Results 1  10
of
63
FROM SYLVESTERGALLAI CONFIGURATIONS TO RANK BOUNDS: IMPROVED BLACKBOX IDENTITY TEST FOR DEPTH3 CIRCUITS
"... Abstract. We study the problem of identity testing for depth3 circuits of top fanin k and degree d (called ΣΠΣ(k, d) identities). We give a new structure theorem for such identities. A direct application of our theorem improves the known deterministic d kO(k) time blackbox identity test over ratio ..."
Abstract

Cited by 27 (6 self)
 Add to MetaCart
Abstract. We study the problem of identity testing for depth3 circuits of top fanin k and degree d (called ΣΠΣ(k, d) identities). We give a new structure theorem for such identities. A direct application of our theorem improves the known deterministic d kO(k) time blackbox identity test over rationals (Kayal & Saraf, FOCS 2009) to one that takes d O(k2)time. Our structure theorem essentially says that the number of independent variables in a real depth3 identity is very small. This theorem settles affirmatively the stronger rank conjectures posed by Dvir & Shpilka (STOC 2005) and Kayal & Saraf (FOCS 2009). Our techniques provide a unified framework that actually beats all known rank bounds and hence gives the best running time (for every field) for blackbox identity tests. Our main theorem (almost optimally) pins down the relation between higher dimensional SylvesterGallai theorems and the rank of depth3 identities in a very transparent manner. The existence of this was hinted at by Dvir & Shpilka (STOC 2005), but first proven, for reals, by Kayal & Saraf (FOCS 2009). We introduce the concept of SylvesterGallai rank bounds for any field, and show the intimate connection between this and depth3 identity rank bounds. We also prove the first ever theorem about high dimensional SylvesterGallai configurations over any field. Our proofs and techniques are very different from previous results and devise a very interesting ensemble of combinatorics and algebra. The latter concepts are ideal theoretic and involve a new Chinese remainder theorem. Our proof methods explain the structure of any depth3 identity C: there is a nucleus of C that forms a low rank identity, while the remainder is a high dimensional SylvesterGallai configuration. 1.
Readonce Polynomial Identity Testing
"... An arithmetic readonce formula (ROF for short) is a formula (a circuit in which the fanout of every gate is at most 1) in which the operations are {+, ×} and such that every input variable labels at most one leaf. In this paper we study the problems of identity testing and reconstruction of readon ..."
Abstract

Cited by 23 (6 self)
 Add to MetaCart
An arithmetic readonce formula (ROF for short) is a formula (a circuit in which the fanout of every gate is at most 1) in which the operations are {+, ×} and such that every input variable labels at most one leaf. In this paper we study the problems of identity testing and reconstruction of readonce formulas. the following are some of the results that we obtain. 1. Given k ROFs in n variables, over a field F, we give a deterministic (non blackbox) algorithm that checks whether they sum to zero or not. The running time of the algorithm is n O(k2). 2. We give an n O(d+k2) time deterministic algorithm for checking whether a black box holding the sum of k depth d ROFs in n variables computes the zero polynomial. In other words, we provide a hitting set of size n O(d+k2) for the sum of k depth d ROFs. If F  is too small then we make queries from a polynomial size extension field. This implies a deterministic algorithm that runs in time n O(d) for the reconstruction of depth d ROFs. 3. We give a hitting set of size exp ( Õ( √ n + k 2)) for the sum of k ROFs (without depth restrictions). In particular this implies a subexponential time deterministic algorithm for
TensorRank and Lower Bounds for Arithmetic Formulas
"... We show that any explicit example for a tensor A: [n] r → F with tensorrank ≥ nr·(1−o(1)) , (where r = r(n) ≤ log n / log log n), implies an explicit superpolynomial lower bound for the size of general arithmetic formulas over F. This shows that strong enough lower bounds for the size of arithmet ..."
Abstract

