# Black-Box Identity Testing of Depth-4 Multilinear Circuits

- 24 Downloads

## Abstract

We study the problem of identity testing for multilinear *ΣΠΣΠ*(*k*) circuits, i.e., multilinear depth-4 circuits with fan-in *k* at the top + gate. We give the first polynomial-time deterministic identity testing algorithm for such circuits when *k*=*O*(1). Our results also hold in the black-box setting.

The running time of our algorithm is \({\left( {ns} \right)^{{\text{O}}\left( {{k^3}} \right)}}\), where *n* is the number of variables, *s* is the size of the circuit and *k* is the fan-in of the top gate. The importance of this model arises from [11], where it was shown that derandomizing black-box polynomial identity testing for general depth-4 circuits implies a derandomization of polynomial identity testing (PIT) for general arithmetic circuits. Prior to our work, the best PIT algorithm for multilinear *ΣΠΣΠ*(*k*) circuits [31] ran in quasi-polynomial-time, with the running time being \({n^{{\rm O}\left( {{k^6}\log \left( k \right){{\log }^2}s} \right)}}\).

We obtain our results by showing a strong *structural result* for multilinear *ΣΠΣΠ*(*k*) circuits that compute the zero polynomial. We show that under some mild technical conditions, any gate of such a circuit must compute a *sparse* polynomial. We then show how to combine the structure theorem with a result by Klivans and Spielman [33], on the identity testing for sparse polynomials, to yield the full result.

## Mathematics Subject Classification (2000)

68Q25 12Y05## Preview

Unable to display preview. Download preview PDF.

