Ben Lee Volk. Joint with. Michael A. Forbes Amir Shpilka
|
|
- Tyler Wilkins
- 5 years ago
- Views:
Transcription
1 Ben Lee Volk Joint with Michael A. Forbes Amir Shpilka
2 Ben Lee Volk Joint with Michael A. Forbes Amir Shpilka
3 (One) Answer: natural proofs barrier [Razborov-Rudich]:
4 (One) Answer: natural proofs barrier [Razborov-Rudich]: A computationally-bounded observer cannot distinguish between the truth table of a random function with small circuit and that of a truly random function (assuming some crypto). So every lower bound proof attempt which yields such an algorithm cannot work.
5 (One) Answer: natural proofs barrier [Razborov-Rudich]: A computationally-bounded observer cannot distinguish between the truth table of a random function with small circuit and that of a truly random function (assuming some crypto). So every lower bound proof attempt which yields such an algorithm cannot work.
6 Def: A property S of boolean functions is natural if it is:
7 Def: A property S of boolean functions is natural if it is: 1. Useful: if f has S then f doesn t have a small ckt.
8 Def: A property S of boolean functions is natural if it is: 1. Useful: if f has S then f doesn t have a small ckt. 2. Large: random functions have S with large probability.
9 Def: A property S of boolean functions is natural if it is: 1. Useful: if f has S then f doesn t have a small ckt. 2. Large: random functions have S with large probability. 3. Constructive: Given truth table of f of size N = 2 n, there is an algorithm for deciding whether f S with running time poly(n) = 2 O(n).
10 Def: A property S of boolean functions is natural if it is: 1. Useful: if f has S then f doesn t have a small ckt. 2. Large: random functions have S with large probability. 3. Constructive: Given truth table of f of size N = 2 n, there is an algorithm for deciding whether f S with running time poly(n) = 2 O(n). natural proof: a lower bound proof which exhibits a natural property.
11 Def: A property S of boolean functions is natural if it is: 1. Useful: if f has S then f doesn t have a small ckt. 2. Large: random functions have S with large probability. 3. Constructive: Given truth table of f of size N = 2 n, there is an algorithm for deciding whether f S with running time poly(n) = 2 O(n). natural proof: a lower bound proof which exhibits a natural property. [Razborov-Rudich]: Most known lower bounds are natural and if there s a pseudorandom function in then no natural lower bound against.
12 f (x 1, x 2, x 3 ) [x 1, x 2, x 3 ] x 1 x 2 x 3 1
13 ...are also pretty hard.
14 ...are also pretty hard. We can prove lower bounds for restricted models, but all lower bounds eventually also apply to polynomials we think of as easy.
15 ...are also pretty hard. We can prove lower bounds for restricted models, but all lower bounds eventually also apply to polynomials we think of as easy. Most lower bounds seem natural, but unclear whether there are pseudorandom functions computed by low-degree algebraic circuits.
16 ...are also pretty hard. We can prove lower bounds for restricted models, but all lower bounds eventually also apply to polynomials we think of as easy. Most lower bounds seem natural, but unclear whether there are pseudorandom functions computed by low-degree algebraic circuits. (and even if not, maybe there are such functions that are only secure against algebraic circuits?)
17 ...are also pretty hard. We can prove lower bounds for restricted models, but all lower bounds eventually also apply to polynomials we think of as easy. Most lower bounds seem natural, but unclear whether there are pseudorandom functions computed by low-degree algebraic circuits. (and even if not, maybe there are such functions that are only secure against algebraic circuits?) Can we identify formal barriers?
18 ...are also pretty hard. We can prove lower bounds for restricted models, but all lower bounds eventually also apply to polynomials we think of as easy. Most lower bounds seem natural, but unclear whether there are pseudorandom functions computed by low-degree algebraic circuits. (and even if not, maybe there are such functions that are only secure against algebraic circuits?) Can we identify formal barriers? (also asked by [Aaronson-Drucker] and [Grochow])
19 Many lower bounds for restricted models of algebraic circuits have this form:
20 Many lower bounds for restricted models of algebraic circuits have this form: 1. given f, construct some matrix M f whose entries are coefficients of f.
21 Many lower bounds for restricted models of algebraic circuits have this form: 1. given f, construct some matrix M f whose entries are coefficients of f. 2. argue that if f is computed by a small ckt, rank(m f ) = small.
22 Many lower bounds for restricted models of algebraic circuits have this form: 1. given f, construct some matrix M f whose entries are coefficients of f. 2. argue that if f is computed by a small ckt, rank(m f ) = small. 3. show some explicit f 0 with rank(m f0 ) = large.
23 Many lower bounds for restricted models of algebraic circuits have this form: 1. given f, construct some matrix M f whose entries are coefficients of f. 2. argue that if f is computed by a small ckt, rank(m f ) = small. 3. show some explicit f 0 with rank(m f0 ) = large. (examples: evaluation dimension, partial derivatives, shifted partial derivatives,...)
24 Many lower bounds for restricted models of algebraic circuits have this form: 1. given f, construct some matrix M f whose entries are coefficients of f. 2. argue that if f is computed by a small ckt, rank(m f ) = small. 3. show some explicit f 0 with rank(m f0 ) = large. (examples: evaluation dimension, partial derivatives, shifted partial derivatives,...) equivalently: for some r r submatrix, det(m ) 0, while f 0 det(m ) = 0 for all simple f. f
25 Many lower bounds for restricted models of algebraic circuits have this form: 1. given f, construct some matrix M f whose entries are coefficients of f. 2. argue that if f is computed by a small ckt, rank(m f ) = small. 3. show some explicit f 0 with rank(m f0 ) = large. (examples: evaluation dimension, partial derivatives, shifted partial derivatives,...) equivalently: for some r r submatrix, det(m ) 0, while f 0 det(m ) = 0 for all simple f. f Thus, the property {g : det(m g ) 0} is useful, constructive (determinant is efficiently computable) and large.
26 Def: A (distinguisher) polynomial D 0 is an algebraic natural proof against a class if
27 Def: A (distinguisher) polynomial D 0 is an algebraic natural proof against a class if 1. (Usefulness) D(coeff(f )) = 0 for all f
28 Def: A (distinguisher) polynomial D 0 is an algebraic natural proof against a class if 1. (Usefulness) D(coeff(f )) = 0 for all f 2. (Constructiveness) D has a small algebraic circuit
29 Def: A (distinguisher) polynomial D 0 is an algebraic natural proof against a class if 1. (Usefulness) D(coeff(f )) = 0 for all f 2. (Constructiveness) D has a small algebraic circuit (largeness comes for free)
30 Def: A (distinguisher) polynomial D 0 is an algebraic natural proof against a class if 1. (Usefulness) D(coeff(f )) = 0 for all f 2. (Constructiveness) D has a small algebraic circuit (largeness comes for free) Important: D is an N-variate polynomial for N = n+d d (if we deal with n-variate degree d polynomials) or N = 2 n (if we deal with multilinear polynomials)
31 Def: A (distinguisher) polynomial D 0 is an algebraic natural proof against a class if 1. (Usefulness) D(coeff(f )) = 0 for all f 2. (Constructiveness) D has a small algebraic circuit (largeness comes for free) Important: D is an N-variate polynomial for N = n+d d (if we deal with n-variate degree d polynomials) or N = 2 n (if we deal with multilinear polynomials) Toy example: is the class of perfect squares among polynomials of the form ax 2 + bx + c, and D(a, b, c) = b 2 4ac.
