首页 > 最新文献

Electron. Colloquium Comput. Complex.最新文献

英文 中文
Black-box Identity Testing of Noncommutative Rational Formulas of Inversion Height Two in Deterministic Quasipolynomial-time 确定性拟多项式时间反演高度2的非交换有理公式的黑盒恒等式检验
Pub Date : 2022-02-11 DOI: 10.4230/LIPIcs.APPROX/RANDOM.2022.23
V. Arvind, Abhranil Chatterjee, P. Mukhopadhyay
Hrubev{s} and Wigderson (2015) initiated the complexity-theoretic study of noncommutative formulas with inverse gates. They introduced the Rational Identity Testing (RIT) problem which is to decide whether a noncommutative rational formula computes zero in the free skew field. In the white-box setting, deterministic polynomial-time algorithms are known for this problem following the works of Garg, Gurvits, Oliveira, and Wigderson (2016) and Ivanyos, Qiao, and Subrahmanyam (2018). A central open problem in this area is to design efficient deterministic black-box identity testing algorithm for rational formulas. In this paper, we solve this problem for the first nested inverse case. More precisely, we obtain a deterministic quasipolynomial-time black-box RIT algorithm for noncommutative rational formulas of inversion height two via a hitting set construction. Several new technical ideas are involved in the hitting set construction, including key concepts from matrix coefficient realization theory (Volv{c}iv{c}, 2018) and properties of cyclic division algebra (Lam, 2001). En route to the proof, an important step is to embed the hitting set of Forbes and Shpilka for noncommutative formulas (2013) inside a cyclic division algebra of small index.
Hrubev{s}和Wigderson(2015)开创了具有逆门的非交换公式的复杂性理论研究。他们引入了有理数恒等检验(RIT)问题,即判定非交换有理数公式在自由偏场中是否为零。在白盒环境中,确定性多项式时间算法在Garg, Gurvits, Oliveira, and Wigderson(2016)和Ivanyos, Qiao, and Subrahmanyam(2018)的工作之后被称为这个问题。该领域的一个核心开放问题是为有理公式设计高效的确定性黑盒恒等式检验算法。在本文中,我们解决了第一种嵌套逆情况下的这个问题。更精确地说,我们通过一个碰撞集构造得到了反演高度为2的非交换有理公式的确定性拟多项式时间黑箱RIT算法。撞击集的构造涉及了几个新的技术思想,包括矩阵系数实现理论(Volv{c}iv{c}, 2018)和循环除法代数性质(Lam, 2001)中的关键概念。在证明的过程中,一个重要的步骤是将Forbes和Shpilka的非交换公式(2013)的命中集嵌入到一个小指数的循环除法代数中。
{"title":"Black-box Identity Testing of Noncommutative Rational Formulas of Inversion Height Two in Deterministic Quasipolynomial-time","authors":"V. Arvind, Abhranil Chatterjee, P. Mukhopadhyay","doi":"10.4230/LIPIcs.APPROX/RANDOM.2022.23","DOIUrl":"https://doi.org/10.4230/LIPIcs.APPROX/RANDOM.2022.23","url":null,"abstract":"Hrubev{s} and Wigderson (2015) initiated the complexity-theoretic study of noncommutative formulas with inverse gates. They introduced the Rational Identity Testing (RIT) problem which is to decide whether a noncommutative rational formula computes zero in the free skew field. In the white-box setting, deterministic polynomial-time algorithms are known for this problem following the works of Garg, Gurvits, Oliveira, and Wigderson (2016) and Ivanyos, Qiao, and Subrahmanyam (2018). A central open problem in this area is to design efficient deterministic black-box identity testing algorithm for rational formulas. In this paper, we solve this problem for the first nested inverse case. More precisely, we obtain a deterministic quasipolynomial-time black-box RIT algorithm for noncommutative rational formulas of inversion height two via a hitting set construction. Several new technical ideas are involved in the hitting set construction, including key concepts from matrix coefficient realization theory (Volv{c}iv{c}, 2018) and properties of cyclic division algebra (Lam, 2001). En route to the proof, an important step is to embed the hitting set of Forbes and Shpilka for noncommutative formulas (2013) inside a cyclic division algebra of small index.","PeriodicalId":11639,"journal":{"name":"Electron. Colloquium Comput. Complex.","volume":"57 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76623603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards Multi-Pass Streaming Lower Bounds for Optimal Approximation of Max-Cut 基于多通道流下限的最优逼近Max-Cut
Pub Date : 2022-01-01 DOI: 10.1137/1.9781611977554.ch35
Lijie Chen, Gillat Kol, Dmitry Paramonov, Raghuvansh R. Saxena, Zhao Song, Huacheng Yu
We consider the Max-Cut problem, asking how much space is needed by a streaming algorithm in order to estimate the value of the maximum cut in a graph. This problem has been extensively studied over the last decade, and we now have a near-optimal lower bound for one-pass streaming algorithms, showing that they require linear space to guarantee a better-than-2 approximation [KKS15, KK19]. This result relies on a lower bound for the cycle-finding problem, showing that it is hard for a one-pass streaming algorithm to find a cycle in a union of matchings. The end-goal of our research is to prove a similar lower bound for multi-pass streaming algorithms that guarantee a better-than-2 approximation for Max-Cut, a highly challenging open problem. In this paper, we take a significant step in this direction, showing that even o(log n)-pass streaming algorithms need nΩ(1) space to solve the cycle-finding problem. Our proof is quite involved, dividing the cycles in the graph into “short” and “long” cycles, and using tailor-made lower bound techniques to handle each case. ∗UC Berkeley. †Princeton University. ‡Princeton University. §Microsoft Research. ¶Adobe Research. ‖Princeton University. ISSN 1433-8092 Electronic Colloquium on Computational Complexity, Report No. 161 (2022)
