This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

11institutetext: CNRS, UMR 8188, Centre de Recherche en Informatique de Lens (CRIL), Lens, F-62300, France
Univ. Artois, UMR 8188, Lens, F-62300, France

Characterizing Tseitin-formulas with short regular resolution refutationsthanks: This work has been partly supported by the PING/ACK project of the French National Agency for Research (ANR-18-CE40-0011).

Alexis de Colnet    Stefan Mengel
Abstract

Tseitin-formulas are systems of parity constraints whose structure is described by a graph. These formulas have been studied extensively in proof complexity as hard instances in many proof systems. In this paper, we prove that a class of unsatisfiable Tseitin-formulas of bounded degree has regular resolution refutations of polynomial length if and only if the treewidth of all underlying graphs GG for that class is in O(log|V(G)|)O(\log|V(G)|). To do so, we show that any regular resolution refutation of an unsatisfiable Tseitin-formula with graph GG of bounded degree has length 2Ω(tw(G))/|V(G)|2^{\Omega(tw(G))}/|V(G)|, thus essentially matching the known 2O(tw(G))poly(|V(G)|)2^{O(tw(G))}\textup{poly}(|V(G)|) upper bound up. Our proof first connects the length of regular resolution refutations of unsatisfiable Tseitin-formulas to the size of representations of satisfiable Tseitin-formulas in decomposable negation normal form (DNNF). Then we prove that for every graph GG of bounded degree, every DNNF-representation of every satisfiable Tseitin-formula with graph GG must have size 2Ω(tw(G))2^{\Omega(tw(G))} which yields our lower bound for regular resolution.

Keywords:
proof complexity, regular resolution, DNNF, treewidth

1 Introduction

Resolution is one of the most studied propositional proof systems in proof complexity due to its naturality and it connections to practical SAT solving [21, 9]. A refutation of a CNF-formula in this system (a resolution refutation) relies uniquely on clausal resolution: in a refutation, clauses are iteratively derived by resolutions on clauses from the formula or previously inferred clauses, until reaching the empty clause indicating unsatisfiability. In this paper, we consider regular resolution which is the restriction of resolution to proofs in which, intuitively, variables which have been resolved away from a clause cannot be reintroduced later on by additional resolution steps. This fragment of resolution is known to generally require exponentially longer refutations than general resolution [16, 1, 25, 27] but is still interesting since it corresponds to DPLL-style algorithms [12, 13]. Consequently, there is quite some work on regular resolution, see e.g. [3, 24, 5, 4] for a very small sample.

Tseitin-formulas are encodings of certain systems of linear equations whose structure is given by a graph [23]. They have been studied extensively in proof complexity essentially since the creation of the field because they are hard instances in many settings, see e.g. [24, 6, 18, 19, 4]. It is known that different properties of the underlying graph characterize different parameters of their resolution refutations [14, 2, 18]. Extending this line of work, we here show that treewidth determines the length of regular resolution refutations of Tseitin-formulas: classes of Tseitin-formulas of bounded degree have polynomial length regular resolution refutations if and only if the treewidth of the underlying graphs is bounded logarithmically in their size. The upper bound for this result was already known from [2] where it is shown that, for every graph GG, unsatisfiable Tseitin-formulas with the underlying graph GG have regular resolution refutations of length at most 2O(tw(G))|V(G)|c2^{O(tw(G))}|V(G)|^{c} where cc is a constant. We provide a matching lower bound:

Theorem 1.1

Let T(G,c)T(G,c) be an unsatisfiable Tseitin-formula where GG is a connected graph with maximum degree at most Δ\Delta. The length of the smallest regular resolution refutation of T(G,c)T(G,c) is at least 2Ω(tw(G)/Δ)|V(G)|12^{\Omega(tw(G)/\Delta)}|V(G)|^{-1}.

There were already known lower bounds for the length of resolution refutations of Tseitin-formulas based on treewidth before. For general resolution, a 2Ω(tw(G)2)/|V(G)|2^{\Omega(tw(G)^{2})/|V(G)|} lower bound can be inferred width the classical width-length relation of [6] and width bounds of [14]. This gives a tight 2Ω(tw(G))2^{\Omega(tw(G))} bound when the treewidth of GG is linear in its number of vertices. For smaller treewidth, better bounds of 2Ω(tw(G))/log|V(G)|2^{\Omega(tw(G))/\log|V(G)|} that almost match the upper bound where shown in [19] for regular resolution refutations. Building on [19], we eliminate the division by log|V(G)|\log|V(G)| in the exponent and thus give a tight 2Θ(tw(G))2^{\Theta(tw(G))} dependence.

As in [19], our proof strategy follows two steps. First, we show that the problem of bounding the length of regular resolution refutations of an unsatisfiable Tseitin-formula can be reduced to lower bounding the size of certain representations of a satisfiable Tseitin-formula. Itsykson et al. in [19] used a similar reduction of lower bounds for regular resolution refutations to bounds on read-once branching programs (1-BP) for satisfiable Tseitin-formulas, using the classical connection between regular resolution and the search problem which, given an unsatisfiable CNF-formula and a truth assignment, returns a clause of the formula it falsifies [20]. Itsykson et al. showed that there is a transformation of a 1-BP solving the search problem for an unsatisfiable Tseitin-formula into a 1-BP of pseudopolynomial size computing a satisfiable Tseitin-formula with the same underlying graph. This yields lower bounds for regular resolution from lower bounds for 1-BP computing satisfiable Tseitin-formulas which [19] also shows. Our crucial insight here is that when more succinct representations are used to present the satisfiable formula, the transformation from the unsatisfiable instance can be changed to have only a polynomial instead of pseudopolynomial size increase. Concretely, the representations we use are so-called decomposable negation normal forms (DNNF) which are very prominent in the field of knowledge compilation [10] and generalize 1-BP. We show that every refutation of an unsatisfiable Tseitin-formula can be transformed into a DNNF-representation of a satisfiable Tseitin-formula with the same underlying graph with only polynomial overhead.

In a second step, we then show for every satisfiable Tseitin-formula with an underlying graph GG a lower bound of 2Ω(tw(G))2^{\Omega(tw(G))} on the size of DNNF computing the formula. To this end, we adapt techniques developed in [8] to a parameterized setting. [8] uses rectangle covers of a function, a common tool from communication complexity, to lower bound the size of any DNNF computing the function. Our refinement takes the form of a two-player game in which the first player tries to cover the models of a function with few rectangles while the second player hinders this construction by adversarially choosing the variable partitions respected by the rectangles from a certain set of partitions. We show that this game gives lower bounds for DNNF, and consequently the aim is to show that the adversarial player can always force 2Ω(tw(G))2^{\Omega(tw(G))} rectangles in the game when playing on a Tseitin-formula with graph GG. This is done by proving that any rectangle for a carefully chosen variable partition splits parity constraints of the formula in a way that bounds by a function of tw(G)tw(G) the number of models that can be covered. We show that, depending on the treewidth of GG, the adversarial player can choose a partition to limit the number of models of every rectangle constructed in the game to the point that at least 2Ω(tw(G))2^{\Omega(tw(G))} of them will be needed to cover all models of the Tseitin-formula. As a consequence, we get the desired lower bound of 2Ω(tw(G))|V(G)|12^{\Omega(tw(G))}|V(G)|^{-1} for regular resolution refutations of Tseitin-formulas.

2 Preliminaries

Notions on Graphs.

We assume the reader is familiar with the fundamentals of graph theory. For a graph GG, we denote by V(G)V(G) its vertices and by E(G)E(G) its edges. For vV(G)v\in V(G), E(v)E(v) denotes the edges incident to vv and N(v)N(v) its neighbors (vv is not in N(v)N(v)). For a subset VV^{\prime} of V(G)V(G) we denote by G[V]G[V^{\prime}] the sub-graph of GG induced by VV^{\prime}.

A binary tree whose leaves are in bijection with the edges of GG is called a branch decomposition111We remark that often branch decompositions are defined as unrooted trees. However, it is easy to see that our definition is equivalent, so we use it here since it is more convenient in our setting.. Each edge ee of a branch decomposition TT induces a partition of E(G)E(G) into two parts as the edge sets that appear in the two connected components of TT after deletion of ee. The number of vertices of GG that are incident to edges in both parts of this partition is the order of ee, denoted by order(e,T)order(e,T). The branchwidth of GG, denoted by bw(G)bw(G), is defined as bw(G)=minTmaxeE(T)order(e,T)bw(G)=\min_{T}\max_{e\in E(T)}order(e,T), where minT\min_{T} is over all branch decompositions of GG.

While it is convenient to work with branchwidth in our proofs, we state our main result with the more well-known treewidth tw(G)tw(G) of a graph GG. This is justified by the following well-known connection between the two measures.

Lemma 1

[17, Lemma 12] If bw(G)2bw(G)\geq 2, then bw(G)1tw(G)32bw(G)bw(G)-1\leq tw(G)\leq\frac{3}{2}bw(G).

A separator SS in a connected graph GG is defined to be a vertex set such that GSG\setminus S is non-empty and not connected. A graph GG is called 33-connected if and only if it has at least 44 vertices and, for every SV(G)S\subseteq V(G), |S|2|S|\leq 2, the graph GSG\setminus S is connected.

Variables, assignments, v-trees.

