Holant* Dichotomy on Domain Size 3:
A Geometric Perspective
Abstract
Holant problems are a general framework to study the computational complexity of counting problems. It is a more expressive framework than counting constraint satisfaction problems (CSP) which are in turn more expressive than counting graph homomorphisms (GH). In this paper, we prove the first complexity dichotomy of where is an arbitrary set of symmetric, real valued constraint functions on domain size . We give an explicit tractability criterion and prove that, if satisfies this criterion then is polynomial time computable, and otherwise it is #-hard, with no intermediate cases. We show that the geometry of the tensor decomposition of the constraint functions plays a central role in the formulation as well as the structural internal logic of the dichotomy.
Keywords and phrases:
Holant problem, Complexity dichotomy, Higher domainCategory:
Track B: Automata, Logic, Semantics, and Theory of ProgrammingCopyright and License:
![[Uncaptioned image]](x1.png)
2012 ACM Subject Classification:
Theory of computation Complexity theory and logicAcknowledgements:
We sincerely thank the reviewers for their thoughtful and thorough feedback.Editors:
Keren Censor-Hillel, Fabrizio Grandoni, Joël Ouaknine, and Gabriele PuppisSeries and Publisher:

1 Introduction
Holant problems were introduced in [14] as a broad framework to study the computational complexity of counting problems. Counting CSP is a special case of Holant problems [18, 4, 3, 19, 13, 21, 8, 5]. In turn, counting CSP includes counting graph homomorphisms (GH), introduced by Lovász [26, 24], which is a special case with a single binary constraint function. Typical Holant problems include counting all matchings, counting perfect matchings #PM (including all weighted versions), counting cycle covers, counting edge colorings, and many other natural problems. It is strictly more expressive than GH; for example, it is known that #PM cannot be expressed in the framework of GH [22, 9].
The complexity classification program of counting problems is to classify as broad a class of problems as possible according to their inherent computational complexity within these frameworks. Let be a set of (real or complex valued) constraint functions defined on some domain set . It defines a Holant problem as follows. An input consists of a graph , where each has an associated , with incident edges to labeled as input variables of . The output is the sum of products of evaluations of the constraint functions over all assignments over for the variables. The goal of the complexity classification of Holant problems is to classify the complexity of . A complexity dichotomy theorem for counting problems classifies every problem in a broad class of problems to be either polynomial time solvable or #-hard.
There has been tremendous progress in the classification of counting GH and counting CSP [18, 19, 13, 3, 21, 8, 5, 20, 1, 23, 7]. Much progress was also made in the classification of Holant problems, particularly on the Boolean domain (), i.e., when variables take 0-1 values (but constraint functions take arbitrary values, such as partition functions from statistical physics). This includes the dichotomy for all complex-valued symmetric constraint functions [10] and for all real-valued not necessarily symmetric constraint functions [27]. On the other hand, obtaining higher domain Holant dichotomy has been far more challenging. There is a huge increase in difficulty in proving dichotomy theorems for domain size , as already seen in decision CSP of domain size , a major achievement by Bulatov [2]. Toward proving these dichotomies one often first considers restricted classes of Holant problems assuming some particular set of constraint functions are present. Two sets stand out: (1) the set of equality functions of all arities (this is the class of all counting CSP problems) and (2) the set of all unary functions , i.e., functions of arity one. Indeed, #CSP(; i.e., counting CSP are the special case of Holant problems with assumed to be present. In this paper we study (2): , for an arbitrary set of symmetric real-valued constraint functions on domain size 3.
Previously there were only two significant Holant dichotomies on higher domains. One is for a single ternary constraint function that has a strong symmetry property called domain permutation invariance [11]. That work also solves a decades-old open problem of the complexity of counting edge colorings. The other is a dichotomy for where is a single symmetric complex-valued ternary constraint function on domain size 3 [15]. Extending this dichotomy to an arbitrary constraint function, or more ambitiously, to a set of constraint functions has been a goal for more than 10 years without much progress.
In this paper, we extend the result in [15] to an arbitrary set of real-valued symmetric constraint functions. In [25] an interesting observation was made that an exceptional form of complex-valued tractable constraint functions does not occur when the function is real-valued. By restricting ourselves to a set of real-valued constraint functions, we can bypass a lot of difficulty associated with this exceptional form. Another major source of intricacy is related to the interaction of binary constraint functions with other constraint functions in . We introduce a new geometric perspective that provides a unifying principle in the formulation as well as a structural internal logic of what leads to tractability and what leads to #-hardness. After discovering some new tractable classes of functions aided by the geometric perspective, we are able to prove a dichotomy. This dichotomy is dictated by the geometry of the tensor decomposition of constraint functions.