我们考虑最大切割问题,询问流算法需要多少空间才能估计图中最大切割的值。在过去的十年中,这个问题得到了广泛的研究,我们现在有了单次流算法的近最优下界,表明它们需要线性空间来保证优于2的近似[KKS15, KK19]。该结果依赖于循环查找问题的下界,表明单遍流算法很难在匹配的并集中找到循环。我们研究的最终目标是证明多通道流算法的类似下界,以保证Max-Cut的近似优于2,这是一个非常具有挑战性的开放问题。在本文中,我们在这个方向上迈出了重要的一步,表明即使o(log n)次流算法也需要nΩ(1)空间来解决寻环问题。我们的证明相当复杂,将图中的周期划分为“短”和“长”周期,并使用定制的下界技术来处理每种情况。∗加州大学伯克利分校。__普林斯顿大学。‡普林斯顿大学。§微软研究院。¶Adobe的研究。为普林斯顿大学。计算复杂性电子学术讨论会,报告No. 161 (2022)
{"title":"Towards Multi-Pass Streaming Lower Bounds for Optimal Approximation of Max-Cut","authors":"Lijie Chen, Gillat Kol, Dmitry Paramonov, Raghuvansh R. Saxena, Zhao Song, Huacheng Yu","doi":"10.1137/1.9781611977554.ch35","DOIUrl":"https://doi.org/10.1137/1.9781611977554.ch35","url":null,"abstract":"We consider the Max-Cut problem, asking how much space is needed by a streaming algorithm in order to estimate the value of the maximum cut in a graph. This problem has been extensively studied over the last decade, and we now have a near-optimal lower bound for one-pass streaming algorithms, showing that they require linear space to guarantee a better-than-2 approximation [KKS15, KK19]. This result relies on a lower bound for the cycle-finding problem, showing that it is hard for a one-pass streaming algorithm to find a cycle in a union of matchings. The end-goal of our research is to prove a similar lower bound for multi-pass streaming algorithms that guarantee a better-than-2 approximation for Max-Cut, a highly challenging open problem. In this paper, we take a significant step in this direction, showing that even o(log n)-pass streaming algorithms need nΩ(1) space to solve the cycle-finding problem. Our proof is quite involved, dividing the cycles in the graph into “short” and “long” cycles, and using tailor-made lower bound techniques to handle each case. ∗UC Berkeley. †Princeton University. ‡Princeton University. §Microsoft Research. ¶Adobe Research. ‖Princeton University. ISSN 1433-8092 Electronic Colloquium on Computational Complexity, Report No. 161 (2022)","PeriodicalId":11639,"journal":{"name":"Electron. Colloquium Comput. Complex.","volume":"276 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79160115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
(Nondeterministic) Hardness vs. Non-Malleability (不确定性)硬度与非延展性
Pub Date : 2022-01-01 DOI: 10.1007/978-3-031-15802-5_6
Marshall Ball, D. Dachman-Soled, J. Loss
{"title":"(Nondeterministic) Hardness vs. Non-Malleability","authors":"Marshall Ball, D. Dachman-Soled, J. Loss","doi":"10.1007/978-3-031-15802-5_6","DOIUrl":"https://doi.org/10.1007/978-3-031-15802-5_6","url":null,"abstract":"","PeriodicalId":11639,"journal":{"name":"Electron. Colloquium Comput. Complex.","volume":"100 1","pages":"148-177"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79326813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Complexity of Average-Case Dynamic Subgraph Counting 平均情况下动态子图计数的复杂度
Pub Date : 2022-01-01 DOI: 10.1137/1.9781611977073.23
M. Henzinger, Andrea Lincoln, B. Saha
Statistics of small subgraph counts such as triangles, four-cycles, and s - t paths of short lengths reveal important structural properties of the underlying graph. These problems have been widely studied in social network analysis. In most relevant applications, the graphs are not only massive but also change dynamically over time. Most of these problems become hard in the dynamic setting when considering the worst case. In this paper, we ask whether the question of small subgraph counting over dynamic graphs is hard also in the average case. We consider the simplest possible average case model where the updates follow an Erd˝os-R´enyi graph: each update selects a pair of vertices ( u , v ) uniformly at random and flips the existence of the edge ( u , v ) . We develop new lower bounds and matching algorithms in this model for counting four-cycles, counting triangles through a specified point s , or a random queried point, and st paths of length 3, 4 and 5. Our results indicate while computing st paths of length 3, and 4 are easy in the average case with O ( 1 ) update time (note that they are hard in the worst case), it becomes hard when considering st paths of length 5. We introduce new techniques which allow us to get average-case hardness for these graph problems from the worst-case hardness of the Online Matrix vector problem (OMv). Our techniques rely on recent advances in fine-grained average-case complexity. Our techniques advance this literature, giving the ability to prove new lower bounds on average-case dynamic algorithms.