Boolean variables can have value 0 (falsefalse) or 1 (truetrue). The notation x\ell_{x} refers to a literal for a variable xx, that is, xx or its negation x¯\overline{x}. Given a set XX of Boolean variables, lit(X)lit(X) denotes its set of literals. A truth assignment to XX is a mapping a:X{0,1}a:X\rightarrow\{0,1\}. If aXa_{X} and aYa_{Y} are assignments to disjoint sets of variables XX and YY, then aXaYa_{X}\cup a_{Y} denotes the combined assignment to XYX\cup Y. The set of assignments to XX is denoted by {0,1}X\{0,1\}^{X}. Let ff be a Boolean function, we denote by var(f)var(f) its variables and by sat(f)sat(f) its set of models, i.e., assignments to var(f)var(f) on which ff evaluates to 11. A v-tree of XX is a binary tree TT whose leaves are labeled bijectively with the variables in XX. A v-tree TT of XX induces a set of partitions (X1,X2)(X_{1},X_{2}) of XX as follows: choose a vertex vv of TT, setting X1X_{1} to contain exactly the variables in TT that appear below vv and X2:=XX1X_{2}:=X\setminus X_{1}.

Tseitin-Formulas.

Tseitin formulas are systems of parity constraints whose structure is determined by a graph. Let G=(V,E)G=(V,E) be a graph and let c:V{0,1}c:V\rightarrow\{0,1\} be a labeling of its vertices called a charge function. The Tseitin-formula T(G,c)T(G,c) has for each edge eEe\in E a Boolean variable xex_{e} and for each vertex vVv\in V a constraint χv:eE(v)xe=c(v)mod2\chi_{v}:\sum_{e\in E(v)}x_{e}=c(v)\mod 2. The Tseitin-formula T(G,c)T(G,c) is then defined as T(G,c):=vVχvT(G,c):=\bigwedge_{v\in V}\chi_{v}, i.e., the conjunction of the parity constraints for all vVv\in V. By χv¯\overline{\chi_{v}} we denote the negation of χv\chi_{v}, i.e., the parity constraint on (xe)eE(v)(x_{e})_{e\in E(v)} with charge 1c(v)1-c(v).

Proposition 1

[24, Lemma 4.1] The Tseitin-formula T(G,c)T(G,c) is satisfiable if and only if for every connected component UU of GG we have vUc(v)=0mod2\sum_{v\in U}c(v)=0\mod 2.

Proposition 2

[15, Lemma 2] Let GG be a graph with KK connected components. If the Tseitin-formula T(G,c)T(G,c) is satisfiable, then it has 2|E(G)||V(G)|+K2^{|E(G)|-|V(G)|+K} models.

When conditioning the formula T(G,c)T(G,c) on a literal e{xe,xe¯}\ell_{e}\in\{x_{e},\overline{x_{e}}\} for e=abe=ab in E(G)E(G), the resulting function is another Tseitin formula T(G,c)|e=T(G,c)T(G,c)|\ell_{e}=T(G^{\prime},c^{\prime}) where GG^{\prime} is the graph GG without the edge ee (so G=GeG^{\prime}=G-e) and cc^{\prime} depends on e\ell_{e}. If e=xe¯\ell_{e}=\overline{x_{e}} then cc^{\prime} equals cc. If e=xe\ell_{e}=x_{e} then c=c+1a+1bmod2c^{\prime}=c+1_{a}+1_{b}\mod 2, where 1v1_{v} denotes the charge function that assigns 11 to vv and 0 to all other variables.

Since we consider Tseitin-formulas in the setting of proof systems for CNF-formulas, we will assume in the following that they are encoded as CNF-formulas. In this encoding, every individual parity constraint χv\chi_{v} is expressed as a CNF-formula FvF_{v} and T(G,c):=vVFvT(G,c):=\bigwedge_{v\in V}F_{v}. Since it takes 2|E(v)|12^{|E(v)|-1} clauses to write the parity constraint χv\chi_{v}, each clause containing E(v)E(v) literals, we make the standard assumption that E(v)E(v) is bounded, i.e., there is a constant upper bound Δ\Delta on the degree of all vertices in GG.

DNNF.

A circuit over XX in negation normal form (NNF) is a directed acyclic graph whose leaves are labeled with literals in lit(X)lit(X) or 0/1-constants, and whose internal nodes are labeled by \lor-gates or \land-gates. We use the usual semantics for the function computed by (gates of) Boolean circuits. Every NNF can be turned into an equivalent NNF whose nodes have at most two successors in polynomial time. So we assume that NNF in this paper have only binary gates and thus define the size |D||D| as the number of gates, which is then at most half the number of wires. Given a gate gg, we denote by var(g)var(g) the variables for the literals appearing under gg. When gg is a literal input x\ell_{x}, we have var(g)={x}var(g)=\{x\}, and when it is a 0/1-input, we define var(g)=var(g)=\emptyset. A gate with two children glg_{l} and grg_{r} is called decomposable when var(gl)var(gr)=var(g_{l})\cap var(g_{r})=\emptyset, and it is called complete (or smooth) when var(gl)=var(gr)var(g_{l})=var(g_{r}). An NNF whose \land-gates are all decomposable is called a decomposable NNF (DNNF). We call a DNNF complete when all its \lor-gates are complete. Every DNNF can be made complete in polynomial time. For every Boolean function ff on finitely many variables, there exists a DNNF computing ff.

When representing Tseitin-formulas by DNNF, we will use the following:

Lemma 2

Let GG be a graph and let cc and cc^{\prime} be two charge functions such that T(G,c)T(G,c) and T(G,c)T(G,c^{\prime}) are satisfiable Tseitin-formulas. Then T(G,c)T(G,c) can be computed by a DNNF of size ss if and only if this is true for T(G,c)T(G,c^{\prime}).

Proof (sketch)

T(G,c)T(G,c) can be transformed into T(G,c)T(G,c^{\prime}) by substituting some variables by their negations, see [19, Proposition 26]. So every DNNF for T(G,c)T(G,c) can be transformed into one for T(G,c)T(G,c^{\prime}) by making the same substitutions. ∎

Proof trees of a DNNF DD are tree-like sub-circuits of DD constructed iteratively as follows: we start from the root gate and add it to the proof tree. Whenever an \land-gate is met, both its child gates are added to the proof tree. Whenever a \lor-gate is met, exactly one child is is added to the proof tree. Each proof tree of DD computes a conjunction of literals. By distributivity, the disjunction of the conjunctions computed by all proof trees of DD computes the same function as DD. When DD is complete, every variable appears exactly once per proof tree, so every proof tree of a complete DNNF encodes a single model.

Branching programs.

A branching program (BP) BB is a directed acyclic graph with a single source, sinks that uniquely correspond to the values of a finite set YY, and whose inner nodes, called decision nodes are each labeled by a Boolean variable xXx\in X and have exactly two output wires called the 0- and 1-wire pointing to two nodes respectively called its 0- and the 1-child. The variable xx appears on a path in BB if there is a decision node vv labeled by xx on that path. A truth assignment aa to XX induces a path in BB which starts at the source and, when encountering a decision node for a variable xx, follows the 0-wire (resp. the 1-wire) if a(x)=0a(x)=0 (resp. a(x)=1a(x)=1). The BP BB is defined to compute the value yYy\in Y on an assignment aa if and only if the path of aa leads to the sink labeled with yy. We denote this value yy as B(a)B(a). Let f:XYf:X\rightarrow Y be a function where XX is a finite set of Boolean variables and YY any finite set. Then we say that BB computes ff if for every assignment a{0,1}Xa\in\{0,1\}^{X} we have B(a)=f(a)B(a)=f(a). We say that a node vv in BB computes a function gg if the BP we get from BB by deleting all nodes that are not reachable from vv computes gg.

Let R{0,1}X×YR\subseteq\{0,1\}^{X}\times Y be a relation where YY is again finite. Then we say that a BP BB computes RR if for every assignment aa we have that (a,B(a))R(a,B(a))\in R. Let T(G,c)T(G,c) be an unsatisfiable Tseitin-formula for a graph G=(V,E)G=(V,E). Then we define the two following relations: SearchT(G,c)\textup{Search}_{T(G,c)} consists of the pairs (a,C)(a,C) such that aa is an assignment to T(G,c)T(G,c) that does not satisfy the clause CC of T(G,c)T(G,c). The relation SearchVertex(G,c)\textup{SearchVertex}(G,c) consists of the pairs (a,v)(a,v) such that aa does not satisfy the parity constraint χv\chi_{v} of a vertex vVv\in V. Note that SearchT(G,c)\textup{Search}_{T(G,c)} and SearchVertex(G,c)\textup{SearchVertex}(G,c) both give a reason why an assignment aa does not satisfy T(G,c)T(G,c) but the latter is more coarse: SearchVertex(G,c)\textup{SearchVertex}(G,c) only gives a constraint that is violated while SearchT(G,c)\textup{Search}_{T(G,c)} gives an exact clause that is not satisfied.

Regular Resolution.