Suppose is a binary constraint function and is a tenary constraint function, with its tensor decomposition. One of the simplest constructions possible with and is to connect at the three edges of ; the resulting constraint function is which has tensor decomposition . We see that this gadget construction plays nicely with the tensor decomposition. Generalizing this idea, suppose is a set of binary constraint functions and is a set of ternary constraint functions. Let be the monoid generated by . We may consider the orbit of under the monoid action of , such that acts on by . Although the constraint functions in are the results of a very simple gadget construction, we show that contains sufficient information about the interaction of binary constraint functions and other constraint functions, and the simplicity allows us to analyze it by considering the geometry of the vectors of the tensor decomposition of the constraint functions in .
Compared to the Boolean domain dichotomy theorem, stated in explicit recurrences on the values of the signatures (see Theorem 2.12 in [6]) the dichotomy theorem (Theorem 3.1) we wish to prove has a more non-explicit form, which is also more conceptual. This is informed by the geometric perspective, but it also causes some difficulty in its proof, when we try to extend to a set of constraint functions of arbitrary arities. We introduce a new technique to overcome this difficulty. First (and this is quite a surprise), it turns out that a dichotomy of two constraint functions of arity is easier to state and prove than the dichotomy of one binary and one ternary constraint functions. Also they can be proven independently of each other. This is a departure from all previous proofs of dichotomy theorems in this area. Second, using the unary constraint functions available in , any symmetric constraint function of arity defines a linear transformation from to the space of symmetric constraint functions of arity , which corresponds to the ternary constraint functions constructible by connecting a unary function to . In particular, the image of this map, , is a linear subspace. In particular, the image of this map is a linear subspace. Considering the space instead of specific sub-functions allows us to bypass the difficulty from the non-explicit form of the dichotomy statement, which is in terms of tensor decompositions up to an orthogonal transformation. We show that a dichotomy of two ternary constraint functions and the fact that is closed under linear combinations imply that must be of a very special form for to be tractable, which in turn implies that must possess a certain regularity.
While the tractability criterion in Theorem 3.1 is stated in a conceptual and succinct way, the tractable cases are actually quite rich and varied. We present here specific examples of new tractable cases. Denote the domain by . We use the notation in Figure 1 to denote a symmetric ternary constraint function on domain .
Consider the four constraint functions in Figure 2.
It is not obvious that is polynomial-time computable.
We apply the orthogonal transform which transforms and to be supported on respectively, Their tensor decompositions have a revealing structure. Ignoring the scalar constants, we have111We use to denote the imaginary unit. Complex numbers do appear, even though the signatures are all real valued. This is similar to eigenvalues.
The vectors in tensor decompositions show that geometrically, , , and are associated with three coordinate planes. The function written in matrix form is , where the entry is the function value , for in the new domain set. Applying Theorem 3.1 we can conclude that is in tractable class .
For the second example we apply the orthogonal transform to the constraint functions in Figure 3.
and and can be written in matrix form and respectively, up to scalar constants. Applying Theorem 3.1 we can conclude that is in tractable class .
Our new algorithm also solves some natural problems. Consider the following problem. For , , and any , let be the function
Let for distinct be the function
Let There is a related constraint satisfaction decision problem, where
and we ask if an signature grid has a nonzero assignment. It is not even immediately obvious whether this decision problem is solvable in polynomial time. Theorem 3.1 tells us that is in class and thus is computable in polynomial time, which implies that the decision problem is also solvable in polynomial time.
2 Preliminaries
2.1 Definitions
Let be a finite domain set, and be a set of constraint functions, also called signatures. Each is a mapping from for some arity . If the image of is contained in , we say is real-valued.
A signature grid consists of a graph where each vertex is labeled by a function and is the labeling. The arity of must match the degree of . The Holant problem on instance is to evaluate
(1) |
where the sum is over all edge assignments and is the edges adjacent to , and is the evaluation of on the ordered input tuple .
A signature is listed by its values lexicographically as a table, or it can be expressed as a tensor in . We can identify a unary function with a vector . Given two vectors and of dimension , the tensor product is a vector in , with entries for . For matrices and the tensor product (or Kronecker product) is defined similarly; it has entries indexed by lexicographically. We write for with copies of . is similarly defined.
A signature of arity is degenerate if for some vectors . Such a signature is very weak; there is no interaction between the variables. If every signature in is degenerate, then for any is computable in polynomial time in a trivial way: Simply split every vertex into vertices each assigned a unary and connected to the incident edge. Then becomes a product over each component of a single edge. Thus degenerate signatures are weak and should be properly understood as made up by unary signatures. To concentrate on the essential features that differentiates tractability from intractability, was introduced in [13, 14]. These are the problems where all unary signatures are assumed to be present, i.e. where is the set of all unary signatures. We note that for real valued the complexity of is unchanged whether we use real valued or complex valued [25](Lemma 9), and hence in this paper we use real valued . In the proof of #-hardness, we freely use complex valued unary functions and apply the known dichotomy theorems that may use complex valued unary functions.
2.2 Holographic Transformation
To describe the idea of holographic transformations, it is convenient to consider bipartite graphs. For a general graph, we can always transform it into a bipartite graph while preserving the Holant value, as follows: for each edge in the graph, we replace it by a path of length , and assign to the new vertex the binary Equality function .
