Ben Lee Volk. Joint with. Michael A. Forbes Amir Shpilka

Size: px
Start display at page:

Download "Ben Lee Volk. Joint with. Michael A. Forbes Amir Shpilka"

Transcription

1 Ben Lee Volk Joint with Michael A. Forbes Amir Shpilka

2 Ben Lee Volk Joint with Michael A. Forbes Amir Shpilka

3 (One) Answer: natural proofs barrier [Razborov-Rudich]:

4 (One) Answer: natural proofs barrier [Razborov-Rudich]: A computationally-bounded observer cannot distinguish between the truth table of a random function with small circuit and that of a truly random function (assuming some crypto). So every lower bound proof attempt which yields such an algorithm cannot work.

5 (One) Answer: natural proofs barrier [Razborov-Rudich]: A computationally-bounded observer cannot distinguish between the truth table of a random function with small circuit and that of a truly random function (assuming some crypto). So every lower bound proof attempt which yields such an algorithm cannot work.

6 Def: A property S of boolean functions is natural if it is:

7 Def: A property S of boolean functions is natural if it is: 1. Useful: if f has S then f doesn t have a small ckt.

8 Def: A property S of boolean functions is natural if it is: 1. Useful: if f has S then f doesn t have a small ckt. 2. Large: random functions have S with large probability.

9 Def: A property S of boolean functions is natural if it is: 1. Useful: if f has S then f doesn t have a small ckt. 2. Large: random functions have S with large probability. 3. Constructive: Given truth table of f of size N = 2 n, there is an algorithm for deciding whether f S with running time poly(n) = 2 O(n).

10 Def: A property S of boolean functions is natural if it is: 1. Useful: if f has S then f doesn t have a small ckt. 2. Large: random functions have S with large probability. 3. Constructive: Given truth table of f of size N = 2 n, there is an algorithm for deciding whether f S with running time poly(n) = 2 O(n). natural proof: a lower bound proof which exhibits a natural property.

11 Def: A property S of boolean functions is natural if it is: 1. Useful: if f has S then f doesn t have a small ckt. 2. Large: random functions have S with large probability. 3. Constructive: Given truth table of f of size N = 2 n, there is an algorithm for deciding whether f S with running time poly(n) = 2 O(n). natural proof: a lower bound proof which exhibits a natural property. [Razborov-Rudich]: Most known lower bounds are natural and if there s a pseudorandom function in then no natural lower bound against.

12 f (x 1, x 2, x 3 ) [x 1, x 2, x 3 ] x 1 x 2 x 3 1

13 ...are also pretty hard.

14 ...are also pretty hard. We can prove lower bounds for restricted models, but all lower bounds eventually also apply to polynomials we think of as easy.

15 ...are also pretty hard. We can prove lower bounds for restricted models, but all lower bounds eventually also apply to polynomials we think of as easy. Most lower bounds seem natural, but unclear whether there are pseudorandom functions computed by low-degree algebraic circuits.

16 ...are also pretty hard. We can prove lower bounds for restricted models, but all lower bounds eventually also apply to polynomials we think of as easy. Most lower bounds seem natural, but unclear whether there are pseudorandom functions computed by low-degree algebraic circuits. (and even if not, maybe there are such functions that are only secure against algebraic circuits?)

17 ...are also pretty hard. We can prove lower bounds for restricted models, but all lower bounds eventually also apply to polynomials we think of as easy. Most lower bounds seem natural, but unclear whether there are pseudorandom functions computed by low-degree algebraic circuits. (and even if not, maybe there are such functions that are only secure against algebraic circuits?) Can we identify formal barriers?

18 ...are also pretty hard. We can prove lower bounds for restricted models, but all lower bounds eventually also apply to polynomials we think of as easy. Most lower bounds seem natural, but unclear whether there are pseudorandom functions computed by low-degree algebraic circuits. (and even if not, maybe there are such functions that are only secure against algebraic circuits?) Can we identify formal barriers? (also asked by [Aaronson-Drucker] and [Grochow])

19 Many lower bounds for restricted models of algebraic circuits have this form:

20 Many lower bounds for restricted models of algebraic circuits have this form: 1. given f, construct some matrix M f whose entries are coefficients of f.

21 Many lower bounds for restricted models of algebraic circuits have this form: 1. given f, construct some matrix M f whose entries are coefficients of f. 2. argue that if f is computed by a small ckt, rank(m f ) = small.

22 Many lower bounds for restricted models of algebraic circuits have this form: 1. given f, construct some matrix M f whose entries are coefficients of f. 2. argue that if f is computed by a small ckt, rank(m f ) = small. 3. show some explicit f 0 with rank(m f0 ) = large.

23 Many lower bounds for restricted models of algebraic circuits have this form: 1. given f, construct some matrix M f whose entries are coefficients of f. 2. argue that if f is computed by a small ckt, rank(m f ) = small. 3. show some explicit f 0 with rank(m f0 ) = large. (examples: evaluation dimension, partial derivatives, shifted partial derivatives,...)

24 Many lower bounds for restricted models of algebraic circuits have this form: 1. given f, construct some matrix M f whose entries are coefficients of f. 2. argue that if f is computed by a small ckt, rank(m f ) = small. 3. show some explicit f 0 with rank(m f0 ) = large. (examples: evaluation dimension, partial derivatives, shifted partial derivatives,...) equivalently: for some r r submatrix, det(m ) 0, while f 0 det(m ) = 0 for all simple f. f

25 Many lower bounds for restricted models of algebraic circuits have this form: 1. given f, construct some matrix M f whose entries are coefficients of f. 2. argue that if f is computed by a small ckt, rank(m f ) = small. 3. show some explicit f 0 with rank(m f0 ) = large. (examples: evaluation dimension, partial derivatives, shifted partial derivatives,...) equivalently: for some r r submatrix, det(m ) 0, while f 0 det(m ) = 0 for all simple f. f Thus, the property {g : det(m g ) 0} is useful, constructive (determinant is efficiently computable) and large.

26 Def: A (distinguisher) polynomial D 0 is an algebraic natural proof against a class if

27 Def: A (distinguisher) polynomial D 0 is an algebraic natural proof against a class if 1. (Usefulness) D(coeff(f )) = 0 for all f

28 Def: A (distinguisher) polynomial D 0 is an algebraic natural proof against a class if 1. (Usefulness) D(coeff(f )) = 0 for all f 2. (Constructiveness) D has a small algebraic circuit

29 Def: A (distinguisher) polynomial D 0 is an algebraic natural proof against a class if 1. (Usefulness) D(coeff(f )) = 0 for all f 2. (Constructiveness) D has a small algebraic circuit (largeness comes for free)

30 Def: A (distinguisher) polynomial D 0 is an algebraic natural proof against a class if 1. (Usefulness) D(coeff(f )) = 0 for all f 2. (Constructiveness) D has a small algebraic circuit (largeness comes for free) Important: D is an N-variate polynomial for N = n+d d (if we deal with n-variate degree d polynomials) or N = 2 n (if we deal with multilinear polynomials)

31 Def: A (distinguisher) polynomial D 0 is an algebraic natural proof against a class if 1. (Usefulness) D(coeff(f )) = 0 for all f 2. (Constructiveness) D has a small algebraic circuit (largeness comes for free) Important: D is an N-variate polynomial for N = n+d d (if we deal with n-variate degree d polynomials) or N = 2 n (if we deal with multilinear polynomials) Toy example: is the class of perfect squares among polynomials of the form ax 2 + bx + c, and D(a, b, c) = b 2 4ac.

32 Def: A (distinguisher) polynomial D 0 is an algebraic natural proof against a class if 1. (Usefulness) D(coeff(f )) = 0 for all f 2. (Constructiveness) D has a small algebraic circuit (largeness comes for free) Important: D is an N-variate polynomial for N = n+d d (if we deal with n-variate degree d polynomials) or N = 2 n (if we deal with multilinear polynomials) Toy example: is the class of perfect squares among polynomials of the form ax 2 + bx + c, and D(a, b, c) = b 2 4ac. [Grochow]: almost all known lower bounds can be cast in this form.

