BRICS. Maker-Maker and Maker-Breaker Games are PSPACE-Complete. BRICS RS-04-14 J. M. Byskov: Maker-Maker and Maker-Breaker Games are PSPACE-Complete



Similar documents
BRICS. Maximum Exact Satisfiability: NP-completeness Proofs and Exact Algorithms

Partially Persistent Data Structures of Bounded Degree with Constant Update Time

Lecture 1: Oracle Turing Machines

BRICS. Research. Centre. and. International. PhD. School. in Computer Science. BRICS Basic Research

Lecture 2: Complexity Theory Review and Interactive Proofs

[2] L. Bækgaard and J.C. Godskesen. Real-time events control in active databases. Journal of Systems and Software, 42(3): , August 1998.

ALGEBRA 2 CRA 2 REVIEW - Chapters 1-6 Answer Section

The New Mexico Lottery

The positive minimum degree game on sparse graphs

Introduction to Logic in Computer Science: Autumn 2006

Curriculum Vitae. Jens Chr. Godskesen. IT University of Copenhagen Rued Langgaards Vej 7, DK-2300 Copenhagen S, Denmark

Complexity Theory. Jörg Kreiker. Summer term Chair for Theoretical Computer Science Prof. Esparza TU München

Revised Version of Chapter 23. We learned long ago how to solve linear congruences. ax c (mod m)

Algebra 1 Course Title

DETERMINANTS IN THE KRONECKER PRODUCT OF MATRICES: THE INCIDENCE MATRIX OF A COMPLETE GRAPH

Week 4: Gambler s ruin and bold play

TAKE-AWAY GAMES. ALLEN J. SCHWENK California Institute of Technology, Pasadena, California INTRODUCTION

Lecture 7: NP-Complete Problems

9.2 Summation Notation

CORRELATED TO THE SOUTH CAROLINA COLLEGE AND CAREER-READY FOUNDATIONS IN ALGEBRA

CS 3719 (Theory of Computation and Algorithms) Lecture 4

If A is divided by B the result is 2/3. If B is divided by C the result is 4/7. What is the result if A is divided by C?

Florida Algebra 1 End-of-Course Assessment Item Bank, Polk County School District

What are the place values to the left of the decimal point and their associated powers of ten?

Bounded-width QBF is PSPACE-complete

Degree Hypergroupoids Associated with Hypergraphs

WHAT ARE MATHEMATICAL PROOFS AND WHY THEY ARE IMPORTANT?

THE NUMBER OF GRAPHS AND A RANDOM GRAPH WITH A GIVEN DEGREE SEQUENCE. Alexander Barvinok

Cloud Computing is NP-Complete

I d Rather Stay Stupid: The Advantage of Having Low Utility

Determination of the normalization level of database schemas through equivalence classes of attributes

Mathematical Induction. Mary Barnes Sue Gordon

Chapter 4, Arithmetic in F [x] Polynomial arithmetic and the division algorithm.

Mathematical Induction. Lecture 10-11

Indiana State Core Curriculum Standards updated 2009 Algebra I

Examples of Tasks from CCSS Edition Course 3, Unit 5

2.5 Zeros of a Polynomial Functions

Lecture 17 : Equivalence and Order Relations DRAFT

In the Herb Business, Part III Factoring and Quadratic Equations

Bounded Cost Algorithms for Multivalued Consensus Using Binary Consensus Instances

Zeros of Polynomial Functions

Lecture 22: November 10

Continued Fractions. Darren C. Collins

Mathematics for Computer Science/Software Engineering. Notes for the course MSM1F3 Dr. R. A. Wilson

Over the past few years, management in

A NOTE ON OFF-DIAGONAL SMALL ON-LINE RAMSEY NUMBERS FOR PATHS

ON FUNCTIONAL SYMBOL-FREE LOGIC PROGRAMS

A Graph-Theoretic Network Security Game

FACTORING POLYNOMIALS IN THE RING OF FORMAL POWER SERIES OVER Z

6.042/18.062J Mathematics for Computer Science December 12, 2006 Tom Leighton and Ronitt Rubinfeld. Random Walks

Probability and Expected Value

How to Win at Tic-Tac-Toe

Lab 2.1 Tracking Down the Bugs

CONTINUED FRACTIONS AND FACTORING. Niels Lauritzen

Linear Programming: Chapter 11 Game Theory

MA 1125 Lecture 14 - Expected Values. Friday, February 28, Objectives: Introduce expected values.