We only introduce some minimal notions of proof complexity here; for more details and references the reader is referred to the recent survey [9]. Let C1=xD1C_{1}=x\lor D_{1} and C2=x¯D2C_{2}=\overline{x}\lor D_{2} be two clauses such that D1,D2D_{1},D_{2} contain neither xx nor x¯\overline{x}. Then the clause D1D2D_{1}\lor D_{2} is inferred by resolution of C1C_{1} and C2C_{2} on xx. A resolution refutation of length ss of a CNF-formula FF is defined to be a sequence C1,,CsC_{1},\ldots,C_{s} such that CsC_{s} is the empty clause and for every i[s]i\in[s] we have that CiC_{i} is a clause of FF or it is inferred by resolution of two clauses Cj,CC_{j},C_{\ell} such that j,<ij,\ell<i. It is well-known that FF has a resolution refutation if and only if FF is unsatisfiable.

To every resolution refutation C1,,CsC_{1},\ldots,C_{s} we assign a directed acyclic graph GG as follows: the vertices of GG are the clauses {Cii[s]}\{C_{i}\mid i\in[s]\}. Moreover, there is an edge CjCiC_{j}C_{i} in GG if and only if CiC_{i} is inferred by resolution of CjC_{j} and some other clause CC_{\ell} on a variable xx in the refutation. We also label the edge CjCiC_{j}C_{i} with the variable xx. Note that there might be two pairs of clauses Cj,CC_{j},C_{\ell} and Cj,CC_{j^{\prime}},C_{\ell^{\prime}} such that resolution on both pairs leads to the same clause CiC_{i}. If this is the case, we simply choose one of them to make sure that all vertices in GG have indegree at most 22. A resolution refutation is called regular if on every directed path in GG every variable xx appears at most once as a label of an edge. It is known that there is a resolution refutation of FF if and only if a regular resolution refutation of FF exists [13], but the latter are in general longer [1, 25].

In this paper, we will not directly deal with regular resolution proofs thanks to the following well-known result.

Theorem 2.1

[20] For every unsatisfiable CNF-formula FF, the length of the shortest regular resolution refutation of FF is the size of the smallest 11-BP computing SearchF\textup{Search}_{F}.

Since in our setting, from an unsatisfied clause we can directly inferred an unsatisfied parity constraint, we can use the following simple consequence.

Corollary 1

For every unsatisfiable Tseitin-formula T(G,c)T(G,c), the length of the shortest regular resolution refutation of T(G,c)T(G,c) is at least the size of the smallest 11-BP computing SearchVertex(G,c)\textup{SearchVertex}(G,c).

3 Reduction From Unsatisfiable to Satisfiable Formulas

To show our main result, we give a reduction from unsatisfiable to satisfiable Tseitin-formulas as in [19]. There it was shown that, given a 11-BP BB computing SearchVertex(G,c)\textup{SearchVertex}(G,c) for an unsatisfiable Tseitin-formula T(G,c)T(G,c), one can construct a 11-BP BB^{\prime} computing the function of a satisfiable Tseitin-formula T(G,c)T(G,c^{*}) such that |B||B^{\prime}| is quasipolynomial in |B||B|. Then good lower bounds on the size of BB^{\prime} yield lower bounds for regular refutation by Corollary 1. To give tighter results, we give a version of the reduction from unsatisfiable to satisfiable Tseitin-formulas where the target representation for T(G,c)T(G,c^{*}) is not 11-BP but the more succinct DNNF. This lets us decrease the size of the representation from pseudopolynomial to polynomial which, with tight lower bounds in the later parts of the paper, will yield Theorem 1.1.

Theorem 3.1

Let T(G,c)T(G,c) be an unsatisfiable Tseitin-formula where GG is connected and let SS be the length of its smallest resolution refutation. Then there exists for every satisfiable Tseitin-formula T(G,c)T(G,c^{*}) a DNNF of size O(S×|V(G)|)O(S\times|V(G)|) computing it.

In the proof of Theorem 3.1, we heavily rely on results from [19] in particular the notion of well-structuredness that we present in Section 3.1. In Section 3.2 we will then prove Theorem 3.1.

3.1 Well-structured branching programs for SearchVertex(G,c)\textup{SearchVertex}(G,c)

In a well-structured 1-BP computing SearchVertex(G,c)\textup{SearchVertex}(G,c), every decision node uku_{k} for a variable xex_{e} will compute SearchVertex(Gk,ck)\textup{SearchVertex}(G_{k},c_{k}) where GkG_{k} is a connected sub-graph of GG containing the edge e:=abe:=ab, and ckc_{k} is a charge function such that T(Gk,ck)T(G_{k},c_{k}) is unsatisfiable. Since uku_{k} deals with T(Gk,ck)T(G_{k},c_{k}), its 0- and 1-successors uk0u_{k_{0}} and uk1u_{k_{1}} will work on T(Gk,ck)|eT(G_{k},c_{k})|\ell_{e} for e=xe¯\ell_{e}=\overline{x_{e}} and e=xe\ell_{e}=x_{e}, respectively. T(Gk,ck)|eT(G_{k},c_{k})|\ell_{e} is a Tseitin-formula whose underlying graph is GkeG_{k}-e and whose charge function is ckc_{k} or ck+1a+1bmod2c_{k}+1_{a}+1_{b}\mod 2 depending on e\ell_{e}. For convenience, we introduce the notation γk(xe)=ck+1a+1bmod2\gamma_{k}(x_{e})=c_{k}+1_{a}+1_{b}\mod 2 and γk(xe¯)=ck\gamma_{k}(\overline{x_{e}})=c_{k}. Since GkG_{k} is connected, GkeG_{k}-e has at most two connected components. Let GkaG^{a}_{k} and GkbG^{b}_{k} denote the components of GkeG_{k}-e containing aa and bb, respectively. Note that Gka=GkbG^{a}_{k}=G^{b}_{k} when ee is not a bridge of GkG_{k}. Let γka(e)\gamma^{a}_{k}(\ell_{e}) and γkb(e)\gamma^{b}_{k}(\ell_{e}) denote the restriction of γk(e)\gamma_{k}(\ell_{e}) to the vertices of GkaG^{a}_{k} and GkbG^{b}_{k}, respectively. While the graph for T(Gk,ck)|eT(G_{k},c_{k})|\ell_{e} has at most two connected components, exactly one of them holds an odd total charge, so only the Tseitin-formula corresponding to that component is unsatisfiable. Well-structuredness states that uk0u_{k_{0}} and uk1u_{k_{1}} each deal with that unique connected component.

aabb
aabb
aabb
Figure 1: The graphs of Example 1. On the left the graph GkG_{k}, in the middle the result after assigning 0 to xex_{e}, on the right after assigning 11 to xex_{e}.
Example 1

Consider the graph GkG_{k} shown on the left in Figure 1. Black nodes have charge 0 and white nodes have charge 11. The corresponding Tseitin-formula T(Gk,ck)T(G_{k},c_{k}) is unsatisfiable because there is an odd number of white nodes. Let e:=abe:=ab. Then T(Gk,ck)|xe¯T(G_{k},c_{k})|\overline{x_{e}} is the Tseitin-formula for the graph GkeG_{k}-e with charges as shown in the middle of Figure 1. Note that T(Gk,ck)|xe¯T(G_{k},c_{k})|\overline{x_{e}} is unsatisfiable because of the charges in the triangle component GkbG_{k}^{b}. The repartition of charges for T(Gk,ck)|xeT(G_{k},c_{k})|x_{e} illustrated on the right of Figure 1 shows that T(Gk,ck)|xeT(G_{k},c_{k})|x_{e} is unsatisfiable because of the charges in the rombus component GkaG_{k}^{a}. Well-structuredness will ensure that, if uku_{k} computes SearchVertex(Gk,ck)\textup{SearchVertex}(G_{k},c_{k}) and decides xex_{e}, then uk0u_{k_{0}} computes SearchVertex(Gkb,γkb(xe¯))\textup{SearchVertex}(G_{k}^{b},\gamma^{b}_{k}(\overline{x_{e}})) and uk1u_{k_{1}} computes SearchVertex(Gka,γka(xe))\textup{SearchVertex}(G_{k}^{a},\gamma^{a}_{k}(x_{e})).

Definition 1

Let T(G,c)T(G,c) be an unsatisfiable Tseitin-formula where GG is a connected graph. A branching program BB computing SearchVertex(G,c)\textup{SearchVertex}(G,c) is well-structured when, for all nodes uku_{k} of BB, there exists a connected subgraph GkG_{k} of GG and a charge function ckc_{k} such that T(Gk,ck)T(G_{k},c_{k}) is unsatisfiable, uku_{k} computes SearchVertex(Gk,ck)\textup{SearchVertex}(G_{k},c_{k}) and

  1. 1.

    if uku_{k} is the source, then Gk=GG_{k}=G and ck=cc_{k}=c,

  2. 2.

    if uku_{k} is a sink corresponding to vV(G)v\in V(G), then Gk=({v},)G_{k}=(\{v\},\emptyset) and ck=1vc_{k}=1_{v},

  3. 3.

    if uku_{k} is a decision node for xabx_{ab} with 0- and 1- successors uk0u_{k_{0}} and uk1u_{k_{1}}, set 0=xab¯\ell_{0}=\overline{x_{ab}} and 1=xab\ell_{1}=x_{ab}, then for all i{0,1}i\in\{0,1\}, (Gki,cki)=(Gka,γka(i))(G_{k_{i}},c_{k_{i}})=(G^{a}_{k},\gamma^{a}_{k}(\ell_{i})) if T(Gka,γka(i))T(G^{a}_{k},\gamma^{a}_{k}(\ell_{i})) is unsatisfiable, otherwise (Gki,cki)=(Gkb,γkb(i))(G_{k_{i}},c_{k_{i}})=(G^{b}_{k},\gamma^{b}_{k}(\ell_{i})).

