Publication | Closed Access
Black Box Polynomial Identity Testing of Generalized Depth-3 Arithmetic Circuits with Bounded Top Fan-In
45
Citations
27
References
2008
Year
Unknown Venue
Circuit ComplexityComputational Complexity TheoryEngineeringComputational ComplexityFormal VerificationHardware SecurityCircuit SystemAlgebraic ComplexityBounded Top Fan-inUnknown Arithmetic CircuitDiscrete MathematicsCircuit AnalysisOracle AccessComputer ScienceTheory Of ComputingCircuit DesignFormal MethodsMathematical FoundationsAlgebraic MethodTime ComplexityZero PolynomialCircuit Simulation
In this paper we consider the problem of determining whether an unknown arithmetic circuit, for which we have oracle access, computes the identically zero polynomial. This problem is known as the black-box polynomial identity testing (PIT) problem. Our focus is on polynomials that can be written in the form f(xmacr) = Sigma <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">i=1</sub> <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">k</sup> h <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">i</sub> (xmacr) ldr g <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">i</sub> (xmacr), where each hi is a polynomial that depends on at most p linear functions, and each g <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">i</sub> is a product of linear functions (when h <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">i</sub> = 1, for each i, then we get the class of depth-3 circuits with k multiplication gates, also known as SigmaPiSigma(k) circuits, but the general case is much richer). When max <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">i</sub> (deg(h <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">i</sub> ldrg <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">i</sub> )) = d we say that f is computable by a SigmaPiSigma(k, d, p) circuit. We obtain the following results. 1. A deterministic black-box identity testing algorithm for SigmaPiSigma(k, d, p) circuits that runs in quasi-polynomial time (for p = polylog(n + d)). 2. A deterministic black-box identity testing algorithm for read-k SigmaPiSigma circuits (depth-3 circuits where each variable appears at most k times) that runs in time n <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sup> <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">o(k2)</sup> This gives a polynomial time algorithm for k = 0(1). These are the first sub-exponential black-box PIT algorithms for circuits of depth higher than 2. Our results can also be stated in terms of test sets for the underlying circuit model. A test set is a set of points s.t. if two circuits get the same values on every point of the set then they compute the same polynomial. Thus, our first result gives an explicit test set, of quasi-polynomial size, for SigmaPiSigma(k, d, p) circuits (for p = polylog(n + d)). Our second result gives an explicit polynomial size test set for read-k depth-3 circuits. The proof technique involves a construction of a family of affine subspaces that have a rank-preserving property that is inspired by the construction of linear seeded extractors for affine sources of Gabizon andRaz [9], and a generalization of a theorem of [8] regarding the structure of identically zero depth-3 circuits with bounded top fan-in.
| Year | Citations | |
|---|---|---|
Page 1
Page 1