Recent from talks
Nothing was collected or created yet.
Arthur–Merlin protocol
View on WikipediaThis article needs additional citations for verification. (July 2016) |
In computational complexity theory, an Arthur–Merlin protocol, introduced by Babai (1985), is an interactive proof system in which the verifier's coin tosses are constrained to be public (i.e. known to the prover too). Goldwasser & Sipser (1986) proved that all (formal) languages with interactive proofs of arbitrary length with private coins also have interactive proofs with public coins.
Given two participants in the protocol called Arthur and Merlin respectively, the basic assumption is that Arthur is a standard computer (or verifier) equipped with a random number generating device, while Merlin is effectively an oracle with infinite computational power (also known as a prover). However, Merlin is not necessarily honest, so Arthur must analyze the information provided by Merlin in response to Arthur's queries and decide the problem itself. A problem is considered to be solvable by this protocol if whenever the answer is "yes", Merlin has some series of responses which will cause Arthur to accept at least 2⁄3 of the time, and if whenever the answer is "no", Arthur will never accept more than 1⁄3 of the time. Thus, Arthur acts as a probabilistic polynomial-time verifier, assuming it is allotted polynomial time to make its decisions and queries.
MA
[edit]The simplest such protocol is the 1-message protocol where Merlin sends Arthur a message, and then Arthur decides whether to accept or not by running a probabilistic polynomial time computation. (This is similar to the verifier-based definition of NP, the only difference being that Arthur is allowed to use randomness here.) Merlin does not have access to Arthur's coin tosses in this protocol, since it is a single-message protocol and Arthur tosses his coins only after receiving Merlin's message. This protocol is called MA. Informally, a language L is in MA if for all strings in the language, there is a polynomial sized proof that Merlin can send Arthur to convince him of this fact with high probability, and for all strings not in the language there is no proof that convinces Arthur with high probability.
Formally, the complexity class MA is the set of decision problems that can be decided in polynomial time by an Arthur–Merlin protocol where Merlin's only move precedes any computation by Arthur. In other words, a language L is in MA if there exists a polynomial-time deterministic Turing machine M and polynomials p, q such that for every input string x of length n = |x|,
- if x is in L, then
- if x is not in L, then
The second condition can alternatively be written as
- if x is not in L, then
To compare this with the informal definition above, z is the purported proof from Merlin (whose size is bounded by a polynomial) and y is the random string that Arthur uses, which is also polynomially bounded.
AM
[edit]The complexity class AM (or AM[2]) is the set of decision problems that can be decided in polynomial time by an Arthur–Merlin protocol with two messages. There is only one query/response pair: Arthur tosses some random coins and sends the outcome of all his coin tosses to Merlin, Merlin responds with a purported proof, and Arthur deterministically verifies the proof. In this protocol, Arthur is only allowed to send outcomes of coin tosses to Merlin, and in the final stage Arthur must decide whether to accept or reject using only his previously generated random coin flips and Merlin's message.
In other words, a language L is in AM if there exists a polynomial-time deterministic Turing machine M and polynomials p, q such that for every input string x of length n = |x|,
- if x is in L, then
- if x is not in L, then
The second condition here can be rewritten as
- if x is not in L, then
As above, z is the alleged proof from Merlin (whose size is bounded by a polynomial) and y is the random string that Arthur uses, which is also polynomially bounded.
The complexity class AM[k] is the set of problems that can be decided in polynomial time, with k queries and responses. AM as defined above is AM[2]. AM[3] would start with one message from Merlin to Arthur, then a message from Arthur to Merlin and then finally a message from Merlin to Arthur. The last message should always be from Merlin to Arthur, since it never helps for Arthur to send a message to Merlin after deciding his answer.
Properties
[edit]
- Both MA and AM remain unchanged if their definitions are changed to require perfect completeness, which means that Arthur accepts with probability 1 (instead of 2/3) when x is in the language.[1]
- For any constant k ≥ 2, the class AM[k] is equal to AM[2]. If k can be polynomially related to the input size, the class AM[poly(n)] is equal to the class, IP, which is known to be equal to PSPACE and is widely believed to be stronger than the class AM[2].
- MA is contained in AM, since AM[3] contains MA: Arthur can, after receiving Merlin's certificate, flip the required number of coins, send them to Merlin, and ignore the response.
