This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

\stacsheading

yearnumberscity

Michael Kowalczyk

Jin-Yi Cai

Holant Problems for Regular Graphs with Complex Edge Functions

M. Kowalczyk Department of Mathematics and Computer Science, Northern Michigan University
Marquette, MI 49855, USA
mkowalcz@nmu.edu
 and  J-Y. Cai Computer Sciences Department, University of Wisconsin, Madison, WI 53706, USA jyc@cs.wisc.edu
Abstract.

We prove a complexity dichotomy theorem for Holant Problems on 33-regular graphs with an arbitrary complex-valued edge function. Three new techniques are introduced: (1) higher dimensional iterations in interpolation; (2) Eigenvalue Shifted Pairs, which allow us to prove that a pair of combinatorial gadgets in combination succeed in proving #P-hardness; and (3) algebraic symmetrization, which significantly lowers the symbolic complexity of the proof for computational complexity. With holographic reductions the classification theorem also applies to problems beyond the basic model.

Key words and phrases:
Computational complexity
1991 Mathematics Subject Classification:
F.2.1
The second author is supported by NSF CCF-0830488 and CCF-0914969.

1. Introduction

In this paper we consider the following subclass of Holant Problems [FOCS08, TAMC]. An input regular graph G=(V,E)G=(V,E) is given, where every eEe\in E is labeled with a (symmetric) edge function gg. The function gg takes 0-1 inputs from its incident nodes and outputs arbitrary values in \mathbb{C}. The problem is to compute the quantity Holant(G)=σ:V{0,1}{u,v}Eg({σ(u),σ(v)}){\rm Holant}(G)=\sum_{\sigma:V\rightarrow\{0,1\}}\prod_{\{u,v\}\in E}g(\{\sigma(u),\sigma(v)\}).

Holant Problems are a natural class of counting problems. As introduced in [FOCS08, TAMC], the general Holant Problem framework can encode all Counting Constraint Satisfaction Problems (#CSP). This includes special cases such as weighted Vertex Cover, Graph Colorings, Matchings, and Perfect Matchings. The subclass of Holant Problems in this paper can also be considered as (weighted) HH-homomorphism (or HH-coloring) problems [BulatovG05, Homomorphisms, acyclic, DyerG00, Goldberg-4, Hell] with an arbitrary 2×22\times 2 symmetric complex matrix HH, however restricted to regular graphs GG as input. E.g., Vertex Cover is the case when H=[0111]H={\left[\begin{array}[]{cc}0&1\\ 1&1\end{array}\right]}. When the matrix HH is a 0-1 matrix, it is called unweighted. Dichotomy theorems (i.e., the problem is either in P{\rm{P}} or #P-hard, depending on HH) for unweighted HH-homomorphisms with undirected graphs HH and directed acyclic graphs HH are given in [DyerG00] and [acyclic] respectively. A dichotomy theorem for any symmetric matrix HH with non-negative real entries is proved in [BulatovG05]. Goldberg et al. [Goldberg-4] proved a dichotomy theorem for all real symmetric matrices HH. Finally, Cai, Chen, and Lu have proved a dichotomy theorem for all complex symmetric matrices HH [Homomorphisms].

The crucial difference between Holant Problems and #CSP is that in #CSP, Equality functions of arbitrary arity are presumed to be present. In terms of HH-homomorphism problems, this means that the input graph is allowed to have vertices of arbitrarily high degrees. This may appear to be a minor distinction; in fact it has a major impact on complexity. It turns out that if Equality gates of arbitrary arity are freely available in possible inputs then it is technically easier to prove #P-hardness. Proofs of previous dichotomy theorems make extensive use of constructions called thickening and stretching. These constructions require the availability of Equality gates of arbitrary arity (equivalently, vertices of arbitrarily high degrees) to carry out. Proving #P-hardness becomes more challenging in the degree restricted case. Furthermore there are indeed cases within this class of counting problems where the problem is #P-hard for general graphs, but solvable in P{\rm{P}} when restricted to 3-regular graphs.

We denote the (symmetric) edge function gg by [x,y,z][x,y,z], where x=g(0,0)x=g(0,0), y=g(0,1)=g(1,0)y=g(0,1)=g(1,0) and z=g(1,1)z=g(1,1). Functions will also be called gates or signatures. (For Vertex Cover, the function corresponding to HH is the Or gate, and is denoted by the signature [0,1,1][0,1,1].) In this paper we give a dichotomy theorem for the complexity of Holant Problems on 3-regular graphs with arbitrary signature g=[x,y,z]g=[x,y,z], where x,y,zx,y,z\in\mathbb{C}. First, if y=0y=0, the Holant Problem is easily solvable in P{\rm{P}}. Assuming y0y\not=0 we may normalize gg and assume y=1y=1. Our main theorem is as follows:

Theorem 1.1.

