Information Technology Reference
In-Depth Information
7.3.1 Bounded Fanin Depth-3 Blackbox PIT
= i ↆ[ k ]
Let C
T i be a depth-3 circuit. When k is constant, C is naturally called
bounded fanin depth-3. This case of PIT has, by now, a rich history [ DS07 , KS07 ,
KS11 , SS11 , KS09 , SS13 , SS12 ]. Several new techniques have sprung up from this
model— a locally decodable code structure, a rank-preserving map via extractors,
Sylvester-Gallai configurations (higher dimensions and all fields) and rank bounds.
We will sketch here the main idea behind the poly-time blackbox PIT of bounded
fanin depth-3. The details are quite technical and could be seen in [ SS13 , SS12 ].
Vandermonde map We define a homomorphism
β ,fora β ↆ F
,as:
k
ij y j ,
i
ↆ[
n
] , β :
x i
1 β
j
=
and
β (α) = α for all α ↆ F
. This (naturally) defines the action of
β ,on all
the elements of
, that preserves the ring operations. We have the following nice
property, as a consequence of [ GR08 , Lemma 6.1]:
R
Lemma 3.1 [
β preserves k -rank] Let S be a subset of linear forms in
R
with
nk 2 . Then
rk
(
S
)
k, and
|F| >
β ↆ F ,
rk
β (
S
)) =
rk
(
S
)
.
.
The proof of this lemma is by studying the coefficient-matrix of the linear polynomi-
als in S , and its change under
Intuitively,
β is faithful to any algebraic object involving the elements in span
(
S
)
β . This map has a role to play in bounded fanin depth-3
owing to a certain structural theorem from [ SS13 ]— certificate for a non-identity .
To discuss this certificate we need a definition, that of 'paths' of 'nodes' in C
(assumed to be nonzero). A path p with respect to an ideal I is a sequence of
terms
(these are products of linear forms) with the following prop-
erty. Each p i divides T i , and each p i is a 'node' of T i with respect to the ideal
{
p 1 ,
p 2 ,...,
p b }
. 2 So p 1 is a node of T 1 wrt I , p 2 is a node of T 2 wrt
,
p 1 ,
p 2 ,...,
p i 1
,
p 1
I
I
,
etc.
Let us see an example of a path
in Fig. 7.1 . The oval bubbles
represent the list of forms in a product gate, and the rectangles enclose forms in a
node. The arrows show a path. Starting with the zero ideal, nodes p 1 :=
(
0
,
p 1 ,
p 2 ,
p 3 )
x 1 , p 2 :=
x 2 (
x 2 +
2 x 1 )
, and p 3 := (
x 4 +
x 2 )(
x 4 +
4 x 2
x 1 )(
x 4 +
x 2 +
x 1 )(
x 4 +
x 2
2 x 1 )
form a path. Initially, the path is just the zero ideal, so x 1
is a node. Note how p 2 is
a power of x 2 modulo radsp
.
The non-identity certificate theorem [ SS13 , Theorem 25] states that for any non-
identity C , there exists a path p such that modulo
p 1
, and p 3 is a power of x 4 modulo radsp
p 1 ,
p 2
p
, C reduces to a single nonzero
multiplication term.
2 By a node p i we mean that some nonzero constant multiple of p i is identical to a power-of-a-
linear-form modulo radsp
I
,
p 1
,
p 2
,...,
p i 1
, where radsp is the ideal generated by the set of all
the linear polynomials that divide p j
,
j
ↆ[
i
1
]
and the generators of I .
Search WWH ::




Custom Search