Results 1  10
of
23
Cryptographic hardness for learning intersections of halfspaces
 J. Comput. Syst. Sci
"... We give the first representationindependent hardness results for PAC learning intersections of halfspaces, a central concept class in computational learning theory. Our hardness results are derived from two publickey cryptosystems due to Regev, which are based on the worstcase hardness of wellstu ..."
Abstract

Cited by 29 (12 self)
 Add to MetaCart
We give the first representationindependent hardness results for PAC learning intersections of halfspaces, a central concept class in computational learning theory. Our hardness results are derived from two publickey cryptosystems due to Regev, which are based on the worstcase hardness of wellstudied lattice problems. Specifically, we prove that a polynomialtime algorithm for PAC learning intersections of n ε halfspaces (for a constant ε> 0) in n dimensions would yield a polynomialtime solution to Õ(n 1.5)uSVP (unique shortest vector problem). We also prove that PAC learning intersections of n ε lowweight halfspaces would yield a polynomialtime quantum solution to Õ(n 1.5)SVP and Õ(n 1.5)SIVP (shortest vector problem and shortest independent vector problem, respectively). Our approach also yields the first representationindependent hardness results for learning polynomialsize depth2 neural networks and polynomialsize depth3 arithmetic circuits. Key words: Cryptographic hardness results, intersections of halfspaces, computational learning theory, latticebased cryptography 1
Locally decodable codes with 2 queries and polynomial identity testing for depth 3 circuits
 SIAM J. COMPUT
, 2007
"... In this work we study two, seemingly unrelated, notions. Locally decodable codes (LDCs) are codes that allow the recovery of each message bit from a constant number of entries of the codeword. Polynomial identity testing (PIT) is one of the fundamental problems of algebraic complexity: we are given ..."
Abstract

Cited by 26 (7 self)
 Add to MetaCart
In this work we study two, seemingly unrelated, notions. Locally decodable codes (LDCs) are codes that allow the recovery of each message bit from a constant number of entries of the codeword. Polynomial identity testing (PIT) is one of the fundamental problems of algebraic complexity: we are given a circuit computing a multivariate polynomial and we have to determine whether the polynomial is identically zero. We improve known results on LDCs and on polynomial identity testing and show a relation between the two notions. In particular we obtain the following results: (1) We show that if E: F n ↦ → F m is a linear LDC with two queries, then m = exp(Ω(n)). Previously this was known only for fields of size ≪ 2 n [O. Goldreich et al., Comput. Complexity, 15 (2006), pp. 263–296]. (2) We show that from every depth 3 arithmetic circuit (ΣΠΣ circuit), C, with a bounded (constant) top fanin that computes the zero polynomial, one can construct an LDC. More formally, assume that C is minimal (no subset of the multiplication gates sums to zero) and simple (no linear function appears in all the multiplication gates). Denote by d the degree of the polynomial computed by C and by r the rank of the linear functions appearing in C. Then we can construct a linear LDC with two queries that encodes messages of length r/polylog(d) by codewords of length O(d). (3) We prove a structural theorem for ΣΠΣ circuits, with a bounded top fanin, that
Polynomial identity testing for depth 3 circuits
 in Proceedings of the twentyfirst Annual IEEE Conference on Computational Complexity (CCC
, 2006
"... Abstract — We study ΣΠΣ(k) circuits, i.e., depth three arithmetic circuits with top fanin k. We give the first deterministic polynomial time blackbox identity test for ΣΠΣ(k) circuits over the field Q of rational numbers, thus resolving a question posed by Klivans and Spielman (STOC 2001). Our main ..."
Abstract

Cited by 23 (5 self)
 Add to MetaCart
Abstract — We study ΣΠΣ(k) circuits, i.e., depth three arithmetic circuits with top fanin k. We give the first deterministic polynomial time blackbox identity test for ΣΠΣ(k) circuits over the field Q of rational numbers, thus resolving a question posed by Klivans and Spielman (STOC 2001). Our main technical result is a structural theorem for ΣΠΣ(k) circuits that compute the zero polynomial. In particular we show that if a ΣΠΣ(k) circuit C = ∑ i∈[k] Ai
HardnessRandomness Tradeoffs for Bounded Depth Arithmetic Circuits
"... In this paper we show that lower bounds for bounded depth arithmetic circuits imply derandomization of polynomial identity testing for bounded depth arithmetic circuits. More formally, if there exists an explicit polynomial f(x1,..., xm) that cannot be computed by a depth d arithmetic circuit of sma ..."
Abstract