Cited by 22 (1 self)
 Add to MetaCart
(Show Context)
We show that any explicit example for a tensor A: [n] r → F with tensorrank ≥ nr·(1−o(1)) , (where r = r(n) ≤ log n / log log n), implies an explicit superpolynomial lower bound for the size of general arithmetic formulas over F. This shows that strong enough lower bounds for the size of arithmetic formulas of depth 3 imply superpolynomial lower bounds for the size of general arithmetic formulas. One component of our proof is a new approach for homogenization and multilinearization of arithmetic formulas, that gives the following results: We show that for any nvariate homogenous polynomial f of degree r, if there exists a (fanin2) ( formula of size s and depth d for f then there exists a homogenous (d+r+1)) formula of size O r · s for f. In particular, for any r ≤ log n, if there exists a polynomial size formula for f then there exists a polynomial size homogenous formula for f. This refutes a conjecture of Nisan and Wigderson [NW95] and shows that superpolynomial lower bounds for homogenous formulas for polynomials of small degree imply superpolynomial lower bounds for general formulas. We show that for any nvariate setmultilinear polynomial f of degree r, if there exists a (fanin2) formula of size s and depth d for f then there exists a setmultilinear formula of size O ((d + 2) r · s) for f. In particular, for any r ≤ log n / log log n, if there exists a polynomial size formula for f then there exists a polynomial size setmultilinear formula for f. This shows that superpolynomial lower bounds for setmultilinear formulas for polynomials of small degree imply superpolynomial lower bounds for general formulas.
Blackbox identity testing for bounded top fanin depth3 circuits: the field doesn’t matter
 In Proceedings of the 43rd annual ACM Symposium on Theory of Computing (STOC
, 2011
"... Abstract. Let C be a depth3 circuit with n variables, degree d and top fanin k (called ΣΠΣ(k, d, n) circuits) over base field F. It is a major open problem to design a deterministic polynomial time blackbox algorithm that tests if C is identically zero. Klivans & Spielman (STOC 2001) observed ..."
Abstract

Cited by 20 (7 self)
 Add to MetaCart
Abstract. Let C be a depth3 circuit with n variables, degree d and top fanin k (called ΣΠΣ(k, d, n) circuits) over base field F. It is a major open problem to design a deterministic polynomial time blackbox algorithm that tests if C is identically zero. Klivans & Spielman (STOC 2001) observed that the problem is open even when k is a constant. This case has been subjected to a serious study over the past few years, starting from the work of Dvir & Shpilka (STOC 2005). We give the first polynomial time blackbox algorithm for this problem. Our algorithm runs in time poly(n)dk, regardless of the base field. The only field for which polynomial time algorithms were previously known is F = Q (Kayal & Saraf, FOCS 2009, and Saxena & Seshadhri, FOCS 2010). This is the first blackbox algorithm for depth3 circuits that does not use the rank based approaches of Karnin & Shpilka (CCC 2008). We prove an important tool for the study of depth3 identities. We design a blackbox polynomial time transformation that reduces the number of variables in a ΣΠΣ(k, d, n) circuit to k variables, but preserves the identity structure. Key words. depth3 circuits; polynomial identity testing; derandomization; blackbox; Chinese remaindering; algebra homomorphism
Quasipolynomial hittingset for setdepth formulas
 In STOC
, 2013
"... Abstract. We call a depth4 formula C setdepth4 if there exists a (unknown) partition X1 unionsq · · · unionsq Xd of the variable indices [n] that the top product layer respects, i.e. C(x) = ∑k i=1 ..."
Abstract

Cited by 15 (6 self)
 Add to MetaCart
Abstract. We call a depth4 formula C setdepth4 if there exists a (unknown) partition X1 unionsq · · · unionsq Xd of the variable indices [n] that the top product layer respects, i.e. C(x) = ∑k i=1
Verifiable Delegation of Computation on Outsourced Data
, 2013
"... We address the problem in which a client stores a large amount of data with an untrusted server in such a way that, at any moment, the client can ask the server to compute a function on some portion of its outsourced data. In this scenario, the client must be able to efficiently verify the correct ..."
Abstract

Cited by 14 (5 self)
 Add to MetaCart
We address the problem in which a client stores a large amount of data with an untrusted server in such a way that, at any moment, the client can ask the server to compute a function on some portion of its outsourced data. In this scenario, the client must be able to efficiently verify the correctness of the result despite no longer knowing the inputs of the delegated computation, it must be able to keep adding elements to its remote storage, and it does not have to fix in advance (i.e., at data outsourcing time) the functions that it will delegate. Even more ambitiously, clients should be able to verify in time independent of the inputsize – a very appealing property for computations over huge amounts of data. In this work we propose novel cryptographic techniques that solve the above problem for the class of computations of quadratic polynomials over a large number of variables. This class covers a wide range of significant arithmetic computations – notably, many important statistics. To confirm the efficiency of our solution, we show encouraging performance results, e.g., correctness proofs have size below 1 kB
Blackbox identity testing of depth4 multilinear circuits
 In Proceedings of the 43rd ACM Symposium on Theory of Computing (STOC
, 2011
"... We study the problem of identity testing for multilinear ΣΠΣΠ(k) circuits, i.e. multilinear depth4 circuits with fanin k at the top + gate. We give the first polynomialtime deterministic identity testing algorithm for such circuits. Our results also hold in the blackbox setting. The running time ..."
Abstract