## References

- [1]M. Anderson, M. A. Forbes, R. Saptharishi, A. Shpilka and B. Lee Volk: Identity testing and lower bounds for read-k oblivious algebraic branching programs, in:
*31st Conference on Computational Complexity, CCC***25**, 1–30, 2016.zbMATHGoogle Scholar - [2]M. Agrawal, R. Gurjar, A. Korwar and N. Saxena: Hitting-sets for ROABP and sum of set-multilinear circuits,
*SIAM J. Comput.***44**(2015), 669–697.MathSciNetCrossRefzbMATHGoogle Scholar - [3]M. Agrawal: Proving lower bounds via pseudo-random generators, in:
*Proceedings of the 25th FSTTCS*, volume 3821 of*LNCS*, 92–105, 2005.Google Scholar - [4]M. Agrawal, N. Kayal and N. Saxena: Primes is in P,
*Annals of Mathematics***160**(2004), 781–793.MathSciNetCrossRefzbMATHGoogle Scholar - [5]S. Arora, C. Lund, R. Motwani, M. Sudan and M. Szegedy: Proof verification and the hardness of approximation problems,
*JACM***45**(1998), 501–555.MathSciNetCrossRefzbMATHGoogle Scholar - [6]N. Alon: Combinatorial nullstellensatz,
*Combinatorics, Probability and Computing***8**(1999), 7–29.MathSciNetCrossRefzbMATHGoogle Scholar - [7]V. Arvind and P. Mukhopadhyay: The monomial ideal membership problem and polynomial identity testing,
*Information and Computation***208**(2010), 351–363.MathSciNetCrossRefzbMATHGoogle Scholar - [8]S. Arora and S. Safra: Probabilistic checking of proofs: A new characterization of NP,
*JACM***45**(1998), 70–122.MathSciNetCrossRefzbMATHGoogle Scholar - [9]M. Agrawal, C. Saha and N. Saxena: Quasi-polynomial hitting-set for set-depth-formulas, in:
*Proceedings of the 45th Annual ACM Symposium on Theory of Computing (STOC)*, 321–330, 2013.Google Scholar - [10]M. Agrawal, C. Saha, R. Saptharishi and N. Saxena: Jacobian hits circuits: Hitting-sets, lower bounds for depth-d occur-k formulas & depth-3 transcendence degree-k circuits, in:
*Proceedings of the 44th Annual ACM Symposium on Theory of Computing (STOC)*, 599–614, 2012.Google Scholar - [11]M. Agrawal and V. Vinay: Arithmetic circuits: A chasm at depth four, in:
*Proceedings of the 49th Annual IEEE Symposium on Foundations of Computer Science (FOCS)*, 67–75, 2008.Google Scholar - [12]M. Anderson, D. van Melkebeek and I. Volkovich: Derandomizing polynomial identity testing for multilinear constant-read formulae,
*Computational Complexity***24**(2015), 695–776.MathSciNetCrossRefzbMATHGoogle Scholar - [13]M. Beecken, J. Mittmann and N. Saxena: Algebraic independence and black-box identity testing, in:
*Automata, Languages and Programming, 38th International Colloquium (ICALP)*, 137–148, 2011.CrossRefGoogle Scholar - [14]M. Ben-Or and P. Tiwari: A deterministic algorithm for sparse multivariate polynominal interpolation, in:
*Proceedings of the 20th Annual ACM Symposium on Theory of Computing (STOC)*, 301–309, 1988.Google Scholar - [15]F. R. Chung, R. L. Graham, P. Frankl and J. B. Shearer: Some intersection theorems for ordered sets and graphs,
*J. Comb. Theory Ser. A***43**(1986), 23–37.MathSciNetCrossRefzbMATHGoogle Scholar - [16]R. A. De Millo and R. J. Lipton: A probabilistic remark on algebraic program testing,
*Inf. Process. Lett.***7**(1978), 193–195.CrossRefzbMATHGoogle Scholar - [17]R. Mendes de Oliveira, A. Shpilka and B. Lee Volk: Subexponential size hitting sets for bounded depth multilinear formulas,
*Computational Complexity***25**(2016), 455–505.MathSciNetCrossRefzbMATHGoogle Scholar - [18]Z. Dvir and A. Shpilka: Locally decodable codes with 2 queries and polynomial identity testing for depth 3 circuits,
*SIAM J. on Computing***36**(2006), 1404–1434.MathSciNetCrossRefzbMATHGoogle Scholar - [19]Z. Dvir, A. Shpilka and A. Yehudayoff: Hardness-randomness tradeoffs for bounded depth arithmetic circuits,
*SIAM J. on Computing***39**(2009), 1279–1293.MathSciNetCrossRefzbMATHGoogle Scholar - [20]M. Forbes and A. Shpilka: Quasipolynomial-time identity testing of noncommutative and read-once oblivious algebraic branching programs,
