[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2213977.2214033acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
research-article

Jacobian hits circuits: hitting-sets, lower bounds for depth-D occur-k formulas & depth-3 transcendence degree-k circuits

Published: 19 May 2012 Publication History

Abstract

We present a single common tool to strictly subsume all known cases of polynomial time blackbox polynomial identity testing (PIT), that have been hitherto solved using diverse tools and techniques, over fields of zero or large characteristic. In particular, we show that polynomial time hitting-set generators for identity testing of the two seemingly different and well studied models - depth-3 circuits with bounded top fanin, and constant-depth constant-read multilinear formulas - can be constructed using one common algebraic-geometry theme: Jacobian captures algebraic independence. By exploiting the Jacobian, we design the first efficient hitting-set generators for broad generalizations of the above-mentioned models, namely: - depth-3 (Ω Π Ω) circuits with constant transcendence degree of the polynomials computed by the product gates (no bounded top fanin restriction), and - constant-depth constant-occur formulas (no multilinear restriction). Constant-occur of a variable, as we define it, is a much more general concept than constant-read. Also, earlier work on the latter model assumed that the formula is multilinear. Thus, our work goes further beyond the related results obtained by Saxena & Seshadhri (STOC 2011), Saraf & Volkovich (STOC 2011), Anderson et al. (CCC 2011), Beecken et al. (ICALP 2011) and Grenet et al. (FSTTCS 2011), and brings them under one unifying technique.
In addition, using the same Jacobian based approach, we prove exponential lower bounds for the immanant (which includes permanent and determinant) on the same depth-3 and depth-4 models for which we give efficient PIT algorithms. Our results reinforce the intimate connection between identity testing and lower bounds by exhibiting a concrete mathematical tool - the Jacobian - that is equally effective in solving both the problems on certain interesting and previously well-investigated (but not well understood) models of computation.

Supplementary Material

JPG File (stoc_7b_1.jpg)
MP4 File (stoc_7b_1.mp4)