33 [Mulmuley-Sohoni]

34 [Mulmuley-Sohoni] VP per VP det

35 [Mulmuley-Sohoni] VP per VP det VP is a zero set of a set of polynomials. What is the complexity of?

36 Given an algebraic circuit C, decide deterministically whether C computes the zero polynomial.

37 Given an algebraic circuit C, decide deterministically whether C computes the zero polynomial. Black-box: compute a hitting set, i.e., a set such that for every C there is α such that C(α) 0.

38 Given an algebraic circuit C, decide deterministically whether C computes the zero polynomial. Black-box: compute a hitting set, i.e., a set such that for every C there is α such that C(α) 0. Suppose D is a distinguisher for a class. Then D 0, and yet D(coeff(f )) = 0 for all f.

39 Given an algebraic circuit C, decide deterministically whether C computes the zero polynomial. Black-box: compute a hitting set, i.e., a set such that for every C there is α such that C(α) 0. Suppose D is a distinguisher for a class. Then D 0, and yet D(coeff(f )) = 0 for all f. = {coeff(f ) : f } is not a hitting set for D.

40 Given an algebraic circuit C, decide deterministically whether C computes the zero polynomial. Black-box: compute a hitting set, i.e., a set such that for every C there is α such that C(α) 0. Suppose D is a distinguisher for a class. Then D 0, and yet D(coeff(f )) = 0 for all f. = {coeff(f ) : f } is not a hitting set for D. In other words: if {coeff(f ) : f } is a hitting set for a class, then no natural proof for with the distinguisher coming from.

41 Def: Let [x 1,..., x n ] be a class of degree d polynomials, and [X 1,..., X N ] for N = n+d d. is a succinct hitting set for if := {coeff(f ) : f } is a hitting set for.

42 Def: Let [x 1,..., x n ] be a class of degree d polynomials, and [X 1,..., X N ] for N = n+d d. is a succinct hitting set for if := {coeff(f ) : f } is a hitting set for. Thm: If is a succinct hitting set for, no algebraically natural proof against with the distinguisher coming from.

43 Def: Let [x 1,..., x n ] be a class of degree d polynomials, and [X 1,..., X N ] for N = n+d d. is a succinct hitting set for if := {coeff(f ) : f } is a hitting set for. Thm: If is a succinct hitting set for, no algebraically natural proof against with the distinguisher coming from. Proof: If D is non-zero then D does not vanish on.

44 Def: Let [x 1,..., x n ] be a class of degree d polynomials, and [X 1,..., X N ] for N = n+d d. is a succinct hitting set for if := {coeff(f ) : f } is a hitting set for. Thm: If is a succinct hitting set for, no algebraically natural proof against with the distinguisher coming from. Proof: If D is non-zero then D does not vanish on. (also observed independently by [Grochow-Kumar-Saraf-Saks])

45 Def: Let [x 1,..., x n ] be a class of degree d polynomials, and [X 1,..., X N ] for N = n+d d. is a succinct hitting set for if := {coeff(f ) : f } is a hitting set for. Thm: If is a succinct hitting set for, no algebraically natural proof against with the distinguisher coming from. Proof: If D is non-zero then D does not vanish on. (also observed independently by [Grochow-Kumar-Saraf-Saks]) Question: are poly(n) size and poly(n) degree circuits a hitting sets for poly(n) size and poly(n) degree circuits? ( does VP hit VP? )

46 Let = {coeff(f ) : f VP(n)}. If is a hitting set for VP(N) then there are no VP-algebraic natural proofs against VP.

47 Let = {coeff(f ) : f VP(n)}. If is a hitting set for VP(N) then there are no VP-algebraic natural proofs against VP.

48 Let = {coeff(f ) : f VP(n)}. If is a hitting set for VP(N) then there are no VP-algebraic natural proofs against VP. (note: may a-priori be infinite but we ll soon see that this actually implies there exists some small )

49 Def: A polynomial map : l N is a generator for a class if for every non-zero F, F( (y)) 0.

50 Def: A polynomial map : l N is a generator for a class if for every non-zero F, F( (y)) 0. (want: deg poly(n), l as small as possible)

51 Def: A polynomial map : l N is a generator for a class if for every non-zero F, F( (y)) 0. (want: deg poly(n), l as small as possible) generators hitting sets

52 Def: A polynomial map : l N is a generator for a class if for every non-zero F, F( (y)) 0. (want: deg poly(n), l as small as possible) generators hitting sets ( = : evaluate. = : interpolate.)

53 Def: A polynomial map : l N is a generator for a class if for every non-zero F, F( (y)) 0. (want: deg poly(n), l as small as possible) generators hitting sets ( = : evaluate. = : interpolate.) succinct hitting sets =?

54 Def: A polynomial G(x, y) is a -succinct generator for if:

55 Def: A polynomial G(x, y) is a -succinct generator for if: 1. For every α, G(x, α).

56 Def: A polynomial G(x, y) is a -succinct generator for if: 1. For every α, G(x, α). 2. The polynomial map = coeff x (G(x, y)) is a generator for.

57 Def: A polynomial G(x, y) is a -succinct generator for if: 1. For every α, G(x, α). 2. The polynomial map = coeff x (G(x, y)) is a generator for. G(x, y) = 1 (y 1 + y 2 ) + x 1 (y 1 y 3 2 ) + x 2 (y y 2) + x 1 x 2 1 (y) = (y 1 + y 2, y 1 y 3 2, y2 1 + y 2, 1)

58 Def: A polynomial G(x, y) is a -succinct generator for if: 1. For every α, G(x, α). 2. The polynomial map = coeff x (G(x, y)) is a generator for. G(x, y) = 1 (y 1 + y 2 ) + x 1 (y 1 y 3 2 ) + x 2 (y y 2) + x 1 x 2 1 (y) = (y 1 + y 2, y 1 y 3 2, y2 1 + y 2, 1) {G(x, α) : α l } is a -succinct hitting set against. So succinct generator = succinct hitting set (and even a uniform one).

59 Def: A polynomial G(x, y) is a -succinct generator for if: 1. For every α, G(x, α). 2. The polynomial map = coeff x (G(x, y)) is a generator for. Aside: why not just require G(x, y)?

60 Def: A polynomial G(x, y) is a -succinct generator for if: 1. For every α, G(x, α). 2. The polynomial map = coeff x (G(x, y)) is a generator for. Aside: why not just require G(x, y)? We can, but 1. unnecessary for succinct hitting sets which imply barriers 2. G(x, α) might be in even smaller class (e.g., if y has high deg)

61 Recall: succinct generator = succinct hitting sets.

62 Recall: succinct generator = succinct hitting sets. Other direction?

63 Recall: succinct generator = succinct hitting sets. Other direction? Interpolating has complexity poly( ) which is not succinct.

64 Recall: succinct generator = succinct hitting sets. Other direction? Interpolating has complexity poly( ) which is not succinct. But still true because of the existence of universal circuits.

65 Recall: succinct generator = succinct hitting sets. Other direction? Interpolating has complexity poly( ) which is not succinct. But still true because of the existence of universal circuits. In particular, if := {coeff(f ) : f VP(n)} is an (infinite) hitting set for VP(N), there is a N poly log(n) size hitting set ( is in the image of a universal circuit).

66 Conjecture: VP hits VP.

67 Conjecture: VP hits VP. How to obtain evidence to support this conjecture?

68 Conjecture: VP hits VP. How to obtain evidence to support this conjecture? Can we construct algebraic pseudorandom functions?

69 Conjecture: VP hits VP. How to obtain evidence to support this conjecture? Can we construct algebraic pseudorandom functions? [Aaronson-Drucker] s candidate: det l i, j (x) where l i, j s are random linear functions.

70 Conjecture: VP hits VP. How to obtain evidence to support this conjecture? Can we construct algebraic pseudorandom functions? [Aaronson-Drucker] s candidate: det l i, j (x) where l i, j s are random linear functions. Conjecture: this is pseudorandom (maybe only against alg ckts?)

