Pub Date : 2024-01-14DOI: 10.1016/j.jsc.2024.102298
Martin Kreuzer, Florian Walsh
Given an ideal I in a polynomial ring over a field K, we present a complete algorithm to compute the binomial part of I, i.e., the subideal of I generated by all monomials and binomials in I. This is achieved step-by-step. First we collect and extend several algorithms for computing exponent lattices in different kinds of fields. Then we generalize them to compute exponent lattices of units in 0-dimensional K-algebras, where we have to generalize the computation of the separable part of an algebra to non-perfect fields in characteristic p. Next we examine the computation of unit lattices in finitely generated K-algebras, as well as their associated characters and lattice ideals. This allows us to calculate when I is saturated with respect to the indeterminates by reducing the task to the 0-dimensional case. Finally, we treat the computation of for general ideals by computing their cellular decomposition and dealing with finitely many special ideals called -binomial parts. All algorithms have been implemented in SageMath.
给定域 K 上多项式环 K[x1,...,xn] 中的理想 I,我们提出了一种完整的算法来计算 I 的二项式部分,即由 I 中的所有单项式和二项式生成的 I 的子理想 Bin(I)。首先,我们收集并扩展了几种计算不同类型场中指数网格的算法。然后,我们将它们推广到计算 0 维 K 结构中的单位幂网格,在这里,我们必须将代数的可分离部分的计算推广到特征 p 中的非完全域。这样,我们就可以通过将任务简化为 0 维情况,计算当 I 关于不确定度饱和时的 Bin(I)。最后,我们通过计算一般理想的蜂窝分解来处理 Bin(I) 的计算,并处理称为 (s,t)-binomial 部分的有限多个特殊理想。所有算法都已在 SageMath 中实现。
{"title":"Computing the binomial part of a polynomial ideal","authors":"Martin Kreuzer, Florian Walsh","doi":"10.1016/j.jsc.2024.102298","DOIUrl":"10.1016/j.jsc.2024.102298","url":null,"abstract":"<div><p>Given an ideal <em>I</em> in a polynomial ring <span><math><mi>K</mi><mo>[</mo><msub><mrow><mi>x</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><mo>…</mo><mo>,</mo><msub><mrow><mi>x</mi></mrow><mrow><mi>n</mi></mrow></msub><mo>]</mo></math></span> over a field <em>K</em>, we present a complete algorithm to compute the binomial part of <em>I</em>, i.e., the subideal <span><math><mrow><mi>Bin</mi></mrow><mo>(</mo><mi>I</mi><mo>)</mo></math></span> of <em>I</em> generated by all monomials and binomials in <em>I</em>. This is achieved step-by-step. First we collect and extend several algorithms for computing exponent lattices in different kinds of fields. Then we generalize them to compute exponent lattices of units in 0-dimensional <em>K</em>-algebras, where we have to generalize the computation of the separable part of an algebra to non-perfect fields in characteristic <em>p</em>. Next we examine the computation of unit lattices in finitely generated <em>K</em>-algebras, as well as their associated characters and lattice ideals. This allows us to calculate <span><math><mrow><mi>Bin</mi></mrow><mo>(</mo><mi>I</mi><mo>)</mo></math></span> when <em>I</em> is saturated with respect to the indeterminates by reducing the task to the 0-dimensional case. Finally, we treat the computation of <span><math><mrow><mi>Bin</mi></mrow><mo>(</mo><mi>I</mi><mo>)</mo></math></span> for general ideals by computing their cellular decomposition and dealing with finitely many special ideals called <span><math><mo>(</mo><mi>s</mi><mo>,</mo><mi>t</mi><mo>)</mo></math></span>-binomial parts. All algorithms have been implemented in <span>SageMath</span>.</p></div>","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":"124 ","pages":"Article 102298"},"PeriodicalIF":0.7,"publicationDate":"2024-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0747717124000026/pdfft?md5=bc32bb62dcb12f7f2c1d113994ec49bf&pid=1-s2.0-S0747717124000026-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139462707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-05DOI: 10.1016/j.jsc.2024.102297
Alberto Alzati, Daniele Di Tullio, Manoj Gyawali, Alfonso Tortora
In this paper we present a key exchange protocol in which Alice and Bob have secret keys given by two conics embedded in a large ambient space by means of the Veronese embedding and public keys given by hyperplanes containing the embedded curves. Both of them construct some common invariants given by the intersection of two conics.