COMMUTATIVITY DEGREES OF WREATH PRODUCTS OF FINITE ABELIAN GROUPS

Non-Black-Box Techniques In Crytpography. Thesis for the Ph.D degree Boaz Barak

Types of Degrees in Bipolar Fuzzy Graphs

CHAPTER 7 GENERAL PROOF SYSTEMS

Determinants in the Kronecker product of matrices: The incidence matrix of a complete graph

The GMAT Guru. Prime Factorization: Theory and Practice

Reading 13 : Finite State Automata and Regular Expressions

11 Ideals Revisiting Z

An Innocent Investigation

How To Solve An Npa-Complete Problems With Quantum Computing And Chaotic Dynamics

High School Algebra Reasoning with Equations and Inequalities Solve equations and inequalities in one variable.

Russell Hunter Publishing Inc

CHAPTER 3. Methods of Proofs. 1. Logical Arguments and Formal Proofs

CS 598CSC: Combinatorial Optimization Lecture date: 2/4/2010

Generating models of a matched formula with a polynomial delay

Complexity Results for 1-safe Nets

each college c i C has a capacity q i - the maximum number of students it will admit

Course Manual Automata & Complexity 2015

WRITING PROOFS. Christopher Heil Georgia Institute of Technology

A Second Course in Mathematics Concepts for Elementary Teachers: Theory, Problems, and Solutions

Integer roots of quadratic and cubic polynomials with integer coefficients

Student Guide and Syllabus for MAT100 Introductory Algebra

Probabilità e Nondeterminismo nella teoria dei domini

EFFICIENT KNOWLEDGE BASE MANAGEMENT IN DCSP

A Game Theoretical Framework for Adversarial Learning

Elementary Number Theory and Methods of Proof. CSE 215, Foundations of Computer Science Stony Brook University

Formulas STEM 11. Two mathematical formulas that students at this level of mathematics are familiar with are:

AN ANALYSIS OF A WAR-LIKE CARD GAME. Introduction

Notes on Factoring. MA 206 Kurt Bryan

5.3 SOLVING TRIGONOMETRIC EQUATIONS. Copyright Cengage Learning. All rights reserved.

CSC 373: Algorithm Design and Analysis Lecture 16

6.042/18.062J Mathematics for Computer Science. Expected Value I

α = u v. In other words, Orthogonal Projection

Non-interactive and Reusable Non-malleable Commitment Schemes

Combinatorics 3 poker hands and Some general probability

Homework until Test #2

2312 test 2 Fall 2010 Form B

BRICS. Improved Non-Committing Encryption Schemes based on a General Complexity Assumption

Preliminary Mathematics

Tom wants to find two real numbers, a and b, that have a sum of 10 and have a product of 10. He makes this table.

