-
An efficient uniqueness theorem for overcomplete tensor decomposition
Authors:
Pascal Koiran
Abstract:
We give a new, constructive uniqueness theorem for tensor decomposition. It applies to order 3 tensors of format $n \times n \times p$ and can prove uniqueness of decomposition for generic tensors up to rank $r=4n/3$ as soon as $p \geq 4$. One major advantage over Kruskal's uniqueness theorem is that our theorem has an algorithmic proof, and the resulting algorithm is efficient. Like the uniquenes…
▽ More
We give a new, constructive uniqueness theorem for tensor decomposition. It applies to order 3 tensors of format $n \times n \times p$ and can prove uniqueness of decomposition for generic tensors up to rank $r=4n/3$ as soon as $p \geq 4$. One major advantage over Kruskal's uniqueness theorem is that our theorem has an algorithmic proof, and the resulting algorithm is efficient. Like the uniqueness theorem, it applies in the range $n \leq r \leq 4n/3$. As a result, we obtain the first efficient algorithm for overcomplete decomposition of generic tensors of order 3.
For instance, prior to this work it was not known how to efficiently decompose generic tensors of format $n \times n \times n$ and rank $r=1.01n$ (or rank $r \leq (1+ε) n$, for some constant $ε>0$). Efficient overcomplete decomposition of generic tensors of format $n \times n \times 3$ remains an open problem.
Our results are based on the method of commuting extensions pioneered by Strassen for the proof of his $3n/2$ lower bound on tensor rank and border rank. In particular, we rely on an algorithm for the computation of commuting extensions recently proposed in a companion paper, and on the classical diagonalization-based "Jennrich algorithm" for undercomplete tensor decomposition.
This is an updated version of a paper presented at SODA 2025. As a new result, we answer a question from that paper by giving a NP-hardness result for the computation of commuting extensions. The proof relies on a recent construction by Shitov. After the paper appearing in the SODA proceedings was written, another algorithm for the overcomplete decomposition of generic tensors of order~3 was proposed by Kothari, Moitra and Wein.
△ Less
Submitted 11 February, 2025; v1 submitted 11 April, 2024;
originally announced April 2024.
-
Undercomplete Decomposition of Symmetric Tensors in Linear Time, and Smoothed Analysis of the Condition Number
Authors:
Pascal Koiran,
Subhayan Saha
Abstract:
We study symmetric tensor decompositions, i.e., decompositions of the form $T = \sum_{i=1}^r u_i^{\otimes 3}$ where $T$ is a symmetric tensor of order 3 and $u_i \in \mathbb{C}^n$.In order to obtain efficient decomposition algorithms, it is necessary to require additional properties from $u_i$. In this paper we assume that the $u_i$ are linearly independent.This implies $r \leq n$,that is, the dec…
▽ More
We study symmetric tensor decompositions, i.e., decompositions of the form $T = \sum_{i=1}^r u_i^{\otimes 3}$ where $T$ is a symmetric tensor of order 3 and $u_i \in \mathbb{C}^n$.In order to obtain efficient decomposition algorithms, it is necessary to require additional properties from $u_i$. In this paper we assume that the $u_i$ are linearly independent.This implies $r \leq n$,that is, the decomposition of T is undercomplete.
We give a randomized algorithm for the following problem in the exact arithmetic model of computation: Let $T$ be an order-3 symmetric tensor that has an undercomplete decomposition. Then given some $T'$ close to $T$, an accuracy parameter $\varepsilon$, and an upper bound B on the condition number of the tensor, output vectors $u'_i$ such that $||u_i - u'_i|| \leq \varepsilon$ (up to permutation and multiplication by cube roots of unity) with high probability. The main novel features of our algorithm are:
1) We provide the first algorithm for this problem that runs in linear time in the size of the input tensor. More specifically, it requires $O(n^3)$ arithmetic operations for all accuracy parameters $\varepsilon =$ 1/poly(n) and B = poly(n).
2) Our algorithm is robust, that is, it can handle inverse-quasi-polynomial noise (in $n$,B,$\frac{1}{\varepsilon}$) in the input tensor.
3) We present a smoothed analysis of the condition number of the tensor decomposition problem. This guarantees that the condition number is low with high probability and further shows that our algorithm runs in linear time, except for some rare badly conditioned inputs.
Our main algorithm is a reduction to the complete case ($r=n$) treated in our previous work [Koiran,Saha,CIAC 2023]. For efficiency reasons we cannot use this algorithm as a blackbox. Instead, we show that it can be run on an implicitly represented tensor obtained from the input tensor by a change of basis.
△ Less
Submitted 11 March, 2025; v1 submitted 1 March, 2024;
originally announced March 2024.
-
On the uniqueness and computation of commuting extensions
Authors:
Pascal Koiran
Abstract:
A tuple (Z_1,...,Z_p) of matrices of size r is said to be a commuting extension of a tuple (A_1,...,A_p) of matrices of size n <r if the Z_i pairwise commute and each A_i sits in the upper left corner of a block decomposition of Z_i. This notion was discovered and rediscovered in several contexts including algebraic complexity theory (in Strassen's work on tensor rank), in numerical analysis for t…
▽ More
A tuple (Z_1,...,Z_p) of matrices of size r is said to be a commuting extension of a tuple (A_1,...,A_p) of matrices of size n <r if the Z_i pairwise commute and each A_i sits in the upper left corner of a block decomposition of Z_i. This notion was discovered and rediscovered in several contexts including algebraic complexity theory (in Strassen's work on tensor rank), in numerical analysis for the construction of cubature formulas and in quantum mechanics for the study of computational methods and the study of the so-called "quantum Zeno dynamics." Commuting extensions have also attracted the attention of the linear algebra community. In this paper we present 3 types of results:
(i) Theorems on the uniqueness of commuting extensions for three matrices or more.
(ii) Algorithms for the computation of commuting extensions of minimal size. These algorithms work under the same assumptions as our uniqueness theorems. They are applicable up to r=4n/3, and are apparently the first provably efficient algorithms for this problem applicable beyond r=n+1.
(iii) A genericity theorem showing that our algorithms and uniqueness theorems can be applied to a wide range of input matrices.
△ Less
Submitted 2 January, 2024;
originally announced January 2024.