We use the notation to denote the Holant problem on bipartite graphs , where each signature for a vertex in or is from or , respectively. An input instance for the bipartite Holant problem is a bipartite signature grid and is denoted as . Signatures in are considered as row vectors (or covariant tensors); signatures in are considered as column vectors (or contravariant tensors).
For a matrix and a signature set , define
and similarly for . Whenever we write or , we view the signatures as column vectors; similarly or as row vectors. A holographic transformation by is the following operation: given a signature grid , for the same graph , we get a new grid by replacing each signature in or with the corresponding signature in or .
Theorem 2.1 (Valiant’s Holant Theorem [28]).
If there is a holographic transformation mapping signature grid to , then .
Therefore, an invertible holographic transformation does not change the complexity of the Holant problem in the bipartite setting. Furthermore, if is orthogonal, then , so it preserves binary equality. This means that an orthogonal holographic transformation can be used freely in the standard setting.
Corollary 2.2.
Suppose is an orthogonal matrix, , and let be a signature grid. Under a holographic transformation by , we get a new signature grid and .
2.3 Notation
For two nonzero vectors , we write to denote projective equality, i.e. for some nonzero . Throughout this paper, the symbol for denotes the dot product, i.e. . We say are orthogonal if
A signature of arity is symmetric if for all , the symmetric group. In this paper, if not further specified, a signature is assumed to be real-valued, symmetric, and on domain . We consider a signature and its nonzero multiple as the same signature, since replacing by only introduces a easily computable global factor in the Holant value.
A symmetric signature on Boolean variables can be expressed as where is the value of on inputs of Hamming weight . In this paper, we focus on signatures on domain size , and we use the symbols to denote the domain elements. A binary signature (not necessarily symmetric) can be expressed as a matrix , where the entry is the value of . For the ease of notation, we use the term matrix and binary signature interchangeably, and use to refer to both a signature and its matrix . To fix an ordering, binary signature on domain is expressed as . If is a symmetric signature, then is a symmetric matrix.
Let be a binary signature and be a symmetric signature of arity . We use to denote the gadget constructed by attaching a at the edges of . If is written in a tensor form, i.e. for we can easily check that . Another gadget construction is connecting a unary signature. Let and be a symmetric signature on domain of arity . Then, is the arity gadget obtained by connecting to any edge of . Since is symmetric, the choice of the edge does not matter.
We use to denote the Holant problem on Boolean domain , and to denote the Holant problem on domain . We say two sets of signatures and are compatible if is tractable.
For a domain signature, we use the symbol to denote the Boolean domain signature obtained by restricting the inputs of to be from and identifying and with and respectively. For a set of signatures , .
Let be a domain signature. We define to be the set of inputs for which is nonzero. We say is an EBD signature (a signature defined essentially on a Boolean domain) if for some . We say is domain separated to and , written is , if . In other words, is zero on inputs that take values from both and . It is possible that , in which case for some . We call such a GenEQ signature. We similarly define domain separation to and and write for any distinct . We refer to a matrix as if it can be viewed as a binary signature. For example, is a matrix.
Denote by the set of all functions such that if has arity , then for such that for all , are all distinct. We think of as a generalized form of GenEQ function to not necessarily symmetric functions.
We use to denote the set of matrices such that the first two columns are linearly dependent and also the first two rows are linearly dependent. We can easily check that is closed under multiplication. If is a matrix, we can see that .
We use to denote the symmetry group of an octahedron. As a subgroup of the real orthogonal group , consists of the matrices , , , , , for .
We call a signature/matrix of the form for some a signature/matrix. The intuition is that a signature of this form swaps the domains and . Similarly, we call as and as .
Let be the set of complex-valued arity- signature over a domain of size . The rank of is defined as . Several properties of symmetric rank are shown in [17]: rank is well defined and for linearly independent . One can also easily show that the tensor decomposition into linearly independent vectors is unique up to scaling and reordering.
2.4 Known Dichotomy Theorems
An explicit dichotomy for a set of symmetric Boolean domain signatures is known [6] (see Appendix A for the statement). The following dichotomy for a single singature of domain is our starting point.
Theorem 2.3 (Theorem 2 in [25]).
Let be a real-valued symmetric ternary function over domain . Then, is computable in polynomial time if there exists a real orthogonal matrix such that one of the following conditions holds. Otherwise, it is #-hard.
- .
-
for some .
- .
-
where , and for some and .
3 Statement of the Dichotomy Theorem
Let be a set of nondegenerate, real-valued, symmetric signatures over domain .
Theorem 3.1.
is computable in polynomial time if there exists a real orthogonal , such that one of the following conditions holds. In all other cases, is #-hard.
- .
-
Every signature in has arity .
- .
-
.
- .
-
-
For all of arity , , and
-
For all binary , either or is , and
-
is tractable.
-
- .
-
-
For all of arity , is , and
-
For all binary , either is or is , and
-
is tractable.
