Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3055399.3055467acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
research-article

Faster space-efficient algorithms for subset sum and k-sum

Published: 19 June 2017 Publication History

Abstract

We present randomized algorithms that solve Subset Sum and Knapsack instances with n items in O*(20.86n) time, where the O*(·) notation suppresses factors polynomial in the input size, and polynomial space, assuming random read-only access to exponentially many random bits. These results can be extended to solve Binary Linear Programming on n variables with few constraints in a similar running time. We also show that for any constant k≥ 2, random instances of k-Sum can be solved using O(nk-0.5(n)) time and O(logn) space, without the assumption of random access to random bits.
Underlying these results is an algorithm that determines whether two given lists of length n with integers bounded by a polynomial in n share a common value. Assuming random read-only access to random bits, we show that this problem can be solved using O(logn) space significantly faster than the trivial O(n2) time algorithm if no value occurs too often in the same list.

Supplementary Material

MP4 File (d3_sa_am_t4.mp4)

References

[1]
Miklós Ajtai. 2005.
[2]
A Non-linear Time Lower Bound for Boolean Branching Programs. Theory of Computing 1, 8 (2005), 149–176.
[3]
Sanjeev Arora and Boaz Barak. 2009.
[4]
Computational Complexity - A Modern Approach. Cambridge University Press. http://www.cambridge.org/catalogue/ catalogue.asp?isbn=9780521424264
[5]
Per Austrin, Petteri Kaski, Mikko Koivisto, and Jussi Määttä. 2013. Space-Time Tradeoffs for Subset Sum: An Improved Worst Case Algorithm. In ICALP. 45–56.
[6]
Per Austrin, Petteri Kaski, Mikko Koivisto, and Jesper Nederlof. 2015. Subset Sum in the Absence of Concentration. In Symposium on Theoretical Aspects of Computer Science, STACS. 48–61.
[7]
Per Austrin, Petteri Kaski, Mikko Koivisto, and Jesper Nederlof. 2016.
[8]
Dense Subset Sum May Be the Hardest. In Symposium on Theoretical Aspects of Computer Science, STACS. 13:1–13:14.
[9]
Per Austrin, Petteri Kaski, Mikko Koivisto, and Jesper Nederlof. 2016. Sharper upper bounds for unbalanced Uniquely Decodable Code Pairs. In International Symposium on Information Theory, ISIT. 335–339.
[10]
Paul Beame, Raphaël Clifford, and Widad Machmouchi. 2013. Element distinctness, frequency moments, and sliding windows. In Foundations of Computer Science (FOCS). 290–299.
[11]
Anja Becker, Jean-Sébastien Coron, and Antoine Joux. 2011. Improved Generic Algorithms for Hard Knapsacks. In Advances in Cryptology - EUROCRYPT. 364– 385.
[12]
Matthijs J. Coster, Antoine Joux, Brian A. Lamacchia, Andrew M. Odlyzko, Claus-Peter Schnorr, and Jacques Stern. 1992. Improved low-density subset sum algorithms. Computational Complexity 2 (1992), 111–128.
[13]
Marek Cygan, Fedor Fomin, Bart M.P. Jansen, Lukasz Kowalik, Daniel Lokshtanov, Daniel Marx, Marcin Pilipczuk, Michal Pilipczuk, and Saket Saurabh. 2014. Open problems for FPT School (link). (2014).
[14]
Itai Dinur, Orr Dunkelman, Nathan Keller, and Adi Shamir. 2012. Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems. In Advances in Cryptology - CRYPTO. 719–740.
[15]
Rodney G. Downey, Michael R. Fellows, and Frank K. H. A. Dehne (Eds.). 2004.
[16]
Parameterized and Exact Computation, IWPEC.
[17]
Abraham Flaxman and Bartosz Przydatek. 2005. Solving Medium-Density Subset Sum Problems in Expected Polynomial Time. In Symposium on Theoretical Aspects of Computer Science STACS, Vol. 3404. 305–314.
