Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/276698.276856acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free access

Checking polynomial identities over any field: towards a derandomization?

Published: 23 May 1998 Publication History
First page of PDF

References

[1]
S. Arora, C. Lurid, R. Motwani, M. Sudan, and M. Szegedy. Proof verification and hardness of approximation problems. In Proceedings of the Thirty Third Annual Symposium on Foundations of Computer Science, pages 14-23, 1992.
[2]
S. Arora and S. Safra. Probabilistic checking of proofs. In Proceedings of the Thirty Third Annual Symposium on Foundations of Computer Science, pages 2- 13, 1992.
[3]
M. Blum, A.K. Chandra, and M.N. Wegman. Equivalence of free Boolean graphs can be tested in polynomial time. Information Processing Letters, 10:80--.82, 1980.
[4]
l.~z16 Babai, Lance Formow, and Carsten Lund. Nondeterministic exponential time has two-prover interactive protocols. In 31st Annual S~mpositan on Foundations of Computer Science, volume I, pages 16.-25, St. Louis, Missouri, 22-24 October 1990. IEEE.
[5]
M. Blum and S. Khanna. Designing programs that check their work. Journal of the Association for Computing Machinery, 42:269--291, 1995.
[6]
Michael Clausen, Andreas Dress, Johannes Grab. meier, and Marek Karpinski. On zero-testing and inter. polation of k-sparse multivariate polynomials over finite fields. Theoretical Computer Science, 84(2):151- 164, 29 July 1991.
[7]
Zlfi-~ong Chert and Ming-Yang Kao. Reducing randomness via irrational numbers. In Proceedings of the TwenO,-IVinth Annual ACM Symposium on Theory of Computing, pages 200--209, El Paso, Texas, 4--6 May 1997.
[8]
Suresh Chad, Pankaj Rohatgi, and Aravind Srini,asan. Randomness-optimal unique element isolation with applications to perfect matching and related problems. SIAM Journal on Computing, 24(5): 1036-1050, October 1995.
[9]
David Eisenbud. Commutative Algebra with a View Toward Algebraic Geometry. Graduate Texts in Mathematies 150. Springer-Verlag, 1995.
[10]
Dima Yu. Grigoriev, Marek Karpinski, and Michael F. Singer. Fast parallel algorithms for sparse multivariate polynomial interpolation over finite fields. SIAM Journal on Computing, 19(6):1059-1063, December 1990.
[11]
Erich Kaltofen. A polynomial reduction from multivariate to bivariate integral polynomial factoriz;ation. In Proceedings of the Fourteenth Annual ACM Symposium on Theory of Computing, pages 261-266, San Francisco, California, 5--7 May 1982.
[12]
Erich Kaltofen. Greatest common divisors of polynomials given by straight-line programs. Journal of tfle Association for Computing Machinery, 35(I ):231- 264, January 1988.
[13]
Serge Lang. Algebra. Addison-Wesley, 3 edition, 1993.
[14]
C. Lund, L. Fortnow, H. Karlofi, and N. Nisan. Algebraic methods for interactive proofs. In Proceedings of the ThirO, First Annual Sympositan on Foundations of Computer Science, pages 1-10, 1990.
[15]
L. Lovasz. On determinants, matehings, and random algorithms. In L. Budach, editor, Fundamentals of Computing Theot3.,. Akademia-Verlag, 1979.
[16]
Daniel Lewin and Salil Vadhan. Checking polynomial identities over any field: Towards a derandomization7 Available from http: / / theory, lcs .mi t. edu/~danl or http: //www-math.mi t. edu/~salil, 1~98.
[17]
K. Mulmuley, U. Vazirani, and V. Vazirani. Matching is as easy as matrix inversion. Combinatorica, 7(1):105-113, 1987.
[18]
Ron M. Roth and Gyora M. Benedek. Interpolation and approximation of sparse multivariate polynomials over GF(2). SIAM Journal on Computing, 20(2):291- 314, April 1991.
[19]
J.T. Schwartz. Fast probabilistie algorithms fer verification of polynomial identifies. Journal of the Association for Computing MachineD, 27(4):701-717, October 1980.
[20]
Adi Shamir. IP=PSPACE. In Proceedings ofthe Thirty First Annual Symposium on Foundations of Computer Science, pages 11-15, 1990.
[21]
V. Strassen. Berechnung und programm I. Acta informatica, 1:320--335, 1972. In German.
[22]
Joachim yon zur Gathen and Erich Kaltofen. Factoring sparse multivariate polynomials. Journal of Computer and System Sciences, 31 (2):265-287, October 1985.
[23]
R.E. Zippel. Probabilistie algorithms for sparse polynomials. In Proceedings of EUROSAM '79, pages 216-226. Springer-Verlag, 1979. Lecture Notes in Computer Science, vol. 72.
[24]
R. Zippel. Newton's iteration and the sparse Hensel algorithm. In Proceedings of the 1981 ACM Symposium on Symbolic and Algebraic Computation, pages 68-72, Utah, 1981.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
STOC '98: Proceedings of the thirtieth annual ACM symposium on Theory of computing
May 1998
684 pages
ISBN:0897919629
DOI:10.1145/276698
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 May 1998

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

STOC98
Sponsor:

Acceptance Rates

STOC '98 Paper Acceptance Rate 75 of 169 submissions, 44%;
Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)36
  • Downloads (Last 6 weeks)8
Reflects downloads up to 16 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2022)On Hitting-Set Generators for Polynomials that Vanish RarelyComputational Complexity10.1007/s00037-022-00229-231:2Online publication date: 1-Dec-2022
  • (2019)Random construction of partial MDS codesDesigns, Codes and Cryptography10.1007/s10623-019-00705-xOnline publication date: 18-Dec-2019
  • (2017)On the genericity of maximum rank distance and Gabidulin codesDesigns, Codes and Cryptography10.1007/s10623-017-0354-486:2(341-363)Online publication date: 8-Apr-2017
  • (2013)From sylvester-gallai configurations to rank boundsJournal of the ACM10.1145/252840360:5(1-33)Online publication date: 28-Oct-2013
  • (2013)Algebraic independence and blackbox identity testingInformation and Computation10.1016/j.ic.2012.10.004222(2-19)Online publication date: 1-Jan-2013
  • (2013)A Case of Depth-3 Identity Testing, Sparse Factorization and DualityComputational Complexity10.1007/s00037-012-0054-422:1(39-69)Online publication date: 1-Mar-2013
  • (2011)Algebraic independence and blackbox identity testingProceedings of the 38th international conference on Automata, languages and programming - Volume Part II10.5555/2027223.2027236(137-148)Online publication date: 4-Jul-2011
  • (2011)Blackbox identity testing for bounded top fanin depth-3 circuitsProceedings of the forty-third annual ACM symposium on Theory of computing10.1145/1993636.1993694(431-440)Online publication date: 6-Jun-2011
  • (2011)Algebraic Independence and Blackbox Identity TestingAutomata, Languages and Programming10.1007/978-3-642-22012-8_10(137-148)Online publication date: 2011
  • (2011)Recent Results on Polynomial Identity TestingComputer Science – Theory and Applications10.1007/978-3-642-20712-9_31(397-400)Online publication date: 2011
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media