-
- .
-
Let . Let .
-
, and , where is the monoid generated by , and
-
For all , is tractable, and
-
For all , is tractable.
-
In classes , , and , we refer to the tractability. By the Boolean domain dichotomy, it is necessary that those problems are tractable.
In case (b) of class , it seems like we may need to use the asymmetric dichotomy (which is known [16]), because while the signatures in are symmetric, may contain asymmetric signatures. We claim that is not necessary. Let . If is nondegenerate and asymmetric, then . We can deduce that is universally compatible, i.e., when appended to any tractable class results in a tractable set, without referring to any asymmetric dichotomy. For type (see Definitions A.1 and A.2), we see that . The first matrix in the symmetric signature notation is , which satisfies the recurrence . The second matrix in the symmetric signature notation is , which is the other specified form. For type , we see that , and and are type .
This is not a coincidence. We may view the dichotomy in a geometric way. Consider the tractable type . There are two norm orthogonal vectors such that any signature of arity of type is of the form . We may represent type signatures of arity by two orthogonal lines in the plane. Consider the gadget construction of connecting a binary signature to all of the edges of a signature. In the tensor decomposition form, we have . For the binary signatures, we can check that the tractable signatures correspond to the linear transformations that fix the union of the two orthogonal lines as a set. This is easily verified for the case of type , when and , since signature corresponds to scaling and , while signature corresponds to reflection along line, and similarly for other type . The asymmetric signature above is a rotation, which fixes any pair of orthogonal lines, so it is tractable with all types.
The tractable type may be viewed as a circle in the plane. The justification is that any type signature can be written as for two orthogonal of the same norm, and all such signatures can be constructed from one type signature. The set of linear transformations that fix the circle is the orthogonal group . We see that up to a scalar factor, the signature corresponds to a reflection matrix and the signature to the identity. Since any rotation can be written as a product of two reflections, they are also compatible with type signatures.
A similar analogy can be made for domain signatures as well, since the tensor decomposition forms in Theorem 2.3 are also about orthogonality of the vectors. Similar to the Boolean domain tractable signatures, a tractable domain signature also can be represented as a set of vectors in the three dimensional space. For instance, let , and , be three signatures. The idea is depicted in Figure 4, and this intuition is formalized in Lemma 5.3. Class says that the signatures of arity or higher must live in some plane, and we can assume it is the -plane after an orthogonal transformation. The compatible binary signatures are those fixing the -plane () or a degenerate transformation on the -plane. The class says that the signatures of arity or higher are formed by the -plane and the -axis. The compatible binary signatures, after the same orthogonal transformation, are those fixing the -plane and -axis line () or mapping between the -plane and the -axis (). The class says that the signatures of arity or higher must live in one of -plane, -plane, or -plane. The compatible binary signatures are those permuting the three planes without stretching. Such transformations are precisely the group .
4 Tractability
In this section, we prove tractability by giving a polynomial time algorithm for each of the classes in Theorem 3.1. By Corollary 2.2, is tractable if and only if is tractable. Also, we may always assume that the given signature grid is connected, as the Holant value of any signature grid is the product over connected components.
Classes and are tractable by standard arguments. If every signature in has arity (class ), then, the graph of the signature grid is a disjoint union of paths and cycles. By matrix multiplication, we can compute the Holant value for a path. The Holant value for a cycle is obtained by taking the trace of a path.
Suppose for an orthogonal (class ). Let be a signature grid and any edge. For any assignment to , the assignment must propagate uniquely to all edges, which implies that there are at most three assignments to the whole grid that can result in a nonzero Holant value.
4.1 Class
Suppose satisfies the conditions of by an orthogonal . Let be a connected signature grid over . We may assume is not in Class . If a unary signature is connected to another unary signature then this is the entire and we are done. If a unary signature is connected to a binary signature then they become another unary constraint which we can compute its signature. So, by induction, we can assume any unary remaining is connected to some signature of arity , which has , and thus we can replace the unary restricted to . If there is a chain of binary signatures , we replace it by a single binary signature by taking the matrix product. If all are , then is also . In addition, the matrix of is equal to the product of the matrices of . If there is some such that , then as well, since is closed under multiplication and also closed under left or right multiplication by a matrix. Note that if , then is degenerate. Now since any binary remaining can only be connected to signatures of arity with , we can replace by . Thus we obtain an equivalent signature grid as a instance on domain . Then condition 3. implies that the Holant value of can be computed in polynomial time.
4.2 Class
Suppose satisfies the conditions of by an orthogonal , and let be a connected signature grid. If does not use any binary signature of , then all signatures are . Then, if any edge gets assigned or , all other edges must also be assigned or for the assignment to result in a nonzero value. Similarly, any assignment of to an edge must propagate as to all other edges for the assignment to result in a nonzero value. Therefore, the Holant value is sum of all assignments taking values in and an assignment that only assigns . The first sum can be computed in polynomial since is tractable, and the second value is computable in polynomial time.