References

[1]
Manindra Agrawal. Proving Lower Bounds Via Pseudo-random Generators. In FSTTCS, pages 92--105, 2005.
[2]
Manindra Agrawal, Neeraj Kayal, and Nitin Saxena. Primes is in P. Annals of Mathematics, 160(2):781--793, 2004.
[3]
8}ALMSS98Sanjeev Arora, Carsten Lund, Rajeev Motwani, Madhu Sudan, and Mario Szegedy. Proof Verification and the Hardness of Approximation Problems. Journal of the ACM, 45(3):501--555, 1998.
[4]
Manindra Agrawal and V. Vinay. Arithmetic circuits: A chasm at depth four. In FOCS, pages 67--75, 2008.
[5]
Scott Aaronson and Dieter van Melkebeek. A note on circuit lower bounds from derandomization. Electronic Colloquium on Computational Complexity (ECCC), 17:105, 2010.
[6]
Matthew Anderson, Dieter van Melkebeek, and Ilya Volkovich. Derandomizing Polynomial Identity Testing for Multilinear Constant-Read Formulae. In IEEE Conference on Computational Complexity, pages 273--282, 2011.
[7]
Malte Beecken, Johannes Mittmann, and Nitin Saxena. Algebraic Independence and Blackbox Identity Testing. In ICALP (2), pages 137--148, 2011.
[8]
Malte Beecken, Johannes Mittmann, and Nitin Saxena. Algebraic Independence and Blackbox Identity Testing. CoRR, abs/1102.2789, 2011.
[9]
Michael Clausen, Andreas W. M. Dress, Johannes Grabmeier, and Marek Karpinski. On Zero-Testing and Interpolation of k-Sparse Multivariate Polynomials Over Finite Fields. Theor. Comput. Sci., 84(2):151--164, 1991.
[10]
Xi Chen, Neeraj Kayal, and Avi Wigderson. Partial Derivatives in Arithmetic Complexity (and beyond). Foundation and Trends in Theoretical Computer Science, 6(1--2):1--138, 2011.
[11]
Richard A. DeMillo and Richard J. Lipton. A Probabilistic Remark on Algebraic Program Testing. Inf. Process. Lett., 7(4):193--195, 1978.
[12]
Zeev Dvir and Amir Shpilka. Locally decodable codes with 2 queries and polynomial identity testing for depth 3 circuits. In STOC, pages 592--601, 2005.
[13]
Bruno Grenet, Pascal Koiran, Natacha Portier, and Yann Strozecki. The Limited Power of Powering: Polynomial Identity Testing and a Depth-four Lower Bound for the Permanent. In Proceedings of the 30th Foundations of Software Technology and Theoretical Computer Science (FSTTCS), pages 127--139, 2011.
[14]
Ariel Gabizon and Ran Raz. Deterministic extractors for affine sources over large fields. In FOCS, pages 407--418, 2005.
[15]
Joos Heintz and Claus-Peter Schnorr. Testing Polynomials which Are Easy to Compute (Extended Abstract). In STOC, pages 262--272, 1980.
[16]
Gábor Ivanyos, Marek Karpinski, and Nitin Saxena. Deterministic Polynomial Time Algorithms for Matrix Completion Problems. SIAM J. Comput., 39(8):3736--3751, 2010.
[17]
Russell Impagliazzo and Avi Wigderson. P = BPP if E Requires Exponential Circuits: Derandomizing the XOR Lemma. In STOC, pages 220--229, 1997.
[18]
Kyriakos Kalorkoti. A Lower Bound for the Formula Size of Rational Functions. SIAM J. Comput., 14(3):678--687, 1985.
[19]
Valentine Kabanets and Russell Impagliazzo. Derandomizing polynomial identity tests means proving circuit lower bounds. In STOC, pages 355--364, 2003.
[20]
Zohar Shay Karnin, Partha Mukhopadhyay, Amir Shpilka, and Ilya Volkovich. Deterministic identity testing of depth-4 multilinear circuits with bounded top fan-in. In STOC, pages 649--658, 2010.
[21]
Adam Klivans and Daniel A. Spielman. Randomness efficient identity testing of multivariate polynomials. In STOC, pages 216--223, 2001.
[22]
Adam R. Klivans and Amir Shpilka. Learning Restricted Models of Arithmetic Circuits. Theory of Computing, 2(1):185--206, 2006.
[23]
Neeraj Kayal and Nitin Saxena. Polynomial Identity Testing for Depth 3 Circuits. Computational Complexity, 16(2):115--138, 2007.
[24]
Zohar Shay Karnin and Amir Shpilka. Black box polynomial identity testing of generalized depth-3 arithmetic circuits with bounded top fan-in. In IEEE Conference on Computational Complexity, pages 280--291, 2008.
[25]
Zohar Shay Karnin and Amir Shpilka. Reconstruction of Generalized Depth-3 Arithmetic Circuits with Bounded Top Fan-in. In IEEE Conference on Computational Complexity, pages 274--285, 2009.
[26]
Neeraj Kayal and Shubhangi Saraf. Blackbox polynomial identity testing for depth-$3$ circuits. In FOCS, pages 198--207, 2009.
[27]
Swastik Kopparty and Sergey Yekhanin. Detecting Rational Points on Hypersurfaces over Finite Fields. In IEEE Conference on Computational Complexity, pages 311--320, 2008.
[28]
Carsten Lund, Lance Fortnow, Howard J. Karloff, and Noam Nisan. Algebraic Methods for Interactive Proof Systems. In FOCS, pages 2--10, 1990.
[29]
László Lovász. On determinants, matchings, and random algorithms. In FCT, pages 565--574, 1979.
[30]
Dudley E. Littlewood and Archibald R. Richardson. Group, characters and algebras. Philosophical Transactions of the Royal Society, Ser. A(233):721--730, 1934.
[31]
Johannes Mittmann, Nitin Saxena, and Peter Scheiblechner. Algebraic Independence in Positive Characteristic -- A p-adic Calculus. Electronic Colloquium on Computational Complexity, TR12-014, 2012.
[32]
Ketan Mulmuley, Umesh V. Vazirani, and Vijay V. Vazirani. Matching Is as Easy as Matrix Inversion. In STOC, pages 345--354, 1987.
[33]
James G. Oxley. Matroid theory. Oxford University Press, 1992.
[34]
Ramamohan Paturi, Michael E. Saks, and Francis Zane. Exponential lower bounds for depth three Boolean circuits. Computational Complexity, 9(1):1--15, 2000.
[35]
Prasad Raghavendra. Optimal algorithms and inapproximability results for every CSP? In STOC, pages 245--254, 2008.
[36]
Jacob T. Schwartz. Fast Probabilistic Algorithms for Verification of Polynomial Identities. J. ACM, 27(4):701--717, 1980.
[37]
Adi Shamir. IP=PSPACE. In FOCS, pages 11--15, 1990.
[38]
Nitin Saxena and C. Seshadhri. An Almost Optimal Rank Bound for Depth-3 Identities. In IEEE Conference on Computational Complexity, pages 137--148, 2009.
[39]
Nitin Saxena and C. Seshadhri. From Sylvester-Gallai Configurations to Rank Bounds: Improved Black-Box Identity Test for Depth-3 Circuits. In FOCS, pages 21--29, 2010.
[40]
Nitin Saxena and C. Seshadhri. Blackbox identity testing for bounded top fanin depth-3 circuits: the field doesn't matter. In STOC, pages 431--440, 2011.
[41]
Sven Skyum and Leslie G. Valiant. A Complexity Theory Based on Boolean Algebra. J. ACM, 32(2):484--502, 1985.
[42]
Amir Shpilka and Ilya Volkovich. Read-once polynomial identity testing. In STOC, pages 507--516, 2008.
[43]
Amir Shpilka and Ilya Volkovich. Improved Polynomial Identity Testing for Read-Once Formulas. In APPROX-RANDOM, pages 700--713, 2009.
[44]
Amir Shpilka and Ilya Volkovich. On the relation between polynomial identity testing and finding variable disjoint factors. In ICALP (1), pages 408--419, 2010.
[45]
Shubhangi Saraf and Ilya Volkovich. Black-box identity testing of depth-4 multilinear circuits. In STOC, pages 421--430, 2011.
[46]
Amir Shpilka and Amir Yehudayoff. Arithmetic Circuits: A survey of recent results and open questions. Foundations and Trends in Theoretical Computer Science, 5(3--4):207--388, 2010.
[47]
Christopher Umans. Pseudo-random generators for all hardnesses. J. Comput. Syst. Sci., 67(2):419--440, 2003.
[48]
Leslie G. Valiant. Completeness Classes in Algebra. In STOC, pages 249--261, 1979.
[49]
Leslie G. Valiant, Sven Skyum, Stuart J. Berkowitz, and Charles Rackoff. Fast Parallel Computation of Polynomials Using Few Processors. SIAM J. Comput., 12(4):641--644, 1983.
[50]
Ryan Williams. Non-uniform ACC Circuit Lower Bounds. In IEEE Conference on Computational Complexity, pages 115--125, 2011.
[51]
Richard Zippel. Probabilistic algorithms for sparse polynomials. EUROSAM, pages 216--226, 1979.

