Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1007/978-3-642-03685-9_52guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Improved Polynomial Identity Testing for Read-Once Formulas

Published: 21 August 2009 Publication History

Abstract

An <em>arithmetic read-once formula</em> (ROF for short) is a formula (a circuit whose underlying graph is a tree) in which the operations are { +,×} and such that every input variable labels at most one leaf. In this paper we study the problems of giving deterministic identity testing and reconstruction algorithms for ROFs. Our main result is an $n^{{\mathcal{O}}(k + \log n)}$ time deterministic algorithm for checking whether a black box holding the sum of <em>k</em> <em>n</em> -variate ROFs computes the zero polynomial. In other words, we provide a hitting set of size $n^{{\mathcal{O}}(k + \log n)}$ for the sum of <em>k</em> ROFs. This result greatly improves [27] where an $n^{{\mathcal{O}}(k^2 + \sqrt n)}$ algorithm was given for the problem.
Using our new results we obtain a deterministic reconstruction algorithms for read-once formulas that runs in time $n^{{\mathcal{O}}(\log n)}$.
In fact, our results also hold for the more general model of <em>preprocessed</em> read-once formulas that we define in this paper. In this model we are allowed to replace each variable <em>x</em> <em>i</em> with a polynomial <em>T</em> <em>i</em> (<em>x</em> <em>i</em> ).
Our techniques are very close to the techniques in [27]. The main difference is that we obtain several tighter versions of the tools first used there. In particular we obtain a better version of the <em>hardness of representation</em> approach which was first used in [27]. This technique can be thought of as a very explicit way of transforming (mild) hardness of a very structured polynomial to an identity testing algorithm.

References

[1]
Agrawal, M.: Proving lower bounds via pseudo-random generators. In: Sarukkai, S., Sen, S. (eds.) FSTTCS 2005. LNCS, vol. 3821, pp. 92-105. Springer, Heidelberg (2005).
[2]
Agrawal, M., Biswas, S.: Primality and identity testing via chinese remaindering. JACM 50(4), 429-443 (2003).
[3]
Agrawal, M., Vinay, V.: Arithmetic circuits: A chasm at depth four. In: Proceedings of the 49th FOCS, pp. 67-75 (2008).
[4]
Arvind, V., Mukhopadhyay, P.: The monomial ideal membership problem and polynomial identity testing. In: Tokuyama, T. (ed.) ISAAC 2007. LNCS, vol. 4835, pp. 800-811. Springer, Heidelberg (2007).
[5]
Ben-Or, M., Tiwari, P.: A deterministic algorithm for sparse multivariate polynomial interpolation. In: Proceedings of the 20th STOC, pp. 301-309 (1988).
[6]
Bshouty, D., Bshouty, N.H.: On interpolating arithmetic read-once formulas with exponentiation. J. of Computer and System Sciences 56(1), 112-124 (1998).
[7]
Bshouty, N.H., Hancock, T.R., Hellerstein, L.: Learning arithmetic read-once formulas. SICOMP 24(4), 706-735 (1995).
[8]
Chen, Z., Kao, M.: Reducing randomness via irrational numbers. In: Proceedings of the 29th STOC, pp. 200-209 (1997).
[9]
Dvir, Z., Shpilka, A.: Locally decodable codes with 2 queries and polynomial identity testing for depth 3 circuits. SICOMP 36(5), 1404-1434 (2006).
[10]
Dvir, Z., Shpilka, A., Yehudayoff, A.: Hardness-randomness tradeoffs for bounded depth arithmetic circuits. In: Proceedings of the 40th STOC, pp. 741-748 (2008).
[11]
Hancock, T.R., Hellerstein, L.: Learning read-once formulas over fields and extended bases. In: Proceedings of the 4th COLT, pp. 326-336 (1991).
[12]
Kabanets, V., Impagliazzo, R.: Derandomizing polynomial identity tests means proving circuit lower bounds. Computational Complexity 13(1-2), 1-46 (2004).
[13]
Karnin, Z.S., Shpilka, A.: Deterministic black box polynomial identity testing of depth-3 arithmetic circuits with bounded top fan-in. In: Proceedings of the 23rd CCC, pp. 280-291 (2008).
[14]
Kayal, N., Saxena, N.: Polynomial identity testing for depth 3 circuits. Computational Complexity 16(2), 115-138 (2007).
[15]
Klivans, A., Spielman, D.: Randomness efficient identity testing of multivariate polynomials. In: Proceedings of the 33rd STOC, pp. 216-223 (2001).
[16]
Lewin, D., Vadhan, S.: Checking polynomial identities over any field: Towards a derandomization? In: Proceedings of the 30th STOC, pp. 428-437 (1998).
[17]
Lipton, R.J., Vishnoi, N.K.: Deterministic identity testing for multivariate polynomials. In: Proceedings of the 14th SODA, pp. 756-760 (2003).
[18]
Raz, R.: Multilinear NC 1 ≠= Multilinear NC 2. In: Proceedings of the 45th FOCS, pp. 344-351 (2004).
[19]
Raz, R.: Extractors with weak random seeds. In: Proceedings of the 37th STOC, pp. 11-20 (2005).
[20]
Raz, R., Shpilka, A.: Deterministic polynomial identity testing in non commutative models. Computational Complexity 14(1), 1-19 (2005).
[21]
Raz, R., Shpilka, A., Yehudayoff, A.: A lower bound for the size of syntactically multilinear arithmetic circuits. SICOMP 38(4), 1624-1647 (2008).
[22]
Raz, R., Yehudayoff, A.: Lower bounds and separations for constant depth multilinear circuits. In: 40th CCC, pp. 128-139 (2008).
[23]
Saxena, N.: Diagonal circuit identity testing and lower bounds. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part I. LNCS, vol. 5125, pp. 60-71. Springer, Heidelberg (2008).
[24]
Saxena, N., Seshadhri, C.: An almost optimal rank bound for depth-3 identities. CoRR, abs/0811.3161 (2008).
[25]
Schwartz, J.T.: Fast probabilistic algorithms for verification of polynomial identities. JACM 27(4), 701-717 (1980).
[26]
Shpilka, A.: Interpolation of depth-3 arithmetic circuits with two multiplication gates. SICOMP 38(6), 2130-2161 (2009).
[27]
Shpilka, A., Volkovich, I.: Read-once polynomial identity testing. In: Proceedings of the 40th STOC, pp. 507-516 (2008).
[28]
Zippel, R.: Probabilistic algorithms for sparse polynomials. In: Symbolic and algebraic computation, pp. 216-226 (1979).