71 Conjecture: VP hits VP. How to obtain evidence to support this conjecture? Can we construct algebraic pseudorandom functions? [Aaronson-Drucker] s candidate: det l i, j (x) where l i, j s are random linear functions. Conjecture: this is pseudorandom (maybe only against alg ckts?) Challange: establish this under some crypto hardness assumption.

72 This work: nearly all the hitting sets we know for restricted models can be made succinct.

73 This work: nearly all the hitting sets we know for restricted models can be made succinct. Thm: coefficient vectors of poly(log s, n) size multilinear formulas are hitting sets for N = 2 n variate size s:

74 This work: nearly all the hitting sets we know for restricted models can be made succinct. Thm: coefficient vectors of poly(log s, n) size multilinear formulas are hitting sets for N = 2 n variate size s: Σ k ΠΣ formulas,

75 This work: nearly all the hitting sets we know for restricted models can be made succinct. Thm: coefficient vectors of poly(log s, n) size multilinear formulas are hitting sets for N = 2 n variate size s: Σ k ΠΣ formulas, ΣΠΣ formulas of constant transcendence degree,

76 This work: nearly all the hitting sets we know for restricted models can be made succinct. Thm: coefficient vectors of poly(log s, n) size multilinear formulas are hitting sets for N = 2 n variate size s: Σ k ΠΣ formulas, ΣΠΣ formulas of constant transcendence degree, sparse polynomials,

77 This work: nearly all the hitting sets we know for restricted models can be made succinct. Thm: coefficient vectors of poly(log s, n) size multilinear formulas are hitting sets for N = 2 n variate size s: Σ k ΠΣ formulas, ΣΠΣ formulas of constant transcendence degree, sparse polynomials, Σm ΣΠ O(1) formulas,

78 This work: nearly all the hitting sets we know for restricted models can be made succinct. Thm: coefficient vectors of poly(log s, n) size multilinear formulas are hitting sets for N = 2 n variate size s: Σ k ΠΣ formulas, ΣΠΣ formulas of constant transcendence degree, sparse polynomials, Σm ΣΠ O(1) formulas, commutative roabps,

79 This work: nearly all the hitting sets we know for restricted models can be made succinct. Thm: coefficient vectors of poly(log s, n) size multilinear formulas are hitting sets for N = 2 n variate size s: Σ k ΠΣ formulas, ΣΠΣ formulas of constant transcendence degree, sparse polynomials, Σm ΣΠ O(1) formulas, commutative roabps, depth-o(1) Occur-O(1) formulas

80 This work: nearly all the hitting sets we know for restricted models can be made succinct. Thm: coefficient vectors of poly(log s, n) size multilinear formulas are hitting sets for N = 2 n variate size s: Σ k ΠΣ formulas, ΣΠΣ formulas of constant transcendence degree, sparse polynomials, Σm ΣΠ O(1) formulas, commutative roabps, depth-o(1) Occur-O(1) formulas circuits composed with sparse polynomials of transcendence degree O(1).

81 Not as succinct but still worth mentioning:

82 Not as succinct but still worth mentioning: width w 2 length-n roabps are hitting set for width-w length-n roabps (in certain variable orders).

83 Not as succinct but still worth mentioning: width w 2 length-n roabps are hitting set for width-w length-n roabps (in certain variable orders). (open: make the w 2 closer to poly log(w) and remove the restriction on ordering)

84 Not as succinct but still worth mentioning: width w 2 length-n roabps are hitting set for width-w length-n roabps (in certain variable orders). (open: make the w 2 closer to poly log(w) and remove the restriction on ordering) We can t make all known hitting sets succinct but we have some excuses (more on that later).

85 Toy example: [X 1,..., X N ] is the class of polynomials with monomials of support poly log(n).

86 Toy example: [X 1,..., X N ] is the class of polynomials with monomials of support poly log(n). Hitting set for : {v : supp(v) poly log(n) = poly(n)}.

87 Toy example: [X 1,..., X N ] is the class of polynomials with monomials of support poly log(n). Hitting set for : {v : supp(v) poly log(n) = poly(n)}. ( guess vars in small support monomials, brute-force over them)

88 Toy example: [X 1,..., X N ] is the class of polynomials with monomials of support poly log(n). Hitting set for : {v : supp(v) poly log(n) = poly(n)}. ( guess vars in small support monomials, brute-force over them) Q: Is this succinct?

89 Toy example: [X 1,..., X N ] is the class of polynomials with monomials of support poly log(n). Hitting set for : {v : supp(v) poly log(n) = poly(n)}. ( guess vars in small support monomials, brute-force over them) Q: Is this succinct? A: Yes. Each v is a coefficient vector of a poly(n) ΣΠ circuit in x 1,..., x n (only poly(n) monomials with non-zero coefficient).

90 Less-of-a-toy example: [X 1,..., X N ] is the class of polynomials of sparsity at most s.

91 Less-of-a-toy example: [X 1,..., X N ] is the class of polynomials of sparsity at most s. F doesn t necessarily contain small support monomials.

92 Less-of-a-toy example: [X 1,..., X N ] is the class of polynomials of sparsity at most s. F doesn t necessarily contain small support monomials. Exercise: if F(X) has sparsity s, F(X + 1) has non-zero monomial of support log s. [Forbes15, Gurjar-Korwar-Saxena-Theirauf16]

93 Less-of-a-toy example: [X 1,..., X N ] is the class of polynomials of sparsity at most s. F doesn t necessarily contain small support monomials. Exercise: if F(X) has sparsity s, F(X + 1) has non-zero monomial of support log s. [Forbes15, Gurjar-Korwar-Saxena-Theirauf16] Cor: {v + 1 : supp(v) poly log(s)} hitting set for.

94 Less-of-a-toy example: [X 1,..., X N ] is the class of polynomials of sparsity at most s. F doesn t necessarily contain small support monomials. Exercise: if F(X) has sparsity s, F(X + 1) has non-zero monomial of support log s. [Forbes15, Gurjar-Korwar-Saxena-Theirauf16] Cor: {v + 1 : supp(v) poly log(s)} hitting set for. Q: Is this succinct?

95 Less-of-a-toy example: [X 1,..., X N ] is the class of polynomials of sparsity at most s. F doesn t necessarily contain small support monomials. Exercise: if F(X) has sparsity s, F(X + 1) has non-zero monomial of support log s. [Forbes15, Gurjar-Korwar-Saxena-Theirauf16] Cor: {v + 1 : supp(v) poly log(s)} hitting set for. Q: Is this succinct? A: Yes. 1 is coeff vector of n i=1 (x i + 1). Now take the sum of this and the circuit from previous slide.

96 Less-of-a-toy example: [X 1,..., X N ] is the class of polynomials of sparsity at most s. F doesn t necessarily contain small support monomials. Exercise: if F(X) has sparsity s, F(X + 1) has non-zero monomial of support log s. [Forbes15, Gurjar-Korwar-Saxena-Theirauf16] Cor: {v + 1 : supp(v) poly log(s)} hitting set for. Q: Is this succinct? A: Yes. 1 is coeff vector of n i=1 (x i + 1). Now take the sum of this and the circuit from previous slide. Cor: poly(log s, n)-σπσ succinct hitting set for sparse polynomials.

97 In the paper: many other succinct generators, most of them follow from various combinations of basic constructs such as Shpilka-Volkovich generator and Gabizon-Raz s rank condenser, which we make succinct.

98 In the paper: many other succinct generators, most of them follow from various combinations of basic constructs such as Shpilka-Volkovich generator and Gabizon-Raz s rank condenser, which we make succinct. Builds on a lot of previous work: [Dvir-Shpilka, Karnin-Shpilka, Kayal-Saraf, Saxena-Seshadhri, Shpilka-Volkovich, Forbes-Shpilka, Forbes-Shpilka-Saptharishi, Beecken- Mittmann-Saxena, Agrawal-Saha-Saxena-Saptharishi,...].