We remark that our definition is a slight simplification of that given by Itsykson et al. [19]. It can easily be seen that ours is implied by theirs (see Definition 11 and Proposition 16 in [19]).

Lemma 3

[19, Lemma 17] Let T(G,c)T(G,c) be an unsatisfiable Tseitin-formula where GG is connected and let BB be a 1-BP of minimal size222[19, Lemma 17] is for locally minimal 1-BP, which encompass minimal size 1-BP. computing the relation SearchVertex(G,c)\textup{SearchVertex}(G,c). Then BB is well-structured.

3.2 Constructing DNNF from Well-structured branching programs

Similarly to Theorem 14 in [19], we give a reduction from a well-structured 1-BP for SearchVertex(G,c)\textup{SearchVertex}(G,c) to a DNNF computing a satisfiable formula T(G,c)T(G,c^{*}).

Lemma 4

Let GG be a connected graph. Let T(G,c)T(G,c^{*}) and T(G,c)T(G,c) be Tseitin-formulas where T(G,c)T(G,c^{*}) is satisfiable and T(G,c)T(G,c) unsatisfiable. For every well-structured 1-BP BB computing SearchVertex(G,c)\textup{SearchVertex}(G,c) there exists a DNNF of size O(|B|×|V(G)|)O(|B|\times|V(G)|) computing T(G,c)T(G,c^{*}).

Proof

Let S=|B|S=|B| and denote by u1,,uSu_{1},\dots,u_{S} the nodes of BB such that if uju_{j} is a successor of uiu_{i}, then j<ij<i (thus uSu_{S} is the source of BB). For every i[S]i\in[S], the node uiu_{i} computes SearchVertex(Gi,ci)\textup{SearchVertex}(G_{i},c_{i}). We will show how to iteratively construct DNNF D1,,DSD_{1},\dots,D_{S} such that, D1D2DSD_{1}\subseteq D_{2}\subseteq\dots\subseteq D_{S} and, for every i[S]i\in[S],

for all vV(Gi)v\in V(G_{i}), there is a gate gvg_{v} in DiD_{i} computing T(Gi,ci+1v)T(G_{i},c_{i}+1_{v}).  ()(\ast)

Observe that, since T(Gi,ci)T(G_{i},c_{i}) is unsatisfiable, T(Gi,ci+1v)T(G_{i},c_{i}+1_{v}) is satisfiable for any vV(Gi)v\in V(G_{i}). We show by induction on ii how to construct DiD_{i} by extending Di1D_{i-1} while respecting ()(\ast).

For the base case, u1u_{1} is a sink of BB, so it computes SearchVertex(Gv,1v)\textup{SearchVertex}(G_{v},1_{v}) where Gv:=({v},)G_{v}:=(\{v\},\emptyset) for a vertex vV(G)v\in V(G). Thus we define D1D_{1} as a single constant-1-node which indeed computes T(Gv,1v+1v)=T(Gv,0)T(G_{v},1_{v}+1_{v})=T(G_{v},0). So D1D_{1} is a DNNF respecting ()(\ast).

Now for the inductive case, suppose we have the DNNF Dk1D_{k-1} satisfying ()(\ast). Consider the node uku_{k} of BB. If uku_{k} is a sink of BB, then we argue as for D1D_{1} but since we already have the constant-1-node in Dk1D_{k-1} we define Dk:=Dk1D_{k}:=D_{k-1}.

Now assume that uku_{k} is a decision node for the variable xex_{e} with 0- and 1-successors uk0u_{k_{0}} and uk1u_{k_{1}}. Recall that uku_{k} computes SearchVertex(Gk,ck)\textup{SearchVertex}(G_{k},c_{k}) and let e=abe=ab. There are two cases. If ee is not a bridge in GkG_{k} then Gka=Gkb=GkeG^{a}_{k}=G^{b}_{k}=G_{k}-e and, by well-structuredness,

  • uk0u_{k_{0}} computes SearchVertex(Gke,ck)\textup{SearchVertex}(G_{k}-e,c_{k})

  • uk1u_{k_{1}} computes SearchVertex(Gke,ck+1a+1b)\textup{SearchVertex}(G_{k}-e,c_{k}+1_{a}+1_{b})

For every vV(Gk)v\in V(G_{k}), since k0,k1<kk_{0},k_{1}<k, by induction there is a gate gv0g^{0}_{v} in Dk0D_{k_{0}} computing T(Gke,ck+1v)T(G_{k}-e,c_{k}+1_{v}) and a gate gv1g^{1}_{v} in Dk1D_{k_{1}} computing T(Gke,ck+1a+1b+1v)T(G_{k}-e,c_{k}+1_{a}+1_{b}+1_{v}). So for every vV(Gk)v\in V(G_{k}) we add to Dk1D_{k-1} an \lor-gate gvg_{v} whose left input is xe¯gv0\overline{x_{e}}\land g^{0}_{v} and whose right input is xegv1x_{e}\land g^{1}_{v}. By construction, gvg_{v} computes T(Gk,ck+1v)T(G_{k},c_{k}+1_{v}) and the new \land-gates are decomposable since ee is not an edge of GkeG_{k}-e and therefore xex_{e} and xe¯\overline{x_{e}} do not appear in Dk0D_{k_{0}} and Dk1D_{k_{1}}.

Now if e=abe=ab is a bridge in GkG_{k}, by well-structuredness, there exist i{0,1}i\in\{0,1\} and e{xe¯,xe}\ell_{e}\in\{\overline{x_{e}},x_{e}\} such that

  • ukiu_{k_{i}} computes SearchVertex(Gka,γka(e))\textup{SearchVertex}(G^{a}_{k},\gamma^{a}_{k}(\ell_{e}))

  • uk1iu_{k_{1-i}} computes SearchVertex(Gkb,γkb(e¯))\textup{SearchVertex}(G^{b}_{k},\gamma^{b}_{k}(\overline{\ell_{e}}))

We construct a gate gvg_{v} computing T(Gk,ck+1v)T(G_{k},c_{k}+1_{v}) for each vV(Gk)v\in V(G_{k}). Assume, without loss of generality, that vV(Gka)v\in V(G^{a}_{k}), then

  • T(Gk,ck+1v)|e¯T(Gka,γka(e¯)+1v)T(Gkb,γkb(e¯))0T(G_{k},c_{k}+1_{v})|\overline{\ell_{e}}\equiv T(G^{a}_{k},\gamma^{a}_{k}(\overline{\ell_{e}})+1_{v})\land T(G^{b}_{k},\gamma^{b}_{k}(\overline{\ell_{e}}))\equiv 0
    (because of the second conjunct which is known to be unsatisfiable), and

  • T(Gk,ck+1v)|eT(Gka,γka(e)+1v)T(Gkb,γkb(e))T(G_{k},c_{k}+1_{v})|\ell_{e}\equiv T(G^{a}_{k},\gamma^{a}_{k}(\ell_{e})+1_{v})\land T(G^{b}_{k},\gamma^{b}_{k}(\ell_{e}))

For the second item, since k0,k1<kk_{0},k_{1}<k, by induction there is a gate gvig^{i}_{v} in DkiD_{k_{i}} computing T(Gka,γka(e)+1v)T(G^{a}_{k},\gamma^{a}_{k}(\ell_{e})+1_{v}) and there is a gate gb1ig^{1-i}_{b} in Dk1iD_{k_{1-i}} computing T(Gkb,γkb(e¯)+1b)T(G^{b}_{k},\gamma^{b}_{k}(\overline{\ell_{e}})+1_{b}). But γk(e)=γk(e¯)+1a+1bmod2\gamma_{k}(\ell_{e})=\gamma_{k}(\overline{\ell_{e}})+1_{a}+1_{b}\mod 2, so γkb(e)=γkb(e¯)+1bmod2\gamma^{b}_{k}(\ell_{e})=\gamma^{b}_{k}(\overline{\ell_{e}})+1_{b}\mod 2, therefore gbi1g^{i-1}_{b} computes the formula T(Gkb,γkb(e))T(G^{b}_{k},\gamma^{b}_{k}(\ell_{e})). So we add an \land-gate gvg_{v} whose left input is e\ell_{e} and whose right input is svisb1is^{i}_{v}\land s^{1-i}_{b} and add it to Dk1D_{k-1}. Note that \land-gates are decomposable since GkaG^{a}_{k} and GkbG^{b}_{k} share no edge and therefore Dk0D_{k_{0}} and Dk1D_{k_{1}} are on disjoint sets of variables.

Let DkD_{k} be the circuit after all gvg_{v} have been added to Dk1D_{k-1}. It is a DNNF satisfying both Dk1DkD_{k-1}\subseteq D_{k} and ()(\ast).

