝒞i1,,𝒞im\mathcal{C}_{i}^{1},\ldots,\mathcal{C}_{i}^{m}. Given Γ′′(𝒞1,,𝒞k,,/F(k))\Gamma^{\prime\prime}(\mathcal{C}_{1},\ldots,\mathcal{C}_{k},\ell,\ell/F(k)) we show how to construct nk/2n^{k/2} instances

{Γ(t1,,tk)(𝒞,c,c/F(k))}(t1,,tk)[m]k,\{\Gamma_{(t_{1},\ldots,t_{k})}(\mathcal{C},c,c/F(k))\}_{(t_{1},\ldots,t_{k})\in[m]^{k}},

of kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} over universe [n12+o(1)][n^{\frac{1}{2}+o(1)}] (where |𝒞|=mk|\mathcal{C}|=mk). For every (t1,,tk)[m]k{(t_{1},\ldots,t_{k})}\in[m]^{k}, define an instance Γ(t1,,tk)′′(𝒞1t1,,𝒞ktk,,/F(k))\Gamma^{\prime\prime}_{(t_{1},\ldots,t_{k})}(\mathcal{C}_{1}^{t_{1}},\ldots,\mathcal{C}_{k}^{t_{k}},\ell,\ell/F(k)) of panchromatic kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} over universe of size Oε((logn)Ok(1))O_{\varepsilon}((\log n)^{O_{k}(1)}) with monochromatic number also bounded above by ck,εc_{k,\varepsilon}\cdot\ell.

Fix (t1,,tk)[m]k{(t_{1},\ldots,t_{k})}\in[m]^{k}. We apply Theorem 6.1 to Γ(t1,,tk)′′\Gamma^{\prime\prime}_{{(t_{1},\ldots,t_{k})}} by using GG^{*}. We thus obtain an instance Γ(t1,,tk)(𝒞,c:=Dk,max((/F(k))Dk,Dk/F(k))\Gamma_{(t_{1},\ldots,t_{k})}(\mathcal{C},c:=\ell\cdot D^{k},\max((\ell/F(k))\cdot D^{k},\ell\cdot D^{k}/F(k)) of kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} over universe 𝒰\mathcal{U} in time O~(n1+o(1))\tilde{O}(n^{1+o(1)}) where |𝒰|=m(logn)Ok(1)|\mathcal{U}|=m\cdot(\log n)^{O_{k}(1)}. Also note that |𝒞|=mk|\mathcal{C}|=mk.

Thus, if Γ\Gamma^{\prime} was in the completeness case then there exists (t1,,tk)[m]k{(t_{1},\ldots,t_{k})}\in[m]^{k} such that Γ(t1,,tk)′′\Gamma^{\prime\prime}_{(t_{1},\ldots,t_{k})} is also in the completeness case, and consequently, Γ(t1,,tk)\Gamma_{(t_{1},\ldots,t_{k})} is in the completeness case. On the other hand, if Γ\Gamma^{\prime} was in the soundness case then for every (t1,,tk)[m]k{(t_{1},\ldots,t_{k})}\in[m]^{k} we have that Γ(t1,,tk)′′\Gamma^{\prime\prime}_{(t_{1},\ldots,t_{k})} is also in the soundness case, and consequently, Γ(t1,,tk)\Gamma_{(t_{1},\ldots,t_{k})} is in the soundness case too. The total runtime of the algorithm would be nk/2(nk(1ε)/2+n1+o(1))+nk2+1=O(nk(1ε2))n^{k/2}\cdot\left(n^{k(1-\varepsilon)/2}+n^{1+o(1)}\right)+n^{\frac{k}{2}+1}=O(n^{k(1-\frac{\varepsilon}{2})}). ∎

6.3. 𝖤𝖳𝖧\mathsf{ETH}-based Time Lower Bound

In this subsection, we prove the following result.

Theorem 6.4.

Let F:F\colon\mathbb{N}\to\mathbb{N} be some computable increasing function. Assuming randomized 𝖤𝖳𝖧\mathsf{ETH}, for sufficiently large integer kk, no randomized no(k)n^{o(k)}-time algorithm can decide an instance Γ(𝒞,c,c/F(k))\Gamma(\mathcal{C},c,c/F(k)) of kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} over universe [n1+o(1)][n^{1+o(1)}], where |𝒞|=n|\mathcal{C}|=n.

Our proof builds on the following 𝖤𝖳𝖧\mathsf{ETH} based lower bound for gap kk-MaxCover proved in [46].

Theorem 6.5 ([46]).