*Electronic Colloquium on Computational Complexity (ECCC)***19**(2012), 115.Google Scholar - [21]M. Forbes and A. Shpilka: Explicit noether normalization for simultaneous conjugation via polynomial identity testing, in:
*APPROX-RANDOM*, pages 527–542, 2013.Google Scholar - [22]M. Forbes and A. Shpilka: Quasipolynomial-time identity testing of noncommutative and read-once oblivious algebraic branching programs, in:
*Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science (FOCS)*, pages 243–252, 2013, Full version at http://eccc.hpi-web.de/report/2012/115.Google Scholar - [23]M. Forbes, R. Saptharishi and A. Shpilka: Pseudorandomness for multilinear read-once algebraic branching programs, in any order, in:
*Proceedings of the 46th Annual ACM Symposium on Theory of Computing (STOC)*, pages 867–875, 2014, Full version at http://eccc.hpi-web.de/report/2013/132.Google Scholar - [24]A. Gupta, P. Kamath, N. Kayal and R. Saptharishi: Arithmetic circuits: A chasm at depth three, in:
*Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science (FOCS)*, 578–587, 2013.Google Scholar - [25]A. Gupta, N. Kayal and S. V. Lokam: Reconstruction of depth-4 multilinear circuits with top fanin 2, in:
*Proceedings of the 44th Annual ACM Symposium on Theory of Computing (STOC)*, 625–642, 2012, Full version at http://eccc.hpi-web.de/report/2011/153.Google Scholar - [26]R. Gurjar, A. Korwar and N. Saxena: Identity testing for constant-width, and commutative, read-once oblivious abps, in:
*31st Conference on Computational Complexity, CCC***16**(2016), 1–29.zbMATHGoogle Scholar - [27]R. Gurjar, A. Korwar, N. Saxena and N. Thierauf: Deterministic identity testing for sum of read-once oblivious arithmetic branching programs, in:
*30th Conference on Computational Complexity, CCC*, 323–346, 2015.Google Scholar - [28]A. Gupta: Algebraic geometric techniques for depth-4 PIT & sylvester-gallai conjectures for varieties,
*Electronic Colloquium on Computational Complexity (ECCC)***21**(2014), 130.Google Scholar - [29]J. Heintz and C. P. Schnorr: Testing polynomials which are easy to compute (extended abstract), in:
*Proceedings of the 12th Annual ACM Symposium on Theory of Computing (STOC)*, 262–272, 1980.Google Scholar - [30]V. Kabanets and R. Impagliazzo: Derandomizing polynomial identity tests means proving circuit lower bounds,
*Computational Complexity***13**(2004), 1–46.MathSciNetCrossRefzbMATHGoogle Scholar - [31]Z. S. Karnin, P. Mukhopadhyay, A. Shpilka and I. Volkovich: Deterministic identity testing of depth 4 multilinear circuits with bounded top fan-in,
*SIAM J. on Computing***42**(2013), 2114–2131.MathSciNetCrossRefzbMATHGoogle Scholar - [32]P. Koiran: Arithmetic circuits: The chasm at depth four gets wider,
*Theoretical Computer Science***448**(2012), 56–65.MathSciNetCrossRefzbMATHGoogle Scholar - [33]A. Klivans and D. Spielman: Randomness efficient identity testing of multivariate polynomials, in:
*Proceedings of the 33rd Annual ACM Symposium on Theory of Computing (STOC)*, 216–223, 2001.Google Scholar - [34]N. Kayal and N. Saxena: Polynomial identity testing for depth 3 circuits,
*Computational Complexity***16**(2007), 115–138.MathSciNetCrossRefzbMATHGoogle Scholar - [35]Z. S. Karnin and A. Shpilka: Reconstruction of generalized depth-3 arithmetic circuits with bounded top fan-in, in:
*Proceedings of the 24th Annual IEEE Conference on Computational Complexity (CCC)*, 274–285, 2009, full version at www.cs.technion.ac.il/ shpilka/publications/KarninShpilka09.pdf.Google Scholar - [36]N. Kayal and S. Saraf: Blackbox polynomial identity testing for depth 3 circuits, in:
*Proceedings of the 50th Annual IEEE Symposium on Foundations of Computer Science (FOCS)*, 198–207, 2009, full version at http://eccc.hpi-web.de/report/2009/032.Google Scholar - [37]Z. S. Karnin and A. Shpilka: Black box polynomial identity testing of generalized depth-3 arithmetic circuits with bounded top fan-in,
*Combinatorica***31**(2011), 333–364.MathSciNetCrossRefzbMATHGoogle Scholar - [38]M. Kumar and S. Saraf: Arithmetic circuits with locally low algebraic rank, in:
