complete derandomization of identity testing of read once
play

Complete Derandomization of Identity Testing of Read-Once Formulas - PowerPoint PPT Presentation

Introduction Previous Results Our Model Read-Once Polynomials Our Results Complete Derandomization of Identity Testing of Read-Once Formulas Daniel Minahan Ilya Volkovich University of Michigan Presented by: Ramprasad Saptharishi


  1. Introduction Previous Results Our Model Read-Once Polynomials Our Results Complete Derandomization of Identity Testing of Read-Once Formulas Daniel Minahan Ilya Volkovich University of Michigan Presented by: Ramprasad Saptharishi

  2. Introduction Previous Results Our Model Read-Once Polynomials Our Results Outline Introduction 1

  3. Introduction Previous Results Our Model Read-Once Polynomials Our Results Outline Introduction 1 Previous Results 2

  4. Introduction Previous Results Our Model Read-Once Polynomials Our Results Outline Introduction 1 Previous Results 2 Our Model 3

  5. Introduction Previous Results Our Model Read-Once Polynomials Our Results Outline Introduction 1 Previous Results 2 Our Model 3 Read-Once Polynomials 4

  6. Introduction Previous Results Our Model Read-Once Polynomials Our Results Outline Introduction 1 Previous Results 2 Our Model 3 Read-Once Polynomials 4 Our Results 5

  7. Introduction Previous Results Our Model Read-Once Polynomials Our Results Problem Definition Definition (Polynomial Identity Testing (PIT)) Given a succinct representation of a polynomial P in n variables over a field F , decide efficiently if P is identically 0.

  8. Introduction Previous Results Our Model Read-Once Polynomials Our Results Problem Definition Definition (Polynomial Identity Testing (PIT)) Given a succinct representation of a polynomial P in n variables over a field F , decide efficiently if P is identically 0. This requires a few things to be specified.

  9. Introduction Previous Results Our Model Read-Once Polynomials Our Results Problem Definition Definition (Polynomial Identity Testing (PIT)) Given a succinct representation of a polynomial P in n variables over a field F , decide efficiently if P is identically 0. This requires a few things to be specified. Method of representation

  10. Introduction Previous Results Our Model Read-Once Polynomials Our Results Problem Definition Definition (Polynomial Identity Testing (PIT)) Given a succinct representation of a polynomial P in n variables over a field F , decide efficiently if P is identically 0. This requires a few things to be specified. Method of representation Efficiency

  11. Introduction Previous Results Our Model Read-Once Polynomials Our Results Problem Definition Definition (Polynomial Identity Testing (PIT)) Given a succinct representation of a polynomial P in n variables over a field F , decide efficiently if P is identically 0. This requires a few things to be specified. Method of representation Efficiency Allowed actions

  12. Introduction Previous Results Our Model Read-Once Polynomials Our Results Succinct Representation

  13. Introduction Previous Results Our Model Read-Once Polynomials Our Results Succinct Representation Definition An arithmetic formula is a directed tree from variables ( x 1 , . . . , x n ) to an output. Each leaf is assigned a variable or field element and each internal node, or gate, is assigned an operation + or × . Idea: Model small computational devices Figure: Example of an Arithmetic Formula for ( x 1 + 1)(2 x 2 ) + x 2 + x 3

  14. Introduction Previous Results Our Model Read-Once Polynomials Our Results Black-Box Setting We cannot see the formula.

  15. Introduction Previous Results Our Model Read-Once Polynomials Our Results Black-Box Setting We cannot see the formula. We can only send inputs to the formula and receive an output.

  16. Introduction Previous Results Our Model Read-Once Polynomials Our Results Black-Box Setting We cannot see the formula. We can only send inputs to the formula and receive an output.

  17. Introduction Previous Results Our Model Read-Once Polynomials Our Results Black-Box Setting We cannot see the formula. We can only send inputs to the formula and receive an output.

  18. Introduction Previous Results Our Model Read-Once Polynomials Our Results Black-Box Setting We cannot see the formula. We can only send inputs to the formula and receive an output. We are allowed to query the formula on a small extension field.

  19. Introduction Previous Results Our Model Read-Once Polynomials Our Results Black-Box Setting We cannot see the formula. We can only send inputs to the formula and receive an output. We are allowed to query the formula on a small extension field. Definition (Hitting Set) Let C ⊆ F [ x 1 , . . . , x n ]. A set H ⊆ F n is called a hitting set for C provided that for any P ∈ C with P �≡ 0, ∃ ¯ a ∈ H with P (¯ a ) � = 0.

  20. Introduction Previous Results Our Model Read-Once Polynomials Our Results Black-Box Setting We cannot see the formula. We can only send inputs to the formula and receive an output. We are allowed to query the formula on a small extension field. Definition (Hitting Set) Let C ⊆ F [ x 1 , . . . , x n ]. A set H ⊆ F n is called a hitting set for C provided that for any P ∈ C with P �≡ 0, ∃ ¯ a ∈ H with P (¯ a ) � = 0. H gives an algorithm that runs in time O ( |H| ).