Cited By

View all
  • (2022)Improved Hitting Set for Orbit of ROABPsComputational Complexity10.1007/s00037-022-00230-931:2Online publication date: 1-Dec-2022
  • (2020)Special-case algorithms for blackbox radical membership, nullstellensatz and transcendence degreeProceedings of the 45th International Symposium on Symbolic and Algebraic Computation10.1145/3373207.3404030(186-193)Online publication date: 20-Jul-2020
  • (2019)A deterministic PTAS for the algebraic rank of bounded degree polynomialsProceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms10.5555/3310435.3310476(647-661)Online publication date: 6-Jan-2019
  • Show More Cited By

Index Terms

  1. Jacobian hits circuits: hitting-sets, lower bounds for depth-D occur-k formulas & depth-3 transcendence degree-k circuits

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      STOC '12: Proceedings of the forty-fourth annual ACM symposium on Theory of computing
      May 2012
      1310 pages
      ISBN:9781450312455
      DOI:10.1145/2213977
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 19 May 2012

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. algebraic independence
      2. blackbox
      3. circuits
      4. depth
      5. identity testing
      6. immanant
      7. jacobian
      8. lower bound
      9. vandermonde

      Qualifiers

      • Research-article

      Conference

      STOC'12
      Sponsor:
      STOC'12: Symposium on Theory of Computing
      May 19 - 22, 2012
      New York, New York, USA

      Acceptance Rates

      Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

      Upcoming Conference

      STOC '25
      57th Annual ACM Symposium on Theory of Computing (STOC 2025)
      June 23 - 27, 2025
      Prague , Czech Republic

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 10 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)Improved Hitting Set for Orbit of ROABPsComputational Complexity10.1007/s00037-022-00230-931:2Online publication date: 1-Dec-2022
      • (2020)Special-case algorithms for blackbox radical membership, nullstellensatz and transcendence degreeProceedings of the 45th International Symposium on Symbolic and Algebraic Computation10.1145/3373207.3404030(186-193)Online publication date: 20-Jul-2020
      • (2019)A deterministic PTAS for the algebraic rank of bounded degree polynomialsProceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms10.5555/3310435.3310476(647-661)Online publication date: 6-Jan-2019
      • (2019)Bootstrapping variables in algebraic circuitsProceedings of the National Academy of Sciences10.1073/pnas.1901272116116:17(8107-8118)Online publication date: 11-Apr-2019
      • (2018)Algebraic dependencies and PSPACE algorithms in approximative complexityProceedings of the 33rd Computational Complexity Conference10.5555/3235586.3235596(1-21)Online publication date: 22-Jun-2018
      • (2018)Complete Derandomization of Identity Testing and Reconstruction of Read-Once FormulasACM Transactions on Computation Theory10.1145/319683610:3(1-11)Online publication date: 23-May-2018
      • (2018)Black-Box Identity Testing of Depth-4 Multilinear CircuitsCombinatorica10.1007/s00493-016-3460-438:5(1205-1238)Online publication date: 1-Oct-2018
      • (2017)Complete derandomization of identity testing and reconstruction of read-once formulasProceedings of the 32nd Computational Complexity Conference10.5555/3135595.3135627(1-13)Online publication date: 9-Jul-2017
      • (2017)Multi-k-ic Depth Three Circuit Lower BoundTheory of Computing Systems10.1007/s00224-016-9742-961:4(1237-1251)Online publication date: 1-Nov-2017
      • (2016)Sums of products of polynomials in few variablesProceedings of the 31st Conference on Computational Complexity10.5555/2982445.2982480(1-29)Online publication date: 29-May-2016
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media