2.1 Complexity Classes

The Settling Time Reducibility Ordering and 0 2 Setting

136 CHAPTER 4. INDUCTION, GRAPHS AND TREES

Factoring Polynomials

Transcription:

BRICS RS-04-14 J. M. Byskov: Maker-Maker and Maker-Breaker Games are PSPACE-Complete BRICS Basic Research in Computer Science Maker-Maker and Maker-Breaker Games are PSPACE-Complete Jesper Makholm Byskov BRICS Report Series RS-04-14 ISSN 0909-0878 August 2004

Copyright c 2004, Jesper Makholm Byskov. BRICS, Department of Computer Science University of Aarhus. All rights reserved. Reproduction of all or part of this work is permitted for educational or research use on condition that this copyright notice is included in any copy. See back inner page for a list of recent BRICS Report Series publications. Copies may be obtained by contacting: BRICS Department of Computer Science University of Aarhus Ny Munkegade, building 540 DK 8000 Aarhus C Denmark Telephone: +45 8942 3360 Telefax: +45 8942 3255 Internet: BRICS@brics.dk BRICS publications are in general accessible through the World Wide Web and anonymous FTP through these URLs: http://www.brics.dk ftp://ftp.brics.dk This document in subdirectory RS/04/14/

Maker-Maker and Maker-Breaker games are PSPACE-complete Jesper Makholm Byskov BRICS Department of Computer Science University of Aarhus, Denmark jespermn@brics.dk August, 2004 Abstract We show that the problems of deciding the outcome of Maker- Maker and Maker-Breaker games played on arbitrary hypergraphs are PSPACE-complete. Maker-Breaker games have earlier been shown PSPACE-complete by Schaefer (1978); we give a simpler proof and show a reduction from Maker-Maker games to Maker- Breaker games. 1 Introduction Maker-Maker and Maker-Breaker games are finite two-player perfectinformation games played on a hypergraph G =(V,E). The players take turns in playing an unplayed vertex. In Maker-Maker games, the first player, Maker1, wins if he plays all vertices in one edge, and the other player, Maker2, also wins if he plays all vertices in one edge. One example of a Maker-Maker game is Tic-Tac-Toe. A player has a winning strategy if he can win the game no matter how the other player plays. Given a hypergraph G it will always be the case that either one of the players has a winning strategy, or both have a drawing strategy meaning that Basic Research in Computer Science (www.brics.dk), funded by the Danish National Research Foundation. 1

they can both force the game to end in a draw, which is what happens if all vertices have been played and none of the players have won. By an argument known as the strategy-stealing argument, Maker2 cannot have a winning strategy: suppose he has, then since having played an extra vertex will never do you any harm, Maker1 can just play any vertex v first and then play according to Maker2 s winning strategy as though v had never been played. Maker-Breaker games are played similarly and the first player, Maker, also wins by playing all vertices of an edge. The second player, Breaker, however, wins by preventing Maker from winning. Thus, there are no draws and one of the players will have a winning strategy. Maker-Breaker games have the property that a game where both players have played some vertices can easily be transformed to a game with no played vertices by simply removing all played vertices and removing all edges containing at least one of the vertices played by Breaker. For simplicity, we always reduce Maker-Breaker games in this way. We can also easily transform between a Maker-Breaker game in which Maker starts and one where Breaker starts and vice versa by either adding a single vertex and an edge containing only this vertex (which Breaker will then have to play) or a single vertex which is added to all edges (which Maker will then have to play). Definition 1. Maker-Maker is the problem of given a hypergraph G to decide if Maker1 has a winning strategy or Maker2 has a drawing strategy in the Maker-Maker game on G. Definition 2. Maker-Breaker is the problem of given a hypergraph G to decide if Maker or Breaker has a winning strategy in the Maker-Breaker game on G. 2 Results Theorem 3. Maker-Breaker reduces to Maker-Maker. Proof. Let G = (V,E) be an instance of Maker-Breaker and let d 1 and d 2 be two vertices not in V. Then we let V = V {d 1,d 2 }, E = {d 1 } E {(d 1,d 2 )} and G =(V,E ).Now,G is an instance of Maker-Maker in which Maker1 has a winning strategy if Maker has one on G and both players have a drawing strategy on G if Breaker has a winning strategy on G: in any game, Maker1 has to play d 1, since it is contained in all edges. Now, Maker2 cannot win and he has to play d 2, 2