32 Def: A (distinguisher) polynomial D 0 is an algebraic natural proof against a class if 1. (Usefulness) D(coeff(f )) = 0 for all f 2. (Constructiveness) D has a small algebraic circuit (largeness comes for free) Important: D is an N-variate polynomial for N = n+d d (if we deal with n-variate degree d polynomials) or N = 2 n (if we deal with multilinear polynomials) Toy example: is the class of perfect squares among polynomials of the form ax 2 + bx + c, and D(a, b, c) = b 2 4ac. [Grochow]: almost all known lower bounds can be cast in this form.
33 [Mulmuley-Sohoni]
34 [Mulmuley-Sohoni] VP per VP det
35 [Mulmuley-Sohoni] VP per VP det VP is a zero set of a set of polynomials. What is the complexity of?
36 Given an algebraic circuit C, decide deterministically whether C computes the zero polynomial.
37 Given an algebraic circuit C, decide deterministically whether C computes the zero polynomial. Black-box: compute a hitting set, i.e., a set such that for every C there is α such that C(α) 0.
38 Given an algebraic circuit C, decide deterministically whether C computes the zero polynomial. Black-box: compute a hitting set, i.e., a set such that for every C there is α such that C(α) 0. Suppose D is a distinguisher for a class. Then D 0, and yet D(coeff(f )) = 0 for all f.
39 Given an algebraic circuit C, decide deterministically whether C computes the zero polynomial. Black-box: compute a hitting set, i.e., a set such that for every C there is α such that C(α) 0. Suppose D is a distinguisher for a class. Then D 0, and yet D(coeff(f )) = 0 for all f. = {coeff(f ) : f } is not a hitting set for D.
40 Given an algebraic circuit C, decide deterministically whether C computes the zero polynomial. Black-box: compute a hitting set, i.e., a set such that for every C there is α such that C(α) 0. Suppose D is a distinguisher for a class. Then D 0, and yet D(coeff(f )) = 0 for all f. = {coeff(f ) : f } is not a hitting set for D. In other words: if {coeff(f ) : f } is a hitting set for a class, then no natural proof for with the distinguisher coming from.
41 Def: Let [x 1,..., x n ] be a class of degree d polynomials, and [X 1,..., X N ] for N = n+d d. is a succinct hitting set for if := {coeff(f ) : f } is a hitting set for.
42 Def: Let [x 1,..., x n ] be a class of degree d polynomials, and [X 1,..., X N ] for N = n+d d. is a succinct hitting set for if := {coeff(f ) : f } is a hitting set for. Thm: If is a succinct hitting set for, no algebraically natural proof against with the distinguisher coming from.
43 Def: Let [x 1,..., x n ] be a class of degree d polynomials, and [X 1,..., X N ] for N = n+d d. is a succinct hitting set for if := {coeff(f ) : f } is a hitting set for. Thm: If is a succinct hitting set for, no algebraically natural proof against with the distinguisher coming from. Proof: If D is non-zero then D does not vanish on.
44 Def: Let [x 1,..., x n ] be a class of degree d polynomials, and [X 1,..., X N ] for N = n+d d. is a succinct hitting set for if := {coeff(f ) : f } is a hitting set for. Thm: If is a succinct hitting set for, no algebraically natural proof against with the distinguisher coming from. Proof: If D is non-zero then D does not vanish on. (also observed independently by [Grochow-Kumar-Saraf-Saks])
45 Def: Let [x 1,..., x n ] be a class of degree d polynomials, and [X 1,..., X N ] for N = n+d d. is a succinct hitting set for if := {coeff(f ) : f } is a hitting set for. Thm: If is a succinct hitting set for, no algebraically natural proof against with the distinguisher coming from. Proof: If D is non-zero then D does not vanish on. (also observed independently by [Grochow-Kumar-Saraf-Saks]) Question: are poly(n) size and poly(n) degree circuits a hitting sets for poly(n) size and poly(n) degree circuits? ( does VP hit VP? )
46 Let = {coeff(f ) : f VP(n)}. If is a hitting set for VP(N) then there are no VP-algebraic natural proofs against VP.
47 Let = {coeff(f ) : f VP(n)}. If is a hitting set for VP(N) then there are no VP-algebraic natural proofs against VP.
48 Let = {coeff(f ) : f VP(n)}. If is a hitting set for VP(N) then there are no VP-algebraic natural proofs against VP. (note: may a-priori be infinite but we ll soon see that this actually implies there exists some small )
49 Def: A polynomial map : l N is a generator for a class if for every non-zero F, F( (y)) 0.
50 Def: A polynomial map : l N is a generator for a class if for every non-zero F, F( (y)) 0. (want: deg poly(n), l as small as possible)
51 Def: A polynomial map : l N is a generator for a class if for every non-zero F, F( (y)) 0. (want: deg poly(n), l as small as possible) generators hitting sets
52 Def: A polynomial map : l N is a generator for a class if for every non-zero F, F( (y)) 0. (want: deg poly(n), l as small as possible) generators hitting sets ( = : evaluate. = : interpolate.)
53 Def: A polynomial map : l N is a generator for a class if for every non-zero F, F( (y)) 0. (want: deg poly(n), l as small as possible) generators hitting sets ( = : evaluate. = : interpolate.) succinct hitting sets =?
54 Def: A polynomial G(x, y) is a -succinct generator for if:
55 Def: A polynomial G(x, y) is a -succinct generator for if: 1. For every α, G(x, α).
56 Def: A polynomial G(x, y) is a -succinct generator for if: 1. For every α, G(x, α). 2. The polynomial map = coeff x (G(x, y)) is a generator for.
57 Def: A polynomial G(x, y) is a -succinct generator for if: 1. For every α, G(x, α). 2. The polynomial map = coeff x (G(x, y)) is a generator for. G(x, y) = 1 (y 1 + y 2 ) + x 1 (y 1 y 3 2 ) + x 2 (y y 2) + x 1 x 2 1 (y) = (y 1 + y 2, y 1 y 3 2, y2 1 + y 2, 1)
58 Def: A polynomial G(x, y) is a -succinct generator for if: 1. For every α, G(x, α). 2. The polynomial map = coeff x (G(x, y)) is a generator for. G(x, y) = 1 (y 1 + y 2 ) + x 1 (y 1 y 3 2 ) + x 2 (y y 2) + x 1 x 2 1 (y) = (y 1 + y 2, y 1 y 3 2, y2 1 + y 2, 1) {G(x, α) : α l } is a -succinct hitting set against. So succinct generator = succinct hitting set (and even a uniform one).
59 Def: A polynomial G(x, y) is a -succinct generator for if: 1. For every α, G(x, α). 2. The polynomial map = coeff x (G(x, y)) is a generator for. Aside: why not just require G(x, y)?
