140 research outputs found
Near-optimal Bootstrapping of Hitting Sets for Algebraic Models
The classical lemma of Ore-DeMillo-Lipton-Schwartz-Zippel
[Ore22,DL78,Zip79,Sch80] states that any nonzero polynomial of degree at most will evaluate to a nonzero value at some point on a
grid with . Thus, there is an explicit
hitting set for all -variate degree , size algebraic circuits of size
.
In this paper, we prove the following results:
- Let be a constant. For a sufficiently large constant and
all , if we have an explicit hitting set of size
for the class of -variate degree polynomials that are computable by
algebraic circuits of size , then for all , we have an explicit hitting
set of size for -variate circuits of
degree and size . That is, if we can obtain a barely non-trivial
exponent compared to the trivial sized hitting set even for
constant variate circuits, we can get an almost complete derandomization of
PIT.
- The above result holds when "circuits" are replaced by "formulas" or
"algebraic branching programs".
This extends a recent surprising result of Agrawal, Ghosh and Saxena [AGS18]
who proved the same conclusion for the class of algebraic circuits, if the
hypothesis provided a hitting set of size at most
(where is any constant). Hence, our work significantly weakens the
hypothesis of Agrawal, Ghosh and Saxena to only require a slightly non-trivial
saving over the trivial hitting set, and also presents the first such result
for algebraic branching programs and formulas.Comment: The main result has been strengthened significantly, compared to the
older version of the paper. Additionally, the stronger theorem now holds even
for subclasses of algebraic circuits, such as algebraic formulas and
algebraic branching program
Algebraic Hardness Versus Randomness in Low Characteristic
We show that lower bounds for explicit constant-variate polynomials over fields of characteristic p > 0 are sufficient to derandomize polynomial identity testing over fields of characteristic p. In this setting, existing work on hardness-randomness tradeoffs for polynomial identity testing requires either the characteristic to be sufficiently large or the notion of hardness to be stronger than the standard syntactic notion of hardness used in algebraic complexity. Our results make no restriction on the characteristic of the field and use standard notions of hardness.
We do this by combining the Kabanets-Impagliazzo generator with a white-box procedure to take p-th roots of circuits computing a p-th power over fields of characteristic p. When the number of variables appearing in the circuit is bounded by some constant, this procedure turns out to be efficient, which allows us to bypass difficulties related to factoring circuits in characteristic p.
We also combine the Kabanets-Impagliazzo generator with recent "bootstrapping" results in polynomial identity testing to show that a sufficiently-hard family of explicit constant-variate polynomials yields a near-complete derandomization of polynomial identity testing. This result holds over fields of both zero and positive characteristic and complements a recent work of Guo, Kumar, Saptharishi, and Solomon, who obtained a slightly stronger statement over fields of characteristic zero
Algebraic Methods in Computational Complexity
Computational Complexity is concerned with the resources that are required for algorithms to detect properties of combinatorial objects and structures. It has often proven true that the best way to argue about these combinatorial objects is by establishing a connection (perhaps approximate) to a more well-behaved algebraic setting. Indeed, many of the deepest and most powerful results in Computational Complexity rely on algebraic proof techniques. The Razborov-Smolensky polynomial-approximation method for proving constant-depth circuit lower bounds, the PCP characterization of NP, and the Agrawal-Kayal-Saxena polynomial-time primality test
are some of the most prominent examples. In some of the most exciting recent progress in Computational Complexity the algebraic theme still plays a central role. There have been significant recent advances in algebraic circuit lower bounds, and the so-called chasm at depth 4 suggests that the restricted models now being considered are not so far from ones that would lead to a general result. There have been similar successes concerning the related problems of polynomial identity testing and circuit reconstruction in the algebraic model (and these are tied to central questions regarding the power of randomness in computation). Also the areas of derandomization and coding theory have experimented important advances. The seminar aimed to capitalize on recent progress and bring together researchers who are using a diverse array of algebraic methods in a variety of settings. Researchers in these areas are relying on ever more sophisticated and specialized mathematics and the goal of the seminar was to play an important role in educating a diverse community about the latest new techniques
Deterministic Identity Testing Paradigms for Bounded Top-Fanin Depth-4 Circuits
Polynomial Identity Testing (PIT) is a fundamental computational problem. The famous depth-4 reduction (Agrawal & Vinay, FOCS\u2708) has made PIT for depth-4 circuits, an enticing pursuit. The largely open special-cases of sum-product-of-sum-of-univariates (?^[k] ? ? ?) and sum-product-of-constant-degree-polynomials (?^[k] ? ? ?^[?]), for constants k, ?, have been a source of many great ideas in the last two decades. For eg. depth-3 ideas (Dvir & Shpilka, STOC\u2705; Kayal & Saxena, CCC\u2706; Saxena & Seshadhri, FOCS\u2710, STOC\u2711); depth-4 ideas (Beecken, Mittmann & Saxena, ICALP\u2711; Saha,Saxena & Saptharishi, Comput.Compl.\u2713; Forbes, FOCS\u2715; Kumar & Saraf, CCC\u2716); geometric Sylvester-Gallai ideas (Kayal & Saraf, FOCS\u2709; Shpilka, STOC\u2719; Peleg & Shpilka, CCC\u2720, STOC\u2721). We solve two of the basic underlying open problems in this work.
