Skip to main content

Abstract

An arithmetic read-once formula (ROF for short) is a formula (a circuit whose underlying graph is a tree) in which the operations are { + ,×} and such that every input variable labels at most one leaf. In this paper we study the problems of giving deterministic identity testing and reconstruction algorithms for ROFs. Our main result is an \(n^{{\mathcal{O}}(k + \log n)}\) time deterministic algorithm for checking whether a black box holding the sum of k n-variate ROFs computes the zero polynomial. In other words, we provide a hitting set of size \(n^{{\mathcal{O}}(k + \log n)}\) for the sum of k ROFs. This result greatly improves [27] where an \(n^{{\mathcal{O}}(k^2 + \sqrt n)}\) algorithm was given for the problem.

Using our new results we obtain a deterministic reconstruction algorithms for read-once formulas that runs in time \(n^{{\mathcal{O}}(\log n)}\).

In fact, our results also hold for the more general model of preprocessed read-once formulas that we define in this paper. In this model we are allowed to replace each variable x i with a polynomial T i (x i ).

Our techniques are very close to the techniques in [27]. The main difference is that we obtain several tighter versions of the tools first used there. In particular we obtain a better version of the hardness of representation approach which was first used in [27]. This technique can be thought of as a very explicit way of transforming (mild) hardness of a very structured polynomial to an identity testing algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agrawal, M.: Proving lower bounds via pseudo-random generators. In: Sarukkai, S., Sen, S. (eds.) FSTTCS 2005. LNCS, vol. 3821, pp. 92–105. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  2. Agrawal, M., Biswas, S.: Primality and identity testing via chinese remaindering. JACM 50(4), 429–443 (2003)

    Article  MathSciNet  Google Scholar 

  3. Agrawal, M., Vinay, V.: Arithmetic circuits: A chasm at depth four. In: Proceedings of the 49th FOCS, pp. 67–75 (2008)

    Google Scholar 

  4. Arvind, V., Mukhopadhyay, P.: The monomial ideal membership problem and polynomial identity testing. In: Tokuyama, T. (ed.) ISAAC 2007. LNCS, vol. 4835, pp. 800–811. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  5. Ben-Or, M., Tiwari, P.: A deterministic algorithm for sparse multivariate polynomial interpolation. In: Proceedings of the 20th STOC, pp. 301–309 (1988)

    Google Scholar 

  6. Bshouty, D., Bshouty, N.H.: On interpolating arithmetic read-once formulas with exponentiation. J. of Computer and System Sciences 56(1), 112–124 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  7. Bshouty, N.H., Hancock, T.R., Hellerstein, L.: Learning arithmetic read-once formulas. SICOMP 24(4), 706–735 (1995)

    MathSciNet  MATH  Google Scholar 

  8. Chen, Z., Kao, M.: Reducing randomness via irrational numbers. In: Proceedings of the 29th STOC, pp. 200–209 (1997)

    Google Scholar 

  9. Dvir, Z., Shpilka, A.: Locally decodable codes with 2 queries and polynomial identity testing for depth 3 circuits. SICOMP 36(5), 1404–1434 (2006)

    MathSciNet  Google Scholar 

  10. Dvir, Z., Shpilka, A., Yehudayoff, A.: Hardness-randomness tradeoffs for bounded depth arithmetic circuits. In: Proceedings of the 40th STOC, pp. 741–748 (2008)

    Google Scholar 

  11. Hancock, T.R., Hellerstein, L.: Learning read-once formulas over fields and extended bases. In: Proceedings of the 4th COLT, pp. 326–336 (1991)

    Google Scholar 

  12. Kabanets, V., Impagliazzo, R.: Derandomizing polynomial identity tests means proving circuit lower bounds. Computational Complexity 13(1-2), 1–46 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  13. Karnin, Z.S., Shpilka, A.: Deterministic black box polynomial identity testing of depth-3 arithmetic circuits with bounded top fan-in. In: Proceedings of the 23rd CCC, pp. 280–291 (2008)

    Google Scholar 

  14. Kayal, N., Saxena, N.: Polynomial identity testing for depth 3 circuits. Computational Complexity 16(2), 115–138 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  15. Klivans, A., Spielman, D.: Randomness efficient identity testing of multivariate polynomials. In: Proceedings of the 33rd STOC, pp. 216–223 (2001)

    Google Scholar 

  16. Lewin, D., Vadhan, S.: Checking polynomial identities over any field: Towards a derandomization? In: Proceedings of the 30th STOC, pp. 428–437 (1998)

    Google Scholar 

  17. Lipton, R.J., Vishnoi, N.K.: Deterministic identity testing for multivariate polynomials. In: Proceedings of the 14th SODA, pp. 756–760 (2003)

    Google Scholar 

  18. Raz, R.: Multilinear NC 1 ≠ Multilinear NC 2. In: Proceedings of the 45th FOCS, pp. 344–351 (2004)

    Google Scholar 

  19. Raz, R.: Extractors with weak random seeds. In: Proceedings of the 37th STOC, pp. 11–20 (2005)

    Google Scholar 

  20. Raz, R., Shpilka, A.: Deterministic polynomial identity testing in non commutative models. Computational Complexity 14(1), 1–19 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  21. Raz, R., Shpilka, A., Yehudayoff, A.: A lower bound for the size of syntactically multilinear arithmetic circuits. SICOMP 38(4), 1624–1647 (2008)

    MathSciNet  MATH  Google Scholar 

  22. Raz, R., Yehudayoff, A.: Lower bounds and separations for constant depth multilinear circuits. In: 40th CCC, pp. 128–139 (2008)

    Google Scholar 

  23. Saxena, N.: Diagonal circuit identity testing and lower bounds. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part I. LNCS, vol. 5125, pp. 60–71. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  24. Saxena, N., Seshadhri, C.: An almost optimal rank bound for depth-3 identities. CoRR, abs/0811.3161 (2008)

    Google Scholar 

  25. Schwartz, J.T.: Fast probabilistic algorithms for verification of polynomial identities. JACM 27(4), 701–717 (1980)

    Article  MATH  Google Scholar 

  26. Shpilka, A.: Interpolation of depth-3 arithmetic circuits with two multiplication gates. SICOMP 38(6), 2130–2161 (2009)

    MathSciNet  MATH  Google Scholar 

  27. Shpilka, A., Volkovich, I.: Read-once polynomial identity testing. In: Proceedings of the 40th STOC, pp. 507–516 (2008)

    Google Scholar 

  28. Zippel, R.: Probabilistic algorithms for sparse polynomials. In: Symbolic and algebraic computation, pp. 216–226 (1979)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shpilka, A., Volkovich, I. (2009). Improved Polynomial Identity Testing for Read-Once Formulas. In: Dinur, I., Jansen, K., Naor, J., Rolim, J. (eds) Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques. APPROX RANDOM 2009 2009. Lecture Notes in Computer Science, vol 5687. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03685-9_52

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03685-9_52

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03684-2

  • Online ISBN: 978-3-642-03685-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics