Skip to main content

Depth-4 Identity Testing and Noether’s Normalization Lemma

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9691))

Abstract

We consider the black-box polynomial identity testing (\({\small \mathrm {PIT}}\)) problem for a sub-class of depth-4 \(\varSigma \varPi \varSigma \varPi (k,r)\) circuits. Such circuits compute polynomials of the following type: \( C({\small \mathrm X}) = \sum _{i=1}^k \prod _{j=1}^{d_i} Q_{i,j}, \) where k is the fan-in of the top \(\varSigma \) gate and r is the maximum degree of the polynomials \(\{Q_{i,j}\}_{i\in [k], j\in [d_i]}\), and \(k,r=O(1)\). We consider a sub-class of such circuits satisfying a generic algebraic-geometric restriction, and we give a deterministic polynomial-time black-box \({\small \mathrm {PIT}}\) algorithm for such circuits.

Our study is motivated by two recent results of Mulmuley (FOCS 2012, [Mul12]), and Gupta (ECCC 2014, [Gup14]). In particular, we obtain the derandomization by solving a particular instance of derandomization problem of Noether’s Normalization Lemma (\(\mathrm{NNL}\)). Our result can also be considered as a unified way of viewing the depth-4 \({\small \mathrm {PIT}}\) problems closely related to the work of Gupta [Gup14], and the approach suggested by Mulmuley [Mul12].

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    We work in the projective spaces \(\mathbb {P}^n\), since by standard reason the polynomials \(Q_{i,j}\)s can be assumed to be homogeneous polynomials over \(n+1\) variables.

  2. 2.

    Notice that a zero dimensional variety contains a finite number of points.

  3. 3.

    We do not explicitly use the fact that \(Q_{i,j}\)s are irreducible in the analysis. This fact is useful if we would like to formulate a conjecture in the similar spirit of Conjecture 1 in [Gup14].

  4. 4.

    Notice that \({{\mathrm{{\small \mathrm codim}}}}(\varLambda _S) = n-(2k-1)\le n-k-1\) for \(k\ge 2\).

  5. 5.

    In the next section, we show how to construct such a subspace deterministically.

  6. 6.

    Recall that \(\deg (Q_S) \le r^{k+1}\) for any S.

References

  1. Agrawal, M.: Proving lower bounds via pseudo-random generators. In: Sarukkai, S., Sen, S. (eds.) FSTTCS 2005. LNCS, vol. 3821, pp. 92–105. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  2. Agrawal, M., Kayal, N., Saxena, N.: PRIMES is in P. Ann. Math. 160(2), 781–793 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  3. Arora, S., Lund, C., Motwani, R., Sudan, M., Szegedy, M.: Proof verification and the hardness of approximation problems. J. ACM 45(3), 501–555 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  4. Alon, N.: Combinatorial Nullstellensatz. Comb. Probab. Comput. 8, 7–30 (1999)

    Article  MathSciNet  MATH  Google Scholar 

  5. Arvind, V., Mukhopadhyay, P.: The ideal membership problem and polynomial identity testing. Inf. Comput. 208(4), 351–363 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  6. Agrawal, M., Saha, C., Saptharishi, R., Saxena, N.: Jacobian hits circuits: hitting-sets, lower bounds for depth-D occur-k formulas & depth-3 transcendence degree-k circuits. In: Proceedings of the 44th Symposium on Theory of Computing Conference, STOC 2012, pp. 599–614 (2012)

    Google Scholar 

  7. Agrawal, M., Vinay, V.: Arithmetic circuits: a chasm at depth four. In: Proceedings-Annual Symposium on Foundations of Computer Science, pp. 67–75. IEEE (2008)

    Google Scholar 

  8. Beecken, M., Mittmann, J., Saxena, N.: Algebraic independence and blackbox identity testing. Inf. Comput. 222, 2–19 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  9. Cox, D.A., Little, J., O’Shea, D.: Using Algebraic Geometry. Springer, New York (2005)

    MATH  Google Scholar 

  10. Cox, D.A., Little, J., O’Shea, D.: Ideals, Varieties, and Algorithms: An Introduction to Computational Algebraic Geometry and Commutative Algebra. 3/e (Undergraduate Texts in Mathematics). Springer, New York (2007)

    Book  MATH  Google Scholar 

  11. Dvir, Z., Shpilka, A.: Locally decodable codes with two queries and polynomial identity testing for depth 3 circuits. SIAM J. Comput. 36(5), 1404–1434 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  12. Forbes, M.A., Shpilka, A.: Explicit Noether normalization for simultaneous conjugation via polynomial identity testing. In: Raghavendra, P., Raskhodnikova, S., Jansen, K., Rolim, J.D.P. (eds.) RANDOM 2013 and APPROX 2013. LNCS, vol. 8096, pp. 527–542. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  13. Forbes, M.A., Shpilka, A.: Quasipolynomial-time identity testing of non-commutative and read-once oblivious algebraic branching programs. In: 54th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2013, pp. 243–252 (2013)