-
Complete Decomposition of Symmetric Tensors in Linear Time and Polylogarithmic Precision
Authors:
Pascal Koiran,
Subhayan Saha
Abstract:
We study symmetric tensor decompositions, i.e. decompositions of the input symmetric tensor T of order 3 as sum of r 3rd-order tensor powers of u_i where u_i are vectors in \C^n. In order to obtain efficient decomposition algorithms, it is necessary to require additional properties from the u_i. In this paper we assume that the u_i are linearly independent. This implies that r is at most n, i.e.,…
▽ More
We study symmetric tensor decompositions, i.e. decompositions of the input symmetric tensor T of order 3 as sum of r 3rd-order tensor powers of u_i where u_i are vectors in \C^n. In order to obtain efficient decomposition algorithms, it is necessary to require additional properties from the u_i. In this paper we assume that the u_i are linearly independent. This implies that r is at most n, i.e., the decomposition of T is undercomplete. We will moreover assume that r=n (we plan to extend this work to the case where r is strictly less than n in a forthcoming paper). We give a randomized algorithm for the following problem: given T, an accuracy parameter epsilon, and an upper bound B on the condition number of the tensor, output vectors u'_i such that u_i and u'_i differ by at most epsilon (in the l_2 norm and up to permutation and multiplication by phases) with high probability. The main novel features of our algorithm are: (1) We provide the first algorithm for this problem that works in the computation model of finite arithmetic and requires only poly-logarithmic (in n, B and 1/epsilon) many bits of precision. (2) Moreover, this is also the first algorithm that runs in linear time in the size of the input tensor. It requires O(n^3) arithmetic operations for all accuracy parameters epsilon = 1/poly(n).
△ Less
Submitted 11 March, 2025; v1 submitted 14 November, 2022;
originally announced November 2022.
-
Black Box Absolute Reconstruction for Sums of Powers of Linear Forms
Authors:
Pascal Koiran,
Subhayan Saha
Abstract:
We study the decomposition of multivariate polynomials as sums of powers of linear forms. We give a randomized algorithm for the following problem: If a homogeneous polynomial $f \in K[x_1 , . . . , x_n]$ (where $K \subseteq \mathbb{C}$) of degree $d$ is given as a blackbox, decide whether it can be written as a linear combination of $d$-th powers of linearly independent complex linear forms. The…
▽ More
We study the decomposition of multivariate polynomials as sums of powers of linear forms. We give a randomized algorithm for the following problem: If a homogeneous polynomial $f \in K[x_1 , . . . , x_n]$ (where $K \subseteq \mathbb{C}$) of degree $d$ is given as a blackbox, decide whether it can be written as a linear combination of $d$-th powers of linearly independent complex linear forms. The main novel features of the algorithm are:
(1) For $d = 3$, we improve by a factor of $n$ on the running time from an algorithm by Koiran and Skomra. The price to be paid for this improvement though is that the algorithm now has two-sided error.
(2) For $d > 3$, we provide the first randomized blackbox algorithm for this problem that runs in time polynomial in $n$ and $d$ (in an algebraic model where only arithmetic operations and equality tests are allowed). Previous algorithms for this problem as well as most of the existing reconstruction algorithms for other classes appeal to a polynomial factorization subroutine. This requires extraction of complex polynomial roots at unit cost and in standard models such as the unit-cost RAM or the Turing machine this approach does not yield polynomial time algorithms.
(3) For $d > 3$, when $f$ has rational coefficients, the running time of the blackbox algorithm is polynomial in $n,d$ and the maximal bit size of any coefficient of $f$. This yields the first algorithm for this problem over $\mathbb{C}$ with polynomial running time in the bit model of computation.
△ Less
Submitted 11 October, 2021;
originally announced October 2021.
-
On tensor rank and commuting matrices
Authors:
Pascal Koiran
Abstract:
Obtaining superlinear lower bounds on tensor rank is a major open problem in complexity theory. In this paper we propose a generalization of the approach used by Strassen in the proof of his 3n/2 border rank lower bound. Our approach revolves around a problem on commuting matrices:
Given matrices Z_1,...,Z_p of size n and an integer r>n, are there commuting matrices Z'_1,...,Z'_p of size r such…
▽ More
Obtaining superlinear lower bounds on tensor rank is a major open problem in complexity theory. In this paper we propose a generalization of the approach used by Strassen in the proof of his 3n/2 border rank lower bound. Our approach revolves around a problem on commuting matrices:
Given matrices Z_1,...,Z_p of size n and an integer r>n, are there commuting matrices Z'_1,...,Z'_p of size r such that every Z_k is embedded as a submatrix in the top-left corner of Z'_k?
As one of our main results, we show that this question always has a positive answer for r larger than rank(T)+n, where T denotes the tensor with slices Z_1,..,Z_p. Taking the contrapositive, if one can show for some specific matrices Z_1,...,Z_p and a specific integer r that this question has a negative answer, this yields the lower bound rank(T) > r-n. There is a little bit of slack in the above rank(T)+n bound, but we also provide a number of exact characterizations of tensor rank and symmetric rank, for ordinary and symmetric tensors, over the fields of real and complex numbers. Each of these characterizations points to a corresponding variation on the above approach. In order to explain how Strassen's theorem fits within this framework we also provide a self-contained proof of his lower bound.
△ Less
Submitted 6 July, 2020; v1 submitted 3 June, 2020;
originally announced June 2020.
-
Derandomization and absolute reconstruction for sums of powers of linear forms
Authors:
Pascal Koiran,
Mateusz Skomra
Abstract:
We study the decomposition of multivariate polynomials as sums of powers of linear forms.
As one of our main results we give an algorithm for the following problem: given a homogeneous polynomial of degree 3, decide whether it can be written as a sum of cubes of linearly independent linear forms with complex coefficients. Compared to previous algorithms for the same problem, the two main novel f…
▽ More
We study the decomposition of multivariate polynomials as sums of powers of linear forms.
As one of our main results we give an algorithm for the following problem: given a homogeneous polynomial of degree 3, decide whether it can be written as a sum of cubes of linearly independent linear forms with complex coefficients. Compared to previous algorithms for the same problem, the two main novel features of this algorithm are:
(i) It is an algebraic algorithm, i.e., it performs only arithmetic operations and equality tests on the coefficients of the input polynomial. In particular, it does not make any appeal to polynomial factorization.
(ii) For an input polynomial with rational coefficients, the algorithm runs in polynomial time when implemented in the bit model of computation.
The algorithm relies on methods from linear and multilinear algebra (symmetric tensor decomposition by simultaneous diagonalization).
We also give a version of our algorithm for decomposition over the field of real numbers. In this case, the algorithm performs arithmetic operations and comparisons on the input coefficients.
Finally we give several related derandomization results on black box polynomial identity testing, the minimization of the number of variables in a polynomial, the computation of Lie algebras and factorization into products of linear forms.
△ Less
Submitted 14 July, 2021; v1 submitted 4 December, 2019;
originally announced December 2019.
