首页 > 最新文献

Journal of Symbolic Computation最新文献

英文 中文
Computing the binomial part of a polynomial ideal 计算多项式理想的二项式部分
IF 0.7 4区 数学 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-01-14 DOI: 10.1016/j.jsc.2024.102298
Martin Kreuzer, Florian Walsh

Given an ideal I in a polynomial ring K[x1,,xn] over a field K, we present a complete algorithm to compute the binomial part of I, i.e., the subideal Bin(I) of I generated by all monomials and binomials in I. This is achieved step-by-step. First we collect and extend several algorithms for computing exponent lattices in different kinds of fields. Then we generalize them to compute exponent lattices of units in 0-dimensional K-algebras, where we have to generalize the computation of the separable part of an algebra to non-perfect fields in characteristic p. Next we examine the computation of unit lattices in finitely generated K-algebras, as well as their associated characters and lattice ideals. This allows us to calculate Bin(I) when I is saturated with respect to the indeterminates by reducing the task to the 0-dimensional case. Finally, we treat the computation of Bin(I) for general ideals by computing their cellular decomposition and dealing with finitely many special ideals called (s,t)-binomial parts. All algorithms have been implemented in SageMath.

给定域 K 上多项式环 K[x1,...,xn] 中的理想 I,我们提出了一种完整的算法来计算 I 的二项式部分,即由 I 中的所有单项式和二项式生成的 I 的子理想 Bin(I)。首先,我们收集并扩展了几种计算不同类型场中指数网格的算法。然后,我们将它们推广到计算 0 维 K 结构中的单位幂网格,在这里,我们必须将代数的可分离部分的计算推广到特征 p 中的非完全域。这样,我们就可以通过将任务简化为 0 维情况,计算当 I 关于不确定度饱和时的 Bin(I)。最后,我们通过计算一般理想的蜂窝分解来处理 Bin(I) 的计算,并处理称为 (s,t)-binomial 部分的有限多个特殊理想。所有算法都已在 SageMath 中实现。
{"title":"Computing the binomial part of a polynomial ideal","authors":"Martin Kreuzer,&nbsp;Florian Walsh","doi":"10.1016/j.jsc.2024.102298","DOIUrl":"10.1016/j.jsc.2024.102298","url":null,"abstract":"<div><p>Given an ideal <em>I</em> in a polynomial ring <span><math><mi>K</mi><mo>[</mo><msub><mrow><mi>x</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><mo>…</mo><mo>,</mo><msub><mrow><mi>x</mi></mrow><mrow><mi>n</mi></mrow></msub><mo>]</mo></math></span> over a field <em>K</em>, we present a complete algorithm to compute the binomial part of <em>I</em>, i.e., the subideal <span><math><mrow><mi>Bin</mi></mrow><mo>(</mo><mi>I</mi><mo>)</mo></math></span> of <em>I</em> generated by all monomials and binomials in <em>I</em>. This is achieved step-by-step. First we collect and extend several algorithms for computing exponent lattices in different kinds of fields. Then we generalize them to compute exponent lattices of units in 0-dimensional <em>K</em>-algebras, where we have to generalize the computation of the separable part of an algebra to non-perfect fields in characteristic <em>p</em>. Next we examine the computation of unit lattices in finitely generated <em>K</em>-algebras, as well as their associated characters and lattice ideals. This allows us to calculate <span><math><mrow><mi>Bin</mi></mrow><mo>(</mo><mi>I</mi><mo>)</mo></math></span> when <em>I</em> is saturated with respect to the indeterminates by reducing the task to the 0-dimensional case. Finally, we treat the computation of <span><math><mrow><mi>Bin</mi></mrow><mo>(</mo><mi>I</mi><mo>)</mo></math></span> for general ideals by computing their cellular decomposition and dealing with finitely many special ideals called <span><math><mo>(</mo><mi>s</mi><mo>,</mo><mi>t</mi><mo>)</mo></math></span>-binomial parts. All algorithms have been implemented in <span>SageMath</span>.</p></div>","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":"124 ","pages":"Article 102298"},"PeriodicalIF":0.7,"publicationDate":"2024-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0747717124000026/pdfft?md5=bc32bb62dcb12f7f2c1d113994ec49bf&pid=1-s2.0-S0747717124000026-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139462707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A post-quantum key exchange protocol from the intersection of conics 来自圆锥交点的后量子密钥交换协议
IF 0.7 4区 数学 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-01-05 DOI: 10.1016/j.jsc.2024.102297
Alberto Alzati, Daniele Di Tullio, Manoj Gyawali, Alfonso Tortora

