This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

11institutetext: The Institute of Mathematical Sciences, Chennai, India
11email: meena@imsc.res.in, nitin@imsc.res.in

Some Complete and Intermediate Polynomials in Algebraic Complexity Theory

Meena Mahajan    Nitin Saurabh
Abstract

We provide a list of new natural 𝖵𝖭𝖯\mathsf{VNP}-intermediate polynomial families, based on basic (combinatorial) 𝖭𝖯\mathsf{NP}-complete problems that are complete under parsimonious reductions. Over finite fields, these families are in 𝖵𝖭𝖯\mathsf{VNP}, and under the plausible hypothesis 𝖬𝗈𝖽p𝖯𝖯/𝗉𝗈𝗅𝗒\mathsf{Mod}_{p}\mathsf{P}\not\subseteq\mathsf{P/poly}, are neither 𝖵𝖭𝖯\mathsf{VNP}-hard (even under oracle-circuit reductions) nor in 𝖵𝖯\mathsf{VP}. Prior to this, only the Cut Enumerator polynomial was known to be 𝖵𝖭𝖯\mathsf{VNP}-intermediate, as shown by Bürgisser in 2000.

We next show that over rationals and reals, two of our intermediate polynomials, based on satisfiability and Hamiltonian cycle, are not monotone affine polynomial-size projections of the permanent. This augments recent results along this line due to Grochow.

Finally, we describe a (somewhat natural) polynomial defined independent of a computation model, and show that it is 𝖵𝖯\mathsf{VP}-complete under polynomial-size projections. This complements a recent result of Durand et al. (2014) which established 𝖵𝖯\mathsf{VP}-completeness of a related polynomial but under constant-depth oracle circuit reductions. Both polynomials are based on graph homomorphisms. A simple restriction yields a family similarly complete for 𝖵𝖡𝖯\mathsf{VBP}.

1 Introduction

The algebraic analogue of the 𝖯\mathsf{P} versus 𝖭𝖯\mathsf{NP} problem, famously referred to as the 𝖵𝖯\mathsf{VP} versus 𝖵𝖭𝖯\mathsf{VNP} question, is one of the most significant problem in algebraic complexity theory. Valiant [28] showed that the Permanent polynomial is 𝖵𝖭𝖯\mathsf{VNP}-complete (over fields of char \neq 2). A striking aspect of this polynomial is that the underlying decision problem, in fact even the search problem, is in 𝖯\mathsf{P}. Given a graph, we can decide in polynomial time whether it has a perfect matching, and if so find a maximum matching in polynomial time [12]. Since the underlying problem is an easier problem, it helped in establishing 𝖵𝖭𝖯\mathsf{VNP}-completeness of a host of other polynomials by a reduction from the Permanent polynomial (cf. [4]). Inspired from classical results in structural complexity theory, in particular [20], Bürgisser [5] proved that if Valiant’s hypothesis (i.e. 𝖵𝖯𝖵𝖭𝖯\mathsf{VP}\neq\mathsf{VNP}) is true, then, over any field there is a pp-family in 𝖵𝖭𝖯\mathsf{VNP} which is neither in 𝖵𝖯\mathsf{VP} nor 𝖵𝖭𝖯\mathsf{VNP}-complete with respect to cc-reductions. Let us call such polynomial families 𝖵𝖭𝖯\mathsf{VNP}-intermediate (i.e. in 𝖵𝖭𝖯\mathsf{VNP}, not 𝖵𝖭𝖯\mathsf{VNP}-complete, not in 𝖵𝖯\mathsf{VP}). Further, Bürgisser [5] showed that over finite fields, a specific family of polynomials is 𝖵𝖭𝖯\mathsf{VNP}-intermediate, provided the polynomial hierarchy 𝖯𝖧\mathsf{PH} does not collapse to the second level. On an intuitive level these polynomials enumerate cuts in a graph. This is a remarkable result, when compared with the classical 𝖯\mathsf{P}-𝖭𝖯\mathsf{NP} setting or the BSS-model. Though the existence of problems with intermediate complexity has been established in the latter settings, due to the involved “diagonalization” arguments used to construct them, these problems seem highly unnatural. That is, their definitions are not motivated by an underlying combinatorial problem but guided by the needs of the proof and, hence, seem artificial. The question of whether there are other naturally-defined 𝖵𝖭𝖯\mathsf{VNP}-intermediate polynomials was left open by Bürgisser [4]. We remark that to date the cut enumerator polynomial from [5] is the only known example of a natural polynomial family that is 𝖵𝖭𝖯\mathsf{VNP}-intermediate.

The question of whether the classes 𝖵𝖯\mathsf{VP} and 𝖵𝖭𝖯\mathsf{VNP} are distinct is often phrased as whether 𝖯𝖾𝗋𝗆n\mathsf{Perm}_{n} is not a quasi-polynomial-size projection of 𝖣𝖾𝗍n\mathsf{Det}_{n}. The importance of this reformulation stems from the fact that it is a purely algebraic statement, devoid of any dependence on circuits. While we have made very little progress on this question of determinantal complexity of the permanent, the progress in restricted settings has been considerable. One of the success stories in theoretical computer science is unconditional lower bound against monotone computations [24, 25, 1]. In particular, Razborov [25] proved that computing the permanent over the Boolean semiring requires monotone circuits of size at least nΩ(logn)n^{\Omega(\log n)}. Jukna [18] observed that if the Hamilton cycle polynomial is a monotone pp-projection of the permanent, then, since the clique polynomial is a monotone projection of the Hamiltonian cycle [28] and the clique requires monotone circuits of exponential size [1], one would get a lower bound of 2nΩ(1)2^{n^{\Omega(1)}} for monotone circuits computing the permanent, thus improving on [25]. The importance of this observation is also highlighted by the fact that such a monotone pp-projection, over the reals, would give an alternate proof of the result of Jerrum and Snir [17] that computing the permanent by monotone circuits over \mathbb{R} requires size at least 2nΩ(1)2^{n^{\Omega(1)}}. (Jerrum and Snir [17] proved that the permanent requires monotone circuits of size 2Ω(n)2^{\Omega(n)} over \mathbb{R} and the tropical semiring.) The first progress on this question raised in [18] was made recently by Grochow [15]. He showed that the Hamiltonian cycle polynomial is not a monotone sub-exponential-size projection of the permanent. This already answered Jukna’s question in its entirety, but Grochow [15] used his techniques to further establish that polynomials like the perfect matching polynomial, and even the 𝖵𝖭𝖯\mathsf{VNP}-intermediate cut enumerator polynomial of Bürgisser [5], are not monotone polynomial-size projections of the permanent. This raises an intriguing question of whether there are other such non-negative polynomials which share this property.

While the 𝖯𝖾𝗋𝗆\mathsf{Perm} vs 𝖣𝖾𝗍\mathsf{Det} problem has become synonymous with the 𝖵𝖯\mathsf{VP} vs 𝖵𝖭𝖯\mathsf{VNP} question, there is a somewhat unsatisfactory feeling about it. This rises from two facts: one, that the 𝖵𝖯\mathsf{VP}-hardness of the determinant is known only under the more powerful quasi-polynomial-size projections, and, second, the lack of natural 𝖵𝖯\mathsf{VP}-complete polynomials (with respect to polynomial-size projections) in the literature. (In fact, with respect to pp-projections, the determinant is complete for the possibly smaller class 𝖵𝖡𝖯\mathsf{VBP} of polynomial-sized algebraic branching programs.) To remedy this situation, it seems crucial to understand the computation in 𝖵𝖯\mathsf{VP}. Bürgisser [4] showed that a generic polynomial family constructed using a topological sort of a generic 𝖵𝖯\mathsf{VP} circuit, while controlling the degree, is complete for 𝖵𝖯\mathsf{VP}. Raz [23], using the depth reduction of [29], showed that a family of “universal circuits” is 𝖵𝖯\mathsf{VP}-complete. Thus both families directly depend on the circuit definition or characterization of 𝖵𝖯\mathsf{VP}. Last year, Durand et al. [11] made significant progress and provided a natural, first of its kind, 𝖵𝖯\mathsf{VP}-complete polynomial. However, the natural polynomials studied by Durand et al. lacked a bit of punch because their completeness was established under polynomial-size constant depth c-reductions rather than projections.

In this paper, we make progress on all three fronts. First, we provide a list of new natural polynomial families, based on basic (combinatorial) 𝖭𝖯\mathsf{NP}-complete problems [14] whose completeness is via parsimonious reductions [27], that are 𝖵𝖭𝖯\mathsf{VNP}-intermediate over finite fields (Theorem 3.1). Then, we show that over reals, some of our intermediate polynomials are not monotone affine polynomial-size projections of the permanent (Theorem 4.1). As in [15], the lower bound results about monotone affine projections are unconditional. Finally, we improve upon [11] by characterizing 𝖵𝖯\mathsf{VP} and establishing a natural 𝖵𝖯\mathsf{VP}-complete polynomial under polynomial-size projections (Theorem 5.3). A modification yields a family similarly complete for 𝖵𝖡𝖯\mathsf{VBP} (Theorems 5.4, 5.5).

Organization of the paper.

We give basic definitions in Section 2. Section 3 contains our discussion on intermediate polynomials. In Section 4 we establish lower bounds under monotone affine projections. The discussion on completeness results appears in Section 5. We end in Section 6 with some interesting questions for further exploration.

2 Preliminaries

Algebraic complexity:

We say that a polynomial ff is a projection of gg if ff can be obtained from gg by setting the variables of gg to either constants in the field, or to the variables of ff. A sequence (fn)(f_{n}) is a pp-projection of (gm)(g_{m}), if each fnf_{n} is a projection of gtg_{t} for some t=t(n)t=t(n) polynomially bounded in nn. There are other notions of reductions between families of polynomials, like c-reductions (polynomial-size oracle circuit reductions), constant-depth c-reductions, and linear p-projections. For more on these reductions, see [4].

An arithmetic circuit is a directed acyclic graph with leaves labeled by variables or constants from an underlying field, internal nodes labeled by field operations ++ and ×\times, and a designated output gate. Each node computes a polynomial in a natural way. The polynomial computed by a circuit is the polynomial computed at its output gate. A parse tree of a circuit captures monomial generation within the circuit. Duplicating gates as needed, unwind the circuit into a formula (fan-out one); a parse tree is a minimal sub-tree (of this unwound formula) that contains the output gate, that contains all children of each included ×\times gate, and that contains exactly one child of each included ++ gate. For a complete definition see [21]. A circuit is said to be skew if at every ×\times gate, at most one incoming edge is the output of another gate.

A family of polynomials (fn(x1,,xm(n)))(f_{n}(x_{1},\ldots,x_{m(n)})) is called a pp-family if both the degree d(n)d(n) of fnf_{n} and the number of variables m(n)m(n) are bounded by a polynomial in nn. A pp-family is in 𝖵𝖯\mathsf{VP} (resp. 𝖵𝖡𝖯\mathsf{VBP}) if a circuit family (skew circuit family, resp.) (Cn)(C_{n}) of size polynomially bounded in nn computes it. A sequence of polynomials (fn)(f_{n}) is in 𝖵𝖭𝖯\mathsf{VNP} if there exist a sequence (gn)(g_{n}) in 𝖵𝖯\mathsf{VP}, and polynomials mm and tt such that for all nn, fn(x¯)=y¯{0,1}t(x¯)gn(x1,,xm(n),y1,,yt(n)).f_{n}(\bar{x})=\sum_{\bar{y}\in\{0,1\}^{t(\bar{x})}}g_{n}(x_{1},\ldots,x_{m(n)},y_{1},\ldots,y_{t(n)}). (𝖵𝖡𝖯\mathsf{VBP} denotes the algebraic analogue of branching programs. Since these are equivalent to skew circuits, we directly use a skew circuit definition of 𝖵𝖡𝖯\mathsf{VBP}.)