99 In the paper: many other succinct generators, most of them follow from various combinations of basic constructs such as Shpilka-Volkovich generator and Gabizon-Raz s rank condenser, which we make succinct. Builds on a lot of previous work: [Dvir-Shpilka, Karnin-Shpilka, Kayal-Saraf, Saxena-Seshadhri, Shpilka-Volkovich, Forbes-Shpilka, Forbes-Shpilka-Saptharishi, Beecken- Mittmann-Saxena, Agrawal-Saha-Saxena-Saptharishi,...]. Cor: Super-polynomial lower bounds on defining equations of VP in many models.

100 conspicuously missing: Klivans-Spielman (Kronecker) generator.

101 conspicuously missing: Klivans-Spielman (Kronecker) generator. X i y ki mod p y new var, k integer and p prime chosen from sufficiently large set.

102 conspicuously missing: Klivans-Spielman (Kronecker) generator. X i y ki mod p y new var, k integer and p prime chosen from sufficiently large set. Hits sparse polynomials and very useful in other constructions.

103 conspicuously missing: Klivans-Spielman (Kronecker) generator. X i y ki mod p y new var, k integer and p prime chosen from sufficiently large set. Hits sparse polynomials and very useful in other constructions. Challenge: make it succinct, i.e., find a small circuit in {x 1,..., x n, y} such that the coefficient of x S is y kbin(s) mod p, bin(s) = integer whose binary expansion is the characteristic vector of S.

104 The generator X i y ki mod p 1 1 y ki mod p m m for m = O(log n) hits roabps (in any order) and read-once determinants (polys of the form det(m) where each entry in M contains a var or a constant and each var appears at most once) [Agrawal-Gurjar-Korwar-Saxena, Fenner-Gurjar-Thierauf, Gurjar-Thierauf]

105 The generator X i y ki mod p 1 1 y ki mod p m m for m = O(log n) hits roabps (in any order) and read-once determinants (polys of the form det(m) where each entry in M contains a var or a constant and each var appears at most once) [Agrawal-Gurjar-Korwar-Saxena, Fenner-Gurjar-Thierauf, Gurjar-Thierauf] [Raz] and [Raz-Yehudayoff] showed: small multilinear formulas are not a hitting set for read-once determinants.

106 The generator X i y ki mod p 1 1 y ki mod p m m for m = O(log n) hits roabps (in any order) and read-once determinants (polys of the form det(m) where each entry in M contains a var or a constant and each var appears at most once) [Agrawal-Gurjar-Korwar-Saxena, Fenner-Gurjar-Thierauf, Gurjar-Thierauf] [Raz] and [Raz-Yehudayoff] showed: small multilinear formulas are not a hitting set for read-once determinants. Our constructions are all small multilinear formulas, so we might need new ideas.

107 More models for which we know of hitting sets but not succinct ones:

108 More models for which we know of hitting sets but not succinct ones: roabps in any order read-k oblivious ABPs bounded-depth multilinear formulas

109 More models for which we know of hitting sets but not succinct ones: roabps in any order read-k oblivious ABPs bounded-depth multilinear formulas Also: pseudorandom polynomials? Is [Aaronson-Drucker] s construction pseudorandom?

110 More models for which we know of hitting sets but not succinct ones: roabps in any order read-k oblivious ABPs bounded-depth multilinear formulas Also: pseudorandom polynomials? Is [Aaronson-Drucker] s construction pseudorandom?

Polynomial Identity Testing

Polynomial Identity Testing Polynomial Identity Testing Amir Shpilka Technion and MSR NE Based on joint works with: Zeev Dvir, Zohar Karnin, Partha Mukhopadhyay, Ran Raz, Ilya Volkovich and Amir Yehudayoff 1 PIT Survey Oberwolfach

More information

November 17, Recent Results on. Amir Shpilka Technion. PIT Survey Oberwolfach

November 17, Recent Results on. Amir Shpilka Technion. PIT Survey Oberwolfach 1 Recent Results on Polynomial Identity Testing Amir Shpilka Technion Goal of talk Survey known results Explain proof techniques Give an interesting set of `accessible open questions 2 Talk outline Definition

More information

Deterministic identity testing for sum of read-once oblivious arithmetic branching programs

Deterministic identity testing for sum of read-once oblivious arithmetic branching programs Deterministic identity testing for sum of read-once oblivious arithmetic branching programs Rohit Gurjar, Arpita Korwar, Nitin Saxena, IIT Kanpur Thomas Thierauf Aalen University June 18, 2015 Gurjar,

More information

Polynomial Identity Testing. Amir Shpilka Technion

Polynomial Identity Testing. Amir Shpilka Technion Polynomial Identity Testing Amir Shpilka Technion 1 Goal of talk Model: Arithmetic circuits Problem: Polynomial Identity Testing Example: Depth-3 circuits Some open problems 2 Holy grail: P vs. NP Boolean

More information

Sums of products of polynomials of low-arity - lower bounds and PIT

Sums of products of polynomials of low-arity - lower bounds and PIT Sums of products of polynomials of low-arity - lower bounds and PIT Mrinal Kumar Joint work with Shubhangi Saraf Plan for the talk Plan for the talk Model of computation Plan for the talk Model of computation

More information

Deterministic identity testing of depth 4 multilinear circuits with bounded top fan-in

Deterministic identity testing of depth 4 multilinear circuits with bounded top fan-in Deterministic identity testing of depth 4 multilinear circuits with bounded top fan-in Zohar S. Karnin Partha Mukhopadhyay Amir Shpilka Ilya Volkovich November 15, 2009 Abstract We give the first sub-exponential

More information

Arithmetic Circuits with Locally Low Algebraic Rank

Arithmetic Circuits with Locally Low Algebraic Rank Arithmetic Circuits with Locally Low Algebraic Rank Mrinal Kumar 1 and Shubhangi Saraf 2 1 Department of Computer Science, Rutgers University, New Brunswick, USA mrinal.kumar@rutgers.edu 2 Department of

More information

Introduction to Arithmetic Circuit Complexity

Introduction to Arithmetic Circuit Complexity Introduction to Arithmetic Circuit Complexity Amir Shpilka Technion 1 Goal of talk Survey results in arithmetic circuit complexity! Lower Bounds! Identity Testing! Reconstruction/Interpolation/Learning!

More information

Explicit Noether Normalization for Simultaneous Conjugation via Polynomial Identity Testing

Explicit Noether Normalization for Simultaneous Conjugation via Polynomial Identity Testing Explicit Noether Normalization for Simultaneous Conjugation via Polynomial Identity Testing Michael A. Forbes Amir Shpilka March 7, 2013 Abstract Mulmuley [Mul12a] recently gave an explicit version of

More information

Reconstruction of full rank algebraic branching programs

Reconstruction of full rank algebraic branching programs Reconstruction of full rank algebraic branching programs Vineet Nair Joint work with: Neeraj Kayal, Chandan Saha, Sebastien Tavenas 1 Arithmetic circuits 2 Reconstruction problem f(x) Q[X] is an m-variate

More information

Lecture 2: January 18

Lecture 2: January 18 CS271 Randomness & Computation Spring 2018 Instructor: Alistair Sinclair Lecture 2: January 18 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They

More information

Sums of Products of Polynomials in Few Variables: Lower Bounds and Polynomial Identity Testing

Sums of Products of Polynomials in Few Variables: Lower Bounds and Polynomial Identity Testing Sums of Products of Polynomials in Few Variables: Lower Bounds and Polynomial Identity Testing Mrinal Kumar 1 and Shubhangi Saraf 2 1 Department of Computer Science, Rutgers University, New Brunswick,

More information

Classifying polynomials and identity testing

Classifying polynomials and identity testing Classifying polynomials and identity testing MANINDRA AGRAWAL 1, and RAMPRASAD SAPTHARISHI 2 1 Indian Institute of Technology, Kanpur, India. 2 Chennai Mathematical Institute, and Indian Institute of Technology,