-
Orthogonal tensor decomposition and orbit closures from a linear algebraic perspective
Authors:
Pascal Koiran
Abstract:
We study orthogonal decompositions of symmetric and ordinary tensors using methods from linear algebra. For the field of real numbers we show that the sets of decomposable tensors can be defined be equations of degree 2. This gives a new proof of some of the results of Robeva and Boralevi et al. Orthogonal decompositions over the field of complex numbers had not been studied previously; we give an…
▽ More
We study orthogonal decompositions of symmetric and ordinary tensors using methods from linear algebra. For the field of real numbers we show that the sets of decomposable tensors can be defined be equations of degree 2. This gives a new proof of some of the results of Robeva and Boralevi et al. Orthogonal decompositions over the field of complex numbers had not been studied previously; we give an explicit description of the set of decomposable tensors using polynomial equalities and inequalities, and we begin a study of their closures. The main open problem that arises from this work is to obtain a complete description of the closures. This question is akin to that of characterizing border rank of tensors in algebraic complexity. We give partial results using in particular a connection with approximate simultaneous diagonalization (the so-called "ASD property").
△ Less
Submitted 30 September, 2019; v1 submitted 13 May, 2019;
originally announced May 2019.
-
Intersection multiplicity of a sparse curve and a low-degree curve
Authors:
Pascal Koiran,
Mateusz Skomra
Abstract:
Let $F(x, y) \in \mathbb{C}[x,y]$ be a polynomial of degree $d$ and let $G(x,y) \in \mathbb{C}[x,y]$ be a polynomial with $t$ monomials. We want to estimate the maximal multiplicity of a solution of the system $F(x,y) = G(x,y) = 0$. Our main result is that the multiplicity of any isolated solution $(a,b) \in \mathbb{C}^2$ with nonzero coordinates is no greater than $\frac{5}{2}d^2t^2$. We ask whet…
▽ More
Let $F(x, y) \in \mathbb{C}[x,y]$ be a polynomial of degree $d$ and let $G(x,y) \in \mathbb{C}[x,y]$ be a polynomial with $t$ monomials. We want to estimate the maximal multiplicity of a solution of the system $F(x,y) = G(x,y) = 0$. Our main result is that the multiplicity of any isolated solution $(a,b) \in \mathbb{C}^2$ with nonzero coordinates is no greater than $\frac{5}{2}d^2t^2$. We ask whether this intersection multiplicity can be polynomially bounded in the number of monomials of $F$ and $G$, and we briefly review some connections between sparse polynomials and algebraic complexity theory.
△ Less
Submitted 4 November, 2019; v1 submitted 1 April, 2019;
originally announced April 2019.
-
Orbits of monomials and factorization into products of linear forms
Authors:
Pascal Koiran,
Nicolas Ressayre
Abstract:
This paper is devoted to the factorization of multivariate polynomials into products of linear forms, a problem which has applications to differential algebra, to the resolution of systems of polynomial equations and to Waring decomposition (i.e., decomposition in sums of d-th powers of linear forms; this problem is also known as symmetric tensor decomposition). We provide three black box algorith…
▽ More
This paper is devoted to the factorization of multivariate polynomials into products of linear forms, a problem which has applications to differential algebra, to the resolution of systems of polynomial equations and to Waring decomposition (i.e., decomposition in sums of d-th powers of linear forms; this problem is also known as symmetric tensor decomposition). We provide three black box algorithms for this problem. Our main contribution is an algorithm motivated by the application to Waring decomposition. This algorithm reduces the corresponding factorization problem to simultaenous matrix diagonalization, a standard task in linear algebra. The algorithm relies on ideas from invariant theory, and more specifically on Lie algebras. Our second algorithm reconstructs a factorization from several bi-variate projections. Our third algorithm reconstructs it from the determination of the zero set of the input polynomial, which is a union of hyperplanes.
△ Less
Submitted 10 July, 2018;
originally announced July 2018.
-
Root Separation for Trinomials
Authors:
Pascal Koiran
Abstract:
We give a separation bound for the complex roots of a trinomial $f \in \mathbb{Z}[X]$. The logarithm of the inverse of our separation bound is polynomial in the size of the sparse encoding of $f$; in particular, it is polynomial in $\log (°f)$. It is known that no such bound is possible for 4-nomials (polynomials with 4 monomials). For trinomials, the classical results (which are based on the d…
▽ More
We give a separation bound for the complex roots of a trinomial $f \in \mathbb{Z}[X]$. The logarithm of the inverse of our separation bound is polynomial in the size of the sparse encoding of $f$; in particular, it is polynomial in $\log (°f)$. It is known that no such bound is possible for 4-nomials (polynomials with 4 monomials). For trinomials, the classical results (which are based on the degree of $f$ rather than the number of monomials) give separation bounds that are exponentially worse.As an algorithmic application, we show that the number of real roots of a trinomial $f$ can be computed in time polynomial in the size of the sparse encoding of~$f$. The same problem is open for 4-nomials.
△ Less
Submitted 25 October, 2018; v1 submitted 11 September, 2017;
originally announced September 2017.
-
On the linear independence of shifted powers
Authors:
Ignacio García-Marco,
Pascal Koiran,
Timothée Pecatte
Abstract:
We call shifted power a polynomial of the form $(x-a)^e$. The main goal of this paper is to obtain broadly applicable criteria ensuring that the elements of a finite family $F$ of shifted powers are linearly independent or, failing that, to give a lower bound on the dimension of the space of polynomials spanned by $F$. In particular, we give simple criteria ensuring that the dimension of the span…
▽ More
We call shifted power a polynomial of the form $(x-a)^e$. The main goal of this paper is to obtain broadly applicable criteria ensuring that the elements of a finite family $F$ of shifted powers are linearly independent or, failing that, to give a lower bound on the dimension of the space of polynomials spanned by $F$. In particular, we give simple criteria ensuring that the dimension of the span of $F$ is at least $c.|F|$ for some absolute constant $c<1$. We also propose conjectures implying the linear independence of the elements of $F$. These conjectures are known to be true for the field of real numbers, but not for the field of complex numbers.
△ Less
Submitted 20 October, 2017; v1 submitted 10 May, 2017;
originally announced May 2017.
-
On the complexity of partial derivatives
Authors:
Ignacio Garcia-Marco,
Pascal Koiran,
Timothée Pecatte,
Stéphan Thomassé
Abstract:
The method of partial derivatives is one of the most successful lower bound methods for arithmetic circuits. It uses as a complexity measure the dimension of the span of the partial derivatives of a polynomial. In this paper, we consider this complexity measure as a computational problem: for an input polynomial given as the sum of its nonzero monomials, what is the complexity of computing the dim…
▽ More
The method of partial derivatives is one of the most successful lower bound methods for arithmetic circuits. It uses as a complexity measure the dimension of the span of the partial derivatives of a polynomial. In this paper, we consider this complexity measure as a computational problem: for an input polynomial given as the sum of its nonzero monomials, what is the complexity of computing the dimension of its space of partial derivatives? We show that this problem is #P-hard and we ask whether it belongs to #P. We analyze the "trace method", recently used in combinatorics and in algebraic complexity to lower bound the rank of certain matrices. We show that this method provides a polynomial-time computable lower bound on the dimension of the span of partial derivatives, and from this method we derive closed-form lower bounds. We leave as an open problem the existence of an approximation algorithm with reasonable performance guarantees.A slightly shorter version of this paper was presented at STACS'17. In this new version we have corrected a typo in Section 4.1, and added a reference to Shitov's work on tensor rank.
