skip to main content
10.1145/1374376.1374448acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
research-article

Read-once polynomial identity testing

Published: 17 May 2008 Publication History

Abstract

In this paper we study the problems of polynomial identity testing (PIT) and reconstruction of read-once formulas. The following are some deterministic algorithms that we obtain. An nO(k2) algorithm for checking whether given k ROFs sum to zero or not. An nO(d+k2) time algorithm for checking whether a black box holding the sum of k depth d ROFs computes the zero polynomial. In other words, we provide a hitting set of size nO(d+k2) for the sum of k depth d ROFs. This implies an nO(d) deterministic algorithm for the reconstruction of depth d ROFs. A hitting set of size exp(~O(√n+k2)) for the sum of k ROFs (without depth restrictions). This implies a sub-exponential time deterministic algorithm for black-box identity testing and reconstructing of ROFs. To the best of our knowledge our results give the first polynomial time (non black-box) and sub-exponential time (black-box) identity testing algorithms for the sum of (a constant number of) ROFs. In addition, we introduce and study the read-once testing problem (ROT for short): Given an arithmetic circuit computing a polynomial P(x), decide whether there is a ROF computing P(x). If there is such a formula then output it. Otherwise output "No". We show that most previous algorithms for polynomial identity testing can be strengthen to yield algorithms for the ROT problem. In particular we give ROT algorithms for: Depth-2 circuits (circuits computing sparse polynomials), Depth-3 circuits with bounded top fan-in (both in the black-box and non black-box settings, where the running time depends on the model), non-commutative formulas and sum of k ROFs. The running time of the ROT algorithm is essentially the same running time as the corresponding PIT algorithm for the class. The main tool in most of our results is a new connection between polynomial identity testing and reconstruction of read-once formulas. Namely, we show that in any model that is closed under partial derivatives (that is, a partial derivative of a polynomial computed by a circuit in the model, can also be computed by a circuit in the model) and that has an efficient deterministic polynomial identity testing algorithm, we can also answer the read-once testing problem.

References

[1]
M. Agrawal. Proving lower bounds via pseudo-random generators. In 25th FSTTCS, volume 3821 of LNCS, pages 92--105, 2005.
[2]
D. Angluin, L. Hellerstein, and M. Karpinski. Learning read-once formulas with queries. JACM, 40(1):185--210, 1993.
[3]
V. Arvind and P. Mukhopadhyay. The ideal membership problem and polynomial identity testing. ECCC Report TR07-095, 2007.
[4]
M. Ben-Or and P. Tiwari. A deterministic algorithm for sparse multivariate polynominal interpolation. In 20th STOC, pages 301--309, 1988.
[5]
A. Bogdanov and H. Wee. More on noncommutative polynomial identity testing. In 20th CCC, pages 92--99, 2005.
[6]
D. Bshouty and N. H. Bshouty. On interpolating arithmetic read-once formulas with exponentiation. JCSS, 56(1):112--124, 1998.
[7]
N. H. Bshouty and R. Cleve. Interpolating arithmetic read-once formulas in parallel. SICOMP, 27(2):401--413, 1998.
[8]
N. H. Bshouty, T. R. Hancock, and L. Hellerstein. Learning arithmetic read-once formulas. SICOMP, 24(4):706--735, 1995.
[9]
N. H. Bshouty, T. R. Hancock, and L. Hellerstein. Learning boolean read-once formulas with arbitrary symmetric and constant fan-in gates. JCSS, 50:521--542, 1995.
[10]
Z. Dvir and A. Shpilka. Locally decodable codes with 2 queries and polynomial identity testing for depth 3 circuits. SICOMP, 36(5):1404--1434, 2006.
[11]
Z. Dvir, A. Shpilka and A. Yehudayoff. Hardness-randomness tradeoffs for bounded deptharithemtic circuits. To appear in 40th STOC, 2008.
[12]
D. Grigoriev, M. Karpinski, and M. F. Singer. Fast parallel algorithms for sparse multivariate polynomial interpolation over finite fields. SICOMP, 19(6):1059--1063, 1990.
[13]
T. R. Hancock and L. Hellerstein. Learning read-once formulas over fields and extended bases. In 4th COLT, pages 326--336, 1991.
[14]
V. Kabanets and R. Impagliazzo. Derandomizing polynomial identity tests means proving circuit lower bounds. Comp. Complexity, 13(1-2):1--46, 2004.
[15]
M. Karchmer, N. Linial, I. Newman, M. E. Saks, and A. Wigderson. Combinatorial characterization of read-once formulae. Discrete Mathematics, 114(1-3):275--282, 1993.
[16]
Z. Karnin and A. Shpilka. Black box polynomial identity testing of generalized depth-3 arithmetic circuits with bounded top fan-in. To appear in 23rd CCC, 2008.
[17]
Z. Karnin and A. Shpilka. Interpolating depth-3 arithmetic circuits with bounded topfan-in. Manuscript, 2008.
[18]
N. Kayal and N. Saxena. Polynomial identity testing for depth 3 circuits. Comp. Complexity, 16(2):115--138, 2007.
[19]
A. Klivans and D. Spielman. Randomness efficient identity testing of multivariate polynomials. In 33rd STOC, pages 216--223, 2001.
[20]
B. Lhotzky. On the computational complexity of some algebraic counting problems. Ph.D. thesis, University of Bonn, Department of computer Science, Bonn, Germany, 1991.
[21]
R. J. Lipton and N. K. Vishnoi. Deterministic identity testing for multivariate polynomials. In 14th SODA, pages 756-760, 2003.
[22]
R. Raz and A. Shpilka. Deterministic polynomial identity testing in non commutative models. Comp. Complexity, 14(1):1--19, 2005.
[23]
J. T. Schwartz. Fast probabilistic algorithms for verification of polynomial identities. JACM, 27(4):701--717, 1980.
[24]
A. Shpilka. Interpolation of depth-3 arithmetic circuitswith two multiplication gates. In 39th STOC, pages 284--293, 2007.
[25]
R. Zippel. Probabilistic algorithms for sparse polynomials. In Symb. and alg. comp., pages 216--226. 1979.