Now, suppose contains signatures. First, note that a product of two signatures is signature that is degenerate on : . Hence, we may reduce any chain of signatures of length by matrix multiplication to a single if is even and a length chain if is odd, where is a signature that is degenerate on . In particular, is compatible with . Therefore, we may assume that we have a signature grid such that any signature is connected to two signatures. Now, suppose we gather each connected component of signatures as a cluster, so that the connections between clusters are by signatures. If we imagine a graph with vertices being the clusters and edges being the signatures, then this graph must be bipartite. Otherwise, suppose there is an odd cycle of clusters . In any nonzero assignment, each cluster can take only values from or . If gets , then must have because of the connection. Therefore, if there is an odd cycle, will have an incoming , resulting in a zero evaluation. Similar argument shows that an assignment of to evaluates to zero.
Let the bipartition be . There are only two types of nonzero assignments: (1) all clusters in get and all clusters in get ; (2) all clusters in get and all clusters in get . For both types of assignments, the signatures connecting a cluster and factors into two degenerate signatures. In particular, suppose is a signature connecting and . Let be obtained from by removing and connecting the unary to and to , as described in Figure 5. Then, since only takes values in and only takes values in , the sum of type (1) assignments is the same as the Holant value of .
Therefore, to evaluate the sum of type (1) assignments, we may factor all the signatures in this way, evaluate in domain on and assign to all of , and multiply the two resulting values. Both can be done in polynomial time since is assumed to be tractable. Similarly, we may compute the contribution of type (2) assignments, and the Holant value is just the sum of those two values.
4.3 Class
Suppose satisfies the conditions of by an orthogonal . Let be a signature grid. If does not use any signature from , then all signatures in are EBD. Then, whenever there is an edge between two signatures with different support, the edge factors as pinning. For example, if there is an edge between a signature and , we may remove the edge and connect the unary to both and . This is because can only take value in any nonzero assignment. Also, if there is a connection between any unary signature and a EBD signature supported on , then we may replace with . We obtain a new signature grid after factoring all such edges, and each of the connected components of is an instance of for some . By assumption, the Holant value of each of the connected components can be computed in polynomial time.
Now, suppose contains signatures from . We may replace those signatures by the corresponding scalar multiple in . By the above, we may assume that in , there is no edge between EBD signatures of different supports. First, we reduce any chain of signatures into a single binary signature in . Reducing any connection of signature with a unary signature to a unary, we obtain a new grid in which any signature is between two signatures from and . We imagine is composed of clusters where each cluster is a connected component of signatures for some , and each cluster has outgoing edges of signatures.
Suppose is a self loop on a cluster . As its two end points are from and all signatures in are EBD on the same , we may replace with which is compatible with signatures in by assumption, so we may absorb it into .
Suppose connects two clusters and with supports and respectively. Suppose and are the signatures in and connected by . Let the arity of be . We replace all the edges of , except the one connecting to , with . Clearly, the Holant value is unchanged. The process is described in Figure 6 for arity case. We now have connected directly to . If , the edge factors in to pinning. Otherwise, by the assumption, is compatible with , so we may absorb it into the cluster.
We choose a cluster to begin with, and repeatedly absorb its neighboring signatures or factor the edge into pinning by the above process. Each step of the above process can be done in polynomial time, and the number of steps required is at most the number of edges in . In the end, we will be left with multiple connected components in which all the signatures are EBD supported on the same domain, and their values can be computed in polynomial time by the assumption.
5 Outline of Hardness
After a dichotomy of a single ternary signature [15], a natural next step is proving a dichotomy of a pair of ternary and binary signatures (as binary signatures are the “simplest” signatures after unary signatures), and use it to prove further theorems. However, for domain size 3 in the Holant setting, binary signatures actually allow nontrivial, and somewhat unanticipated, interactions with other signatures. Also, it turns out that a dichotomy for a pair of binary and ternary signatures, while certainly needed on its own, is not easily applicable for showing further dichotomies. We circumvent this difficulty by proving a dichotomy of a pair of ternary signatures directly.
We describe the logical dependency of our proof in Figure 7. We start with the known dichotomy, Theorem 2.3, of a single ternary signature. We use it to show the dichotomy of a pair of ternary and binary signatures and a pair of ternary signatures. These two proofs can be found in the full version [12] and we note that they are independent of each other. To arrive at a dichotomy of a set of signatures, we also need to show a dichotomy for any single signature of arbitrary arity , which we show in Section 6. The remaining proof leading to a dichotomy of a set of signatures can be found in the full version [12].
The main intuition behind the proof of hardness is the geometry of the vectors in a tensor decomposition of a signature.
We always start with a canonical form of a signature (after a suitable orthogonal transformation), for example, . can realize and take domain restriction to . If the other signature is for orthogonal , the domain restriction is . Essentially, most of the arguments boil down to showing that the angle between and must be (with one exception), otherwise, is #-hard by the Boolean domain dichotomy. The other tractable possibility is when , which can only happen if the plane that contains and contains the -axis, which corresponds to the case when is degenerate.