Let F:F\colon\mathbb{N}\to\mathbb{N} be some computable increasing function. Assuming 𝖤𝖳𝖧\mathsf{ETH}, for sufficiently large integer kk, no randomized no(k)n^{o(k)}-time algorithm can decide an instance Γ(G=(V˙W,E),1,1/F(k))\Gamma(G=(V\dot{\cup}W,E),1,1/F(k)) of Unique kk-MaxCover. This holds even in the following setting:

  • V:=V1˙˙VkV:=V_{1}\dot{\cup}\cdots\dot{\cup}V_{k}, where j[k]\forall j\in[k], |Vj|=n|V_{j}|=n.

  • W:=W1˙˙WW:=W_{1}\dot{\cup}\cdots\dot{\cup}W_{\ell}, where =(logn)Ok(1)\ell=(\log n)^{O_{k}(1)} and i[k]\forall i\in[k], |Wi|=Ok(1)|W_{i}|=O_{k}(1).

Proof Sketch.

Suppose there is a randomized no(k)n^{o(k)}-time algorithm that can decide every instance Γ(G=(V˙W,E),1,1/F(k))\Gamma(G=(V\dot{\cup}W,E),1,1/F(k)) of kk-MaxCover for every kk\in\mathbb{N}. All the references here are using the labels in [46]. First we apply Proposition 5.1 to Theorem 7.1 with z=(log211δ)log2(F(k))z=\left(\log_{2}\frac{-1}{1-\delta}\right)\log_{2}(F(k)) to obtain a (0,Ok(log2m),Ok(t),1/F(k))(0,O_{k}(\log_{2}m),O_{k}(t),1/F(k))-efficient protocol for kk-player 𝖬𝗎𝗅𝗍𝖤𝗊m,k,t\mathsf{MultEq}_{m,k,t} in the SMP model. The proof of the theorem then follows by plugging in the parameters of the protocol to Corollary 5.4. To note that the instance constructed is that of Unique kk-MaxCover, see the remarks in Appendix B. ∎

We now return to the proof of Theorem 6.4.

Proof of Theorem 6.4.

Fix F:F\colon\mathbb{N}\to\mathbb{N}. Suppose there is a randomized no(k)n^{o(k)}-time algorithm that can decide every instance Γ(𝒞,c,c/F(k))\Gamma(\mathcal{C},c,c/F(k)) of kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} over universe [n1+o(1)][n^{1+o(1)}] (where |𝒞|=n|\mathcal{C}|=n) for every kk\in\mathbb{N}. Notice that such an algorithm can also be used to device a search that finds a witness in the YES case by making nknk calls to the decision algorithm.

We claim that then this search algorithm can be used to solve (with high probability) every instance Γ(G=(V˙W,E),1,1/F(k))\Gamma^{\prime}(G=(V\dot{\cup}W,E),1,1/F(k)) of kk-MaxCover in time O(no(k))O(n^{o(k)}) where

  • V:=V1˙˙VkV:=V_{1}\dot{\cup}\cdots\dot{\cup}V_{k}, where j[k]\forall j\in[k], |Vj|=n|V_{j}|=n.

  • W:=W1˙˙WW:=W_{1}\dot{\cup}\cdots\dot{\cup}W_{\ell}, where =(logn)Ok(1)\ell=(\log n)^{O_{k}(1)} and i[k]\forall i\in[k], |Wi|=Ok(1)|W_{i}|=O_{k}(1).

This would then contradict Theorem 6.5.

Fix Γ(G=(V˙W,E),1,1/F(k))\Gamma^{\prime}(G=(V\dot{\cup}W,E),1,1/F(k)). By applying Proposition 2.3 to Γ\Gamma^{\prime} we obtain an instance Γ′′(𝒞1,,𝒞k,,/F(k))\Gamma^{\prime\prime}(\mathcal{C}_{1},\ldots,\mathcal{C}_{k},\ell,\ell/F(k)) of panchromatic kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} over universe of size (logn)Ok(1)(\log n)^{O_{k}(1)} with monochromatic number also bounded above by ckc_{k}\cdot\ell, for some constant ckc_{k} only depending on kk.

In Theorem 3.3, let ii^{*}\in\mathbb{N} such that nni2knn\leq n_{i^{*}}\leq 2^{k}\cdot n. We sample w:=Ω~(4(Dk)!)w:=\widetilde{\Omega}(4(D^{k})!) many graphs G1,,GwG_{1},\ldots,G_{w} from 𝒟k,ckF(k),ni\mathcal{D}_{k,c_{k}\cdot F(k),n_{i^{*}}} in time Ok(n2)O_{k}(n^{2}). By Theorem 3.3, we know that one of these graphs is a (ni,ni,k,Dk,Dk/(ckF(k)),(4(Dk)!)1)(n_{i^{*}},n_{i^{*}},k,D^{k},D^{k}/(c_{k}\cdot F(k)),(4(D^{k})!)^{-1})-panchromatic graph with high probability. Next, in each of these ww many graphs, we randomly delete ninn_{i^{*}}-n vertices in each colour class. Note that in every (ni,ni,k,Dk,Dk/(ckF(k)),(4(Dk)!)1)(n_{i^{*}},n_{i^{*}},k,D^{k},D^{k}/(c_{k}\cdot F(k)),(4(D^{k})!)^{-1})-panchromatic graph if we randomly delete ninn_{i^{*}}-n vertices in each colour class then we obtain a (n,ni,k,Dk,Dk/(ckF(k)),(4(Dk)!)1)(n,n_{i^{*}},k,D^{k},D^{k}/(c_{k}\cdot F(k)),(4(D^{k})!)^{-1})-panchromatic graph.