It only remains to bound |DS||D_{S}|. To this end, observe that when constructing DkD_{k} from Dk1D_{k-1} we add at most 3×|Vk|3\times|V_{k}| gates, so |DS||D_{S}| is at most 3(|V1|++|VS|)=O(S×|V(G)|)3(|V_{1}|+\dots+|V_{S}|)=O(S\times|V(G)|). Finally, take any root of DSD_{S} and delete all gates not reached from it, the resulting circuit is a DNNF DD computing a satisfiable Tseitin formula T(G,c)T(G,c^{\prime}). We get a DNNF computing T(G,c)T(G,c^{*}) using Lemma 2.∎

Combining Corollary 1, Lemma 3 and Lemma 4 yields Theorem 3.1.

4 Adversarial Rectangle Bounds

In this section, we introduce the game we will use to show DNNF lower bounds for Tseitin formulas. It is based on combinatorial rectangles, a basic object of study from communication complexity.

Definition 2

A (combinatorial) rectangle for a variable partition (X1,X2)(X_{1},X_{2}) of a variables set XX is defined to be a set of assignments of the form R=A×BR=A\times B where A{0,1}X1A\subseteq\{0,1\}^{X_{1}} and B{0,1}X2B\subseteq\{0,1\}^{X_{2}}. The rectangle is called balanced when |X|3|X1|,|X2|2|X|3\frac{|X|}{3}\leq|X_{1}|,|X_{2}|\leq\frac{2|X|}{3}.

A rectangle on variables XX may be seen as a function whose satisfying assignments are exactly the aba\cup b for aAa\in A and bBb\in B, so we sometimes interpret rectangles as Boolean functions whenever it is convenient.

Definition 3

Let ff be a Boolean function. A balanced rectangle cover of ff is a collection ={R1,,RK}\mathcal{R}=\{R_{1},\dots,R_{K}\} of balanced rectangles on var(f)var(f), possibly for different partitions of var(f)var(f), such that ff is equivalent to i=1KRi\bigvee_{i=1}^{K}R_{i}. The minimum number of rectangles in a balanced cover of ff is denoted by R(f)R(f).

Theorem 4.1

[8] Let DD be a DNNF computing a function ff, then R(f)|D|R(f)\leq|D|.

When trying to show parameterized lower bounds with Theorem 4.1, one often runs into the problem that it is somewhat inflexible: the partitions of the rectangles in covers have to be balanced, but in parameterized applications this is often undesirable. Instead, to show good lower bounds, one wants to be able to partition in places that allow to cut in complicated subparts of the problem. This is e.g. the underlying technique in [22]. To make this part of the lower bound proofs more explicit and the technique more reusable, we here introduce a refinement of Theorem 4.1.

We define the adversarial multi-partition rectangle cover game for a function ff on variables XX and a set Ssat(f)S\subseteq sat(f) to be played as follows: two players, the cover player Charlotte and her adversary Adam, construct in several rounds a set \mathcal{R} of combinatorial rectangles that cover the set SS respecting ff (that is, rectangles in \mathcal{R} contain only models of ff). The game starts with \mathcal{R} as the empty set. Charlotte starts a round by choosing an input aSa\in S and a v-tree TT of XX. Now Adam chooses a partition (X1,X2)(X_{1},X_{2}) of XX induced by TT. Charlotte ends the round by adding to \mathcal{R} a combinatorial rectangle for this partition and respecting ff that covers aa. The game is over when SS is covered by \mathcal{R}. The adversarial multi-partition rectangle complexity of ff and SS, denoted by aR(f,S)aR(f,S) is the minimum number of rounds in which Charlotte can finish the game, whatever the choices of Adam are. The following theorem gives the core technique for showing lower bounds later on.

Theorem 4.2

Let DD be a complete DNNF computing a function ff and let Ssat(f)S\subseteq sat(f). Then aR(f,S)|D|aR(f,S)\leq|D|.

Proof

Let X=var(D)X=var(D). We iteratively delete vertices from DD and construct rectangles. The approach is as follows: Charlotte chooses an assignment aSa\in S not yet in any rectangle she constructed before and a proof tree TT accepting aa in DD. By completeness of DD, all variables of XX appear exactly once in TT. Charlotte constructs a v-tree of XX from TT by deleting negations on the leaves, contracting away nodes with a single child and forgetting the labels of all operation gates. Now Adam chooses a partition induced by TT given by a subtree of TT with root vv. Note that vv is a gate of CC. Let sat(D,v)sat(f)sat(D,v)\subseteq sat(f) be the assignments to XX accepted by a proof tree of CC passing through vv, and observe that sat(D,v)sat(D,v) is a combinatorial rectangle A×BA\times B with A{0,1}var(v)A\subseteq\{0,1\}^{var(v)} and B{0,1}Xvar(v)B\subseteq\{0,1\}^{X\setminus var(v)}. Charlotte chooses the rectangle sat(D,v)sat(D,v), deletes it from SS and the game continues.

Note that the vertex vv in the above construction is different for every iteration of the game: by construction, Charlotte never chooses an assignment aa that is in any set sat(D,v)sat(D,v) for a vertex vv that has appeared before. Thus, no such vv can appear in the proof tree of the chosen aa. Consequently, a new vertex vv is chosen for each assignment aa that Charlotte chooses and thus the game will never last more than |D||D| rounds. ∎

5 Splitting Parity Constraints

In this section, we will see that rectangles split parity constraints in a certain sense and show how this is reflected in in the underlying graph of Tseitin-formulas. This will be crucial in proving the DNNF lower bound in the next section with the adversarial multi-partition rectangle cover game.

5.1 Rectangles Induce Sub-Constraints for Tseitin-Formulas

Let RR be a rectangle for the partition (E1,E2)(E_{1},E_{2}) of E(G)E(G) such that Rsat(T(G,c))R\subseteq sat(T(G,c)). Assume that there is a vertex vv of GG incident to edges in E1E_{1} and to edges in E2E_{2}, i.e., E(v)=E1(v)E2(v)E(v)=E_{1}(v)\cup E_{2}(v) where neither E1(v)E_{1}(v) not E2(v)E_{2}(v) is empty. We will show that RR does not only respect χv\chi_{v}, but it also respects a sub-constraint of χv\chi_{v}.

Definition 4

Let χv\chi_{v} be a parity constraint on (xe)eE(v)(x_{e})_{e\in E(v)}. A sub-constraint of χv\chi_{v} is a parity constraint χv\chi^{\prime}_{v} on a non-empty proper subset of the variables of χv\chi_{v}.

Lemma 5

Let T(G,c)T(G,c) be a satisfiable Tseitin-formula and let RR be a rectangle for the partition (E1,E2)(E_{1},E_{2}) of E(G)E(G) such that Rsat(T(G,c))R\subseteq sat(T(G,c)). If vV(G)v\in V(G) is incident to edges in E1E_{1} and to edges in E2E_{2}, then there exists a sub-constraint χv\chi^{\prime}_{v} of χv\chi_{v} such that Rsat(T(G,c)χv)R\subseteq sat(T(G,c)\land\chi^{\prime}_{v}).

Proof

Let a1a2Ra_{1}\cup a_{2}\in R where a1a_{1} is an assignment to E1E_{1} and a2a_{2} an assignment to E2E_{2}. Let a1(v)a_{1}(v) and a2(v)a_{2}(v) denote the restriction of a1a_{1} and a2a_{2} to E1(v)E_{1}(v) and E2(v)E_{2}(v), respectively. We claim that for all a1a2Ra^{\prime}_{1}\cup a^{\prime}_{2}\in R, we have that a1(v)a^{\prime}_{1}(v) and a1(v)a_{1}(v) have the same parity, that is, a1(v)a_{1}(v) assigns an odd number of variables of E1(v)E_{1}(v) to 1 if and only if it is also the case for a1(v)a^{\prime}_{1}(v). Indeed if a1(v)a_{1}(v) and a1(v)a^{\prime}_{1}(v) have different parities, then so do a1(v)a2(v)a_{1}(v)\cup a_{2}(v) and a1(v)a2(v)a^{\prime}_{1}(v)\cup a_{2}(v). So either a1a2a_{1}\cup a_{2} or a1a2a^{\prime}_{1}\cup a_{2} falsifies χv\chi_{v}, but both assignments are in RR, so a1(v)a_{1}(v) and a1(v)a^{\prime}_{1}(v) cannot have different parities as this contradicts Rsat(T(G,c))R\subseteq sat(T(G,c)). Let c1c_{1} be the parity of a1(v)a_{1}(v), then we have that assignments in RR must satisfy χv:eE1(v)xe=c1mod2\chi^{\prime}_{v}:\sum_{e\in E_{1}(v)}x_{e}=c_{1}\mod 2, so Rsat(T(G,c)χv)R\subseteq sat(T(G,c)\land\chi^{\prime}_{v}). ∎

Renaming χv\chi^{\prime}_{v} as χv1\chi^{1}_{v} and adopting notations from the proof, one sees that χv1χvχv1χv2\chi^{1}_{v}\land\chi_{v}\equiv\chi^{1}_{v}\land\chi^{2}_{v} where χv2:eE2(v)xe=c(v)+c1mod2\chi^{2}_{v}:\sum_{e\in E_{2}(v)}x_{e}=c(v)+c_{1}\mod 2. So RR respects the formula (T(G,c)χv)χv1χv2(T(G,c)-\chi_{v})\land\chi^{1}_{v}\land\chi^{2}_{v} where (T(G,c)χv)(T(G,c)-\chi_{v}) is the formula obtained by removing all clauses of χv\chi_{v} from T(G,c)T(G,c). In this sense, the rectangle is splitting the constraint χv\chi_{v} into two subconstraints in disjoint variables. Since χv(χv1χv2)(χ¯v1χ¯v2)\chi_{v}\equiv(\chi^{1}_{v}\land\chi^{2}_{v})\lor(\overline{\chi}^{1}_{v}\land\overline{\chi}^{2}_{v}) it is plausible that potentially many models of χv\chi_{v} are not in RR. We show that this is true in the next section.