60 Def: A polynomial G(x, y) is a -succinct generator for if: 1. For every α, G(x, α). 2. The polynomial map = coeff x (G(x, y)) is a generator for. Aside: why not just require G(x, y)? We can, but 1. unnecessary for succinct hitting sets which imply barriers 2. G(x, α) might be in even smaller class (e.g., if y has high deg)
61 Recall: succinct generator = succinct hitting sets.
62 Recall: succinct generator = succinct hitting sets. Other direction?
63 Recall: succinct generator = succinct hitting sets. Other direction? Interpolating has complexity poly( ) which is not succinct.
64 Recall: succinct generator = succinct hitting sets. Other direction? Interpolating has complexity poly( ) which is not succinct. But still true because of the existence of universal circuits.
65 Recall: succinct generator = succinct hitting sets. Other direction? Interpolating has complexity poly( ) which is not succinct. But still true because of the existence of universal circuits. In particular, if := {coeff(f ) : f VP(n)} is an (infinite) hitting set for VP(N), there is a N poly log(n) size hitting set ( is in the image of a universal circuit).
66 Conjecture: VP hits VP.
67 Conjecture: VP hits VP. How to obtain evidence to support this conjecture?
68 Conjecture: VP hits VP. How to obtain evidence to support this conjecture? Can we construct algebraic pseudorandom functions?
69 Conjecture: VP hits VP. How to obtain evidence to support this conjecture? Can we construct algebraic pseudorandom functions? [Aaronson-Drucker] s candidate: det l i, j (x) where l i, j s are random linear functions.
70 Conjecture: VP hits VP. How to obtain evidence to support this conjecture? Can we construct algebraic pseudorandom functions? [Aaronson-Drucker] s candidate: det l i, j (x) where l i, j s are random linear functions. Conjecture: this is pseudorandom (maybe only against alg ckts?)
71 Conjecture: VP hits VP. How to obtain evidence to support this conjecture? Can we construct algebraic pseudorandom functions? [Aaronson-Drucker] s candidate: det l i, j (x) where l i, j s are random linear functions. Conjecture: this is pseudorandom (maybe only against alg ckts?) Challange: establish this under some crypto hardness assumption.
72 This work: nearly all the hitting sets we know for restricted models can be made succinct.
73 This work: nearly all the hitting sets we know for restricted models can be made succinct. Thm: coefficient vectors of poly(log s, n) size multilinear formulas are hitting sets for N = 2 n variate size s:
74 This work: nearly all the hitting sets we know for restricted models can be made succinct. Thm: coefficient vectors of poly(log s, n) size multilinear formulas are hitting sets for N = 2 n variate size s: Σ k ΠΣ formulas,
75 This work: nearly all the hitting sets we know for restricted models can be made succinct. Thm: coefficient vectors of poly(log s, n) size multilinear formulas are hitting sets for N = 2 n variate size s: Σ k ΠΣ formulas, ΣΠΣ formulas of constant transcendence degree,
76 This work: nearly all the hitting sets we know for restricted models can be made succinct. Thm: coefficient vectors of poly(log s, n) size multilinear formulas are hitting sets for N = 2 n variate size s: Σ k ΠΣ formulas, ΣΠΣ formulas of constant transcendence degree, sparse polynomials,
77 This work: nearly all the hitting sets we know for restricted models can be made succinct. Thm: coefficient vectors of poly(log s, n) size multilinear formulas are hitting sets for N = 2 n variate size s: Σ k ΠΣ formulas, ΣΠΣ formulas of constant transcendence degree, sparse polynomials, Σm ΣΠ O(1) formulas,
78 This work: nearly all the hitting sets we know for restricted models can be made succinct. Thm: coefficient vectors of poly(log s, n) size multilinear formulas are hitting sets for N = 2 n variate size s: Σ k ΠΣ formulas, ΣΠΣ formulas of constant transcendence degree, sparse polynomials, Σm ΣΠ O(1) formulas, commutative roabps,
79 This work: nearly all the hitting sets we know for restricted models can be made succinct. Thm: coefficient vectors of poly(log s, n) size multilinear formulas are hitting sets for N = 2 n variate size s: Σ k ΠΣ formulas, ΣΠΣ formulas of constant transcendence degree, sparse polynomials, Σm ΣΠ O(1) formulas, commutative roabps, depth-o(1) Occur-O(1) formulas
80 This work: nearly all the hitting sets we know for restricted models can be made succinct. Thm: coefficient vectors of poly(log s, n) size multilinear formulas are hitting sets for N = 2 n variate size s: Σ k ΠΣ formulas, ΣΠΣ formulas of constant transcendence degree, sparse polynomials, Σm ΣΠ O(1) formulas, commutative roabps, depth-o(1) Occur-O(1) formulas circuits composed with sparse polynomials of transcendence degree O(1).
81 Not as succinct but still worth mentioning:
82 Not as succinct but still worth mentioning: width w 2 length-n roabps are hitting set for width-w length-n roabps (in certain variable orders).
83 Not as succinct but still worth mentioning: width w 2 length-n roabps are hitting set for width-w length-n roabps (in certain variable orders). (open: make the w 2 closer to poly log(w) and remove the restriction on ordering)
84 Not as succinct but still worth mentioning: width w 2 length-n roabps are hitting set for width-w length-n roabps (in certain variable orders). (open: make the w 2 closer to poly log(w) and remove the restriction on ordering) We can t make all known hitting sets succinct but we have some excuses (more on that later).
85 Toy example: [X 1,..., X N ] is the class of polynomials with monomials of support poly log(n).
86 Toy example: [X 1,..., X N ] is the class of polynomials with monomials of support poly log(n). Hitting set for : {v : supp(v) poly log(n) = poly(n)}.
87 Toy example: [X 1,..., X N ] is the class of polynomials with monomials of support poly log(n). Hitting set for : {v : supp(v) poly log(n) = poly(n)}. ( guess vars in small support monomials, brute-force over them)
88 Toy example: [X 1,..., X N ] is the class of polynomials with monomials of support poly log(n). Hitting set for : {v : supp(v) poly log(n) = poly(n)}. ( guess vars in small support monomials, brute-force over them) Q: Is this succinct?
89 Toy example: [X 1,..., X N ] is the class of polynomials with monomials of support poly log(n). Hitting set for : {v : supp(v) poly log(n) = poly(n)}. ( guess vars in small support monomials, brute-force over them) Q: Is this succinct? A: Yes. Each v is a coefficient vector of a poly(n) ΣΠ circuit in x 1,..., x n (only poly(n) monomials with non-zero coefficient).
90 Less-of-a-toy example: [X 1,..., X N ] is the class of polynomials of sparsity at most s.
91 Less-of-a-toy example: [X 1,..., X N ] is the class of polynomials of sparsity at most s. F doesn t necessarily contain small support monomials.
92 Less-of-a-toy example: [X 1,..., X N ] is the class of polynomials of sparsity at most s. F doesn t necessarily contain small support monomials. Exercise: if F(X) has sparsity s, F(X + 1) has non-zero monomial of support log s. [Forbes15, Gurjar-Korwar-Saxena-Theirauf16]
93 Less-of-a-toy example: [X 1,..., X N ] is the class of polynomials of sparsity at most s. F doesn t necessarily contain small support monomials. Exercise: if F(X) has sparsity s, F(X + 1) has non-zero monomial of support log s. [Forbes15, Gurjar-Korwar-Saxena-Theirauf16] Cor: {v + 1 : supp(v) poly log(s)} hitting set for.