Boolean complexity:

We need some basics from Boolean complexity theory. Let 𝖯/𝗉𝗈𝗅𝗒\mathsf{P/poly} denote the class of languages decidable by polynomial-sized Boolean circuit families. A function ϕ:{0,1}\phi:\{0,1\}^{\ast}\to\mathbb{N} is in #𝖯\mathsf{P} if there exists a polynomial pp and a polynomial time deterministic Turing machine MM such that for all x{0,1}x\in\{0,1\}^{\ast}, f(x)=|{y{0,1}p(|x|)M(x,y)=1}|f(x)=|\{y\in\{0,1\}^{p(|x|)}\mid M(x,y)=1\}|. For a prime pp, define

#p𝖯\displaystyle\#_{p}\mathsf{P} ={ψ:{0,1}𝔽pψ(x)=ϕ(x)modp for some ϕ#𝖯},\displaystyle=\{\psi:\{0,1\}^{\ast}\to\mathbb{F}_{p}\mid\psi(x)=\phi(x)\bmod p\textrm{ for some $\phi\in\#\mathsf{P}$}\},
𝖬𝗈𝖽p𝖯\displaystyle\mathsf{Mod}_{p}\mathsf{P} ={L{0,1} for some ϕ#𝖯xLϕ(x)1modp}\displaystyle=\{L\subseteq\{0,1\}^{\ast}\mid\textrm{ for some $\phi\in\#\mathsf{P}$, }x\in L\iff\phi(x)\equiv 1\bmod p\}

It is easy to see that if ϕ:{0,1}\phi:\{0,1\}^{\ast}\to\mathbb{N} is #𝖯\mathsf{P}-complete with respect to parsimonious reductions (that is, for every ψ#P\psi\in\#P, there is a polynomial-time computable function f:{0,1}{0,1}f:\{0,1\}^{*}\rightarrow\{0,1\}^{*} such that for all x{0,1}x\in\{0,1\}^{*}, ψ(x)=ϕ(f(x))\psi(x)=\phi(f(x))), then the language L={xϕ(x)1modp}L=\{x\mid\phi(x)\equiv 1\bmod p\} is 𝖬𝗈𝖽p𝖯\mathsf{Mod}_{p}\mathsf{P}-complete with respect to many-one reductions.

Graph Theory:

We consider the treewidth and pathwidth parameters for an undirected graph. We will work with a “canonical” form of decompositions which is generally useful in dynamic-programming algorithms.

A (nice) tree decomposition of a graph GG is a pair 𝒯=(T,{Xt}tV(T))\mathcal{T}=(T,\{X_{t}\}_{t\in V(T)}), where TT is a tree, rooted at XrX_{r}, whose every node tt is assigned a vertex subset XtV(G)X_{t}\subseteq V(G), called a bag, such that the following conditions hold:

  1. 1.

    Xr=X_{r}=\emptyset, |X|=1|X_{\ell}|=1 for every leaf \ell of TT, and tV(T)Xt=V(G)\cup_{t\in V(T)}X_{t}=V(G).
    That is, the root contain the empty bag, the leaves contain singleton sets, and every vertex of GG is in at least one bag.

  2. 2.

    For every (u,v)E(G)(u,v)\in E(G), there exists a node tt of TT such that {u,v}Xt\{u,v\}\subseteq X_{t}.

  3. 3.

    For every uV(G)u\in V(G), the set Tu={tV(T)uXt}T_{u}=\{t\in V(T)\mid u\in X_{t}\} induces a connected subtree of TT.

  4. 4.

    Every non-leaf node tt of TT is of one of the following three types:

    • Introduce node: tt has exactly once child tt^{\prime}, and Xt=Xt{v}X_{t}=X_{t^{\prime}}\cup\{v\} for some vertex vXtv\notin X_{t^{\prime}}. We say that vv is introduced at tt.

    • Forget node: tt has exactly one child tt^{\prime}, and Xt=Xt{w}X_{t}=X_{t^{\prime}}\setminus\{w\} for some vertex wXtw\in X_{t^{\prime}}. We say that ww is forgotten at tt.

    • Join node: tt has two children t1,t2t_{1},t_{2}, and Xt=Xt1=Xt2.X_{t}=X_{t_{1}}=X_{t_{2}}.

The width of a tree decomposition 𝒯\mathcal{T} is one less than the size of the largest bag; that is, maxtV(T)|Xt|1\max_{t\in V(T)}|X_{t}|-1. The tree-width of a graph GG is the minimum possible width of a tree decomposition of GG.

In a similar way we can also define a nice path decomposition of a graph. For a complete definition we refer to [8].

A sequence (Gn)(G_{n}) of graphs is called a pp-family if the number of vertices in GnG_{n} is polynomially bounded in nn. It is further said to have bounded tree(path)-width if for some absolute constant cc independent of nn, the tree(path)-width of each graph in the sequence is bounded by cc.

A homomorphism from GG to HH is a map from V(G)V(G) to V(H)V(H) preserving edges. A graph is called rigid if it has no homomorphism to itself other than the identity map. Two graphs GG and HH are called incomparable if there are no homomorphisms from GHG\to H as well as HGH\to G. It is known that asymptotically almost all graphs are rigid, and almost all pairs of nonisomorphic graphs are also incomparable. For the purposes of this paper, we only need a collection of three rigid and mutually incomparable graphs. For more details, we refer to [16].

3 𝖵𝖭𝖯\mathsf{VNP}-intermediate

In [5], Bürgisser showed that unless PH collapses to the second level, an explicit family of polynomials, called the cut enumerator polynomial, is 𝖵𝖭𝖯\mathsf{VNP}-intermediate. He raised the question, recently highlighted again in [15], of whether there are other such natural 𝖵𝖭𝖯\mathsf{VNP}-intermediate polynomials. In this section we show that in fact his proof strategy itself can be adapted to other polynomial families as well. The strategy can be described abstractly as follows: Find an explicit polynomial family h=(hn)h=(h_{n}) satisfying the following properties.

M: Membership.

The family is in 𝖵𝖭𝖯\mathsf{VNP}.

E: Ease.

Over a field 𝔽q\mathbb{F}_{q} of size qq and characteristic pp, hh can be evaluated in 𝖯\mathsf{P}. Thus if hh is 𝖵𝖭𝖯\mathsf{VNP}-hard, then we can efficiently compute #𝖯\mathsf{P}-hard functions, modulo pp.

H: Hardness.

The monomials of hh encode solutions to a problem that is #𝖯\mathsf{P}-hard via parsimonious reductions. Thus if hh is in 𝖵𝖯\mathsf{VP}, then the number of solutions, modulo pp, can be extracted using coefficient computation.

Then, unless 𝖬𝗈𝖽p𝖯𝖯/𝗉𝗈𝗅𝗒\mathsf{Mod}_{p}\mathsf{P}\subseteq\mathsf{P/poly} (which in turn implies that PH collapses to the second level, [19]), hh is 𝖵𝖭𝖯\mathsf{VNP}-intermediate.

We provide a list of pp-families that, under the same condition 𝖬𝗈𝖽p𝖯𝖯/𝗉𝗈𝗅𝗒\mathsf{Mod}_{p}\mathsf{P}\not\subseteq\mathsf{P/poly}, are 𝖵𝖭𝖯\mathsf{VNP}-intermediate. All these polynomials are based on basic combinatorial 𝖭𝖯\mathsf{NP}-complete problems that are complete under parsimonious reduction.

(1) The satisfiablity polynomial 𝖲𝖺𝗍𝗊=(𝖲𝖺𝗍𝗊n)\mathsf{Sat^{q}}=(\mathsf{Sat^{q}}_{n}): For each nn, let 𝖢𝗅n\mathsf{Cl}_{n} denote the set of all possible clauses of size 3 over 2n2n literals. There are nn variables X~={Xi}i=1n\tilde{X}=\{X_{i}\}_{i=1}^{n}, and also 8n38n^{3} clause-variables Y~={Yc}c𝖢𝗅n\tilde{Y}=\{Y_{c}\}_{c\in\mathsf{Cl}_{n}}, one for each 3-clause cc.

𝖲𝖺𝗍𝗊n:=a{0,1}n(i[n]:ai=1Xiq1)(c𝖢𝗅na satisfies cYcq1).\mathsf{Sat^{q}}_{n}:=\sum_{a\in\{0,1\}^{n}}\left(\prod_{i\in[n]:a_{i}=1}X_{i}^{q-1}\right)\left(\prod_{\begin{subarray}{c}c~\in\mathsf{Cl}_{n}\\ ~a\textrm{ satisfies }c\end{subarray}}Y_{c}^{q-1}\right).

For the next three polynomials, we consider the complete graph GnG_{n} on nn nodes, and we have the set of variables X~={Xe}eEn\tilde{X}=\{X_{e}\}_{e\in E_{n}} and Y~={Yv}vVn\tilde{Y}=\{Y_{v}\}_{v\in V_{n}}.

(2) The vertex cover polynomial 𝖵𝖢𝗊=(𝖵𝖢𝗊n)\mathsf{VC^{q}}=(\mathsf{VC^{q}}_{n}):

𝖵𝖢𝗊n:=SVn(eEn:e is incident on SXeq1)(vSYvq1).\mathsf{VC^{q}}_{n}:=\sum_{S\subseteq V_{n}}\left(\prod_{e\in E_{n}\colon e\textrm{ is incident on }S}X_{e}^{q-1}\right)\left(\prod_{v\in S}Y_{v}^{q-1}\right).

(3) The clique/independent set polynomial 𝖢𝖨𝖲𝗊=(𝖢𝖨𝖲𝗊n)\mathsf{CIS^{q}}=(\mathsf{CIS^{q}}_{n}):

𝖢𝖨𝖲𝗊n:=TEn(eTXeq1)(v incident on TYvq1).\mathsf{CIS^{q}}_{n}:=\sum_{T\subseteq E_{n}}\left(\prod_{e\in T}X_{e}^{q-1}\right)\left(\prod_{v\textrm{ incident on }T}Y_{v}^{q-1}\right).

(4) The clow polynomial 𝖢𝗅𝗈𝗐𝗊=(𝖢𝗅𝗈𝗐𝗊n)\mathsf{Clow^{q}}=(\mathsf{Clow^{q}}_{n}): A clow in an nn-vertex graph is a closed walk of length exactly nn, in which the minimum numbered vertex (called the head) appears exactly once.

𝖢𝗅𝗈𝗐𝗊n:=w: clow of length n(e: edges in wXeq1)(v: vertices in w(counted only once)Yvq1).\mathsf{Clow^{q}}_{n}:=\sum_{w:\textrm{ clow of length }n}\left(\prod_{e:\textrm{ edges in }w}X_{e}^{q-1}\right)\left(\prod_{\begin{subarray}{c}v:\textrm{ vertices in }w\\ \textrm{(counted only once)}\end{subarray}}Y_{v}^{q-1}\right).

If an edge ee is used kk times in a clow, it contributes Xek(q1)X_{e}^{k(q-1)} to the monomial. But a vertex vv contributes only Yvq1Y_{v}^{q-1} even if it appears more than once. More precisely,

𝖢𝗅𝗈𝗐𝗊n:=w=v0,v1,,vn1:j>0,v0<vj(i[n]X(vi1,vimodn)q1)(v{v0,v1,,vn1}Yvq1).\mathsf{Clow^{q}}_{n}:=\sum_{\begin{subarray}{c}w=\langle v_{0},v_{1},\ldots,v_{n-1}\rangle:\\ \forall j>0,~~v_{0}<v_{j}\end{subarray}}\left(\prod_{i\in[n]}X_{(v_{i-1},v_{i\bmod n})}^{q-1}\right)\left(\prod_{v\in\{v_{0},v_{1},\ldots,v_{n-1}\}}Y_{v}^{q-1}\right).

(5) The 3D-matching polynomial 𝟥𝖣𝖬𝗊=(𝟥𝖣𝖬𝗊n)\mathsf{3DM^{q}}=(\mathsf{3DM^{q}}_{n}): Consider the complete tripartite hyper-graph, where each part in the partition (An,Bn,Cn)(A_{n},B_{n},C_{n}) contain nn nodes, and each hyperedge has exactly one node from each part. We have variables XeX_{e} for hyperedge ee and YvY_{v} for node vv.

