On the complexity of polynomial system solving
|
|
- Jack Logan
- 5 years ago
- Views:
Transcription
1 Bruno Grenet LIX École Polytechnique partly based on a joint work with Pascal Koiran & Natacha Portier XXVèmes rencontres arithmétiques de Caen Île de Tatihou, June 30. July 4., 2014
2 Is there a (nonzero) solution? X 2 + Y 2 Z 2 = 0 XZ + 3 XY + YZ + Y 2 = 0 XZ Y 2 = 0 2 / 27
3 Is there a (nonzero) solution? X 2 + Y 2 Z 2 = 0 XZ + 3 XY + YZ + Y 2 = 0 XZ Y 2 = 0 PolSys K Input: f 1,..., f s K[X 1,..., X n ] Question: Is there a K n s.t. f(a) = 0? 2 / 27
4 Is there a (nonzero) solution? X 2 + Y 2 Z 2 = 0 XZ + 3 XY + YZ + Y 2 = 0 XZ Y 2 = 0 PolSys K Input: f 1,..., f s K[X 1,..., X n ] Question: Is there a K n s.t. f(a) = 0? Lower and upper bounds in terms of complexity classes K: Either Z or F q for some q = p s Variants: Homogeneity, number of polynomials 2 / 27
5 Some complexity classes EXP PSPACE PH Π 2 Σ 2 AM MA NP conp Definition P Deterministic polynomial time NP, conp Non-deterministic polynomial time MA, AM Merlin-Arthur, Arthur-Merlin Σ 2, Π 2,PH Polynomial hierarchy PSPACE (Non-)deterministic polynomial space EXP Deterministic exponential time P 3 / 27
6 Homogeneous systems HomPolSys K Input: f 1,..., f s K[X 0,..., X n ], homogeneous Question: Is there a nonzero a K n+1 s.t. f(a) = 0? 4 / 27
7 Homogeneous systems HomPolSys K Input: f 1,..., f s K[X 0,..., X n ], homogeneous Question: Is there a nonzero a K n+1 s.t. f(a) = 0? Proposition For K = Z or F q, PolSys K and HomPolSys K are polynomial-time equivalent. 4 / 27
8 Homogeneous systems HomPolSys K Input: f 1,..., f s K[X 0,..., X n ], homogeneous Question: Is there a nonzero a K n+1 s.t. f(a) = 0? Proposition For K = Z or F q, PolSys K and HomPolSys K are polynomial-time equivalent. Proof. PolSys K P m HomPolSys K : Homogenization HomPolSys K P m PolSys K : New polynomial i X i Y i 1, where Y 0,..., Y n are fresh variables 4 / 27
9 Glimpse of Elimination Theory f 1,..., f s K[X 0,..., X n ], f i = For which γ i,α is there a root? α =d i γ i,α X α 5 / 27
10 Glimpse of Elimination Theory f 1,..., f s K[X 0,..., X n ], f i = α =d i γ i,α X α For which γ i,α is there a root? There exist R 1,..., R h K[γ] s.t. R 1 (γ) = 0. = a 0, R h (γ) = 0 f 1 (a) = 0. f s (a) = 0 5 / 27
11 Two Polynomials m n P = p i X i, Q = q j X j : i=0 j=0 6 / 27
12 Two Polynomials P = m p i X i, Q = i=0 n q j X j : j=0 p m p Res(P, Q) = det p m p 0 q n q Sylvester Matrix q n q 0 6 / 27
13 Two Polynomials P = m p i X i Y m i, Q = i=0 n q j X j Y n j : j=0 p m p Res(P, Q) = det p m p 0 q n q Sylvester Matrix q n q 0 6 / 27
14 More generally f 1,..., f n+1 K[X 0,..., X n ] a unique resultant polynomial Sylvester matrix Macaulay matrices (exponential size) 7 / 27
15 More generally f 1,..., f n+1 K[X 0,..., X n ] a unique resultant polynomial Sylvester matrix Macaulay matrices (exponential size) s polynomials > n + 1 variables several polynomials needed 7 / 27
16 More generally f 1,..., f n+1 K[X 0,..., X n ] a unique resultant polynomial Sylvester matrix Macaulay matrices (exponential size) s polynomials > n + 1 variables several polynomials needed s polynomials < n + 1 variables trivial 7 / 27
17 More generally f 1,..., f n+1 K[X 0,..., X n ] a unique resultant polynomial Sylvester matrix Macaulay matrices (exponential size) s polynomials > n + 1 variables several polynomials needed s polynomials < n + 1 variables trivial Resultant K Input: f 1,..., f n+1 K[X 0,..., X n ], homogeneous Question: Is there a nonzero a K n+1 s.t. f(a) = 0? 7 / 27
18 Upper bounds
19 Hilbert s Nullstellensatz Theorem Let f 1,..., f s K[X 1,..., X n ]. Then a K, f(a) 0 q 1,..., q s K[X], 1 = q 1 f 1 + +q s f s. 9 / 27
20 Hilbert s Nullstellensatz Theorem Let f 1,..., f s K[X 1,..., X n ]. Then a K, f(a) 0 q 1,..., q s K[X], 1 = q 1 f 1 + +q s f s. Sketch of an algorithm. Write q i = q i,α X α where the q i,α s are indeterminates. α D q i f i = 1 is a linear system of D n equations on sd n variables. i Linear systems can be solved in logarithmic space. Do not store the linear system, but compute entries on demand. = PolSys K can be solved in space poly(n log D, log s). 9 / 27
21 Polynomial System Solving in PSPACE a K, f(a) 0 q 1,..., q s s.t. 1 = q 1 f q s f s. Theorem [Kollár 88, Fitchas-Galligo 90] The q i s can be chosen such that deg(q i ) max(3, d) n. 10 / 27
22 Polynomial System Solving in PSPACE a K, f(a) 0 q 1,..., q s s.t. 1 = q 1 f q s f s. Theorem [Kollár 88, Fitchas-Galligo 90] The q i s can be chosen such that deg(q i ) max(3, d) n. Corollary For K = Z or F q, PolSys K belongs to PSPACE. 10 / 27
23 Polynomial System Solving in PSPACE a K, f(a) 0 q 1,..., q s s.t. 1 = q 1 f q s f s. Theorem [Kollár 88, Fitchas-Galligo 90] The q i s can be chosen such that deg(q i ) max(3, d) n. Corollary For K = Z or F q, PolSys K belongs to PSPACE. More specifically, PolSys K DSPACE((n log d log s) O(1) ). 10 / 27
24 Computing the resultant Theorem The resultant is computable in polynomial space. [Canny 87] 11 / 27
25 Computing the resultant Theorem The resultant is computable in polynomial space. Proof idea. The resultant can be expressed as a gcd of n determinants of Macaulay matrices. [Canny 87] Macaulay matrices can be represented by polynomial-size boolean circuits. The determinant can be computed in logarithmic space. 11 / 27
26 Computing the resultant Theorem The resultant is computable in polynomial space. Proof idea. The resultant can be expressed as a gcd of n determinants of Macaulay matrices. [Canny 87] Macaulay matrices can be represented by polynomial-size boolean circuits. The determinant can be computed in logarithmic space. Theorem [Koiran-Perifel 07] The same holds true in Valiant s algebraic model of computation. 11 / 27
27 Macaulay matrices f 1,...,f n+1 K[X 0,..., X n ], homogeneous, of degrees d 1,..., d n D = i (d i 1), M n D = {X α 0 0 Xα n n : α α n = D} 12 / 27
28 Macaulay matrices f 1,...,f n+1 K[X 0,..., X n ], homogeneous, of degrees d 1,..., d n D = i (d i 1), M n D = {X α 0 0 Xα n n : α α n = D} Definition The first Macaulay matrix is defined as follows: Its rows and columns are indexed by M n D; The row indexed by X α represents X α X d i i f i, where i = min{j : d j α j }. Other Macaulay matrices are defined by reordering the f i s. 12 / 27
