Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2488608.2488649acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
research-article

Quasi-polynomial hitting-set for set-depth-Δ formulas

Published: 01 June 2013 Publication History
  • Get Citation Alerts
  • Abstract

    We call a depth-4 formula C set-depth-4 if there exists a (unknown) partition X1⊔⋅⋅⋅⊔ Xd of the variable indices [n] that the top product layer respects, i.e. C(term{x})=∑i=1kj=1d fi,j(term{x}Xj), where fi,j is a sparse polynomial in F[term{x}Xj]. Extending this definition to any depth - we call a depth-D formula C (consisting of alternating layers of Σ and Π gates, with a Σ-gate on top) a set-depth-D formula if every Π-layer in C respects a (unknown) partition on the variables; if D is even then the product gates of the bottom-most Π-layer are allowed to compute arbitrary monomials. In this work, we give a hitting-set generator for set-depth-D formulas (over any field) with running time polynomial in exp((D2log s) Δ - 1), where s is the size bound on the input set-depth-D formula. In other words, we give a quasi-polynomial time blackbox polynomial identity test for such constant-depth formulas. Previously, the very special case of D=3 (also known as set-multilinear depth-3 circuits) had no known sub-exponential time hitting-set generator. This was declared as an open problem by Shpilka & Yehudayoff (FnT-TCS 2010); the model being first studied by Nisan & Wigderson (FOCS 1995) and recently by Forbes & Shpilka (STOC 2012 & ECCC TR12-115). Our work settles this question, not only for depth-3 but, up to depth εlog s / log log s, for a fixed constant ε < 1. The technique is to investigate depth-D formulas via depth-(D-1) formulas over a Hadamard algebra, after applying a 'shift' on the variables. We propose a new algebraic conjecture about the low-support rank-concentration in the latter formulas, and manage to prove it in the case of set-depth-D formulas.

    References

    [1]
    L. M. Adleman and H. W. Lenstra. Finding irreducible polynomials over finite fields. In STOC, pages 350--355, 1986.
    [2]
    M. Agrawal. On the Arithmetic Complexity of Euler Function. In CSR, pages 43--49, 2011.
    [3]
    M. Agrawal, C. Saha, R. Saptharishi, and N. Saxena. Jacobian hits circuits: Hitting- sets, lower bounds for depth-D occur-k formulas & depth-3 transcendence degree-k circuits. In STOC, pages 599--614, 2012.
    [4]
    M. Agrawal and V. Vinay. Arithmetic circuits: A chasm at depth four. In FOCS, pages 67--75, 2008.
    [5]
    M. Anderson, D. van Melkebeek, and I. Volkovich. Derandomizing polynomial identity testing for multilinear constant-read formulae. In CCC, pages 273--282, 2011.
    [6]
    M. Blaser, M. Hardt, R. J. Lipton, and N. K. Vishnoi. Deterministically testing sparse polynomial identities of unbounded degree. Inform. Process. Lett., 109(3):187--192, 2009.
    [7]
    X. Chen, N. Kayal, and A. Wigderson. Partial Derivatives in Arithmetic Complexity and Beyond. FnT-TCS, 6(1--2):1--138, 2011.
    [8]
    M. Forbes and A. Shpilka. On identity testing of tensors, low-rank recovery and compressed sensing. In STOC, pages 163--172, 2012.
    [9]
    M. Forbes and A. Shpilka. Quasipolynomial-time Identity Testing of Non-Commutative & Read-Once Oblivious ABP. ECCC, 2012.
    [10]
    A. Gupta, P. Kamath, N. Kayal, and R. Saptharishi. Approaching the chasm at depth four. In CCC, 2013.
    [11]
    A. Gupta, P. Kamath, N. Kayal, and R. Saptharishi. Arithmetic circuits: A chasm at depth three. Electronic Colloquium on Computational Complexity (ECCC), 20:26, 2013.
    [12]
    A. Gupta, N. Kayal, and Y. Qiao. Random Arithmetic Formulas can be Reconstructed Efficiently. In CCC, 2013.
    [13]
    A. Klivans and A. Shpilka. Learning restricted models of arithmetic circuits. ToC, 2(1):185--206, 2006.
    [14]
    P. Koiran. Arithmetic circuits: The chasm at depth four gets wider. Theor. Comput. Sci., 448:56--65, 2012.
    [15]
    K. Mulmuley. Geometric Complexity Theory V: Equivalence between blackbox derandomization of polynomial identity testing and derandomization of Noether's Normalization Lemma. In FOCS, 2012.
    [16]
    N. Nisan and A. Wigderson. Lower bounds on arithmetic circuits via partial derivatives. Comp. Complex., 6(3):217--234, 1997.
    [17]
    R. Raz. Tensor-rank and lower bounds for arithmetic formulas. In STOC, pages 659--666, 2010.
    [18]
    R. Raz and A. Shpilka. Deterministic PIT in non-commutative models. Comp. Complex., 14(1):1--19, 2005.
    [19]
    C. Saha, R. Saptharishi, and N. Saxena. The power of depth 2 circuits over algebras. In FSTTCS, pages 371--382, 2009.
    [20]
    C. Saha, R. Saptharishi, and N. Saxena. A case of depth-3 identity testing, sparse factorization and duality. Comp. Complex., 2012. ECCC TR11-021.
    [21]
    N. Saxena. Diagonal circuit identity testing and lower bounds. In ICALP, pages 60--71, 2008.
    [22]
    N. Saxena. Progress on polynomial identity testing. Bulletin of EATCS, (99):49--79, 2009.
    [23]
    N. Saxena and C. Seshadhri. Blackbox identity testing for bounded top fanin depth-3 circuits: the field doesn't matter. In STOC, pages 431--440, 2011.
    [24]
    J. T. Schwartz. Fast probabilistic algorithms for verification of polynomial identities. JACM, 27(4):701--717, 1980.
    [25]
    A. Shpilka and A. Yehudayoff. Arithmetic circuits: A survey of recent results and open questions. FnT-TCS, 5(3--4):207--388, 2010.
    [26]
    S. Skyum and L. G. Valiant. A Complexity Theory Based on Boolean Algebra. J. ACM, 32(2):484--502, 1985.
    [27]
    R. Smolensky. On Interpolation by Analytic Functions with Special Properties and Some Weak Lower Bounds on the Size of Circuits with Symmetric Gates. In FOCS, pages 628--631, 1990.
    [28]
    L. G. Valiant. Completeness classes in algebra. In STOC, pages 249--261, 1979.
    [29]
    L. G. Valiant, S. Skyum, S. Berkowitz, and C. Rackoff. Fast Parallel Computation of Polynomials Using Few Processors. SIAM J. Comput., 12(4):641--644, 1983.
    [30]
    R. Zippel. Probabilistic algorithms for sparse polynomials. In Proceedings of the International Symposium on Symbolic and Algebraic Manipulation (EUROSAM), pages 216--226, 1979.