In this paper we present a key exchange protocol in which Alice and Bob have secret keys given by two conics embedded in a large ambient space by means of the Veronese embedding and public keys given by hyperplanes containing the embedded curves. Both of them construct some common invariants given by the intersection of two conics.

在本文中,我们提出了一种密钥交换协议,其中爱丽丝和鲍勃的密钥由通过维罗内嵌入(Veronese embedding)嵌入大环境空间的两个圆锥曲线给出,公钥由包含嵌入曲线的超平面给出。他们都通过两个圆锥的交点来构造一些共同的不变式。
{"title":"A post-quantum key exchange protocol from the intersection of conics","authors":"Alberto Alzati, Daniele Di Tullio, Manoj Gyawali, Alfonso Tortora","doi":"10.1016/j.jsc.2024.102297","DOIUrl":"https://doi.org/10.1016/j.jsc.2024.102297","url":null,"abstract":"<p>In this paper we present a key exchange protocol in which Alice and Bob have secret keys given by two conics embedded in a large ambient space by means of the Veronese embedding and public keys given by hyperplanes containing the embedded curves. Both of them construct some common invariants given by the intersection of two conics.</p>","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":"7 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2024-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139102670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An effective decomposition theorem for Schubert varieties 舒伯特变换的一个有效分解定理
IF 0.7 4区 数学 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-01-01 DOI: 10.1016/j.jsc.2023.102238
Francesca Cioffi, Davide Franco, Carmine Sessa
{"title":"An effective decomposition theorem for Schubert varieties","authors":"Francesca Cioffi,&nbsp;Davide Franco,&nbsp;Carmine Sessa","doi":"10.1016/j.jsc.2023.102238","DOIUrl":"https://doi.org/10.1016/j.jsc.2023.102238","url":null,"abstract":"","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":"121 ","pages":"102238"},"PeriodicalIF":0.7,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49727688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Theta nullvalues of supersingular Abelian varieties 超星阿贝尔变体的 Theta 空值
IF 0.7 4区 数学 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-12-29 DOI: 10.1016/j.jsc.2023.102296
Andreas Pieper

Let η be a polarization with connected kernel on a superspecial abelian variety Eg. We give a sufficient criterion which allows the computation of the theta nullvalues of any quotient of Eg by a maximal isotropic subgroup scheme of ker(η) effectively.

This criterion is satisfied in many situations studied by Li and Oort (1998). We used our method to implement an algorithm that computes supersingular curves of genus 3.

我们给出了一个充分标准,它允许有效地计算 ker(η)的最大各向同性子群方案对 Eg 的任何商的 theta 空值。我们用我们的方法实现了一种计算 3 属超星曲线的算法。
{"title":"Theta nullvalues of supersingular Abelian varieties","authors":"Andreas Pieper","doi":"10.1016/j.jsc.2023.102296","DOIUrl":"10.1016/j.jsc.2023.102296","url":null,"abstract":"<div><p>Let <em>η</em><span> be a polarization with connected kernel on a superspecial abelian variety </span><span><math><msup><mrow><mi>E</mi></mrow><mrow><mi>g</mi></mrow></msup></math></span>. We give a sufficient criterion which allows the computation of the theta nullvalues of any quotient of <span><math><msup><mrow><mi>E</mi></mrow><mrow><mi>g</mi></mrow></msup></math></span> by a maximal isotropic subgroup scheme of <span><math><mi>ker</mi><mo>⁡</mo><mo>(</mo><mi>η</mi><mo>)</mo></math></span> effectively.</p><p>This criterion is satisfied in many situations studied by <span>Li and Oort (1998)</span>. We used our method to implement an algorithm that computes supersingular curves of genus 3.</p></div>","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":"123 ","pages":"Article 102296"},"PeriodicalIF":0.7,"publicationDate":"2023-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139065849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A note on the relation between recognisable series and regular sequences, and their minimal linear representations 关于可识别数列和正则表达式及其最小线性表示之间关系的说明
IF 0.7 4区 数学 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-12-28 DOI: 10.1016/j.jsc.2023.102295
Clemens Heuberger , Daniel Krenn , Gabriel F. Lipnik