5.2 Vertex Splitting and Sub-constraints for Tseitin-Formulas

Let vV(G)v\in V(G) and let (N1,N2)(N_{1},N_{2}) be a proper partition of N(v)N(v), that is, neither N1N_{1} nor N2N_{2} is empty. The graph GG^{\prime} we get by splitting vv along (N1,N2)(N_{1},N_{2}) is defined as the graph we get by deleting vv, adding two vertices v1v^{1} and v2v^{2}, and connecting v1v^{1} to all vertices in N1N_{1} and v2v^{2} to all vertices in N2N_{2}. We now show that splitting a vertex vv in a graph GG has the same effect as adding a sub-constraint of χv\chi_{v}.

Lemma 6

Let T(G,c)T(G,c) be a Tseitin-formula. Let vV(G)v\in V(G) and let (N1,N2)(N_{1},N_{2}) be a proper partition of N(v)N(v). Let c1c_{1} and c2c_{2} be such that c1+c2=c(v)mod2c_{1}+c_{2}=c(v)\mod 2 and let χvi:uNixuv=cimod2\chi^{i}_{v}:\sum_{u\in N_{i}}x_{uv}=c_{i}\mod 2 for i{1,2}i\in\{1,2\} be sub-constraints of χv\chi_{v}. Call GG^{\prime} the result of splitting vv along (N1,N2)(N_{1},N_{2}) and set

c(u):={c(u), if uV(G){v}ci, if u=vi,i{1,2}\displaystyle c^{\prime}(u):=\begin{cases}c(u),&\text{ if }u\in V(G)\setminus\{v\}\\ c_{i},&\text{ if }u=v^{i},i\in\{1,2\}\end{cases}

There is a bijection ρ:var(T(G,c))var(T(G,c))\rho:var(T(G,c))\rightarrow var(T(G^{\prime},c^{\prime})) acting as a renaming of the variables such that T(G,c)(T(G,c)χv1)ρT(G^{\prime},c^{\prime})\equiv(T(G,c)\land\chi^{1}_{v})\circ\rho.

Proof

Denote by T(G,c)χvT(G,c)-\chi_{v} the formula equivalent to the conjunction of all χu\chi_{u} for uV(G){v}u\in V(G)\setminus\{v\}. Then T(G,c)χv1(T(G,c)χv)χv1χv2T(G,c)\land\chi^{1}_{v}\equiv(T(G,c)-\chi_{v})\land\chi^{1}_{v}\land\chi^{2}_{v}. The constraints χu\chi_{u} for uV(G){v}u\in V(G)\setminus\{v\} appear in both T(G,c)T(G^{\prime},c^{\prime}) and in T(G,c)χvT(G,c)-\chi_{v} and the sub-constraints χv1\chi^{1}_{v} and χv2\chi^{2}_{v} are exactly the constraints for v1v^{1} and v2v^{2} in T(G,c)T(G^{\prime},c^{\prime}) modulo the variable renaming ρ\rho defined by ρ(xuv)=xuv1\rho(x_{uv})=x_{uv^{1}} when uN1u\in N_{1}, ρ(xuv)=xuv2\rho(x_{uv})=x_{uv^{2}} when uN2u\in N_{2}, and ρ(xe)=xe\rho(x_{e})=x_{e} when vv is not incident to ee. ∎

Intuitely, Lemma 6 says that splitting a vertex in GG and adding sub-constraint are essentially the same operation. This allows us to compute the number of models of a Tseitin-formula to which a sub-constraint was added.

Lemma 7

Let T(G,c)T(G,c) be a satisfiable Tseitin-formula where GG is connected. Define T(G,c)T(G^{\prime},c^{\prime}) as in Lemma 6. If GG^{\prime} is connected then T(G,c)T(G^{\prime},c^{\prime}) has 2|E(G)||V(G)|2^{|E(G)|-|V(G)|} models.

Proof

By Proposition 1, T(G,c)T(G^{\prime},c^{\prime}) is satisfiable since T(G,c)T(G,c) is satisfiable and uV(G)c(u)=uV(G)c(u)=0mod2\sum_{u\in V(G^{\prime})}c^{\prime}(u)=\sum_{u\in V(G)}c(u)=0\mod 2. Using Proposition 2 yields that T(G,c)T(G^{\prime},c^{\prime}) has 2|E(G)||V(G)|+1=2|E(G)||V(G)|2^{|E(G^{\prime})|-|V(G^{\prime})|+1}=2^{|E(G)|-|V(G)|} models. ∎

Lemma 8

Let T(G,c)T(G,c) be a satisfiable Tseitin-formula where GG is connected. Let {v1,,vk}\{v_{1},\ldots,v_{k}\} be an independent set in GG. For all i[k]i\in[k] let (N1i,N2i)(N_{1}^{i},N_{2}^{i}) be a proper partition of N(vi)N(v_{i}) and let χvi:uN1ixuvi=cimod2\chi^{\prime}_{v_{i}}:\sum_{u\in N^{i}_{1}}x_{uv_{i}}=c_{i}\mod 2. If the graph obtained by splitting all viv_{i} along (N1i,N2i)(N_{1}^{i},N_{2}^{i}) is connected, then the formula T(G,c)χv1χvkT(G,c)\land\chi^{\prime}_{v_{1}}\land\dots\land\chi^{\prime}_{v_{k}} has 2|E(G)||V(G)|k+12^{|E(G)|-|V(G)|-k+1} models.

Proof

An easy induction based on Lemma 6 and Lemma 7. The induction works since, {v1,,vk}\{v_{1},\ldots,v_{k}\} being an independant set, the edges to modify by splitting viv_{i} are still in the graph where v1,,vi1v_{1},\dots,v_{i-1} have been split. ∎

5.3 Vertex Splitting in 3-Connected Graphs

When we want to apply the results of the last sections to bound the size of rectangles, we require that the graph GG remains connected after splitting vertices. This is obviously not true for all choices of vertex splits, but here we will see that if GG is sufficiently connected, then we can always chose a large subset of any set of potential splits such that, after applying the split for this subset, GG remains connected.

Lemma 9

Let GG be a 33-connected graph of and let {v1,,vk}\{v_{1},\ldots,v_{k}\} be an independent set in GG. For every i[k]i\in[k] let (N1i,N2i)(N_{1}^{i},N_{2}^{i}) be a proper partition of N(vi)N(v_{i}). Then there is a subset SS of {v1,,vk}\{v_{1},\ldots,v_{k}\} of size at least k/3k/3 such that the graph resulting from splitting all viSv_{i}\in S along the corresponding (N1i,N2i)(N_{1}^{i},N_{2}^{i}) is connected.

Proof

Let C1,,CrC_{1},\ldots,C_{r} be the connected components of the graph G1G_{1} that we get by splitting all viv_{i}. If G1G_{1} is connected, then we can set S={v1,,vk}S=\{v_{1},\ldots,v_{k}\} and we are done. So assume that r>1r>1 in the following. Now add for every i[k]i\in[k] the edge (vi1,vi2)(v^{1}_{i},v_{i}^{2}). Call this edge set LL (for links) and the resulting graph G2G_{2}. Note that G2G_{2} is connected and for every edge set ELE^{\prime}\subseteq L we have that G2EG_{2}\setminus E^{\prime} is connected if and only if GG is connected after splitting the vertices corresponding to the edges in EE^{\prime}. Denote by LinL_{in} the edges in LL whose end points both lie in some component CjC_{j} and let Lout:=LLinL_{out}:=L\setminus L_{in}.

We claim that for every CjC_{j}, at least three edges in LoutL_{out} are incident to a vertex in CjC_{j}. Since G2G_{2} is connected but the set CjC_{j} is a connected component of G2L=G1G_{2}\setminus L=G_{1}, there must be at least one edge in LL incident to a vertex in CjC_{j}. That vertex is by construction one of v1,,vkv_{1},\ldots,v_{k}, say it is viv_{i}. Since N1iN_{1}^{i}\neq\emptyset and N2iN_{2}^{i}\neq\emptyset, we have that viv_{i} has a neighbor ww in CjC_{j} and, w{v1,,vk}w\not\in\{v_{1},\ldots,v_{k}\} since it is an independent set. Now let LoutjL^{j}_{out} be the edges in LoutL_{out} that have an end point in CjC_{j}. Note that if we delete the vertices Sj{v1,,vk}S^{j}\subseteq\{v_{1},\ldots,v_{k}\} for which the edges in LoutjL^{j}_{out} were introduced in the construction of G2G_{2}, then a subset of CjC_{j} becomes disconnected from the rest of the graph (which is non-empty because there is at least one component different from CjC_{j} in G2G_{2} which also contains a vertex not in {v1,,vk}\{v_{1},\ldots,v_{k}\} by the same reasoning as before). But then, because GG is 33-connected, there must be at least three edges in LoutjL^{j}_{out}. Let k:=|Lout|k^{\prime}:=|L_{out}|, then by the handshaking lemma,

r23k.\displaystyle r\leq\frac{2}{3}k^{\prime}.