- It is open whether AM and MA are different. Under plausible circuit lower bounds (similar to those implying P=BPP), they are both equal to NP.[2]
- AM is the same as the class BP⋅NP where BP denotes the bounded-error probabilistic operator. Also, ( also written as ExistsBPP) is a subset of MA. Whether MA is equal to is an open question.
- The conversion to a private coin protocol, in which Merlin cannot predict the outcome of Arthur's random decisions, will increase the number of rounds of interaction by at most 2 in the general case. So the private-coin version of AM is equal to the public-coin version.
- MA contains both NP and BPP. For BPP this is immediate, since Arthur can simply ignore Merlin and solve the problem directly; for NP, Merlin need only send Arthur a certificate, which Arthur can validate deterministically in polynomial time.
- Both MA and AM are contained in the polynomial hierarchy. In particular, MA is contained in the intersection of Σ2P and Π2P and AM is contained in Π2P. Even more, MA is contained in subclass SP
2,[3] a complexity class expressing "symmetric alternation". This is a generalization of Sipser–Lautemann theorem. - AM is contained in NP/poly, the class of decision problems computable in non-deterministic polynomial time with a polynomial size advice. The proof is a variation of Adleman's theorem.
- MA is contained in PP; this result is due to Vereshchagin.[4]
- MA is contained in its quantum version, QMA.[5]
- AM contains the problem of deciding if two graphs are not isomorphic. The protocol using private coins is the following and can be transformed to a public coin protocol. Given two graphs G and H, Arthur randomly chooses one of them, and chooses a random permutation of its vertices, presenting the permuted graph I to Merlin. Merlin has to answer if I was created from G or H. If the graphs are nonisomorphic, Merlin will be able to answer with full certainty (by checking if I is isomorphic to G). However, if the graphs are isomorphic, it is both possible that G or H was used to create I, and equally likely. In this case, Merlin has no way to tell them apart and can convince Arthur with probability at most 1/2, and this can be amplified to 1/4 by repetition. This is in fact a zero knowledge proof.
- If AM contains coNP then PH = AM. This is evidence that graph isomorphism is unlikely to be NP-complete, since it implies collapse of polynomial hierarchy.
- It is known, assuming ERH, that for any d the problem "Given a collection of multivariate polynomials each with integer coefficients and of degree at most d, do they have a common complex zero?" is in AM.[6]
References
[edit]- ^ For a proof, see Rafael Pass and Jean-Baptiste Jeannin (March 24, 2009). "Lecture 17: Arthur-Merlin games, Zero-knowledge proofs" (PDF). Retrieved June 23, 2010.
- ^ Impagliazzo, Russell; Wigderson, Avi (1997-05-04). P = BPP if E requires exponential circuits: derandomizing the XOR lemma. ACM. pp. 220–229. doi:10.1145/258533.258590. ISBN 0897918886. S2CID 18921599.
- ^ "Symmetric Alternation captures BPP" (PDF). Ccs.neu.edu. Retrieved 2016-07-26.
- ^ Vereschchagin, N.K. (1992). "On the power of PP". [1992] Proceedings of the Seventh Annual Structure in Complexity Theory Conference. pp. 138–143. doi:10.1109/sct.1992.215389. ISBN 081862955X. S2CID 195705029.
- ^ Vidick, Thomas; Watrous, John (2016). "Quantum Proofs". Foundations and Trends in Theoretical Computer Science. 11 (1–2): 1–215. arXiv:1610.01664. doi:10.1561/0400000068. ISSN 1551-305X. S2CID 54255188.
- ^ "Course: Algebra and Computation". People.csail.mit.edu. Retrieved 2016-07-26.
Bibliography
[edit]- Babai, László (1985), "Trading group theory for randomness", STOC '85: Proceedings of the seventeenth annual ACM symposium on Theory of computing, ACM, pp. 421–429, ISBN 978-0-89791-151-1.
- Goldwasser, Shafi; Sipser, Michael (1986), "Private coins versus public coins in interactive proof systems", STOC '86: Proceedings of the eighteenth annual ACM symposium on Theory of computing, ACM, pp. 59–68, ISBN 978-0-89791-193-1.
- Arora, Sanjeev; Barak, Boaz (2009), Computational Complexity: A Modern Approach, Cambridge, ISBN 978-0-521-42426-4.
