Jacobian Hits Circuits: Hitting-sets, Lower Bounds for Depth-D Occur-k Formulas & Depth-3 Transcendence Degree-k Circuits

被引:0
作者
Agrawal, Manindra [1 ]
Saha, Chandan [2 ]
Saptharishi, Ramprasad [3 ]
Saxena, Nitin [4 ]
机构
[1] Indian Inst Technol, Kanpur, Uttar Pradesh, India
[2] Max Planck Inst Informat, Saarbrucken, Germany
[3] Chennai Math Inst, Chennai, Tamil Nadu, India
[4] Hausdorff Ctr Math, Bonn, Germany
来源
STOC'12: PROCEEDINGS OF THE 2012 ACM SYMPOSIUM ON THEORY OF COMPUTING | 2012年
关键词
algebraic independence; blackbox; circuits; depth; identity testing; immanant; Jacobian; lower bound; Vandermonde; ARITHMETIC CIRCUITS; ALGORITHMS; VERIFICATION; POLYNOMIALS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a single common tool to strictly subsume all known cases of polynomial time blackbox polynomial identity testing (PIT), that have been hitherto solved using diverse tools and techniques, over fields of zero or large characteristic. In particular, we show that polynomial time hitting-set generators for identity testing of the two seemingly different and well studied models - depth-3 circuits with bounded top fanin, and constant-depth constant-read multilinear formulas - can be constructed using one common algebraic-geometry theme: Jacobian captures algebraic independence. By exploiting the Jacobian, we design the first efficient hitting-set generators for broad generalizations of the above-mentioned models, namely: depth-3 (Sigma Pi Sigma) circuits with constant transcendence degree of the polynomials computed by the product gates (no bounded top fanin restriction), and constant-depth constant-occur formulas (no multilinear restriction). Constant-occur of a variable, as we define it, is a much more general concept than constant-read. Also, earlier work on the latter model assumed that the formula is multilinear. Thus, our work goes further beyond the related results obtained by Saxena & Seshadhri (STOC 2011), Saraf & Volkovich (STOC 2011), Anderson et al. (CCC 2011), Beecken et al. (ICALP 2011) and Grenet et al. (FSTTCS 2011), and brings them under one unifying technique. In addition, using the same Jacobian based approach, we prove exponential lower bounds for the immanant (which includes permanent and determinant) on the same depth-3 and depth-4 models for which we give efficient PIT algorithms. Our results reinforce the intimate connection between identity testing and lower bounds by exhibiting a concrete mathematical tool - the Jacobian - that is equally effective in solving both the problems on certain interesting and previously well-investigated (but not well understood) models of computation.
引用
收藏
页码:599 / 613
页数:15
相关论文
共 51 条
  • [1] Aaronson S., 2010, ELECT C COMPUTATIONA, V17, P105
  • [2] Agrawal M, 2005, LECT NOTES COMPUT SC, V3821, P92, DOI 10.1007/11590156_6
  • [3] PRIMES is in P
    Agrawal, M
    Kayal, N
    Saxena, N
    [J]. ANNALS OF MATHEMATICS, 2004, 160 (02) : 781 - 793
  • [4] AGRAWAL M, 2008, FOCS, P67, DOI DOI 10.1109/FOCS.2008.32
  • [5] Derandomizing Polynomial Identity Testing for Multilinear Constant-Read Formulae
    Anderson, Matthew
    van Melkebeek, Dieter
    Volkovich, Ilya
    [J]. 2011 IEEE 26TH ANNUAL CONFERENCE ON COMPUTATIONAL COMPLEXITY (CCC), 2011, : 273 - 282
  • [6] [Anonymous], 1987, P 19 ANN ACM S THEOR
  • [7] [Anonymous], 1979, FCT
  • [8] Proof verification and the hardness of approximation problems
    Arora, S
    Lund, C
    Motwani, R
    Sudan, M
    Szegedy, M
    [J]. JOURNAL OF THE ACM, 1998, 45 (03) : 501 - 555
  • [9] Beecken M, 2011, LECT NOTES COMPUT SC, V6756, P137, DOI 10.1007/978-3-642-22012-8_10
  • [10] Beecken Malte, 2011, CORR