94 Less-of-a-toy example: [X 1,..., X N ] is the class of polynomials of sparsity at most s. F doesn t necessarily contain small support monomials. Exercise: if F(X) has sparsity s, F(X + 1) has non-zero monomial of support log s. [Forbes15, Gurjar-Korwar-Saxena-Theirauf16] Cor: {v + 1 : supp(v) poly log(s)} hitting set for. Q: Is this succinct?
95 Less-of-a-toy example: [X 1,..., X N ] is the class of polynomials of sparsity at most s. F doesn t necessarily contain small support monomials. Exercise: if F(X) has sparsity s, F(X + 1) has non-zero monomial of support log s. [Forbes15, Gurjar-Korwar-Saxena-Theirauf16] Cor: {v + 1 : supp(v) poly log(s)} hitting set for. Q: Is this succinct? A: Yes. 1 is coeff vector of n i=1 (x i + 1). Now take the sum of this and the circuit from previous slide.
96 Less-of-a-toy example: [X 1,..., X N ] is the class of polynomials of sparsity at most s. F doesn t necessarily contain small support monomials. Exercise: if F(X) has sparsity s, F(X + 1) has non-zero monomial of support log s. [Forbes15, Gurjar-Korwar-Saxena-Theirauf16] Cor: {v + 1 : supp(v) poly log(s)} hitting set for. Q: Is this succinct? A: Yes. 1 is coeff vector of n i=1 (x i + 1). Now take the sum of this and the circuit from previous slide. Cor: poly(log s, n)-σπσ succinct hitting set for sparse polynomials.
97 In the paper: many other succinct generators, most of them follow from various combinations of basic constructs such as Shpilka-Volkovich generator and Gabizon-Raz s rank condenser, which we make succinct.
98 In the paper: many other succinct generators, most of them follow from various combinations of basic constructs such as Shpilka-Volkovich generator and Gabizon-Raz s rank condenser, which we make succinct. Builds on a lot of previous work: [Dvir-Shpilka, Karnin-Shpilka, Kayal-Saraf, Saxena-Seshadhri, Shpilka-Volkovich, Forbes-Shpilka, Forbes-Shpilka-Saptharishi, Beecken- Mittmann-Saxena, Agrawal-Saha-Saxena-Saptharishi,...].
99 In the paper: many other succinct generators, most of them follow from various combinations of basic constructs such as Shpilka-Volkovich generator and Gabizon-Raz s rank condenser, which we make succinct. Builds on a lot of previous work: [Dvir-Shpilka, Karnin-Shpilka, Kayal-Saraf, Saxena-Seshadhri, Shpilka-Volkovich, Forbes-Shpilka, Forbes-Shpilka-Saptharishi, Beecken- Mittmann-Saxena, Agrawal-Saha-Saxena-Saptharishi,...]. Cor: Super-polynomial lower bounds on defining equations of VP in many models.
100 conspicuously missing: Klivans-Spielman (Kronecker) generator.
101 conspicuously missing: Klivans-Spielman (Kronecker) generator. X i y ki mod p y new var, k integer and p prime chosen from sufficiently large set.
102 conspicuously missing: Klivans-Spielman (Kronecker) generator. X i y ki mod p y new var, k integer and p prime chosen from sufficiently large set. Hits sparse polynomials and very useful in other constructions.
103 conspicuously missing: Klivans-Spielman (Kronecker) generator. X i y ki mod p y new var, k integer and p prime chosen from sufficiently large set. Hits sparse polynomials and very useful in other constructions. Challenge: make it succinct, i.e., find a small circuit in {x 1,..., x n, y} such that the coefficient of x S is y kbin(s) mod p, bin(s) = integer whose binary expansion is the characteristic vector of S.
104 The generator X i y ki mod p 1 1 y ki mod p m m for m = O(log n) hits roabps (in any order) and read-once determinants (polys of the form det(m) where each entry in M contains a var or a constant and each var appears at most once) [Agrawal-Gurjar-Korwar-Saxena, Fenner-Gurjar-Thierauf, Gurjar-Thierauf]
105 The generator X i y ki mod p 1 1 y ki mod p m m for m = O(log n) hits roabps (in any order) and read-once determinants (polys of the form det(m) where each entry in M contains a var or a constant and each var appears at most once) [Agrawal-Gurjar-Korwar-Saxena, Fenner-Gurjar-Thierauf, Gurjar-Thierauf] [Raz] and [Raz-Yehudayoff] showed: small multilinear formulas are not a hitting set for read-once determinants.
106 The generator X i y ki mod p 1 1 y ki mod p m m for m = O(log n) hits roabps (in any order) and read-once determinants (polys of the form det(m) where each entry in M contains a var or a constant and each var appears at most once) [Agrawal-Gurjar-Korwar-Saxena, Fenner-Gurjar-Thierauf, Gurjar-Thierauf] [Raz] and [Raz-Yehudayoff] showed: small multilinear formulas are not a hitting set for read-once determinants. Our constructions are all small multilinear formulas, so we might need new ideas.
107 More models for which we know of hitting sets but not succinct ones:
108 More models for which we know of hitting sets but not succinct ones: roabps in any order read-k oblivious ABPs bounded-depth multilinear formulas
109 More models for which we know of hitting sets but not succinct ones: roabps in any order read-k oblivious ABPs bounded-depth multilinear formulas Also: pseudorandom polynomials? Is [Aaronson-Drucker] s construction pseudorandom?
110 More models for which we know of hitting sets but not succinct ones: roabps in any order read-k oblivious ABPs bounded-depth multilinear formulas Also: pseudorandom polynomials? Is [Aaronson-Drucker] s construction pseudorandom?
Polynomial Identity Testing
Polynomial Identity Testing Amir Shpilka Technion and MSR NE Based on joint works with: Zeev Dvir, Zohar Karnin, Partha Mukhopadhyay, Ran Raz, Ilya Volkovich and Amir Yehudayoff 1 PIT Survey Oberwolfach
More informationNovember 17, Recent Results on. Amir Shpilka Technion. PIT Survey Oberwolfach
1 Recent Results on Polynomial Identity Testing Amir Shpilka Technion Goal of talk Survey known results Explain proof techniques Give an interesting set of `accessible open questions 2 Talk outline Definition
More informationDeterministic identity testing for sum of read-once oblivious arithmetic branching programs
Deterministic identity testing for sum of read-once oblivious arithmetic branching programs Rohit Gurjar, Arpita Korwar, Nitin Saxena, IIT Kanpur Thomas Thierauf Aalen University June 18, 2015 Gurjar,
More informationPolynomial Identity Testing. Amir Shpilka Technion
Polynomial Identity Testing Amir Shpilka Technion 1 Goal of talk Model: Arithmetic circuits Problem: Polynomial Identity Testing Example: Depth-3 circuits Some open problems 2 Holy grail: P vs. NP Boolean
More informationSums of products of polynomials of low-arity - lower bounds and PIT
Sums of products of polynomials of low-arity - lower bounds and PIT Mrinal Kumar Joint work with Shubhangi Saraf Plan for the talk Plan for the talk Model of computation Plan for the talk Model of computation
More informationDeterministic identity testing of depth 4 multilinear circuits with bounded top fan-in
Deterministic identity testing of depth 4 multilinear circuits with bounded top fan-in Zohar S. Karnin Partha Mukhopadhyay Amir Shpilka Ilya Volkovich November 15, 2009 Abstract We give the first sub-exponential
More informationArithmetic Circuits with Locally Low Algebraic Rank
Arithmetic Circuits with Locally Low Algebraic Rank Mrinal Kumar 1 and Shubhangi Saraf 2 1 Department of Computer Science, Rutgers University, New Brunswick, USA mrinal.kumar@rutgers.edu 2 Department of
More informationIntroduction to Arithmetic Circuit Complexity
Introduction to Arithmetic Circuit Complexity Amir Shpilka Technion 1 Goal of talk Survey results in arithmetic circuit complexity! Lower Bounds! Identity Testing! Reconstruction/Interpolation/Learning!