29 Macaulay matrices f 1,...,f n+1 K[X 0,..., X n ], homogeneous, of degrees d 1,..., d n D = i (d i 1), M n D = {X α 0 0 Xα n n : α α n = D} Definition The first Macaulay matrix is defined as follows: Its rows and columns are indexed by M n D; The row indexed by X α represents X α X d i i f i, where i = min{j : d j α j }. Other Macaulay matrices are defined by reordering the f i s. Resultant : GCD of the determinants of n Macaulay matrices 12 / 27
30 Large determinants Theorem [G.-Koiran-Portier 10-13] Deciding the nullity of the determinant of a matrix represented by a boolean circuit is PSPACE-complete (over any field). 13 / 27
31 Large determinants Theorem [G.-Koiran-Portier 10-13] Deciding the nullity of the determinant of a matrix represented by a boolean circuit is PSPACE-complete (over any field). Proof idea. Let M be a PSPACE Turing Machine and G x M its graph of configurations, with initial configuration c i and accepting configuration c a ; G x M can be represented by a boolean circuit; There exists a path c i c a in G x M iff M accepts x; Let A adjacency matrix of G x M: det(a) 0 c i c a. 13 / 27
32 Large determinants Theorem [G.-Koiran-Portier 10-13] Deciding the nullity of the determinant of a matrix represented by a boolean circuit is PSPACE-complete (over any field). Proof idea. Let M be a PSPACE Turing Machine and G x M its graph of configurations, with initial configuration c i and accepting configuration c a ; G x M can be represented by a boolean circuit; There exists a path c i c a in G x M iff M accepts x; Let A adjacency matrix of G x M: det(a) 0 c i c a. Theorem [Malod 11] The same holds true in Valiant s algebraic model of computation. 13 / 27
33 Arthur, Merlin and PolSys Z Theorem [Koiran 96] Under the Extended Riemann Hypothesis, PolSys Z is in AM. 14 / 27
34 Arthur, Merlin and PolSys Z Theorem [Koiran 96] Under the Extended Riemann Hypothesis, PolSys Z is in AM. L NP iff there exists V P and a polynomial p s.t. for all x, x L y Σ p( x ), (x, y) V. 14 / 27
35 Arthur, Merlin and PolSys Z Theorem [Koiran 96] Under the Extended Riemann Hypothesis, PolSys Z is in AM. L NP iff there exists V P and a polynomial p s.t. for all x, x L y Σ p( x ), (x, y) V. L MA iff there exists V P and a polynomial p s.t. for all x, x L y Σ p( x ), Pr r Σ p( x )((x, y, r) V) 2/3. 14 / 27
36 Arthur, Merlin and PolSys Z Theorem [Koiran 96] Under the Extended Riemann Hypothesis, PolSys Z is in AM. L NP iff there exists V P and a polynomial p s.t. for all x, x L y Σ p( x ), (x, y) V. L MA iff there exists V P and a polynomial p s.t. for all x, x L y Σ p( x ), Pr r Σ p( x )((x, y, r) V) 2/3. L AM iff there exists V P and a polynomial p s.t. for all x, x L Pr r Σ p( x )( y Σ p( x ) (x, r, y) V) 2/3. 14 / 27
37 Arthur, Merlin and PolSys Z Theorem [Koiran 96] Under the Extended Riemann Hypothesis, PolSys Z is in AM. L NP iff there exists V P and a polynomial p s.t. for all x, x L y Σ p( x ), (x, y) V. L MA iff there exists V P and a polynomial p s.t. for all x, x L y Σ p( x ), Pr r Σ p( x )((x, y, r) V) 2/3. L AM iff there exists V P and a polynomial p s.t. for all x, x L Pr r Σ p( x )( y Σ p( x ) (x, r, y) V) 2/3. NP MA AM 14 / 27
38 Polynomial system mod primes Let f = (f 1,..., f s ), with f i Z[X 1,..., X n ]; Let π f (x) be the set of prime numbers x, s.t. f has a root mod p. 15 / 27
39 Polynomial system mod primes Let f = (f 1,..., f s ), with f i Z[X 1,..., X n ]; Let π f (x) be the set of prime numbers x, s.t. f has a root mod p. Theorem There exist polynomial-time computable A and x 0 s.t. If f has no root in C, then π f (x 0 ) A; [Koiran 96] If f has a root in C, then π f (x 0 ) 8A(log A + 3). 15 / 27
40 Polynomial system mod primes Let f = (f 1,..., f s ), with f i Z[X 1,..., X n ]; Let π f (x) be the set of prime numbers x, s.t. f has a root mod p. Theorem There exist polynomial-time computable A and x 0 s.t. If f has no root in C, then π f (x 0 ) A; [Koiran 96] If f has a root in C, then π f (x 0 ) 8A(log A + 3). Proof idea. Using Hilbert s Nullstellensatz, there exists b Z and q i Z[X] such that q 1 f q s f s = b, with log b = exp(s, d). Using effective quantifier elimination, consider a root a of f such that Q(a) = Q/ R where R is small. Roots of R in F p yield roots of f in F p. Use an Effective Chebotarev Density Theorem (ERH) to prove that R has many roots. 15 / 27
41 Arthur-Merlin protocol Theorem Let U be a universe and {S x U : x Σ } a collection of sets s.t. for all x, either S x α U or S x 4α U, and S x NP. Then the following problem is in AM: Given x, does S x 4α U? 16 / 27
42 Arthur-Merlin protocol Theorem Let U be a universe and {S x U : x Σ } a collection of sets s.t. for all x, either S x α U or S x 4α U, and S x NP. Then the following problem is in AM: Given x, does S x 4α U? Proof idea. 4α 1: Arthur chooses y U at random, and asks Merlin a certificate that y S x. If S x U, Pr(y S x ) 1. α 1: Consider a set T of size 4α U and a family of universal hash functions h : U T. 1. Arthur chooses h and t T at random. 2. Merlin must return y S x s.t. h(y) = t, with a certificate 16 / 27
43 Arthur-Merlin protocol Theorem Let U be a universe and {S x U : x Σ } a collection of sets s.t. for all x, either S x α U or S x 4α U, and S x NP. Then the following problem is in AM: Given x, does S x 4α U? Proof idea. 4α 1: Arthur chooses y U at random, and asks Merlin a certificate that y S x. If S x U, Pr(y S x ) 1. α 1: Consider a set T of size 4α U and a family of universal hash functions h : U T. 1. Arthur chooses h and t T at random. 2. Merlin must return y S x s.t. h(y) = t, with a certificate Proof (PolSys Z AM). U = {p x 0 : p is prime}, S f = π f (x 0 ). 16 / 27
44 Lower bounds
45 Lower bounds for non-square systems Proposition [Folklore] For K = Z or F p, PolSys K & HomPolSys K are NP-hard. 18 / 27
46 Lower bounds for non-square systems Proposition [Folklore] For K = Z or F p, PolSys K & HomPolSys K are NP-hard. Proof. Case HomPolSys Fp, with p 2: BoolSys Boolean variables u 1,..., u n Equations u i = True u i = u j u i = u j u k 18 / 27