[18]
Fedor V. Fomin and Dieter Kratsch. 2010.
[19]
Exact Exponential Algorithms. Springer.
[20]
Ellis Horowitz and Sartaj Sahni. 1974. Computing Partitions with Applications to the Knapsack Problem. J. ACM 21, 2 (1974), 277–292.
[21]
Nick Howgrave-Graham and Antoine Joux. 2010. New Generic Algorithms for Hard Knapsacks. In Advances in Cryptology - EUROCRYPT. 235–256.
[22]
Russell Impagliazzo, Shachar Lovett, Ramamohan Paturi, and Stefan Schneider. 2014.
[23]
0-1 Integer Linear Programming with a Linear Number of Constraints. CoRR abs/1401.5512 (2014). http://arxiv.org/abs/1401.5512
[24]
Russell Impagliazzo and Moni Naor. 1996.
[25]
Efficient Cryptographic Schemes Provably as Secure as Subset Sum. J. Cryptology 9, 4 (1996), 199–216.
[26]
Abhishek Jain, Krzysztof Pietrzak, and Aris Tentes. 2012. Hardness Preserving Constructions of Pseudorandom Functions. In Theory of Cryptography - TCC. 369–382.
[27]
Antoine Joux. 2009.
[28]
Algorithmic Cryptanalysis (1st ed.). Chapman & Hall/CRC.
[29]
Petteri Kaski, Mikko Koivisto, and Jesper Nederlof. 2012. Homomorphic Hashing for Sparse Coefficient Extraction. In Parameterized and Exact Computation - IPEC. 147–158.
[30]
Donald E. Knuth. 1981.
[31]
Seminumerical Algorithms (second ed.). The Art of Computer Programming, Vol. 2. Addison-Wesley, Reading, Massachusetts.
[32]
Jeffrey C. Lagarias and Andrew M. Odlyzko. 1985. Solving Low-Density Subset Sum Problems. J. ACM 32, 1 (1985), 229–246.
[33]
Anany V. Levitin. 2002.
[34]
Introduction to the Design and Analysis of Algorithms. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA.
[35]
Andrea Lincoln, Virginia Vassilevska Williams, Joshua R. Wang, and R. Ryan Williams. 2016. Deterministic Time-Space Trade-Offs for k-Sum. In ICALP. 58:1– 58:14.
[36]
Daniel Lokshtanov and Jesper Nederlof. 2010. Saving space by algebraization. In Symposium on Theory of Computing, STOC. 321–330.
[37]
Jesper Nederlof, Erik Jan van Leeuwen, and Ruben van der Zwaan. 2012. Reducing a Target Interval to a Few Exact Queries. In Mathematical Foundations of Computer Science - MFCS. 718–727.
[38]
Noam Nisan. 1992. Pseudorandom generators for space-bounded computation. Combinatorica 12, 4 (1992), 449–461.
[39]
Noam Nisan. 1993.
[40]
On Read-Once vs. Multiple Access to Randomness in Logspace. Theor. Comput. Sci. 107, 1 (1993), 135–144.
[41]
Andrew M. Odlyzko. 1990.
[42]
The rise and fall of knapsack cryptosystems. In Cryptology and Computational Number Theory. A.M.S, 75–88.
[43]
Mihai Patrascu and Ryan Williams. 2010.
[44]
On the Possibility of Faster SAT Algorithms. In Proceedings of the Twenty-First Annual ACM-SIAM Symposium on Discrete Algorithms, SODA.
[45]
Michael E. Saks. 1996. Randomization and Derandomization in Space_Bounded Computation. In Conference on Computational Complexity. 128–149.
[46]
Richard Schroeppel and Adi Shamir. 1981.
[47]
A T = O(2 n/2 ), S = O(2 n/4 ) Algorithm for Certain NP-Complete Problems. SIAM J. Comput. 10, 3 (1981), 456–464.
[48]
Paul C. van Oorschot and Michael J. Wiener. 1999.
[49]
Parallel Collision Search with Cryptanalytic Applications. J. Cryptology 12, 1 (1999), 1–28. //
[50]
H. van Tilborg. 1978. An upper bound for codes in a two-access binary erasure channel. IEEE Transactions on Information Theory 24, 1 (1978), 112–116.
[51]
Joshua R. Wang. 2014. Space-Efficient Randomized Algorithms for K-Sum. In European Symposium on Algorithms - ESA. 810–829.
[52]
Ryan Williams. New algorithms and lower bounds for circuits with linear threshold gates. In Symposium on Theory of Computing, STOC 2014.