*31st Conference on Computational Complexity, CCC***27**, 1–34, 2016.zbMATHGoogle Scholar - [39]M. Kumar and S. Saraf: Sums of products of polynomials in few variables: Lower bounds and polynomial identity testing, in:
*31st Conference on Computational Complexity, CCC*,**29**, 1–35, 2016.zbMATHGoogle Scholar - [40]C. Lund, L. Fortnow, H. Karloff and N. Nisan: Algebraic methods for interactive proof systems,
*JACM***39**(1992), 859–868.MathSciNetCrossRefzbMATHGoogle Scholar - [41]L. Lovász: On determinants, matchings and random algorithms, in: L. Budach, editor,
*Fundamentals of Computing Theory*, Akademia-Verlag, 1979.Google Scholar - [42]R. J. Lipton and N. K. Vishnoi: Deterministic identity testing for multivariate polynomials, in:
*Proceedings of the 14th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA)*, 756–760, 2003.Google Scholar - [43]P. Mukhopadhyay: Depth-4 identity testing and noether’s normalization lemma,
*Electronic Colloquium on Computational Complexity (ECCC)*, 2015.Google Scholar - [44]K. Mulmuley, U. Vazirani and V. Vazirani: Matching is as easy as matrix inversion,
*Combinatorica***7**(1987), 105–113.MathSciNetCrossRefzbMATHGoogle Scholar - [45]R. Raz: Multi-linear formulas for permanent and determinant are of superpolynomial size,
*J. ACM***56**(2009).Google Scholar - [46]R. Raz, A. Shpilka and A. Yehudayoff: A lower bound for the size of syntactically multilinear arithmetic circuits,
*SIAM J. on Computing***38**(2008), 1624–1647.MathSciNetCrossRefzbMATHGoogle Scholar - [47]R. Raz and A. Yehudayoff: Lower bounds and separations for constant depth multilinear circuits,
*Computational Complexity***18**(2009), 171–207.MathSciNetCrossRefzbMATHGoogle Scholar - [48]N. Saxena: Diagonal circuit identity testing and lower bounds, in:
*Automata, Languages and Programming, 35th International Colloquium*, 60–71, 2008, full version at eccc.hpi-web.de/eccc-reports/2007/TR07-124/index.html.CrossRefGoogle Scholar - [49]J. T. Schwartz: Fast probabilistic algorithms for verification of polynomial identities,
*J. ACM***27**(1980), 701–717.MathSciNetCrossRefzbMATHGoogle Scholar - [50]A. Shamir: IP=PSPACE, in:
*Proceedings of the Thirty First Annual Symposium on Foundations of Computer Science*, 11–15, 1990.Google Scholar - [51]N. Saxena and C. Seshadhri: From Sylvester-Gallai Configurations to Rank Bounds: Improved Black-Box Identity Test for Deph-3 Circuits, in:
*Proceedings of the 51st Annual IEEE Symposium on Foundations of Computer Science (FOCS)*, 21–30, 2010.Google Scholar - [52]N. Saxena and C. Seshadhri: An almost optimal rank bound for depth-3 identities,
*SIAM J. Comput.***40**(2011), 200–224.MathSciNetCrossRefzbMATHGoogle Scholar - [53]N. Saxena and C. Seshadhri: Blackbox identity testing for bounded top fanin depth-3 circuits: the field doesn’t matter, in:
*Proceedings of the 43rd Annual ACM Symposium on Theory of Computing (STOC)*, 431–440, 2011.Google Scholar - [54]A. Shpilka and I. Volkovich: On the relation between polynomial identity testing and finding variable disjoint factors, in:
*Automata, Languages and Programming, 37th International Colloquium (ICALP)*, 408–419, 2010, full version at http://eccc.hpiweb.de/report/2010/036.CrossRefGoogle Scholar - [55]A. Shpilka and I. Volkovich: Read-once polynomial identity testing,
*Computational Complexity***24**(2015), 477–532.MathSciNetCrossRefzbMATHGoogle Scholar - [56]A. Shpilka and A. Yehudayoff: Arithmetic circuits: A survey of recent results and open questions,
*Foundations and Trends in Theoretical Computer Science***5**(2010), 207–388.MathSciNetCrossRefzbMATHGoogle Scholar - [57]S. Tavenas: Improved bounds for reduction to depth 4 and depth 3, in:
*MFCS*, 813–824, 2013.Google Scholar - [58]R. Zippel: Probabilistic algorithms for sparse polynomials, in:
*Proceedings of the International Symposium on Symbolic and Algebraic Computation*, 216–226, 1979.CrossRefGoogle Scholar