小子图计数的统计,如三角形、四圈和短长度的s - t路径,揭示了底层图的重要结构特性。这些问题在社会网络分析中得到了广泛的研究。在大多数相关的应用程序中,图不仅非常庞大,而且还会随时间动态变化。当考虑到最坏的情况时,大多数这些问题在动态环境中变得困难。在本文中,我们讨论了在平均情况下动态图上的小子图计数问题是否也很困难。我们考虑最简单的可能的平均情况模型,其中更新遵循Erd ' os ' - r ' enyi图:每次更新随机均匀地选择一对顶点(u, v)并翻转边缘(u, v)的存在性。在该模型中,我们开发了新的下界和匹配算法,用于计数四个循环,计数经过指定点s或随机查询点的三角形,以及长度为3,4,5的st路径。我们的结果表明,虽然计算长度为3和4的st条路径在O(1)更新时间的平均情况下很容易(注意,在最坏情况下它们很难),但考虑长度为5的st条路径时就变得困难了。我们引入了新的技术,使我们能够从在线矩阵向量问题(OMv)的最坏情况硬度得到这些图问题的平均情况硬度。我们的技术依赖于细粒度平均情况复杂性的最新进展。我们的技术推进了这一文献,提供了证明平均情况下动态算法的新下界的能力。
{"title":"The Complexity of Average-Case Dynamic Subgraph Counting","authors":"M. Henzinger, Andrea Lincoln, B. Saha","doi":"10.1137/1.9781611977073.23","DOIUrl":"https://doi.org/10.1137/1.9781611977073.23","url":null,"abstract":"Statistics of small subgraph counts such as triangles, four-cycles, and s - t paths of short lengths reveal important structural properties of the underlying graph. These problems have been widely studied in social network analysis. In most relevant applications, the graphs are not only massive but also change dynamically over time. Most of these problems become hard in the dynamic setting when considering the worst case. In this paper, we ask whether the question of small subgraph counting over dynamic graphs is hard also in the average case. We consider the simplest possible average case model where the updates follow an Erd˝os-R´enyi graph: each update selects a pair of vertices ( u , v ) uniformly at random and flips the existence of the edge ( u , v ) . We develop new lower bounds and matching algorithms in this model for counting four-cycles, counting triangles through a specified point s , or a random queried point, and st paths of length 3, 4 and 5. Our results indicate while computing st paths of length 3, and 4 are easy in the average case with O ( 1 ) update time (note that they are hard in the worst case), it becomes hard when considering st paths of length 5. We introduce new techniques which allow us to get average-case hardness for these graph problems from the worst-case hardness of the Online Matrix vector problem (OMv). Our techniques rely on recent advances in fine-grained average-case complexity. Our techniques advance this literature, giving the ability to prove new lower bounds on average-case dynamic algorithms.","PeriodicalId":11639,"journal":{"name":"Electron. Colloquium Comput. Complex.","volume":"67 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76789411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Noisy Radio Network Lower Bounds via Noiseless Beeping Lower Bounds 基于无噪声蜂鸣声的噪声无线网络下界
Pub Date : 2022-01-01 DOI: 10.4230/LIPIcs.ITCS.2023.46
K. Efremenko, Gillat Kol, Dmitry Paramonov, Raghuvansh R. Saxena
Much of today’s communication is carried out over large wireless systems with different input-output behaviors. In this work, we compare the power of central abstractions of wireless communication through the general notion of boolean symmetric f -channels : In every round of the f -channel, each of its n parties decides to either broadcast or not, and the channel outputs f ( m ), where m is the number of broadcasting parties. Our first result is that the well studied beeping channel , where f is the threshold-1 function, is not stronger than any other f -channel. To this end, we design a protocol over the f -channel and prove that any protocol that simulates it over the beeping channel blows up the round complexity by a factor of Ω(log n ). Our lower bound technique may be of independent interest, as it essentially generalizes the popular fooling set technique by exploiting a “local” relaxation of combinatorial rectangles. Curiously, while this result shows the limitations of a noiseless channel, namely, the beeping channel, we are able to use it to show the limitations of the noisy version of many other channels. This includes the extensively studied single-hop radio network model with collisions-as-silence (CAS), which is equivalent to the f -channel with f ( m ) = 1 iff m = 1. In particular, our second and main result, obtained from the first, shows that converting CAS protocols to noise resilient ones may incur a large performance overhead, i.e., no constant rate interactive code exists. To this end, we design a CAS protocol and prove that any protocol that simulates it over the noisy CAS model with correlated stochastic noise, blows up the round complexity by a factor of Ω(log n ). We mention that the Ω(log n ) overhead in both our results is tight.
