Random arithmetic formulas can be reconstructed efficiently

Ankit Gupta*, Neeraj Kayal, Youming Qiao

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

Informally stated, we present here a randomized algorithm that given black-box access to the polynomial f computed by an unknown/hidden arithmetic formula φ reconstructs, on the average, an equivalent or smaller formula φ̌ in time polynomial in the size of its output φ̌. Specifically, we consider arithmetic formulas wherein the underlying tree is a complete binary tree, the leaf nodes are labeled by affine forms (i.e., degree one polynomials) over the input variables and where the internal nodes consist of alternating layers of addition and multiplication gates. We call these alternating normal form (ANF) formulas. If a polynomial f can be computed by an arithmetic formula μ of size s, it can also be computed by an ANF formula φ, possibly of slightly larger size s O(1). Our algorithm gets as input black-box access to the output polynomial f (i.e., for any point x in the domain, it can query the black box and obtain f(x) in one step) of a random ANF formula φ of size s (wherein the coefficients of the affine forms in the leaf nodes of φ are chosen independently and uniformly at random from a large enough subset of the underlying field). With high probability (over the choice of coefficients in the leaf nodes), the algorithm efficiently (i.e., in time s O(1)) computes an ANF formula φ̌ of size s computing f. This then is the strongest model of arithmetic computation for which a reconstruction algorithm is presently known, albeit efficient in a distributional sense rather than in the worst case.

Original languageEnglish
Pages (from-to)207-303
Number of pages97
JournalComputational Complexity
Volume23
Issue number2
DOIs
StatePublished - May 2014
Externally publishedYes

Keywords

  • Arithmetic formulas
  • average case
  • reconstruction

Fingerprint

Dive into the research topics of 'Random arithmetic formulas can be reconstructed efficiently'. Together they form a unique fingerprint.

Cite this