△ Less
Submitted 31 May, 2017; v1 submitted 19 July, 2016;
originally announced July 2016.
-
Reconstruction Algorithms for Sums of Affine Powers
Authors:
Ignacio Garcia-Marco,
Pascal Koiran,
Timothée Pecatte
Abstract:
In this paper we study sums of powers of affine functions in (mostly) one variable. Although quite simple, this model is a generalization of two well-studied models: Waring decomposition and sparsest shift. For these three models there are natural extensions to several variables, but this paper is mostly focused on univariate polynomials. We present structural results which compare the expressive…
▽ More
In this paper we study sums of powers of affine functions in (mostly) one variable. Although quite simple, this model is a generalization of two well-studied models: Waring decomposition and sparsest shift. For these three models there are natural extensions to several variables, but this paper is mostly focused on univariate polynomials. We present structural results which compare the expressive power of the three models; and we propose algorithms that find the smallest decomposition of f in the first model (sums of affine powers) for an input polynomial f given in dense representation. We also begin a study of the multivariate case. This work could be extended in several directions. In particular, just as for Sparsest Shift and Waring decomposition, one could consider extensions to "supersparse" polynomials and attempt a fuller study of the multi-variate case. We also point out that the basic univariate problem studied in the present paper is far from completely solved: our algorithms all rely on some assumptions for the exponents in an optimal decomposition, and some algorithms also rely on a distinctness assumption for the shifts. It would be very interesting to weaken these assumptions, or even to remove them entirely. Another related and poorly understood issue is that of the bit size of the constants appearing in an optimal decomposition: is it always polynomially related to the bit size of the input polynomial given in dense representation?
△ Less
Submitted 24 October, 2017; v1 submitted 19 July, 2016;
originally announced July 2016.
-
Lower Bounds by Birkhoff Interpolation
Authors:
Ignacio Garcia-Marco,
Pascal Koiran
Abstract:
In this paper we give lower bounds for the representation of real univariate polynomials as sums of powers of degree 1 polynomials. We present two families of polynomials of degree d such that the number of powers that are required in such a representation must be at least of order d. This is clearly optimal up to a constant factor. Previous lower bounds for this problem were only of order $Ω$(…
▽ More
In this paper we give lower bounds for the representation of real univariate polynomials as sums of powers of degree 1 polynomials. We present two families of polynomials of degree d such that the number of powers that are required in such a representation must be at least of order d. This is clearly optimal up to a constant factor. Previous lower bounds for this problem were only of order $Ω$($\sqrt$ d), and were obtained from arguments based on Wronskian determinants and "shifted derivatives." We obtain this improvement thanks to a new lower bound method based on Birkhoff interpolation (also known as "lacunary polynomial interpolation").
△ Less
Submitted 8 July, 2015;
originally announced July 2015.
-
Log-concavity and lower bounds for arithmetic circuits
Authors:
Ignacio García-Marco,
Pascal Koiran,
Sébastien Tavenas
Abstract:
One question that we investigate in this paper is, how can we build log-concave polynomials using sparse polynomials as building blocks? More precisely, let $f = \sum\_{i = 0}^d a\_i X^i \in \mathbb{R}^+[X]$ be a polynomial satisfying the log-concavity condition $a\_i^2 \textgreater{} τa\_{i-1}a\_{i+1}$ for every $i \in \{1,\ldots,d-1\},$ where $τ\textgreater{} 0$. Whenever $f$ can be written unde…
▽ More
One question that we investigate in this paper is, how can we build log-concave polynomials using sparse polynomials as building blocks? More precisely, let $f = \sum\_{i = 0}^d a\_i X^i \in \mathbb{R}^+[X]$ be a polynomial satisfying the log-concavity condition $a\_i^2 \textgreater{} τa\_{i-1}a\_{i+1}$ for every $i \in \{1,\ldots,d-1\},$ where $τ\textgreater{} 0$. Whenever $f$ can be written under the form $f = \sum\_{i = 1}^k \prod\_{j = 1}^m f\_{i,j}$ where the polynomials $f\_{i,j}$ have at most $t$ monomials, it is clear that $d \leq k t^m$. Assuming that the $f\_{i,j}$ have only non-negative coefficients, we improve this degree bound to $d = \mathcal O(k m^{2/3} t^{2m/3} {\rm log^{2/3}}(kt))$ if $τ\textgreater{} 1$, and to $d \leq kmt$ if $τ= d^{2d}$.
This investigation has a complexity-theoretic motivation: we show that a suitable strengthening of the above results would imply a separation of the algebraic complexity classes VP and VNP. As they currently stand, these results are strong enough to provide a new example of a family of
polynomials in VNP which cannot be computed by monotone arithmetic circuits of polynomial size.
△ Less
Submitted 26 March, 2015;
originally announced March 2015.
-
Computing the multilinear factors of lacunary polynomials without heights
Authors:
Arkadev Chattopadhyay,
Bruno Grenet,
Pascal Koiran,
Natacha Portier,
Yann Strozecki
Abstract:
We present a deterministic algorithm which computes the multilinear factors of multivariate lacunary polynomials over number fields. Its complexity is polynomial in $\ell^n$ where $\ell$ is the lacunary size of the input polynomial and $n$ its number of variables, that is in particular polynomial in the logarithm of its degree. We also provide a randomized algorithm for the same problem of complex…
▽ More
We present a deterministic algorithm which computes the multilinear factors of multivariate lacunary polynomials over number fields. Its complexity is polynomial in $\ell^n$ where $\ell$ is the lacunary size of the input polynomial and $n$ its number of variables, that is in particular polynomial in the logarithm of its degree. We also provide a randomized algorithm for the same problem of complexity polynomial in $\ell$ and $n$.
Over other fields of characteristic zero and finite fields of large characteristic, our algorithms compute the multilinear factors having at least three monomials of multivariate polynomials. Lower bounds are provided to explain the limitations of our algorithm. As a by-product, we also design polynomial-time deterministic polynomial identity tests for families of polynomials which were not known to admit any.
Our results are based on so-called Gap Theorem which reduce high-degree factorization to repeated low-degree factorizations. While previous algorithms used Gap Theorems expressed in terms of the heights of the coefficients, our Gap Theorems only depend on the exponents of the polynomials. This makes our algorithms more elementary and general, and faster in most cases.
△ Less
Submitted 21 April, 2020; v1 submitted 22 November, 2013;
originally announced November 2013.