Suppose a,ba,b\in\mathbb{C}, and let X=abX=ab, Z=(a3+b32)2Z=(\frac{a^{3}+b^{3}}{2})^{2}. Then the Holant Problem on 3-regular graphs with g=[a,1,b]g=[a,1,b] is #P-hard except in the following cases, for which the problem is in P{\rm{P}}.

  1. (1)

    X=1X=1.

  2. (2)

    X=Z=0X=Z=0.

  3. (3)

    X=1X=-1 and Z=0Z=0.

  4. (4)

    X=1X=-1 and Z=1Z=-1.

If we restrict the input to planar 3-regular graphs, then these four categories are solvable in P{\rm{P}}, as well as a fifth category X3=ZX^{3}=Z. The problem remains #P-hard in all other cases. 111Technically, computational complexity involving complex or real numbers should, in the Turing model, be restricted to computable numbers. In other models such as the Blum-Shub-Smale model [BSS] no such restrictions are needed. Our results are not sensitive to the exact model of computation.

These results can be extended to kk-regular graphs (we detail how this is accomplished in a forthcoming work). One can also use holographic reductions [HA_FOCS] to extend this theorem to more general Holant Problems.

In order to achieve this result, some new proof techniques are introduced. To discuss this we first take a look at some previous results. Valiant [Valiant79b, Valiant:sharpP] introduced the powerful technique of interpolation, which was further developed by many others. In [FOCS08] a dichotomy theorem is proved for the case when gg is a Boolean function. The technique from [FOCS08] is to provide certain algebraic criteria which ensure that interpolation succeeds, and then apply these criteria to prove that (a large number yet) finitely many individual problems are #P-hard. This involves (a small number of) gadget constructions, and the algebraic criteria are powerful enough to show that they succeed in each case. Nonetheless this involves a case-by-case verification. In [TAMC] this theorem is extended to all real-valued aa and bb, and we have to deal with infinitely many problems. So instead of focusing on one problem, we devised (a large number of) recursive gadgets and analyzed the regions of (a,b)2(a,b)\in\mathbb{R}^{2} where they fail to prove #P-hardness. The algebraic criteria from [FOCS08] are not suitable (Galois theoretic) for general aa and bb, and so we formulated weaker but simpler criteria. Using these criteria, the analysis of the failure set becomes expressible as containment of semi-algebraic sets. As semi-algebraic sets are decidable, this offers the ultimate possibility that if we found enough gadgets to prove #P-hardness, then there is a computational proof (of computational intractability) in a finite number of steps. However this turned out to be a tremendous undertaking in symbolic computation, and many additional ideas were needed to finally carry out this plan. In particular, it would seem hopeless to extend that approach to all complex aa and bb.

In this paper, we introduce three new ideas. (1) We introduce a method to construct gadgets that carry out iterations at a higher dimension, and then collapse to a lower dimension for the purpose of constructing unary signatures. This involves a starter gadget, a recursive iteration gadget, and a finisher gadget. We prove a lemma that guarantees that among polynomially many iterations, some subset of them satisfies properties sufficient for interpolation to succeed (it may not be known a priori which subset worked, but that does not matter). (2) Eigenvalue Shifted Pairs are coupled pairs of gadgets whose transition matrices differ by δI\delta I where δ0\delta\neq 0. They have shifted eigenvalues, and by analyzing their failure conditions, we can show that except on very rare points, one or the other gadget succeeds. (3) Algebraic symmetrization. We derive a new expression of the Holant polynomial over 3-regular graphs, with a crucially reduced degree. This simplification of the Holant and related polynomials condenses the problem of proving #P{\#\rm{P}}-hardness to the point where all remaining cases can be handled by symbolic computation. We also use the same expression to prove tractability.

The rest of this paper is organized as follows. In Section 2 we discuss notation and background information. In Section 3 we cover interpolation techniques, including how to collapse higher dimensional iterations to interpolate unary signatures. In Section LABEL:complexSignatures we show how to perform algebraic symmetrization of the Holant, and introduce Eigenvalue Shifted Pairs (ESP) of gadgets. Then we combine the new techniques to prove Theorem 1.1.