Let i[w]i\in[w]. For each GiG_{i} we apply Theorem 6.1 to Γ′′\Gamma^{\prime\prime} by using GiG_{i}. If GiG_{i} is a (n,ni,k,Dk,Dk/(ckF(k)),(4(Dk)!)1)(n,n_{i^{*}},k,D^{k},D^{k}/(c_{k}\cdot F(k)),(4(D^{k})!)^{-1})-panchromatic graph then we obtain an instance Γ(𝒞,c:=Dk,max((/F(k))Dk,Dk/F(k))\Gamma(\mathcal{C},c:=\ell\cdot D^{k},\max((\ell/F(k))\cdot D^{k},\ell\cdot D^{k}/F(k)) of kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} over universe 𝒰\mathcal{U} in time O(n2+o(1))O(n^{2+o(1)}) where |𝒰|=n(logn)Ok(1)|\mathcal{U}|=n\cdot(\log n)^{O_{k}(1)}. Also note that |𝒞|=nk|\mathcal{C}|=nk.

On the other hand, if GiG_{i} was not a (n,ni,k,Dk,Dk/(ckF(k)),(4(Dk)!)1)(n,n_{i^{*}},k,D^{k},D^{k}/(c_{k}\cdot F(k)),(4(D^{k})!)^{-1})-panchromatic graph then we still obtain some instance of kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} and the search algorithm would then output a witness if we are in the YES case of kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection}, which would not yield any meaningful solution to Γ\Gamma^{\prime}, and so we can discard it. ∎

7. Open Problems

In this section, we highlight a few open problems.

Closest Pair

In [47], the authors constructed two kinds of panchromatic graphs999See footnote 3.. First they constructed (n,m:=polylog(n),2,t:=mΩ(1),t/logn,1/no(1))(n,m:=\text{polylog}(n),2,t:=m^{\Omega(1)},t/\log n,1/n^{o(1)})-panchromatic graphs by using the density and distance properties of low degree univariate polynomials. They also constructed (n,Θ(logn),2,t:=Ω(logn),t(1ε),1/n)(n,\Theta(\log n),2,t:=\Omega(\log n),t(1-\varepsilon),1/\sqrt{n})-panchromatic graphs (for some small constant ε>0\varepsilon>0) by using the density and distance properties of algebraic-geometric codes. The latter was used to prove conditional hardness of approximation results for the closest pair problem, where we are a set of nn points in d\mathbb{R}^{d} and we would like the closest pair of points in the p\ell_{p}-metric. Using the latter panchromatic graph, the authors showed that assuming 𝖲𝖤𝖳𝖧\mathsf{SETH}, no algorithm running in n1.5δ(ε)n^{1.5-\delta(\varepsilon)} time can approximate the closest pair problem to (1+ε)(1+\varepsilon)-factor. If there existed a (n,m:=no(1),2,t:=Ω(m),t(1ε),1/no(1))(n,m:=n^{o(1)},2,t:=\Omega(m),t(1-\varepsilon),1/n^{o(1)})-panchromatic graph then it could prove the subquadratic time inapproximability result for the closest pair problem101010Both the panchromatic graphs constructed in [47] have the additional important property that they are biregular which is needed for proving lower bounds for the closest pair problem..

Hardness of kk-𝖬𝗂𝗇𝖢𝗈𝗏𝖾𝗋𝖺𝗀𝖾\mathsf{MinCoverage}.

In Theorem 6.4 we obtain tight running time lower bound for kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} under 𝖤𝖳𝖧\mathsf{ETH} but our inapproximability factor is weaker than the one ruled out by Lin [51]. In Appendix A we show a gap creating reduction for kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} which starts from an instance of kk-𝖬𝗂𝗇𝖢𝗈𝗏𝖾𝗋𝖺𝗀𝖾\mathsf{MinCoverage} and reduces it to gap kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} matching the inapproximability factors of [51]. Also, a tight running time lower bound is known for exact panchromatic kk-𝖬𝗂𝗇𝖢𝗈𝗏𝖾𝗋𝖺𝗀𝖾\mathsf{MinCoverage} under 𝖤𝖳𝖧\mathsf{ETH} [49]. Is it possible to tweak our 𝖯𝖦𝖢\mathsf{PGC} technique and use our construction of panchromatic graphs or design new panchromatic graphs or both, in order to reduce panchromatic kk-𝖬𝗂𝗇𝖢𝗈𝗏𝖾𝗋𝖺𝗀𝖾\mathsf{MinCoverage} to kk-𝖬𝗂𝗇𝖢𝗈𝗏𝖾𝗋𝖺𝗀𝖾\mathsf{MinCoverage}? If yes, then we could obtain a tight running time lower bound for kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} under 𝖤𝖳𝖧\mathsf{ETH} with inapproximability factors matching [51].