-
On the intersection of a sparse curve and a low-degree curve: A polynomial version of the lost theorem
Authors:
Pascal Koiran,
Natacha Portier,
Sébastien Tavenas
Abstract:
Consider a system of two polynomial equations in two variables: $$F(X,Y)=G(X,Y)=0$$ where $F \in \rr[X,Y]$ has degree $d \geq 1$ and $G \in \rr[X,Y]$ has $t$ monomials. We show that the system has only $O(d^3t+d^2t^3)$ real solutions when it has a finite number of real solutions. This is the first polynomial bound for this problem. In particular, the bounds coming from the theory of fewnomials are…
▽ More
Consider a system of two polynomial equations in two variables: $$F(X,Y)=G(X,Y)=0$$ where $F \in \rr[X,Y]$ has degree $d \geq 1$ and $G \in \rr[X,Y]$ has $t$ monomials. We show that the system has only $O(d^3t+d^2t^3)$ real solutions when it has a finite number of real solutions. This is the first polynomial bound for this problem. In particular, the bounds coming from the theory of fewnomials are exponential in $t$, and count only nondegenerate solutions. More generally, we show that if the set of solutions is infinite, it still has at most $O(d^3t+d^2t^3)$ connected components. By contrast, the following question seems to be open: if $F$ and $G$ have at most $t$ monomials, is the number of (nondegenerate) solutions polynomial in $t$? The authors' interest for these problems was sparked by connections between lower bounds in algebraic complexity theory and upper bounds on the number of real roots of "sparse like" polynomials.
△ Less
Submitted 23 July, 2014; v1 submitted 9 October, 2013;
originally announced October 2013.
-
Counting Tropically Degenerate Valuations and p-adic Approaches to the Hardness of the Permanent
Authors:
Pascal Koiran,
Natacha Portier,
J. Maurice Rojas
Abstract:
The Shub-Smale Tau Conjecture is a hitherto unproven statement (on integer roots of polynomials) whose truth implies both a variant of $P\neq NP$ (for the BSS model over C) and the hardness of the permanent. We give alternative conjectures, some potentially easier to prove, whose truth still implies the hardness of the permanent. Along the way, we discuss new upper bounds on the number of $p$-adic…
▽ More
The Shub-Smale Tau Conjecture is a hitherto unproven statement (on integer roots of polynomials) whose truth implies both a variant of $P\neq NP$ (for the BSS model over C) and the hardness of the permanent. We give alternative conjectures, some potentially easier to prove, whose truth still implies the hardness of the permanent. Along the way, we discuss new upper bounds on the number of $p$-adic valuations of roots of certain sparse polynomial systems, culminating in a connection between quantitative p-adic geometry and complexity theory.
△ Less
Submitted 2 September, 2013;
originally announced September 2013.
-
A tau-conjecture for Newton polygons
Authors:
Pascal Koiran,
Natacha Portier,
Sébastien Tavenas,
Stéphan Thomassé
Abstract:
One can associate to any bivariate polynomial P(X,Y) its Newton polygon. This is the convex hull of the points (i,j) such that the monomial X^i Y^j appears in P with a nonzero coefficient. We conjecture that when P is expressed as a sum of products of sparse polynomials, the number of edges of its Newton polygon is polynomially bounded in the size of such an expression. We show that this "tau-conj…
▽ More
One can associate to any bivariate polynomial P(X,Y) its Newton polygon. This is the convex hull of the points (i,j) such that the monomial X^i Y^j appears in P with a nonzero coefficient. We conjecture that when P is expressed as a sum of products of sparse polynomials, the number of edges of its Newton polygon is polynomially bounded in the size of such an expression. We show that this "tau-conjecture for Newton polygons," even in a weak form, implies that the permanent polynomial is not computable by polynomial size arithmetic circuits. We make the same observation for a weak version of an earlier "real tau-conjecture." Finally, we make some progress toward the tau-conjecture for Newton polygons using recent results from combinatorial geometry.
△ Less
Submitted 13 May, 2014; v1 submitted 10 August, 2013;
originally announced August 2013.
-
Hidden cliques and the certification of the restricted isometry property
Authors:
Pascal Koiran,
Anastasios Zouzias
Abstract:
Compressed sensing is a technique for finding sparse solutions to underdetermined linear systems. This technique relies on properties of the sensing matrix such as the restricted isometry property. Sensing matrices that satisfy this property with optimal parameters are mainly obtained via probabilistic arguments. Deciding whether a given matrix satisfies the restricted isometry property is a non-t…
▽ More
Compressed sensing is a technique for finding sparse solutions to underdetermined linear systems. This technique relies on properties of the sensing matrix such as the restricted isometry property. Sensing matrices that satisfy this property with optimal parameters are mainly obtained via probabilistic arguments. Deciding whether a given matrix satisfies the restricted isometry property is a non-trivial computational problem. Indeed, we show in this paper that restricted isometry parameters cannot be approximated in polynomial time within any constant factor under the assumption that the hidden clique problem is hard. Moreover, on the positive side we propose an improvement on the brute-force enumeration algorithm for checking the restricted isometry property.
△ Less
Submitted 4 November, 2012;
originally announced November 2012.
-
On the Complexity of the Multivariate Resultant
Authors:
Bruno Grenet,
Pascal Koiran,
Natacha Portier
Abstract:
The multivariate resultant is a fundamental tool of computational algebraic geometry. It can in particular be used to decide whether a system of n homogeneous equations in n variables is satisfiable (the resultant is a polynomial in the system's coefficients which vanishes if and only if the system is satisfiable). In this paper, we investigate the complexity of computing the multivariate resultan…
▽ More
The multivariate resultant is a fundamental tool of computational algebraic geometry. It can in particular be used to decide whether a system of n homogeneous equations in n variables is satisfiable (the resultant is a polynomial in the system's coefficients which vanishes if and only if the system is satisfiable). In this paper, we investigate the complexity of computing the multivariate resultant.
First, we study the complexity of testing the multivariate resultant for zero. Our main result is that this problem is NP-hard under deterministic reductions in any characteristic, for systems of low-degree polynomials with coefficients in the ground field (rather than in an extension). In characteristic zero, we observe that this problem is in the Arthur-Merlin class AM if the generalized Riemann hypothesis holds true, while the best known upper bound in positive characteristic remains PSPACE.
Second, we study the classical algorithms to compute the resultant. They usually rely on the computation of the determinant of an exponential-size matrix, known as Macaulay matrix. We show that this matrix belongs to a class of succinctly representable matrices, for which testing the determinant for zero is proved PSPACE-complete. This means that improving Canny's PSPACE upper bound requires either to look at the fine structure of the Macaulay matrix to find an ad hoc algorithm for computing its determinant, or to use altogether different techniques.
△ Less
Submitted 4 October, 2012;
originally announced October 2012.