- Madhu Sudan's MIT course on advanced complexity
External links
[edit]Arthur–Merlin protocol
View on GrokipediaFundamentals
Interactive Proof Systems
An interactive proof system (IP) is a two-party protocol modeled as a game between a computationally bounded verifier, often denoted as Arthur, who runs in probabilistic polynomial time, and an unbounded prover, denoted as Merlin, who possesses unlimited computational power. The interaction proceeds over a polynomial number of rounds, during which the parties exchange messages, allowing the prover to convince the verifier of the truth of a statement in a language based on a common input . The verifier's goal is to accept if (a "yes-instance") and reject if (a "no-instance"), with the protocol's security relying on probabilistic guarantees rather than deterministic certainty.[7] The protocol satisfies completeness: for every yes-instance , there exists a prover strategy such that the verifier accepts with probability at least over its random coins. Conversely, it ensures soundness: for every no-instance , no prover strategy (even a malicious one) can make the verifier accept with probability greater than . These error probabilities can be reduced arbitrarily by repetition, and the constants and are conventional thresholds that capture the essential asymmetry in power between the parties.[7] Interactive proof systems were introduced by Shafi Goldwasser, Silvio Micali, and Charles Rackoff in 1985, originally in the context of zero-knowledge proofs, extending earlier notions of proof verification to interactive settings and laying the foundation for complexity classes like IP.[7] A classic example is the graph non-isomorphism problem, where the input consists of two graphs and on vertices, and the prover aims to convince the verifier that and are not isomorphic. The verifier selects a random bit , applies a random permutation to , and sends the resulting graph to the prover, who responds with the bit indicating which original graph was permuted; the verifier accepts if . If the graphs are non-isomorphic, the prover can always respond correctly by checking isomorphism against both and , ensuring completeness; soundness holds because if the graphs are isomorphic, the prover has only a chance of guessing correctly per round, and repetition amplifies the error. This protocol demonstrates how interaction enables proofs for problems outside NP without revealing additional information.[8]Public-Coin Protocols
In public-coin interactive proof systems, the verifier's messages consist solely of random strings, known as coin tosses, which are publicly visible to the prover. This model contrasts with private-coin protocols, where the verifier's randomness is concealed within computationally generated messages that may depend on prior prover responses, potentially allowing for more succinct or powerful interactions but complicating theoretical analysis.[9] A seminal result by Goldwasser and Sipser demonstrates that any private-coin interactive proof can be efficiently simulated by a public-coin protocol with only a constant increase in the number of rounds, while preserving the completeness and soundness parameters. This simulation theorem implies that public-coin protocols are as expressive as their private-coin counterparts for defining the class of languages with interactive proofs, thereby establishing the sufficiency of public coins for most applications in complexity theory.[9] The public-coin model simplifies the study of interactive proofs by making the verifier's behavior fully transparent and random, which facilitates proofs of containment within complexity classes and enables the development of the Arthur-Merlin paradigm, where the verifier (Arthur) issues random challenges and the prover (Merlin) responds accordingly. Some public-coin protocols achieve perfect completeness, meaning that for yes-instances, the verifier accepts with probability exactly 1, enhancing their utility in settings requiring deterministic acceptance on valid inputs.[9]MA Protocol
Formal Definition
The Merlin–Arthur (MA) protocol is a one-message interactive proof system in which the prover (Merlin) sends a proof string to the verifier (Arthur), who then generates private random bits (where and are polynomials in the input length ) and decides acceptance using a probabilistic polynomial-time verifier that outputs 1 (accept) or 0 (reject).[10] Unlike AM protocols, where randomness is public and sent to Merlin, in MA the verifier's random bits are private and used only for internal verification.[11] This structure was originally formulated by Babai in 1985 as a framework related to nondeterministic verification with probabilistic checking.[2] A language belongs to the complexity class MA (equivalently, MA[3], denoting the constant-round variant with Merlin starting) if there exist polynomials and , and verifier such that:- Completeness: For every , there exists such that where the probability is over Arthur's uniform random choice of private bits , and the existential quantifier holds via an unbounded prover strategy.