Cited By

View all
  • (2022)SETH-based Lower Bounds for Subset Sum and Bicriteria PathACM Transactions on Algorithms10.1145/345052418:1(1-22)Online publication date: 23-Jan-2022
  • (2021)On near-linear-time algorithms for dense subset sumProceedings of the Thirty-Second Annual ACM-SIAM Symposium on Discrete Algorithms10.5555/3458064.3458171(1777-1796)Online publication date: 10-Jan-2021
  • (2021)The (Coarse) Fine-Grained Structure of NP-Hard SAT and CSP ProblemsACM Transactions on Computation Theory10.1145/349233614:1(1-54)Online publication date: 15-Dec-2021
  • Show More Cited By

Index Terms

  1. Faster space-efficient algorithms for subset sum and k-sum

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    STOC 2017: Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing
    June 2017
    1268 pages
    ISBN:9781450345286
    DOI:10.1145/3055399
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 19 June 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tag

    1. Algorithms

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    STOC '17
    Sponsor:
    STOC '17: Symposium on Theory of Computing
    June 19 - 23, 2017
    Montreal, Canada

    Acceptance Rates

    Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

    Upcoming Conference

    STOC '25
    57th Annual ACM Symposium on Theory of Computing (STOC 2025)
    June 23 - 27, 2025
    Prague , Czech Republic

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)8
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 08 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)SETH-based Lower Bounds for Subset Sum and Bicriteria PathACM Transactions on Algorithms10.1145/345052418:1(1-22)Online publication date: 23-Jan-2022
    • (2021)On near-linear-time algorithms for dense subset sumProceedings of the Thirty-Second Annual ACM-SIAM Symposium on Discrete Algorithms10.5555/3458064.3458171(1777-1796)Online publication date: 10-Jan-2021
    • (2021)The (Coarse) Fine-Grained Structure of NP-Hard SAT and CSP ProblemsACM Transactions on Computation Theory10.1145/349233614:1(1-54)Online publication date: 15-Dec-2021
    • (2020)Top-𝑘-convolution and the quest for near-linear output-sensitive subset sumProceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing10.1145/3357713.3384308(982-995)Online publication date: 22-Jun-2020
    • (2020)Low Weight Discrete Logarithm and Subset Sum in with Polynomial MemoryAdvances in Cryptology – EUROCRYPT 202010.1007/978-3-030-45727-3_4(94-122)Online publication date: 10-May-2020
    • (2019)A subquadratic approximation scheme for partitionProceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms10.5555/3310435.3310440(70-88)Online publication date: 6-Jan-2019
    • (2019)SETH-based lower bounds for subset sum and bicriteria pathProceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms10.5555/3310435.3310438(41-57)Online publication date: 6-Jan-2019
    • (2019)Improved Combinatorial Algorithms for the Inhomogeneous Short Integer Solution ProblemJournal of Cryptology10.1007/s00145-018-9304-132:1(35-83)Online publication date: 1-Jan-2019
    • (2019)Improved Low-Memory Subset Sum and LPN Algorithms via Multiple CollisionsCryptography and Coding10.1007/978-3-030-35199-1_9(178-199)Online publication date: 18-Nov-2019
    • (2018)Binary Solutions to Some Systems of Linear EquationsOptimization Problems and Their Applications10.1007/978-3-319-93800-4_15(183-192)Online publication date: 17-Jun-2018

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media