    Google Scholar 

  14. Gupta, A., Kamath, P., Kayal, N., Saptharishi, R.: Approaching the chasm at depth four. In: IEEE Conference on Computational Complexity, pp. 65–73 (2013)

    Google Scholar 

  15. Gupta, A., Kamath, P., Kayal, N., Saptharishi, R.: Arithmetic circuits: a chasm at depth three. In: FOCS, pp. 578–587 (2013)

    Google Scholar 

  16. Gupta, A.: Algebraic geometric techniques for depth-4 PIT & Sylvester-Gallai conjectures for varieties. In: Electronic Colloquium on Computational Complexity (ECCC), vol. 21, p. 130 (2014)

    Google Scholar 

  17. Heintz, J., Schnorr, C.-P.: Testing polynomials which are easy to compute (extended abstract). In: Proceedings of the 12th Annual ACM Symposium on Theory of Computing, pp. 262–272 (1980)

    Google Scholar 

  18. Kabanets, V., Impagliazzo, R.: Derandomizing polynomial identity tests means proving circuit lower bounds. Comput. Complex. 13(1–2), 1–46 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  19. Karnin, Z.S., Mukhopadhyay, P., Shpilka, A., Volkovich, I.: Deterministic identity testing of depth-4 multilinear circuits with bounded top fan-in. SIAM J. Comput. 42(6), 2114–2131 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  20. Klivans, A., Spielman, D.A.: Randomness efficient identity testing of multivariate polynomials. In: Proceedings on 33rd Annual ACM Symposium on Theory of Computing, 6–8 July 2001, pp. 216–223 (2001)

    Google Scholar 

  21. Kayal, N., Saxena, N.: Polynomial identity testing for depth 3 circuits. Comput. Complex. 16(2), 115–138 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  22. Kayal, N., Saraf, S.: Blackbox polynomial identity testing for depth 3 circuits. In: 50th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2009, pp. 198–207 (2009)

    Google Scholar 

  23. Karnin, Z.S., Shpilka, A.: Black box polynomial identity testing of generalized depth-3 arithmetic circuits with bounded top fan-in. Combinatorica 31(3), 333–364 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  24. Lovász, L.: On determinants, matchings, and random algorithms. In: FCT, pp. 565–574 (1979)

    Google Scholar 

  25. Mulmuley, K.: Geometric complexity theory V: equivalence between blackbox derandomization of polynomial identity testing and derandomization of Noether’s Normalization Lemma. In: CoRR (also, in FOCS 2012) (2012). abs/1209.5993

    Google Scholar 

  26. Mumford, D.: Algebraic Geometry I : Complex Projective Varieties. Springer, Heidelberg (1976). Grundlehren der mathematischen Wissenschaften

    MATH  Google Scholar 

  27. Mulmuley, K., Vazirani, U.V., Vazirani, V.V.: Matching is as easy as matrix inversion. Combinatorica 7(1), 105–113 (1987)

    Article  MathSciNet  MATH  Google Scholar 

  28. Schwartz, J.T.: Fast probabilistic algorithms for verification of polynomial identities. J. ACM 27(4), 701–717 (1980)

    Article  MathSciNet  MATH  Google Scholar 

  29. Shamir, A.: IP=PSPACE. In: 31st Annual Symposium on Foundations of Computer Science, St. Louis, Missouri, USA, 22–24 October 1990, vol. 1, pp. 11–15 (1990)

    Google Scholar 

  30. Saxena, N., Seshadhri, C.: Blackbox identity testing for bounded top-fanin depth-3 circuits: the field doesn’t matter. SIAM J. Comput. 41(5), 1285–1298 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  31. Saraf, S., Volkovich, I.: Black-box identity testing of depth-4 multilinear circuits. In: Proceedings of the 43rd ACM Symposium on Theory of Computing, STOC 2011, pp. 421–430 (2011)

    Google Scholar 

  32. Shpilka, A., Yehudayoff, A.: Arithmetic circuits: a survey of recent results and open questions. Found. Trends Theoret. Comput. Sci. 5(3–4), 207–388 (2010)

    MathSciNet  MATH  Google Scholar 

  33. Zippel, R.: Probabilistic algorithms for sparse polynomials. In: Symbolic and Algebraic Computation, EUROSAM 1979, An International Symposiumon Symbolic and Algebraic Computation, pp. 216–226 (1979)

    Google Scholar 

Download references

Acknowledgement

I thank K.V. Subrahmanyam for many helpful discussions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Partha Mukhopadhyay .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Mukhopadhyay, P. (2016). Depth-4 Identity Testing and Noether’s Normalization Lemma. In: Kulikov, A., Woeginger, G. (eds) Computer Science – Theory and Applications. CSR 2016. Lecture Notes in Computer Science(), vol 9691. Springer, Cham. https://doi.org/10.1007/978-3-319-34171-2_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-34171-2_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-34170-5

  • Online ISBN: 978-3-319-34171-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics