BLACKBOX IDENTITY TESTING FOR BOUNDED TOP-FANIN DEPTH-3 CIRCUITS: THE FIELD DOESN'T MATTER

被引:25
作者
Saxena, Nitin [1 ]
Seshadhri, C. [2 ]
机构
[1] Hausdorff Ctr Math, D-53115 Bonn, Germany
[2] Sandia Natl Labs, Livermore, CA 94551 USA
关键词
algebra homomorphism; blackbox; Chinese remaindering; depth-3; circuits; derandomization; identity testing; ideal theory; SPARSE MULTIVARIATE POLYNOMIALS; ARITHMETIC CIRCUITS; INTERPOLATION; ALGORITHMS; QUERIES; RANK;
D O I
10.1137/10848232
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Let C be a depth-3 circuit with n variables, degree d, and top-fanin k (called Sigma Pi Sigma(k, d, n) circuits) over base field F. It is a major open problem to design a deterministic polynomial time blackbox algorithm that tests whether C is identically zero. Klivans and Spielman [Proceedings of the 33rd Annual Symposium on Theory of Computing (STOC), 2001, pp. 216-223] observed that the problem is open even when k is a constant. This case has been subjected to serious scrutiny over the past few years, starting from the work of Dvir and Shpilka [SIAM J. Comput., 36 (2007), pp. 1404-1434]. We give the first polynomial time blackbox algorithm for this problem. Our algorithm runs in time poly(n)d(k), regardless of the base field. The only field for which polynomial time algorithms were previously known is F - Q [N. Kayal and S. Saraf, Proceedings of the 50th Annual Symposium on Foundations of Computer Science (FOCS), 2009, pp. 198-207; N. Saxena and C. Seshadhri, Proceedings of the 51st Annual Symposium on Foundations of Computer Science (FOCS), 2010, pp. 21-29]. This is the first blackbox algorithm for depth-3 circuits that does not use the rank-based approaches of Karnin and Shpilka [Proceedings of the 24th Annual Conference on Computational Complexity (CCC), 2009, pp. 274-285]. We prove an important tool for the study of depth-3 identities. We design a blackbox polynomial time transformation that reduces the number of variables in a Sigma Pi Sigma(k, d, n) circuit to k variables but preserves the identity structure.
引用
收藏
页码:1285 / 1298
页数:14
相关论文
共 45 条
[1]  
Adleman LM., 1986, STOC '86: Proceedings of the eighteenth annual ACM symposium on Theory of computing, P350, DOI DOI 10.1145/12130.12166
[2]  
Agrawal M, 2005, LECT NOTES COMPUT SC, V3821, P92, DOI 10.1007/11590156_6
[3]   Primality and identity testing via Chinese remaindering [J].
Agrawal, M ;
Biswas, S .
JOURNAL OF THE ACM, 2003, 50 (04) :429-443
[4]  
Agrawal M., 2009, CURRENT TRENDS SCI, P149
[5]  
Agrawal M, 2012, STOC'12: PROCEEDINGS OF THE 2012 ACM SYMPOSIUM ON THEORY OF COMPUTING, P599
[6]   Arithmetic Circuits: A Chasm at Depth Four [J].
Agrawal, Manindra ;
Vinay, V. .
PROCEEDINGS OF THE 49TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2008, :67-+
[7]  
Agrawal Manindra, 2006, INT C MATHEMATICIANS, V3, P985, DOI DOI 10.4171/022-3/48
[8]   Derandomizing Polynomial Identity Testing for Multilinear Constant-Read Formulae [J].
Anderson, Matthew ;
van Melkebeek, Dieter ;
Volkovich, Ilya .
2011 IEEE 26TH ANNUAL CONFERENCE ON COMPUTATIONAL COMPLEXITY (CCC), 2011, :273-282
[9]   The Ideal Membership Problem and polynomial identity testing [J].
Arvind, V. ;
Mukhopadhyay, Partha .
INFORMATION AND COMPUTATION, 2010, 208 (04) :351-363
[10]  
Beecken M, 2011, LECT NOTES COMPUT SC, V6756, P137, DOI 10.1007/978-3-642-22012-8_10