今天的大部分通信都是通过具有不同输入输出行为的大型无线系统进行的。在这项工作中,我们通过布尔对称f -信道的一般概念来比较无线通信的中心抽象的能力:在f -信道的每一轮中,它的n方中的每一方决定是否广播,并且信道输出f (m),其中m是广播方的数量。我们的第一个结果是,经过充分研究的蜂鸣声通道(其中f是阈值-1函数)并不比任何其他f通道强。为此,我们在f通道上设计了一个协议,并证明任何在蜂鸣声通道上模拟它的协议都会将轮复杂度提高Ω(log n)。我们的下界技术可能是独立的兴趣,因为它本质上是通过利用组合矩形的“局部”松弛来推广流行的愚弄集技术。奇怪的是,虽然这个结果显示了无噪声信道,即蜂鸣声信道的局限性,但我们可以用它来显示许多其他信道的有噪声版本的局限性。这包括被广泛研究的具有碰撞即沉默(CAS)的单跳无线网络模型,它相当于f (m) = 1的f (m) = 1的f -信道。特别是,我们从第一个得到的第二个和主要结果表明,将CAS协议转换为具有噪声弹性的协议可能会产生很大的性能开销,即不存在恒速率交互代码。为此,我们设计了一个CAS协议,并证明了任何协议在具有相关随机噪声的CAS模型上模拟它,都会将轮复杂度提高Ω(log n)。我们提到Ω(log n)的开销在我们的两个结果中都很紧凑。
{"title":"Noisy Radio Network Lower Bounds via Noiseless Beeping Lower Bounds","authors":"K. Efremenko, Gillat Kol, Dmitry Paramonov, Raghuvansh R. Saxena","doi":"10.4230/LIPIcs.ITCS.2023.46","DOIUrl":"https://doi.org/10.4230/LIPIcs.ITCS.2023.46","url":null,"abstract":"Much of today’s communication is carried out over large wireless systems with different input-output behaviors. In this work, we compare the power of central abstractions of wireless communication through the general notion of boolean symmetric f -channels : In every round of the f -channel, each of its n parties decides to either broadcast or not, and the channel outputs f ( m ), where m is the number of broadcasting parties. Our first result is that the well studied beeping channel , where f is the threshold-1 function, is not stronger than any other f -channel. To this end, we design a protocol over the f -channel and prove that any protocol that simulates it over the beeping channel blows up the round complexity by a factor of Ω(log n ). Our lower bound technique may be of independent interest, as it essentially generalizes the popular fooling set technique by exploiting a “local” relaxation of combinatorial rectangles. Curiously, while this result shows the limitations of a noiseless channel, namely, the beeping channel, we are able to use it to show the limitations of the noisy version of many other channels. This includes the extensively studied single-hop radio network model with collisions-as-silence (CAS), which is equivalent to the f -channel with f ( m ) = 1 iff m = 1. In particular, our second and main result, obtained from the first, shows that converting CAS protocols to noise resilient ones may incur a large performance overhead, i.e., no constant rate interactive code exists. To this end, we design a CAS protocol and prove that any protocol that simulates it over the noisy CAS model with correlated stochastic noise, blows up the round complexity by a factor of Ω(log n ). We mention that the Ω(log n ) overhead in both our results is tight.","PeriodicalId":11639,"journal":{"name":"Electron. Colloquium Comput. Complex.","volume":"59 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89187776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Non-Adaptive Proper Learning Polynomials 非自适应适当学习多项式
Pub Date : 2022-01-01 DOI: 10.4230/LIPIcs.STACS.2023.16
N. Bshouty
We give the first polynomial-time non-adaptive proper learning algorithm of Boolean sparse multivariate polynomial under the uniform distribution. Our algorithm, for s -sparse polynomial over n variables, makes q = ( s/ϵ ) γ ( s,ϵ ) log n queries where 2 . 66 ≤ γ ( s, ϵ ) ≤ 6 . 922 and runs in ˜ O ( n ) · poly ( s, 1 /ϵ ) time. We also show that for any ϵ = 1 /s O (1) any non-adaptive learning algorithm must make at least ( s/ϵ ) Ω(1) log n queries. Therefore, the query complexity of our algorithm is also polynomial in the optimal query complexity and optimal in n .