- Soundness: For every and every proof (from any prover strategy),
Examples
The inclusion of NP in MA follows directly from the structure of nondeterministic verification. For any language L in NP, Merlin sends a polynomial-length witness π that certifies x ∈ L, and Arthur, upon receiving π, runs the deterministic polynomial-time verifier from the NP machine to check if π is valid for x; if it is, Arthur accepts, otherwise rejects.[14] Although Arthur's randomness is not utilized in this protocol, the model permits it, allowing the acceptance probability to be exactly 1 for yes-instances and 0 for no-instances.[14] Similarly, BPP is contained in MA, as Arthur can disregard any message from Merlin (or treat a dummy empty proof) and simply execute the bounded-error probabilistic polynomial-time algorithm for the BPP language using his own private random coins.[14] This yields the standard two-sided error probabilities of at most 1/3 for incorrect decisions, which can be amplified to negligible error via repetition if needed.[14] Graph isomorphism provides a concrete illustration of an MA protocol, as the problem lies in NP and thus inherits the inclusion. Given two graphs G and H on n vertices, if they are isomorphic, Merlin sends a permutation π of the vertices; Arthur verifies by applying π to G and checking if the resulting adjacency matrix equals that of H, which takes O(n^2) time.[14] For non-isomorphic graphs, no such π exists, so Arthur rejects any purported proof with probability 1. An MA variant leverages witnesses for related promise problems, though the core verification remains deterministic.[14] For the NP-complete problem of 3-coloring a graph, an MA protocol uses deterministic verification: Merlin sends a purported 3-coloring c of the vertices; Arthur checks all edges to ensure no edge connects two vertices of the same color under c. If G is 3-colorable, a valid c ensures acceptance with probability 1; if not, Arthur rejects any invalid c with probability 1. While randomness is not necessary here (as in the NP inclusion), the MA model allows probabilistic verification as demonstrated in the BPP example. Despite these inclusions, MA does not capture the full power of the related AM class, as there exists an oracle relative to which MA is a proper subset of AM. This relativized separation, constructed using diagonalization techniques, highlights fundamental differences in the interactive capabilities between single-message Merlin-Arthur protocols and two-message Arthur-Merlin ones.AM Protocol
Formal Definition
The Arthur–Merlin (AM) protocol is a two-message public-coin interactive proof system in which the verifier (Arthur) initiates communication by sending a random challenge string to the prover (Merlin), where is a polynomial in the input length ; Merlin then responds with a proof string , and Arthur decides acceptance using a polynomial-time deterministic verifier that outputs 1 if the input , challenge , and proof are accepted.[10] This structure was originally formulated by Babai in 1985 as a framework where Merlin responds to Arthur's random "questions" in the form of coin tosses represented by .[2] A language belongs to the complexity class AM (equivalently, AM[3], denoting the constant-round two-message variant) if there exist a polynomial and verifier such that:- Completeness: For every , where the probability is over Arthur's uniform random choice of , and there exists an unbounded prover strategy ensuring the existential quantifier holds for a sufficient fraction of challenges.
- Soundness: For every and every (possibly malicious) prover strategy mapping challenges to proofs (i.e., for some polynomial ),
Relation to MA
The Arthur–Merlin (AM) protocol extends the Merlin–Arthur (MA) protocol by allowing the verifier (Arthur) to send a public random string before receiving the prover's (Merlin's) message, enabling Merlin to adapt the proof based on the randomness. This added interactivity makes AM strictly more powerful than MA in certain settings. To demonstrate the inclusion MA ⊆ AM, consider an MA protocol for a language L with perfect completeness and soundness at most 1/2. In the corresponding AM protocol, Arthur generates and sends a dummy random string y of polynomial length, which Merlin ignores and responds with the fixed MA proof π that accepts with probability 1 for all internal randomness r if x ∈ L. The verifier then discards y, independently samples its own random string r, and runs the MA verifier on (x, π, r). For completeness, acceptance occurs with probability 1 over r (and y is irrelevant). For soundness, regardless of how Merlin chooses π (possibly depending on y), the acceptance probability over r is at most 1/2 by the MA soundness condition, so the overall probability over y and r is at most 1/2. This simulation preserves the error probabilities up to constant factors via padding the input or random string lengths if needed.