More information

DETERMINISTIC POLYNOMIAL IDENTITY TESTS FOR MULTILINEAR BOUNDED-READ FORMULAE

DETERMINISTIC POLYNOMIAL IDENTITY TESTS FOR MULTILINEAR BOUNDED-READ FORMULAE DETERMINISTIC POLYNOMIAL IDENTITY TESTS FOR MULTILINEAR BOUNDED-READ FORMULAE Matthew Anderson, Dieter van Melkebeek, and Ilya Volkovich June 20, 2014 Abstract. We present a polynomial-time deterministic

More information

The Chasm at Depth Four, and Tensor Rank: Old results, new insights

The Chasm at Depth Four, and Tensor Rank: Old results, new insights The Chasm at Depth Four, and Tensor Rank: Old results, new insights Suryajith Chillara 1 Joint work with Mrinal Kumar, Ramprasad Saptharishi and V. Vinay June 12, 2017 1 Research partly supported by TCS

More information

Deterministically Testing Sparse Polynomial Identities of Unbounded Degree

Deterministically Testing Sparse Polynomial Identities of Unbounded Degree Deterministically Testing Sparse Polynomial Identities of Unbounded Degree Markus Bläser a Moritz Hardt b,,1 Richard J. Lipton c Nisheeth K. Vishnoi d a Saarland University, Saarbrücken, Germany. b Princeton

More information

Rank Bound for Depth-3 Identities

Rank Bound for Depth-3 Identities Rank Bound for Depth-3 Identities Nitin Saxena (Hausdorff Center for Mathematics, Bonn) Joint work with C. Seshadhri (IBM Almaden Research Center, San Jose) 1 The problem of PIT Polynomial identity testing:

More information

Testing Algebraic Independence over Finite Fields

Testing Algebraic Independence over Finite Fields Testing Algebraic Independence over Finite Fields Nitin Saxena (IIT Kanpur, India) (Joint work with Johannes Mittmann, Peter Scheiblechner) **all pictures are works of others. 2013 Contents Algebraic independence

More information

arxiv: v2 [cs.cc] 20 May 2018

arxiv: v2 [cs.cc] 20 May 2018 arxiv:1805.06692v2 [cs.cc] 20 May 2018 A Note on Polynomial Identity Testing for Depth-3 Circuits V. Arvind Abhranil Chatterjee Rajit Datta Partha Mukhopadhyay May 22, 2018 Abstract Let C be a depth-3

More information

Lower bounds for multilinear bounded order ABPs

Lower bounds for multilinear bounded order ABPs Lower bounds for multilinear bounded order ABPs C. Ramya B. V. Raghavendra Rao IIT Madras, Chennai, India {ramya,bvrr}@cse.iitm.ac.in January 15, 2019 arxiv:1901.04377v1 [cs.cc] 14 Jan 2019 Abstract Proving

More information

Deterministic Identity Testing for Sum of Read-Once Oblivious Arithmetic Branching Programs arxiv: v2 [cs.cc] 16 May 2015

Deterministic Identity Testing for Sum of Read-Once Oblivious Arithmetic Branching Programs arxiv: v2 [cs.cc] 16 May 2015 Deterministic Identity Testing for Sum of Read-Once Oblivious Arithmetic Branching Programs arxiv:1411.7341v2 [cs.cc] 16 May 2015 Rohit Gurjar 1, Arpita Korwar 1, Nitin Saxena 1 and Thomas Thierauf 2 1

More information

Finite fields, randomness and complexity. Swastik Kopparty Rutgers University

Finite fields, randomness and complexity. Swastik Kopparty Rutgers University Finite fields, randomness and complexity Swastik Kopparty Rutgers University This talk Three great problems: Polynomial factorization Epsilon-biased sets Function uncorrelated with low-degree polynomials

More information

Learning Restricted Models of Arithmetic Circuits

Learning Restricted Models of Arithmetic Circuits Learning Restricted Models of Arithmetic Circuits Adam R. Klivans Department of Computer Science University of Texas at Austin Austin, TX 78712-1188 klivans@cs.utexas.edu Amir Shpilka Faculty of Computer

More information

Polynomial Identity Testing and Lower Bounds for Sum of Special Arithmetic Branching Programs

Polynomial Identity Testing and Lower Bounds for Sum of Special Arithmetic Branching Programs Polynomial Identity Testing and Lower Bounds for Sum of Special Arithmetic Branching Programs A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy by Arpita

More information

Equivalence of Polynomial Identity Testing and Deterministic Multivariate Polynomial Factorization

Equivalence of Polynomial Identity Testing and Deterministic Multivariate Polynomial Factorization Equivalence of Polynomial Identity Testing and Deterministic Multivariate Polynomial Factorization Swastik Kopparty Shubhangi Saraf Amir Shpilka Abstract In this paper we show that the problem of deterministically

More information

NP-Complete problems

NP-Complete problems NP-Complete problems NP-complete problems (NPC): A subset of NP. If any NP-complete problem can be solved in polynomial time, then every problem in NP has a polynomial time solution. NP-complete languages

More information

Arithmetic circuits: A chasm at depth three

Arithmetic circuits: A chasm at depth three Electronic Colloquium on Computational Complexity, Revision 1 of Report No. 26 (2013) Arithmetic circuits: A chasm at depth three four Ankit Gupta Microsoft Research India t-ankitg@microsoft.com Neeraj

More information

Tensor-Rank and Lower Bounds for Arithmetic Formulas

Tensor-Rank and Lower Bounds for Arithmetic Formulas Tensor-Rank and Lower Bounds for Arithmetic Formulas Ran Raz Weizmann Institute Abstract We show that any explicit example for a tensor A : [n] r F with tensor-rank n r (1 o(1)), where r = r(n) log n/

More information

Permanent and Determinant

Permanent and Determinant Permanent and Determinant non-identical twins Avi Wigderson IAS, Princeton Meet the twins F field, char(f) 2. X M n (F) matrix of variables X ij Det n (X) = σ Sn sgn(σ) i [n] X iσ(i) Per n (X) = σ Sn i

More information

Randomness. What next?

Randomness. What next? Randomness What next? Random Walk Attribution These slides were prepared for the New Jersey Governor s School course The Math Behind the Machine taught in the summer of 2012 by Grant Schoenebeck Large

More information

Multi-Linear Formulas for Permanent and Determinant are of Super-Polynomial Size

Multi-Linear Formulas for Permanent and Determinant are of Super-Polynomial Size Multi-Linear Formulas for Permanent and Determinant are of Super-Polynomial Size Ran Raz Weizmann Institute ranraz@wisdom.weizmann.ac.il Abstract An arithmetic formula is multi-linear if the polynomial

More information

On the Fourier spectrum of symmetric Boolean functions

On the Fourier spectrum of symmetric Boolean functions On the Fourier spectrum of symmetric Boolean functions Amir Shpilka Technion and MSR NE Based on joint work with Avishay Tal 1 Theme: Analysis of Boolean functions Pick favorite representation: Fourier

More information

HARDNESS-RANDOMNESS TRADEOFFS FOR BOUNDED DEPTH ARITHMETIC CIRCUITS

HARDNESS-RANDOMNESS TRADEOFFS FOR BOUNDED DEPTH ARITHMETIC CIRCUITS SIAM J. COMPUT. Vol. 39, No. 4, pp. 1279 1293 c 2009 Society for Industrial and Applied Mathematics HARDNESS-RANDOMNESS TRADEOFFS FOR BOUNDED DEPTH ARITHMETIC CIRCUITS ZEEV DVIR, AMIR SHPILKA, AND AMIR

More information

Arithmetic Circuits: A Chasm at Depth Four

Arithmetic Circuits: A Chasm at Depth Four Arithmetic Circuits: A Chasm at Depth Four Manindra Agrawal Indian Institute of Technology, Kanpur V Vinay Geodesic Information Systems Ltd, Bangalore, and Chennai Mathematical Institute, Chennai August