给出了布尔稀疏多元多项式在均匀分布下的第一个多项式时间非自适应适当学习算法。我们的算法,对于n个变量上的s -稀疏多项式,使q = (s/ λ) γ (s, λ) log n个查询,其中2。66≤γ (s, λ)≤6。922,运行时间为~ O (n)·poly (s, 1 / ε)。我们还表明,对于任何一个λ = 1 /s O(1),任何非自适应学习算法必须至少进行(s/ λ) Ω(1) log n次查询。因此,我们算法的查询复杂度在最优查询复杂度中也是多项式,在n中也是最优的。
{"title":"Non-Adaptive Proper Learning Polynomials","authors":"N. Bshouty","doi":"10.4230/LIPIcs.STACS.2023.16","DOIUrl":"https://doi.org/10.4230/LIPIcs.STACS.2023.16","url":null,"abstract":"We give the first polynomial-time non-adaptive proper learning algorithm of Boolean sparse multivariate polynomial under the uniform distribution. Our algorithm, for s -sparse polynomial over n variables, makes q = ( s/ϵ ) γ ( s,ϵ ) log n queries where 2 . 66 ≤ γ ( s, ϵ ) ≤ 6 . 922 and runs in ˜ O ( n ) · poly ( s, 1 /ϵ ) time. We also show that for any ϵ = 1 /s O (1) any non-adaptive learning algorithm must make at least ( s/ϵ ) Ω(1) log n queries. Therefore, the query complexity of our algorithm is also polynomial in the optimal query complexity and optimal in n .","PeriodicalId":11639,"journal":{"name":"Electron. Colloquium Comput. Complex.","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90624721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On Solving Sparse Polynomial Factorization Related Problems 稀疏多项式分解相关问题的求解
Pub Date : 2022-01-01 DOI: 10.4230/LIPIcs.FSTTCS.2022.10
Pranav Bisht, Ilya Volkovich
In a recent result of Bhargava, Saraf and Volkovich [FOCS’18; JACM’20], the first factor sparsity bound for constant individual degree polynomials was shown. In particular, it was shown that any factor of a polynomial with at most s terms and individual degree bounded by d can itself have at most s O ( d 2 log n ) terms. It is conjectured, though, that the “true” sparsity bound should be polynomial (i.e. s poly( d ) ). In this paper we provide supporting evidence for this conjecture by presenting polynomial-time algorithms for several problems that would be implied by a polynomial-size sparsity bound. In particular, we give efficient (deterministic) algorithms for identity testing of Σ [2] ΠΣΠ [ ind - deg d ] circuits and testing if a sparse polynomial is an exact power. Hence, our algorithms rely on different techniques.
在Bhargava, Saraf和Volkovich [FOCS ' 18;JACM ' 20]给出了常单次多项式的第一因子稀疏性界。特别地,证明了多项式的任何因子最多有s项,且单个次以d为界,其本身最多有s O (d2 log n)项。据推测,“真正的”稀疏性界应该是多项式(即s poly(d))。在本文中,我们通过提出多项式时间算法来支持这一猜想,这些算法将隐含在一个多项式大小的稀疏性界中。特别地,我们给出了有效的(确定性的)算法来测试Σ [2] ΠΣΠ [ind - deg]电路的同一性,以及测试稀疏多项式是否为精确幂。因此,我们的算法依赖于不同的技术。
{"title":"On Solving Sparse Polynomial Factorization Related Problems","authors":"Pranav Bisht, Ilya Volkovich","doi":"10.4230/LIPIcs.FSTTCS.2022.10","DOIUrl":"https://doi.org/10.4230/LIPIcs.FSTTCS.2022.10","url":null,"abstract":"In a recent result of Bhargava, Saraf and Volkovich [FOCS’18; JACM’20], the first factor sparsity bound for constant individual degree polynomials was shown. In particular, it was shown that any factor of a polynomial with at most s terms and individual degree bounded by d can itself have at most s O ( d 2 log n ) terms. It is conjectured, though, that the “true” sparsity bound should be polynomial (i.e. s poly( d ) ). In this paper we provide supporting evidence for this conjecture by presenting polynomial-time algorithms for several problems that would be implied by a polynomial-size sparsity bound. In particular, we give efficient (deterministic) algorithms for identity testing of Σ [2] ΠΣΠ [ ind - deg d ] circuits and testing if a sparse polynomial is an exact power. Hence, our algorithms rely on different techniques.","PeriodicalId":11639,"journal":{"name":"Electron. Colloquium Comput. Complex.","volume":"PC-20 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84835735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On Interactive Proofs of Proximity with Proof-Oblivious Queries 基于无关证明查询的邻近性交互证明
Pub Date : 2022-01-01 DOI: 10.4230/LIPIcs.ITCS.2023.59
O. Goldreich, G. Rothblum, Tal Skverer