{"title":"A post-quantum key exchange protocol from the intersection of conics","authors":"Alberto Alzati, Daniele Di Tullio, Manoj Gyawali, Alfonso Tortora","doi":"10.1016/j.jsc.2024.102297","DOIUrl":"https://doi.org/10.1016/j.jsc.2024.102297","url":null,"abstract":"<p>In this paper we present a key exchange protocol in which Alice and Bob have secret keys given by two conics embedded in a large ambient space by means of the Veronese embedding and public keys given by hyperplanes containing the embedded curves. Both of them construct some common invariants given by the intersection of two conics.</p>","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":"7 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2024-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139102670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-29DOI: 10.1016/j.jsc.2023.102296
Andreas Pieper
Let η be a polarization with connected kernel on a superspecial abelian variety . We give a sufficient criterion which allows the computation of the theta nullvalues of any quotient of by a maximal isotropic subgroup scheme of effectively.
This criterion is satisfied in many situations studied by Li and Oort (1998). We used our method to implement an algorithm that computes supersingular curves of genus 3.
{"title":"Theta nullvalues of supersingular Abelian varieties","authors":"Andreas Pieper","doi":"10.1016/j.jsc.2023.102296","DOIUrl":"10.1016/j.jsc.2023.102296","url":null,"abstract":"<div><p>Let <em>η</em><span> be a polarization with connected kernel on a superspecial abelian variety </span><span><math><msup><mrow><mi>E</mi></mrow><mrow><mi>g</mi></mrow></msup></math></span>. We give a sufficient criterion which allows the computation of the theta nullvalues of any quotient of <span><math><msup><mrow><mi>E</mi></mrow><mrow><mi>g</mi></mrow></msup></math></span> by a maximal isotropic subgroup scheme of <span><math><mi>ker</mi><mo></mo><mo>(</mo><mi>η</mi><mo>)</mo></math></span> effectively.</p><p>This criterion is satisfied in many situations studied by <span>Li and Oort (1998)</span>. We used our method to implement an algorithm that computes supersingular curves of genus 3.</p></div>","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":"123 ","pages":"Article 102296"},"PeriodicalIF":0.7,"publicationDate":"2023-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139065849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-28DOI: 10.1016/j.jsc.2023.102295
Clemens Heuberger , Daniel Krenn , Gabriel F. Lipnik
In this note, we precisely elaborate the connection between recognisable series (in the sense of Berstel and Reutenauer) and q-regular sequences (in the sense of Allouche and Shallit) via their linear representations. In particular, we show that the minimisation algorithm for recognisable series can also be used to minimise linear representations of q-regular sequences.
{"title":"A note on the relation between recognisable series and regular sequences, and their minimal linear representations","authors":"Clemens Heuberger , Daniel Krenn , Gabriel F. Lipnik","doi":"10.1016/j.jsc.2023.102295","DOIUrl":"10.1016/j.jsc.2023.102295","url":null,"abstract":"<div><p>In this note, we precisely elaborate the connection between recognisable series (in the sense of Berstel and Reutenauer) and <em>q</em>-regular sequences (in the sense of Allouche and Shallit) via their linear representations. In particular, we show that the minimisation algorithm for recognisable series can also be used to minimise linear representations of <em>q</em>-regular sequences.</p></div>","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":"123 ","pages":"Article 102295"},"PeriodicalIF":0.7,"publicationDate":"2023-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0747717123001098/pdfft?md5=492907babc8de19f0ee8ae11896722d4&pid=1-s2.0-S0747717123001098-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139065963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-18DOI: 10.1016/j.jsc.2023.102275
Pierre Lairez
Twenty years after the discovery of the F5 algorithm, Gröbner bases with signatures are still challenging to understand and to adapt to different settings. This contrasts with Buchberger's algorithm, which we can bend in many directions keeping correctness and termination obvious. I propose an axiomatic approach to Gröbner bases with signatures with the purpose of uncoupling the theory and the algorithms, giving general results applicable in many different settings (e.g. Gröbner for submodules, F4-style reduction, noncommutative rings, non-Noetherian settings, etc.), and extending the reach of signature algorithms.