47 Lower bounds for non-square systems Proposition [Folklore] For K = Z or F p, PolSys K & HomPolSys K are NP-hard. Proof. Case HomPolSys Fp, with p 2: BoolSys Boolean variables u 1,..., u n Equations u i = True u i = u j u i = u j u k HomPolSys K Variables (over F p ) X 0 and X 1,..., X n Polynomials X 2 0 X 2 i for every i > 0 and X 0 (X i + X 0 ) X 0 (X i + X j ) (X i + X 0 ) 2 (X j + X 0 ) (X k + X 0 ) 18 / 27
48 Lower bound for the resultant in char. 0 Proposition [Heintz-Morgenstern 93] Resultant Z is NP-hard. 19 / 27
49 Lower bound for the resultant in char. 0 Proposition [Heintz-Morgenstern 93] Resultant Z is NP-hard. Proof. Partition Z : Input: S = {u 1,..., u n } Z Question: Does there exist S S, u i = u j? i S j/ S 19 / 27
50 Lower bound for the resultant in char. 0 Proposition Resultant Z is NP-hard. Proof. Partition Z : [Heintz-Morgenstern 93] Input: S = {u 1,..., u n } Z Question: Does there exist S S, u i = u j? i S j/ S X 2 1 X2 0 = 0. X 2 n X 2 0 = 0 u 1 X u n X n = 0 19 / 27
51 Lower bound for the resultant in char. 0 Proposition Resultant Z is NP-hard. Proof. Partition Z : [Heintz-Morgenstern 93] Input: S = {u 1,..., u n } Z Question: Does there exist S S, u i = u j? i S j/ S X 2 1 X2 0 = 0. X 2 n X 2 0 = 0 u 1 X u n X n = 0 Note. Partition Fp P 19 / 27
52 Hardness in positive characteristics HomPolSys Fp is NP-hard: # homogeneous polynomials # variables HomPolSys K Variables X 0 and X 1,..., X n over F p Polynomials X 2 0 X 2 i for every i > 0 and X 0 (X i + X 0 ) X 0 (X i + X j ) (X i + X 0 ) 2 (X j + X 0 ) (X k + X 0 ) 20 / 27
53 Hardness in positive characteristics HomPolSys Fp is NP-hard: # homogeneous polynomials # variables Two strategies: Reduce the number of polynomials Increase the number of variables HomPolSys K Variables X 0 and X 1,..., X n over F p Polynomials X 2 0 X 2 i for every i > 0 and X 0 (X i + X 0 ) X 0 (X i + X j ) (X i + X 0 ) 2 (X j + X 0 ) (X k + X 0 ) 20 / 27
54 Hardness in positive characteristics HomPolSys Fp is NP-hard: # homogeneous polynomials # variables Two strategies: Reduce the number of polynomials Increase the number of variables HomPolSys K Variables X 0 and X 1,..., X n over F p Polynomials X 2 0 X 2 i for every i > 0 and X 0 (X i + X 0 ) X 0 (X i + X j ) (X i + X 0 ) 2 (X j + X 0 ) (X k + X 0 ) 20 / 27
55 A randomized reduction s Define g i = α ij f j, 0 i n: f(a) = 0 = g(a) = 0. j=1 21 / 27
56 A randomized reduction Define g i = s α ij f j, 0 i n: f(a) = 0 = g(a) = 0. j=1 Effective Bertini Theorem: There exists F of degree 3 n+1 s.t. the reciprocal holds as soon as F(α) 0. [Krick-Pardo-Sombra 01] 21 / 27
57 A randomized reduction Define g i = s α ij f j, 0 i n: f(a) = 0 = g(a) = 0. j=1 Effective Bertini Theorem: There exists F of degree 3 n+1 s.t. the reciprocal holds as soon as F(α) 0. [Krick-Pardo-Sombra 01] Schwartz-Zippel Lemma: [DeMillo-Lipton, Zippel, Schwartz, 78-80] Pr s(n+1) α F (F(α) = 0) deg(f) q F q 21 / 27
58 A randomized reduction Define g i = s α ij f j, 0 i n: f(a) = 0 = g(a) = 0. j=1 Effective Bertini Theorem: There exists F of degree 3 n+1 s.t. the reciprocal holds as soon as F(α) 0. [Krick-Pardo-Sombra 01] Schwartz-Zippel Lemma: [DeMillo-Lipton, Zippel, Schwartz, 78-80] Pr s(n+1) α F (F(α) = 0) deg(f) q F q Build an extension L/F p with at least 3 n+2 elements [Shoup 90] 21 / 27
59 A randomized reduction Define g i = s α ij f j, 0 i n: f(a) = 0 = g(a) = 0. j=1 Effective Bertini Theorem: There exists F of degree 3 n+1 s.t. the reciprocal holds as soon as F(α) 0. [Krick-Pardo-Sombra 01] Schwartz-Zippel Lemma: [DeMillo-Lipton, Zippel, Schwartz, 78-80] Pr s(n+1) α F (F(α) = 0) deg(f) q F q Build an extension L/F p with at least 3 n+2 elements Choose the α ij s independently at random in L; [Shoup 90] 21 / 27
60 Define g i = A randomized reduction s α ij f j, 0 i n: f(a) = 0 = g(a) = 0. j=1 Effective Bertini Theorem: There exists F of degree 3 n+1 s.t. the reciprocal holds as soon as F(α) 0. [Krick-Pardo-Sombra 01] Schwartz-Zippel Lemma: [DeMillo-Lipton, Zippel, Schwartz, 78-80] Pr s(n+1) α F (F(α) = 0) deg(f) q F q Build an extension L/F p with at least 3 n+2 elements Choose the α ij s independently at random in L; [Shoup 90] Theorem [G.-Koiran-Portier 10-13] Let p be a prime number. Resultant Fq is NP-hard for degree-2 polynomials for some q = p s, under randomized reductions. 21 / 27
61 Hardness in positive characteristics HomPolSys Fp is NP-hard: # homogeneous polynomials # variables Two strategies: Reduce the number of polynomials Increase the number of variables HomPolSys K Variables X 0 and X 1,..., X n over F p Polynomials X 2 0 X 2 i for every i > 0 and X 0 (X i + X 0 ) X 0 (X i + X j ) (X i + X 0 ) 2 (X j + X 0 ) (X k + X 0 ) 22 / 27
62 Hardness in positive characteristics HomPolSys Fp Two strategies: is NP-hard: # homogeneous polynomials # variables Reduce the number of polynomials Increase the number of variables HomPolSys K Variables X 0 and X 1,..., X n over F p Polynomials X 2 0 X 2 i for every i > 0 and X 0 (X i + X 0 ) X 0 (X i + X j ) (X i + X 0 ) 2 (X j + X 0 ) (X k + X 0 ) f 1,..., f n f n+1,..., f s 22 / 27
63 Reduction New variables: Y 1,..., Y s n 1 New system g(x, Y) = 23 / 27
64 Reduction New variables: Y 1,..., Y s n 1 New system f 1 (X). (untouched) f n (X) g(x, Y) = 23 / 27
65 Reduction New variables: Y 1,..., Y s n 1 New system f 1 (X) g(x, Y) =.. (untouched) f n (X) f n+1 (X) +λy1 2 f n+2 (X) Y1 2 +λy2 2 f s 1 (X) Y 2 s n 2 +λy2 s n 1 f s (X) Y 2 s n 1 23 / 27
66 Reduction New variables: Y 1,..., Y s n 1 New system f 1 (X) g(x, Y) =.. (untouched) f n (X) f n+1 (X) +λy1 2 f n+2 (X) Y1 2 +λy2 2 f s 1 (X) Y 2 s n 2 +λy2 s n 1 f s (X) Y 2 s n 1 a root of f = (a, 0) root of g 23 / 27
67 Equivalence? f 1 (a). (a, b) non trivial root of g. f n (a) f n+1 (a) +λb 2 1 f n+2 (a) b 2 1 +λb 2 2 f s 1 (a) b 2 s n 2 +λb2 s n 1 f s (a) b 2 s n 1? = a non trivial root of f 24 / 27
68 Equivalence? f 1 (a). (a, b) non trivial root of g. f n (a) f n+1 (a) +λb 2 1 f n+2 (a) b 2 1 +λb 2 2 f s 1 (a) b 2 s n 2 +λb2 s n 1 f s (a) b 2 s n 1? = a non trivial root of f a = 0 = b = 0 24 / 27