Cited by 13 (2 self)
 Add to MetaCart
In this paper we show that lower bounds for bounded depth arithmetic circuits imply derandomization of polynomial identity testing for bounded depth arithmetic circuits. More formally, if there exists an explicit polynomial f(x1,..., xm) that cannot be computed by a depth d arithmetic circuit of small size then there exists an efficient deterministic algorithm to test whether a given depth d − 8 circuit is identically zero or not (assuming the individual degrees of the tested circuit are not too high). In particular, if we are guaranteed that the tested circuit computes a multilinear polynomial then we can perform the identity test efficiently. To the best of our knowledge this is the first hardnessrandomness tradeoff for bounded depth arithmetic circuits. The above results are obtained using the the arithmetic NisanWigderson generator of [KI04] together with a new theorem on bounded depth circuits, which is the main technical contribution of our work. This theorem deals with polynomial equations of the form P (x1,..., xn, y) ≡ 0 and shows that if P has a circuit of depth d and size s and if the polynomial f(x1,..., xn) satisfies P (x1,..., xn, f(x1,..., xn)) ≡ 0 then f has a circuit of depth d + 3 and size O(s · r + m r), where m is the total degree of f and r is the degree of y in P.
Hardness as randomness: A survey of universal derandomization
 in Proceedings of the International Congress of Mathematicians
, 2002
"... We survey recent developments in the study of probabilistic complexity classes. While the evidence seems to support the conjecture that probabilism can be deterministically simulated with relatively low overhead, i.e., that P = BPP, it also indicates that this may be a difficult question to resolve. ..."
Abstract

Cited by 11 (5 self)
 Add to MetaCart
We survey recent developments in the study of probabilistic complexity classes. While the evidence seems to support the conjecture that probabilism can be deterministically simulated with relatively low overhead, i.e., that P = BPP, it also indicates that this may be a difficult question to resolve. In fact, proving that probalistic algorithms have nontrivial deterministic simulations is basically equivalent to proving circuit lower bounds, either in the algebraic or Boolean models.
Readonce Polynomial Identity Testing
"... An arithmetic readonce formula (ROF for short) is a formula (a circuit in which the fanout of every gate is at most 1) in which the operations are {+, ×} and such that every input variable labels at most one leaf. In this paper we study the problems of identity testing and reconstruction of readon ..."
Abstract

Cited by 11 (4 self)
 Add to MetaCart
An arithmetic readonce formula (ROF for short) is a formula (a circuit in which the fanout of every gate is at most 1) in which the operations are {+, ×} and such that every input variable labels at most one leaf. In this paper we study the problems of identity testing and reconstruction of readonce formulas. the following are some of the results that we obtain. 1. Given k ROFs in n variables, over a field F, we give a deterministic (non blackbox) algorithm that checks whether they sum to zero or not. The running time of the algorithm is n O(k2). 2. We give an n O(d+k2) time deterministic algorithm for checking whether a black box holding the sum of k depth d ROFs in n variables computes the zero polynomial. In other words, we provide a hitting set of size n O(d+k2) for the sum of k depth d ROFs. If F  is too small then we make queries from a polynomial size extension field. This implies a deterministic algorithm that runs in time n O(d) for the reconstruction of depth d ROFs. 3. We give a hitting set of size exp ( Õ( √ n + k 2)) for the sum of k ROFs (without depth restrictions). In particular this implies a subexponential time deterministic algorithm for
FROM SYLVESTERGALLAI CONFIGURATIONS TO RANK BOUNDS: IMPROVED BLACKBOX IDENTITY TEST FOR DEPTH3 CIRCUITS
"... Abstract. We study the problem of identity testing for depth3 circuits of top fanin k and degree d (called ΣΠΣ(k, d) identities). We give a new structure theorem for such identities. A direct application of our theorem improves the known deterministic d kO(k) time blackbox identity test over ratio ..."
Abstract