Now contract all components CiC_{i} in G2G_{2} and call the resulting graph G3G_{3}. Note that G3G_{3} is connected and that E(G3)=LoutE(G_{3})=L_{out}. Moreover, whenever G3EG_{3}\setminus E^{*} is connected for some ELoutE^{*}\subseteq L_{out}, then GG is connected after splitting the corresponding vertices. Choose any spanning tree TT of G3G_{3}. Then |E(T)|=r1|E(T)|=r-1 and deleting E:=LoutE(T)E^{*}:=L_{out}\setminus E(T) leaves G3G_{3} connected. Thus the graph GG^{*} we get from GG after splitting the vertices corresponding to EE^{*} is connected. We have

|E|=|Lout||E(T)|=k(r1)>k3.\displaystyle|E^{*}|=|L_{out}|-|E(T)|=k^{\prime}-(r-1)>\frac{k^{\prime}}{3}.

Now observe that in GG we can safely split all kkk-k^{\prime} vertices viv_{i} that correspond to edges vi1vi2v_{i}^{1}v_{i}^{2} such that vi1v_{i}^{1} and vi2v_{i}^{2} lie in the same component of G1G_{1} without disconnecting the graph. Thus, overall we can split a set of size

kk+|E|>kk+k3k3\displaystyle k-k^{\prime}+|E^{*}|>k-k^{\prime}+\frac{k^{\prime}}{3}\geq\frac{k}{3}

in GG such that the resulting graph remains connected. ∎

6 DNNF Lower Bounds for Tseitin-Formulas

In this section, we use the results of the previous sections to show our lower bounds for DNNF computing Tseitin-formulas. To this end, we first show that we can restrict ourselves to the case of 33-connected graphs.

6.1 Reduction from Connected to 3-Connected Graphs

In [7], Bodlaender and Koster study how separators can be used in the context of treewidth. They call a separator SS safe for treewidth if there exists a connected component of GSG\setminus S whose vertex set VV^{\prime} is such that tw(G[SV]+clique(S))=tw(G)tw(G[S\cup V^{\prime}]+clique(S))=tw(G), where G[SV]+clique(S)G[S\cup V^{\prime}]+clique(S) is the graph induced on SVS\cup V^{\prime} with additional edges that pairwise connect all vertices in SS.

Lemma 10

[7, Corollary 15] Every separator of size 1 is safe for treewdith. When GG has no separator of size 1, every separator of size 2 is safe for treewidth.

Remember that a topological minor HH of a GG is a graph that can be constructed from GG by iteratively applying the following operations:

  1. -

    edge deletion,

  2. -

    deletion of isolated vertices, or

  3. -

    subdivision elimination: if deg(v)=2\deg(v)=2 delete vv and connect its two neighbors.

Lemma 11

Let HH be a topological minor of GG. If the satisfiable Tseitin-formula T(G,0)T(G,0) has a DNNF of size ss, then so does T(H,0)T(H,0).

Proof

Edge deletion corresponds to conditioning the variable by 0 so it cannot increase the size of a DNNF. Deletion of an isolated vertex does not change the Tseitin-formula. Finally, let e1,e2e_{1},e_{2} be the edges incident to a vertex of degree 22. Since we assume that all charges c(v)c(v) are 0, in every satisfying assignment, xe1x_{e_{1}} and xe2x_{e_{2}} take the same value. Thus we can simply forget the variable of xe2x_{e_{2}} which does not increase the size of a DNNF [11]. ∎

Lemma 12

Let GG be a graph with treewidth at least 33. Then GG has a 33-connected topological minor HH with tw(H)=tw(G)tw(H)=tw(G).

Proof

First we construct a topological minor of GG with no separator of size 11 that preserves treewidth. Let S={v}S=\{v\} be a separator of size 1 of GG, then GSG\setminus S has a connected component VV^{\prime} such that G[SV]+clique(S)=G[SV]G[S\cup V^{\prime}]+clique(S)=G[S\cup V^{\prime}] has treewidth tw(G)tw(G). Let G=G[SV]G^{\prime}=G[S\cup V^{\prime}], then tw(G)=tw(G)tw(G^{\prime})=tw(G). Observe that GG^{\prime} is a topological minor (remove all edges not in G[SV]G[S\cup V^{\prime}] thus isolating all vertices not in SVS\cup V^{\prime}, which are then deleted) where SS is no longer a separator. Repeat the construction until GG^{\prime} has no separator of size 1.

Now assume S={u,v}S=\{u,v\} is a separator of GG^{\prime}. If VV^{\prime} are the vertices of a connected component of GSG^{\prime}\setminus S, then there is a path from uu to vv in G[SV]G[S\cup V^{\prime}] since otherwise either {u}\{u\} or {v}\{v\} is a separator of size 11 of GG^{\prime}. Lemma 10 ensures that there is a connected component HH^{\prime} in GSG^{\prime}\setminus S such that H:=(V(H)S,E(H){uv})H:=(V(H^{\prime})\cup S,E(H^{\prime})\cup\{uv\}) has treewidth tw(H)=tw(G)=tw(G)tw(H)=tw(G^{\prime})=tw(G). Let us prove that HH is topological minor of GG^{\prime}. Consider a connected component of GSG^{\prime}\setminus S distinct from HH^{\prime} with vertices VV^{\prime} and let PP be a path connecting uu to vv in G[SV]G[S\cup V^{\prime}]. Delete all edges of G[SV]G[S\cup V^{\prime}] not in PP, then delete all isolated vertices in VV^{\prime} so that only PP remains, finally use subdivision elimination to reduce PP to a single edge uvuv. Repeat the procedure for all connected components of GSG^{\prime}\setminus S distinct from HH^{\prime}, the resulting topological minor is G[V(H)S]G[V(H^{\prime})\cup S] with the (additional) edge uvuv, so HH.

Repeat the construction until there are no separators of size 11 or size 22 left. Note that this process eventually terminates since the number of vertices decreases after every separator elimination. The resulting graph HH is a topological minor of GG of treewidth tw(G)tw(G) without separators of size 11 or 22. Since tw(H)=tw(G)3tw(H)=tw(G)\geq 3, we have that HH has at least 44 vertices, so HH is 33-connected. ∎

6.2 Proof of the DNNF Lower Bound and of the Main Result

Lemma 13

Let T(G,c)T(G,c) be a satisfiable Tseitin-formula where GG is a connected graph with maximum degree at most Δ\Delta. Any complete DNNF computing T(G,c)T(G,c) has size at least 2Ω(tw(G)/Δ)2^{\Omega(tw(G)/\Delta)}.

Proof

By Lemma 2 we can set c=0c=0. By Lemmas 11 and  12 we can assume that GG is 3-connected. We show that the adversarial multi-partition rectangle complexity is lower-bounded by 2k2^{k} for k:=2tw(G)9Δk:=\frac{2tw(G)}{9\Delta}. To this end, we will show that the rectangles that Charlotte can construct after Adam’s answer are never bigger than 2|E(G)||V(G)|k+12^{|E(G)|-|V(G)|-k+1}. Since T(G,c)T(G,c) has 2|E(G)||V(G)|+12^{|E(G)|-|V(G)|+1} models, the claim then follows.

So let Charlotte choose an assignment aa and a v-tree TT. Note that since the variables of T(G,0)T(G,0) are the edges of GG, the v-tree TT is also a branch decomposition of GG. Now by the definition of branchwidth, Adam can choose a cut of TT inducing a partition (E1,E2)(E_{1},E_{2}) of E(G)E(G) for which there exists a set VV(G)V^{\prime}\in V(G) of at least bw(G)23tw(G)bw(G)\geq\frac{2}{3}tw(G) vertices incident to edges in E1E_{1} and to edges in E2E_{2}.

GG has maximum degree Δ\Delta so there is an independent set V′′VV^{\prime\prime}\subset V^{\prime} of size at least |V|Δ\frac{|V^{\prime}|}{\Delta}. Since GG is 33-connected, by Lemma 9 there is a subset VV′′V^{*}\subseteq V^{\prime\prime} of size at least |V′′|32tw(G)9Δ=k\frac{|V^{\prime\prime}|}{3}\geq\frac{2tw(G)}{9\Delta}=k such that GG remains connected after splitting of the nodes in VV^{*} along the partition of their neighbors induced by the edges partition (E1,E2)(E_{1},E_{2}). Using Lemma 5, we find that any rectangle RR for the partition (E1,E2)(E_{1},E_{2}) respects a sub-constraint χv\chi^{\prime}_{v} for each vVv\in V^{*}. So RR respects T(G,0)vVχvT(G,0)\land\bigwedge_{v\in V^{*}}\chi^{\prime}_{v}. Finally, Lemma 8 shows that |R|2|E(G)||V(G)|k+1|R|\leq 2^{|E(G)|-|V(G)|-k+1}, as required. ∎

Theorem 1.1 is now a direct consequence of Theorem 3.1, Lemma 13 and Lemma 2

7 Conclusion

We have shown that the unsatisfiable Tseitin-formulas with polynomial length of regular resolution refutations are completely determined by the treewidth of the underlying graphs. We did this by giving a connection between lower bounds for regular resolution refutations and size bounds of DNNF representations of Tseitin-formulas. Moreover, we introduced a new two-player game that allowed us to show DNNF lower bounds.