More information

On the Structure and Complexity of Symbolic Proofs of Polynomial Identities

On the Structure and Complexity of Symbolic Proofs of Polynomial Identities On the Structure and Complexity of Symbolic Proofs of Polynomial Identities Iddo Tzameret Tel Aviv University, Tel Aviv 69978, Israel Abstract A symbolic proof for establishing that a given arithmetic

More information

Arithmetic circuits: A chasm at depth three

Arithmetic circuits: A chasm at depth three Electronic Colloquium on Computational Complexity, Report No. 26 (2013) Arithmetic circuits: A chasm at depth three four Ankit Gupta Microsoft Research India t-ankitg@microsoft.com Neeraj Kayal Microsoft

More information

Meta-Algorithms vs. Circuit Lower Bounds Valentine Kabanets

Meta-Algorithms vs. Circuit Lower Bounds Valentine Kabanets Meta-Algorithms vs. Circuit Lower Bounds Valentine Kabanets Tokyo Institute of Technology & Simon Fraser University Understanding Efficiency Better understanding of Efficient Computation Good Algorithms

More information

The Power of Depth 2 Circuits over Algebras

The Power of Depth 2 Circuits over Algebras The Power of Depth 2 Circuits over Algebras Chandan Saha, Ramprasad Saptharishi 2 and Nitin Saxena 3 Indian Institute of Technology, Kanpur 20806, India csaha@iitk.ac.in 2 Chennai Mathematical Institute,

More information

Asymptotically Optimal Hitting Sets Against Polynomials

Asymptotically Optimal Hitting Sets Against Polynomials Asymptotically Optimal Hitting Sets Against Polynomials Markus Bläser 1, Moritz Hardt 2, and David Steurer 2 1 Saarland University, Saarbrücken, Germany 2 Princeton University, Princeton, NJ Abstract.

More information

arxiv: v1 [cs.cc] 14 Nov 2010

arxiv: v1 [cs.cc] 14 Nov 2010 Blackbox identity testing for bounded top fanin depth-3 circuits: the field doesn t matter Nitin Saxena Hausdorff Center for Mathematics Bonn, Germany ns@hcm.uni-bonn.de C. Seshadhri Sandia National Laboratories

More information

Tensor-Rank and Lower Bounds for Arithmetic Formulas

Tensor-Rank and Lower Bounds for Arithmetic Formulas Electronic Colloquium on Computational Complexity, Report No. 2 (2010) Tensor-Rank and Lower Bounds for Arithmetic Formulas Ran Raz Weizmann Institute Abstract We show that any explicit example for a tensor

More information

Full text available at: Arithmetic Circuits: A Survey of Recent Results and Open Questions

Full text available at:   Arithmetic Circuits: A Survey of Recent Results and Open Questions Arithmetic Circuits: A Survey of Recent Results and Open Questions Arithmetic Circuits: A Survey of Recent Results and Open Questions Amir Shpilka Faculty of Computer Science Technion, Haifa 32000 Israel

More information

ALGEBRAIC PROOFS OVER NONCOMMUTATIVE FORMULAS

ALGEBRAIC PROOFS OVER NONCOMMUTATIVE FORMULAS Electronic Colloquium on Computational Complexity, Report No. 97 (2010) ALGEBRAIC PROOFS OVER NONCOMMUTATIVE FORMULAS IDDO TZAMERET Abstract. We study possible formulations of algebraic propositional proof

More information

Enumeration: logical and algebraic approach

Enumeration: logical and algebraic approach Enumeration: logical and algebraic approach Yann Strozecki Université Paris Sud - Paris 11 Novembre 2011, séminaire ALGO/LIX Introduction to Enumeration Enumeration and logic Enumeration and polynomials

More information

1 Reductions from Maximum Matchings to Perfect Matchings

1 Reductions from Maximum Matchings to Perfect Matchings 15-451/651: Design & Analysis of Algorithms November 21, 2013 Lecture #26 last changed: December 3, 2013 When we first studied network flows, we saw how to find maximum cardinality matchings in bipartite

More information

Sylvester-Gallai type theorems for quadratic polynomials

Sylvester-Gallai type theorems for quadratic polynomials Sylvester-Gallai type theorems for quadratic polynomials Amir Shpilka* Abstract We prove Sylvester-Gallai type theorems for quadratic polynomials. Specifically, we prove that if a finite collection Q,

More information

ITCS:CCT09 : Computational Complexity Theory Apr 8, Lecture 7

ITCS:CCT09 : Computational Complexity Theory Apr 8, Lecture 7 ITCS:CCT09 : Computational Complexity Theory Apr 8, 2009 Lecturer: Jayalal Sarma M.N. Lecture 7 Scribe: Shiteng Chen In this lecture, we will discuss one of the basic concepts in complexity theory; namely

More information

Linear Projections of the Vandermonde Polynomial

Linear Projections of the Vandermonde Polynomial Linear Projections of the Vandermonde Polynomial C. Ramya B. V. Raghavendra Rao Department of Computer Science and Engineering IIT Madras, Chennai, INDIA {ramya,bvrr}@cse.iitm.ac.in arxiv:1705.03188v1

More information

A Lower Bound for the Size of Syntactically Multilinear Arithmetic Circuits

A Lower Bound for the Size of Syntactically Multilinear Arithmetic Circuits A Lower Bound for the Size of Syntactically Multilinear Arithmetic Circuits Ran Raz Amir Shpilka Amir Yehudayoff Abstract We construct an explicit polynomial f(x 1,..., x n ), with coefficients in {0,

More information

Kernel-Size Lower Bounds. The Evidence from Complexity Theory

Kernel-Size Lower Bounds. The Evidence from Complexity Theory : The Evidence from Complexity Theory IAS Worker 2013, Warsaw Part 2/3 Note These slides are a slightly revised version of a 3-part tutorial given at the 2013 Workshop on Kernelization ( Worker ) at the

More information

Modern Cryptography Lecture 4

Modern Cryptography Lecture 4 Modern Cryptography Lecture 4 Pseudorandom Functions Block-Ciphers Modes of Operation Chosen-Ciphertext Security 1 October 30th, 2018 2 Webpage Page for first part, Homeworks, Slides http://pub.ist.ac.at/crypto/moderncrypto18.html

More information

Umans Complexity Theory Lectures

Umans Complexity Theory Lectures Complexity Theory Umans Complexity Theory Lectures Lecture 1a: Problems and Languages Classify problems according to the computational resources required running time storage space parallelism randomness

More information

20.1 2SAT. CS125 Lecture 20 Fall 2016

20.1 2SAT. CS125 Lecture 20 Fall 2016 CS125 Lecture 20 Fall 2016 20.1 2SAT We show yet another possible way to solve the 2SAT problem. Recall that the input to 2SAT is a logical expression that is the conunction (AND) of a set of clauses,

More information

Read-Once Polynomial Identity Testing

Read-Once Polynomial Identity Testing Read-Once Polynomial Identity Testing Amir Shpilka Ilya Volkovich Abstract An arithmetic read-once formula (ROF for short) is a formula (a circuit whose underlying graph is a tree) in which the operations

More information

6.080 / Great Ideas in Theoretical Computer Science Spring 2008

6.080 / Great Ideas in Theoretical Computer Science Spring 2008 MIT OpenCourseWare http://ocw.mit.edu 6.080 / 6.089 Great Ideas in Theoretical Computer Science Spring 2008 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.