Interactive proofs of proximity (IPPs) offer ultra-fast approximate verification of assertions regarding their input, where ultra-fast means that only a small portion of the input is read and approximate verification is analogous to the notion of approximate decision that underlies property testing. Specifically, in an IPP, the prover can make the verifier accept each input in the property, but cannot fool the verifier into accepting an input that is far from the property (except for with small probability). The verifier in an IPP system engages in two very different types of activities: interacting with an untrusted prover, and querying its input. The definition allows for arbitrary coordination between these two activities, but keeping them separate is both conceptually interesting and necessary for important applications such as addressing temporal considerations (i.e., at what time is each of the services available) and facilitating the construction of zero-knowledge schemes. In this work we embark on a systematic study of IPPs with proof-oblivious queries, where the queries should not be affected by the interaction with the prover. We assign the query and interaction activities to separate modules, and consider different limitations on their coordination. The most strict limitation requires these activities to be totally isolated from one another; they just feed their views to a separate deciding module. We show that such systems can be efficiently emulated by standard testers. Going to the other extreme, we only disallow information to flow from the interacting module to the querying module, but allow free information flow in the other direction. We show that extremely efficient one-round (i.e., two-message) systems of such type can be used to verify properties that are extremely hard to test (without the help of a prover). That is, the complexity of verifying can be polylogarithmic in the complexity of testing. This stands in contrast the MAPs (viewed as 1 / 2-round systems) in which proof-oblivious queries are as limited as our isolated model. Our focus is on an intermediate model that allows shared randomness between the querying and interacting modules but no information flow between them. In this case we show that 1-round systems are efficiently emulated by standard testers but 3 / 2-round systems of extremely low complexity exist for properties that are extremely hard to test. One additional result about this model is that it can efficiently emulate any IPP for any property of low-degree polynomials.
交互式接近证明(ipp)提供了关于其输入的断言的超快近似验证,其中超快意味着只有一小部分输入被读取,近似验证类似于作为属性测试基础的近似决策的概念。具体来说,在IPP中,证明者可以让验证者接受属性中的每个输入,但不能欺骗验证者接受远离属性的输入(小概率除外)。IPP系统中的验证者从事两种非常不同类型的活动:与不受信任的证明者交互,以及查询其输入。该定义允许在这两个活动之间进行任意的协调,但是保持它们的分离在概念上是有趣的,并且对于重要的应用程序是必要的,例如处理时间考虑(即,每个服务在什么时候可用)和促进零知识方案的构建。在这项工作中,我们开始系统地研究具有证明无关查询的ipp,其中查询不应受到与证明者交互的影响。我们将查询和交互活动分配给单独的模块,并考虑它们之间协调的不同限制。最严格的限制要求这些活动彼此完全隔离;它们只是将自己的视图提供给一个单独的决策模块。我们证明了这种系统可以通过标准测试器有效地模拟。走到另一个极端,我们只允许信息从交互模块流向查询模块,而允许信息在另一个方向自由流动。我们展示了这种类型的极其有效的单轮(即双消息)系统可以用于验证极其难以测试的属性(没有证明者的帮助)。也就是说,验证的复杂性在测试的复杂性中可以是多对数的。这与map(被视为1 / 2轮系统)形成对比,在map中,无关证明查询与我们的孤立模型一样有限。我们的重点是一个中间模型,它允许查询和交互模块之间共享随机性,但它们之间没有信息流。在这种情况下,我们展示了1轮系统可以被标准测试人员有效地模拟,但对于那些很难测试的属性,存在极低复杂性的3 / 2轮系统。该模型的另一个结果是它可以有效地模拟低次多项式的任意性质的任意IPP。
{"title":"On Interactive Proofs of Proximity with Proof-Oblivious Queries","authors":"O. Goldreich, G. Rothblum, Tal Skverer","doi":"10.4230/LIPIcs.ITCS.2023.59","DOIUrl":"https://doi.org/10.4230/LIPIcs.ITCS.2023.59","url":null,"abstract":"Interactive proofs of proximity (IPPs) offer ultra-fast approximate verification of assertions regarding their input, where ultra-fast means that only a small portion of the input is read and approximate verification is analogous to the notion of approximate decision that underlies property testing. Specifically, in an IPP, the prover can make the verifier accept each input in the property, but cannot fool the verifier into accepting an input that is far from the property (except for with small probability). The verifier in an IPP system engages in two very different types of activities: interacting with an untrusted prover, and querying its input. The definition allows for arbitrary coordination between these two activities, but keeping them separate is both conceptually interesting and necessary for important applications such as addressing temporal considerations (i.e., at what time is each of the services available) and facilitating the construction of zero-knowledge schemes. In this work we embark on a systematic study of IPPs with proof-oblivious queries, where the queries should not be affected by the interaction with the prover. We assign the query and interaction activities to separate modules, and consider different limitations on their coordination. The most strict limitation requires these activities to be totally isolated from one another; they just