More informationExplicit Noether Normalization for Simultaneous Conjugation via Polynomial Identity Testing
Explicit Noether Normalization for Simultaneous Conjugation via Polynomial Identity Testing Michael A. Forbes Amir Shpilka March 7, 2013 Abstract Mulmuley [Mul12a] recently gave an explicit version of
More informationReconstruction of full rank algebraic branching programs
Reconstruction of full rank algebraic branching programs Vineet Nair Joint work with: Neeraj Kayal, Chandan Saha, Sebastien Tavenas 1 Arithmetic circuits 2 Reconstruction problem f(x) Q[X] is an m-variate
More informationLecture 2: January 18
CS271 Randomness & Computation Spring 2018 Instructor: Alistair Sinclair Lecture 2: January 18 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They
More informationSums of Products of Polynomials in Few Variables: Lower Bounds and Polynomial Identity Testing
Sums of Products of Polynomials in Few Variables: Lower Bounds and Polynomial Identity Testing Mrinal Kumar 1 and Shubhangi Saraf 2 1 Department of Computer Science, Rutgers University, New Brunswick,
More informationClassifying polynomials and identity testing
Classifying polynomials and identity testing MANINDRA AGRAWAL 1, and RAMPRASAD SAPTHARISHI 2 1 Indian Institute of Technology, Kanpur, India. 2 Chennai Mathematical Institute, and Indian Institute of Technology,
More informationDETERMINISTIC POLYNOMIAL IDENTITY TESTS FOR MULTILINEAR BOUNDED-READ FORMULAE
DETERMINISTIC POLYNOMIAL IDENTITY TESTS FOR MULTILINEAR BOUNDED-READ FORMULAE Matthew Anderson, Dieter van Melkebeek, and Ilya Volkovich June 20, 2014 Abstract. We present a polynomial-time deterministic
More informationThe Chasm at Depth Four, and Tensor Rank: Old results, new insights
The Chasm at Depth Four, and Tensor Rank: Old results, new insights Suryajith Chillara 1 Joint work with Mrinal Kumar, Ramprasad Saptharishi and V. Vinay June 12, 2017 1 Research partly supported by TCS
More informationDeterministically Testing Sparse Polynomial Identities of Unbounded Degree
Deterministically Testing Sparse Polynomial Identities of Unbounded Degree Markus Bläser a Moritz Hardt b,,1 Richard J. Lipton c Nisheeth K. Vishnoi d a Saarland University, Saarbrücken, Germany. b Princeton
More informationRank Bound for Depth-3 Identities
Rank Bound for Depth-3 Identities Nitin Saxena (Hausdorff Center for Mathematics, Bonn) Joint work with C. Seshadhri (IBM Almaden Research Center, San Jose) 1 The problem of PIT Polynomial identity testing:
More informationTesting Algebraic Independence over Finite Fields
Testing Algebraic Independence over Finite Fields Nitin Saxena (IIT Kanpur, India) (Joint work with Johannes Mittmann, Peter Scheiblechner) **all pictures are works of others. 2013 Contents Algebraic independence
More informationarxiv: v2 [cs.cc] 20 May 2018
arxiv:1805.06692v2 [cs.cc] 20 May 2018 A Note on Polynomial Identity Testing for Depth-3 Circuits V. Arvind Abhranil Chatterjee Rajit Datta Partha Mukhopadhyay May 22, 2018 Abstract Let C be a depth-3
More informationLower bounds for multilinear bounded order ABPs
Lower bounds for multilinear bounded order ABPs C. Ramya B. V. Raghavendra Rao IIT Madras, Chennai, India {ramya,bvrr}@cse.iitm.ac.in January 15, 2019 arxiv:1901.04377v1 [cs.cc] 14 Jan 2019 Abstract Proving
More informationDeterministic Identity Testing for Sum of Read-Once Oblivious Arithmetic Branching Programs arxiv: v2 [cs.cc] 16 May 2015
Deterministic Identity Testing for Sum of Read-Once Oblivious Arithmetic Branching Programs arxiv:1411.7341v2 [cs.cc] 16 May 2015 Rohit Gurjar 1, Arpita Korwar 1, Nitin Saxena 1 and Thomas Thierauf 2 1
More informationFinite fields, randomness and complexity. Swastik Kopparty Rutgers University
Finite fields, randomness and complexity Swastik Kopparty Rutgers University This talk Three great problems: Polynomial factorization Epsilon-biased sets Function uncorrelated with low-degree polynomials
More informationLearning Restricted Models of Arithmetic Circuits
Learning Restricted Models of Arithmetic Circuits Adam R. Klivans Department of Computer Science University of Texas at Austin Austin, TX 78712-1188 klivans@cs.utexas.edu Amir Shpilka Faculty of Computer
More informationPolynomial Identity Testing and Lower Bounds for Sum of Special Arithmetic Branching Programs
Polynomial Identity Testing and Lower Bounds for Sum of Special Arithmetic Branching Programs A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy by Arpita
More informationEquivalence of Polynomial Identity Testing and Deterministic Multivariate Polynomial Factorization
Equivalence of Polynomial Identity Testing and Deterministic Multivariate Polynomial Factorization Swastik Kopparty Shubhangi Saraf Amir Shpilka Abstract In this paper we show that the problem of deterministically
More informationNP-Complete problems
NP-Complete problems NP-complete problems (NPC): A subset of NP. If any NP-complete problem can be solved in polynomial time, then every problem in NP has a polynomial time solution. NP-complete languages
More informationArithmetic circuits: A chasm at depth three
Electronic Colloquium on Computational Complexity, Revision 1 of Report No. 26 (2013) Arithmetic circuits: A chasm at depth three four Ankit Gupta Microsoft Research India t-ankitg@microsoft.com Neeraj
More informationTensor-Rank and Lower Bounds for Arithmetic Formulas
Tensor-Rank and Lower Bounds for Arithmetic Formulas Ran Raz Weizmann Institute Abstract We show that any explicit example for a tensor A : [n] r F with tensor-rank n r (1 o(1)), where r = r(n) log n/
More informationPermanent and Determinant
Permanent and Determinant non-identical twins Avi Wigderson IAS, Princeton Meet the twins F field, char(f) 2. X M n (F) matrix of variables X ij Det n (X) = σ Sn sgn(σ) i [n] X iσ(i) Per n (X) = σ Sn i
More informationRandomness. What next?