[15] Although MA ⊆ AM holds unconditionally, the converse does not, and AM properly contains MA relative to certain oracles. Specifically, there exist oracles A such that MA^A ⊊ AM^A, establishing that the inclusion is proper in the relativized world. These oracle separations, dating back to results in the 1980s, highlight the additional power of public randomness in AM, as Merlin can condition the proof on Arthur's message in ways not possible in MA.[16] A canonical example illustrating AM's greater expressive power is the graph non-isomorphism problem (GNI), which lies in AM but is not known to be in MA. GNI consists of pairs of n-vertex graphs (G_0, G_1) promised to be non-isomorphic, where the goal is to verify the promise. The AM protocol proceeds as follows: Arthur selects a random bit b ∈ {0,1} and a random permutation π of the vertex set , computes the relabeled graph π(G_b) (by permuting the adjacency matrix accordingly), and sends the adjacency matrix of π(G_b) to Merlin. Merlin responds with a bit b' indicating which original graph (G_0 or G_1) the received matrix derives from. Arthur accepts if b' = b and rejects otherwise. For completeness, if G_0 ≇ G_1, then π(G_0) ≇ π(G_1) for any π, so an honest Merlin can always distinguish the received matrix and return the correct b', yielding acceptance probability 1. For soundness, if G_0 ≅ G_1, then the distributions of π(G_0) and π(G_1) are identical (since isomorphisms preserve the action of permutations), so any Merlin guesses b correctly with probability at most 1/2; repeating the protocol O(log n) times in parallel reduces the soundness error to negligible. This protocol, introduced by Babai, demonstrates AM's ability to verify properties requiring adaptive proofs based on public randomness.[17] The inclusion of GNI in AM has broader implications: AM captures promise problems like GNI, which belong to coNP but lack known MA protocols, suggesting AM's capacity to handle coNP-type verifications beyond NP via public-coin interaction. Goldwasser and Sipser showed that any private-coin interactive proof can be simulated by a public-coin protocol with a constant increase in the number of rounds.[9] Babai and Moran established that for any constant k ≥ 2, AM = AM[3].[2] This equivalence underscores AM's foundational role in interactive proof systems.Advanced Variants
Multi-Round Protocols
Multi-round Arthur–Merlin protocols generalize the two-round AM protocol by allowing multiple alternations between Arthur's random messages (public coins) and Merlin's deterministic responses. The class AM is defined as the set of languages recognized by public-coin interactive protocols consisting of k messages, where k is odd and Merlin sends the first (and last) message, with Arthur's messages being random strings and Merlin's being proofs based on the input and prior messages. Note: Some sources, including the article introduction, reverse the starting player for AM and MA; here we follow Babai's original definition. This structure ensures the verifier (Arthur) remains probabilistic polynomial-time while the prover (Merlin) is computationally unbounded.[1] The AM hierarchy, denoted AM for constant k and AM[poly] for polynomial k, was introduced by László Babai in the mid-1980s as part of his work on randomized proof systems for graph isomorphism and related problems, progressing from the two-round AM[3] case to protocols with polynomially many rounds to capture broader complexity classes. Babai showed that the hierarchy collapses for constant rounds, with AM = AM[3] for any constant k ≥ 2, but multi-round variants extend the power significantly.[1] The class AM[poly], featuring polynomially many rounds, is equivalent to the interactive proof class IP, which allows general (private-coin) interactive protocols with polynomial rounds; this equivalence holds because public coins can simulate private coins with only a linear increase in rounds. Adi Shamir established in 1992 that IP = AM[poly] = PSPACE, demonstrating that any language in PSPACE admits a multi-round Arthur–Merlin protocol verifiable in polynomial time. Shamir's proof constructs an interactive protocol for quantified Boolean formulas (TQBF), the canonical PSPACE-complete problem, by arithmetizing the formula into a polynomial and using interactive techniques to verify its value.[18] A key building block in Shamir's theorem and related results is the sumcheck protocol, a multi-round AM protocol introduced by Carsten Lund, Lance Fortnow, Howard Karloff, and Noam Nisan in 1992. The sumcheck protocol enables Arthur to verify whether the sum of a given multivariate polynomial of degree at most over the Boolean hypercube equals a claimed value , through interactive rounds where Merlin provides univariate restrictions of and Arthur challenges with random points to reduce the problem dimension by one each time. This protocol has soundness error at most when performed over a finite field with (to ensure the error is small, typically is chosen much larger, e.g., ). It serves as a foundational tool for approximating #SAT—the problem of counting satisfying assignments—by arithmetizing the permanent or other counting functions and iteratively summing over variables.[19] While AM[poly] fully captures PSPACE, round reduction techniques show that fewer rounds suffice under certain conditions. Constant-round AM protocols are known to characterize PSPACE assuming the existence of one-way functions or related cryptographic primitives, via black-box simulations and parallel repetition. Unconditionally, AM protocols with rounds equal IP, achieved through iterative applications of linear round speed-up arguments that halve the number of rounds while preserving polynomial-time verifiability and soundness.[20]Quantum Variants
