Deterministically testing sparse polynomial identities of unbounded degree

被引:20
作者
Blaeser, Markus [2 ]
Hardt, Moritz [1 ]
Lipton, Richard J. [3 ]
Vishnoi, Nisheeth K. [4 ]
机构
[1] Princeton Univ, Princeton, NJ 08544 USA
[2] Univ Saarland, D-6600 Saarbrucken, Germany
[3] Georgia Inst Technol, Atlanta, GA 30332 USA
[4] Univ Paris 11, CNRS, Rech Informat Lab, F-91405 Orsay, France
关键词
Theory of computation; Polynomial identity testing; Arithmetic circuits; Derandomization; INTERPOLATION; ALGORITHMS; COMPLEXITY;
D O I
10.1016/j.ipl.2008.09.029
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present two deterministic algorithms for the arithmetic circuit identity testing problem. The running time of our algorithms is polynomially bounded in s and m. where s is the size of the circuit and m is all upper bound oil the number monomials with non-zero coefficients in its standard representation. The running time Of Our algorithms also has a logarithmic dependence oil the degree of the polynomial but, since a circuit of size s can only compute polynomials of degree at most 2(s), the running time does not depend on its degree. Before this work. all such deterministic algorithms had a polynomial dependence on the degree and therefore ail exponential dependence oil s. Our first algorithm works over the integers and it requires only black-box access to the given circuit. Though this algorithm is quite simple, the analysis of why it works relies oil Linnik's Theorem, a deep result from number theory about the size of the smallest prime in an arithmetic progression. Our second algorithm, unlike the first, uses elementary arguments and works over any integral domains, but it uses the circuit in a less restricted manner. In both cases the running time has a logarithmic dependence on the largest coefficient of the polynomial. (C) 2008 Elsevier B.V. All rights reserved.
引用
收藏
页码:187 / 192
页数:6
相关论文
共 32 条
  • [1] Agrawal M, 2005, LECT NOTES COMPUT SC, V3821, P92, DOI 10.1007/11590156_6
  • [2] PRIMES is in P
    Agrawal, M
    Kayal, N
    Saxena, N
    [J]. ANNALS OF MATHEMATICS, 2004, 160 (02) : 781 - 793
  • [3] Primality and identity testing via Chinese remaindering
    Agrawal, M
    Biswas, S
    [J]. JOURNAL OF THE ACM, 2003, 50 (04) : 429 - 443
  • [4] [Anonymous], 1979, FCT
  • [5] Probabilistic checking of proofs: A new characterization of NP
    Arora, S
    Safra, S
    [J]. JOURNAL OF THE ACM, 1998, 45 (01) : 70 - 122
  • [6] Outcome analysis for treatment in 100 patients with deep vein thrombosis
    Baker, WF
    [J]. CLINICAL AND APPLIED THROMBOSIS-HEMOSTASIS, 1995, 1 (01) : 39 - 48
  • [7] Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P301, DOI 10.1145/62212.62241
  • [8] BLASER M, 2008, P 35 ICALP, P345
  • [9] DESIGNING PROGRAMS THAT CHECK THEIR WORK
    BLUM, M
    KANNAN, S
    [J]. JOURNAL OF THE ACM, 1995, 42 (01) : 269 - 291
  • [10] EQUIVALENCE OF FREE BOOLEAN GRAPHS CAN BE DECIDED PROBABILISTICALLY IN POLYNOMIAL-TIME
    BLUM, M
    CHANDRA, AK
    WEGMAN, MN
    [J]. INFORMATION PROCESSING LETTERS, 1980, 10 (02) : 80 - 82