𝟥𝖣𝖬𝗊n:=MAn×Bn×Cn(eMXeq1)(vM(counted only once)Yvq1).\mathsf{3DM^{q}}_{n}:=\sum_{M\subseteq A_{n}\times B_{n}\times C_{n}}\left(\prod_{e\in M}X_{e}^{q-1}\right)\left(\prod_{\begin{subarray}{c}v\in M\\ \textrm{(counted only once)}\end{subarray}}Y_{v}^{q-1}\right).

We show that if 𝖬𝗈𝖽p𝖯𝖯/𝗉𝗈𝗅𝗒\mathsf{Mod}_{p}\mathsf{P}\not\subseteq\mathsf{P/poly}, then all five polynomials defined above are 𝖵𝖭𝖯\mathsf{VNP}-intermediate.

Theorem 3.1

Over a finite field 𝔽q\mathbb{F}_{q} of characteristic pp, the polynomial families 𝖲𝖺𝗍𝗊\mathsf{Sat^{q}}, 𝖵𝖢𝗊\mathsf{VC^{q}}, 𝖢𝖨𝖲𝗊\mathsf{CIS^{q}}, 𝖢𝗅𝗈𝗐𝗊\mathsf{Clow^{q}}, and 𝟥𝖣𝖬𝗊\mathsf{3DM^{q}}, are in 𝖵𝖭𝖯\mathsf{VNP}. Further, if 𝖬𝗈𝖽p𝖯𝖯/𝗉𝗈𝗅𝗒\mathsf{Mod}_{p}\mathsf{P}\not\subseteq\mathsf{P/poly}, then they are all 𝖵𝖭𝖯\mathsf{VNP}-intermediate; that is, neither in 𝖵𝖯\mathsf{VP} nor 𝖵𝖭𝖯\mathsf{VNP}-hard with respect to cc-reductions.

Proof

(M) An easy way to see membership in 𝖵𝖭𝖯\mathsf{VNP} is to use Valiant’s criterion ([28]; see also Proposition 2.20 in [4]); the coefficient of any monomial can be computed efficiently, hence the polynomial is in 𝖵𝖭𝖯\mathsf{VNP}. This establishes membership for all families.

We first illustrate the rest of the proof by showing that the polynomial 𝖲𝖺𝗍𝗊\mathsf{Sat^{q}} satisfies the properties (H), (E).

(H): Assume (𝖲𝖺𝗍𝗊n)(\mathsf{Sat^{q}}_{n}) is in 𝖵𝖯\mathsf{VP}, via polynomial-sized circuit family {Cn}n1\{C_{n}\}_{n\geq 1}. We will use CnC_{n} to give a 𝖯/𝗉𝗈𝗅𝗒\mathsf{P/poly} upper bound for computing the number of satisfying assignments of a 3-CNF formula, modulo pp. Since this question is complete for 𝖬𝗈𝖽p𝖯\mathsf{Mod}_{p}\mathsf{P}, the upper bound implies 𝖬𝗈𝖽p𝖯\mathsf{Mod}_{p}\mathsf{P} is in 𝖯/𝗉𝗈𝗅𝗒\mathsf{P/poly}.

Given an instance ϕ\phi of 3SAT, with nn variables and mm clauses, consider the projection of 𝖲𝖺𝗍𝗊n\mathsf{Sat^{q}}_{n} obtained by setting all YcY_{c} for cϕc\in\phi to tt, and all other variables to 1. This gives the polynomial 𝖲𝖺𝗍𝗊ϕ(t)=j=1mdjtj(q1)\mathsf{Sat^{q}}\phi(t)=\sum_{j=1}^{m}d_{j}t^{j(q-1)} where djd_{j} is the number of assignments (modulo pp) that satisfy exactly jj clauses in ϕ\phi. Our goal is to compute dmd_{m}.

We convert the circuit CC into a circuit DD that compute elements of 𝔽q[t]\mathbb{F}_{q}[t] by explicitly giving their coefficient vectors, so that we can pull out the desired coefficient. (Note that after the projection described above, CC works over the polynomial ring 𝔽q[t]\mathbb{F}_{q}[t].) Since the polynomial computed by CC is of degree m(q1)m(q-1), we need to compute the coefficients of all intermediate polynomials too only upto degree m(q1)m(q-1). Replacing ++ by gates performing coordinate-wise addition, ×\times by a sub-circuit performing (truncated) convolution, and supplying appropriate coefficient vectors at the leaves gives the desired circuit. Since the number of clauses, mm, is polynomial in nn, the circuit DD is also of polynomial size. Given the description of CC as advice, the circuit DD can be evaluated in 𝖯\mathsf{P}, giving a 𝖯/𝗉𝗈𝗅𝗒\mathsf{P/poly} algorithm for computing #3-SAT(ϕ\phi) modp\bmod~p. Hence 𝖬𝗈𝖽p𝖯𝖯/𝗉𝗈𝗅𝗒\mathsf{Mod}_{p}\mathsf{P}\subseteq\mathsf{P/poly}.

(E) Consider an assignment to X~\tilde{X} and Y~\tilde{Y} variables in 𝔽q\mathbb{F}_{q}. Since all exponents are multiples of (q1)(q-1), it suffices to consider 0/10/1 assignments to X~\tilde{X} and Y~\tilde{Y}. Each assignment aa contributes 0 or 1 to the final value; call it a contributing assignment if it contributes 1. So we just need to count the number of contributing assignments. An assignment aa is contributing exactly when i[n]\forall i\in[n], Xi=0ai=0X_{i}=0\Longrightarrow a_{i}=0, and c𝖢𝗅n\forall c\in\mathsf{Cl}_{n}, Yc=0a does not satisfy cY_{c}=0\Longrightarrow a\textrm{ does not satisfy }c. These two conditions, together with the values of the XX and YY variables, constrain many bits of a contributing assignment; an inspection reveals how many (and which) bits are so constrained. If any bit is constrained in conflicting ways (for example, Xi=0X_{i}=0, and Yc=0Y_{c}=0 for some clause cc containing the literal x¯i\bar{x}_{i}), then no assignment is contributing (either ai=1a_{i}=1 and the XX part becomes zero due to XiaiX_{i}^{a_{i}}, or ai=0a_{i}=0 and the YY part becomes zero due to YcY_{c}). Otherwise, some bits of a potentially contributing assignment are constrained by XX and YY, and the remaining bits can be set in any way. Hence the total sum is precisely 2(# unconstrained bits)modp2^{(\textrm{\# unconstrained bits})}\bmod~p.

Now assume 𝖲𝖺𝗍𝗊\mathsf{Sat^{q}} is 𝖵𝖭𝖯\mathsf{VNP}-hard. Let LL be any language in 𝖬𝗈𝖽p𝖯\mathsf{Mod}_{p}\mathsf{P}, witnessed via #𝖯\mathsf{P}-function ff. (That is, xLf(x)1modpx\in L\Longleftrightarrow f(x)\equiv 1\bmod p.) By the results of [6, 4], there exists a pp-family r=(rn)𝖵𝖭𝖯𝔽pr=(r_{n})\in\mathsf{VNP}_{\mathbb{F}_{p}} such that n,x{0,1}n,rn(x)=f(x)modp.\forall n,~\forall x\in\{0,1\}^{n},~r_{n}(x)=f(x)\bmod p. By assumption, there is a cc-reduction from rr to 𝖲𝖺𝗍𝗊\mathsf{Sat^{q}}. We use the oracle circuits from this reduction to decide instances of LL. On input xx, the advice is the circuit CC of appropriate size reducing rr to 𝖲𝖺𝗍𝗊\mathsf{Sat^{q}}. We evaluate this circuit bottom-up. At the leaves, the values are known. At ++ and ×\times gates, we perform these operations in 𝔽q\mathbb{F}_{q}. At an oracle gate, the paragraph above tells us how to evaluate the gate. So the circuit can be evaluated in polynomial time, showing that LL is in 𝖯/𝗉𝗈𝗅𝗒\mathsf{P/poly}. Thus 𝖬𝗈𝖽p𝖯𝖯/𝗉𝗈𝗅𝗒\mathsf{Mod}_{p}\mathsf{P}\subseteq\mathsf{P/poly}.

For the other four families, it suffices to show the following, since the rest is identical as for 𝖲𝖺𝗍𝗊\mathsf{Sat^{q}}.

H’.

The monomials of hh encode solutions to a problem that is #𝖯\mathsf{P}-hard via parsimonious reductions.

E’.

Over 𝔽q\mathbb{F}_{q}, hh can be evaluated in 𝖯\mathsf{P}.

We describe this for the polynomial families one by one.

The vertex cover polynomial 𝖵𝖢𝗊=(𝖵𝖢𝗊n)\mathsf{VC^{q}}=(\mathsf{VC^{q}}_{n}):

𝖵𝖢𝗊n:=SVn(eEn:e is incident on SXeq1)(vSYvq1).\mathsf{VC^{q}}_{n}:=\sum_{S\subseteq V_{n}}\left(\prod_{e\in E_{n}\colon e\textrm{ is incident on }S}X_{e}^{q-1}\right)\left(\prod_{v\in S}Y_{v}^{q-1}\right).

(H’): Given an instance of vertex cover A=(V(A),E(A))A=(V(A),E(A)) such that |V(A)|=n|V(A)|=n and |E(A)|=m|E(A)|=m, we show how 𝖵𝖢𝗊n\mathsf{VC^{q}}_{n} encodes the number of solutions of instance AA. Consider the following projection of 𝖵𝖢𝗊n\mathsf{VC^{q}}_{n}. Set Yv=tY_{v}=t, for vV(A)v\in V(A). For eE(A),e\in E(A), set Xe=zX_{e}=z; otherwise eE(A)e\notin E(A) and set Xe=1X_{e}=1. Thus, we have

𝖵𝖢𝗊n(z,t)=SVnz(# edges incident on S)(q1)t|S|(q1).\mathsf{VC^{q}}_{n}(z,t)=\sum_{S\subseteq V_{n}}z^{(\textrm{\# edges incident on }S)(q-1)}t^{|S|(q-1)}.

Hence, it follows that the number of vertex cover of size kk, modulo pp, is the coefficient of zm(q1)tk(q1)z^{m(q-1)}t^{k(q-1)} in 𝖵𝖢𝗊n(z,t)\mathsf{VC^{q}}_{n}(z,t).

(E’): Consider the weighted graph given by the values of X~\tilde{X} and Y~\tilde{Y} variables. Each subset SVnS\subseteq V_{n} contributes 0 or 11 to the total. A subset SVnS\subseteq V_{n} contributes 11 to 𝖵𝖢𝗊n\mathsf{VC^{q}}_{n} if and only if every vertex in SS has non-zero weight, and every edge incident on each vertex in SS has non-zero weight. That is, SS is a subset of full-degree vertices. Therefore, the total sum is 2(# full-degree vertices)modp2^{(\textrm{\# full-degree vertices})}\bmod p.

The clique/independent set polynomial 𝖢𝖨𝖲𝗊=(𝖢𝖨𝖲𝗊n)\mathsf{CIS^{q}}=(\mathsf{CIS^{q}}_{n}):

𝖢𝖨𝖲𝗊n:=TEn(eTXeq1)(v incident on TYvq1).\mathsf{CIS^{q}}_{n}:=\sum_{T\subseteq E_{n}}\left(\prod_{e\in T}X_{e}^{q-1}\right)\left(\prod_{v\textrm{ incident on }T}Y_{v}^{q-1}\right).

(H’): Given an instance of clique A=(V(A),E(A))A=(V(A),E(A)) such that |V(A)|=n|V(A)|=n and |E(A)|=m|E(A)|=m, we show how 𝖢𝖨𝖲𝗊n\mathsf{CIS^{q}}_{n} encodes the number of solutions of instance AA. Consider the following projection of 𝖢𝖨𝖲𝗊n\mathsf{CIS^{q}}_{n}. Set Yv=tY_{v}=t, for vV(A)v\in V(A). For eE(A),e\in E(A), set Xe=zX_{e}=z; otherwise eE(A)e\notin E(A) and set Xe=1X_{e}=1. (This is the same projection as used for vertex cover.) Thus, we have

𝖢𝖨𝖲𝗊n(z,t)=TEnz|TE(A)|(q1)t(# vertices incident on T)(q1).\mathsf{CIS^{q}}_{n}(z,t)=\sum_{T\subseteq E_{n}}z^{|T\cap E(A)|(q-1)}t^{(\textrm{\# vertices incident on }T)(q-1)}.