Quantum variants of Arthur–Merlin protocols adapt the classical framework to quantum computing, where Merlin provides quantum proofs and Arthur performs quantum measurements to verify claims with high probability. The class QMA, the quantum analogue of MA, consists of decision problems where a quantum polynomial-time verifier Arthur accepts "yes" instances with probability at least 2/3 if Merlin supplies an accepting quantum proof state, and rejects "no" instances with probability at most 1/3 regardless of the proof; formally, for input of length , there exists a polynomial-time quantum verifier such that if , there is a quantum state on poly() qubits where , and if , for all , .[21][22] This class was introduced by Kitaev in 1999.[21] A related class is QAM (or quantum AM), which extends the public-coin model to quantum settings with two messages: Arthur sends classical random bits to Merlin, who responds with a quantum proof, and Arthur then verifies via quantum computation.[23] QAM protocols maintain the completeness-soundness gap of the classical AM while incorporating quantum superposition in proofs and verification. It is known that QMA QAM QIP, where QIP denotes quantum interactive proofs with unrestricted quantum message exchanges; furthermore, QIP = PSPACE.[23][24] A representative example in QMA is quantum state certification, where Merlin prepares a purported quantum state claimed to be close to a target state (e.g., a graph state or eigenvector of a Hamiltonian), and Arthur verifies by applying a polynomial-time quantum circuit (such as a unitary transformation) followed by measurements in the computational basis to check consistency with the promise.[22] This captures problems like approximating the ground state energy of local Hamiltonians, which is QMA-complete.[22] In 2016, Vidick and Watrous provided a comprehensive survey on quantum proofs, establishing QMA-completeness for additional problems such as verifying entangled projection games and certain quantum constraint satisfaction instances, though significant open questions remain regarding separations and further completeness results post-2016. Since 2016, further QMA-complete problems have been identified, including certain quantum games and constraint systems (e.g., Ji, 2017; surveys up to 2025), while oracle separations like QMA \not\subseteq QCMA under random oracles highlight structural differences (Aaronson et al., 2024).[22]Complexity Properties
Class Inclusions
The Merlin-Arthur class MA contains NP, since any nondeterministic witness for a yes-instance in NP can be sent by Merlin to Arthur, who verifies it deterministically without randomness. Similarly, coRP is contained in MA: for a coRP language, Merlin sends a purported witness that the input is a no-instance, and Arthur's randomized verification rejects with high probability only if the witness is invalid, leveraging the one-sided error of coRP.[25] These inclusions position MA as a probabilistic extension of NP that incorporates verifier randomness while maintaining soundness. MA is strictly contained in AM relative to certain oracles. A relativizing proof constructs an oracle such that , demonstrating that the order of Merlin's nondeterministic message and Arthur's random coins can lead to separations in relativized worlds. Unconditionally, MA AM holds via the following simulation: Merlin sends the witness as in the MA protocol, Arthur sends his random bits publicly, Merlin sends a dummy message, and Arthur verifies as in the original MA protocol using the public bits.[26] Furthermore, BPP MA, as shown by amplifying the success probability of a BPP algorithm and using Merlin to certify low-error regions in the random string space, effectively derandomizing via nondeterminism.[25] AM is contained in the polynomial hierarchy PH, specifically AM , through Babai's 1985 result that interprets the AM protocol as an existential quantification over Merlin's message followed by a universal quantification over Arthur's coins, with the verifier's acceptance condition forming a polynomial-time predicate. This places AM within the second level of PH. Additionally, AM IP PSPACE, since the public-coin two-message AM protocol extends naturally to the general interactive proof model IP, which equals PSPACE by Shamir's theorem via arithmetization techniques for quantified Boolean formulas. Relative to random oracles, AM may separate from PH, but unconditional equality remains open, as does whether AM equals NP or coNP—a question unresolved since the introduction of these classes in the 1980s.Complete Problems