Using this idea, we can prove the dichotomy of in which are ternary signatures. The individual statements can be found in the full version [12]. We can see that the statements are more complex when signatures are of rank . We define a notion of a plane of a rank signature, which formalizes the idea behind Figure 4 and allows us to express the dichotomy succinctly. A rank 2 signature of type or type of Theorem 2.3 has a symmetric tensor decomposition such that the two vectors occurring inside it are orthogonal, i.e. or . The two vectors are unique up to a scalar, so the plane of a signature , denoted by , is well defined.
Definition 5.1.
Let be a rank signature over domain of type or type . If is type , we may write . If is type , we may write . We define the plane of as .
Note that is EBD if and only if is one of the coordinate planes, i.e. -plane, -plane or -plane. We will say that two planes are orthogonal if their normal vectors are orthogonal. This notion is well defined because a normal vector to a plane in dimensional space is unique up to a scalar. The following proposition can be shown with elementary linear algebra.
Proposition 5.2.
Let be a set of rank signatures of type or type . The following two statements are equivalent:
-
1.
For any orthogonal , there is some signature that is not EBD.
-
2.
There exist such that and are not equal or orthogonal.
The next lemma encapsulates the essence of the dichotomy theorems of two ternary signatures of rank , and extends it to an arbitrary set of rank ternary signatures.
Lemma 5.3.
Let be a set of rank signatures of type or type . Suppose that for every orthogonal matrix , neither of the following holds:
-
1.
for all , is .
-
2.
all signatures in are EBD.
Then, is #-hard.
The idea of viewing binary signatures as transformation on the signatures is naturally captured by the following construction. Let be a set of ternary signatures and be a set of binary signatures. Let . Let be the monoid generated by under multiplication. We define to be
(2) |
Combinatorially, is the set of all gadgets constructible from connecting the same chain of binary signatures to the three edges of a ternary signature, for some and . It can also be viewed as the orbit (ignoring degenerate signatures) of under the monoid action of , where the action is defined by for and . Note that is a set of symmetric ternary signatures, and if and , then as well.
6 A Single Signature Dichotomy
In this section, we prove a dichotomy of for an of arbitrary arity . The case was proved in [15]. Let . Similar to the Boolean domain case, it is natural to expect that higher arity tractable signatures also have the same tensor decomposition form, i.e. or for after some orthogonal transformation. We show that indeed this is the case.
The proof is an induction on the arity. Assume is not #P-hard. First, we show that of arity must be of a suitable form, using the dichotomy of two ternary signatures. Then we show that arity signatures must have a tensor decomposition of at most linearly independent vectors. Then we argue that the dichotomy of two arity signatures must take essentially the same form as the dichotomy of two ternary signatures. Finally, we generalize the proof to higher arities. The logical dependency is visualized in Figure 7.
6.1 Subspace of Signatures
Let be a real-valued symmetric signature of arity . Consider the set . Note that is a linear map from to the space of ternary real-valued symmetric signatures. We show a dichotomy for an arbitrary subspace of ternary real-valued signatures. For a nonempty , each ternary signature must be a tractable signature, otherwise the problem is already #-hard. We prove this dichotomy for a subspace by considering each canonical form such a tractable signature can take under an orthogonal . Note that is also a subspace. The exact statements can be found in Appendix B. We summarize the dichotomy statements: there exists an orthogonal such that is a subset of or , or it is #-hard. We may prove the dichotomy of using the following three propositions and the dichotomy of two ternary signatures.
Proposition 6.1.
Let be a nonzero vector. Let be a Boolean domain signature for nonzero such that . Let . Then, is #-hard unless or .
Proposition 6.2.
Let be a nonzero vector. Let be a Boolean domain signature where . Let . Then, is #-hard.
Proposition 6.3.
Let and be nondegenerate, real valued, symmetric, ternary signatures such that and . Let . Then, is #-hard unless are both GenEQ.
Proof.
Assume is not #-hard. Then, we may assume that and are tractable. We write as in Figure 9.
We may realize using and using .
Suppose , then is #-hard by Proposition 6.1 and Proposition 6.2 unless is GenEQ because . If is GenEQ, then and thus it must be the case that because otherwise is degenerate. Then, we may make the same argument on , which implies that the only way to escape hardness is for to be GenEQ as well.
Therefore, we may assume that . Then, since and are assumed to be nondegenerate, and cannot be GenEQ, so and cannot both be zero and and cannot both be zero. Consider a unary signature for to be determined later. Let
Regardless of the Boolean domain tractable type of , if , we can choose some such that is not compatible with because and can be made to arbitrary values. Similarly, if , we can choose some such that is #-hard. If , then it must be that . We have and , and neither is a tractable signature. Therefore, is #-hard, contrary to the assumption made in the beginning.
6.2 A Single Signature of Arity 4
Lemma 6.4.