Cited By

View all
  • (2018)Complete Derandomization of Identity Testing and Reconstruction of Read-Once FormulasACM Transactions on Computation Theory10.1145/319683610:3(1-11)Online publication date: 23-May-2018
  • (2017)Complete derandomization of identity testing and reconstruction of read-once formulasProceedings of the 32nd Computational Complexity Conference10.5555/3135595.3135627(1-13)Online publication date: 9-Jul-2017
  • (2016)Identity testing and lower bounds for read-k oblivious algebraic branching programsProceedings of the 31st Conference on Computational Complexity10.5555/2982445.2982475(1-25)Online publication date: 29-May-2016
  • Show More Cited By

Index Terms

  1. Read-once polynomial identity testing

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    STOC '08: Proceedings of the fortieth annual ACM symposium on Theory of computing
    May 2008
    712 pages
    ISBN:9781605580470
    DOI:10.1145/1374376
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 17 May 2008

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. arithmetic circuits
    2. bounded depth circuits
    3. identity testing
    4. read-once formulas
    5. reconstruction

    Qualifiers

    • Research-article

    Conference

    STOC '08
    Sponsor:
    STOC '08: Symposium on Theory of Computing
    May 17 - 20, 2008
    British Columbia, Victoria, Canada

    Acceptance Rates

    STOC '08 Paper Acceptance Rate 80 of 325 submissions, 25%;
    Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

    Upcoming Conference

    STOC '25
    57th Annual ACM Symposium on Theory of Computing (STOC 2025)
    June 23 - 27, 2025
    Prague , Czech Republic

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)5
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 18 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2018)Complete Derandomization of Identity Testing and Reconstruction of Read-Once FormulasACM Transactions on Computation Theory10.1145/319683610:3(1-11)Online publication date: 23-May-2018
    • (2017)Complete derandomization of identity testing and reconstruction of read-once formulasProceedings of the 32nd Computational Complexity Conference10.5555/3135595.3135627(1-13)Online publication date: 9-Jul-2017
    • (2016)Identity testing and lower bounds for read-k oblivious algebraic branching programsProceedings of the 31st Conference on Computational Complexity10.5555/2982445.2982475(1-25)Online publication date: 29-May-2016
    • (2016)Building Above Read-Once PolynomialsAlgorithmica10.1007/s00453-015-0101-z76:4(890-909)Online publication date: 1-Dec-2016
    • (2016)Subexponential Size Hitting Sets for Bounded Depth Multilinear FormulasComputational Complexity10.1007/s00037-016-0131-125:2(455-505)Online publication date: 1-Jun-2016
    • (2015)Subexponential size hitting sets for bounded depth multilinear formulasProceedings of the 30th Conference on Computational Complexity10.5555/2833227.2833242(304-322)Online publication date: 17-Jun-2015
    • (2015)Read-once polynomial identity testingComputational Complexity10.1007/s00037-015-0105-824:3(477-532)Online publication date: 1-Sep-2015
    • (2015)Deterministic polynomial identity tests for multilinear bounded-read formulaeComputational Complexity10.1007/s00037-015-0097-424:4(695-776)Online publication date: 1-Dec-2015
    • (2013)From sylvester-gallai configurations to rank boundsJournal of the ACM10.1145/252840360:5(1-33)Online publication date: 28-Oct-2013
    • (2013)Random Arithmetic Formulas Can Be Reconstructed Efficiently2013 IEEE Conference on Computational Complexity10.1109/CCC.2013.10(1-9)Online publication date: Jun-2013
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media