69 Equivalence? f 1 (a). (a, b) non trivial root of g. f n (a) f n+1 (a) +λb 2 1 f n+2 (a) b 2 1 +λb 2 2 f s 1 (a) b 2 s n 2 +λb2 s n 1 f s (a) b 2 s n 1? = a non trivial root of f a = 0 = b = 0 a 0 = 1 and a i = ±1 24 / 27
70 Equivalence? f 1 (a). (a, b) non trivial root of g. f n (a) f n+1 (a) +λb 2 1 f n+2 (a) b 2 1 +λb 2 2 f s 1 (a) b 2 s n 2 +λb2 s n 1 f s (a) b 2 s n 1? = a non trivial root of f a = 0 = b = 0 a 0 = 1 and a i = ±1 ɛ i = f n+i (a) 24 / 27
71 Equivalence? (a, b) non trivial root of g ɛ 1 +λb 2 1 ɛ 2 b 2 1 +λb 2 2. ɛ s n 2 b 2 s n 2 +λb2 s n 1 ɛ s n 1 b 2 s n 1? = a non trivial root of f a = 0 = b = 0 a 0 = 1 and a i = ±1 ɛ i = f n+i (a) 24 / 27
72 Equivalence? (a, b) non trivial root of g ɛ 1 +λb 2 1 ɛ 2 b 2 1 +λb 2 2. ɛ s n 2 b 2 s n 2 +λb2 s n 1 ɛ s n 1 b 2 s n 1? = a non trivial root of f a = 0 = b = 0 a 0 = 1 and a i = ±1 ɛ i = f n+i (a) B i = b 2 i 24 / 27
73 Equivalence? (a, b) non trivial root of g ɛ 1 +λb 1 ɛ 2 B 1 +λb 2. ɛ s n 2 B s n 2 +λb s n 1 ɛ s n 1 B s n 1? = a non trivial root of f a = 0 = b = 0 a 0 = 1 and a i = ±1 ɛ i = f n+i (a) B i = b 2 i 24 / 27
74 Equivalence? (a, b) non trivial root of g ɛ 1 +λb 1 ɛ 2 B 1 +λb 2. ɛ s n 2 B s n 2 +λb s n 1 ɛ s n 1 B s n 1? = a non trivial root of f a = 0 = b = 0 a 0 = 1 and a i = ±1 ɛ i = f n+i (a) B i = b 2 i det = ± ( ɛ 1 + ɛ 2 λ + + ɛ s n λ s n 1) 24 / 27
75 Equivalence? (a, b) non trivial root of g ɛ 1 +λb 1 ɛ 2 B 1 +λb 2. ɛ s n 2 B s n 2 +λb s n 1 ɛ s n 1 B s n 1? = a non trivial root of f a = 0 = b = 0 a 0 = 1 and a i = ±1 ɛ i = f n+i (a) B i = b 2 i det = ± ( ɛ 1 + ɛ 2 λ + + ɛ s n λ s n 1) det = 0? = i, ɛ i = 0 = f 1 (a) = = f s (a) = 0 24 / 27
76 Last step det = ± ( ɛ 1 + ɛ 2 λ + + ɛ N λ N 1) Compute an irreducible polynomial P F p [ξ] of degree N; [Shoup 90] Let L = F p [ξ]/(p) and λ = ξ L. 25 / 27
77 Last step det = ± ( ɛ 1 + ɛ 2 λ + + ɛ N λ N 1) Compute an irreducible polynomial P F p [ξ] of degree N; [Shoup 90] Let L = F p [ξ]/(p) and λ = ξ L. In the extension L, det = 0 ɛ i = 0 for all i. For coefficients in F p instead of L: put P inside the system 25 / 27
78 Last step det = ± ( ɛ 1 + ɛ 2 λ + + ɛ N λ N 1) Compute an irreducible polynomial P F p [ξ] of degree N; [Shoup 90] Let L = F p [ξ]/(p) and λ = ξ L. In the extension L, det = 0 ɛ i = 0 for all i. For coefficients in F p instead of L: put P inside the system Theorem Let p be a prime number. [G.-Koiran-Portier 10-13] Resultant Fp is NP-hard for linear-degree polynomials. 25 / 27
79 Last step det = ± ( ɛ 1 + ɛ 2 λ + + ɛ N λ N 1) Compute an irreducible polynomial P F p [ξ] of degree N; [Shoup 90] Let L = F p [ξ]/(p) and λ = ξ L. In the extension L, det = 0 ɛ i = 0 for all i. For coefficients in F p instead of L: put P inside the system Theorem [G.-Koiran-Portier 10-13] Let p be a prime number. Resultant Fp is NP-hard for linear-degree polynomials. Resultant Fq is NP-hard for degree-2 polynomials for some q = p s. 25 / 27
80 Main results Lower bound Upper bound Z NP-hard AM F p NP-hard PSPACE 26 / 27
81 Main results Lower bound Upper bound Z NP-hard AM F p NP-hard PSPACE Evaluation of the resultant in PSPACE 26 / 27
82 Main results Lower bound Upper bound Z NP-hard AM F p NP-hard PSPACE Evaluation of the resultant in PSPACE Ideal membership problem is EXPSPACE-complete Input: g, f 1,..., f s K[X] Question: Does g belong to f 1,..., f s? [Mayr-Meyer 82] 26 / 27
83 Main results Lower bound Upper bound Z NP-hard AM F p NP-hard PSPACE Evaluation of the resultant in PSPACE Ideal membership problem is EXPSPACE-complete Input: g, f 1,..., f s K[X] Question: Does g belong to f 1,..., f s? PolSys K is NP K complete (BSS model) [Mayr-Meyer 82] 26 / 27
84 Some open questions Reduce the gap between NP and PSPACE in positive characteristics 27 / 27
85 Some open questions Reduce the gap between NP and PSPACE in positive characteristics Derandomize Koiran s theorem: PolSys Z NP? 27 / 27
86 Some open questions Reduce the gap between NP and PSPACE in positive characteristics Derandomize Koiran s theorem: PolSys Z NP? NP-hardness for degree-2 polynomial systems in F p? 27 / 27
87 Some open questions Reduce the gap between NP and PSPACE in positive characteristics Derandomize Koiran s theorem: PolSys Z NP? NP-hardness for degree-2 polynomial systems in F p? Complexity of solving sparse or lacunary polynomial systems? 27 / 27
88 Some open questions Reduce the gap between NP and PSPACE in positive characteristics Derandomize Koiran s theorem: PolSys Z NP? NP-hardness for degree-2 polynomial systems in F p? Complexity of solving sparse or lacunary polynomial systems? Complexity of root finding, especially: Input: f 1,..., f n K[X 0,..., X n ], homogeneous Output: A root a K of f always a solution: PPAD, TFNP,...? 27 / 27
89 Some open questions Reduce the gap between NP and PSPACE in positive characteristics Derandomize Koiran s theorem: PolSys Z NP? NP-hardness for degree-2 polynomial systems in F p? Complexity of solving sparse or lacunary polynomial systems? Complexity of root finding, especially: Input: f 1,..., f n K[X 0,..., X n ], homogeneous Output: A root a K of f always a solution: PPAD, TFNP,...? Thank you! 27 / 27
Polynomial Identity Testing. Amir Shpilka Technion
Polynomial Identity Testing Amir Shpilka Technion 1 Goal of talk Model: Arithmetic circuits Problem: Polynomial Identity Testing Example: Depth-3 circuits Some open problems 2 Holy grail: P vs. NP Boolean
More informationThe GCT chasm I. Ketan D. Mulmuley. The University of Chicago. The GCT chasm I p. 1
The GCT chasm I p. 1 The GCT chasm I Ketan D. Mulmuley The University of Chicago The GCT chasm I p. 2 The main reference GCT5 [M.]: Geometric Complexity Theory V: Equivalence between black-box derandomization
More informationPolynomial Identity Testing
Polynomial Identity Testing Amir Shpilka Technion and MSR NE Based on joint works with: Zeev Dvir, Zohar Karnin, Partha Mukhopadhyay, Ran Raz, Ilya Volkovich and Amir Yehudayoff 1 PIT Survey Oberwolfach
More informationHilbert Nullstellensatz & Quantifier Elimination
6.S897 Algebra and Computation April 11, 2012 Hilbert Nullstellensatz & Quantifier Elimination Instructor: Madhu Sudan Scribe: Alessandro Chiesa Throughout, K will denote an algebraically closed field.
More informationDRAFT. Algebraic computation models. Chapter 14
Chapter 14 Algebraic computation models Somewhat rough We think of numerical algorithms root-finding, gaussian elimination etc. as operating over R or C, even though the underlying representation of the
More informationLecture 26: Arthur-Merlin Games
CS 710: Complexity Theory 12/09/2011 Lecture 26: Arthur-Merlin Games Instructor: Dieter van Melkebeek Scribe: Chetan Rao and Aaron Gorenstein Last time we compared counting versus alternation and showed
More informationCPSC 536N: Randomized Algorithms Term 2. Lecture 9
CPSC 536N: Randomized Algorithms 2011-12 Term 2 Prof. Nick Harvey Lecture 9 University of British Columbia 1 Polynomial Identity Testing In the first lecture we discussed the problem of testing equality
More informationTheory of Computer Science to Msc Students, Spring Lecture 2
Theory of Computer Science to Msc Students, Spring 2007 Lecture 2 Lecturer: Dorit Aharonov Scribe: Bar Shalem and Amitai Gilad Revised: Shahar Dobzinski, March 2007 1 BPP and NP The theory of computer
More informationReal Interactive Proofs for VPSPACE
Brandenburgische Technische Universität, Cottbus-Senftenberg, Germany Colloquium Logicum Hamburg, September 2016 joint work with M. Baartse 1. Introduction Blum-Shub-Smale model of computability and complexity
More informationAdvanced Combinatorial Optimization Feb 13 and 25, Lectures 4 and 6
18.438 Advanced Combinatorial Optimization Feb 13 and 25, 2014 Lectures 4 and 6 Lecturer: Michel X. Goemans Scribe: Zhenyu Liao and Michel X. Goemans Today, we will use an algebraic approach to solve the
More informationLecture 5 Polynomial Identity Testing
Lecture 5 Polynomial Identity Testing Michael P. Kim 18 April 2017 1 Outline and Motivation In this lecture we will cover a fundamental problem in complexity theory polynomial identity testing (PIT). We
More informationLecture 21: Algebraic Computation Models
princeton university cos 522: computational complexity Lecture 21: Algebraic Computation Models Lecturer: Sanjeev Arora Scribe:Loukas Georgiadis We think of numerical algorithms root-finding, gaussian
More informationSeparation of Complexity classes in Koiran s weak model
CENTRE DE RECERCA MATEMATICA INSTITUT D ESTUDIS CATALANS Apartat 50, E-08193 Bellaterra Separation of Complexity classes in Koiran s weak model F. Cucker M. Shub S. Smale Universitat Pompeu Fabra IBM T.
More informationCS151 Complexity Theory. Lecture 14 May 17, 2017
CS151 Complexity Theory Lecture 14 May 17, 2017 IP = PSPACE Theorem: (Shamir) IP = PSPACE Note: IP PSPACE enumerate all possible interactions, explicitly calculate acceptance probability interaction extremely
More informationVALIANT S MODEL AND THE COST OF COMPUTING INTEGERS
comput. complex. 13 (2004), 131 146 1016-3328/04/030131 16 DOI 10.1007/s00037-004-0186-2 c Birkhäuser Verlag, Basel 2004 computational complexity VALIANT S MODEL AND THE COST OF COMPUTING INTEGERS Pascal
More informationComplete problems for classes in PH, The Polynomial-Time Hierarchy (PH) oracle is like a subroutine, or function in
Oracle Turing Machines Nondeterministic OTM defined in the same way (transition relation, rather than function) oracle is like a subroutine, or function in your favorite PL but each call counts as single
More informationSatisfiability over Cross Product is NP
Satisfiability over Cross Product is NP º R -complete Christian Herrmann, Johanna Sokoli, Martin Ziegler Reminder: Complexity Theory P := { L {,1}* decidable in polynomial time } NP := { L verifiable in
More informationUmans Complexity Theory Lectures
Umans Complexity Theory Lectures Lecture 12: The Polynomial-Time Hierarchy Oracle Turing Machines Oracle Turing Machine (OTM): Deterministic multitape TM M with special query tape special states q?, q
More informationComputability and Complexity Theory: An Introduction
Computability and Complexity Theory: An Introduction meena@imsc.res.in http://www.imsc.res.in/ meena IMI-IISc, 20 July 2006 p. 1 Understanding Computation Kinds of questions we seek answers to: Is a given
More informationLocal properties of plane algebraic curves
Chapter 7 Local properties of plane algebraic curves Throughout this chapter let K be an algebraically closed field of characteristic zero, and as usual let A (K) be embedded into P (K) by identifying
More informationNovember 17, Recent Results on. Amir Shpilka Technion. PIT Survey Oberwolfach
1 Recent Results on Polynomial Identity Testing Amir Shpilka Technion Goal of talk Survey known results Explain proof techniques Give an interesting set of `accessible open questions 2 Talk outline Definition
More informationON THE COMPLEXITY OF NUMERICAL ANALYSIS
ON THE COMPLEXITY OF NUMERICAL ANALYSIS ERIC ALLENDER, PETER BÜRGISSER, JOHAN KJELDGAARD-PEDERSEN, AND PETER BRO MILTERSEN Abstract. We study two quite different approaches to understanding the complexity
More informationDRAFT. Complexity of counting. Chapter 8
Chapter 8 Complexity of counting It is an empirical fact that for many combinatorial problems the detection of the existence of a solution is easy, yet no computationally efficient method is known for
More informationCounting bases of representable matroids
Counting bases of representable matroids Michael Snook School of Mathematics, Statistics and Operations Research Victoria University of Wellington Wellington, New Zealand michael.snook@msor.vuw.ac.nz Submitted:
More information1 Randomized Computation
CS 6743 Lecture 17 1 Fall 2007 1 Randomized Computation Why is randomness useful? Imagine you have a stack of bank notes, with very few counterfeit ones. You want to choose a genuine bank note to pay at
More informationSYMMETRIC DETERMINANTAL REPRESENTATIONS IN CHARACTERISTIC 2
SYMMETRIC DETERMINANTAL REPRESENTATIONS IN CHARACTERISTIC 2 BRUNO GRENET, THIERRY MONTEIL, AND STÉPHAN THOMASSÉ Abstract. This paper studies Symmetric Determinantal Representations (SDR) in characteristic
More informationMatrix rigidity and elimination theory
Matrix rigidity and elimination theory Abhinav Kumar joint work with Satya Lokam, Vijay Patankar and Jalayal Sarma M.N. MIT April 25, 2012 Abhinav Kumar (MIT) Matrix rigidity and elimination theory April
More informationIntroduction Long transparent proofs The real PCP theorem. Real Number PCPs. Klaus Meer. Brandenburg University of Technology, Cottbus, Germany
Santaló s Summer School, Part 3, July, 2012 joint work with Martijn Baartse (work supported by DFG, GZ:ME 1424/7-1) Outline 1 Introduction 2 Long transparent proofs for NP R 3 The real PCP theorem First
More informationComputational Complexity: A Modern Approach. Draft of a book: Dated January 2007 Comments welcome!