Graph non-isomorphism, the promise problem of deciding whether two given graphs are non-isomorphic, resides in the complexity class AM but is not known to be in MA. In the canonical AM protocol for this problem, Arthur and Merlin interact over two rounds to demonstrate the absence of an isomorphism. Merlin commits to an isomorphism between one of the input graphs and a random isomorphic copy , while Arthur challenges Merlin to open the commitment on a random vertex or edge to verify consistency; if the graphs are isomorphic, Merlin succeeds with probability at most , but if non-isomorphic, Merlin can always succeed by choosing an appropriate invariant.[27] This protocol, introduced in the context of zero-knowledge proofs, highlights the power of public randomness in AM over the private-witness model of MA. In contrast, the promise version of graph isomorphism—deciding whether two graphs are isomorphic given the promise that they either are or are not—lies in MA. Merlin simply provides a purported isomorphism as a witness, which Arthur verifies deterministically in polynomial time by checking that the mapping preserves adjacency for all edges. This places graph isomorphism in MA (and more precisely in NP), but its complement requires the interactive structure of AM. MA-complete problems illustrate the expressive power of the class through natural combinatorial promise problems. One such problem is the Approximately-Clean Approximate-Connected-Component (ACAC), where, given a succinctly represented graph with marked vertices and parameters , one decides whether there exists a connected component consisting entirely of unmarked vertices or whether every -approximate connected component contains at least an -fraction of marked vertices. ACAC is in MA via a verification protocol using random walks to sample components, and it is MA-hard by reduction from the Set-Constraint Satisfaction Problem (SetCSP).[28] SetCSP generalizes constraint satisfaction by allowing constraints over sets of strings rather than single assignments; given a set of strings and set-constraints, decide if satisfies all constraints or is -far from any satisfying set under Hamming distance. SetCSP is MA-complete, with membership shown via reduction to ACAC and hardness from the universal MA verification problem.[28] Another MA-complete problem arises in quantum-inspired settings: the Local Hamiltonian Problem with succinct ground state (promise version). Here, given a local Hamiltonian on qubits and promise gaps , decide if the ground state energy or , with the additional promise that in the yes case, the ground state is succinctly representable by a polynomial-size classical circuit. This is in MA because Merlin provides the circuit description, and Arthur uses randomized classical sampling (via quantum Monte Carlo simulation with a Markov chain) to estimate the energy with high probability. Hardness follows from encoding arbitrary MA instances into Hamiltonians where the succinct ground state corresponds to a valid witness.[29] While the standard Local Hamiltonian without succinctness is QMA-complete, this variant underscores MA's role in verifiable quantum ground states under classical succinctness assumptions.[30] AM protocols demonstrate hardness for certain quantified satisfiability variants, such as promise problems involving alternating existential and universal quantifiers over Boolean formulas, which capture the interactive quantification in AM. These variants are AM-hard under polynomial-time reductions, as they simulate the two-message structure where Merlin provides an existential witness and Arthur's randomness enforces universal checks. More broadly, AM relates to probabilistically checkable proofs (PCPs) via a PCP characterization: a 2-round stochastic constraint-satisfaction problem is complete for the promise version of AM, analogous to the PCP theorem's characterization of NP. This connection shows that AM protocols can verify PCPs for NP problems with constant query complexity and randomness, amplifying the class's power for interactive verification.[31] A key application of AM protocols lies in approximating functions in #P, the class of counting problems. The sumcheck protocol enables an AM proof system where Merlin convinces Arthur that the sum of a low-degree multivariate polynomial over a boolean hypercube equals a claimed value, with Arthur's random challenges reducing the sum to univariate evaluations. This protocol, run in multiple rounds, approximates #SAT (counting satisfying assignments) within a multiplicative factor, placing approximate #P in AM under interactive oracle access. The verifier uses randomness and communication, highlighting AM's efficiency for counting beyond deterministic verification.[19]Recent Developments
Fine-Grained Applications