2. Notations and Background

We state the counting framework more formally. A signature grid Ω=(G,,π)\Omega=(G,{\mathcal{F}},\pi) consists of a labeled graph G=(V,E)G=(V,E) where π\pi labels each vertex vVv\in V with a function fvf_{v}\in{\mathcal{F}}. We consider all edge assignments ξ:E{0,1}\xi:E\rightarrow\{0,1\}; fvf_{v} takes inputs from its incident edges E(v)E(v) at vv and outputs values in \mathbb{C}. The counting problem on the instance Ω\Omega is to compute222The term Holant was first introduced by Valiant in [HA_FOCS] to denote a related exponential sum.

HolantΩ=ξvVfv(ξE(v)).{\rm Holant}_{\Omega}=\sum_{\xi}\prod_{v\in V}f_{v}(\xi\mid_{E(v)}).

Suppose GG is a bipartite graph (U,V,E)(U,V,E) such that each uUu\in U has degree 2. Furthermore suppose each vVv\in V is labeled by an Equality gate =k=_{k} where k=deg(v)k={\rm deg}(v). Then any non-zero term in HolantΩ{\rm Holant}_{\Omega} corresponds to a 0-1 assignment σ:V{0,1}\sigma:V\rightarrow\{0,1\}. In fact, we can merge the two incident edges at uUu\in U into one edge eue_{u}, and label this edge eue_{u} by the function fuf_{u}. This gives an edge-labeled graph (V,E)(V,E^{\prime}) where E={eu:uU}E^{\prime}=\{e_{u}:u\in U\}. For an edge-labeled graph (V,E)(V,E^{\prime}) where eEe\in E^{\prime} has label geg_{e}, HolantΩ=σ:V{0,1}e=(v,w)Ege(σ(v),σ(w)){\rm Holant}_{\Omega}=\sum_{\sigma:V\rightarrow\{0,1\}}\prod_{e=(v,w)\in E^{\prime}}g_{e}(\sigma(v),\sigma(w)). If each geg_{e} is the same function gg (but assignments σ:V[q]\sigma:V\rightarrow[q] take values in a finite set [q][q]) this is exactly the HH-coloring problem (for undirected graphs gg is a symmetric function). In particular, if (U,V,E)(U,V,E) is a (2,k)(2,k)-regular bipartite graph, equivalently G=(V,E)G^{\prime}=(V,E^{\prime}) is a kk-regular graph, then this is the HH-coloring problem restricted to kk-regular graphs. In this paper we will discuss 3-regular graphs, where each geg_{e} is the same symmetric complex-valued function. We also remark that for general bipartite graphs (U,V,E)(U,V,E), giving Equality (of various arities) to all vertices on one side VV defines #CSP as a special case of Holant Problems. But whether Equality of various arities are present has a major impact on complexity, thus Holant Problems are a refinement of #CSP.

A symmetric function g:{0,1}kg:\{0,1\}^{k}\rightarrow\mathbb{C} can be denoted as [g0,g1,,gk][g_{0},g_{1},\ldots,g_{k}], where gig_{i} is the value of gg on inputs of Hamming weight ii. They are also called signatures. Frequently we will revert back to the bipartite view: for (2,3)(2,3)-regular bipartite graphs (U,V,E)(U,V,E), if every uUu\in U is labeled g=[g0,g1,g2]g=[g_{0},g_{1},g_{2}] and every vVv\in V is labeled r=[r0,r1,r2,r3]r=[r_{0},r_{1},r_{2},r_{3}], then we also use #[g0,g1,g2][r0,r1,r2,r3]\#[g_{0},g_{1},g_{2}]\mid[r_{0},r_{1},r_{2},r_{3}] to denote the Holant Problem. Note that [1,0,1][1,0,1] and [1,0,0,1][1,0,0,1] are Equality gates =2=_{2} and =3=_{3} respectively, and the main dichotomy theorem in this paper is about #[x,y,z][1,0,0,1]\#[x,y,z]\mid[1,0,0,1], for all x,y,zx,y,z\in\mathbb{C}. We will also denote Hol(a,b)=#[a,1,b][1,0,0,1]\mathrm{Hol}(a,b)=\#[a,1,b]\mid[1,0,0,1]. More generally, If 𝒢{\mathcal{G}} and {\mathcal{R}} are sets of signatures, and vertices of UU (resp. VV) are labeled by signatures from 𝒢{\mathcal{G}} (resp. {\mathcal{R}}), then we also use #𝒢\#{\mathcal{G}}\mid{\mathcal{R}} to denote the bipartite Holant Problem. Signatures in 𝒢{\mathcal{G}} are called generators and signatures in {\mathcal{R}} are called recognizers. This notation is particularly convenient when we perform holographic transformations. Throughout this paper, all (2,3)(2,3)-regular bipartite graphs are arranged with generators on the degree 2 side and recognizers on the degree 3 side.