Cited by 14 (3 self)
 Add to MetaCart
(Show Context)
We study the problem of identity testing for multilinear ΣΠΣΠ(k) circuits, i.e. multilinear depth4 circuits with fanin k at the top + gate. We give the first polynomialtime deterministic identity testing algorithm for such circuits. Our results also hold in the blackbox setting. The running time of our algorithm is (ns)O(k 3), where n is the number of variables, s is the size of the circuit and k is the fanin of the top gate. The importance of this model arises from [AV08], where it was shown that derandomizing blackbox polynomial identity testing for general depth4 circuits implies a derandomization of polynomial identity testing (PIT) for general arithmetic circuits. Prior to our work, the best PIT algorithm for multilinear ΣΠΣΠ(k) circuits [KMSV10] ran in quasipolynomialtime, with the running time being nO(k 6 log(k) log2 s). We obtain our results by showing a strong structural result for multilinear ΣΠΣΠ(k) circuits that compute the zero polynomial. We show that under some mild technical conditions, any gate of such a circuit must compute a sparse polynomial. We then show how to combine the structure theorem with a result by Klivans and Spielman [KS01], on the identity testing for sparse polynomials, to yield the full result.
Jacobian hits circuits: Hittingsets, lower bounds for depthD occurk formulas & depth3 transcendence degreek circuits
"... ..."
(Show Context)
Practical homomorphic macs for arithmetic circuits
 In EUROCRYPT
, 2013
"... Abstract. Homomorphic message authenticators allow the holder of a (public) evaluation key to perform computations over previously authenticated data, in such a way that the produced tag σ can be used to certify the authenticity of the computation. More precisely, a user knowing the secret key sk us ..."
Abstract

Cited by 11 (4 self)
 Add to MetaCart
Abstract. Homomorphic message authenticators allow the holder of a (public) evaluation key to perform computations over previously authenticated data, in such a way that the produced tag σ can be used to certify the authenticity of the computation. More precisely, a user knowing the secret key sk used to authenticate the original data, can verify that σ authenticates the correct output of the computation. This primitive has been recently formalized by Gennaro and Wichs, who also showed how to realize it from fully homomorphic encryption. In this paper, we show new constructions of this primitive that, while supporting a smaller set of functionalities (i.e., polynomiallybounded arithmetic circuits as opposite to boolean ones), are much more efficient and easy to implement. Moreover, our schemes can tolerate any number of (malicious) verification queries. Our first construction relies on the sole assumption that one way functions exist, allows for arbitrary composition (i.e., outputs of previously authenticated computations can be used as inputs for new ones) but has the drawback that the size of the produced tags grows with the degree of the circuit. Our second solution, relying on the DDiffieHellman Inversion assumption, offers somewhat orthogonal features as it allows for very short tags (one single group element!) but poses some restrictions on the composition side. 1
A CASE OF DEPTH3 IDENTITY TESTING, SPARSE FACTORIZATION AND DUALITY
"... Polynomial identity testing (PIT) problem is known to be challenging even for constant depth arithmetic circuits. In this work, we study the complexity of two special but natural cases of identity testing first is a case of depth3 PIT, the other of depth4 PIT. Our first problem is a vast generali ..."
Abstract

Cited by 10 (5 self)
 Add to MetaCart
Polynomial identity testing (PIT) problem is known to be challenging even for constant depth arithmetic circuits. In this work, we study the complexity of two special but natural cases of identity testing first is a case of depth3 PIT, the other of depth4 PIT. Our first problem is a vast generalization of: Verify whether a bounded top fanin depth3 circuit equals a sparse polynomial (given as a sum of monomial terms). Formally, given a depth3 circuit C, having constant many general product gates and arbitrarily many semidiagonal product gates, test if the output of C is identically zero. A semidiagonal product gate in C computes a product of the form m · ∏b, where m is a i=1 ℓei i monomial, ℓi is an affine linear polynomial and b is a constant. We give a deterministic polynomial time test, along with the computation of leading monomials of semidiagonal circuits over local rings. The second problem is on verifying a given sparse polynomial factorization, which is a classical question (von zur Gathen, FOCS 1983): Given multivariate sparse polynomials f, g1,..., gt explicitly, check if f = ∏ t i=1 gi. For the special case when every gi is a sum of univariate polynomials, we give a deterministic polynomial time test. We characterize the factors of such gi’s and even show how to test the divisibility of f by the powers of such polynomials. The common tools used are Chinese remaindering and dual representation. The dual representation of polynomials (Saxena, ICALP 2008) is a technique to express a productofsums of univariates as a sumofproducts of univariates. We generalize this technique by combining it with a generalized Chinese remaindering to solve these two problems (over any field).