14 research outputs found
Progress on Polynomial Identity Testing - II
We survey the area of algebraic complexity theory; with the focus being on
the problem of polynomial identity testing (PIT). We discuss the key ideas that
have gone into the results of the last few years.Comment: 17 pages, 1 figure, surve
Blackbox identity testing for bounded top fanin depth-3 circuits: the field doesn't matter
Let C be a depth-3 circuit with n variables, degree d and top fanin k (called
sps(k,d,n) circuits) over base field F. It is a major open problem to design a
deterministic polynomial time blackbox algorithm that tests if C is identically
zero. Klivans & Spielman (STOC 2001) observed that the problem is open even
when k is a constant. This case has been subjected to a serious study over the
past few years, starting from the work of Dvir & Shpilka (STOC 2005).
We give the first polynomial time blackbox algorithm for this problem. Our
algorithm runs in time poly(nd^k), regardless of the base field. The only field
for which polynomial time algorithms were previously known is F=Q (Kayal &
Saraf, FOCS 2009, and Saxena & Seshadhri, FOCS 2010). This is the first
blackbox algorithm for depth-3 circuits that does not use the rank based
approaches of Karnin & Shpilka (CCC 2008).
We prove an important tool for the study of depth-3 identities. We design a
blackbox polynomial time transformation that reduces the number of variables in
a sps(k,d,n) circuit to k variables, but preserves the identity structure.Comment: 14 pages, 1 figure, preliminary versio
Algebraic Independence and Blackbox Identity Testing
Algebraic independence is an advanced notion in commutative algebra that
generalizes independence of linear polynomials to higher degree. Polynomials
{f_1, ..., f_m} \subset \F[x_1, ..., x_n] are called algebraically independent
if there is no non-zero polynomial F such that F(f_1, ..., f_m) = 0. The
transcendence degree, trdeg{f_1, ..., f_m}, is the maximal number r of
algebraically independent polynomials in the set. In this paper we design
blackbox and efficient linear maps \phi that reduce the number of variables
from n to r but maintain trdeg{\phi(f_i)}_i = r, assuming f_i's sparse and
small r. We apply these fundamental maps to solve several cases of blackbox
identity testing:
(1) Given a polynomial-degree circuit C and sparse polynomials f_1, ..., f_m
with trdeg r, we can test blackbox D := C(f_1, ..., f_m) for zeroness in
poly(size(D))^r time.
(2) Define a spsp_\delta(k,s,n) circuit C to be of the form \sum_{i=1}^k
\prod_{j=1}^s f_{i,j}, where f_{i,j} are sparse n-variate polynomials of degree
at most \delta. For k = 2 we give a poly(sn\delta)^{\delta^2} time blackbox
identity test.
(3) For a general depth-4 circuit we define a notion of rank. Assuming there
is a rank bound R for minimal simple spsp_\delta(k,s,n) identities, we give a
poly(snR\delta)^{Rk\delta^2} time blackbox identity test for spsp_\delta(k,s,n)
circuits. This partially generalizes the state of the art of depth-3 to depth-4
circuits.
The notion of trdeg works best with large or zero characteristic, but we also
give versions of our results for arbitrary fields.Comment: 32 pages, preliminary versio
Complete Derandomization of Identity Testing and Reconstruction of Read-Once Formulas
In this paper we study the identity testing problem of arithmetic read-once formulas (ROF) and some related models. A read-once formula is formula (a circuit whose underlying graph is a tree) in which the operations are {+,x} and such that every input variable labels at most one leaf. We obtain the first polynomial-time deterministic identity testing algorithm that operates in the black-box setting for read-once formulas, as well as some other related models. As an application, we obtain the first polynomial-time deterministic reconstruction algorithm for such formulas. Our results are obtained by improving and extending the analysis of the algorithm of [Shpilka-Volkovich, 2015
Deterministic Identity Testing for Sum of Read-Once Oblivious Arithmetic Branching Programs
A read-once oblivious arithmetic branching program (ROABP) is an arithmetic
branching program (ABP) where each variable occurs in at most one layer. We
give the first polynomial time whitebox identity test for a polynomial computed
by a sum of constantly many ROABPs. We also give a corresponding blackbox
algorithm with quasi-polynomial time complexity . In both the
cases, our time complexity is double exponential in the number of ROABPs.
ROABPs are a generalization of set-multilinear depth- circuits. The prior
results for the sum of constantly many set-multilinear depth- circuits were
only slightly better than brute-force, i.e. exponential-time.