We use Arg{\mathrm{Arg}} to denote the principal value of the complex argument; i.e., Arg(c)(π,π]{\mathrm{Arg}}(c)\in(-\pi,\pi] for all nonzero cc\in\mathbb{C}.

2.1. {\mathcal{F}}-Gate

Any signature from {\mathcal{F}} is available at a vertex as part of an input graph. Instead of a single vertex, we can use graph fragments to generalize this notion. An {\mathcal{F}}-gate Γ\Gamma is a pair (H,)(H,{\mathcal{F}}), where H=(V,E,D)H=(V,E,D) is a graph with some dangling edges DD (Figure 1 contains some examples). Other than these dangling edges, an {\mathcal{F}}-gate is the same as a signature grid. The role of dangling edges is similar to that of external nodes in Valiant’s notion [Valiant:Qciricuit], however we allow more than one dangling edge for a node. In H=(V,E,D)H=(V,E,D) each node is assigned a function in {\mathcal{F}} (we do not consider “dangling” leaf nodes at the end of a dangling edge among these), EE are the regular edges, and DD are the dangling edges. Then we can define a function for this {\mathcal{F}}-gate Γ=(H,)\Gamma=(H,{\mathcal{F}}),

Γ(y1,y2,,yq)=(x1,x2,,xp){0,1}pH(x1,x2,,xp,y1,y2,,yq),\Gamma(y_{1},y_{2},\ldots,y_{q})=\sum_{(x_{1},x_{2},\ldots,x_{p})\in\{0,1\}^{p}}H(x_{1},x_{2},\ldots,x_{p},y_{1},y_{2},\ldots,y_{q}),

where p=|E|p=|E|, q=|D|q=|D|, (y1,y2,,yq){0,1}q(y_{1},y_{2},\ldots,y_{q})\in\{0,1\}^{q} denotes an assignment on the dangling edges, and H(x1,x2,,xp,y1,y2,,yq)H(x_{1},x_{2},\ldots,x_{p},y_{1},y_{2},\ldots,y_{q}) denotes the value of the partial signature grid on an assignment of all edges, i.e., the product of evaluations at every vertex of HH, for (x1,x2,,xp,y1,y2,,yq){0,1}p+q(x_{1},x_{2},\ldots,x_{p},y_{1},y_{2},\ldots,y_{q})\in\{0,1\}^{p+q}.

Refer to caption
(a) A starter gadget
Refer to caption
(b) A recursive gadget
Refer to caption
(c) A finisher gadget
Refer to caption
(d) A planar embedding of a single iteration
Figure 1. Examples of binary starter, recursive, and finisher gadgets

We will also call this function the signature of the {\mathcal{F}}-gate Γ\Gamma. An {\mathcal{F}}-gate can be used in a signature grid as if it is just a single node with the same signature. We note that even for a very simple signature set {\mathcal{F}}, the signatures for all {\mathcal{F}}-gates can be quite complicated and expressive. Matchgate signatures are an example [Valiant:Qciricuit].

The dangling edges of an \mathcal{F}-gate are considered as input or output variables. Any mm-input nn-output \mathcal{F}-gate can be viewed as a 2n2^{n} by 2m2^{m} matrix MM which transforms arity-mm signatures into arity-nn signatures (this is true even if mm or nn are 0). Our construction will transform symmetric signatures to symmetric signatures. This implies that there exists an equivalent n+1n+1 by m+1m+1 matrix M~\widetilde{M} which operates directly on column vectors written in symmetric signature notation. We will henceforth identify the matrix M~\widetilde{M} with the \mathcal{F}-gate itself. The constructions in this paper are based upon three different types of bipartite \mathcal{F}-gates which we call starter gadgets, recursive gadgets, and finisher gadgets. An arity-rr starter gadget is an \mathcal{F}-gate with no input but rr output edges. If an \mathcal{F}-gate has rr input and rr output edges then it is called an arity-rr recursive gadget. Finally, an \mathcal{F}-gate is an arity-rr finisher gadget if it has rr input edges 1 output edge. As a matter of convention, we consider any dangling edge incident with a generator as an output edge and any dangling edge incident with a recognizer as an input edge; see Figure 1.

3. Interpolation Techniques

3.1. Binary recursive construction

In this section, we develop our new technique of higher dimensional iterations for interpolation of unary signatures.