-
Factoring bivariate lacunary polynomials without heights
Authors:
Arkadev Chattopadhyay,
Bruno Grenet,
Pascal Koiran,
Natacha Portier,
Yann Strozecki
Abstract:
We present an algorithm which computes the multilinear factors of bivariate lacunary polynomials. It is based on a new Gap Theorem which allows to test whether a polynomial of the form P(X,X+1) is identically zero in time polynomial in the number of terms of P(X,Y). The algorithm we obtain is more elementary than the one by Kaltofen and Koiran (ISSAC'05) since it relies on the valuation of polynom…
▽ More
We present an algorithm which computes the multilinear factors of bivariate lacunary polynomials. It is based on a new Gap Theorem which allows to test whether a polynomial of the form P(X,X+1) is identically zero in time polynomial in the number of terms of P(X,Y). The algorithm we obtain is more elementary than the one by Kaltofen and Koiran (ISSAC'05) since it relies on the valuation of polynomials of the previous form instead of the height of the coefficients. As a result, it can be used to find some linear factors of bivariate lacunary polynomials over a field of large finite characteristic in probabilistic polynomial time.
△ Less
Submitted 14 May, 2013; v1 submitted 19 June, 2012;
originally announced June 2012.
-
A Wronskian Approach to the real τ-conjecture
Authors:
Pascal Koiran,
Natacha Portier,
Sébastien Tavenas
Abstract:
According to the real τ-conjecture, the number of real roots of a sum of products of sparse polynomials should be polynomially bounded in the size of such an expression. It is known that this conjecture implies a superpolynomial lower bound on the arithmetic circuit complexity of the permanent.
In this paper, we use the Wronksian determinant to give an upper bound on the number of real roots of…
▽ More
According to the real τ-conjecture, the number of real roots of a sum of products of sparse polynomials should be polynomially bounded in the size of such an expression. It is known that this conjecture implies a superpolynomial lower bound on the arithmetic circuit complexity of the permanent.
In this paper, we use the Wronksian determinant to give an upper bound on the number of real roots of sums of products of sparse polynomials. The proof technique is quite versatile; it can in particular be applied to some sparse geometric problems that do not originate from arithmetic circuit complexity. The paper should therefore be of interest to researchers from these two communities (complexity theory and sparse polynomial systems).
△ Less
Submitted 16 May, 2014; v1 submitted 4 May, 2012;
originally announced May 2012.
-
The Limited Power of Powering: Polynomial Identity Testing and a Depth-four Lower Bound for the Permanent
Authors:
Bruno Grenet,
Pascal Koiran,
Natacha Portier,
Yann Strozecki
Abstract:
Polynomial identity testing and arithmetic circuit lower bounds are two central questions in algebraic complexity theory. It is an intriguing fact that these questions are actually related. One of the authors of the present paper has recently proposed a "real τ-conjecture" which is inspired by this connection. The real τ-conjecture states that the number of real roots of a sum of products of spars…
▽ More
Polynomial identity testing and arithmetic circuit lower bounds are two central questions in algebraic complexity theory. It is an intriguing fact that these questions are actually related. One of the authors of the present paper has recently proposed a "real τ-conjecture" which is inspired by this connection. The real τ-conjecture states that the number of real roots of a sum of products of sparse univariate polynomials should be polynomially bounded. It implies a superpolynomial lower bound on the size of arithmetic circuits computing the permanent polynomial. In this paper we show that the real τ-conjecture holds true for a restricted class of sums of products of sparse polynomials. This result yields lower bounds for a restricted class of depth-4 circuits: we show that polynomial size circuits from this class cannot compute the permanent, and we also give a deterministic polynomial identity testing algorithm for the same class of circuits.
△ Less
Submitted 7 July, 2011;
originally announced July 2011.
-
On the Certification of the Restricted Isometry Property
Authors:
Pascal Koiran,
Anastasios Zouzias
Abstract:
Compressed sensing is a technique for finding sparse solutions to underdetermined linear systems. This technique relies on properties of the sensing matrix such as the restricted isometry property. Sensing matrices that satisfy the restricted isometry property with optimal parameters are mainly obtained via probabilistic arguments. Given any matrix, deciding whether it satisfies the restricted iso…
▽ More
Compressed sensing is a technique for finding sparse solutions to underdetermined linear systems. This technique relies on properties of the sensing matrix such as the restricted isometry property. Sensing matrices that satisfy the restricted isometry property with optimal parameters are mainly obtained via probabilistic arguments. Given any matrix, deciding whether it satisfies the restricted isometry property is a non-trivial computational problem. In this paper, we give reductions from dense subgraph problems to the certification of the restricted isometry property. This gives evidence that certifying the restricted isometry property is unlikely to be feasible in polynomial-time. Moreover, on the positive side we propose an improvement on the brute-force enumeration algorithm for checking the restricted isometry property.
Another contribution of independent interest is a spectral algorithm for certifying that a random graph does not contain any dense k-subgraph. This "skewed spectral algorithm" performs better than the basic spectral algorithm in a certain range of parameters.
△ Less
Submitted 17 October, 2011; v1 submitted 25 March, 2011;
originally announced March 2011.
-
Symmetric Determinantal Representation of Formulas and Weakly Skew Circuits
Authors:
Bruno Grenet,
Erich Kaltofen,
Pascal Koiran,
Natacha Portier
Abstract:
We deploy algebraic complexity theoretic techniques for constructing symmetric determinantal representations of for00504925mulas and weakly skew circuits. Our representations produce matrices of much smaller dimensions than those given in the convex geometry literature when applied to polynomials having a concise representation (as a sum of monomials, or more generally as an arithmetic formula or…
▽ More
We deploy algebraic complexity theoretic techniques for constructing symmetric determinantal representations of for00504925mulas and weakly skew circuits. Our representations produce matrices of much smaller dimensions than those given in the convex geometry literature when applied to polynomials having a concise representation (as a sum of monomials, or more generally as an arithmetic formula or a weakly skew circuit). These representations are valid in any field of characteristic different from 2. In characteristic 2 we are led to an almost complete solution to a question of Bürgisser on the VNP-completeness of the partial permanent. In particular, we show that the partial permanent cannot be VNP-complete in a finite field of characteristic 2 unless the polynomial hierarchy collapses.
△ Less
Submitted 25 October, 2011; v1 submitted 22 July, 2010;
originally announced July 2010.
-
Arithmetic circuits: the chasm at depth four gets wider
Authors:
Pascal Koiran
Abstract:
In their paper on the "chasm at depth four", Agrawal and Vinay have shown that polynomials in m variables of degree O(m) which admit arithmetic circuits of size 2^o(m) also admit arithmetic circuits of depth four and size 2^o(m). This theorem shows that for problems such as arithmetic circuit lower bounds or black-box derandomization of identity testing, the case of depth four circuits is in a cer…
▽ More
In their paper on the "chasm at depth four", Agrawal and Vinay have shown that polynomials in m variables of degree O(m) which admit arithmetic circuits of size 2^o(m) also admit arithmetic circuits of depth four and size 2^o(m). This theorem shows that for problems such as arithmetic circuit lower bounds or black-box derandomization of identity testing, the case of depth four circuits is in a certain sense the general case. In this paper we show that smaller depth four circuits can be obtained if we start from polynomial size arithmetic circuits. For instance, we show that if the permanent of n*n matrices has circuits of size polynomial in n, then it also has depth 4 circuits of size n^O(sqrt(n)*log(n)). Our depth four circuits use integer constants of polynomial size. These results have potential applications to lower bounds and deterministic identity testing, in particular for sums of products of sparse univariate polynomials. We also give an application to boolean circuit complexity, and a simple (but suboptimal) reduction to polylogarithmic depth for arithmetic circuits of polynomial size and polynomially bounded degree.