More information

Lecture 7: More Arithmetic and Fun With Primes

Lecture 7: More Arithmetic and Fun With Primes IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Advanced Course on Computational Complexity Lecture 7: More Arithmetic and Fun With Primes David Mix Barrington and Alexis Maciel July

More information

6.842 Randomness and Computation Lecture 5

6.842 Randomness and Computation Lecture 5 6.842 Randomness and Computation 2012-02-22 Lecture 5 Lecturer: Ronitt Rubinfeld Scribe: Michael Forbes 1 Overview Today we will define the notion of a pairwise independent hash function, and discuss its

More information

conp = { L L NP } (1) This problem is essentially the same as SAT because a formula is not satisfiable if and only if its negation is a tautology.

conp = { L L NP } (1) This problem is essentially the same as SAT because a formula is not satisfiable if and only if its negation is a tautology. 1 conp and good characterizations In these lecture notes we discuss a complexity class called conp and its relationship to P and NP. This discussion will lead to an interesting notion of good characterizations

More information

Diagonal Circuit Identity Testing and Lower Bounds

Diagonal Circuit Identity Testing and Lower Bounds Diagonal Circuit Identity Testing and Lower Bounds Nitin Saxena Hausdorff Center for Mathematics Endenicher Allee 60 D-53115 Bonn, Germany ns@hcm.uni-bonn.de Abstract. In this paper we give the first deterministic

More information

Faster Satisfiability Algorithms for Systems of Polynomial Equations over Finite Fields and ACC^0[p]

Faster Satisfiability Algorithms for Systems of Polynomial Equations over Finite Fields and ACC^0[p] Faster Satisfiability Algorithms for Systems of Polynomial Equations over Finite Fields and ACC^0[p] Suguru TAMAKI Kyoto University Joint work with: Daniel Lokshtanov, Ramamohan Paturi, Ryan Williams Satisfiability

More information

Full text available at: Partial Derivatives in Arithmetic Complexity and Beyond

Full text available at:  Partial Derivatives in Arithmetic Complexity and Beyond Partial Derivatives in Arithmetic Complexity and Beyond Partial Derivatives in Arithmetic Complexity and Beyond Xi Chen Columbia University USA xichen@cs.columbia.edu Neeraj Kayal Microsoft Research India

More information

LOCALLY DECODABLE CODES WITH TWO QUERIES AND POLYNOMIAL IDENTITY TESTING FOR DEPTH 3 CIRCUITS

LOCALLY DECODABLE CODES WITH TWO QUERIES AND POLYNOMIAL IDENTITY TESTING FOR DEPTH 3 CIRCUITS SIAM J. COMPUT. Vol. 36, No. 5, pp. 1404 1434 c 2007 Society for Industrial and Applied Mathematics LOCALLY DECODABLE CODES WITH TWO QUERIES AND POLYNOMIAL IDENTITY TESTING FOR DEPTH 3 CIRCUITS ZEEV DVIR

More information

1 Randomized Computation

1 Randomized Computation CS 6743 Lecture 17 1 Fall 2007 1 Randomized Computation Why is randomness useful? Imagine you have a stack of bank notes, with very few counterfeit ones. You want to choose a genuine bank note to pay at

More information

Algebraic Proof Complexity: Progress, Frontiers and Challenges

Algebraic Proof Complexity: Progress, Frontiers and Challenges Algebraic Proof Complexity: Progress, Frontiers and Challenges Toniann Pitassi Iddo Tzameret July 1, 2016 Abstract We survey recent progress in the proof complexity of strong proof systems and its connection

More information

Lecture 23: Introduction to Quantum Complexity Theory 1 REVIEW: CLASSICAL COMPLEXITY THEORY

Lecture 23: Introduction to Quantum Complexity Theory 1 REVIEW: CLASSICAL COMPLEXITY THEORY Quantum Computation (CMU 18-859BB, Fall 2015) Lecture 23: Introduction to Quantum Complexity Theory November 31, 2015 Lecturer: Ryan O Donnell Scribe: Will Griffin 1 REVIEW: CLASSICAL COMPLEXITY THEORY

More information

The GCT chasm I. Ketan D. Mulmuley. The University of Chicago. The GCT chasm I p. 1

The GCT chasm I. Ketan D. Mulmuley. The University of Chicago. The GCT chasm I p. 1 The GCT chasm I p. 1 The GCT chasm I Ketan D. Mulmuley The University of Chicago The GCT chasm I p. 2 The main reference GCT5 [M.]: Geometric Complexity Theory V: Equivalence between black-box derandomization

More information

The knapsack Problem

The knapsack Problem There is a set of n items. The knapsack Problem Item i has value v i Z + and weight w i Z +. We are given K Z + and W Z +. knapsack asks if there exists a subset S {1, 2,..., n} such that i S w i W and

More information

Partial Derivatives in Arithmetic Complexity and Beyond. Contents

Partial Derivatives in Arithmetic Complexity and Beyond. Contents Foundations and Trends R in Theoretical Computer Science Vol. 6, Nos. 1 2 (2010) 1 138 c 2011 X. Chen, N. Kayal and A. Wigderson DOI: 10.1561/0400000043 Partial Derivatives in Arithmetic Complexity and

More information

Progress on Polynomial Identity Testing

Progress on Polynomial Identity Testing Electronic Colloquium on Computational Complexity, Report No. 101 (2009) Progress on Polynomial Identity Testing Nitin Saxena Abstract Polynomial identity testing (PIT) is the problem of checking whether

More information

Partial Derivatives in Arithmetic Complexity (and beyond)

Partial Derivatives in Arithmetic Complexity (and beyond) R Foundations and Trends char in sample Vol. xx, No xx (xxxx) 1 137 char c xxxx xxxxxxxxx DOI: xxxxxx Partial Derivatives in Arithmetic Complexity (and beyond) Xi Chen 1, Neeraj Kayal 2 and Avi Wigderson

More information

Lecture 22: Counting

Lecture 22: Counting CS 710: Complexity Theory 4/8/2010 Lecture 22: Counting Instructor: Dieter van Melkebeek Scribe: Phil Rydzewski & Chi Man Liu Last time we introduced extractors and discussed two methods to construct them.

More information

PRIMES is in P. Manindra Agrawal. NUS Singapore / IIT Kanpur

PRIMES is in P. Manindra Agrawal. NUS Singapore / IIT Kanpur PRIMES is in P Manindra Agrawal NUS Singapore / IIT Kanpur The Problem Given number n, test if it is prime efficiently. Efficiently = in time a polynomial in number of digits = (log n) c for some constant

More information

The Strength of Multilinear Proofs

The Strength of Multilinear Proofs The Strength of Multilinear Proofs Ran Raz Iddo Tzameret December 19, 2006 Abstract We introduce an algebraic proof system that manipulates multilinear arithmetic formulas. We show that this proof system

More information

Groups, Rings, and Finite Fields. Andreas Klappenecker. September 12, 2002

Groups, Rings, and Finite Fields. Andreas Klappenecker. September 12, 2002 Background on Groups, Rings, and Finite Fields Andreas Klappenecker September 12, 2002 A thorough understanding of the Agrawal, Kayal, and Saxena primality test requires some tools from algebra and elementary

More information

A Polynomial Time Deterministic Algorithm for Identity Testing Read-Once Polynomials

A Polynomial Time Deterministic Algorithm for Identity Testing Read-Once Polynomials A Polynomial Time Deterministic Algorithm for Identity Testing Read-Once Polynomials Daniel Minahan Ilya Volkovich August 15, 2016 Abstract The polynomial identity testing problem, or PIT, asks how we

More information

Complete problems for classes in PH, The Polynomial-Time Hierarchy (PH) oracle is like a subroutine, or function in

Complete problems for classes in PH, The Polynomial-Time Hierarchy (PH) oracle is like a subroutine, or function in Oracle Turing Machines Nondeterministic OTM defined in the same way (transition relation, rather than function) oracle is like a subroutine, or function in your favorite PL but each call counts as single

More information

Lecture 6: Deterministic Primality Testing

Lecture 6: Deterministic Primality Testing Lecture 6: Deterministic Primality Testing Topics in Pseudorandomness and Complexity (Spring 018) Rutgers University Swastik Kopparty Scribe: Justin Semonsen, Nikolas Melissaris 1 Introduction The AKS

More information

6.045: Automata, Computability, and Complexity (GITCS) Class 17 Nancy Lynch

6.045: Automata, Computability, and Complexity (GITCS) Class 17 Nancy Lynch 6.045: Automata, Computability, and Complexity (GITCS) Class 17 Nancy Lynch Today Probabilistic Turing Machines and Probabilistic Time Complexity Classes Now add a new capability to standard TMs: random