We give the first polynomial-time PIT for ?^[k] ? ? ?. Further, we give the first quasipolynomial time blackbox PIT for both ?^[k] ? ? ? and ?^[k] ? ? ?^[?]. No subexponential time algorithm was known prior to this work (even if k = ? = 3). A key technical ingredient in all the three algorithms is how the logarithmic derivative, and its power-series, modify the top ?-gate to ?
Variety Membership Testing in Algebraic Complexity Theory
In this thesis, we study some of the central problems in algebraic complexity theory through the lens of the variety membership testing problem. In the first part, we investigate whether separations between algebraic complexity classes can be phrased as instances of the variety membership testing problem. For this, we compare some complexity classes with their closures. We show that monotone commutative single-(source, sink) ABPs are closed. Further, we prove that multi-(source, sink) ABPs are not closed in both the monotone commutative and the noncommutative settings. However, the corresponding complexity classes are closed in all these settings. Next, we observe a separation between the complexity class VQP and the closure of VNP. In the second part, we cover the blackbox polynomial identity testing (PIT) problem, and the rank computation problem of symbolic matrices, both phrasable as instances of the variety membership testing problem. For the blackbox PIT, we give a randomized polynomial time algorithm that uses the number of random bits that matches the information-theoretic lower bound, differing from it only in the lower order terms. For the rank computation problem, we give a deterministic polynomial time approximation scheme (PTAS) when the degrees of the entries of the matrices are bounded by a constant. Finally, we show NP-hardness of two problems on 3-tensors, both of which are instances of the variety membership testing problem. The first problem is the orbit closure containment problem for the action of GLk x GLm x GLn on 3-tensors, while the second problem is to decide whether the slice rank of a given 3-tensor is at most r
Where Quantum Complexity Helps Classical Complexity
Scientists have demonstrated that quantum computing has presented novel
approaches to address computational challenges, each varying in complexity.
Adapting problem-solving strategies is crucial to harness the full potential of
quantum computing. Nonetheless, there are defined boundaries to the
capabilities of quantum computing. This paper concentrates on aggregating prior
research efforts dedicated to solving intricate classical computational
problems through quantum computing. The objective is to systematically compile
an exhaustive inventory of these solutions and categorize a collection of
demanding problems that await further exploration
Quantum singular value transformation and beyond: exponential improvements for quantum matrix arithmetics
Quantum computing is powerful because unitary operators describing the
time-evolution of a quantum system have exponential size in terms of the number
of qubits present in the system. We develop a new "Singular value
transformation" algorithm capable of harnessing this exponential advantage,
that can apply polynomial transformations to the singular values of a block of
a unitary, generalizing the optimal Hamiltonian simulation results of Low and
Chuang. The proposed quantum circuits have a very simple structure, often give
rise to optimal algorithms and have appealing constant factors, while usually
only use a constant number of ancilla qubits. We show that singular value
transformation leads to novel algorithms. We give an efficient solution to a
certain "non-commutative" measurement problem and propose a new method for
singular value estimation. We also show how to exponentially improve the
complexity of implementing fractional queries to unitaries with a gapped
spectrum. Finally, as a quantum machine learning application we show how to
efficiently implement principal component regression. "Singular value
transformation" is conceptually simple and efficient, and leads to a unified
framework of quantum algorithms incorporating a variety of quantum speed-ups.
We illustrate this by showing how it generalizes a number of prominent quantum
algorithms, including: optimal Hamiltonian simulation, implementing the
Moore-Penrose pseudoinverse with exponential precision, fixed-point amplitude
amplification, robust oblivious amplitude amplification, fast QMA
amplification, fast quantum OR lemma, certain quantum walk results and several
quantum machine learning algorithms. In order to exploit the strengths of the
presented method it is useful to know its limitations too, therefore we also
prove a lower bound on the efficiency of singular value transformation, which
often gives optimal bounds.Comment: 67 pages, 1 figur
- …