{"title":"Axioms for a theory of signature bases","authors":"Pierre Lairez","doi":"10.1016/j.jsc.2023.102275","DOIUrl":"10.1016/j.jsc.2023.102275","url":null,"abstract":"<div><p><span>Twenty years after the discovery of the F5 algorithm, Gröbner bases with signatures are still challenging to understand and to adapt to different settings. This contrasts with Buchberger's algorithm, which we can bend in many directions keeping correctness and termination obvious. I propose an axiomatic approach to Gröbner bases with signatures with the purpose of uncoupling the theory and the algorithms, giving general results applicable in many different settings (e.g. Gröbner for </span>submodules, F4-style reduction, noncommutative rings, non-Noetherian settings, etc.), and extending the reach of signature algorithms.</p></div>","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":"123 ","pages":"Article 102275"},"PeriodicalIF":0.7,"publicationDate":"2023-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138742217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-15DOI: 10.1016/j.jsc.2023.102294
Mugurel Barcau , Vicenţiu Paşol
In this paper, we compute an algebraic decomposition of black-box rings in the generic ring model. More precisely, we explicitly decompose a black-box ring as a direct product of a nilpotent black-box ring and unital local black-box rings, by computing all its primitive idempotents. The algorithm presented in this paper uses quantum subroutines for the computation of the p-power parts of a black-box ring and then classical algorithms for the computation of the corresponding primitive idempotents. As a by-product, we get that the reduction of a black-box ring is also a black-box ring. The first application of this decomposition is an extension of the work of Maurer and Raub (2007) on representation problem in black-box finite fields to the case of reduced p-power black-box rings. Another important application is an attack for any ring homomorphic encryption scheme in the generic ring model. Moreover, when the plaintext space is a finite reduced black-box ring, we present a plaintext-recovery attack based on representation problem in black-box prime fields. In particular, if the ciphertext space has smooth characteristic, the plaintext-recovery attack is effectively computable in the generic ring model.
{"title":"Computing primitive idempotents in finite commutative rings and applications","authors":"Mugurel Barcau , Vicenţiu Paşol","doi":"10.1016/j.jsc.2023.102294","DOIUrl":"10.1016/j.jsc.2023.102294","url":null,"abstract":"<div><p><span>In this paper, we compute an algebraic decomposition of black-box rings in the generic ring model. More precisely, we explicitly decompose a black-box ring as a direct product of a nilpotent black-box ring and unital local black-box rings, by computing all its primitive idempotents. The algorithm presented in this paper uses quantum subroutines for the computation of the </span><em>p</em>-power parts of a black-box ring and then classical algorithms for the computation of the corresponding primitive idempotents. As a by-product, we get that the reduction of a black-box ring is also a black-box ring. The first application of this decomposition is an extension of the work of <span>Maurer and Raub (2007)</span> on representation problem in black-box finite fields to the case of reduced <em>p</em>-power black-box rings. Another important application is an <span><math><msup><mrow><mtext>IND-CCA</mtext></mrow><mrow><mn>1</mn></mrow></msup></math></span><span> attack for any ring homomorphic encryption scheme<span> in the generic ring model. Moreover, when the plaintext space is a finite reduced black-box ring, we present a plaintext-recovery attack based on representation problem in black-box prime fields. In particular, if the ciphertext space has smooth characteristic, the plaintext-recovery attack is effectively computable in the generic ring model.</span></span></p></div>","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":"123 ","pages":"Article 102294"},"PeriodicalIF":0.7,"publicationDate":"2023-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138688298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-05DOI: 10.1016/j.jsc.2023.102287
Rok Požar
Let G be a permutation group acting on a set Ω. Best known algorithms for computing the centralizer of G in the symmetric group on Ω are all based on the same general approach that involves solving the following two fundamental problems: given a G-orbit Δ of size n, compute the centralizer of the restriction of G to Δ in the symmetric group on Δ; and given two G-orbits Δ and each of size n, find an equivalence between the action of G restricted to Δ and the action of G restricted to when one exists. If G is given by a generating set X, previous solutions to each of these two problems take time.