Now it follows easily that the number of cliques of size kk, modulo pp, is the coefficient of z(k2)(q1)tk(q1)z^{{k\choose 2}(q-1)}t^{k(q-1)} in 𝖢𝖨𝖲𝗊n(z,t)\mathsf{CIS^{q}}_{n}(z,t).

(E’): Consider the weighted graph given by the values of X~\tilde{X} and Y~\tilde{Y} variables. Each subset TEnT\subseteq E_{n} contributes 0 or 11 to the sum. A subset TEnT\subseteq E_{n} contributes 11 to the sum if and only if all edges in TT have non-zero weight, and every vertex incident on TT must have non-zero weight. Therefore, we consider the graph induced on vertices with non-zero weights. Any subset of edges in this induced graph contributes 11 to the total sum; all other subsets contribute 0. Let \ell be the number of edges in the induced graph with non-zero weights. Thus, the total sum is 2modp2^{\ell}\bmod p.

The clow polynomial 𝖢𝗅𝗈𝗐𝗊=(𝖢𝗅𝗈𝗐𝗊n)\mathsf{Clow^{q}}=(\mathsf{Clow^{q}}_{n}):

A clow in an nn-vertex graph is a closed walk of length exactly nn, in which the minimum numbered vertex (called the head) appears exactly once.

𝖢𝗅𝗈𝗐𝗊n:=w: clow of length n(e: edges in wXeq1)(v: vertices in w(counted only once)Yvq1).\mathsf{Clow^{q}}_{n}:=\sum_{w:\textrm{ clow of length }n}\left(\prod_{e:\textrm{ edges in }w}X_{e}^{q-1}\right)\left(\prod_{\begin{subarray}{c}v:\textrm{ vertices in }w\\ \textrm{(counted only once)}\end{subarray}}Y_{v}^{q-1}\right).

(If an edge ee is used kk times in a clow, it contributes Xek(q1)X_{e}^{k(q-1)} to the monomial.)

(H’): Given an instance A=(V(A),E(A))A=(V(A),E(A)) of the Hamiltonian cycle problem with |V(A)|=n|V(A)|=n and |E(A)|=m|E(A)|=m, we show how 𝖢𝗅𝗈𝗐𝗊n\mathsf{Clow^{q}}_{n} encodes the number of Hamiltonian cycles in AA. Consider the following projection of 𝖢𝗅𝗈𝗐𝗊n\mathsf{Clow^{q}}_{n}. Set Yv=tY_{v}=t, for vV(A)v\in V(A). For eE(A),e\in E(A), set Xe=zX_{e}=z; otherwise eE(A)e\notin E(A) and set Xe=1X_{e}=1. (The same projection was used for 𝖵𝖢𝗊\mathsf{VC^{q}} and 𝖢𝖨𝖲𝗊\mathsf{CIS^{q}}.) Thus, we have

𝖢𝗅𝗈𝗐𝗊n(z,t)=w: clow of length n(e: edges in wE(A)zq1)(v: vertices in w(counted only once)tq1).\mathsf{Clow^{q}}_{n}(z,t)=\sum_{w:\textrm{ clow of length }n}\left(\prod_{e:\textrm{ edges in }w\cap E(A)}z^{q-1}\right)\left(\prod_{\begin{subarray}{c}v:\textrm{ vertices in }w\\ \textrm{(counted only once)}\end{subarray}}t^{q-1}\right).

From the definition, it now follows that number of Hamiltonian cycles in AA, modulo pp, is the coefficient of zn(q1)tn(q1)z^{n(q-1)}t^{n(q-1)}.

(E’): To evaluate 𝖢𝗅𝗈𝗐𝗊n\mathsf{Clow^{q}}_{n} on instantiations of X~\tilde{X} and Y~\tilde{Y} variables, we consider the weighted graph given by the values to the variables. We modify the edge weights as follows: if an edge is incident on a node with zero weight, we make its weight 0 irrespective of the value of the corresponding XX variable. Thus, all zero weight vertices are isolated in the modified graph GG. Hence, the total sum is equal to the number of closed walks of length nn, modulo pp, in this modified graph. This can be computed in polynomial time using matrix powering as follows: Let GiG_{i} denote the induced subgraph of GG with vertices {i,,n}\{i,\ldots,n\}, and let AiA_{i} be its adjacency matrix. We represent AiA_{i} as an n×nn\times n matrix with the first i1i-1 rows and columns having only zeroes. Now the number of clows with head ii is given by the [i,i][i,i] entry of AiAi+1n2AiA_{i}A_{i+1}^{n-2}A_{i}.

The 3D-matching polynomial 𝟥𝖣𝖬𝗊=(𝟥𝖣𝖬𝗊n)\mathsf{3DM^{q}}=(\mathsf{3DM^{q}}_{n}):

Consider the complete tripartite hyper-graph, where each partition contain nn nodes, and each hyperedge has exactly one node from each part. As before, there are variables XeX_{e} for hyperedge ee and YvY_{v} for node vv.

𝟥𝖣𝖬𝗊n:=MAn×Bn×Cn(eMXeq1)(vM(counted only once)Yvq1).\mathsf{3DM^{q}}_{n}:=\sum_{M\subseteq A_{n}\times B_{n}\times C_{n}}\left(\prod_{e\in M}X_{e}^{q-1}\right)\left(\prod_{\begin{subarray}{c}v\in M\\ \textrm{(counted only once)}\end{subarray}}Y_{v}^{q-1}\right).

(H’): Given an instance of 3D-Matching \mathcal{H}, we consider the usual projection. The variables corresponding to the vertices are all set to tt. The edges present in \mathcal{H} are all set to zz, and the ones not present are set to 11. Then the number of 3D-matchings in \mathcal{H}, modulo pp, is equal to the coefficient of zn(q1)t3n(q1)z^{n(q-1)}t^{3n(q-1)} in 𝟥𝖣𝖬𝗊n(z,t)\mathsf{3DM^{q}}_{n}(z,t).

(E’): To evaluate 𝟥𝖣𝖬𝗊n\mathsf{3DM^{q}}_{n} over 𝔽q\mathbb{F}_{q}, consider the hypergraph obtained after removing the vertices with zero weight, edges with zero weight, and edges that contain a vertex with zero weight (even if the edges themselves have non-zero weight). Every subset of hyperedges in this modified hypergraph contributes 11 to the total sum, and all other subsets contribute 0. Hence, the evaluation equals 2(# edges in the modified hypergraph)modp2^{(\textrm{\# edges in the modified hypergraph})}\bmod p. ∎

It is worth noting that the cut enumerator polynomial 𝖢𝗎𝗍𝗊\mathsf{Cut^{q}}, showed by Bürgisser to be 𝖵𝖭𝖯\mathsf{VNP}-intermediate over field 𝔽q\mathbb{F}_{q}, is in fact 𝖵𝖭𝖯\mathsf{VNP}-complete over the rationals when q=2q=2, [9]. Thus the above technique is specific to finite fields.

4 Monotone projection lower bounds

We now show that some of our intermediate polynomials are not monotone pp-projections of the Permanent polynomial. The results here are motivated by the recent results of Grochow [15]. Recall that a polynomial f(x1,,xn)f(x_{1},\ldots,x_{n}) is a projection of a polynomial g(y1,,ym)g(y_{1},\ldots,y_{m}) if f(x1,,xn)=g(a1,,am)f(x_{1},\ldots,x_{n})=g(a_{1},\ldots,a_{m}), where aia_{i}’s are either constants or xjx_{j} for some jj. The polynomial ff is an affine projection of gg if ff can be obtained from gg by replacing each yiy_{i} with an affine linear function i(x~)\ell_{i}(\tilde{x}). Over any subring of \mathbb{R}, or more generally any totally ordered semi-ring, a monotone projection is a projection in which all constants appearing in the projection are non-negative. We say that the family (fn)(f_{n}) is a (monotone affine) projection of the family (gn)(g_{n}) with blow-up t(n)t(n) if for all sufficiently large nn, fnf_{n} is a (monotone affine) projection of gt(n)g_{t(n)}.

Theorem 4.1

Over the reals (or any totally ordered semi-ring), for any qq, the families 𝖲𝖺𝗍𝗊\mathsf{Sat^{q}} and 𝖢𝗅𝗈𝗐𝗊\mathsf{Clow^{q}} are not monotone affine pp-projections of the Permanent family. Any monotone affine projection from Permanent to 𝖲𝖺𝗍𝗊\mathsf{Sat^{q}} must have a blow-up of at least 2Ω(n)2^{\Omega(\sqrt{n})}. Any monotone affine projection from Permanent to 𝖢𝗅𝗈𝗐𝗊\mathsf{Clow^{q}} must have a blow-up of at least 2Ω(n)2^{\Omega(n)}.

Before giving the proof, we set up some notation. For more details, see [2, 26, 15]. For any polynomial pp in nn variables, let 𝖭𝖾𝗐𝗍(p)\mathsf{Newt}(p) denote the polytope in n\mathbb{R}^{n} that is the convex hull of the vectors of exponents of monomials of pp. For any Boolean formula ϕ\phi on nn variables, let p-SAT(ϕ\phi) denote the polytope in n\mathbb{R}^{n} that is the convex hull of all satisfying assignments of ϕ\phi. Let Kn=(Vn,En)K_{n}=(V_{n},E_{n}) denote the nn-vertex complete graph. The travelling salesperson (TSP) polytope is defined as the convex hull of the characteristic vectors of all subsets of EnE_{n} that define a Hamiltonian cycle in KnK_{n}.

For a polytope PP, let 𝖼(P)\mathsf{c}(P) denote the minimal number of linear inequalities needed to define PP. A polytope QmQ\subseteq\mathbb{R}^{m} is an extension of PnP\subseteq\mathbb{R}^{n} if there is an affine linear map π:mn\pi\colon\mathbb{R}^{m}\to\mathbb{R}^{n} such that π(Q)=P\pi(Q)=P. The extension complexity of PP, denoted 𝗑𝖼(P)\mathsf{xc}(P), is the minimum size c(Q)c(Q) of any extension QQ (of any dimension) of PP.

The following are straightforward, see for instance [15, 13].

Fact 4.2
  1. 1.

    𝖼(𝖭𝖾𝗐𝗍(𝖯𝖾𝗋𝗆n))2n\mathsf{c}(\mathsf{Newt}(\mathsf{Perm}_{n}))\leqslant 2n.

  2. 2.

    If polytope QQ is an extension of polytope PP, then xc(P)𝗑𝖼(Q)xc(P)\leqslant\mathsf{xc}(Q).

We use the following recent results.

Proposition 1
  1. 1.

    Let f(x1,,xn)f(x_{1},\ldots,x_{n}) and g(y1,,ym)g(y_{1},\ldots,y_{m}) be polynomials over a totally ordered semi-ring RR, with non-negative coefficients. If ff is a monotone projection of gg, then the intersection of 𝖭𝖾𝗐𝗍(g)\mathsf{Newt}(g) with some linear subspace is an extension of 𝖭𝖾𝗐𝗍(f)\mathsf{Newt}(f). In particular, 𝗑𝖼(𝖭𝖾𝗐𝗍(f))m+𝖼(𝖭𝖾𝗐𝗍(g))\mathsf{xc}(\mathsf{Newt}(f))\leqslant m+\mathsf{c}(\mathsf{Newt}(g)). [15]

  2. 2.

    For every nn there exists a 3SAT formula ϕ\phi with O(n)O(n) variables and O(n)O(n) clauses such that 𝗑𝖼(𝗉-𝖲𝖠𝖳(ϕ))2Ω(n).\mathsf{xc}(\mathsf{p\text{-}SAT}(\phi))\geqslant 2^{\Omega(\sqrt{n})}. [2]

  3. 3.