Cited By

View all
  • (2018)Reconstruction of Full Rank Algebraic Branching ProgramsACM Transactions on Computation Theory10.1145/328242711:1(1-56)Online publication date: 21-Nov-2018
  • (2018)Complete Derandomization of Identity Testing and Reconstruction of Read-Once FormulasACM Transactions on Computation Theory10.1145/319683610:3(1-11)Online publication date: 23-May-2018
  • (2017)Complete derandomization of identity testing and reconstruction of read-once formulasProceedings of the 32nd Computational Complexity Conference10.5555/3135595.3135627(1-13)Online publication date: 9-Jul-2017
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
APPROX '09 / RANDOM '09: Proceedings of the 12th International Workshop and 13th International Workshop on Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques
August 2009
737 pages
ISBN:9783642036842
  • Editors:
  • Irit Dinur,
  • Klaus Jansen,
  • Joseph Naor,
  • José Rolim

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 21 August 2009

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2018)Reconstruction of Full Rank Algebraic Branching ProgramsACM Transactions on Computation Theory10.1145/328242711:1(1-56)Online publication date: 21-Nov-2018
  • (2018)Complete Derandomization of Identity Testing and Reconstruction of Read-Once FormulasACM Transactions on Computation Theory10.1145/319683610:3(1-11)Online publication date: 23-May-2018
  • (2017)Complete derandomization of identity testing and reconstruction of read-once formulasProceedings of the 32nd Computational Complexity Conference10.5555/3135595.3135627(1-13)Online publication date: 9-Jul-2017
  • (2017)Reconstruction of full rank algebraic branching programsProceedings of the 32nd Computational Complexity Conference10.5555/3135595.3135616(1-61)Online publication date: 9-Jul-2017
  • (2017)Linear matroid intersection is in quasi-NCProceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing10.1145/3055399.3055440(821-830)Online publication date: 19-Jun-2017
  • (2016)Arithmetic circuits with locally low algebraic rankProceedings of the 31st Conference on Computational Complexity10.5555/2982445.2982479(1-27)Online publication date: 29-May-2016
  • (2016)Reconstruction of real depth-3 circuits with top fan-in 2Proceedings of the 31st Conference on Computational Complexity10.5555/2982445.2982476(1-53)Online publication date: 29-May-2016
  • (2015)Subexponential size hitting sets for bounded depth multilinear formulasProceedings of the 30th Conference on Computational Complexity10.5555/2833227.2833242(304-322)Online publication date: 17-Jun-2015
  • (2015)Complexity Theory Column 88ACM SIGACT News10.1145/2852040.285205146:4(32-49)Online publication date: 1-Dec-2015
  • (2014)Hitting sets for multilinear read-once algebraic branching programs, in any orderProceedings of the forty-sixth annual ACM symposium on Theory of computing10.1145/2591796.2591816(867-875)Online publication date: 31-May-2014
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media