More information

Constant-Depth Circuits for Arithmetic in Finite Fields of Characteristic Two

Constant-Depth Circuits for Arithmetic in Finite Fields of Characteristic Two Constant-Depth Circuits for Arithmetic in Finite Fields of Characteristic Two Alexander Healy Emanuele Viola August 8, 2005 Abstract We study the complexity of arithmetic in finite fields of characteristic

More information

Complexity Theory of Polynomial-Time Problems

Complexity Theory of Polynomial-Time Problems Complexity Theory of Polynomial-Time Problems Lecture 11: Nondeterministic SETH Karl Bringmann Complexity Inside P SAT 2 n 3SUM n 2 OV n 2 Colinearity n 2 3SUM-hard APSP n 3 APSP equivalent Radius n 3

More information

Lecture 6: Finite Fields

Lecture 6: Finite Fields CCS Discrete Math I Professor: Padraic Bartlett Lecture 6: Finite Fields Week 6 UCSB 2014 It ain t what they call you, it s what you answer to. W. C. Fields 1 Fields In the next two weeks, we re going

More information

conp, Oracles, Space Complexity

conp, Oracles, Space Complexity conp, Oracles, Space Complexity 1 What s next? A few possibilities CS161 Design and Analysis of Algorithms CS254 Complexity Theory (next year) CS354 Topics in Circuit Complexity For your favorite course

More information

A Local-Global Principle for Diophantine Equations

A Local-Global Principle for Diophantine Equations A Local-Global Principle for Diophantine Equations (Extended Abstract) Richard J. Lipton and Nisheeth Vishnoi {rjl,nkv}@cc.gatech.edu Georgia Institute of Technology, Atlanta, GA 30332, USA. Abstract.

More information

Cryptography: The Landscape, Fundamental Primitives, and Security. David Brumley Carnegie Mellon University

Cryptography: The Landscape, Fundamental Primitives, and Security. David Brumley Carnegie Mellon University Cryptography: The Landscape, Fundamental Primitives, and Security David Brumley dbrumley@cmu.edu Carnegie Mellon University The Landscape Jargon in Cryptography 2 Good News: OTP has perfect secrecy Thm:

More information

Linear-algebraic pseudorandomness: Subspace Designs & Dimension Expanders

Linear-algebraic pseudorandomness: Subspace Designs & Dimension Expanders Linear-algebraic pseudorandomness: Subspace Designs & Dimension Expanders Venkatesan Guruswami Carnegie Mellon University Simons workshop on Proving and Using Pseudorandomness March 8, 2017 Based on a

More information

MATH 115, SUMMER 2012 LECTURE 12

MATH 115, SUMMER 2012 LECTURE 12 MATH 115, SUMMER 2012 LECTURE 12 JAMES MCIVOR - last time - we used hensel s lemma to go from roots of polynomial equations mod p to roots mod p 2, mod p 3, etc. - from there we can use CRT to construct

More information

WEAKENING ASSUMPTIONS FOR DETERMINISTIC SUBEXPONENTIAL TIME NON-SINGULAR MATRIX COMPLETION MAURICE JANSEN

WEAKENING ASSUMPTIONS FOR DETERMINISTIC SUBEXPONENTIAL TIME NON-SINGULAR MATRIX COMPLETION MAURICE JANSEN Symposium on Theoretical Aspects of Computer Science 2010 (Nancy, France), pp. 465-476 www.stacs-conf.org WEAKENING ASSUMPTIONS FOR DETERMINISTIC SUBEXPONENTIAL TIME NON-SINGULAR MATRIX COMPLETION MAURICE

More information

Complexity Theory of Polynomial-Time Problems

Complexity Theory of Polynomial-Time Problems Complexity Theory of Polynomial-Time Problems Lecture 3: The polynomial method Part I: Orthogonal Vectors Sebastian Krinninger Organization of lecture No lecture on 26.05. (State holiday) 2 nd exercise

More information

A sequence is k-automatic if its n th term is generated by a finite state machine with n in base k as the input.

A sequence is k-automatic if its n th term is generated by a finite state machine with n in base k as the input. A sequence is k-automatic if its n th term is generated by a finite state machine with n in base k as the input. 1 Examples of automatic sequences The Thue-Morse sequence 011010011001011010010 This sequence

More information

The P versus NP Problem. Ker-I Ko. Stony Brook, New York

The P versus NP Problem. Ker-I Ko. Stony Brook, New York The P versus NP Problem Ker-I Ko Stony Brook, New York ? P = NP One of the seven Millenium Problems The youngest one A folklore question? Has hundreds of equivalent forms Informal Definitions P : Computational

More information

Determinant Versus Permanent

Determinant Versus Permanent Determinant Versus Permanent Manindra Agrawal Abstract. We study the problem of expressing permanent of matrices as determinant of (possibly larger) matrices. This problem has close connections with complexity

More information

QUASI-POLYNOMIAL HITTING-SET FOR SET-DEPTH- FORMULAS

QUASI-POLYNOMIAL HITTING-SET FOR SET-DEPTH- FORMULAS Electronic Colloquium on Computational Complexity, Report No. 113 (2012) QUAI-POLYNOMIAL HITTING-ET FOR ET-DEPTH- FORMULA MANINDRA AGRAWAL, CHANDAN AHA, AND NITIN AXENA Abstract. We call a depth-4 formula

More information

Characterizing Propositional Proofs as Non-Commutative Formulas

Characterizing Propositional Proofs as Non-Commutative Formulas Characterizing Propositional Proofs as Non-Commutative Formulas Fu Li Iddo Tzameret Zhengyu Wang Abstract Does every Boolean tautology have a short propositional-calculus proof? Here, a propositionalcalculus

More information

Applied Cryptography and Computer Security CSE 664 Spring 2018

Applied Cryptography and Computer Security CSE 664 Spring 2018 Applied Cryptography and Computer Security Lecture 12: Introduction to Number Theory II Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline This time we ll finish the

More information

Lecture 23: Alternation vs. Counting

Lecture 23: Alternation vs. Counting CS 710: Complexity Theory 4/13/010 Lecture 3: Alternation vs. Counting Instructor: Dieter van Melkebeek Scribe: Jeff Kinne & Mushfeq Khan We introduced counting complexity classes in the previous lecture

More information

Lecture 19: Finish NP-Completeness, conp and Friends

Lecture 19: Finish NP-Completeness, conp and Friends 6.045 Lecture 19: Finish NP-Completeness, conp and Friends 1 Polynomial Time Reducibility f : Σ* Σ* is a polynomial time computable function if there is a poly-time Turing machine M that on every input

More information

Separating multilinear branching programs and formulas

Separating multilinear branching programs and formulas Separating multilinear branching programs and formulas Zeev Dvir Guillaume Malod Sylvain Perifel Amir Yehudayoff Abstract This work deals with the power of linear algebra in the context of multilinear

More information

Great Theoretical Ideas in Computer Science

Great Theoretical Ideas in Computer Science 15-251 Great Theoretical Ideas in Computer Science Polynomials, Lagrange, and Error-correction Lecture 23 (November 10, 2009) P(X) = X 3 X 2 + + X 1 + Definition: Recall: Fields A field F is a set together

More information

Improved Polynomial Identity Testing for Read-Once Formulas

Improved Polynomial Identity Testing for Read-Once Formulas Improved Polynomial Identity Testing for Read-Once Formulas Amir Shpilka Ilya Volkovich Abstract An arithmetic read-once formula (ROF for short) is a formula (a circuit whose underlying graph is a tree)

More information

CHAPTER 3 FUNDAMENTALS OF COMPUTATIONAL COMPLEXITY. E. Amaldi Foundations of Operations Research Politecnico di Milano 1

CHAPTER 3 FUNDAMENTALS OF COMPUTATIONAL COMPLEXITY. E. Amaldi Foundations of Operations Research Politecnico di Milano 1 CHAPTER 3 FUNDAMENTALS OF COMPUTATIONAL COMPLEXITY E. Amaldi Foundations of Operations Research Politecnico di Milano 1 Goal: Evaluate the computational requirements (this course s focus: time) to solve

More information