i Computational Complexity: A Modern Approach Draft of a book: Dated January 2007 Comments welcome! Sanjeev Arora and Boaz Barak Princeton University complexitybook@gmail.com Not to be reproduced or distributed
More informationSymmetric Determinantal Representation of Weakly-Skew Circuits
Symmetric Determinantal Representation of Weakly-Skew Circuits Bruno Grenet 1,2, Erich L. Kaltofen 3, Pascal Koiran 1,2, and Natacha Portier 1,2 1 LIP, UMR 5668, ENS de Lyon CNRS UCBL INRIA École Normale
More informationQuantum Computing Lecture 8. Quantum Automata and Complexity
Quantum Computing Lecture 8 Quantum Automata and Complexity Maris Ozols Computational models and complexity Shor s algorithm solves, in polynomial time, a problem for which no classical polynomial time
More informationThe Polynomial Hierarchy
The Polynomial Hierarchy Slides based on S.Aurora, B.Barak. Complexity Theory: A Modern Approach. Ahto Buldas Ahto.Buldas@ut.ee Motivation..synthesizing circuits is exceedingly difficulty. It is even
More informationP = k T IME(n k ) Now, do all decidable languages belong to P? Let s consider a couple of languages:
CS 6505: Computability & Algorithms Lecture Notes for Week 5, Feb 8-12 P, NP, PSPACE, and PH A deterministic TM is said to be in SP ACE (s (n)) if it uses space O (s (n)) on inputs of length n. Additionally,
More informationLecture 22: Derandomization Implies Circuit Lower Bounds
Advanced Complexity Theory Spring 2016 Lecture 22: Derandomization Implies Circuit Lower Bounds Prof. Dana Moshkovitz 1 Overview In the last lecture we saw a proof presented by Madhu Sudan that E SIZE(2
More informationNP Complete Problems. COMP 215 Lecture 20
NP Complete Problems COMP 215 Lecture 20 Complexity Theory Complexity theory is a research area unto itself. The central project is classifying problems as either tractable or intractable. Tractable Worst
More informationCSC 5170: Theory of Computational Complexity Lecture 5 The Chinese University of Hong Kong 8 February 2010
CSC 5170: Theory of Computational Complexity Lecture 5 The Chinese University of Hong Kong 8 February 2010 So far our notion of realistic computation has been completely deterministic: The Turing Machine
More informationLecture Examples of problems which have randomized algorithms
6.841 Advanced Complexity Theory March 9, 2009 Lecture 10 Lecturer: Madhu Sudan Scribe: Asilata Bapat Meeting to talk about final projects on Wednesday, 11 March 2009, from 5pm to 7pm. Location: TBA. Includes
More information(x 1 +x 2 )(x 1 x 2 )+(x 2 +x 3 )(x 2 x 3 )+(x 3 +x 1 )(x 3 x 1 ).
CMPSCI611: Verifying Polynomial Identities Lecture 13 Here is a problem that has a polynomial-time randomized solution, but so far no poly-time deterministic solution. Let F be any field and let Q(x 1,...,
More informationSpace Complexity. Master Informatique. Université Paris 5 René Descartes. Master Info. Complexity Space 1/26
Space Complexity Master Informatique Université Paris 5 René Descartes 2016 Master Info. Complexity Space 1/26 Outline Basics on Space Complexity Main Space Complexity Classes Deterministic and Non-Deterministic
More informationProblem Set 2. Assigned: Mon. November. 23, 2015
Pseudorandomness Prof. Salil Vadhan Problem Set 2 Assigned: Mon. November. 23, 2015 Chi-Ning Chou Index Problem Progress 1 SchwartzZippel lemma 1/1 2 Robustness of the model 1/1 3 Zero error versus 1-sided
More informationLecture 22: Counting
CS 710: Complexity Theory 4/8/2010 Lecture 22: Counting Instructor: Dieter van Melkebeek Scribe: Phil Rydzewski & Chi Man Liu Last time we introduced extractors and discussed two methods to construct them.
More informationOn the Ring Isomorphism & Automorphism Problems
Electronic Colloquium on Computational Complexity, Report No. 109 (2004) On the Ring Isomorphism & Automorphism Problems Neeraj Kayal, Nitin Saxena {kayaln, nitinsa}@cse.iitk.ac.in National University
More informationPolynomials, Ideals, and Gröbner Bases
Polynomials, Ideals, and Gröbner Bases Notes by Bernd Sturmfels for the lecture on April 10, 2018, in the IMPRS Ringvorlesung Introduction to Nonlinear Algebra We fix a field K. Some examples of fields
More informationfsat We next show that if sat P, then fsat has a polynomial-time algorithm. c 2010 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 425
fsat fsat is this function problem: Let φ(x 1, x 2,..., x n ) be a boolean expression. If φ is satisfiable, then return a satisfying truth assignment. Otherwise, return no. We next show that if sat P,
More informationUmans Complexity Theory Lectures
Complexity Theory Umans Complexity Theory Lectures Lecture 1a: Problems and Languages Classify problems according to the computational resources required running time storage space parallelism randomness
More informationLecture 24: Randomized Complexity, Course Summary
6.045 Lecture 24: Randomized Complexity, Course Summary 1 1/4 1/16 1/4 1/4 1/32 1/16 1/32 Probabilistic TMs 1/16 A probabilistic TM M is a nondeterministic TM where: Each nondeterministic step is called
More informationSub-Linear Root Detection for Sparse Polynomials Over Finite Fields
1 / 27 Sub-Linear Root Detection for Sparse Polynomials Over Finite Fields Jingguo Bi Institute for Advanced Study Tsinghua University Beijing, China October, 2014 Vienna, Austria This is a joint work
More informationIntroduction to Interactive Proofs & The Sumcheck Protocol
CS294: Probabilistically Checkable and Interactive Proofs January 19, 2017 Introduction to Interactive Proofs & The Sumcheck Protocol Instructor: Alessandro Chiesa & Igor Shinkar Scribe: Pratyush Mishra
More informationThe space complexity of a standard Turing machine. The space complexity of a nondeterministic Turing machine
298 8. Space Complexity The space complexity of a standard Turing machine M = (Q,,,, q 0, accept, reject) on input w is space M (w) = max{ uav : q 0 w M u q av, q Q, u, a, v * } The space complexity of
More informationRECAP How to find a maximum matching?