    The extension complexity of the TSP polytope is 2Ω(n)2^{\Omega(n)}. [26]

Proof

(of Theorem 4.1.) Let ϕ\phi be a 3SAT formula with nn variables and mm clauses as given by Proposition 1 (2). For the polytope P=𝗉-𝖲𝖠𝖳(ϕ)P=\mathsf{p\text{-}SAT}(\phi), 𝗑𝖼(P)\mathsf{xc}(P) is high.

Let QQ be the Newton polytope of 𝖲𝖺𝗍𝗊n\mathsf{Sat^{q}}_{n}. It resides in NN dimensions, where N=n+|𝖢𝗅n|=n+8n3N=n+|\mathsf{Cl}_{n}|=n+8n^{3}, and is the convex hull of vectors of the form (q1)a~b~(q-1)\langle\tilde{a}\tilde{b}\rangle where a~{0,1}n\tilde{a}\in\{0,1\}^{n}, b~{0,1}Nn\tilde{b}\in\{0,1\}^{N-n}, and for all c𝖢𝗅nc\in\mathsf{Cl}_{n}, a~\tilde{a} satisfies cc if and only if bc=1b_{c}=1. For each a~{0,1}n\tilde{a}\in\{0,1\}^{n}, there is a unique b~{0,1}Nn\tilde{b}\in\{0,1\}^{N-n} such that (q1)a~b~(q-1)\langle\tilde{a}\tilde{b}\rangle is in QQ.

Define the polytope RR, also in NN dimensions, to be the convex hull of vectors that are vertices of QQ and also satisfy the constraint cϕbcm\sum_{c\in\phi}b_{c}\geq m. This constraint discards vertices of QQ where a~\tilde{a} does not satisfy ϕ\phi. Thus RR is an extension of PP (projecting the first nn coordinates of points in RR gives a (q1)(q-1)-scaled version of PP), so by Fact 4.2(2), 𝗑𝖼(P)𝗑𝖼(R)\mathsf{xc}(P)\leq\mathsf{xc}(R). Further, we can obtain an extension of RR from any extension of QQ by adding just one inequality; hence 𝗑𝖼(R)1+𝗑𝖼(Q)\mathsf{xc}(R)\leq 1+\mathsf{xc}(Q).

Suppose 𝖲𝖺𝗍𝗊\mathsf{Sat^{q}} is a monotone affine projection of 𝖯𝖾𝗋𝗆n\mathsf{Perm}_{n} with blow-up t(n)t(n). By Fact 4.2(1) and Proposition 1(1), 𝗑𝖼(𝖭𝖾𝗐𝗍(𝖲𝖺𝗍𝗊))=𝗑𝖼(Q)t(n)+c(𝖯𝖾𝗋𝗆t(n))O(t(n))\mathsf{xc}(\mathsf{Newt}(\mathsf{Sat^{q}}))=\mathsf{xc}(Q)\leq t(n)+c(\mathsf{Perm}_{t(n)})\leq O(t(n)). From the preceding discussion and by Proposition 1(2), we get 2Ω(n)𝗑𝖼(P)𝗑𝖼(R)1+𝗑𝖼(Q)O(t(n))2^{\Omega(\sqrt{n})}\leq\mathsf{xc}(P)\leq\mathsf{xc}(R)\leq 1+\mathsf{xc}(Q)\leq O(t(n)). It follows that t(n)t(n) is at least 2Ω(n)2^{\Omega(\sqrt{n})}.

For the 𝖢𝗅𝗈𝗐𝗊\mathsf{Clow^{q}} polynomial, let PP be the TSP polytope and QQ be 𝖭𝖾𝗐𝗍(𝖢𝗅𝗈𝗐𝗊)\mathsf{Newt}(\mathsf{Clow^{q}}). The vertices of QQ are of the form (q1)a~b~(q-1)\tilde{a}\tilde{b} where a~{0,1}(n2)\tilde{a}\in\{0,1\}^{{n\choose 2}} picks a subset of edges, b~{0,1}n\tilde{b}\in\{0,1\}^{n} picks a subset of vertices, and the picked edges form a length-nn clow touching exactly the picked vertices. Define polytope RR by discarding vertices of QQ where i[n]bi<n\sum_{i\in[n]}b_{i}<n. Now the same argument as above works, using Proposition 1(3) instead of (4). ∎

5 Complete families for VP and VBP

The quest for a natural 𝖵𝖯\mathsf{VP}-complete polynomial has generated a significant amount of research [4, 23, 22, 7, 11]. The first success story came from [11], where some naturally defined homomorphism polynomials were studied, and a host of them were shown to be complete for the class 𝖵𝖯\mathsf{VP}. But the results came with minor caveats. When the completeness was established under projections, there were non-trivial restrictions on the set of homomorphisms ,\mathcal{H}, and sometimes even on the target graph HH. On the other hand, when all homomorphisms were allowed, completeness could only be shown under seemingly more powerful reductions, namely, constant-depth cc-reductions. Furthermore, the graphs were either directed or had weights on nodes. It is worth noting that the reductions in [11] actually do not use the full power of generic constant-depth cc-reductions; a closer analysis reveals that they are in fact linear p-projection. That is, the reductions are linear combinations of polynomially many pp-projections (see Chapter 3, [4]). Still, this falls short of pp-projections.

In this work, we remove all such restrictions and show that there is a simple explicit homomorphism polynomial family that is complete for 𝖵𝖯\mathsf{VP} under pp-projections. In this family, the source graphs GG are specific bounded-tree-width graphs, and the target graphs HH are complete graphs. We also show that a similar family with bounded-path-width source graphs is complete for 𝖵𝖡𝖯\mathsf{VBP} under pp-projections. Thus, homomorphism polynomials are rich enough to characterise computations by circuits as well as algebraic branching programs.

The polynomials we consider are defined formally as follows.

Definition 5.1

Let G=(V(G),E(G))G=(V(G),E(G)) and H=(V(H),E(H))H=(V(H),E(H)) be two graphs. Consider the set of variables Z¯:={Zu,auV(G) and aV(H)}\bar{Z}:=\{Z_{u,a}\mid u\in V(G)\mbox{ and }a\in V(H)\} and Y¯:={Y(u,v)(u,v)E(H)}\bar{Y}:=\{Y_{(u,v)}\mid(u,v)\in E(H)\}. Let \mathcal{H} be a set of homomorphisms from GG to HH. The homomorphism polynomial fG,H,f_{G,H,\mathcal{H}} in the variable set Y¯\bar{Y}, and the generalised homomorphism polynomial f^G,H,\hat{f}_{G,H,\mathcal{H}} in the variable set Z¯Y¯\bar{Z}\cup\bar{Y}, are defined as follows:

fG,H,\displaystyle f_{G,H,\mathcal{H}} =ϕ((u,v)E(G)Y(ϕ(u),ϕ(v))).\displaystyle=\sum_{\phi\in\mathcal{H}}\left(\prod_{(u,v)\in E(G)}Y_{(\phi(u),\phi(v))}\right).
f^G,H,\displaystyle\hat{f}_{G,H,\mathcal{H}} =ϕ(uV(G)Zu,ϕ(u))((u,v)E(G)Y(ϕ(u),ϕ(v))).\displaystyle=\sum_{\phi\in\mathcal{H}}\left(\prod_{u\in V(G)}Z_{u,\phi(u)}\right)\left(\prod_{(u,v)\in E(G)}Y_{(\phi(u),\phi(v))}\right).

Let 𝐇𝐨𝐦{\bf Hom} denote the set of all homomorphisms from GG to HH. If \mathcal{H} equals 𝐇𝐨𝐦{\bf Hom}, then we drop it from the subscript and write fG,Hf_{G,H} or f^G,H\hat{f}_{G,H}.

Note that for every G,H,G,H,\mathcal{H}, fG,H,(Y¯)f_{G,H,\mathcal{H}}(\bar{Y}) equals f^G,H,(Y¯)Z¯=1¯\hat{f}_{G,H,\mathcal{H}}(\bar{Y})\mid_{\bar{Z}=\bar{1}}. Thus upper bounds for f^\hat{f} give upper bounds for ff, while lower bounds for ff give lower bounds for f^\hat{f}.

We show in Theorem 5.2 that for any pp-family (Hm)(H_{m}), and any bounded tree-width (path-width, respectively) pp-family (Gm)(G_{m}), the polynomial family (fm)(f_{m}) where fm=f^Gm,Hmf_{m}=\hat{f}_{G_{m},H_{m}} is in 𝖵𝖯\mathsf{VP} (𝖵𝖡𝖯\mathsf{VBP}, respectively). We then show in Theorem 5.3 that for a specific bounded tree-width family (Gm)(G_{m}), and for Hm=Km6H_{m}=K_{m^{6}}, the polynomial family (fGm,Hm)(f_{G_{m},H_{m}}) is hard, and hence complete, for 𝖵𝖯\mathsf{VP} with respect to projections. An analogous statement is shown in Theorem 5.4 for a specific bounded path-width family (Gm)(G_{m}) and for Hm=Km2H_{m}=K_{m^{2}}. Over fields of characteristic other than 2, 𝖵𝖡𝖯\mathsf{VBP}-hardness is obtained for a simpler family of source graphs GmG_{m}, as described in Theorem 5.5.

5.1 Upper Bound

In [11], it was shown that the homomorphism polynomial f^Tm,Kn\hat{f}_{T_{m},K_{n}} where TmT_{m} is a binary tree on mm leaves, and KnK_{n} is a complete graph on nn nodes, is computable by an arithmetic circuit of size O(m3n3)O(m^{3}n^{3}). Their proof idea is based on recursion: group the homomorphisms based on where they map the root of TmT_{m} and its children, and recursively compute the sub-polynomials within each group. The sub-polynomials of a specific group have a special set of variables in their monomials. Hence, the homomorphism polynomial can be computed by suitably combining partial derivatives of the sub-polynomials. The partial derivatives themselves can be computed efficiently using the technique of Baur and Strassen, [3].

Generalizing the above idea to polynomials where the source graph is not a binary tree TmT_{m} but a bounded tree-width graph GmG_{m} seems hard. The very first obstacle we encounter is to generalize the concept of partial derivative to monomial extension. Combining sub-polynomials to obtain the original polynomial also gets rather complicated.

We sidestep this difficulty by using a dynamic programming approach [10] based on a “nice” tree decomposition of the source graph. This shows that the homomorphism polynomial f^G,H\hat{f}_{G,H} is computable by an arithmetic circuit of size at most 2|V(G)||V(H)|tw(G)+1(2|V(H)|+2|E(H)|),2|V(G)|\cdot|V(H)|^{tw(G)+1}\cdot(2|V(H)|+2|E(H)|), where tw(G)tw(G) is the tree-width of GG.

Let 𝒯=(T,{Xt}tV(T))\mathcal{T}=(T,\{X_{t}\}_{t\in V(T)}) be a nice tree decomposition of GG of width τ\tau. For each tV(T)t\in V(T), let Mt={ϕϕ:XtV(H)}M_{t}=\{\phi\mid\phi\colon X_{t}\to V(H)\} be the set of all mappings from XtX_{t} to V(H)V(H). Since |Xt|τ+1|X_{t}|\leqslant\tau+1, we have |Mt||V(H)|τ+1|M_{t}|\leqslant|V(H)|^{\tau+1}. For each node tV(T)t\in V(T), let TtT_{t} be the subtree of TT rooted at node tt, Vt:=tV(Tt)XtV_{t}:=\bigcup_{t^{\prime}\in V(T_{t})}X_{t^{\prime}}, and Gt:=G[Vt]G_{t}:=G[V_{t}] be the subgraph of GG induced on VtV_{t}. Note that Gr=G.G_{r}=G.

We will build the circuit inductively. For each tV(T)t\in V(T) and ϕMt\phi\in M_{t}, we have a gate t,ϕ\langle t,\phi\rangle in the circuit. Such a gate will compute the homomorphism polynomial from GtG_{t} to HH such that the mapping of XtX_{t} in HH is given by ϕ\phi. For each such gate t,ϕ\langle t,\phi\rangle we introduce another gate t,ϕ\langle t,\phi\rangle^{\prime} which computes the “partial derivative” (or, quotient) of the polynomial computed at t,ϕ\langle t,\phi\rangle with respect to the monomial given by ϕ\phi. As we mentioned before, the construction is inductive, starting at the leaf nodes and proceeding towards the root.