feed their views to a separate deciding module. We show that such systems can be efficiently emulated by standard testers. Going to the other extreme, we only disallow information to flow from the interacting module to the querying module, but allow free information flow in the other direction. We show that extremely efficient one-round (i.e., two-message) systems of such type can be used to verify properties that are extremely hard to test (without the help of a prover). That is, the complexity of verifying can be polylogarithmic in the complexity of testing. This stands in contrast the MAPs (viewed as 1 / 2-round systems) in which proof-oblivious queries are as limited as our isolated model. Our focus is on an intermediate model that allows shared randomness between the querying and interacting modules but no information flow between them. In this case we show that 1-round systems are efficiently emulated by standard testers but 3 / 2-round systems of extremely low complexity exist for properties that are extremely hard to test. One additional result about this model is that it can efficiently emulate any IPP for any property of low-degree polynomials.","PeriodicalId":11639,"journal":{"name":"Electron. Colloquium Comput. Complex.","volume":"20 1","pages":"59:1-59:16"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84076491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Spectral Expanding Expanders 光谱膨胀器
Pub Date : 2022-01-01 DOI: 10.4230/LIPIcs.CCC.2023.8
Gil Cohen, Itay Cohen
Dinitz, Schapira, and Valadarsky [DSV17] introduced the intriguing notion of expanding expanders – a family of expander graphs with the property that every two consecutive graphs in the family differ only on a small number of edges. Such a family allows one to add and remove vertices with only few edge updates, making them useful in dynamic settings such as for datacenter network topologies and for the design of distributed algorithms for self-healing expanders. [DSV17] constructed explicit expanding-expanders based on the Bilu-Linial construction of spectral expanders [BL06]. The construction of expanding expanders, however, ends up being of edge expanders, thus, an open problem raised by [DSV17] is to construct spectral expanding expanders (SEE). In this work, we resolve this question by constructing SEE with spectral expansion which, like [BL06], is optimal up to a poly-logarithmic factor, and the number of edge updates is optimal up to a constant. We further give a simple proof for the existence of SEE that are close to Ramanujan up to a small additive term. As in [DSV17], our construction is based on interpolating between a graph and its lift. However, to establish spectral expansion, we carefully weigh the interpolated graphs, dubbed partial lifts, in a way that enables us to conduct a delicate analysis of their spectrum. In particular, at a crucial point in the analysis, we consider the eigenvectors structure of the partial lifts.
Dinitz, Schapira和Valadarsky [DSV17]引入了一个有趣的扩展扩展图的概念——一组扩展图,其性质是该族中每两个连续图只在少数边上不同。这样的一个系列允许只需要很少的边缘更新就可以添加和删除顶点,这使得它们在动态设置中非常有用,例如对于数据中心网络拓扑和用于自修复扩展器的分布式算法的设计。[DSV17]基于光谱膨胀器的Bilu-Linial结构构建了显式膨胀膨胀器[BL06]。然而,膨胀膨胀器的构造最终是边缘膨胀器,因此,[DSV17]提出的一个开放问题是构造谱膨胀膨胀器(SEE)。在这项工作中,我们通过构建具有光谱展开的SEE来解决这个问题,该光谱展开与[BL06]一样,在多对数因子范围内是最优的,并且边缘更新的数量在常量范围内是最优的。我们进一步给出了一个简单的证明,证明了在一个小的可加项范围内接近Ramanujan的SEE的存在性。就像在[DSV17]中一样,我们的构造是基于图和它的提升之间的插值。然而,为了建立光谱展开,我们仔细地权衡了插值图,称为部分提升,以一种使我们能够对其光谱进行精细分析的方式。特别地,在分析的关键点上,我们考虑了部分提升的特征向量结构。
{"title":"Spectral Expanding Expanders","authors":"Gil Cohen, Itay Cohen","doi":"10.4230/LIPIcs.CCC.2023.8","DOIUrl":"https://doi.org/10.4230/LIPIcs.CCC.2023.8","url":null,"abstract":"Dinitz, Schapira, and Valadarsky [DSV17] introduced the intriguing notion of expanding expanders – a family of expander graphs with the property that every two consecutive graphs in the family differ only on a small number of edges. Such a family allows one to add and remove vertices with only few edge updates, making them useful in dynamic settings such as for datacenter network topologies and for the design of distributed algorithms for self-healing expanders. [DSV17] constructed explicit expanding-expanders based on the Bilu-Linial construction of spectral expanders [BL06]. The construction of expanding expanders, however, ends up being of edge expanders, thus, an open problem raised by [DSV17] is to construct spectral expanding expanders (SEE). In this work, we resolve this question by constructing SEE with spectral expansion which, like [BL06], is optimal up to a poly-logarithmic factor, and the number of edge updates is optimal up to a constant. We further give a simple proof for the existence of SEE that are close to Ramanujan up to a small additive term. As in [DSV17], our construction is based on interpolating between a graph and its lift. However, to establish spectral expansion, we carefully weigh the interpolated graphs, dubbed partial lifts, in a way that enables us to conduct a delicate analysis of their spectrum. In particular, at a crucial point in the analysis, we consider the eigenvectors structure of the partial lifts.","PeriodicalId":11639,"journal":{"name":"Electron. Colloquium Comput. Complex.","volume":"38 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77639209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved local testing for multiplicity codes 改进了多重代码的本地测试
Pub Date : 2022-01-01 DOI: 10.4230/LIPIcs.APPROX/RANDOM.2022.11
Dan Karliner, A. Ta-Shma
Multiplicity codes are a generalization of Reed-Muller codes which include derivatives as well as the values of low degree polynomials, evaluated in every point in F mp . Similarly to Reed-Muller codes, multiplicity codes have a local nature that allows for local correction and local testing. Recently, [6] showed that the plane test , which tests the degree of the codeword on a random plane, is a good local tester for small enough degrees . In this work we simplify and extend the analysis of local testing for multiplicity codes, giving a more general and tight analysis. In particular, we show that multiplicity codes MRM p ( m, d, s ) over prime fields with arbitrary d are locally testable by an appropriate k -flat test , which tests the degree of the codeword on a random k -dimensional affine subspace. The relationship between the degree parameter d and the required dimension k is shown to be nearly optimal, and improves on [6] in the case of planes. Our analysis relies on a generalization of the technique of canonincal monomials introduced in [5]. Generalizing canonical monomials to the multiplicity case requires substantially different proofs which exploit the algebraic structure of multiplicity codes.
多重码是Reed-Muller码的一种推广,它包括导数和低次多项式的值,在fmp中的每个点上进行评估。与Reed-Muller码类似,多重码具有局部性质,允许局部校正和局部测试。最近,[6]证明了平面测试,即测试码字在随机平面上的度,是一个足够小度的很好的局部测试方法。在本文中,我们简化和扩展了多重码的局部测试分析,给出了一个更一般和严格的分析。特别地,我们证明了具有任意d的素域上的多重码MRM p (m, d, s)可以用一个适当的k -平坦检验来局部检验,该检验用于检验码字在随机k维仿射子空间上的度。度参数d与所需维度k之间的关系接近最优,并且在平面的情况下在[6]上得到改善。我们的分析依赖于b[5]中引入的标准单项式技术的推广。将正则单项式推广到多重情况需要大量不同的证明,这些证明利用了多重码的代数结构。
{"title":"Improved local testing for multiplicity codes","authors":"Dan Karliner, A. Ta-Shma","doi":"10.4230/LIPIcs.APPROX/RANDOM.2022.11","DOIUrl":"https://doi.org/10.4230/LIPIcs.APPROX/RANDOM.2022.11","url":null,"abstract":"Multiplicity codes are a generalization of Reed-Muller codes which include derivatives as well as the values of low degree polynomials, evaluated in every point in F mp . Similarly to Reed-Muller codes, multiplicity codes have a local nature that allows for local correction and local testing. Recently, [6] showed that the plane test , which tests the degree of the codeword on a random plane, is a good local tester for small enough degrees . In this work we simplify and extend the analysis of local testing for multiplicity codes, giving a more general and tight analysis. In particular, we show that multiplicity codes MRM p ( m, d, s ) over prime fields with arbitrary d are locally testable by an appropriate k -flat test , which tests the degree of the codeword on a random k -dimensional affine subspace. The relationship between the degree parameter d and the required dimension k is shown to be nearly optimal, and improves on [6] in the case of planes. Our analysis relies on a generalization of the technique of canonincal monomials introduced in [5]. Generalizing canonical monomials to the multiplicity case requires substantially different proofs which exploit the algebraic structure of multiplicity codes.","PeriodicalId":11639,"journal":{"name":"Electron. Colloquium Comput. Complex.","volume":"39 1","pages":"11:1-11:19"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86901229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Electron. Colloquium Comput. Complex.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1