RECAP How to find a maximum matching? First characterize maximum matchings A maximal matching cannot be enlarged by adding another edge. A maximum matching of G is one of maximum size. Example. Maximum
More informationQMA(2) workshop Tutorial 1. Bill Fefferman (QuICS)
QMA(2) workshop Tutorial 1 Bill Fefferman (QuICS) Agenda I. Basics II. Known results III. Open questions/next tutorial overview I. Basics I.1 Classical Complexity Theory P Class of problems efficiently
More informationPr[X = s Y = t] = Pr[X = s] Pr[Y = t]
Homework 4 By: John Steinberger Problem 1. Recall that a real n n matrix A is positive semidefinite if A is symmetric and x T Ax 0 for all x R n. Assume A is a real n n matrix. Show TFAE 1 : (a) A is positive
More informationLecture 8: Complete Problems for Other Complexity Classes
IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Basic Course on Computational Complexity Lecture 8: Complete Problems for Other Complexity Classes David Mix Barrington and Alexis Maciel
More informationSymmetric matrices and dot products
Symmetric matrices and dot products Proposition An n n matrix A is symmetric iff, for all x, y in R n, (Ax) y = x (Ay). Proof. If A is symmetric, then (Ax) y = x T A T y = x T Ay = x (Ay). If equality
More information1 The Low-Degree Testing Assumption
Advanced Complexity Theory Spring 2016 Lecture 17: PCP with Polylogarithmic Queries and Sum Check Prof. Dana Moshkovitz Scribes: Dana Moshkovitz & Michael Forbes Scribe Date: Fall 2010 In this lecture
More informationRational Univariate Reduction via Toric Resultants
Rational Univariate Reduction via Toric Resultants Koji Ouchi 1,2 John Keyser 1 Department of Computer Science, 3112 Texas A&M University, College Station, TX 77843-3112, USA Abstract We describe algorithms
More informationRandomized Algorithms. Lecture 4. Lecturer: Moni Naor Scribe by: Tamar Zondiner & Omer Tamuz Updated: November 25, 2010
Randomized Algorithms Lecture 4 Lecturer: Moni Naor Scribe by: Tamar Zondiner & Omer Tamuz Updated: November 25, 2010 1 Pairwise independent hash functions In the previous lecture we encountered two families
More informationGroebner Bases, Toric Ideals and Integer Programming: An Application to Economics. Tan Tran Junior Major-Economics& Mathematics
Groebner Bases, Toric Ideals and Integer Programming: An Application to Economics Tan Tran Junior Major-Economics& Mathematics History Groebner bases were developed by Buchberger in 1965, who later named
More informationComplexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler
Complexity Theory Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien 15 May, 2018 Reinhard
More information2 Evidence that Graph Isomorphism is not NP-complete
Topics in Theoretical Computer Science April 11, 2016 Lecturer: Ola Svensson Lecture 7 (Notes) Scribes: Ola Svensson Disclaimer: These notes were written for the lecturer only and may contain inconsistent
More informationNotes on Complexity Theory Last updated: November, Lecture 10
Notes on Complexity Theory Last updated: November, 2015 Lecture 10 Notes by Jonathan Katz, lightly edited by Dov Gordon. 1 Randomized Time Complexity 1.1 How Large is BPP? We know that P ZPP = RP corp
More informationOutline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181.
Complexity Theory Complexity Theory Outline Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität
More informationPermanent and Determinant
Permanent and Determinant non-identical twins Avi Wigderson IAS, Princeton Meet the twins F field, char(f) 2. X M n (F) matrix of variables X ij Det n (X) = σ Sn sgn(σ) i [n] X iσ(i) Per n (X) = σ Sn i
More informationLecture Notes Each circuit agrees with M on inputs of length equal to its index, i.e. n, x {0, 1} n, C n (x) = M(x).
CS 221: Computational Complexity Prof. Salil Vadhan Lecture Notes 4 February 3, 2010 Scribe: Jonathan Pines 1 Agenda P-/NP- Completeness NP-intermediate problems NP vs. co-np L, NL 2 Recap Last time, we
More informationCS Communication Complexity: Applications and New Directions
CS 2429 - Communication Complexity: Applications and New Directions Lecturer: Toniann Pitassi 1 Introduction In this course we will define the basic two-party model of communication, as introduced in the
More informationDefinition 1. NP is a class of language L such that there exists a poly time verifier V with
Lecture 9: MIP=NEXP Topics in Pseudorandomness and Complexity Theory (Spring 2017) Rutgers University Swastik Kopparty Scribe: Jinyoung Park 1 Introduction Definition 1. NP is a class of language L such
More informationOn Weak-Space Complexity over Complex Numbers
Electronic Colloquium on Computational Complexity, Report No. 87 (2017) On Weak-Space Complexity over Complex Numbers Pushkar S Joglekar 1, B. V. Raghavendra Rao 2, and Siddhartha Sivakumar 2 1 Vishwakarma
More informationA Note on the Karp-Lipton Collapse for the Exponential Hierarchy
A Note on the Karp-Lipton Collapse for the Exponential Hierarchy Chris Bourke Department of Computer Science & Engineering University of Nebraska Lincoln, NE 68503, USA Email: cbourke@cse.unl.edu January
More informationLecture 9: Polynomial-Time Hierarchy, Time-Space Tradeoffs
CSE 531: Computational Complexity I Winter 2016 Lecture 9: Polynomial-Time Hierarchy, Time-Space Tradeoffs Feb 3, 2016 Lecturer: Paul Beame Scribe: Paul Beame 1 The Polynomial-Time Hierarchy Last time
More informationLecture 7: The Polynomial-Time Hierarchy. 1 Nondeterministic Space is Closed under Complement
CS 710: Complexity Theory 9/29/2011 Lecture 7: The Polynomial-Time Hierarchy Instructor: Dieter van Melkebeek Scribe: Xi Wu In this lecture we first finish the discussion of space-bounded nondeterminism
More informationMeta-Algorithms vs. Circuit Lower Bounds Valentine Kabanets
Meta-Algorithms vs. Circuit Lower Bounds Valentine Kabanets Tokyo Institute of Technology & Simon Fraser University Understanding Efficiency Better understanding of Efficient Computation Good Algorithms
More informationAlgebraic dependence is not hard
Algebraic dependence is not hard and filling the GCT Chasm Nitin Saxena (CSE@IIT Kanpur, India) (Joint work with Zeyu Guo & Amit Sinhababu, CCC'18) 2018, Dagstuhl Overture Consider map f : F n F m. Problem
More informationNondeterministic Circuit Lower Bounds from Mildly Derandomizing Arthur-Merlin Games
Nondeterministic Circuit Lower Bounds from Mildly Derandomizing Arthur-Merlin Games Barış Aydınlıo glu Department of Computer Sciences University of Wisconsin Madison, WI 53706, USA baris@cs.wisc.edu Dieter
More informationHomework 8 Solutions to Selected Problems
Homework 8 Solutions to Selected Problems June 7, 01 1 Chapter 17, Problem Let f(x D[x] and suppose f(x is reducible in D[x]. That is, there exist polynomials g(x and h(x in D[x] such that g(x and h(x
More informationOSTROWSKI S THEOREM. Contents
OSTROWSKI S THEOREM GEUNHO GIM Contents. Ostrowski s theorem for Q 2. Ostrowski s theorem for number fields 2 3. Ostrowski s theorem for F T ) 4 References 5. Ostrowski s theorem for Q Definition.. A valuation
More informationFormalizing Randomized Matching Algorithms
Formalizing Randomized Matching Algorithms Stephen Cook Joint work with Dai Tri Man Lê Department of Computer Science University of Toronto Canada The Banff Workshop on Proof Complexity 2011 1 / 15 Feasible
More informationNotes on Complexity Theory Last updated: October, Lecture 6
Notes on Complexity Theory Last updated: October, 2015 Lecture 6 Notes by Jonathan Katz, lightly edited by Dov Gordon 1 PSPACE and PSPACE-Completeness As in our previous study of N P, it is useful to identify
More informationMore Completeness, conp, FNP,etc. CS254 Chris Pollett Oct 30, 2006.