Base case (Leaf nodes):

Let V(T)\ell\in V(T) be a leaf node. Then, X={u}X_{\ell}=\{u\} such that uV(G)u\in V(G). Note that any ϕM\phi\in M_{\ell} is just a mapping of uu to some node in V(H)V(H). Hence, the set MM_{\ell} can be identified with V(H)V(H). Therefore, for all hV(H)h\in V(H), we label the gate ,h\langle\ell,h\rangle by the variable Zu,hZ_{u,h}. The derivative gate ,h\langle\ell,h\rangle^{\prime} in this case is set to 11.

Introduce nodes:

Let tV(T)t\in V(T) be an introduce node, and tt^{\prime} be its unique child. Then, XtXt={u}X_{t}\setminus X_{t^{\prime}}=\{u\} for some uV(G)u\in V(G). Let N(u):={v|vXt and (v,u)E(Gt)}N(u):=\{v|v\in X_{t^{\prime}}\mbox{ and }(v,u)\in E(G_{t})\}. Note that there is a one-to-one correspondence between ϕMt\phi\in M_{t} and pairs (ϕ,h)Mt×V(H)(\phi^{\prime},h)\in M_{t^{\prime}}\times V(H). Therefore, for all ϕ(=(ϕ,h))Mt\phi(=(\phi^{\prime},h))\in M_{t} such that vN(u),(ϕ(v),h)E(H),\forall v\in N(u),(\phi^{\prime}(v),h)\in E(H), we set

t,ϕ\displaystyle\langle t,\phi\rangle :=Zu,h(vN(u)Y(ϕ(v),h))t,ϕ and,\displaystyle:=Z_{u,h}\cdot\left(\prod_{v\in N(u)}Y_{(\phi^{\prime}(v),h)}\right)\cdot\langle t^{\prime},\phi^{\prime}\rangle\;\;\;\;\;\mbox{ and},
t,ϕ\displaystyle\langle t,\phi\rangle^{\prime} :=t,ϕ,\displaystyle:=\langle t^{\prime},\phi^{\prime}\rangle^{\prime},

otherwise we set t,ϕ=t,ϕ:=0.\langle t,\phi\rangle=\langle t,\phi\rangle^{\prime}:=0.

Forget nodes:

Let tV(T)t\in V(T) be a forget node and tt^{\prime} be its unique child. Then, XtXt={u}X_{t^{\prime}}\setminus X_{t}=\{u\} for some uV(G)u\in V(G). Again note that there is a one-to-one correspondence between pairs (ϕ,h)Mt×V(H)(\phi,h)\in M_{t}\times V(H) and ϕMt\phi^{\prime}\in M_{t^{\prime}}. Let N(u):={v|vXt and (v,u)E(Gt)}.N(u):=\{v|v\in X_{t}\mbox{ and }(v,u)\in E(G_{t^{\prime}})\}. Therefore, for all ϕMt,\phi\in M_{t}, we set

t,ϕ\displaystyle\langle t,\phi\rangle :=hV(H)t,(ϕ,h) and,\displaystyle:=\sum_{h\in V(H)}\langle t^{\prime},(\phi,h)\rangle\;\;\;\;\;\mbox{ and},
t,ϕ\displaystyle\langle t,\phi\rangle^{\prime} :=hV(H) such thatvN(u),(ϕ(v),h)E(H)Zu,h(vN(u)Y(ϕ(v),h))t,(ϕ,h).\displaystyle:=\sum_{\begin{subarray}{c}h\in V(H)\mbox{ such that}\\ \forall v\in N(u),(\phi(v),h)\in E(H)\end{subarray}}Z_{u,h}\cdot\left(\prod_{v\in N(u)}Y_{(\phi(v),h)}\right)\cdot\langle t^{\prime},(\phi,h)\rangle^{\prime}.
Join nodes:

Let tV(T)t\in V(T) be a join node, and t1t_{1} and t2t_{2} be its two children; we have Xt=Xt1=Xt2X_{t}=X_{t_{1}}=X_{t_{2}}. Then, for all ϕMt,\phi\in M_{t}, we set

t,ϕ\displaystyle\langle t,\phi\rangle :=t1,ϕt2,ϕ(=t1,ϕt2,ϕ)\displaystyle:=\langle t_{1},\phi\rangle\cdot\langle t_{2},\phi\rangle^{\prime}\left(=\langle t_{1},\phi\rangle^{\prime}\cdot\langle t_{2},\phi\rangle\right)
t,ϕ\displaystyle\langle t,\phi\rangle^{\prime} :=t1,ϕt2,ϕ.\displaystyle:=\langle t_{1},\phi\rangle^{\prime}\cdot\langle t_{2},\phi\rangle^{\prime}.

The output gate of the circuit is r,\langle r,\emptyset\rangle. The correctness of the algorithm is readily seen via induction in a similar way. The bound on the size also follows easily from the construction.

We observe some properties of our construction. First, the circuit constructed is a constant-free circuit. This was the case with the algorithm from [11] too. Second, if we start with a path decomposition, we obtain skew circuits, since the join nodes are absent. The algorithm from [11] does not give skew circuits when TmT_{m} is a path. (It seems the obstacle there lies in computing partial-derivatives using skew circuits.)

From the above algorithm and its properties, we obtain the following theorem.

Theorem 5.2

Consider the family of homomorphism polynomials (fm),(f_{m}), where fm=fGm,Hm(Z¯,Y¯)f_{m}=f_{G_{m},H_{m}}(\bar{Z},\bar{Y}), and (Hm)(H_{m}) is a pp-family of complete graphs.

  • If (Gm)(G_{m}) is a pp-family of graphs of bounded tree-width, then (fm)𝖵𝖯(f_{m})\in\mathsf{VP}.

  • If (Gm)(G_{m}) is a pp-family of graphs of bounded path-width, then (fm)𝖵𝖡𝖯(f_{m})\in\mathsf{VBP}.

5.2 𝖵𝖯\mathsf{VP}-completeness

We now turn our attention towards establishing 𝖵𝖯\mathsf{VP}-hardness of the homomorphism polynomials. We need to show that there exists a pp-family (Gm)(G_{m}) of bounded tree-width graphs such that (fGm,Hm(Y¯))(f_{G_{m},H_{m}}(\bar{Y})) is hard for 𝖵𝖯\mathsf{VP} under projections.

We use rigid and mutually incomparable graphs in the construction of GmG_{m}. Let I:={I0,I1,I2}I:=\{I_{0},I_{1},I_{2}\} be a fixed set of three connected, rigid and mutually incomparable graphs. Note that they are necessarily non-bipartite. Let cIi=|V(Ii)|c_{I_{i}}=|V(I_{i})|. Choose an integer cmax>max{cI0,cI1,cI2}c_{\max}>\max\;\{c_{I_{0}},c_{I_{1}},c_{I_{2}}\}. Identify two distinct vertices {v0,vr0}\{v_{\ell}^{0},v_{r}^{0}\} in I0I_{0}, three distinct vertices {v1,vr1,vp1}\{v_{\ell}^{1},v_{r}^{1},v_{p}^{1}\} in I1I_{1}, and three distinct vertices {v2,vr2,vp2}\{v_{\ell}^{2},v_{r}^{2},v_{p}^{2}\} in I2I_{2}.

For every mm a power of 2, we denote a complete (perfect) binary tree with mm leaves by 𝖳m\mathsf{T}_{m}. We construct a sequence of graphs GmG_{m} (Fig. 1) from 𝖳m\mathsf{T}_{m} as follows: first replace the root by the graph I0I_{0}, then all the nodes on a particular level are replaced by either I1I_{1} or I2I_{2} alternately (cf. Fig. 1). Now we add edges; suppose we are at a ‘node’ which is labeled IiI_{i} and the left child and right child are labeled IjI_{j}, we add an edge between viv^{i}_{\ell} and vpjv^{j}_{p} in the left child, and an edge between vriv^{i}_{r} and vpjv^{j}_{p} in the right child. Finally, to obtain GmG_{m} we expand each added edge into a simple path with cmaxc_{\max} vertices on it (cf. Fig. 1). That is, a left-edge connection between two incomparable graphs in the tree looks like, Ii(vi)-(path with cmax vertices)-(vpj)Ij.I_{i}(v^{i}_{\ell})\relbar\mbox{(path with }c_{\max}\mbox{ vertices)}\relbar(v^{j}_{p})I_{j}.

I0I_{0}I1I_{1}I1I_{1}I2I_{2}I2I_{2}I2I_{2}I2I_{2}I1I_{1}I1I_{1}I1I_{1}I1I_{1}I1I_{1}I1I_{1}I1I_{1}I1I_{1}path with cmaxc_{\max} vertices
Figure 1: The graph GmG_{m}.
Theorem 5.3

Over any field, the family of homomorphism polynomials (fm)(f_{m}), with fm(Y¯)=fGm,Hm(Y¯)f_{m}(\bar{Y})=f_{G_{m},H_{m}}(\bar{Y}), where

  • GmG_{m} is defined as above (see Fig. 1), and

  • HmH_{m} is an undirected complete graph on 𝗉𝗈𝗅𝗒(m)\mathsf{poly}(m), say m6m^{6}, vertices,

is complete for 𝖵𝖯\mathsf{VP} under pp-projections.

Proof

Membership in 𝖵𝖯\mathsf{VP} follows from Theorem 5.2.

We proceed with the hardness proof. The idea is to obtain the 𝖵𝖯\mathsf{VP}-complete universal polynomial from [23] as a projection of fmf_{m}. This universal polynomial is computed by a normal-form homogeneous circuit with alternating unbounded fanin-in ++ and bounded fan-in ×\times gates. We would like to put its parse trees in bijection with homomorphisms from GG to HH. This becomes easier if we use an equivalent universal circuit in a nice normal form as described in [11]. The normal form circuit is multiplicatively disjoint; sub-circuits of ×\times gates are disjoint (see [21]). This ensures that even though CnC_{n} itself is not a formula, all its parse trees are already subgraphs of CnC_{n} even without unwinding it into a formula.

Our starting point is the related graph JnJ_{n}^{\prime} in [11]. The parse trees in CnC_{n} are complete alternating unary-binary trees. The graph JnJ_{n}^{\prime} is constructed in such a way that the parse trees are now in bijection with complete binary trees. To achieve this, we “shortcut” the ++ gates, while preserving information about whether a subtree came in from the left or the right. For completeness sake we describe the construction of JnJ_{n}^{\prime} from [11].

We obtain a sequence of graphs (Jn)(J_{n}^{\prime}) from the undirected graphs underlying (Cn)(C_{n}) as follows. Retain the multiplication and input gates of CnC_{n}. Let us make two copies of each. For each retained gate, gg, in CnC_{n}; let gLg_{L} and gRg_{R} be the two copies of gg in JnJ^{\prime}_{n}. We now define the edge connections in JnJ^{\prime}_{n}. Assume gg is a ×\times gate retained in JnJ^{\prime}_{n}. Let α\alpha and β\beta\, be two ++ gates feeding into gg in CnC_{n}. Let {α1,,αi}\{\alpha_{1},\ldots,\alpha_{i}\} and {β1,,βj}\{\beta_{1},\ldots,\beta_{j}\} be the gates feeding into α\alpha and β\beta, respectively. Assume without loss of generality that α\alpha and β\beta feed into gg from left and right, respectively. We add the following set of edges to JnJ^{\prime}_{n}: {(α1L,gL),,(αiL,gL)}\{(\alpha_{1L},g_{L}),\ldots,(\alpha_{iL},g_{L})\}, {(β1R,gL),,(βjR,gL)}\{(\beta_{1R},g_{L}),\ldots,(\beta_{jR},g_{L})\}, {(α1L,gR),,(αiL,gR)}\{(\alpha_{1L},g_{R}),\ldots,(\alpha_{iL},g_{R})\} and {(β1R,gR),,(βjR,gR)}\{(\beta_{1R},g_{R}),\ldots,(\beta_{jR},g_{R})\}. We now would like to keep a single copy of CnC_{n} in these set of edges. So we remove the vertex rootRroot_{R} and we remove the remaining spurious edges in following way. If we assume that all edges are directed from root towards leaves, then we keep only edges induced by the vertices reachable from rootLroot_{L} in this directed graph. In [11], it was observed that there is a one-to-one correspondence between parse trees of CnC_{n} and subgraphs of JnJ_{n}^{\prime} that are rooted at rootLroot_{L} and isomorphic to 𝖳2k(n)\mathsf{T}_{2^{k(n)}}.