In this note, we precisely elaborate the connection between recognisable series (in the sense of Berstel and Reutenauer) and q-regular sequences (in the sense of Allouche and Shallit) via their linear representations. In particular, we show that the minimisation algorithm for recognisable series can also be used to minimise linear representations of q-regular sequences.

在本论文中,我们通过可识别数列的线性表示,精确阐述了可识别数列(Berstel 和 Reutenauer 意义上的)与 q-regular 序列(Allouche 和 Shallit 意义上的)之间的联系。我们特别指出,可识别数列的最小化算法也可用于最小化 q-regular 序列的线性表示。
{"title":"A note on the relation between recognisable series and regular sequences, and their minimal linear representations","authors":"Clemens Heuberger ,&nbsp;Daniel Krenn ,&nbsp;Gabriel F. Lipnik","doi":"10.1016/j.jsc.2023.102295","DOIUrl":"10.1016/j.jsc.2023.102295","url":null,"abstract":"<div><p>In this note, we precisely elaborate the connection between recognisable series (in the sense of Berstel and Reutenauer) and <em>q</em>-regular sequences (in the sense of Allouche and Shallit) via their linear representations. In particular, we show that the minimisation algorithm for recognisable series can also be used to minimise linear representations of <em>q</em>-regular sequences.</p></div>","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":"123 ","pages":"Article 102295"},"PeriodicalIF":0.7,"publicationDate":"2023-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0747717123001098/pdfft?md5=492907babc8de19f0ee8ae11896722d4&pid=1-s2.0-S0747717123001098-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139065963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Axioms for a theory of signature bases 签名基础理论的公理
IF 0.7 4区 数学 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-12-18 DOI: 10.1016/j.jsc.2023.102275
Pierre Lairez

Twenty years after the discovery of the F5 algorithm, Gröbner bases with signatures are still challenging to understand and to adapt to different settings. This contrasts with Buchberger's algorithm, which we can bend in many directions keeping correctness and termination obvious. I propose an axiomatic approach to Gröbner bases with signatures with the purpose of uncoupling the theory and the algorithms, giving general results applicable in many different settings (e.g. Gröbner for submodules, F4-style reduction, noncommutative rings, non-Noetherian settings, etc.), and extending the reach of signature algorithms.

在发现 F5 算法 20 年后的今天,带有签名的格罗布纳基仍然难以理解,也难以适应不同的环境。这与布赫伯格算法形成了鲜明对比,布赫伯格算法的正确性和终止性显而易见,我们可以对其进行多向弯曲。我提出了一种带签名的格罗伯纳基的公理化方法,目的是解除理论与算法之间的耦合,给出适用于许多不同环境(如子模的格罗伯纳、F4 式还原、非交换环、非诺特环境等)的一般结果,并扩展签名算法的范围。
{"title":"Axioms for a theory of signature bases","authors":"Pierre Lairez","doi":"10.1016/j.jsc.2023.102275","DOIUrl":"10.1016/j.jsc.2023.102275","url":null,"abstract":"<div><p><span>Twenty years after the discovery of the F5 algorithm, Gröbner bases with signatures are still challenging to understand and to adapt to different settings. This contrasts with Buchberger's algorithm, which we can bend in many directions keeping correctness and termination obvious. I propose an axiomatic approach to Gröbner bases with signatures with the purpose of uncoupling the theory and the algorithms, giving general results applicable in many different settings (e.g. Gröbner for </span>submodules, F4-style reduction, noncommutative rings, non-Noetherian settings, etc.), and extending the reach of signature algorithms.</p></div>","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":"123 ","pages":"Article 102275"},"PeriodicalIF":0.7,"publicationDate":"2023-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138742217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computing primitive idempotents in finite commutative rings and applications 计算有限交换环中的基元幂级数及其应用
IF 0.7 4区 数学 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-12-15 DOI: 10.1016/j.jsc.2023.102294
Mugurel Barcau , Vicenţiu Paşol