Cited by 11 (2 self)
 Add to MetaCart
Abstract. We study the problem of identity testing for depth3 circuits of top fanin k and degree d (called ΣΠΣ(k, d) identities). We give a new structure theorem for such identities. A direct application of our theorem improves the known deterministic d kO(k) time blackbox identity test over rationals (Kayal & Saraf, FOCS 2009) to one that takes d O(k2)time. Our structure theorem essentially says that the number of independent variables in a real depth3 identity is very small. This theorem settles affirmatively the stronger rank conjectures posed by Dvir & Shpilka (STOC 2005) and Kayal & Saraf (FOCS 2009). Our techniques provide a unified framework that actually beats all known rank bounds and hence gives the best running time (for every field) for blackbox identity tests. Our main theorem (almost optimally) pins down the relation between higher dimensional SylvesterGallai theorems and the rank of depth3 identities in a very transparent manner. The existence of this was hinted at by Dvir & Shpilka (STOC 2005), but first proven, for reals, by Kayal & Saraf (FOCS 2009). We introduce the concept of SylvesterGallai rank bounds for any field, and show the intimate connection between this and depth3 identity rank bounds. We also prove the first ever theorem about high dimensional SylvesterGallai configurations over any field. Our proofs and techniques are very different from previous results and devise a very interesting ensemble of combinatorics and algebra. The latter concepts are ideal theoretic and involve a new Chinese remainder theorem. Our proof methods explain the structure of any depth3 identity C: there is a nucleus of C that forms a low rank identity, while the remainder is a high dimensional SylvesterGallai configuration. 1.
Black box polynomial identity testing of generalized depth3 arithmetic circuits with bounded top fanin
 in IEEE Conference on Computational Complexity
"... In this paper we consider the problem of determining whether an unknown arithmetic circuit, for which we have oracle access, computes the identically zero polynomial. This problem is known as the blackbox polynomial identity testing (PIT) problem. Our focus is on polynomials that can be written in ..."
Abstract

Cited by 7 (2 self)
 Add to MetaCart
In this paper we consider the problem of determining whether an unknown arithmetic circuit, for which we have oracle access, computes the identically zero polynomial. This problem is known as the blackbox polynomial identity testing (PIT) problem. Our focus is on polynomials that can be written in the form f(¯x) = ∑ k i=1 hi(¯x) · gi(¯x), where each hi is a polynomial that depends on only ρ linear functions, and each gi is a product of linear functions (when hi = 1, for each i, then we get the class of depth3 circuits with k multiplication gates, also known as ΣΠΣ(k) circuits, but the general case is much richer). When maxi(deg(hi · gi)) = d we say that f is computable by a ΣΠΣ(k, d, ρ) circuit. We obtain the following results. 1. A deterministic blackbox identity testing algorithm for ΣΠΣ(k, d, ρ) circuits that runs in quasipolynomial time (for ρ = polylog(n + d)). In particular this gives the first blackbox quasipolynomial time PIT algorithm for depth3 circuits with k multiplication gates. 2. A deterministic blackbox identity testing algorithm for readk ΣΠΣ circuits (depth3 circuits where each variable appears at most k times) that runs in time n 2O(k2). In particular
An Almost Optimal Rank Bound for Depth3 Identities
"... Abstract—We show that the rank of a depth3 circuit (over any field) that is simple, minimal and zero is at most O(k 3 log d). The previous best rank bound known was 2 O(k2) (log d) k−2 by Dvir and Shpilka (STOC 2005). This almost resolves the rank question first posed by Dvir and Shpilka (as we als ..."
Abstract

Cited by 7 (2 self)
 Add to MetaCart
Abstract—We show that the rank of a depth3 circuit (over any field) that is simple, minimal and zero is at most O(k 3 log d). The previous best rank bound known was 2 O(k2) (log d) k−2 by Dvir and Shpilka (STOC 2005). This almost resolves the rank question first posed by Dvir and Shpilka (as we also provide a simple and minimal identity of rank Ω(k log d)). Our rank bound significantly improves (dependence on k exponentially reduced) the best known deterministic blackbox identity tests for depth3 circuits by Karnin and Shpilka (CCC 2008). Our techniques also shed light on the factorization pattern of nonzero depth3 circuits, most strikingly: the rank of linear factors of a simple, minimal and nonzero depth3 circuit (over any field) is at most O(k 3 log d). The novel feature of this work is a new notion of maps between sets of linear forms, called ideal matchings, used to study depth3 circuits. We prove interesting structural results about depth3 identities using these techniques. We believe that these can lead to the goal of a deterministic polynomial time identity test for these circuits. I.