    Cited By

    View all

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    STOC '13: Proceedings of the forty-fifth annual ACM symposium on Theory of Computing
    June 2013
    998 pages
    ISBN:9781450320290
    DOI:10.1145/2488608
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 June 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. hadamard algebra
    2. hitting-set
    3. identity testing
    4. low-support rank concentration
    5. set-multilinear formula

    Qualifiers

    • Research-article

    Conference

    STOC'13
    Sponsor:
    STOC'13: Symposium on Theory of Computing
    June 1 - 4, 2013
    California, Palo Alto, USA

    Acceptance Rates

    STOC '13 Paper Acceptance Rate 100 of 360 submissions, 28%;
    Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Improved Hitting Set for Orbit of ROABPsComputational Complexity10.1007/s00037-022-00230-931:2Online publication date: 1-Dec-2022
    • (2021)Deterministic identity testing paradigms for bounded top-fanin depth-4 circuitsProceedings of the 36th Computational Complexity Conference10.4230/LIPIcs.CCC.2021.11Online publication date: 20-Jul-2021
    • (2021)Derandomization and Absolute Reconstruction for Sums of Powers of Linear FormsTheoretical Computer Science10.1016/j.tcs.2021.07.005Online publication date: Jul-2021
    • (2021)Blackbox identity testing for sum of special ROABPs and its border classcomputational complexity10.1007/s00037-021-00209-y30:1Online publication date: 10-Jun-2021
    • (2020)Separation Between Read-once Oblivious Algebraic Branching Programs (ROABPs) and Multilinear Depth-three CircuitsACM Transactions on Computation Theory10.1145/336992812:1(1-27)Online publication date: 11-Feb-2020
    • (2019)Bootstrapping variables in algebraic circuitsProceedings of the National Academy of Sciences10.1073/pnas.1901272116116:17(8107-8118)Online publication date: 11-Apr-2019
    • (2018)Complete Derandomization of Identity Testing and Reconstruction of Read-Once FormulasACM Transactions on Computation Theory10.1145/319683610:3(1-11)Online publication date: 23-May-2018
    • (2018)Bootstrapping variables in algebraic circuitsProceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing10.1145/3188745.3188762(1166-1179)Online publication date: 20-Jun-2018
    • (2018)Black-Box Identity Testing of Depth-4 Multilinear CircuitsCombinatorica10.1007/s00493-016-3460-438:5(1205-1238)Online publication date: 1-Oct-2018
    • (2018)Algebraic independence over positive characteristicComputational Complexity10.1007/s00037-018-0167-527:4(617-670)Online publication date: 1-Dec-2018
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media