In this paper, we compute an algebraic decomposition of black-box rings in the generic ring model. More precisely, we explicitly decompose a black-box ring as a direct product of a nilpotent black-box ring and unital local black-box rings, by computing all its primitive idempotents. The algorithm presented in this paper uses quantum subroutines for the computation of the p-power parts of a black-box ring and then classical algorithms for the computation of the corresponding primitive idempotents. As a by-product, we get that the reduction of a black-box ring is also a black-box ring. The first application of this decomposition is an extension of the work of Maurer and Raub (2007) on representation problem in black-box finite fields to the case of reduced p-power black-box rings. Another important application is an IND-CCA1 attack for any ring homomorphic encryption scheme in the generic ring model. Moreover, when the plaintext space is a finite reduced black-box ring, we present a plaintext-recovery attack based on representation problem in black-box prime fields. In particular, if the ciphertext space has smooth characteristic, the plaintext-recovery attack is effectively computable in the generic ring model.

在本文中,我们计算了通用环模型中黑盒环的代数分解。更确切地说,我们通过计算黑箱环的所有基元幂级数,明确地将黑箱环分解为零幂黑箱环和单元局部黑箱环的直接乘积。本文提出的算法使用量子子程序计算黑箱环的 p-power 部分,然后使用经典算法计算相应的基元幂级数。作为副产品,我们可以得到黑盒环的还原也是黑盒环。这种分解的第一个应用是将 Maurer 和 Raub Maurer 和 Raub (2007) 关于黑箱有限域中表示问题的研究扩展到还原 p 幂黑箱环的情况。另一个重要应用是针对通用环模型中任何环同态加密方案的 IND-CCA1 攻击。此外,当明文空间是有限还原黑盒环时,我们提出了一种基于黑盒素域表示问题的明文恢复攻击。特别是,如果密文空间具有光滑特性,那么在通用环模型中,明文恢复攻击是有效可计算的。
{"title":"Computing primitive idempotents in finite commutative rings and applications","authors":"Mugurel Barcau ,&nbsp;Vicenţiu Paşol","doi":"10.1016/j.jsc.2023.102294","DOIUrl":"10.1016/j.jsc.2023.102294","url":null,"abstract":"<div><p><span>In this paper, we compute an algebraic decomposition of black-box rings in the generic ring model. More precisely, we explicitly decompose a black-box ring as a direct product of a nilpotent black-box ring and unital local black-box rings, by computing all its primitive idempotents. The algorithm presented in this paper uses quantum subroutines for the computation of the </span><em>p</em>-power parts of a black-box ring and then classical algorithms for the computation of the corresponding primitive idempotents. As a by-product, we get that the reduction of a black-box ring is also a black-box ring. The first application of this decomposition is an extension of the work of <span>Maurer and Raub (2007)</span> on representation problem in black-box finite fields to the case of reduced <em>p</em>-power black-box rings. Another important application is an <span><math><msup><mrow><mtext>IND-CCA</mtext></mrow><mrow><mn>1</mn></mrow></msup></math></span><span> attack for any ring homomorphic encryption scheme<span> in the generic ring model. Moreover, when the plaintext space is a finite reduced black-box ring, we present a plaintext-recovery attack based on representation problem in black-box prime fields. In particular, if the ciphertext space has smooth characteristic, the plaintext-recovery attack is effectively computable in the generic ring model.</span></span></p></div>","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":"123 ","pages":"Article 102294"},"PeriodicalIF":0.7,"publicationDate":"2023-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138688298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast computation of the centralizer of a permutation group in the symmetric group 对称群中置换群中心化器的快速计算
IF 0.7 4区 数学 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-12-05 DOI: 10.1016/j.jsc.2023.102287
Rok Požar