In this paper, we first solve each fundamental problem in time, where δ is the depth of the breadth-first-search Schreier tree for X rooted at some fixed vertex. For the important class of small-base groups G, we improve the theoretical worst-case time bound of our solutions to for some constant c. Moreover, if uniformly distributed random elements of G are given in advance, our solutions have, with probability at least , a running time of . We then apply our solutions to obtain a more efficient algorithm for computing the centralizer of G in the symmetric group on Ω. In an experimental evaluation we demonstrate that it is substantially faster than previously known algorithms.
{"title":"Fast computation of the centralizer of a permutation group in the symmetric group","authors":"Rok Požar","doi":"10.1016/j.jsc.2023.102287","DOIUrl":"10.1016/j.jsc.2023.102287","url":null,"abstract":"<div><p>Let <em>G</em><span> be a permutation group acting on a set Ω. Best known algorithms for computing the centralizer of </span><em>G</em><span> in the symmetric group on Ω are all based on the same general approach that involves solving the following two fundamental problems: given a </span><em>G</em>-orbit Δ of size <em>n</em>, compute the centralizer of the restriction of <em>G</em> to Δ in the symmetric group on Δ; and given two <em>G</em>-orbits Δ and <span><math><msup><mrow><mi>Δ</mi></mrow><mrow><mo>′</mo></mrow></msup></math></span> each of size <em>n</em>, find an equivalence between the action of <em>G</em> restricted to Δ and the action of <em>G</em> restricted to <span><math><msup><mrow><mi>Δ</mi></mrow><mrow><mo>′</mo></mrow></msup></math></span> when one exists. If <em>G</em> is given by a generating set <em>X</em>, previous solutions to each of these two problems take <span><math><mi>O</mi><mo>(</mo><mo>|</mo><mi>X</mi><mo>|</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>)</mo></math></span> time.</p><p>In this paper, we first solve each fundamental problem in <span><math><mi>O</mi><mo>(</mo><mi>δ</mi><mi>n</mi><mo>+</mo><mo>|</mo><mi>X</mi><mo>|</mo><mi>n</mi><mi>log</mi><mo></mo><mi>n</mi><mo>)</mo></math></span> time, where <em>δ</em> is the depth of the breadth-first-search Schreier tree for <em>X</em> rooted at some fixed vertex. For the important class of small-base groups <em>G</em>, we improve the theoretical worst-case time bound of our solutions to <span><math><mi>O</mi><mo>(</mo><mi>n</mi><msup><mrow><mi>log</mi></mrow><mrow><mi>c</mi></mrow></msup><mo></mo><mi>n</mi><mo>+</mo><mo>|</mo><mi>X</mi><mo>|</mo><mi>n</mi><mi>log</mi><mo></mo><mi>n</mi><mo>)</mo></math></span> for some constant <em>c</em>. Moreover, if <span><math><mo>⌈</mo><mn>20</mn><msub><mrow><mi>log</mi></mrow><mrow><mn>2</mn></mrow></msub><mo></mo><mi>n</mi><mo>⌉</mo></math></span> uniformly distributed random elements of <em>G</em><span> are given in advance, our solutions have, with probability at least </span><span><math><mn>1</mn><mo>−</mo><mn>1</mn><mo>/</mo><mi>n</mi></math></span>, a running time of <span><math><mi>O</mi><mo>(</mo><mi>n</mi><msup><mrow><mi>log</mi></mrow><mrow><mn>2</mn></mrow></msup><mo></mo><mi>n</mi><mo>+</mo><mo>|</mo><mi>X</mi><mo>|</mo><mi>n</mi><mi>log</mi><mo></mo><mi>n</mi><mo>)</mo></math></span>. We then apply our solutions to obtain a more efficient algorithm for computing the centralizer of <em>G</em> in the symmetric group on Ω. In an experimental evaluation we demonstrate that it is substantially faster than previously known algorithms.