or Maker1 would win by playing it. Then the rest of the game can be played according to the strategies for Maker and Breaker on G, since Maker2 cannot win. If Maker has a winning strategy Maker1 can also win, and if Breaker has a winning strategy Maker2 can make the game draw. Schaefer [1] shows several games PSPACE-complete, among which are G pos (POS DNF) which is equivalent to Maker-Breaker where Maker starts and G pos (POS CNF) which is equivalent to Maker-Breaker where Breaker starts. We provide a simpler proof below. Theorem 4. Maker-Breaker is PSPACE-complete. Proof. Maker-Breaker is clearly in PSPACE. To show completeness, we will reduce QBF to it. Let x 1 y 1... x n y n C 1 C m be an instance of QBF. We construct an instance of Maker-Breaker in which Breaker plays the role as satisfier meaning that he has to play one variable from each clause. We will slightly abuse notation and use x i and y j as both variables in the formula and vertices in the game and C j for both clauses in the formula and vertices in the game. We let V = {u 1,u 1,...,u n,u n } {e 1,...,e n } {x 1, x 1,...,x n, x n } {y 1,ȳ 1,y 1,ȳ 1,...,y n,ȳ n,y n,ȳ n } and E = n i=1 (X i U i Y i ) m j=1 C j, where X i ={(u 1,e 1,...,u i 1,e i 1,x i, x i )}, U i ={(x i,u 1,e 1,...,u i 1,e i 1,u i,u i ),( x i,u 1,e 1,...,u i 1,e i 1,u i,u i )}, Y i ={(x i,u 1,e 1,...,u i,e i,y i,ȳ i ),( x i,u 1,e 1,...,u i,e i,y i,ȳ i )} {(x i,u 1,e 1,...,u i,e i,y i,ȳ i),( x i,u 1,e 1,...,u i,e i,y i,ȳ i)} {(x i,u 1,e 1,...,u i,e i,y i,ȳ i),( x i,u 1,e 1,...,u i,e i,y i,ȳ i)}, C j ={(u 1,e 1,...,u n,e n,l j1,...,l j Cj } and l jk is the vertex corresponding to the kth literal in the clause C j. The idea is that the game is played in n rounds, each round consisting of the moves depicted in Table 1. If the game is played according to Table 1, Breaker will play a vertex from each of the X i s, U i sandy i sso Maker cannot win with any of those, and he has to win by playing all vertices from one of the C j s. If the formula is satisfiable, no matter if Maker chooses x i or x i, Breaker can choose y i or ȳ i so that the formula is satisfied meaning that he will have played a vertex from each edge C j.if the formula is unsatisfiable there must be at least one clause that Breaker 3

Move Player Choice 1 Maker x i or x i 2 Breaker the other 3 Maker u i 4 Breaker u i 5 Maker e i 6 Breaker y i or ȳ i 7 Maker the other 8 Breaker y i or ȳ i, same as in round six Table 1: Normal play in round i. has not played any vertex from, but then Maker has played them all, so he wins. We now argue that none of the players gain anything from not playing according to Table 1. Assume that the game is played according to Table1forthefirsti 1rounds. Then Breaker has played at least one vertex in X j, U j and Y j for j<iand Maker has played u 1,..., u i 1 and e 1,..., e i 1. Let us first assume that Maker plays the first move according to Table 1, i.e., he plays either x i or x i. Then Breaker has to play the other or Maker will win with the edge in X i.now,u i is contained in all remaining edges, so Maker has to play it. Then as before, Breaker will have to play u i or Maker will win with one of the edges in U i.now, e i is contained in all remaining edges, so Maker has to play it. In move six, Maker has played u 1,..., u i,e 1,..., e i and x i or x i, so he has all but two of the vertices in three of the edges in Y i.now,breakerhastoplay either y i or ȳ i, or Maker can play one of them so that he only needs to play one vertex in two edges. In move seven, Maker is not forced to pick the other vertex, but since this forces Breaker to play the primed version of the variable he picked in move six, and the primed variables occur in no other edges, Maker loses nothing by picking the other vertex. We only need to argue that Maker might as well play either x i or x i in his first move. Suppose that he does not play either. The only other vertex he can play is u i, since it is in all the remaining edges. Then Breaker plays x i. Now, e i is in all remaining edges, except the second edge in U i,somakerhastoplaye i, x i or u i.ifheplays x i, the players have the same vertices as they would have from a normal play in the first three moves, except that Breaker got to choose which of x i and x i he wanted, so this is not an advantage for Maker. If he instead plays u i,breaker plays x i and then Maker will have to play e i and the play continues 4