Let G be a permutation group acting on a set Ω. Best known algorithms for computing the centralizer of G in the symmetric group on Ω are all based on the same general approach that involves solving the following two fundamental problems: given a G-orbit Δ of size n, compute the centralizer of the restriction of G to Δ in the symmetric group on Δ; and given two G-orbits Δ and Δ each of size n, find an equivalence between the action of G restricted to Δ and the action of G restricted to Δ when one exists. If G is given by a generating set X, previous solutions to each of these two problems take O(|X|n2) time.

In this paper, we first solve each fundamental problem in O(δn+|X|nlogn) time, where δ is the depth of the breadth-first-search Schreier tree for X rooted at some fixed vertex. For the important class of small-base groups G, we improve the theoretical worst-case time bound of our solutions to O(nlogcn+|X|nlogn) for some constant c. Moreover, if 20log2n uniformly distributed random elements of G are given in advance, our solutions have, with probability at least 11/n, a running time of O(nlog2n+|X|nlogn). We then apply our solutions to obtain a more efficient algorithm for computing the centralizer of G in the symmetric group on Ω. In an experimental evaluation we demonstrate that it is substantially faster than previously known algorithms.

设G是作用于集合Ω的置换群。在Ω上对称群中计算G的中心化器的最著名的算法都是基于解决以下两个基本问题的相同的一般方法:给定一个大小为n的G轨道Δ,计算Δ上对称群中G对Δ的限制的中心化器;给定两个大小为n的G轨道Δ和Δ ',当存在一个时,找出限制在Δ的G的作用和限制在Δ '的G的作用之间的等价。如果G是由一个发电集X给出的,这两个问题之前的解都需要O(|X|n2)的时间。在本文中,我们首先在O(δn+|X|nlog (n))时间内解决每个基本问题,其中δ是宽度优先搜索的Schreier树的深度,X在某个固定顶点上扎根。对于一类重要的小基群G,我们改进了对于某常数c我们解O(nlogc (n) +|X|nlog (n))的理论最坏情况时间边界。并且,如果事先已知G的均匀分布随机元素的≤≤≤20log2 (n)²,我们的解的运行时间为O(nlog2 (n) +|X|nlog (n)²,其概率至少为1−1/n。然后,我们应用我们的解来获得一个更有效的算法来计算Ω上对称群中G的中心化器。在实验评估中,我们证明了它比以前已知的算法要快得多。
{"title":"Fast computation of the centralizer of a permutation group in the symmetric group","authors":"Rok Požar","doi":"10.1016/j.jsc.2023.102287","DOIUrl":"10.1016/j.jsc.2023.102287","url":null,"abstract":"<div><p>Let <em>G</em><span> be a permutation group acting on a set Ω. Best known algorithms for computing the centralizer of </span><em>G</em><span> in the symmetric group on Ω are all based on the same general approach that involves solving the following two fundamental problems: given a </span><em>G</em>-orbit Δ of size <em>n</em>, compute the centralizer of the restriction of <em>G</em> to Δ in the symmetric group on Δ; and given two <em>G</em>-orbits Δ and <span><math><msup><mrow><mi>Δ</mi></mrow><mrow><mo>′</mo></mrow></msup></math></span> each of size <em>n</em>, find an equivalence between the action of <em>G</em> restricted to Δ and the action of <em>G</em> restricted to <span><math><msup><mrow><mi>Δ</mi></mrow><mrow><mo>′</mo></mrow></msup></math></span> when one exists. If <em>G</em> is given by a generating set <em>X</em>, previous solutions to each of these two problems take <span><math><mi>O</mi><mo>(</mo><mo>|</mo><mi>X</mi><mo>|</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>)</mo></math></span> time.</p><p>In this paper, we first solve each fundamental problem in <span><math><mi>O</mi><mo>(</mo><mi>δ</mi><mi>n</mi><mo>+</mo><mo>|</mo><mi>X</mi><mo>|</mo><mi>n</mi><mi>log</mi><mo>⁡</mo><mi>n</mi><mo>)</mo></math></span> time, where <em>δ</em> is the depth of the breadth-first-search Schreier tree for <em>X</em> rooted at some fixed vertex. For the important class of small-base groups <em>G</em>, we improve the theoretical worst-case time bound of our solutions to <span><math><mi>O</mi><mo>(</mo><mi>n</mi><msup><mrow><mi>log</mi></mrow><mrow><mi>c</mi></mrow></msup><mo>⁡</mo><mi>n</mi><mo>+</mo><mo>|</mo><mi>X</mi><mo>|</mo><mi>n</mi><mi>log</mi><mo>⁡</mo><mi>n</mi><mo>)</mo></math></span> for some constant <em>c</em>. Moreover, if <span><math><mo>⌈</mo><mn>20</mn><msub><mrow><mi>log</mi></mrow><mrow><mn>2</mn></mrow></msub><mo>⁡</mo><mi>n</mi><mo>⌉</mo></math></span> uniformly distributed random elements of <em>G</em><span> are given in advance, our solutions have, with probability at least </span><span><math><mn>1</mn><mo>−</mo><mn>1</mn><mo>/</mo><mi>n</mi></math></span>, a running time of <span><math><mi>O</mi><mo>(</mo><mi>n</mi><msup><mrow><mi>log</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>⁡</mo><mi>n</mi><mo>+</mo><mo>|</mo><mi>X</mi><mo>|</mo><mi>n</mi><mi>log</mi><mo>⁡</mo><mi>n</mi><mo>)</mo></math></span>. We then apply our solutions to obtain a more efficient algorithm for computing the centralizer of <em>G</em> in the symmetric group on Ω. In an experimental evaluation we demonstrate that it is substantially faster than previously known algorithms.</p></div>","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":"123 ","pages":"Article 102287"},"PeriodicalIF":0.7,"publicationDate":"2023-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138513693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Levelwise construction of a single cylindrical algebraic cell 一个圆柱代数单元的水平构造
IF 0.7 4区 数学 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-12-05 DOI: 10.1016/j.jsc.2023.102288
Jasper Nalbach , Erika Ábrahám , Philippe Specht , Christopher W. Brown , James H. Davenport , Matthew England

Satisfiability modulo theories (SMT) solvers check the satisfiability of quantifier-free first-order logic formulae over different theories. We consider the theory of non-linear real arithmetic where the formulae are logical combinations of polynomial constraints. Here a commonly used tool is the cylindrical algebraic decomposition (CAD) to decompose the real space into cells where the constraints are truth-invariant through the use of projection polynomials.

A CAD encodes more information than necessary for checking satisfiability. One approach to address this is to repackage the CAD theory into a search-based algorithm: one that guesses sample points to satisfy the formula, and generalizes guesses that conflict constraints to cylindrical cells around samples which are avoided in the continuing search. This can lead to a satisfying assignment more quickly, or conclude unsatisfiability with far fewer cells. A notable example of this approach is Jovanović and de Moura's NLSAT algorithm. Since these cells are being produced locally to a sample there is scope to use fewer projection polynomials than the traditional CAD projection. The original NLSAT algorithm reduced the set a little; while Brown's single cell construction reduced it much further still. However, it refines a cell polynomial-by-polynomial, meaning the shape and size of the cell produced depends on the order in which the polynomials are considered.

The present paper proposes a method to construct such cells levelwise, i.e. built level-by-level according to a variable ordering instead of polynomial-by-polynomial for all levels. We still use a reduced number of projection polynomials, but can now consider a variety of different reductions and use heuristics to select the projection polynomials in order to optimize the shape of the cell under construction. The new method can thus improve the performance of the NLSAT algorithm. We formulate all the necessary theory that underpins the algorithm as a proof system: while not a common presentation for work in this field, it is valuable in allowing an elegant decoupling of heuristic decisions from the main algorithm and its proof of correctness. We expect the symbolic computation community may find uses for it in other areas too. In particular, the proof system could be a step towards formal proofs for non-linear real arithmetic.