More Completeness, conp, FNP,etc. CS254 Chris Pollett Oct 30, 2006. Outline A last complete problem for NP conp, conp NP Function problems MAX-CUT A cut in a graph G=(V,E) is a set of nodes S used to partition
More informationJASS 06 Report Summary. Circuit Complexity. Konstantin S. Ushakov. May 14, 2006
JASS 06 Report Summary Circuit Complexity Konstantin S. Ushakov May 14, 2006 Abstract Computer science deals with many computational models. In real life we have normal computers that are constructed using,
More informationLecture 23: Alternation vs. Counting
CS 710: Complexity Theory 4/13/010 Lecture 3: Alternation vs. Counting Instructor: Dieter van Melkebeek Scribe: Jeff Kinne & Mushfeq Khan We introduced counting complexity classes in the previous lecture
More informationExponential time vs probabilistic polynomial time
Exponential time vs probabilistic polynomial time Sylvain Perifel (LIAFA, Paris) Dagstuhl January 10, 2012 Introduction Probabilistic algorithms: can toss a coin polynomial time (worst case) probability
More informationMATH 323 Linear Algebra Lecture 12: Basis of a vector space (continued). Rank and nullity of a matrix.
MATH 323 Linear Algebra Lecture 12: Basis of a vector space (continued). Rank and nullity of a matrix. Basis Definition. Let V be a vector space. A linearly independent spanning set for V is called a basis.
More information2 Natural Proofs: a barrier for proving circuit lower bounds
Topics in Theoretical Computer Science April 4, 2016 Lecturer: Ola Svensson Lecture 6 (Notes) Scribes: Ola Svensson Disclaimer: These notes were written for the lecturer only and may contain inconsistent
More informationArthur-Merlin Streaming Complexity
Weizmann Institute of Science Joint work with Ran Raz Data Streams The data stream model is an abstraction commonly used for algorithms that process network traffic using sublinear space. A data stream
More informationCS 6505, Complexity and Algorithms Week 7: NP Completeness
CS 6505, Complexity and Algorithms Week 7: NP Completeness Reductions We have seen some problems in P and NP, and we ve talked about space complexity. The Space Hierarchy Theorem showed us that there are
More information: Computational Complexity Lecture 3 ITCS, Tsinghua Univesity, Fall October 2007
80240233: Computational Complexity Lecture 3 ITCS, Tsinghua Univesity, Fall 2007 16 October 2007 Instructor: Andrej Bogdanov Notes by: Jialin Zhang and Pinyan Lu In this lecture, we introduce the complexity
More informationReductions to Graph Isomorphism
Reductions to raph Isomorphism Jacobo Torán Institut für Theoretische Informatik Universität Ulm D-89069 Ulm, ermany jacobo.toran@uni-ulm.de June 13, 2008 Keywords: Computational complexity, reducibilities,
More informationNP-completeness was introduced by Stephen Cook in 1971 in a foundational paper.
NP Completeness NP-completeness was introduced by Stephen Cook in 1971 in a foundational paper. Leonid Levin independently introduced the same concept and proved that a variant of SAT is NP-complete. 1.
More informationA Potpourri of Nonlinear Algebra
a a 2 a 3 + c c 2 c 3 =2, a a 3 b 2 + c c 3 d 2 =0, a 2 a 3 b + c 2 c 3 d =0, a 3 b b 2 + c 3 d d 2 = 4, a a 2 b 3 + c c 2 d 3 =0, a b 2 b 3 + c d 2 d 3 = 4, a 2 b b 3 + c 2 d 3 d =4, b b 2 b 3 + d d 2
More informationAlgorithms for Algebraic Geometry
Chapter 2 Algorithms for Algebraic Geometry Outline: 1. Gröbner basics. 39 47 9 2. Algorithmic applications of Gröbner bases. 48 56 9 3. Resultants and Bézout s Theorem. 57 69 13 4. Solving equations with
More informationThe Shortest Vector Problem (Lattice Reduction Algorithms)
The Shortest Vector Problem (Lattice Reduction Algorithms) Approximation Algorithms by V. Vazirani, Chapter 27 - Problem statement, general discussion - Lattices: brief introduction - The Gauss algorithm
More informationUmans Complexity Theory Lectures
Umans Complexity Theory Lectures Lecture 8: Introduction to Randomized Complexity: - Randomized complexity classes, - Error reduction, - in P/poly - Reingold s Undirected Graph Reachability in RL Randomized
More informationTHE COMPLEXITY OF SEMILINEAR PROBLEMS IN SUCCINCT REPRESENTATION
THE COMPLEXITY OF SEMILINEAR PROBLEMS IN SUCCINCT REPRESENTATION Peter Bürgisser, Felipe Cucker, and Paulin Jacobé de Naurois Abstract We prove completeness results for twenty-three problems in semilinear
More informationA note on parallel and alternating time
Journal of Complexity 23 (2007) 594 602 www.elsevier.com/locate/jco A note on parallel and alternating time Felipe Cucker a,,1, Irénée Briquel b a Department of Mathematics, City University of Hong Kong,
More informationCircuits. Lecture 11 Uniform Circuit Complexity
Circuits Lecture 11 Uniform Circuit Complexity 1 Recall 2 Recall Non-uniform complexity 2 Recall Non-uniform complexity P/1 Decidable 2 Recall Non-uniform complexity P/1 Decidable NP P/log NP = P 2 Recall
More information: Error Correcting Codes. October 2017 Lecture 1
03683072: Error Correcting Codes. October 2017 Lecture 1 First Definitions and Basic Codes Amnon Ta-Shma and Dean Doron 1 Error Correcting Codes Basics Definition 1. An (n, K, d) q code is a subset of
More informationReal Interactive Proofs for VPSPACE
eal Interactive Proofs for VPSPACE Martijn Baartse 1 and Klaus Meer 2 1 Computer Science Institute, BTU Cottbus-Senftenberg Platz der Deutschen Einheit 1 D-03046 Cottbus, Germany 2 Computer Science Institute,
More informationExpander Construction in VNC 1
Expander Construction in VNC 1 Sam Buss joint work with Valentine Kabanets, Antonina Kolokolova & Michal Koucký Prague Workshop on Bounded Arithmetic November 2-3, 2017 Talk outline I. Combinatorial construction
More informationNP and conp. Theorem. Skoulakis Stratis NP,coNP and Funtion Problems EuroCG 14, Ein-Gedi, Israel 1 / 18
NP and conp Theorem Let L NP then there exists a polynomial decidable and balanced relation R L such that for all string x L: there exists a string y such that R L (x, y) if and only if x L. Skoulakis
More informationRandomized and Deterministic Algorithms. for the Dimension of Algebraic Varieties. Pascal Koiran. Laboratoire de l'informatique du Parallelisme
Randomized and Deterministic Algorithms for the Dimension of Algebraic Varieties Pascal Koiran Laboratoire de l'informatique du Parallelisme Ecole Normale Superieure de Lyon 69364 Lyon Cedex 07, France
More information