according to normal play from move five. This means that Maker neither got x i nor x i,andu i is in no more clauses than the ones in U i so this is not advantageous either. Finally if Maker plays e i, Breaker just continues play from move six as if Maker had played x i. Maker can at any point play x i in which case Breaker plays u i, but otherwise, play continues normally. Thus, Maker gains no advantage from not playing according to Table 1 in his first move. Corollary 5. Maker-Maker is PSPACE-complete. Proof. Maker-Maker is clearly in PSPACE, and completeness follows from Theorems 3 and 4. References [1] T. J. Schaefer. On the complexity of some two-person perfectinformation games. J. Comput. Syst. Sci., 16(2):185 225, Apr. 1978. http://dx.doi.org/10.1016/0022-0000(78)90045-4. 5

Recent BRICS Report Series Publications RS-04-14 Jesper Makholm Byskov. Maker-Maker and Maker-Breaker Games are PSPACE-Complete. August 2004. 5 pp. RS-04-13 Jens Groth and Gorm Salomonsen. Strong Privacy Protection in Electronic Voting. July 2004. 12 pp. Preliminary abstract presented at Tjoa and Wagner, editors, 13th International Workshop on Database and Expert Systems Applications, DEXA 02 Proceedings, 2002, page 436. RS-04-12 Olivier Danvy and Ulrik P. Schultz. Lambda-Lifting in Quadratic Time. June 2004. 34 pp. To appear in Journal of Functional and Logic Programming. This report supersedes the earlier BRICS report RS-03-36 which was an extended version of a paper appearing in Hu and Rodríguez-Artalejo, editors, Sixth International Symposium on Functional and Logic Programming, FLOPS 02 Proceedings, LNCS 2441, 2002, pages 134 151. RS-04-11 Vladimiro Sassone and Paweł Sobociński. Congruences for Contextual Graph-Rewriting. June 2004. 29 pp. RS-04-10 Daniele Varacca, Hagen Völzer, and Glynn Winskel. Probabilistic Event Structures and Domains. June 2004. 41 pp. Extended version of an article to appear in Gardner and Yoshida, editors, Concurrency Theory: 15th International Conference, CONCUR 04 Proceedings, LNCS, 2004. RS-04-9 Ivan B. Damgård, Serge Fehr, and Louis Salvail. Zero- Knowledge Proofs and String Commitments Withstanding Quantum Attacks. May 2004. 22 pp. RS-04-8 Petr Jančar and Jiří Srba. Highly Undecidable Questions for Process Algebras. April 2004. 25 pp. To appear in Lévy, Mayr and Mitchell, editors, 3rd IFIP International Conference on Theoretical Computer Science, TCS 04 Proceedings, 2004. RS-04-7 RS-04-6 Mojmír Křetínský, Vojtěch Řehák, and Jan Strejček. On the Expressive Power of Extended Process Rewrite Systems. April 2004. 18 pp. Gudmund Skovbjerg Frandsen and Igor E. Shparlinski. On Reducing a System of Equations to a Single Equation. March 2004. 11 pp. To appear in Schicho and Singer, editors, ACM SIGSAM International Symposium on Symbolic and Algebraic Computation, ISSAC 04 Proceedings, 2004.