Biclique

Using a more intricate composition technique and weaker objects than our threshold graphs, Lin [51] showed that kk-Biclique problem is W[1]-hard; in the kk-Biclique problem, we are given as input a balanced bipartite graph on nn vertices and the goal is to determine if it contains a Kk,kK_{k,k}. Lin further showed that under 𝖤𝖳𝖧\mathsf{ETH}, no no(k)n^{o(\sqrt{k})} time algorithm can decide kk-Biclique. However, if (n,n,k,t:=O(k)),t1,1/n)(n,n,k,t:=O(k)),t-1,1/n)-threshold graphs exist then we could obtain the tight time lower bound for kk-Biclique under 𝖤𝖳𝖧\mathsf{ETH}. Do such threshold graphs exist?

Derandomization

In this paper, we provide distributions from which we can efficiently sample panchromatic and threshold graphs. A natural derandomization question is to ask for explicit panchromatic and threshold graphs.

Other Applications of Our Threshold Graphs

Norm-graphs have various applications in theoretical computer science such as proving lower bounds for span-programs [12, 34], rectifier networks [44], circuit lower bounds [42], and so on. But in each of these cases our threshold graph match the lower bound obtained by using norm-graphs. Is there an application in TCS where the stronger completeness property of threshold graphs comes in handy? Also, somewhat speculatively, can our construction of (adjacency) matrices yield (semi-explicit) rigid matrices? If yes, this would be an excellent followup to [37].

Other Applications of Our Panchromatic Graphs

Our Panchromatic Graph Composition technique might be relevant with appropriate modifications to resolve various important complexity theoretic questions, such as the dichotomy conjecture of [36] whose coloured variant was shown in [21].

Acknowledgements

Boris Bukh was supported in part by U.S. taxpayers through NSF CAREER grant DMS-1555149. Karthik C. S. was financially supported by Subhash Khot’s Simons Investigator Award and by a grant from the Simons Foundation, Grant Number 825876, Awardee Thu D. Nguyen. Bhargav Narayanan was supported by NSF grants CCF-1814409 and DMS-1800521.