Randomness What next? Random Walk Attribution These slides were prepared for the New Jersey Governor s School course The Math Behind the Machine taught in the summer of 2012 by Grant Schoenebeck Large
More informationMulti-Linear Formulas for Permanent and Determinant are of Super-Polynomial Size
Multi-Linear Formulas for Permanent and Determinant are of Super-Polynomial Size Ran Raz Weizmann Institute ranraz@wisdom.weizmann.ac.il Abstract An arithmetic formula is multi-linear if the polynomial
More informationOn the Fourier spectrum of symmetric Boolean functions
On the Fourier spectrum of symmetric Boolean functions Amir Shpilka Technion and MSR NE Based on joint work with Avishay Tal 1 Theme: Analysis of Boolean functions Pick favorite representation: Fourier
More informationHARDNESS-RANDOMNESS TRADEOFFS FOR BOUNDED DEPTH ARITHMETIC CIRCUITS
SIAM J. COMPUT. Vol. 39, No. 4, pp. 1279 1293 c 2009 Society for Industrial and Applied Mathematics HARDNESS-RANDOMNESS TRADEOFFS FOR BOUNDED DEPTH ARITHMETIC CIRCUITS ZEEV DVIR, AMIR SHPILKA, AND AMIR
More informationArithmetic Circuits: A Chasm at Depth Four
Arithmetic Circuits: A Chasm at Depth Four Manindra Agrawal Indian Institute of Technology, Kanpur V Vinay Geodesic Information Systems Ltd, Bangalore, and Chennai Mathematical Institute, Chennai August
More informationOn the Structure and Complexity of Symbolic Proofs of Polynomial Identities
On the Structure and Complexity of Symbolic Proofs of Polynomial Identities Iddo Tzameret Tel Aviv University, Tel Aviv 69978, Israel Abstract A symbolic proof for establishing that a given arithmetic
More informationArithmetic circuits: A chasm at depth three
Electronic Colloquium on Computational Complexity, Report No. 26 (2013) Arithmetic circuits: A chasm at depth three four Ankit Gupta Microsoft Research India t-ankitg@microsoft.com Neeraj Kayal Microsoft
More informationMeta-Algorithms vs. Circuit Lower Bounds Valentine Kabanets
Meta-Algorithms vs. Circuit Lower Bounds Valentine Kabanets Tokyo Institute of Technology & Simon Fraser University Understanding Efficiency Better understanding of Efficient Computation Good Algorithms
More informationThe Power of Depth 2 Circuits over Algebras
The Power of Depth 2 Circuits over Algebras Chandan Saha, Ramprasad Saptharishi 2 and Nitin Saxena 3 Indian Institute of Technology, Kanpur 20806, India csaha@iitk.ac.in 2 Chennai Mathematical Institute,
More informationAsymptotically Optimal Hitting Sets Against Polynomials
Asymptotically Optimal Hitting Sets Against Polynomials Markus Bläser 1, Moritz Hardt 2, and David Steurer 2 1 Saarland University, Saarbrücken, Germany 2 Princeton University, Princeton, NJ Abstract.
More informationarxiv: v1 [cs.cc] 14 Nov 2010
Blackbox identity testing for bounded top fanin depth-3 circuits: the field doesn t matter Nitin Saxena Hausdorff Center for Mathematics Bonn, Germany ns@hcm.uni-bonn.de C. Seshadhri Sandia National Laboratories
More informationTensor-Rank and Lower Bounds for Arithmetic Formulas
Electronic Colloquium on Computational Complexity, Report No. 2 (2010) Tensor-Rank and Lower Bounds for Arithmetic Formulas Ran Raz Weizmann Institute Abstract We show that any explicit example for a tensor
More informationFull text available at: Arithmetic Circuits: A Survey of Recent Results and Open Questions
Arithmetic Circuits: A Survey of Recent Results and Open Questions Arithmetic Circuits: A Survey of Recent Results and Open Questions Amir Shpilka Faculty of Computer Science Technion, Haifa 32000 Israel
More informationALGEBRAIC PROOFS OVER NONCOMMUTATIVE FORMULAS
Electronic Colloquium on Computational Complexity, Report No. 97 (2010) ALGEBRAIC PROOFS OVER NONCOMMUTATIVE FORMULAS IDDO TZAMERET Abstract. We study possible formulations of algebraic propositional proof
More informationEnumeration: logical and algebraic approach
Enumeration: logical and algebraic approach Yann Strozecki Université Paris Sud - Paris 11 Novembre 2011, séminaire ALGO/LIX Introduction to Enumeration Enumeration and logic Enumeration and polynomials
More information1 Reductions from Maximum Matchings to Perfect Matchings
15-451/651: Design & Analysis of Algorithms November 21, 2013 Lecture #26 last changed: December 3, 2013 When we first studied network flows, we saw how to find maximum cardinality matchings in bipartite
More informationSylvester-Gallai type theorems for quadratic polynomials
Sylvester-Gallai type theorems for quadratic polynomials Amir Shpilka* Abstract We prove Sylvester-Gallai type theorems for quadratic polynomials. Specifically, we prove that if a finite collection Q,
More informationITCS:CCT09 : Computational Complexity Theory Apr 8, Lecture 7
ITCS:CCT09 : Computational Complexity Theory Apr 8, 2009 Lecturer: Jayalal Sarma M.N. Lecture 7 Scribe: Shiteng Chen In this lecture, we will discuss one of the basic concepts in complexity theory; namely
More informationLinear Projections of the Vandermonde Polynomial
Linear Projections of the Vandermonde Polynomial C. Ramya B. V. Raghavendra Rao Department of Computer Science and Engineering IIT Madras, Chennai, INDIA {ramya,bvrr}@cse.iitm.ac.in arxiv:1705.03188v1
More informationA Lower Bound for the Size of Syntactically Multilinear Arithmetic Circuits
A Lower Bound for the Size of Syntactically Multilinear Arithmetic Circuits Ran Raz Amir Shpilka Amir Yehudayoff Abstract We construct an explicit polynomial f(x 1,..., x n ), with coefficients in {0,
More informationKernel-Size Lower Bounds. The Evidence from Complexity Theory
: The Evidence from Complexity Theory IAS Worker 2013, Warsaw Part 2/3 Note These slides are a slightly revised version of a 3-part tutorial given at the 2013 Workshop on Kernelization ( Worker ) at the
More informationModern Cryptography Lecture 4
Modern Cryptography Lecture 4 Pseudorandom Functions Block-Ciphers Modes of Operation Chosen-Ciphertext Security 1 October 30th, 2018 2 Webpage Page for first part, Homeworks, Slides http://pub.ist.ac.at/crypto/moderncrypto18.html
More informationUmans Complexity Theory Lectures
Complexity Theory Umans Complexity Theory Lectures Lecture 1a: Problems and Languages Classify problems according to the computational resources required running time storage space parallelism randomness
More information20.1 2SAT. CS125 Lecture 20 Fall 2016
CS125 Lecture 20 Fall 2016 20.1 2SAT We show yet another possible way to solve the 2SAT problem. Recall that the input to 2SAT is a logical expression that is the conunction (AND) of a set of clauses,
More informationRead-Once Polynomial Identity Testing
Read-Once Polynomial Identity Testing Amir Shpilka Ilya Volkovich Abstract An arithmetic read-once formula (ROF for short) is a formula (a circuit whose underlying graph is a tree) in which the operations
More information6.080 / Great Ideas in Theoretical Computer Science Spring 2008
MIT OpenCourseWare http://ocw.mit.edu 6.080 / 6.089 Great Ideas in Theoretical Computer Science Spring 2008 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.