Let us discuss some questions that we think are worth exploring in the future. First, it would be interesting to see if a 2Ω(tw(G))2^{\Omega(tw(G))} lower bound for the refutation of Tseitin-formulas can also be shown for general resolution. In that case the length of resolution refutations would essentially be the same as that regular resolution refutations for Tseitin formulas. Note that this is somewhat plausible since other measures like space and width are known to be the same for the two proof systems for these formulas [14].

Another question is the relation between knowledge compilation and proof complexity. As far as we are aware, our Theorem 3.1 is the first result that connects bounds on DNNF to such in proof complexity. It would be interesting to see if this connection can be strenghtened to other classes of instances, other proof systems, representations from knowledge compilation and measures on proofs and representations, respectively.

References

  • [1] Alekhnovich, M., Johannsen, J., Pitassi, T., Urquhart, A.: An exponential separation between regular and general resolution. Theory Comput. 3(1), 81–102 (2007). https://doi.org/10.4086/toc.2007.v003a005, https://doi.org/10.4086/toc.2007.v003a005
  • [2] Alekhnovich, M., Razborov, A.A.: Satisfiability, branch-width and tseitin tautologies. Comput. Complex. 20(4), 649–678 (2011). https://doi.org/10.1007/s00037-011-0033-1, https://doi.org/10.1007/s00037-011-0033-1
  • [3] Atserias, A., Bonacina, I., de Rezende, S.F., Lauria, M., Nordström, J., Razborov, A.A.: Clique is hard on average for regular resolution. In: Diakonikolas, I., Kempe, D., Henzinger, M. (eds.) Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2018, Los Angeles, CA, USA, June 25-29, 2018. pp. 866–877. ACM (2018). https://doi.org/10.1145/3188745.3188856, https://doi.org/10.1145/3188745.3188856
  • [4] Beame, P., Beck, C., Impagliazzo, R.: Time-space tradeoffs in resolution: superpolynomial lower bounds for superlinear space. In: Karloff, H.J., Pitassi, T. (eds.) Proceedings of the 44th Symposium on Theory of Computing Conference, STOC 2012, New York, NY, USA, May 19 - 22, 2012. pp. 213–232. ACM (2012). https://doi.org/10.1145/2213977.2213999, https://doi.org/10.1145/2213977.2213999
  • [5] Beck, C., Impagliazzo, R.: Strong ETH holds for regular resolution. In: Boneh, D., Roughgarden, T., Feigenbaum, J. (eds.) Symposium on Theory of Computing Conference, STOC’13, Palo Alto, CA, USA, June 1-4, 2013. pp. 487–494. ACM (2013). https://doi.org/10.1145/2488608.2488669, https://doi.org/10.1145/2488608.2488669
  • [6] Ben-Sasson, E.: Hard examples for the bounded depth frege proof system. Comput. Complex. 11(3-4), 109–136 (2002). https://doi.org/10.1007/s00037-002-0172-5, https://doi.org/10.1007/s00037-002-0172-5
  • [7] Bodlaender, H.L., Koster, A.M.C.A.: Safe separators for treewidth. Discret. Math. 306(3), 337–350 (2006). https://doi.org/10.1016/j.disc.2005.12.017, https://doi.org/10.1016/j.disc.2005.12.017
  • [8] Bova, S., Capelli, F., Mengel, S., Slivovsky, F.: Knowledge compilation meets communication complexity. In: Kambhampati, S. (ed.) Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, IJCAI 2016, New York, NY, USA, 9-15 July 2016. pp. 1008–1014. IJCAI/AAAI Press (2016), http://www.ijcai.org/Abstract/16/147
  • [9] Buss, S., Nordström, J.: Proof complexity and sat solving. Chapter to appear in the 2nd edition of Handbook of Satisfiability, Draft version available at https://www. math. ucsd. edu/  sbuss/ResearchWeb/ProofComplexitySAT (2019)
  • [10] Darwiche, A.: Decomposable negation normal form. J. ACM 48(4), 608–647 (2001). https://doi.org/10.1145/502090.502091, https://doi.org/10.1145/502090.502091
  • [11] Darwiche, A., Marquis, P.: A knowledge compilation map. J. Artif. Intell. Res. 17, 229–264 (2002). https://doi.org/10.1613/jair.989, https://doi.org/10.1613/jair.989
  • [12] Davis, M., Logemann, G., Loveland, D.W.: A machine program for theorem-proving. Commun. ACM 5(7), 394–397 (1962). https://doi.org/10.1145/368273.368557, https://doi.org/10.1145/368273.368557
  • [13] Davis, M., Putnam, H.: A computing procedure for quantification theory. J. ACM 7(3), 201–215 (1960). https://doi.org/10.1145/321033.321034, http://doi.acm.org/10.1145/321033.321034
  • [14] Galesi, N., Talebanfard, N., Torán, J.: Cops-robber games and the resolution of tseitin formulas. ACM Trans. Comput. Theory 12(2), 9:1–9:22 (2020). https://doi.org/10.1145/3378667, https://doi.org/10.1145/3378667
  • [15] Glinskih, L., Itsykson, D.: Satisfiable tseitin formulas are hard for nondeterministic read-once branching programs. In: Larsen, K.G., Bodlaender, H.L., Raskin, J. (eds.) 42nd International Symposium on Mathematical Foundations of Computer Science, MFCS 2017, August 21-25, 2017 - Aalborg, Denmark. LIPIcs, vol. 83, pp. 26:1–26:12. Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2017). https://doi.org/10.4230/LIPIcs.MFCS.2017.26, https://doi.org/10.4230/LIPIcs.MFCS.2017.26
  • [16] Goerdt, A.: Regular resolution versus unrestricted resolution. SIAM J. Comput. 22(4), 661–683 (1993). https://doi.org/10.1137/0222044, https://doi.org/10.1137/0222044
  • [17] Harvey, D.J., Wood, D.R.: Parameters tied to treewidth. J. Graph Theory 84(4), 364–385 (2017). https://doi.org/10.1002/jgt.22030, https://doi.org/10.1002/jgt.22030
  • [18] Itsykson, D., Oparin, V.: Graph expansion, tseitin formulas and resolution proofs for CSP. In: Bulatov, A.A., Shur, A.M. (eds.) Computer Science - Theory and Applications - 8th International Computer Science Symposium in Russia, CSR 2013, Ekaterinburg, Russia, June 25-29, 2013. Proceedings. Lecture Notes in Computer Science, vol. 7913, pp. 162–173. Springer (2013). https://doi.org/10.1007/978-3-642-38536-0_14, https://doi.org/10.1007/978-3-642-38536-0_14
  • [19] Itsykson, D., Riazanov, A., Sagunov, D., Smirnov, P.: Almost tight lower bounds on regular resolution refutations of tseitin formulas for all constant-degree graphs. Electron. Colloquium Comput. Complex. 26,  178 (2019), https://eccc.weizmann.ac.il/report/2019/178
  • [20] Lovász, L., Naor, M., Newman, I., Wigderson, A.: Search problems in the decision tree model. SIAM J. Discret. Math. 8(1), 119–132 (1995). https://doi.org/10.1137/S0895480192233867, https://doi.org/10.1137/S0895480192233867
  • [21] Nordström, J.: On the interplay between proof complexity and SAT solving. ACM SIGLOG News 2(3), 19–44 (2015), https://dl.acm.org/citation.cfm?id=2815497
  • [22] Razgon, I.: On the read-once property of branching programs and cnfs of bounded treewidth. Algorithmica 75(2), 277–294 (2016). https://doi.org/10.1007/s00453-015-0059-x, https://doi.org/10.1007/s00453-015-0059-x
  • [23] Tseitin, G.: On the complexity of derivation in propositional calculus. Studies in Constructive Mathematics and Mathematical Logic Part 2, 115–125 (1968)
  • [24] Urquhart, A.: Hard examples for resolution. J. ACM 34(1), 209–219 (1987). https://doi.org/10.1145/7531.8928, https://doi.org/10.1145/7531.8928
  • [25] Urquhart, A.: A near-optimal separation of regular and general resolution. SIAM J. Comput. 40(1), 107–121 (2011). https://doi.org/10.1137/090772897, https://doi.org/10.1137/090772897
  • [26] Vatshelle, M.: New Width Parameters of Graphs. Ph.D. thesis, Department of Informatics, University of Bergen (2012)
  • [27] Vinyals, M., Elffers, J., Johannsen, J., Nordström, J.: Simplified and improved separations between regular and general resolution by lifting. In: Pulina, L., Seidl, M. (eds.) Theory and Applications of Satisfiability Testing - SAT 2020 - 23rd International Conference, Alghero, Italy, July 3-10, 2020, Proceedings. Lecture Notes in Computer Science, vol. 12178, pp. 182–200. Springer (2020). https://doi.org/10.1007/978-3-030-51825-7_14, https://doi.org/10.1007/978-3-030-51825-7_14