References

  • ABV [01] Alexei E. Ashikhmin, Alexander Barg, and Serge G. Vladut. Linear codes with exponentially many light vectors. J. Comb. Theory, Ser. A, 96(2):396–399, 2001.
  • AGHP [92] Noga Alon, Oded Goldreich, Johan Håstad, and René Peralta. Simple construction of almost k-wise independent random variables. Random Struct. Algorithms, 3(3):289–304, 1992.
  • AHWW [16] Amir Abboud, Thomas Dueholm Hansen, Virginia Vassilevska Williams, and Ryan Williams. Simulating branching programs with edit distance and friends: or: a polylog shaved is a lower bound made. In Daniel Wichs and Yishay Mansour, editors, Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2016, Cambridge, MA, USA, June 18-21, 2016, pages 375–388. ACM, 2016.
  • Alo [03] N. Alon. Problems and results in extremal combinatorics–I. Discret. Math., 273:31–53, 2003.
  • Alo [08] N. Alon. Problems and results in extremal combinatorics – II. Discret. Math., 308:4460–4472, 2008.
  • Alo [16] N. Alon. Problems and results in extremal combinatorics–III. Journal of Combinatorics, 7:233–256, 2016.
  • Alo [20] N. Alon. Problems and results in extremal combinatorics – IV, 2020.
  • AW [15] Josh Alman and Ryan Williams. Probabilistic polynomials and hamming nearest neighbors. In Venkatesan Guruswami, editor, IEEE 56th Annual Symposium on Foundations of Computer Science, FOCS 2015, Berkeley, CA, USA, 17-20 October, 2015, pages 136–150. IEEE Computer Society, 2015.
  • AYZ [95] Noga Alon, Raphael Yuster, and Uri Zwick. Color-coding. Journal of the ACM (JACM), 42(4):844–856, 1995.
  • BBE+ [21] Arnab Bhattacharyya, Édouard Bonnet, László Egri, Suprovat Ghoshal, Karthik C. S., Bingkai Lin, Pasin Manurangsi, and Dániel Marx. Parameterized intractability of even set and shortest vector problem. J. ACM, 68(3), March 2021.
  • BC [18] B. Bukh and D. Conlon. Rational exponents in extremal graph theory. J. Eur. Math. Soc. (JEMS), 20:1747–1757, 2018.
  • BGK+ [96] László Babai, Anna Gál, János Kollár, Lajos Rónyai, Tibor Szabó, and Avi Wigderson. Extremal bipartite graphs and superpolynomial lower bounds for monotone span programs. In Gary L. Miller, editor, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, Philadelphia, Pennsylvania, USA, May 22-24, 1996, pages 603–611. ACM, 1996.
  • BI [18] Arturs Backurs and Piotr Indyk. Edit distance cannot be computed in strongly subquadratic time (unless SETH is false). SIAM J. Comput., 47(3):1087–1097, 2018.
  • BT [12] B. Bukh and J. Tsimerman. Sum-product estimates for rational functions. Proc. Lond. Math. Soc., 104:1–26, 2012.
  • Buk [15] B. Bukh. Random algebraic construction of extremal graphs. Bull. Lond. Math. Soc., 47:939–945, 2015.
  • Buk [21] Boris Bukh. Extremal graphs without exponentially-small bicliques, 2021.
  • CCK+ [20] Parinya Chalermsook, Marek Cygan, Guy Kortsarz, Bundit Laekhanukit, Pasin Manurangsi, Danupon Nanongkai, and Luca Trevisan. From gap-ETH to FPT-inapproximability: Clique, dominating set, and more. SIAM J. Comput., 49(4):772–810, 2020.
  • CFK+ [15] Marek Cygan, Fedor V. Fomin, Lukasz Kowalik, Daniel Lokshtanov, Dániel Marx, Marcin Pilipczuk, Michal Pilipczuk, and Saket Saurabh. Parameterized Algorithms. Springer, 2015.
  • CFL [83] Ashok K. Chandra, Merrick L. Furst, and Richard J. Lipton. Multi-party protocols. In David S. Johnson, Ronald Fagin, Michael L. Fredman, David Harel, Richard M. Karp, Nancy A. Lynch, Christos H. Papadimitriou, Ronald L. Rivest, Walter L. Ruzzo, and Joel I. Seiferas, editors, Proceedings of the 15th Annual ACM Symposium on Theory of Computing, 25-27 April, 1983, Boston, Massachusetts, USA, pages 94–99. ACM, 1983.
  • CGI+ [16] Marco L. Carmosino, Jiawei Gao, Russell Impagliazzo, Ivan Mihajlin, Ramamohan Paturi, and Stefan Schneider. Nondeterministic extensions of the strong exponential time hypothesis and consequences for non-reducibility. In Madhu Sudan, editor, Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, Cambridge, MA, USA, January 14-16, 2016, pages 261–270. ACM, 2016.
  • CGL [17] Yijia Chen, Martin Grohe, and Bingkai Lin. The hardness of embedding grids and walls. In Hans L. Bodlaender and Gerhard J. Woeginger, editors, Graph-Theoretic Concepts in Computer Science - 43rd International Workshop, WG 2017, Eindhoven, The Netherlands, June 21-23, 2017, Revised Selected Papers, volume 10520 of Lecture Notes in Computer Science, pages 180–192. Springer, 2017.
  • CL [19] Yijia Chen and Bingkai Lin. The constant inapproximability of the parameterized dominating set problem. SIAM J. Comput., 48(2):513–533, 2019.
  • Coh [16] Gil Cohen. Two-source dispersers for polylogarithmic entropy and improved ramsey graphs. In Daniel Wichs and Yishay Mansour, editors, Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2016, Cambridge, MA, USA, June 18-21, 2016, pages 278–284. ACM, 2016.
  • Con [21] David Conlon. Some remarks on the Zarankiewicz problem, 2021.
  • Coo [70] Stephen A. Cook. Alan cobham. the intrinsic computational difficulty of functions. logic, methodology and philosophy of science, proceedings of the 1964 international congress, edited by yehoshua bar-hillel, studies in logic and the foundations of mathematics, north-holland publishing company, amsterdam 1965, pp. 24–30. Journal of Symbolic Logic, 34(4):657–657, 1970.
  • CP [11] Raphaël Clifford and Alexandru Popa. Maximum subset intersection. Inf. Process. Lett., 111(7):323–325, 2011.
  • CZ [19] Eshan Chattopadhyay and David Zuckerman. Explicit two-source extractors and resilient functions. Annals of Mathematics, 189(3):653–705, 2019.
  • DF [13] Rodney G. Downey and Michael R. Fellows. Fundamentals of Parameterized Complexity. Texts in Computer Science. Springer, 2013.
  • Din [16] Irit Dinur. Mildly exponential reduction from gap 3sat to polynomial-gap label-cover. Electronic Colloquium on Computational Complexity (ECCC), 23:128, 2016.
  • DKL [19] Roee David, Karthik C. S., and Bundit Laekhanukit. On the complexity of closest pair via polar-pair of point-sets. SIAM J. Discret. Math., 33(1):509–527, 2019.