Our techniques are a new interplay of three concepts for ROABP: low
evaluation dimension, basis isolating weight assignment and low-support rank
concentration. We relate basis isolation to rank concentration and extend it to
a sum of two ROABPs using evaluation dimension (or partial derivatives).Comment: 22 pages, Computational Complexity Conference, 201
Jacobian hits circuits: Hitting-sets, lower bounds for depth-D occur-k formulas & depth-3 transcendence degree-k circuits
We present a single, common tool to strictly subsume all known cases of
polynomial time blackbox polynomial identity testing (PIT) that have been
hitherto solved using diverse tools and techniques. In particular, we show that
polynomial time hitting-set generators for identity testing of the two
seemingly different and well studied models - depth-3 circuits with bounded top
fanin, and constant-depth constant-read multilinear formulas - can be
constructed using one common algebraic-geometry theme: Jacobian captures
algebraic independence. By exploiting the Jacobian, we design the first
efficient hitting-set generators for broad generalizations of the
above-mentioned models, namely:
(1) depth-3 (Sigma-Pi-Sigma) circuits with constant transcendence degree of
the polynomials computed by the product gates (no bounded top fanin
restriction), and (2) constant-depth constant-occur formulas (no multilinear
restriction).
Constant-occur of a variable, as we define it, is a much more general concept
than constant-read. Also, earlier work on the latter model assumed that the
formula is multilinear. Thus, our work goes further beyond the results obtained
by Saxena & Seshadhri (STOC 2011), Saraf & Volkovich (STOC 2011), Anderson et
al. (CCC 2011), Beecken et al. (ICALP 2011) and Grenet et al. (FSTTCS 2011),
and brings them under one unifying technique.
In addition, using the same Jacobian based approach, we prove exponential
lower bounds for the immanant (which includes permanent and determinant) on the
same depth-3 and depth-4 models for which we give efficient PIT algorithms. Our
results reinforce the intimate connection between identity testing and lower
bounds by exhibiting a concrete mathematical tool - the Jacobian - that is
equally effective in solving both the problems on certain interesting and
previously well-investigated (but not well understood) models of computation
Succinct Hitting Sets and Barriers to Proving Lower Bounds for Algebraic Circuits
We formalize a framework of algebraically natural lower bounds for algebraic circuits. Just as with the natural proofs notion of Razborov and Rudich (1997) for Boolean circuit lower bounds, our notion of algebraically natural lower bounds captures nearly all lower bound techniques known. However, unlike in the Boolean setting, there has been no concrete evidence demonstrating that this is a barrier to obtaining super-polynomial lower bounds for general algebraic circuits, as there is little understanding whether algebraic circuits are expressive enough to support “cryptography” secure against algebraic circuits.
Following a similar result of Williams (2016) in the Boolean setting, we show that the existence of an algebraic natural proofs barrier is equivalent to the existence of succinct derandomization of the polynomial identity testing problem, that is, to the existence of a hitting set for the class of poly(N)-degree poly(N)-size circuits which consists of coefficient vectors of polynomials of polylog(N) degree with polylog(N)-size circuits. Further, we give an explicit universal construction showing that if such a succinct hitting set exists, then our universal construction suffices.
Further, we assess the existing literature constructing hitting sets for restricted classes of algebraic circuits and observe that none of them are succinct as given. Yet, we show how to modify some of these constructions to obtain succinct hitting sets. This constitutes the first evidence supporting the existence of an algebraic natural proofs barrier.
Our framework is similar to the Geometric Complexity Theory (GCT) program of Mulmuley and Sohoni (2001), except that here we emphasize constructiveness of the proofs while the GCT program emphasizes symmetry. Nevertheless, our succinct hitting sets have relevance to the GCT program as they imply lower bounds for the complexity of the defining equations of polynomials computed by small circuits.
A conference version of this paper appeared in the Proceedings of the 49th Annual ACM Symposium on Theory of Computing (STOC 2017)
Recommended from our members
Complexity Theory
Computational Complexity Theory is the mathematical study of the intrinsic power and limitations of computational resources like time, space, or randomness. The current workshop focused on recent developments in various sub-areas including arithmetic complexity, Boolean complexity, communication complexity, cryptography, probabilistic proof systems, pseudorandomness, and quantum computation. Many of the developements are related to diverse mathematical fields such as algebraic geometry, combinatorial number theory, probability theory, quantum mechanics, representation theory, and the theory of error-correcting codes