We now transform JnJ_{n}^{\prime} using the set I={I0,I1,I2}I=\{I_{0},I_{1},I_{2}\}. This is similar to the transformation we did to the balanced binary tree 𝖳m\mathsf{T}_{m}. We replace each vertex by a graph in II; rootLroot_{L} gets I0I_{0} and the rest of the layers get I1I_{1} or I2I_{2} alternately (as in Fig. 1). Edge connections are made so that a left/right child is connected to its parent via the edge (vpj,vi)/(vpj,vri)(v^{j}_{p},v^{i}_{\ell})/(v^{j}_{p},v^{i}_{r}). Finally we replace each edge connection by a path with cmaxc_{\max} vertices on it (as in Fig. 1), to obtain the graph JnJ_{n}. All edges of JnJ_{n} are labeled 1, with the following exceptions: Every input node contains the same rigid graph IiI_{i}. It has a vertex vpiv^{i}_{p}. Each path connection to other nodes has this vertex as its end point. Label such path edges that are incident on vpiv^{i}_{p} by the label of the input gate.

Let m:=2k(n)m:=2^{k(n)}. The choice of 𝗉𝗈𝗅𝗒(m)\mathsf{poly}(m) is such that 4sn𝗉𝗈𝗅𝗒(m)4s_{n}\leqslant\mathsf{poly}(m), where sns_{n} is the size of JnJ_{n}. The Y¯\bar{Y} variables are set to {0,1,x¯}\{0,1,\bar{x}\} such that the non-zero variables pick out the graph JnJ_{n}. From the observations of [11] it follows that for each parse tree pp-𝖳\mathsf{T} of CnC_{n}, there exists a homomorphism ϕ:G2k(n)Jn\phi\colon G_{2^{k(n)}}\to J_{n} such that mon(ϕ){\emph{mon}}(\phi) is exactly equal to mon(p-𝖳){\emph{mon}}(p\mbox{-}\mathsf{T}). By mon(){\emph{mon}}(\cdot) we mean the monomial associated with an object. We claim that these are the only valid homomorphisms from G2k(n)JnG_{2^{k(n)}}\to J_{n}. We observe the following properties of homomorphisms from G2k(n)JnG_{2^{k(n)}}\to J_{n}, from which the claim follows. In the following by a rigid-node-subgraph we mean a graph in {I0,I1,I2}\{I_{0},I_{1},I_{2}\} that replaces a vertex.

  1. (i)(i)

    Any homomorphic image of a rigid-node-subgraph of G2k(n)G_{2^{k(n)}} in JnJ_{n}, cannot split across two mutually incomparable rigid-node-subgraphs in JnJ_{n}. That is, there cannot be two vertices in a rigid subgraph of G2k(n)G_{2^{k(n)}} such that one of them is mapped into a rigid subgraph say n1n_{1}, and the other one is mapped into another rigid subgraph say n2n_{2}. This follows because homomorphisms do not increase distance.

  2. (ii)(ii)

    Because of (i)(i), with each homomorphic image of a rigid node giG2k(n)g_{i}\in G_{2^{k(n)}}, we can associate at most one rigid node of JnJ_{n}, say nin_{i}, such that the homomorphic image of gig_{i} is a subgraph of nin_{i} and the paths (corresponding to incident edges) emanating from it. But such a subgraph has a homomorphism to nin_{i} itself: fold each hanging path into an edge and then map this edge into an edge within nin_{i}. (For instance, let ρ\rho be a path hanging off nin_{i} and attached to nin_{i} at uu, and let vv be any neighbour of uu within nin_{i}. Mapping vertices of ρ\rho to uu and vv alternately preserves all edges and hence is a homomorphism.) Therefore, we note that in such a case we have a homomorphism from ginig_{i}\to n_{i}. By rigidity and mutual incomparability, gig_{i} must be the same as nin_{i}, and this folded-path homomorphism must be the identity map. The other scenario, where we cannot associate any nin_{i} because gig_{i} is mapped entirely within connecting paths, is not possible since it contradicts non-bipartiteness of mutually-incomparable graphs.

Root must be mapped to the root: The rigidity of I0I_{0} and Property (ii)(ii) implies that I0G2k(n)I_{0}\in G_{2^{k(n)}} is mapped identically to I0I_{0} in JnJ_{n}.
Every level must be mapped within the same level: The children of I0I_{0} in G2k(n)G_{2^{k(n)}} are mapped to the children of the root while respecting left-right behaviour. Firstly, the left child cannot be mapped to the root because of incomparability of the graphs I1I_{1} and I0I_{0}. Secondly, the left child cannot be mapped to the right child (or vice versa) even though they are the same graphs, because the minimum distance between the vertex in I0I_{0} where the left path emanates and the right child is cmax+1c_{\max}+1 whereas the distance between the vertex in I0I_{0} where the left path emanates and the left child is cmaxc_{\max}. So some vertex from the left child must be mapped into the path leading to the right child and hence the rest of the left child must be mapped into a proper subgraph of right child. But this contradicts rigidity of I1I_{1}. Continuing like this, we can show that every level must map within the same level and that the mapping within a level is correct. ∎

5.3 𝖵𝖡𝖯\mathsf{VBP}-completeness

Finally, we show that homomorphism polynomials are also rich enough to characterize computation by algebraic branching programs. Here we establish that there exists a pp-family (Gk)(G_{k}) of undirected bounded path-width graphs such that the family (fGk,Hk(Y¯))(f_{G_{k},H_{k}}(\bar{Y})) is 𝖵𝖡𝖯\mathsf{VBP}-complete with respect to pp-projections.

We note that for 𝖵𝖡𝖯\mathsf{VBP}-completeness under projections, the construction in [11] required directed graphs. In the undirected setting they could establish hardness only under linear p-projection, that too using 0-11 valued weights.

As before, we use rigid and mutually incomparable graphs in the construction of GkG_{k}. Let I:={I1,I2}I:=\{I_{1},I_{2}\} be two connected, non-bipartite, rigid and mutually incomparable graphs. Arbitrarily pick vertices uV(I1)u\in V(I_{1}) and vV(I2)v\in V(I_{2}). Let cIi=|V(Ii)|c_{I_{i}}=|V(I_{i})|, and cmax=max{cI1,cI2}c_{max}=\max\{c_{I_{1}},c_{I_{2}}\}. Consider the sequence of graphs Gk (Fig. 2); for every kk, there is a simple path with (k1)+2cmax(k-1)+2c_{max} edges between a copy of I1I_{1} and I2I_{2}. The path is between the vertices uV(I1)u\in V(I_{1}) and vV(I2)v\in V(I_{2}). The path between vertices aa and bb in Gk contains (k1)(k-1) edges.

I1(u)I_{1}(u)aabb(v)I2(v)I_{2}cmaxc_{max} edgesk1k-1 edgescmaxc_{max} edges
Figure 2: The graph Gk.

In other words, connect I1I_{1} and I2I_{2} by stringing together a path with cmaxc_{max} edges between uu and aa, a path with k1k-1 edges between aa and bb, and a path with cmaxc_{max} edges between bb and vv.

Theorem 5.4

Over any field, the family of homomorphism polynomials (fk)(f_{k}), where

  • Gk\textrm{G}_{k} is defined as above (see Fig. 2),

  • HkH_{k} is the undirected complete graph on O(k2)O(k^{2}) vertices,

  • fk(Y¯)=fGk,Hk(Y¯)f_{k}(\bar{Y})=f_{\text{G}_{k},H_{k}}(\bar{Y}),

is complete for 𝖵𝖡𝖯\mathsf{VBP} with respect to pp-projections.

Proof

Membership: It follows from Theorem 5.2.

Hardness: Let (gn)𝖵𝖡𝖯(g_{n})\in\mathsf{VBP}. Without loss of generality, we can assume that gng_{n} is computable by a layered branching program of polynomial size such that the number of layers, \ell, is more than the width of the algebraic branching program.

Let BnB_{n}^{\prime} be the undirected graph underlying the layered branching program AnA_{n} for gng_{n}. Let BnB_{n} be the following graph: I1(u)-(s)Bn(t)-(v)I2I_{1}(u)\relbar(s)B_{n}^{\prime}(t)\relbar(v)I_{2}, that is, uI1u\in I_{1} is connected to sBns\in B_{n}^{\prime} via a path with cmaxc_{max} edges and tBnt\in B_{n}^{\prime} is connected to vI2v\in I_{2} via a path with cmaxc_{max} edges (cf. Fig. 2). The edges in BnB_{n}^{\prime} inherits the weight from AnA_{n}, and the rest of the edges in BnB_{n} have weight 11.

Let us now consider ff_{\ell} when the variables on the edges of HH_{\ell} are instantiated to values in {0,1}\{0,1\} or variables of gng_{n} so that we obtain BB_{\ell} as a subgraph of HH_{\ell}. We claim that a valid homomorphism from GB{}_{\ell}\to B_{\ell} must satisfy the following properties:

  • (P1)

    I1I_{1} in G must be mapped to I1I_{1} in BB_{\ell} using the identity homomorphism,

  • (P2)

    I2I_{2} in G must be mapped to I2I_{2} in BB_{\ell} using the identity homomorphism.

Assuming the claim, it follows that homomorphisms from GB{}_{\ell}\to B_{\ell} are in one-to-one correspondence with ss-tt paths in AnA_{n}. In particular, the vertex aGa\in\text{G}_{\ell} is mapped to the vertex ss in BB_{\ell}, and the vertex bGb\in\text{G}_{\ell} is mapped to the vertex tt in BB_{\ell}. Also, the monomial associated with a homomorphism and its corresponding path are the same. Therefore, we have,

fG,B=gn.f_{\text{G}_{\ell},B_{\ell}}=g_{n}.

Since \ell is polynomially bounded, we obtain 𝖵𝖡𝖯\mathsf{VBP}-completeness of (fk)(f_{k}) over any field.

Let us now prove the claim. We first prove that a valid homomorphism from GB{}_{\ell}\to B_{\ell} must satisfy the property (P1). There are three cases to consider.

  • Case 1: Some vertex of V(I1)V(G)V(I_{1})\subseteq V(G_{\ell}) is mapped to uu in BB_{\ell}. Since homomorphisms cannot increase distances between two vertices, we conclude that V(I1)V(I_{1}) must be mapped within the subgraph I1(u)(a)I_{1}(u)-(a). Suppose further that some vertex on the (u)(a)(u)-(a) path other than uu is also in the homomorphic image of V(I1)V(I_{1}). Some neighbour of uu in V(I1)V(B)V(I_{1})\subseteq V(B_{\ell}), say uu^{\prime}, must also be in the homomorphic image, since otherwise we have a homomorphism from the non-bipartite I1I_{1} to a path, a contradiction. But note that I1(u)(a)I_{1}(u)-(a) has a homomorphism to I1I_{1}: fold the (u)(a)(u)-(a) path onto the edge uuu-u^{\prime} in I1I_{1}. Hence, composing the two homomorphisms we obtain a homomorphism from I1I_{1} to I1I_{1} which is not surjective. This contradicts the rigidity of I1I_{1}. So in fact the homomorphism must map V(I1)V(I_{1}) from GG_{\ell} entirely within I1I_{1} from BB_{\ell}, and by rigidity of I1I_{1}, this must be the identity map.