Lemma 3.1.

Suppose M3×3M\in\mathbb{C}^{3\times 3} is a nonsingular matrix, s3s\in\mathbb{C}^{3} is a nonzero vector, and for all integers k1k\geq 1, ss is not a column eigenvector of MkM^{k}. Let Fi2×3F_{i}\in\mathbb{C}^{2\times 3} be three matrices, where rank(Fi)=2{\rm rank}(F_{i})=2 for 1i31\leq i\leq 3, and the intersection of the row spaces of FiF_{i} is trivial {0}\{0\}. Then for every nn, there exists some F{Fi:1i3}F\in\{F_{i}:1\leq i\leq 3\}, and some S{FMks:0kn3}S\subseteq\{FM^{k}s:0\leq k\leq n^{3}\}, such that |S|n|S|\geq n and vectors in SS are pairwise linearly independent.

Proof 3.2.

Let k>j0k>j\geq 0 be integers. Then MksM^{k}s and MjsM^{j}s are nonzero and also linearly independent, since otherwise ss is an eigenvector of MkjM^{k-j}. Let N=[Mjs,Mks]3×2N=[M^{j}s,M^{k}s]\in\mathbb{C}^{3\times 2}, then rank(N)=2{\rm rank}(N)=2, and ker(NT)\mathrm{ker}(N^{\mathrm{T}}) is a 1-dimensional linear subspace. It follows that there exists an F{Fi:1i3}F\in\{F_{i}:1\leq i\leq 3\} such that the row space of FF does not contain ker(NT)\mathrm{ker}(N^{\mathrm{T}}), and hence has trivial intersection with ker(NT)\mathrm{ker}(N^{\mathrm{T}}). In other words, ker(NTFT)={0}\mathrm{ker}(N^{\mathrm{T}}F^{\mathrm{T}})=\{0\}. We conclude that FN2×2FN\in\mathbb{C}^{2\times 2} has rank 2, and FMjsFM^{j}s and FMksFM^{k}s are linearly independent.

Each FiF_{i}, where 1i31\leq i\leq 3, defines a coloring of the set K={0,1,,n3}K=\{0,1,\dots,n^{3}\} as follows: color kKk\in K with the linear subspace spanned by FiMksF_{i}M^{k}s. Thus, FiF_{i} defines an equivalence relation i\approx_{i} where kikk\approx_{i}k^{\prime} iff they receive the same color. Assume for a contradiction that for each FiF_{i}, where 1i31\leq i\leq 3, there are not nn pairwise linearly independent vectors among {FiMks:kK}\{F_{i}M^{k}s:k\in K\}. Then, including possibly the 0-dimensional space {0}\{0\}, there can be at most nn distinct colors assigned by FiF_{i}. By the pigeonhole principle, some kk and kk^{\prime} with 0k<kn30\leq k<k^{\prime}\leq n^{3} must receive the same color for all FiF_{i}, where 1i31\leq i\leq 3. This is a contradiction and we are done. ∎

The next lemma says that under suitable conditions we can construct all unary signatures [x,y][x,y]. The method will be interpolation at a higher dimensional iteration, and finishing up with a suitable finisher gadget. The crucial new technique here is that when iterating at a higher dimension, we can guarantee the existence of one finisher gadget that succeeds on polynomially many steps, which results in overall success. Different finisher gadgets may work for different initial signatures and different input size nn, but these need not be known in advance and have no impact on the final success of the reduction.

Lemma 3.3.

Suppose that the following gadgets can be built using complex-valued signatures from a finite generator set 𝒢\mathcal{G} and a finite recognizer set \mathcal{R}.

  1. (1)

    A binary starter gadget with nonzero signature [z0,z1,z2][z_{0},z_{1},z_{2}].

  2. (2)

    A binary recursive gadget with nonsingular recurrence matrix MM, for which [z0,z1,z2]T[z_{0},z_{1},z_{2}]^{\mathrm{T}} is not a column eigenvector of MkM^{k} for any positive integer kk.

  3. (3)

    Three binary finisher gadgets with rank 2 matrices F1,F2,F32×3F_{1},F_{2},F_{3}\in\mathbb{C}^{2\times 3}, where the intersection of the row spaces of F1F_{1}, F2F_{2}, and F3F_{3} is the zero vector.

Then for any x,yx,y\in\mathbb{C}, #𝒢{[x,y]}T#𝒢\#\mathcal{G}\cup\{[x,y]\}\mid\mathcal{R}\leq_{T}\#\mathcal{G}\mid\mathcal{R}.