
2 Distributed Quantum Interactive Proofs
1 Introduction
1.1 Distributed Interactive Proofs
In distributed computing, efficient verification of graph properties of the network is useful
from both theoretical and applied aspects. The study of this notion of verification in the
distributed setting has lead to the notion of "distributed
NP
" in analogy with the complexity
class
NP
in centralized computation: A powerful prover provides certificates to each node of
the network in order to convince that the network has a desired property; If the property is
satisfied, all nodes must output "accept", otherwise at least one node must output "reject".
This concept of "distributed
NP
" has been formulated in several ways, including proof-labeling
schemes (PLS) [
17
], non-deterministic local decision (NLD) [
5
], and locally checkable proofs
(LCP) [8].
As a motivating example, consider the problem of verifying whether the network is
bipartite or not. While this problem cannot be solved in
O
(1) round without prover [
27
],
it can easily be solved with a prover telling to each node to each part it belongs to, which
requires only a 1-bit certificate per node, and then each node broadcasting this information
to its adjacent nodes (here the crucial point is that if the network is non-bipartite, then at
least one node will be able to detect it). On the other hand, it is known that there exist
properties that require large certificate size to decide: Göös and Suomela [
8
] have shown that
recognizing symmetric graphs (Sym) and non 3-colorable graphs (
3Col
) require Ω(
n2
)-bit
certificates per node in the framework of LCP (which is tight since all graph properties are
locally decidable by giving the O(n2)-bit adjacency matrix of the graph).
To reduce the length of the certificate for such problems, the notion of distributed
interactive proofs (also called distributed Arthur-Merlin proofs) was recently introduced by
Kol, Oshman and Saxena [
16
] as a generalization of distributed
NP
. In this model there are
two players, the prover (often called Merlin), who has unlimited computational power and
sees the entire network but is untrusted (i.e., can be malicious), and the verifier (often called
Arthur) representing all the nodes of the network, who can perform only local computation
and brief communication with adjacent nodes. Generalizing the concept of distributed
NP
,
the nodes are now allowed to engage in multiple turns of interaction with the prover. As for
distributed
NP
, there are two requirements of the protocol: if the input is legal (yes-instance)
then all nodes must accept with high probability (completeness), and if the input is illegal
then at least one node must reject with high probability (soundness).
In the setting of [
16
], each node has access to a private source of randomness, and sends
generated random bits to the prover in Arthur’s turn. For instance, a 2-turn protocol contains
two interactions: Arthur first queries Merlin by sending a random string from each node,
and then Merlin provides a certificate to each node. After that, nodes exchange messages
with adjacent nodes to decide their outputs. The main complexity measures when studying
distributed interactive protocols are the size of certificates provided to each node, the size of
the random strings generated at each node and the size of the messages exchanged between
nodes. Let us denote
dAM
[
k
](
f
(
n
)) the class of languages that have
k
-turn distributed Arthur-
Merlin protocols where Merlin provides
O
(
f
(
n
))-bit certificates, Arthur generates
O
(
f
(
n
))-bit
random strings at each node and
O
(
f
(
n
))-bit messages are exchanged between nodes. Kol et
al. [
16
] showed the power of interaction by giving a
dMAM
(
log n
) =
dAM
[3](
log n
)protocol
for graph symmetry (Sym) and a
dAMAM
(
nlog n
) =
dAM
[4](
nlog n
)protocol for graph
non-isomorphism (GNI), which are known to require Ω(
n2
)-bit certificate in LCP (see
Appendix A for the definition of these problems).
This model has been further studied in several works. Naor, Parter and Yogev [
23
]