</p></div>","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":"123 ","pages":"Article 102287"},"PeriodicalIF":0.7,"publicationDate":"2023-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138513693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-05DOI: 10.1016/j.jsc.2023.102288
Jasper Nalbach , Erika Ábrahám , Philippe Specht , Christopher W. Brown , James H. Davenport , Matthew England
Satisfiability modulo theories (SMT) solvers check the satisfiability of quantifier-free first-order logic formulae over different theories. We consider the theory of non-linear real arithmetic where the formulae are logical combinations of polynomial constraints. Here a commonly used tool is the cylindrical algebraic decomposition (CAD) to decompose the real space into cells where the constraints are truth-invariant through the use of projection polynomials.
A CAD encodes more information than necessary for checking satisfiability. One approach to address this is to repackage the CAD theory into a search-based algorithm: one that guesses sample points to satisfy the formula, and generalizes guesses that conflict constraints to cylindrical cells around samples which are avoided in the continuing search. This can lead to a satisfying assignment more quickly, or conclude unsatisfiability with far fewer cells. A notable example of this approach is Jovanović and de Moura's NLSAT algorithm. Since these cells are being produced locally to a sample there is scope to use fewer projection polynomials than the traditional CAD projection. The original NLSAT algorithm reduced the set a little; while Brown's single cell construction reduced it much further still. However, it refines a cell polynomial-by-polynomial, meaning the shape and size of the cell produced depends on the order in which the polynomials are considered.
The present paper proposes a method to construct such cells levelwise, i.e. built level-by-level according to a variable ordering instead of polynomial-by-polynomial for all levels. We still use a reduced number of projection polynomials, but can now consider a variety of different reductions and use heuristics to select the projection polynomials in order to optimize the shape of the cell under construction. The new method can thus improve the performance of the NLSAT algorithm. We formulate all the necessary theory that underpins the algorithm as a proof system: while not a common presentation for work in this field, it is valuable in allowing an elegant decoupling of heuristic decisions from the main algorithm and its proof of correctness. We expect the symbolic computation community may find uses for it in other areas too. In particular, the proof system could be a step towards formal proofs for non-linear real arithmetic.
This work has been implemented in the SMT-RAT solver and the benefits of the levelwise construction are validated experimentally on the SMT-LIB benchmark library. We also compare several heuristics for the construction and observe that each heuristic has strengths offering potential for further exploitation of the new approach.