  • Case 2: Some vertex of V(I1)V(G)V(I_{1})\subseteq V(G_{\ell}) is mapped to vv in BB_{\ell}. Since homomorphisms cannot increase distances between two vertices, we conclude that V(I1)V(I_{1}) must be mapped within the subgraph (b)(v)I2(b)-(v)I_{2}. But note that (b)(v)I2(b)-(v)I_{2} has a homomorphism to I2I_{2} (fold the (b)(v)(b)-(v) path onto any edge incident on vv within I2I_{2}). Hence, composing the two homomorphisms, we obtain a homomorphism from I1I_{1} to I2I_{2}. This is a contradiction, since I1I_{1} and I2I_{2} were incomparable graphs to start with.

  • Case 3: No vertex of V(I1)V(G)V(I_{1})\subseteq V(G_{\ell}) is mapped to uu or vv in BB_{\ell}. Then V(I1)V(G)V(I_{1})\subseteq V(\text{G}_{\ell}) must be mapped entirely within one of the following disjoint regions of BB_{\ell}: (a)(a) I1{u},I_{1}\setminus\{u\}, (b)(b) bipartite graph between vertices uu and v,v, and (c)(c) I2{v}I_{2}\setminus\{v\}. But then we contradict rigidity of I1I_{1} in the first case, non-bipartiteness of I1I_{1} in the second case, and incomparability of I1I_{1} and I2I_{2} in the last.

In a similar way, we could also prove that a valid homomorphism from GB{}_{\ell}\to B_{\ell} must satisfy the property (P2). ∎

In the above proof, we crucially used incomparability of I1I_{1} and I2I_{2} to rule out flipping an undirected path. It turns out that over fields of characteristic not equal to 2, this is not crucial, since we can divide by 2. We show that if the characteristic of the underlying field is not equal to 2, then the sequence (Gk)(G_{k}) in the preceding theorem can be replaced by a sequence of simple undirected cycles of appropriate length. In particular, we establish the following result.

Theorem 5.5

Over fields of char 2\neq 2, the family of homomorphism polynomials (fk)(f_{k}), fk=fGk,Hk,f_{k}=f_{G_{k},H_{k}}, where

  • GkG_{k} is a simple undirected cycle of length 2k+12k+1 and,

  • HkH_{k} is an undirected complete graph on (2k+1)2(2k+1)^{2} vertices,

is complete for 𝖵𝖡𝖯\mathsf{VBP} under pp-projections.

Proof

Membership: As before, it follows from Theorem 5.2.

Hardness: Let (gn)𝖵𝖡𝖯(g_{n})\in\mathsf{VBP}. Without loss of generality, we can assume that gng_{n} is computable by a layered branching program of polynomial size satisfying the following properties:

  • The number of layers, 3\ell\geqslant 3, is odd; say =2m+1\ell=2m+1. So every path from ss to tt in the branching program has exactly 2m2m edges.

  • The number of layers, is more than the width of the algebraic branching program,

Let us consider fmf_{m} when the variables on the edges of HmH_{m} have been set to 0, 1, or variables of gng_{n} so that we obtain the undirected graph underlying the layered branching program AnA_{n} for gng_{n} as a subgraph of HmH_{m}. Now change the weight of the (s,t)(s,t) edge from 0 to weight yy, where yy is a new variable distinct from all the other variables of gng_{n}. Call this modified graph BmB_{m}. Note that without the new edge, BmB_{m} would be bipartite.

Let us understand the homomorphisms from GmG_{m} to BmB_{m}. Homomorphisms from a simple cycle CC to a graph 𝒢\mathcal{G} are in one-to-one correspondence with closed walks of the same length in 𝒢\mathcal{G}. Moreover, if the cycle CC is of odd length, the closed walk must contain a simple odd cycle of at most the same length. Therefore, the only valid homomorphism from GmG_{m} to BmB_{m} are walks of length =2m+1\ell=2m+1, and they all contain the edge (s,t)(s,t) with weight yy. But the cycles of length \ell in BmB_{m} are in one-to-one correspondence with ss-tt paths in AnA_{n}. Each cycle contributes 22\ell walks: we can start the walk at any of the \ell vertices, and we can follow the directions from AnA_{n} or go against those directions. Thus we have,

fGm,Bm=(2(2m+1))ygn=(2)ygn.f_{G_{m},B_{m}}=(2(2m+1))\cdot y\cdot g_{n}=(2\ell)\cdot y\cdot g_{n}.

Let pp be the characteristic of the underlying field. If p=0p=0, we substitute y=(2)1y=(2\ell)^{-1} to obtain gng_{n}. If p>2p>2, then 22\ell has an inverse if and only if \ell has an inverse. Since 3\ell\geqslant 3 is an odd number, either pp does not divide \ell or it does not divide +2\ell+2. Hence, at least one of \ell, +2\ell+2 has an inverse. Thus gng_{n} is a projection of fmf_{m} or fm+1f_{m+1} depending on whether \ell or +2\ell+2 has an inverse in characteristic pp.

Since =2m+1\ell=2m+1 is polynomially bounded in nn, we therefore show (fk)(f_{k}) is 𝖵𝖡𝖯\mathsf{VBP}-complete with respect to pp-projections over any field of characteristic not equal to 2. ∎

6 Conclusion

In this paper, we have shown that over finite fields, five families of polynomials are intermediate in complexity between 𝖵𝖯\mathsf{VP} and 𝖵𝖭𝖯\mathsf{VNP}, assuming the PH does not collapse. Over rationals and reals, we have established that two of these families are provably not monotone pp-projections of the permanent polynomials. Finally, we have obtained a natural family of polynomials, defined via graph homomorphisms, that is complete for 𝖵𝖯\mathsf{VP} with respect to projections; this is the first family defined independent of circuits and with such hardness. An analogous family is also shown to be complete for 𝖵𝖡𝖯\mathsf{VBP}.

Several interesting questions remain.

The definitions of our intermediate polynomials use the size qq of the field 𝔽q\mathbb{F}_{q}, not just the characteristic pp. Can we find families of polynomials with integer coefficients, that are 𝖵𝖭𝖯\mathsf{VNP}-intermediate (under some natural complexity assumption of course) over all fields of characteristic pp? Even more ambitiously, can we find families of polynomials with integer coefficients, that are 𝖵𝖭𝖯\mathsf{VNP}-intermediate over all fields with non-zero characteristic? at least over all finite fields? over fields 𝔽p\mathbb{F}_{p} for all (or even for infinitely many) primes pp?

Equally interestingly, can we find an explicit family of polynomials that is 𝖵𝖭𝖯\mathsf{VNP}-intermediate in characteristic zero?

A related question is whether there are any polynomials defined over the integers, that are 𝖵𝖭𝖯\mathsf{VNP}-intermediate over 𝔽q\mathbb{F}_{q} (for some fixed qq) but that are monotone pp-projections of the permanent.

Can we show that the remaining intermediate polynomials are also not polynomial-sized monotone projections of the permanent? Do such results have any interesting consequences, say, improved circuit lower bounds?

References

  • [1] Noga Alon and Ravi B. Boppana. The monotone circuit complexity of Boolean functions. Combinatorica, 7(1):1–22, 1987.
  • [2] David Avis and Hans Raj Tiwary. On the extension complexity of combinatorial polytopes. In Automata, Languages, and Programming - 40th International Colloquium, ICALP Part I, pages 57–68, 2013.
  • [3] Walter Baur and Volker Strassen. The complexity of partial derivatives. Theoretical Computer Science, 22(3):317 – 330, 1983.
  • [4] P. Bürgisser. Completeness and Reduction in Algebraic Complexity Theory, volume 7 of Algorithms and Computation in Mathematics. Springer, 2000.
  • [5] Peter Bürgisser. On the structure of Valiant’s complexity classes. Discrete Mathematics & Theoretical Computer Science, 3(3):73–94, 1999.
  • [6] Peter Bürgisser. Cook’s versus Valiant’s hypothesis. Theoretical Computer Science, 235(1):71–88, 2000.
  • [7] Florent Capelli, Arnaud Durand, and Stefan Mengel. The arithmetic complexity of tensor contractions. In Symposium on Theoretical Aspects of Computer Science STACS, volume 20 of LIPIcs, pages 365–376, 2013.
  • [8] Marek Cygan, Fedor V. Fomin, Lukasz Kowalik, Daniel Lokshtanov, Dániel Marx, Marcin Pilipczuk, Michal Pilipczuk, and Saket Saurabh. Parameterized Algorithms. Springer, 2015.
  • [9] Nicolas de Rugy-Altherre. A dichotomy theorem for homomorphism polynomials. In Mathematical Foundations of Computer Science 2012, volume 7464 of LNCS, pages 308–322. Springer Berlin Heidelberg, 2012.
  • [10] Josep Díaz, Maria J. Serna, and Dimitrios M. Thilikos. Counting h-colorings of partial k-trees. Theoretical Computer Science, 281(1-2):291–309, 2002.
  • [11] Arnaud Durand, Meena Mahajan, Guillaume Malod, Nicolas de Rugy-Altherre, and Nitin Saurabh. Homomorphism polynomials complete for VP. In 34th Foundation of Software Technology and Theoretical Computer Science Conference, FSTTCS, pages 493–504, 2014.
  • [12] Jack Edmonds. Paths, trees, and flowers. Canadian Journal of Mathematics, 17:449–467, 1965.
  • [13] Samuel Fiorini, Serge Massar, Sebastian Pokutta, Hans Raj Tiwary, and Ronald de Wolf. Exponential lower bounds for polytopes in combinatorial optimization. J. ACM, 62(2):17, 2015.
  • [14] M. R. Garey and David S. Johnson. Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman, 1979.
  • [15] Joshua A. Grochow. Monotone projection lower bounds from extended formulation lower bounds. arXiv:1510.08417 [cs.CC], 2015.
  • [16] Pavol Hell and Jaroslav Nešetřil. Graphs and homomorphisms. Oxford lecture series in mathematics and its applications. Oxford University Press, 2004.
  • [17] Mark Jerrum and Marc Snir. Some exact complexity results for straight-line computations over semirings. J. ACM, 29(3):874–897, 1982.
  • [18] Stasys Jukna. Why is Hamilton Cycle so different from Permanent? http://cstheory.stackexchange.com/questions/27496/why-is-hamiltonian-cycle-so-different-from-permanent, 2014.
  • [19] Richard M Karp and Richard Lipton. Turing machines that take advice. L’enseignement mathématique, 28(2):191–209, 1982.
  • [20] Richard E. Ladner. On the structure of polynomial time reducibility. J. ACM, 22(1):155–171, 1975.
  • [21] Guillaume Malod and Natacha Portier. Characterizing Valiant’s algebraic complexity classes. Journal of Complexity, 24(1):16–38, 2008.
  • [22] Stefan Mengel. Characterizing arithmetic circuit classes by constraint satisfaction problems. In Automata, Languages and Programming, volume 6755 of LNCS, pages 700–711. Springer Berlin Heidelberg, 2011.
  • [23] Ran Raz. Elusive functions and lower bounds for arithmetic circuits. Theory of Computing, 6:135–177, 2010.
  • [24] A. A. Razborov. Lower bounds on the monotone complexity of some Boolean functions. Dokl. Akad. Nauk SSSR, 281(4):798–801, 1985.
  • [25] A.A. Razborov. Lower bounds on monotone complexity of the logical permanent. Mathematical notes of the Academy of Sciences of the USSR, 37(6):485–493, 1985.
  • [26] Thomas Rothvoß. The matching polytope has exponential extension complexity. In Symposium on Theory of Computing, STOC 2014, New York, NY, USA, May 31 - June 03, 2014, pages 263–272, 2014.
  • [27] Janos Simon. On the difference between one and many (preliminary version). In Automata, Languages and Programming, Fourth Colloquium, University of Turku, Finland, July 18-22, 1977, Proceedings, pages 480–491, 1977.
  • [28] Leslie G. Valiant. Completeness classes in algebra. In Symposium on Theory of Computing STOC, pages 249–261, 1979.
  • [29] Leslie G. Valiant, Sven Skyum, S. Berkowitz, and Charles Rackoff. Fast parallel computation of polynomials using few processors. SIAM Journal on Computing, 12(4):641–644, 1983.