Let be a nondegenerate, real-valued, symmetric signature of arity . Then, is computable in polynomial time if there exists some real orthogonal matrix such that one of the following conditions holds. Otherwise, it is #-hard.
-
1.
for some .
-
2.
where for some .
Proof.
The tractability follows since is in class for both cases.
Assume is not #-hard. Let . Then, is a vector space and , so we may apply the lemmas in Appendix B. We may assume that for any , is tractable. Fix any . We may apply a real orthogonal holographic transformation such that is of the canonical form. Note that , and is a subspace of .
Let . We write by extending the notation of Figure 1 to arity signatures.
We categorize the entries in Figure 11 in the following way. A corner entry is an entry at the corner of the triangle: . An outer entry is an entry at the perimeter of the triangle: . An inner entry is an entry at the inside of the triangle: . The entries of a subsignature correspond to a smaller triangle. For example, the signature is the triangle given by the dashed lines in Figure 11. Note that for all .
Suppose is a signature of rank in type . Then, by Lemma B.1, only contains GenEQ signatures. We claim that must be a GenEQ. This can be seen as follows. Note that a GenEQ signature has nonzero value at only the corner entries. The three subsignatures, for must all be a GenEQ. For that to be possible, only the corner entries can be nonzero. Therefore, is a GenEQ.
Suppose is a signature of rank in type . Then, by Lemma B.2, only contains signatures that are type on the domain (see Definition A.1). If an internal entry is nonzero, then there is some subsignature that is not (see Figure 11). Also, cannot have nonzero entries at the outer entries , because that means there is a subsignature that is not . Therefore, all nonzero entries must be at the domain part and . Further, must satisfy the type recurrence. This is because , and thus satisfies and , and similarly, satisfies and .
Now, suppose does not contain any signature of rank . If there is a signature of rank , we may apply the same arguments by using Lemma B.3 and Lemma B.4. The only difference is that must be .
Suppose only contains rank signatures. Then, by Lemma B.5, for some . Then, for some , which can be used to show that for some by looking at the trinagular representation.
References
- [1] Andrei Bulatov and Martin Grohe. The complexity of partition functions. Theor. Comput. Sci., 348(2):148–186, December 2005. doi:10.1016/j.tcs.2005.09.011.
- [2] Andrei A. Bulatov. A dichotomy theorem for constraint satisfaction problems on a 3-element set. J. ACM, 53(1):66–120, January 2006. doi:10.1145/1120582.1120584.
- [3] Andrei A. Bulatov. The complexity of the counting constraint satisfaction problem. J. ACM, 60(5), October 2013. doi:10.1145/2528400.
- [4] Andrei A. Bulatov and Víctor Dalmau. Towards a dichotomy theorem for the counting constraint satisfaction problem. Inf. Comput., 205(5):651–678, May 2007. doi:10.1016/j.ic.2006.09.005.
- [5] Jin-Yi Cai and Xi Chen. Complexity of counting CSP with complex weights. Journal of the ACM (JACM), 64:1–39, 2011.
- [6] Jin-Yi Cai and Xi Chen. Complexity Dichotomies for Counting Problems. Cambridge University Press, 1 edition, 2017. doi:10.1017/9781107477063.
- [7] Jin-Yi Cai, Xi Chen, and Pinyan Lu. Graph homomorphisms with complex values: A dichotomy theorem: (extended abstract). In Samson Abramsky, Cyril Gavoille, Claude Kirchner, Friedhelm Meyer Auf Der Heide, and Paul G. Spirakis, editors, Automata, Languages and Programming, volume 6198, pages 275–286. Springer Berlin Heidelberg, 2010. Series Title: Lecture Notes in Computer Science. doi:10.1007/978-3-642-14165-2_24.
- [8] Jin-Yi Cai, Xi Chen, and Pinyan Lu. Nonnegative weighted #CSP: An effective complexity dichotomy. SIAM J. Comput., 45(6):2177–2198, January 2016. doi:10.1137/15M1032314.
- [9] Jin-Yi Cai and Artem Govorov. Perfect matchings, rank of connection tensors and graph homomorphisms. Comb. Probab. Comput., 31(2):268–303, 2022. doi:10.1017/S0963548321000286.
- [10] Jin-Yi Cai, Heng Guo, and Tyson Williams. A complete dichotomy rises from the capture of vanishing signatures. SIAM Journal on Computing, 45(5):1671–1728, 2016. doi:10.1137/15M1049798.
- [11] Jin-Yi Cai, Heng Guo, and Tyson Williams. The complexity of counting edge colorings and a dichotomy for some higher domain Holant problems. Research in the Mathematical Sciences, 3(1):18, 2016. doi:10.1186/s40687-016-0067-8.
- [12] Jin-Yi Cai and Jin Soo Ihm. Holant* dichotomy on domain size 3: A geometric perspective, 2025. arXiv:2504.14074.