  • Edm [65] Jack Edmonds. Paths, trees, and flowers. Canadian Journal of Mathematics, 17:449–467, 1965.
  • FKLM [20] Andreas Emil Feldmann, Karthik C. S., Euiwoong Lee, and Pasin Manurangsi. A survey on approximation in parameterized complexity: Hardness and algorithms. Algorithms, 13(6):146, 2020.
  • Ful [84] W. Fulton. Introduction to intersection theory in algebraic geometry, volume 54 of CBMS Regional Conference Series in Mathematics. American Mathematical Society, Providence, RI, 1984.
  • Gál [01] Anna Gál. A characterization of span program size and improved lower bounds for monotone span programs. Comput. Complex., 10(4):277–296, 2001.
  • GKR [16] Anat Ganor, Gillat Kol, and Ran Raz. Exponential separation of information and communication for boolean functions. J. ACM, 63(5):46:1–46:31, 2016.
  • Gro [07] Martin Grohe. The complexity of homomorphism and constraint satisfaction problems seen from the other side. J. ACM, 54(1):1:1–1:24, 2007.
  • GT [18] Oded Goldreich and Avishay Tal. Matrix rigidity of random toeplitz matrices. Comput. Complex., 27(2):305–350, 2018.
  • GUV [09] Venkatesan Guruswami, Christopher Umans, and Salil P. Vadhan. Unbalanced expanders and randomness extractors from parvaresh-vardy codes. J. ACM, 56(4):20:1–20:34, 2009.
  • IP [01] Russell Impagliazzo and Ramamohan Paturi. On the complexity of k-SAT. J. Comput. Syst. Sci., 62(2):367–375, 2001.
  • IPZ [01] Russell Impagliazzo, Ramamohan Paturi, and Francis Zane. Which problems have strongly exponential complexity? J. Comput. Syst. Sci., 63(4):512–530, 2001.
  • Joh [90] D. S. Johnson. Handbook of theoretical computer science. volume A (Algorithms and Complexity), chapter 2, A catalog of complexity classes, pages 67–161. Elseveir, 1990.
  • JS [13] Stasys Jukna and Igor Sergeev. Complexity of linear boolean operators. Found. Trends Theor. Comput. Sci., 9(1):1–123, 2013.
  • Juk [11] Stasys Jukna. Extremal Combinatorics - With Applications in Computer Science. Texts in Theoretical Computer Science. An EATCS Series. Springer, 2011.
  • Juk [13] Stasys Jukna. Computational complexity of graphs. In Advances in Network Complexity, 2013.
  • Kho [06] Subhash Khot. Ruling out PTAS for graph min-bisection, dense k-subgraph, and bipartite clique. SIAM J. Comput., 36(4):1025–1071, 2006.
  • KLM [19] Karthik C. S., B. Laekhanukit, and P. Manurangsi. On the parameterized complexity of approximating dominating set. J. ACM, 66:33:1–33:38, 2019.
  • KM [20] Karthik C. S. and P. Manurangsi. On closest pair in Euclidean metric: monochromatic is as hard as bichromatic. Combinatorica, 40:539–573, 2020.
  • KN [97] Eyal Kushilevitz and Noam Nisan. Communication Complexity. Cambridge University Press, New York, NY, USA, 1997.
  • KN [21] Karthik C. S. and Inbal Livni Navon. On hardness of approximation of parameterized set cover and label cover: Threshold graphs from error correcting codes. In Hung Viet Le and Valerie King, editors, 4th Symposium on Simplicity in Algorithms, SOSA 2021, Virtual Conference, January 11-12, 2021, pages 210–223. SIAM, 2021.
  • KRS [96] János Kollár, Lajos Rónyai, and Tibor Szabó. Norm-graphs and bipartite turán numbers. Comb., 16(3):399–406, 1996.
  • Lin [18] B. Lin. The parameterized complexity of the kk-biclique problem. J. ACM, 65:34:1–34:23, 2018.
  • Lin [19] Bingkai Lin. A simple gap-producing reduction for the parameterized set cover problem. In Christel Baier, Ioannis Chatzigiannakis, Paola Flocchini, and Stefano Leonardi, editors, 46th International Colloquium on Automata, Languages, and Programming, ICALP 2019, July 9-12, 2019, Patras, Greece, volume 132 of LIPIcs, pages 81:1–81:15. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2019.
  • LRSZ [20] Daniel Lokshtanov, M. S. Ramanujan, Saket Saurabh, and Meirav Zehavi. Parameterized complexity and approximability of directed odd cycle transversal. In Proceedings of the 2020 ACM-SIAM Symposium on Discrete Algorithms, SODA 2020, Salt Lake City, UT, USA, January 5-8, 2020, pages 2181–2200, 2020.
  • LW [54] S. Lang and A. Weil. Number of points of varieties in finite fields. Amer. J. Math., 76:819–827, 1954.
  • Mat [97] J. Matoušek. On discrepancy bounds via dual shatter function. Mathematika, 44:42–49, 1997.
  • MG [02] Daniele Micciancio and Shafi Goldwasser. Complexity of lattice problems - a cryptograhic perspective, volume 671 of The Kluwer international series in engineering and computer science. Springer, 2002.
  • MR [16] Pasin Manurangsi and Prasad Raghavendra. A birthday repetition theorem and complexity of approximating dense csps. CoRR, abs/1607.02986, 2016.
  • NSS [95] Moni Naor, Leonard J. Schulman, and Aravind Srinivasan. Splitters and near-optimal derandomization. In 36th Annual Symposium on Foundations of Computer Science, Milwaukee, Wisconsin, USA, 23-25 October 1995, pages 182–191. IEEE Computer Society, 1995.
  • Rub [18] Aviad Rubinstein. Hardness of approximate nearest neighbor search. In Ilias Diakonikolas, David Kempe, and Monika Henzinger, editors, Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2018, Los Angeles, CA, USA, June 25-29, 2018, pages 1260–1268. ACM, 2018.
  • RW [19] Aviad Rubinstein and Virginia Vassilevska Williams. SETH vs approximation. SIGACT News, 50(4):57–76, 2019.
  • Sch [76] Wolfgang M. Schmidt. Equations over finite fields. An elementary approach. Lecture Notes in Mathematics, Vol. 536. Springer-Verlag, Berlin-New York, 1976.
  • Sha [77] I. R. Shafarevich. Basic algebraic geometry. Springer-Verlag, Berlin-New York, 1977.
  • Spi [96] Daniel A. Spielman. Linear-time encodable and decodable error-correcting codes. IEEE Trans. Inf. Theory, 42(6):1723–1731, 1996.
  • Tov [84] Craig A. Tovey. A simplified NP-complete satisfiability problem. Discrete Applied Mathematics, 8(1):85–89, 1984.
  • WW [18] Virginia Vassilevska Williams and R. Ryan Williams. Subcubic equivalences between path, matrix, and triangle problems. J. ACM, 65(5):27:1–27:38, 2018.
  • Xav [12] Eduardo C. Xavier. A note on a maximum k-subset intersection problem. Inf. Process. Lett., 112(12):471–472, 2012.