  21. Introduction Previous Results Our Model Read-Once Polynomials Our Results Black-Box Setting We cannot see the formula. We can only send inputs to the formula and receive an output. We are allowed to query the formula on a small extension field. Definition (Hitting Set) Let C ⊆ F [ x 1 , . . . , x n ]. A set H ⊆ F n is called a hitting set for C provided that for any P ∈ C with P �≡ 0, ∃ ¯ a ∈ H with P (¯ a ) � = 0. H gives an algorithm that runs in time O ( |H| ). Goal: find a small hitting set for polynomials computed by small formulas.

  22. Introduction Previous Results Our Model Read-Once Polynomials Our Results Applications Various application in Complexity Theory and Algorithm Design:

  23. Introduction Previous Results Our Model Read-Once Polynomials Our Results Applications Various application in Complexity Theory and Algorithm Design: Fibonacci Identity: ( a 2 + b 2 )( c 2 + d 2 ) = ( ac − bd ) 2 + ( ad + bc ) 2

  24. Introduction Previous Results Our Model Read-Once Polynomials Our Results Applications Various application in Complexity Theory and Algorithm Design: Fibonacci Identity: ( a 2 + b 2 )( c 2 + d 2 ) = ( ac − bd ) 2 + ( ad + bc ) 2 Graph Perfect Matching [MVV87]

  25. Introduction Previous Results Our Model Read-Once Polynomials Our Results Applications Various application in Complexity Theory and Algorithm Design: Fibonacci Identity: ( a 2 + b 2 )( c 2 + d 2 ) = ( ac − bd ) 2 + ( ad + bc ) 2 Graph Perfect Matching [MVV87] Primality Testing [AKS04]

  26. Introduction Previous Results Our Model Read-Once Polynomials Our Results Applications Various application in Complexity Theory and Algorithm Design: Fibonacci Identity: ( a 2 + b 2 )( c 2 + d 2 ) = ( ac − bd ) 2 + ( ad + bc ) 2 Graph Perfect Matching [MVV87] Primality Testing [AKS04] IP = PSPACE [Sha90]

  27. Introduction Previous Results Our Model Read-Once Polynomials Our Results Applications Various application in Complexity Theory and Algorithm Design: Fibonacci Identity: ( a 2 + b 2 )( c 2 + d 2 ) = ( ac − bd ) 2 + ( ad + bc ) 2 Graph Perfect Matching [MVV87] Primality Testing [AKS04] IP = PSPACE [Sha90] PCP Theorem [AS98]

  28. Introduction Previous Results Our Model Read-Once Polynomials Our Results Applications Various application in Complexity Theory and Algorithm Design: Fibonacci Identity: ( a 2 + b 2 )( c 2 + d 2 ) = ( ac − bd ) 2 + ( ad + bc ) 2 Graph Perfect Matching [MVV87] Primality Testing [AKS04] IP = PSPACE [Sha90] PCP Theorem [AS98] Geometric Complexity Theory [Mul12]

  29. Introduction Previous Results Our Model Read-Once Polynomials Our Results Applications Various application in Complexity Theory and Algorithm Design: Fibonacci Identity: ( a 2 + b 2 )( c 2 + d 2 ) = ( ac − bd ) 2 + ( ad + bc ) 2 Graph Perfect Matching [MVV87] Primality Testing [AKS04] IP = PSPACE [Sha90] PCP Theorem [AS98] Geometric Complexity Theory [Mul12] ...

  30. Introduction Previous Results Our Model Read-Once Polynomials Our Results Existing Algorithms Suppose we can generate a random element of a field F . Then we have a general PIT algorithm.

  31. Introduction Previous Results Our Model Read-Once Polynomials Our Results Existing Algorithms Suppose we can generate a random element of a field F . Then we have a general PIT algorithm. Lemma (Schwartz-Zippel) Let P ∈ F [ x 1 , . . . , x n ] with total degree bounded by some d ∈ N . d Pick some finite S ⊆ F . Then Pr ¯ x ∈ S n [ P (¯ x ) = 0] ≤ | S | .

  32. Introduction Previous Results Our Model Read-Once Polynomials Our Results Existing Algorithms Suppose we can generate a random element of a field F . Then we have a general PIT algorithm. Lemma (Schwartz-Zippel) Let P ∈ F [ x 1 , . . . , x n ] with total degree bounded by some d ∈ N . d Pick some finite S ⊆ F . Then Pr ¯ x ∈ S n [ P (¯ x ) = 0] ≤ | S | . This does not provide a deterministic algorithm but suggests that one might exist.

  33. Introduction Previous Results Our Model Read-Once Polynomials Our Results Hardness Results [KI04]: Deterministic PIT = ⇒ super-polynomial circuit lower bounds: Boolean for NEXP or arithmetic for Permanent.

Recommend


More recommend