△ Less
Submitted 23 March, 2012; v1 submitted 24 June, 2010;
originally announced June 2010.
-
Shallow Circuits with High-Powered Inputs
Authors:
Pascal Koiran
Abstract:
A polynomial identity testing algorithm must determine whether an input polynomial (given for instance by an arithmetic circuit) is identically equal to 0. In this paper, we show that a deterministic black-box identity testing algorithm for (high-degree) univariate polynomials would imply a lower bound on the arithmetic complexity of the permanent. The lower bounds that are known to follow from de…
▽ More
A polynomial identity testing algorithm must determine whether an input polynomial (given for instance by an arithmetic circuit) is identically equal to 0. In this paper, we show that a deterministic black-box identity testing algorithm for (high-degree) univariate polynomials would imply a lower bound on the arithmetic complexity of the permanent. The lower bounds that are known to follow from derandomization of (low-degree) multivariate identity testing are weaker. To obtain our lower bound it would be sufficient to derandomize identity testing for polynomials of a very specific norm: sums of products of sparse polynomials with sparse coefficients. This observation leads to new versions of the Shub-Smale tau-conjecture on integer roots of univariate polynomials. In particular, we show that a lower bound for the permanent would follow if one could give a good enough bound on the number of real roots of sums of products of sparse polynomials (Descartes' rule of signs gives such a bound for sparse polynomials and products thereof). In this third version of our paper we show that the same lower bound would follow even if one could only prove a slightly superpolynomial upper bound on the number of real roots. This is a consequence of a new result on reduction to depth 4 for arithmetic circuits which we establish in a companion paper. We also show that an even weaker bound on the number of real roots would suffice to obtain a lower bound on the size of depth 4 circuits computing the permanent.
△ Less
Submitted 30 July, 2010; v1 submitted 28 April, 2010;
originally announced April 2010.
-
The Multivariate Resultant is NP-hard in any Characteristic
Authors:
Bruno Grenet,
Pascal Koiran,
Natacha Portier
Abstract:
The multivariate resultant is a fundamental tool of computational algebraic geometry. It can in particular be used to decide whether a system of n homogeneous equations in n variables is satisfiable (the resultant is a polynomial in the system's coefficients which vanishes if and only if the system is satisfiable). In this paper we present several NP-hardness results for testing whether a multivar…
▽ More
The multivariate resultant is a fundamental tool of computational algebraic geometry. It can in particular be used to decide whether a system of n homogeneous equations in n variables is satisfiable (the resultant is a polynomial in the system's coefficients which vanishes if and only if the system is satisfiable). In this paper we present several NP-hardness results for testing whether a multivariate resultant vanishes, or equivalently for deciding whether a square system of homogeneous equations is satisfiable. Our main result is that testing the resultant for zero is NP-hard under deterministic reductions in any characteristic, for systems of low-degree polynomials with coefficients in the ground field (rather than in an extension). We also observe that in characteristic zero, this problem is in the Arthur-Merlin class AM if the generalized Riemann hypothesis holds true. In positive characteristic, the best upper bound remains PSPACE.
△ Less
Submitted 4 October, 2012; v1 submitted 14 December, 2009;
originally announced December 2009.
-
A hitting set construction, with application to arithmetic circuit lower bounds
Authors:
Pascal Koiran
Abstract:
A polynomial identity testing algorithm must determine whether a given input polynomial is identically equal to 0. We give a deterministic black-box identity testing algorithm for univariate polynomials of the form $\sum_{j=0}^t c_j X^{α_j} (a + b X)^{β_j}$. From our algorithm we derive an exponential lower bound for representations of polynomials such as $\prod_{i=1}^{2^n} (X^i-1)$ under this f…
▽ More
A polynomial identity testing algorithm must determine whether a given input polynomial is identically equal to 0. We give a deterministic black-box identity testing algorithm for univariate polynomials of the form $\sum_{j=0}^t c_j X^{α_j} (a + b X)^{β_j}$. From our algorithm we derive an exponential lower bound for representations of polynomials such as $\prod_{i=1}^{2^n} (X^i-1)$ under this form. It has been conjectured that these polynomials are hard to compute by general arithmetic circuits. Our result shows that the "hardness from derandomization" approach to lower bounds is feasible for a restricted class of arithmetic circuits. The proof is based on techniques from algebraic number theory, and more precisely on properties of the height function of algebraic numbers.
△ Less
Submitted 8 December, 2009; v1 submitted 31 July, 2009;
originally announced July 2009.
-
A Dichotomy Theorem for Polynomial Evaluation
Authors:
Irénée Briquel,
Pascal Koiran
Abstract:
A dichotomy theorem for counting problems due to Creignou and Hermann states that or any nite set S of logical relations, the counting problem #SAT(S) is either in FP, or #P-complete. In the present paper we show a dichotomy theorem for polynomial evaluation. That is, we show that for a given set S, either there exists a VNP-complete family of polynomials associated to S, or the associated famil…
▽ More
A dichotomy theorem for counting problems due to Creignou and Hermann states that or any nite set S of logical relations, the counting problem #SAT(S) is either in FP, or #P-complete. In the present paper we show a dichotomy theorem for polynomial evaluation. That is, we show that for a given set S, either there exists a VNP-complete family of polynomials associated to S, or the associated families of polynomials are all in VP. We give a concise characterization of the sets S that give rise to "easy" and "hard" polynomials. We also prove that several problems which were known to be #P-complete under Turing reductions only are in fact #P-complete under many-one reductions.
△ Less
Submitted 15 December, 2009; v1 submitted 13 February, 2009;
originally announced February 2009.
-
A Superpolynomial Lower Bound on the Size of Uniform Non-constant-depth Threshold Circuits for the Permanent
Authors:
Pascal Koiran,
Sylvain Perifel
Abstract:
We show that the permanent cannot be computed by DLOGTIME-uniform threshold or arithmetic circuits of depth o(log log n) and polynomial size.
We show that the permanent cannot be computed by DLOGTIME-uniform threshold or arithmetic circuits of depth o(log log n) and polynomial size.
△ Less
Submitted 11 February, 2009;
originally announced February 2009.