Appendix A From exact k-MinCoverage to gap k-SetIntersection via TGC technique

In this section, we generalize a gap creation technique first appearing in [51].

Theorem A.1 (Generalization of Lin’s Gap Creation technique from [51]).

There is an algorithm that given as input

  1. (1)

    an instance Γ(𝒞,c,s)\Gamma(\mathcal{C},c,s) of kk-𝖬𝗂𝗇𝖢𝗈𝗏𝖾𝗋𝖺𝗀𝖾\mathsf{MinCoverage} over universe [n][n], and

  2. (2)

    an (n,m,c,t,r,1)-threshold graph H(A,B)H(A,B), with |A|=n|A|=n and |B|m|B|\leq m,

then outputs an instance Γ(𝒞,t,r)\Gamma^{\prime}(\mathcal{C}^{\prime},t,r) of kk-𝖲𝖾𝗍𝖨𝗇𝗍𝖾𝗋𝗌𝖾𝖼𝗍𝗂𝗈𝗇\mathsf{SetIntersection} over universe 𝒰\mathcal{U} such that the following hold:

Size:

|𝒞|=|𝒞||\mathcal{C}^{\prime}|=|\mathcal{C}| and |𝒰|=|B||\mathcal{U}|=|B|.

Completeness:

If there exists kk sets Si1,,SikS_{i_{1}},\ldots,S_{i_{k}} in 𝒞\mathcal{C} such that

|r[k]Sir|c,\left|\underset{{r\in[k]}}{\bigcup}S_{i_{r}}\right|\leq c,

then there exists kk sets Si1,,SikS_{i_{1}}^{\prime},\ldots,S_{i_{k}}^{\prime} in 𝒞\mathcal{C}^{\prime} such that

|r[k]Sir|t,\left|\underset{{r\in[k]}}{\bigcap}S_{i_{r}}^{\prime}\right|\geq t,
Soundness:

If for every kk sets Si1,,SikS_{i_{1}},\ldots,S_{i_{k}} in 𝒞\mathcal{C} we have

|r[k]Sir|s,\left|\underset{{r\in[k]}}{\bigcup}S_{i_{r}}\right|\geq s,

then for every kk sets Si1,,SikS_{i_{1}}^{\prime},\ldots,S_{i_{k}}^{\prime} in 𝒞\mathcal{C}^{\prime} we have

|r[k]Sir|r,\left|\underset{{r\in[k]}}{\bigcap}S_{i_{r}}^{\prime}\right|\leq r,
Running Time:

The reduction runs in O~(n2m)\tilde{O}(n^{2}m) time.

