63 research outputs found

    Identity Testing and Lower Bounds for Read-k Oblivious Algebraic Branching Programs

    Get PDF
    Read-k oblivious algebraic branching programs are a natural generalization of the well-studied model of read-once oblivious algebraic branching program (ROABPs). In this work, we give an exponential lower bound of exp(n/k^{O(k)}) on the width of any read-k oblivious ABP computing some explicit multilinear polynomial f that is computed by a polynomial size depth-3 circuit. We also study the polynomial identity testing (PIT) problem for this model and obtain a white-box subexponential-time PIT algorithm. The algorithm runs in time 2^{~O(n^{1-1/2^{k-1}})} and needs white box access only to know the order in which the variables appear in the ABP

    Pseudorandom Bits for Oblivious Branching Programs

    Get PDF
    We construct a pseudorandom generator that fools known-order read-k oblivious branching programs and, more generally, any linear length oblivious branching program. For polynomial width branching programs, the seed lengths in our constructions are O(n^(1−1/2^(k−1))) (for the read-k case) and O(n/log log n) (for the linear length case). Previously, the best construction for these models required seed length (1 − Ω(1))n

    Progress on Polynomial Identity Testing - II

    Full text link
    We survey the area of algebraic complexity theory; with the focus being on the problem of polynomial identity testing (PIT). We discuss the key ideas that have gone into the results of the last few years.Comment: 17 pages, 1 figure, surve

    Identity Testing for Constant-Width, and Commutative, Read-Once Oblivious ABPs

    Get PDF
    We give improved hitting-sets for two special cases of Read-once Oblivious Arithmetic Branching Programs (ROABP). First is the case of an ROABP with known variable order. The best hitting-set known for this case had cost (nw)^{O(log(n))}, where n is the number of variables and w is the width of the ROABP. Even for a constant-width ROABP, nothing better than a quasi-polynomial bound was known. We improve the hitting-set complexity for the known-order case to n^{O(log(w))}. In particular, this gives the first polynomial time hitting-set for constant-width ROABP (known-order). However, our hitting-set works only over those fields whose characteristic is zero or large enough. To construct the hitting-set, we use the concept of the rank of partial derivative matrix. Unlike previous approaches whose starting point is a monomial map, we use a polynomial map directly. The second case we consider is that of commutative ROABP. The best known hitting-set for this case had cost d^{O(log(w))}(nw)^{O(log(log(w)))}, where d is the individual degree. We improve this hitting-set complexity to (ndw)^{O(log(log(w)))}. We get this by achieving rank concentration more efficiently

    Deterministic Black-Box Identity Testing π\pi-Ordered Algebraic Branching Programs

    Get PDF
    In this paper we study algebraic branching programs (ABPs) with restrictions on the order and the number of reads of variables in the program. Given a permutation π\pi of nn variables, for a π\pi-ordered ABP (π\pi-OABP), for any directed path pp from source to sink, a variable can appear at most once on pp, and the order in which variables appear on pp must respect π\pi. An ABP AA is said to be of read rr, if any variable appears at most rr times in AA. Our main result pertains to the identity testing problem. Over any field FF and in the black-box model, i.e. given only query access to the polynomial, we have the following result: read rr π\pi-OABP computable polynomials can be tested in \DTIME[2^{O(r\log r \cdot \log^2 n \log\log n)}]. Our next set of results investigates the computational limitations of OABPs. It is shown that any OABP computing the determinant or permanent requires size Ω(2n/n)\Omega(2^n/n) and read Ω(2n/n2)\Omega(2^n/n^2). We give a multilinear polynomial pp in 2n+12n+1 variables over some specifically selected field GG, such that any OABP computing pp must read some variable at least 2n2^n times. We show that the elementary symmetric polynomial of degree rr in nn variables can be computed by a size O(rn)O(rn) read rr OABP, but not by a read (r1)(r-1) OABP, for any 0<2r1n0 < 2r-1 \leq n. Finally, we give an example of a polynomial pp and two variables orders ππ\pi \neq \pi', such that pp can be computed by a read-once π\pi-OABP, but where any π\pi'-OABP computing pp must read some variable at least $2^n

    Matrix PRFs: Constructions, Attacks, and Applications to Obfuscation

    Get PDF
    We initiate a systematic study of pseudorandom functions (PRFs) that are computable by simple matrix branching programs; we refer to these objects as “matrix PRFs”. Matrix PRFs are attractive due to their simplicity, strong connections to complexity theory and group theory, and recent applications in program obfuscation. Our main results are: * We present constructions of matrix PRFs based on the conjectured hardness of some simple computational problems pertaining to matrix products. * We show that any matrix PRF that is computable by a read-c, width w branching program can be broken in time poly(w^c); this means that any matrix PRF based on constant-width matrices must read each input bit omega(log lambda) times. Along the way, we simplify the “tensor switching lemmas” introduced in previous IO attacks. * We show that a subclass of the candidate local-PRG proposed by Barak et al. [Eurocrypt 2018] can be broken using simple matrix algebra. * We show that augmenting the CVW18 IO candidate with a matrix PRF provably immunizes the candidate against all known algebraic and statistical zeroizing attacks, as captured by a new and simple adversarial model
    corecore