More informationLecture 7: More Arithmetic and Fun With Primes
IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Advanced Course on Computational Complexity Lecture 7: More Arithmetic and Fun With Primes David Mix Barrington and Alexis Maciel July
More information6.842 Randomness and Computation Lecture 5
6.842 Randomness and Computation 2012-02-22 Lecture 5 Lecturer: Ronitt Rubinfeld Scribe: Michael Forbes 1 Overview Today we will define the notion of a pairwise independent hash function, and discuss its
More informationconp = { L L NP } (1) This problem is essentially the same as SAT because a formula is not satisfiable if and only if its negation is a tautology.
1 conp and good characterizations In these lecture notes we discuss a complexity class called conp and its relationship to P and NP. This discussion will lead to an interesting notion of good characterizations
More informationDiagonal Circuit Identity Testing and Lower Bounds
Diagonal Circuit Identity Testing and Lower Bounds Nitin Saxena Hausdorff Center for Mathematics Endenicher Allee 60 D-53115 Bonn, Germany ns@hcm.uni-bonn.de Abstract. In this paper we give the first deterministic
More informationFaster Satisfiability Algorithms for Systems of Polynomial Equations over Finite Fields and ACC^0[p]
Faster Satisfiability Algorithms for Systems of Polynomial Equations over Finite Fields and ACC^0[p] Suguru TAMAKI Kyoto University Joint work with: Daniel Lokshtanov, Ramamohan Paturi, Ryan Williams Satisfiability
More informationFull text available at: Partial Derivatives in Arithmetic Complexity and Beyond
Partial Derivatives in Arithmetic Complexity and Beyond Partial Derivatives in Arithmetic Complexity and Beyond Xi Chen Columbia University USA xichen@cs.columbia.edu Neeraj Kayal Microsoft Research India
More informationLOCALLY DECODABLE CODES WITH TWO QUERIES AND POLYNOMIAL IDENTITY TESTING FOR DEPTH 3 CIRCUITS
SIAM J. COMPUT. Vol. 36, No. 5, pp. 1404 1434 c 2007 Society for Industrial and Applied Mathematics LOCALLY DECODABLE CODES WITH TWO QUERIES AND POLYNOMIAL IDENTITY TESTING FOR DEPTH 3 CIRCUITS ZEEV DVIR
More information1 Randomized Computation
CS 6743 Lecture 17 1 Fall 2007 1 Randomized Computation Why is randomness useful? Imagine you have a stack of bank notes, with very few counterfeit ones. You want to choose a genuine bank note to pay at
More informationAlgebraic Proof Complexity: Progress, Frontiers and Challenges
Algebraic Proof Complexity: Progress, Frontiers and Challenges Toniann Pitassi Iddo Tzameret July 1, 2016 Abstract We survey recent progress in the proof complexity of strong proof systems and its connection
More informationLecture 23: Introduction to Quantum Complexity Theory 1 REVIEW: CLASSICAL COMPLEXITY THEORY
Quantum Computation (CMU 18-859BB, Fall 2015) Lecture 23: Introduction to Quantum Complexity Theory November 31, 2015 Lecturer: Ryan O Donnell Scribe: Will Griffin 1 REVIEW: CLASSICAL COMPLEXITY THEORY
More informationThe GCT chasm I. Ketan D. Mulmuley. The University of Chicago. The GCT chasm I p. 1
The GCT chasm I p. 1 The GCT chasm I Ketan D. Mulmuley The University of Chicago The GCT chasm I p. 2 The main reference GCT5 [M.]: Geometric Complexity Theory V: Equivalence between black-box derandomization
More informationThe knapsack Problem
There is a set of n items. The knapsack Problem Item i has value v i Z + and weight w i Z +. We are given K Z + and W Z +. knapsack asks if there exists a subset S {1, 2,..., n} such that i S w i W and
More informationPartial Derivatives in Arithmetic Complexity and Beyond. Contents
Foundations and Trends R in Theoretical Computer Science Vol. 6, Nos. 1 2 (2010) 1 138 c 2011 X. Chen, N. Kayal and A. Wigderson DOI: 10.1561/0400000043 Partial Derivatives in Arithmetic Complexity and
More informationProgress on Polynomial Identity Testing
Electronic Colloquium on Computational Complexity, Report No. 101 (2009) Progress on Polynomial Identity Testing Nitin Saxena Abstract Polynomial identity testing (PIT) is the problem of checking whether
More informationPartial Derivatives in Arithmetic Complexity (and beyond)
R Foundations and Trends char in sample Vol. xx, No xx (xxxx) 1 137 char c xxxx xxxxxxxxx DOI: xxxxxx Partial Derivatives in Arithmetic Complexity (and beyond) Xi Chen 1, Neeraj Kayal 2 and Avi Wigderson
More informationLecture 22: Counting
CS 710: Complexity Theory 4/8/2010 Lecture 22: Counting Instructor: Dieter van Melkebeek Scribe: Phil Rydzewski & Chi Man Liu Last time we introduced extractors and discussed two methods to construct them.