Proof.

We need to first define the edge set EE of the output bipartite graph GG. Let σ:𝒞𝒞\sigma\colon\mathcal{C}^{\prime}\to\mathcal{C} and π:[n]A\pi:[n]\to A be some canonical one-to-one mappings. We include in S𝒞S^{\prime}\in\mathcal{C}^{\prime} the universe element u𝒰=Bu\in\mathcal{U}=B if and only if for every element iji_{j} in σ(S):={i1,,id}[n]\sigma(S^{\prime}):=\{i_{1},\ldots,i_{d}\}\subset[n], there is an edge between π(ij)\pi(i_{j}) and uBu\in B in the graph graph HH.

We analyze the completeness case by assuming there exists kk sets Si1,,SikS_{i_{1}},\ldots,S_{i_{k}} in 𝒞\mathcal{C} such that

|r[k]Sir|c.\left|\underset{{r\in[k]}}{\bigcup}S_{i_{r}}\right|\leq c.

We claim that the kk sets σ1(Si1),,σ1(Sik)\sigma^{-1}(S_{i_{1}}),\ldots,\sigma^{-1}(S_{i_{k}}) in 𝒞\mathcal{C}^{\prime} have at least intersection size of tt. Let S:=r[k]SirS:=\underset{{r\in[k]}}{\cup}S_{i_{r}} (where |S|c|S|\leq c). Let S^:={π(i)iS}A\hat{S}:=\{\pi(i)\mid i\in S\}\subset A. Let TBT\subset B be the set of common neighbors of S^\hat{S} in HH.

From the threshold graph property of HH, we have that |T|t|T|\geq t. We claim that every element in TT is contained in every set in {σ1(Si1),,σ1(Sik)}\{\sigma^{-1}(S_{i_{1}}),\ldots,\sigma^{-1}(S_{i_{k}})\}. To see this, fix uTu\in T and j[k]j\in[k]. Since uu is a common neighbor of S^\hat{S} in HH, it is also a common neighbor of every subset of S^\hat{S} in HH. Thus, uu is contained in {π(i)iSj}\{\pi(i)\mid i\in S_{j}\}.

Next consider the soundness case by assuming that for every kk sets Si1,,SikS_{i_{1}},\ldots,S_{i_{k}} in 𝒞\mathcal{C} we have

|r[k]Sir|s.\left|\underset{{r\in[k]}}{\bigcup}S_{i_{r}}\right|\geq s.

Consider any kk sets S1,,SkS_{1}^{\prime},\ldots,S_{k}^{\prime} in VV and fix an arbitrary universe element u𝒰u\in\mathcal{U}.

We have that uu is contained in the all the sets in {S1,,Sk}\{S_{1}^{\prime},\ldots,S_{k}^{\prime}\} if and only if uu is a common neighbor of σ(Sj)\sigma(S_{j}^{\prime}) (and then applying π\pi on each of elements of σ(Sj)\sigma(S_{j}^{\prime})) in HH for every j[k]j\in[k]. In other words, uu is a common neighbor of j[k]πσ(Sj)\underset{j\in[k]}{\cup}\pi\circ\sigma(S_{j}^{\prime}) in HH. But we know from the soundness case assumption that

|j[k]πσ(Sj)|sc+1.\left|\underset{j\in[k]}{\bigcup}\pi\circ\sigma(S_{j}^{\prime})\right|\geq s\geq c+1.

From the threshold graph soundness property of HH we then have that j[k]πσ(Sj)\underset{j\in[k]}{\cup}\pi\circ\sigma(S_{j}^{\prime}) can have at most rr common neighbors in HH. Thus, {S1,,Sk}\{S_{1}^{\prime},\ldots,S_{k}^{\prime}\} have at most intersection size of rr. ∎

Finally, we note that an instance Γ(𝒞,k,k+1)\Gamma(\mathcal{C},k,k+1) of kk-𝖬𝗂𝗇𝖢𝗈𝗏𝖾𝗋𝖺𝗀𝖾\mathsf{MinCoverage} over universe [n][n] is W[1]-hard to decide (follows from a straightforward reduction from the kk-𝖢𝗅𝗂𝗊𝗎𝖾\mathsf{Clique} problem).