In fine-grained complexity theory, recent advancements have leveraged Merlin-Arthur (MA) protocols to establish improved verification procedures for central problems, providing tighter connections between probabilistic verification and deterministic computation under standard hardness assumptions. A seminal contribution is the development of MA protocols achieving near-optimal running times for problems like the Orthogonal Vectors (OV) problem, where detecting an orthogonal pair among n vectors in d dimensions (with d = ω(log n)) can be verified in Õ(n d) time, surpassing previous nondeterministic bounds and aligning with the quadratic baseline under the OV conjecture.[32] For graph-theoretic problems, MA protocols have enabled subquadratic verification for all-pairs shortest paths (APSP), where the entire n × n distance matrix can be certified in Õ(n²) total time, optimal given the output size, but with Arthur's verification step avoiding the full O(n^3) matrix multiplication overhead through Merlin's succinct proof of intermediate distances.[32] This improves upon earlier nondeterministic approaches requiring Õ(n^{2.94}) time and highlights MA's utility in batch-verifying dense graph computations.[32] In the context of satisfiability, an observation establishes that no algebrizing MA protocol exists for k-SAT (or equivalently, k-UNSAT) running in time below 2^{n/2} / n^{ω(1)}, distinguishing algebraic proof techniques from non-algebrizing ones needed for subexponential verification of k-UNSAT in 2^{n(1/2 - δ/k)} · poly(n, m) time.[32] Extending these to Arthur-Merlin (AM) protocols, instance-wise hardness results from 2025 reveal near-equivalences between nondeterministic refutation and derandomization, showing that derandomizing AM protocols on hard instances implies efficient refuters for AM-complete languages, analogous to BPP but adapted to interactive settings with public randomness. These equivalences tighten bounds on the power of AM versus MA in fine-grained regimes, suggesting potential separations under assumptions like the Strong Exponential Time Hypothesis (SETH), where AM may not collapse to MA for problems requiring multiple rounds or private coins. Overall, such results, building on ITCS 2022 innovations, underscore MA/AM's role in bridging fine-grained hardness conjectures with practical verification efficiency.[33]Other Models
The Arthur–Merlin protocol has been extended to the streaming model of computation, where the input arrives as a sequential data stream that Arthur processes in a single pass while maintaining limited working memory. In this framework, termed Arthur-Merlin streaming complexity, Merlin provides an initial proof or annotation to Arthur before the stream begins, enabling verification of properties that would otherwise require substantial space in classical randomized streaming algorithms. Foundational work by Chakrabarti, Cormode, McGregor, Thaler, and Venkataraman established verifiable stream computation protocols using Arthur-Merlin communication, demonstrating that one or two rounds of interaction suffice for solving query problems like estimating the number of distinct elements in a stream.[34] A canonical Arthur-Merlin streaming algorithm, developed by Gur and Raz, applies to a range of streaming problems, including those related to identity testing (verifying if a stream matches a known distribution) and closeness testing (comparing two empirical distributions from streams). In this protocol, Merlin sends compact sketches, such as evaluations of polynomials over finite fields that encode the stream's statistical properties, with proof length for a parameter . Arthur then streams the input, using space to generate random evaluation points and verify if the stream's partial computations match Merlin's sketches at those points; mismatch leads to rejection with high probability. For instance, in the Distinct Elements problem—which underpins support size estimation for identity testing—the algorithm achieves an optimal tradeoff where for universe size , allowing Arthur to use polylogarithmic space when Merlin provides a longer proof. These protocols demonstrate that Arthur-Merlin streaming captures greater expressive power than classical streaming BPP, solving problems like frequency moments estimation in space that require space in BPP alone.[35] In quantum settings, Arthur-Merlin protocols have evolved to address state synthesis and verification tasks beyond classical streams. A 2025 development by Delavenne, Le Gall, Liu, and Miyamoto introduced stateQMA, a variant of quantum Merlin-Arthur where Merlin prepares a quantum state as proof, and Arthur verifies whether it enables efficient synthesis of target states for problems like quantum circuit synthesis. This fills post-2016 gaps in QMA variants for quantum state tomography, where protocols now support efficient reconstruction and verification of high-dimensional states using shadow tomography techniques integrated into Merlin-Arthur frameworks. For example, verifying a uniform superposition state in quantum AM involves Merlin providing the purported state, with Arthur performing random basis measurements to confirm equal amplitudes across the support, succeeding with constant soundness error.[36][37]References
- E. M. Luks, The complexity of fixed valence graph isomorphism and the implications for general graph isomorphism, in preparation. Google Scholar.