-
Adversary lower bounds for nonadaptive quantum algorithms
Authors:
Pacal Koiran,
Jürgen Landes,
Natacha Portier,
Penghui Yao
Abstract:
We present general methods for proving lower bounds on the query complexity of nonadaptive quantum algorithms. Our results are based on the adversary method of Ambainis.
We present general methods for proving lower bounds on the query complexity of nonadaptive quantum algorithms. Our results are based on the adversary method of Ambainis.
△ Less
Submitted 9 April, 2008;
originally announced April 2008.
-
Interpolation in Valiant's theory
Authors:
Pascal Koiran,
Sylvain Perifel
Abstract:
We investigate the following question: if a polynomial can be evaluated at rational points by a polynomial-time boolean algorithm, does it have a polynomial-size arithmetic circuit? We argue that this question is certainly difficult. Answering it negatively would indeed imply that the constant-free versions of the algebraic complexity classes VP and VNP defined by Valiant are different. Answerin…
▽ More
We investigate the following question: if a polynomial can be evaluated at rational points by a polynomial-time boolean algorithm, does it have a polynomial-size arithmetic circuit? We argue that this question is certainly difficult. Answering it negatively would indeed imply that the constant-free versions of the algebraic complexity classes VP and VNP defined by Valiant are different. Answering this question positively would imply a transfer theorem from boolean to algebraic complexity. Our proof method relies on Lagrange interpolation and on recent results connecting the (boolean) counting hierarchy to algebraic complexity classes. As a byproduct we obtain two additional results: (i) The constant-free, degree-unbounded version of Valiant's hypothesis that VP and VNP differ implies the degree-bounded version. This result was previously known to hold for fields of positive characteristic only. (ii) If exponential sums of easy to compute polynomials can be computed efficiently, then the same is true of exponential products. We point out an application of this result to the P=NP problem in the Blum-Shub-Smale model of computation over the field of complex numbers.
△ Less
Submitted 1 October, 2007;
originally announced October 2007.
-
VPSPACE and a transfer theorem over the complex field
Authors:
Pascal Koiran,
Sylvain Perifel
Abstract:
We extend the transfer theorem of [KP2007] to the complex field. That is, we investigate the links between the class VPSPACE of families of polynomials and the Blum-Shub-Smale model of computation over C. Roughly speaking, a family of polynomials is in VPSPACE if its coefficients can be computed in polynomial space. Our main result is that if (uniform, constant-free) VPSPACE families can be eval…
▽ More
We extend the transfer theorem of [KP2007] to the complex field. That is, we investigate the links between the class VPSPACE of families of polynomials and the Blum-Shub-Smale model of computation over C. Roughly speaking, a family of polynomials is in VPSPACE if its coefficients can be computed in polynomial space. Our main result is that if (uniform, constant-free) VPSPACE families can be evaluated efficiently then the class PAR of decision problems that can be solved in parallel polynomial time over the complex field collapses to P. As a result, one must first be able to show that there are VPSPACE families which are hard to evaluate in order to separate P from NP over C, or even from PAR.
△ Less
Submitted 11 June, 2007;
originally announced June 2007.
-
On the expressive power of planar perfect matching and permanents of bounded treewidth matrices
Authors:
Laurent Lyaudet,
Pascal Koiran,
Uffe Flarup
Abstract:
Valiant introduced some 25 years ago an algebraic model of computation along with the complexity classes VP and VNP, which can be viewed as analogues of the classical classes P and NP. They are defined using non-uniform sequences of arithmetic circuits and provides a framework to study the complexity for sequences of polynomials. Prominent examples of difficult (that is, VNP-complete) problems i…
▽ More
Valiant introduced some 25 years ago an algebraic model of computation along with the complexity classes VP and VNP, which can be viewed as analogues of the classical classes P and NP. They are defined using non-uniform sequences of arithmetic circuits and provides a framework to study the complexity for sequences of polynomials. Prominent examples of difficult (that is, VNP-complete) problems in this model includes the permanent and hamiltonian polynomials. While the permanent and hamiltonian polynomials in general are difficult to evaluate, there have been research on which special cases of these polynomials admits efficient evaluation. For instance, Barvinok has shown that if the underlying matrix has bounded rank, both the permanent and the hamiltonian polynomials can be evaluated in polynomial time, and thus are in VP. Courcelle, Makowsky and Rotics have shown that for matrices of bounded treewidth several difficult problems (including evaluating the permanent and hamiltonian polynomials) can be solved efficiently. An earlier result of this flavour is Kasteleyn's theorem which states that the sum of weights of perfect matchings of a planar graph can be computed in polynomial time, and thus is in VP also. For general graphs this problem is VNP-complete. In this paper we investigate the expressive power of the above results. We show that the permanent and hamiltonian polynomials for matrices of bounded treewidth both are equivalent to arithmetic formulas. Also, arithmetic weakly skew circuits are shown to be equivalent to the sum of weights of perfect matchings of planar graphs.
△ Less
Submitted 25 May, 2007;
originally announced May 2007.
-
VPSPACE and a Transfer Theorem over the Reals
Authors:
Pascal Koiran,
Sylvain Perifel
Abstract:
We introduce a new class VPSPACE of families of polynomials. Roughly speaking, a family of polynomials is in VPSPACE if its coefficients can be computed in polynomial space. Our main theorem is that if (uniform, constant-free) VPSPACE families can be evaluated efficiently then the class PAR of decision problems that can be solved in parallel polynomial time over the real numbers collapses to P.…
▽ More
We introduce a new class VPSPACE of families of polynomials. Roughly speaking, a family of polynomials is in VPSPACE if its coefficients can be computed in polynomial space. Our main theorem is that if (uniform, constant-free) VPSPACE families can be evaluated efficiently then the class PAR of decision problems that can be solved in parallel polynomial time over the real numbers collapses to P. As a result, one must first be able to show that there are VPSPACE families which are hard to evaluate in order to separate over the reals P from NP, or even from PAR.
△ Less
Submitted 1 February, 2007; v1 submitted 3 October, 2006;
originally announced October 2006.
-
A quantum lower bound for the query complexity of Simon's problem
Authors:
Pascal Koiran,
Vincent Nesme,
Natacha Portier
Abstract:
Simon in his FOCS'94 paper was the first to show an exponential gap between classical and quantum computation. The problem he dealt with is now part of a well-studied class of problems, the hidden subgroup problems. We study Simon's problem from the point of view of quantum query complexity and give here a first nontrivial lower bound on the query complexity of a hidden subgroup problem, namely…
▽ More
Simon in his FOCS'94 paper was the first to show an exponential gap between classical and quantum computation. The problem he dealt with is now part of a well-studied class of problems, the hidden subgroup problems. We study Simon's problem from the point of view of quantum query complexity and give here a first nontrivial lower bound on the query complexity of a hidden subgroup problem, namely Simon's problem. Our bound is optimal up to a constant factor.
△ Less
Submitted 12 January, 2005;
originally announced January 2005.