Multi-Prover Interactive Proof Systems with Leakage
2026-05-11 • Computational Complexity
Computational Complexity
AI summaryⓘ
The authors study multi-prover interactive proof systems where multiple provers try to convince a verifier of a statement without communicating. Normally, no communication between provers is allowed, enabling powerful results. They explore what happens if some limited communication (or leakage of information) is allowed between provers. They develop techniques showing these proof systems still work well even with some bounded leakage for important complexity classes like NEXP and RE. Additionally, they link their results to existing concepts in probabilistically checkable proofs (PCPs).
Multi-prover interactive proofs (MIP)NEXPRE (Recursively Enumerable languages)Shared entanglementCommunication leakageParallel repetition theoremPCP (Probabilistically Checkable Proofs)SoundnessComplexity classesSliding Scale Conjecture
Authors
Vahid R. Asadi, Atsuya Hasegawa, François Le Gall
Abstract
It is known that there exist multi-prover interactive protocols ($\mathsf{MIP}$ protocols) for the complexity class $\mathsf{NEXP}$, succinct $\mathsf{MIP}$ protocols for $\mathsf{NP}$ and multi-prover interactive protocols with shared entanglement ($\mathsf{MIP}^\ast$ protocols) for $\mathsf{RE}$. This extraordinary power of multi-prover interactive proof systems comes from the assumption that provers do not communicate with each other during the protocols. If they are allowed to communicate freely, the setting is the same as in the single-prover case, and the computational power of the system becomes significantly weaker. In this paper, we investigate for the first time the setting where communication (i.e., leakage of information) between provers is allowed but bounded. We introduce two techniques to approach this question and show that multi-prover interactive proof systems are robust against some amount of leakage. Our first technique is based on parallel repetition theorems. We apply it to show that for any polynomial $p$, we can construct two-prover one-round $\mathsf{MIP}$ and $\mathsf{MIP}^\ast$ protocols for $\mathsf{NEXP}$ and $\mathsf{RE}$, respectively, that are robust against $p(n)$ bits of leakage. We further derive our second technique to convert any low-soundness PCP construction to a two-prover one-round $\mathsf{MIP}$ protocol for $\mathsf{NP}$ robust against leakage. We also discuss the relation between robustness against leakage in multi-prover interactive proof systems and the Sliding Scale Conjecture in the PCP literature.