{"title":"Levelwise construction of a single cylindrical algebraic cell","authors":"Jasper Nalbach , Erika Ábrahám , Philippe Specht , Christopher W. Brown , James H. Davenport , Matthew England","doi":"10.1016/j.jsc.2023.102288","DOIUrl":"10.1016/j.jsc.2023.102288","url":null,"abstract":"<div><p><em>Satisfiability modulo theories (SMT)</em> solvers check the satisfiability of quantifier-free first-order logic formulae over different theories. We consider the theory of <em>non-linear real arithmetic</em> where the formulae are logical combinations of polynomial constraints. Here a commonly used tool is the <em>cylindrical algebraic decomposition (CAD)</em> to decompose the real space into cells where the constraints are truth-invariant through the use of <em>projection polynomials</em>.</p><p>A CAD encodes more information than necessary for checking satisfiability. One approach to address this is to repackage the CAD theory into a search-based algorithm: one that guesses sample points to satisfy the formula, and generalizes guesses that conflict constraints to cylindrical cells around samples which are avoided in the continuing search. This can lead to a satisfying assignment more quickly, or conclude unsatisfiability with far fewer cells. A notable example of this approach is Jovanović and de Moura's <em>NLSAT</em> algorithm. Since these cells are being produced locally to a sample there is scope to use fewer projection polynomials than the traditional CAD projection. The original NLSAT algorithm reduced the set a little; while Brown's <em>single cell construction</em> reduced it much further still. However, it refines a cell polynomial-by-polynomial, meaning the shape and size of the cell produced depends on the order in which the polynomials are considered.</p><p>The present paper proposes a method to construct such cells <em>levelwise</em>, i.e. built level-by-level according to a variable ordering instead of polynomial-by-polynomial for all levels. We still use a reduced number of projection polynomials, but can now consider a variety of different reductions and use <em>heuristics</em> to select the projection polynomials in order to optimize the shape of the cell under construction. The new method can thus improve the performance of the NLSAT algorithm. We formulate all the necessary theory that underpins the algorithm as a <em>proof system</em>: while not a common presentation for work in this field, it is valuable in allowing an elegant decoupling of heuristic decisions from the main algorithm and its proof of correctness. We expect the symbolic computation community may find uses for it in other areas too. In particular, the proof system could be a step towards formal proofs for non-linear real arithmetic.</p><p>This work has been implemented in the SMT-RAT solver and the benefits of the levelwise construction are validated experimentally on the SMT-LIB benchmark library. We also compare several heuristics for the construction and observe that each heuristic has strengths offering potential for further exploitation of the new approach.</p></div>","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":"123 ","pages":"Article 102288"},"PeriodicalIF":0.7,"publicationDate":"2023-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0747717123001025/pdfft?md5=f45eafa5ba7d71b914304fbba6948761&pid=1-s2.0-S0747717123001025-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138513690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-20DOI: 10.1016/j.jsc.2023.102278
Kisun Lee , Nan Li , Lihong Zhi
We propose a two-step Newton's method for refining an approximation of a singular zero whose deflation process terminates after one step, also known as a deflation-one singularity. Given an isolated singular zero of a square analytic system, our algorithm exploits an invertible linear operator obtained by combining the Jacobian and a projection of the Hessian in the direction of the kernel of the Jacobian. We prove the quadratic convergence of the two-step Newton method when it is applied to an approximation of a deflation-one singular zero. Also, the algorithm requires a smaller size of matrices than the existing methods, making it more efficient. We demonstrate examples and experiments to show the efficiency of the method.
{"title":"Two-step Newton's method for deflation-one singular zeros of analytic systems","authors":"Kisun Lee , Nan Li , Lihong Zhi","doi":"10.1016/j.jsc.2023.102278","DOIUrl":"https://doi.org/10.1016/j.jsc.2023.102278","url":null,"abstract":"<div><p><span>We propose a two-step Newton's method for refining an </span>approximation<span> of a singular zero whose deflation process terminates after one step, also known as a deflation-one singularity. Given an isolated singular zero of a square analytic system<span>, our algorithm exploits an invertible linear operator obtained by combining the Jacobian and a projection of the Hessian in the direction of the kernel of the Jacobian. We prove the quadratic convergence of the two-step Newton method when it is applied to an approximation of a deflation-one singular zero. Also, the algorithm requires a smaller size of matrices than the existing methods, making it more efficient. We demonstrate examples and experiments to show the efficiency of the method.</span></span></p></div>","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":"123 ","pages":"Article 102278"},"PeriodicalIF":0.7,"publicationDate":"2023-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138448278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}