More informationPRIMES is in P. Manindra Agrawal. NUS Singapore / IIT Kanpur
PRIMES is in P Manindra Agrawal NUS Singapore / IIT Kanpur The Problem Given number n, test if it is prime efficiently. Efficiently = in time a polynomial in number of digits = (log n) c for some constant
More informationThe Strength of Multilinear Proofs
The Strength of Multilinear Proofs Ran Raz Iddo Tzameret December 19, 2006 Abstract We introduce an algebraic proof system that manipulates multilinear arithmetic formulas. We show that this proof system
More informationGroups, Rings, and Finite Fields. Andreas Klappenecker. September 12, 2002
Background on Groups, Rings, and Finite Fields Andreas Klappenecker September 12, 2002 A thorough understanding of the Agrawal, Kayal, and Saxena primality test requires some tools from algebra and elementary
More informationA Polynomial Time Deterministic Algorithm for Identity Testing Read-Once Polynomials
A Polynomial Time Deterministic Algorithm for Identity Testing Read-Once Polynomials Daniel Minahan Ilya Volkovich August 15, 2016 Abstract The polynomial identity testing problem, or PIT, asks how we
More informationComplete problems for classes in PH, The Polynomial-Time Hierarchy (PH) oracle is like a subroutine, or function in
Oracle Turing Machines Nondeterministic OTM defined in the same way (transition relation, rather than function) oracle is like a subroutine, or function in your favorite PL but each call counts as single
More informationLecture 6: Deterministic Primality Testing
Lecture 6: Deterministic Primality Testing Topics in Pseudorandomness and Complexity (Spring 018) Rutgers University Swastik Kopparty Scribe: Justin Semonsen, Nikolas Melissaris 1 Introduction The AKS
More information6.045: Automata, Computability, and Complexity (GITCS) Class 17 Nancy Lynch
6.045: Automata, Computability, and Complexity (GITCS) Class 17 Nancy Lynch Today Probabilistic Turing Machines and Probabilistic Time Complexity Classes Now add a new capability to standard TMs: random
More informationConstant-Depth Circuits for Arithmetic in Finite Fields of Characteristic Two
Constant-Depth Circuits for Arithmetic in Finite Fields of Characteristic Two Alexander Healy Emanuele Viola August 8, 2005 Abstract We study the complexity of arithmetic in finite fields of characteristic
More informationComplexity Theory of Polynomial-Time Problems
Complexity Theory of Polynomial-Time Problems Lecture 11: Nondeterministic SETH Karl Bringmann Complexity Inside P SAT 2 n 3SUM n 2 OV n 2 Colinearity n 2 3SUM-hard APSP n 3 APSP equivalent Radius n 3
More informationLecture 6: Finite Fields
CCS Discrete Math I Professor: Padraic Bartlett Lecture 6: Finite Fields Week 6 UCSB 2014 It ain t what they call you, it s what you answer to. W. C. Fields 1 Fields In the next two weeks, we re going
More informationconp, Oracles, Space Complexity
conp, Oracles, Space Complexity 1 What s next? A few possibilities CS161 Design and Analysis of Algorithms CS254 Complexity Theory (next year) CS354 Topics in Circuit Complexity For your favorite course
More informationA Local-Global Principle for Diophantine Equations
A Local-Global Principle for Diophantine Equations (Extended Abstract) Richard J. Lipton and Nisheeth Vishnoi {rjl,nkv}@cc.gatech.edu Georgia Institute of Technology, Atlanta, GA 30332, USA. Abstract.
More informationCryptography: The Landscape, Fundamental Primitives, and Security. David Brumley Carnegie Mellon University
Cryptography: The Landscape, Fundamental Primitives, and Security David Brumley dbrumley@cmu.edu Carnegie Mellon University The Landscape Jargon in Cryptography 2 Good News: OTP has perfect secrecy Thm:
More informationLinear-algebraic pseudorandomness: Subspace Designs & Dimension Expanders
Linear-algebraic pseudorandomness: Subspace Designs & Dimension Expanders Venkatesan Guruswami Carnegie Mellon University Simons workshop on Proving and Using Pseudorandomness March 8, 2017 Based on a
More informationMATH 115, SUMMER 2012 LECTURE 12
MATH 115, SUMMER 2012 LECTURE 12 JAMES MCIVOR - last time - we used hensel s lemma to go from roots of polynomial equations mod p to roots mod p 2, mod p 3, etc. - from there we can use CRT to construct
More informationWEAKENING ASSUMPTIONS FOR DETERMINISTIC SUBEXPONENTIAL TIME NON-SINGULAR MATRIX COMPLETION MAURICE JANSEN
Symposium on Theoretical Aspects of Computer Science 2010 (Nancy, France), pp. 465-476 www.stacs-conf.org WEAKENING ASSUMPTIONS FOR DETERMINISTIC SUBEXPONENTIAL TIME NON-SINGULAR MATRIX COMPLETION MAURICE
More informationComplexity Theory of Polynomial-Time Problems
Complexity Theory of Polynomial-Time Problems Lecture 3: The polynomial method Part I: Orthogonal Vectors Sebastian Krinninger Organization of lecture No lecture on 26.05. (State holiday) 2 nd exercise
More informationA sequence is k-automatic if its n th term is generated by a finite state machine with n in base k as the input.
A sequence is k-automatic if its n th term is generated by a finite state machine with n in base k as the input. 1 Examples of automatic sequences The Thue-Morse sequence 011010011001011010010 This sequence
More informationThe P versus NP Problem. Ker-I Ko. Stony Brook, New York
The P versus NP Problem Ker-I Ko Stony Brook, New York ? P = NP One of the seven Millenium Problems The youngest one A folklore question? Has hundreds of equivalent forms Informal Definitions P : Computational
More informationDeterminant Versus Permanent
Determinant Versus Permanent Manindra Agrawal Abstract. We study the problem of expressing permanent of matrices as determinant of (possibly larger) matrices. This problem has close connections with complexity
More informationQUASI-POLYNOMIAL HITTING-SET FOR SET-DEPTH- FORMULAS
Electronic Colloquium on Computational Complexity, Report No. 113 (2012) QUAI-POLYNOMIAL HITTING-ET FOR ET-DEPTH- FORMULA MANINDRA AGRAWAL, CHANDAN AHA, AND NITIN AXENA Abstract. We call a depth-4 formula
More informationCharacterizing Propositional Proofs as Non-Commutative Formulas
Characterizing Propositional Proofs as Non-Commutative Formulas Fu Li Iddo Tzameret Zhengyu Wang Abstract Does every Boolean tautology have a short propositional-calculus proof? Here, a propositionalcalculus
More informationApplied Cryptography and Computer Security CSE 664 Spring 2018
Applied Cryptography and Computer Security Lecture 12: Introduction to Number Theory II Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline This time we ll finish the
More informationLecture 23: Alternation vs. Counting
CS 710: Complexity Theory 4/13/010 Lecture 3: Alternation vs. Counting Instructor: Dieter van Melkebeek Scribe: Jeff Kinne & Mushfeq Khan We introduced counting complexity classes in the previous lecture
More informationLecture 19: Finish NP-Completeness, conp and Friends
6.045 Lecture 19: Finish NP-Completeness, conp and Friends 1 Polynomial Time Reducibility f : Σ* Σ* is a polynomial time computable function if there is a poly-time Turing machine M that on every input
More informationSeparating multilinear branching programs and formulas
Separating multilinear branching programs and formulas Zeev Dvir Guillaume Malod Sylvain Perifel Amir Yehudayoff Abstract This work deals with the power of linear algebra in the context of multilinear
More informationGreat Theoretical Ideas in Computer Science
15-251 Great Theoretical Ideas in Computer Science Polynomials, Lagrange, and Error-correction Lecture 23 (November 10, 2009) P(X) = X 3 X 2 + + X 1 + Definition: Recall: Fields A field F is a set together
More informationImproved Polynomial Identity Testing for Read-Once Formulas
Improved Polynomial Identity Testing for Read-Once Formulas Amir Shpilka Ilya Volkovich Abstract An arithmetic read-once formula (ROF for short) is a formula (a circuit whose underlying graph is a tree)
More informationCHAPTER 3 FUNDAMENTALS OF COMPUTATIONAL COMPLEXITY. E. Amaldi Foundations of Operations Research Politecnico di Milano 1
CHAPTER 3 FUNDAMENTALS OF COMPUTATIONAL COMPLEXITY E. Amaldi Foundations of Operations Research Politecnico di Milano 1 Goal: Evaluate the computational requirements (this course s focus: time) to solve
More information