This work has been implemented in the SMT-RAT solver and the benefits of the levelwise construction are validated experimentally on the SMT-LIB benchmark library. We also compare several heuristics for the construction and observe that each heuristic has strengths offering potential for further exploitation of the new approach.

可满足模理论(SMT)求解器在不同理论下检验无量词一阶逻辑公式的可满足性。我们考虑非线性实算术理论,其中公式是多项式约束的逻辑组合。这里常用的工具是柱面代数分解(CAD),通过使用投影多项式将实空间分解为约束为真不变的单元。CAD编码的信息比检查满意度所需的要多。解决这个问题的一种方法是将CAD理论重新包装为基于搜索的算法:一种猜测样本点以满足公式,并将猜测冲突约束推广到样本周围的圆柱形单元,这在继续搜索中是避免的。这种方法可以更快地得到令人满意的任务,或者用更少的单元得出不满意的结论。这种方法的一个显著例子是jovanoviki和de Moura的NLSAT算法。由于这些单元是在样本的局部产生的,因此与传统的CAD投影相比,可以使用更少的投影多项式。原始的NLSAT算法对集合进行了一些缩减;而布朗的单细胞结构进一步减少了它。然而,它是一个多项式一个多项式地细化细胞,这意味着产生的细胞的形状和大小取决于考虑多项式的顺序。本文提出了一种逐级构建此类单元的方法,即按变量顺序逐级构建,而不是对所有级别进行多项式逐级构建。我们仍然使用减少数量的投影多项式,但现在可以考虑各种不同的减少,并使用启发式方法来选择投影多项式,以优化正在构建的细胞的形状。因此,新方法可以提高NLSAT算法的性能。我们将支持算法的所有必要理论表述为证明系统:虽然不是该领域工作的常见表示,但它在允许启发式决策与主算法及其正确性证明的优雅解耦方面是有价值的。我们希望符号计算社区也能在其他领域找到它的用途。特别是,该证明系统可能是向非线性实算术的形式化证明迈出的一步。这项工作已经在SMT-RAT求解器中实现,并在SMT-LIB基准库上实验验证了分层构建的好处。我们还比较了几种构建的启发式方法,并观察到每种启发式方法都有优势,为进一步开发新方法提供了潜力。
{"title":"Levelwise construction of a single cylindrical algebraic cell","authors":"Jasper Nalbach ,&nbsp;Erika Ábrahám ,&nbsp;Philippe Specht ,&nbsp;Christopher W. Brown ,&nbsp;James H. Davenport ,&nbsp;Matthew England","doi":"10.1016/j.jsc.2023.102288","DOIUrl":"10.1016/j.jsc.2023.102288","url":null,"abstract":"<div><p><em>Satisfiability modulo theories (SMT)</em> solvers check the satisfiability of quantifier-free first-order logic formulae over different theories. We consider the theory of <em>non-linear real arithmetic</em> where the formulae are logical combinations of polynomial constraints. Here a commonly used tool is the <em>cylindrical algebraic decomposition (CAD)</em> to decompose the real space into cells where the constraints are truth-invariant through the use of <em>projection polynomials</em>.</p><p>A CAD encodes more information than necessary for checking satisfiability. One approach to address this is to repackage the CAD theory into a search-based algorithm: one that guesses sample points to satisfy the formula, and generalizes guesses that conflict constraints to cylindrical cells around samples which are avoided in the continuing search. This can lead to a satisfying assignment more quickly, or conclude unsatisfiability with far fewer cells. A notable example of this approach is Jovanović and de Moura's <em>NLSAT</em> algorithm. Since these cells are being produced locally to a sample there is scope to use fewer projection polynomials than the traditional CAD projection. The original NLSAT algorithm reduced the set a little; while Brown's <em>single cell construction</em> reduced it much further still. However, it refines a cell polynomial-by-polynomial, meaning the shape and size of the cell produced depends on the order in which the polynomials are considered.</p><p>The present paper proposes a method to construct such cells <em>levelwise</em>, i.e. built level-by-level according to a variable ordering instead of polynomial-by-polynomial for all levels. We still use a reduced number of projection polynomials, but can now consider a variety of different reductions and use <em>heuristics</em> to select the projection polynomials in order to optimize the shape of the cell under construction. The new method can thus improve the performance of the NLSAT algorithm. We formulate all the necessary theory that underpins the algorithm as a <em>proof system</em>: while not a common presentation for work in this field, it is valuable in allowing an elegant decoupling of heuristic decisions from the main algorithm and its proof of correctness. We expect the symbolic computation community may find uses for it in other areas too. In particular, the proof system could be a step towards formal proofs for non-linear real arithmetic.</p><p>This work has been implemented in the SMT-RAT solver and the benefits of the levelwise construction are validated experimentally on the SMT-LIB benchmark library. We also compare several heuristics for the construction and observe that each heuristic has strengths offering potential for further exploitation of the new approach.</p></div>","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":"123 ","pages":"Article 102288"},"PeriodicalIF":0.7,"publicationDate":"2023-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0747717123001025/pdfft?md5=f45eafa5ba7d71b914304fbba6948761&pid=1-s2.0-S0747717123001025-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138513690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two-step Newton's method for deflation-one singular zeros of analytic systems 解压缩的两步牛顿法——解析系统的一个奇异零
IF 0.7 4区 数学 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-11-20 DOI: 10.1016/j.jsc.2023.102278
Kisun Lee , Nan Li , Lihong Zhi