- [13] Jin-Yi Cai, Pinyan Lu, and Mingji Xia. Holant problems and counting CSP. In Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, STOC ’09, pages 715–724, New York, NY, USA, 2009. Association for Computing Machinery. doi:10.1145/1536414.1536511.
- [14] Jin-Yi Cai, Pinyan Lu, and Mingji Xia. Computational complexity of Holant problems. SIAM Journal on Computing, 40(4):1101–1132, 2011. doi:10.1137/100814585.
- [15] Jin-Yi Cai, Pinyan Lu, and Mingji Xia. Dichotomy for Holant problems with a function on domain size 3. In Proceedings of the Twenty-Fourth Annual ACM-SIAM Symposium on Discrete Algorithms, pages 1278–1295. Society for Industrial and Applied Mathematics, 2013. doi:10.1137/1.9781611973105.93.
- [16] Jin-Yi Cai, Pinyan Lu, and Mingji Xia. Dichotomy for Holant* problems on the Boolean domain. Theory of Computing Systems, 64(8):1362–1391, 2020. doi:10.1007/s00224-020-09983-8.
- [17] Pierre Comon, Gene Golub, Lek-Heng Lim, and Bernard Mourrain. Symmetric tensors and symmetric tensor rank. arXiv:0802.1681[math].
- [18] Nadia Creignou and Miki Hermann. Complexity of generalized satisfiability counting problems. Inf. Comput., 125:1–12, 1996. doi:10.1006/INCO.1996.0016.
- [19] Martin Dyer, Leslie Ann Goldberg, and Mark Jerrum. The complexity of weighted Boolean #CSP. SIAM Journal on Computing, 38(5):1970–1986, 2009. doi:10.1137/070690201.
- [20] Martin Dyer and Catherine Greenhill. The complexity of counting graph homomorphisms. Random Struct. Algorithms, 17(3–4):260–289, October 2000. doi:10.1002/1098-2418(200010/12)17:3/4\%3C260::AID-RSA5\%3E3.0.CO;2-W.
- [21] Martin E. Dyer and David Richerby. An effective dichotomy for the counting constraint satisfaction problem. SIAM J. Comput., 42(3):1245–1274, 2013. doi:10.1137/100811258.
- [22] Michael H. Freedman, László Lovász, and Alexander Schrijver. Reflection positivity, rank connectivity, and homomorphism of graphs. Journal of the American Mathematical Society, 20:37–51, 2004.
- [23] Leslie Ann Goldberg, Martin Grohe, Mark Jerrum, and Marc Thurley. A complexity dichotomy for partition functions with mixed signs. SIAM Journal on Computing, 39(7):3336–3402, 2010. doi:10.1137/090757496.
- [24] Pavol Hell and Jaroslav Nesetril. Graphs and homomorphisms. In Oxford lecture series in mathematics and its applications, 2004.
- [25] Yin Liu, Austen Z. Fan, and Jin-Yi Cai. Restricted holant dichotomy on domain sizes 3 and 4. Theoretical Computer Science, 1023:114931, 2025. doi:10.1016/j.tcs.2024.114931.
- [26] László Lovász. Operations with structures. Acta Mathematica Academiae Scientiarum Hungarica, 18:321–328, 1967.
- [27] Shuai Shao and Jin-Yi Cai. A dichotomy for real Boolean Holant problems. In 2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS), pages 1091–1102, 2020. doi:10.1109/FOCS46700.2020.00105.
- [28] Leslie G. Valiant. Accidental algorthims. In Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science, FOCS ’06, pages 509–517, USA, 2006. IEEE Computer Society. doi:10.1109/FOCS.2006.7.
Appendix A Boolean Domain Dichotomy Theorem
Definition A.1 (Definition 2.9 in [6]).
A signature , where , has type , if there exist and (not both ), such that for . We say it it is of type , if for .
Theorem A.2 (Theorem 2.12 in [6]).
Let be a set of nondegenerate symmetric signatures over in Boolean variables. Then is computable in polynomial time for the following three classes of . In all other cases, is #-hard.
-
1.
Every signature in is of arity .
-
2.
There exists and (not both , depending only on ), such that every signature in either (1) has type or (2) has arity and is of the form .
-
3.
Every signature in either (1) has type or (2) has arity and is of the form .
Appendix B Subspace of Signatures
Let denote the set of all real-valued symmetric ternary signatures. We list the dichotomy statements of for a subspace . The complete proof can be found in the full version [12].
Lemma B.1.
Let be a subspace of . Suppose for nonzero . Then, is #-hard unless every is a GenEQ.
Lemma B.2.
Let be a subspace of . Suppose where and nonzero . Then, is #-hard unless every is such that is and for some .
Lemma B.3.
Let be a subspace of such that all signatures in are of rank at most . Suppose for nonzero . Then, is #-hard unless every is for some .
Lemma B.4.
Let be a subspace of such that all signatures in are of rank at most . Suppose where . Then, is #-hard unless every is such that and for some .
Lemma B.5.
Let be a subspace of such that all signatures in are of rank at most . Then, there exists some such that .