We propose a two-step Newton's method for refining an approximation of a singular zero whose deflation process terminates after one step, also known as a deflation-one singularity. Given an isolated singular zero of a square analytic system, our algorithm exploits an invertible linear operator obtained by combining the Jacobian and a projection of the Hessian in the direction of the kernel of the Jacobian. We prove the quadratic convergence of the two-step Newton method when it is applied to an approximation of a deflation-one singular zero. Also, the algorithm requires a smaller size of matrices than the existing methods, making it more efficient. We demonstrate examples and experiments to show the efficiency of the method.

我们提出了一种两步牛顿法,用于精炼奇异零的近似,其紧缩过程在一步后终止,也称为紧缩-一个奇点。给定一个孤立的平方解析系统的奇异零,我们的算法利用了一个可逆的线性算子,该算子由雅可比矩阵和Hessian在雅可比矩阵核方向上的投影组合而成。我们证明了两步牛顿法在求解紧缩- 1奇异零近似时的二次收敛性。此外,该算法比现有方法需要更小的矩阵大小,使其更高效。通过实例和实验验证了该方法的有效性。
{"title":"Two-step Newton's method for deflation-one singular zeros of analytic systems","authors":"Kisun Lee ,&nbsp;Nan Li ,&nbsp;Lihong Zhi","doi":"10.1016/j.jsc.2023.102278","DOIUrl":"https://doi.org/10.1016/j.jsc.2023.102278","url":null,"abstract":"<div><p><span>We propose a two-step Newton's method for refining an </span>approximation<span> of a singular zero whose deflation process terminates after one step, also known as a deflation-one singularity. Given an isolated singular zero of a square analytic system<span>, our algorithm exploits an invertible linear operator obtained by combining the Jacobian and a projection of the Hessian in the direction of the kernel of the Jacobian. We prove the quadratic convergence of the two-step Newton method when it is applied to an approximation of a deflation-one singular zero. Also, the algorithm requires a smaller size of matrices than the existing methods, making it more efficient. We demonstrate examples and experiments to show the efficiency of the method.</span></span></p></div>","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":"123 ","pages":"Article 102278"},"PeriodicalIF":0.7,"publicationDate":"2023-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138448278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Symbolic Computation
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1