Abstract 1 Introduction 2 Preliminaries 3 Statement of the Dichotomy Theorem 4 Tractability 5 Outline of Hardness 6 A Single Signature Dichotomy References Appendix A Boolean Domain Dichotomy Theorem Appendix B Subspace of Signatures

Holant* Dichotomy on Domain Size 3:
A Geometric Perspective

Jin-Yi Cai Department of Computer Sciences, University of Wisconsin-Madison, WI, USA Jin Soo Ihm Department of Computer Sciences, University of Wisconsin-Madison, WI, USA
Abstract

Holant problems are a general framework to study the computational complexity of counting problems. It is a more expressive framework than counting constraint satisfaction problems (CSP) which are in turn more expressive than counting graph homomorphisms (GH). In this paper, we prove the first complexity dichotomy of Holant3() where is an arbitrary set of symmetric, real valued constraint functions on domain size 3. We give an explicit tractability criterion and prove that, if satisfies this criterion then Holant3() is polynomial time computable, and otherwise it is #𝖯-hard, with no intermediate cases. We show that the geometry of the tensor decomposition of the constraint functions plays a central role in the formulation as well as the structural internal logic of the dichotomy.

Keywords and phrases:
Holant problem, Complexity dichotomy, Higher domain
Category:
Track B: Automata, Logic, Semantics, and Theory of Programming
Copyright and License:
[Uncaptioned image] © Jin-Yi Cai and Jin Soo Ihm; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Complexity theory and logic
Related Version:
Full Version: https://arxiv.org/abs/2504.14074 [12]
Acknowledgements:
We sincerely thank the reviewers for their thoughtful and thorough feedback.
Editors:
Keren Censor-Hillel, Fabrizio Grandoni, Joël Ouaknine, and Gabriele Puppis

1 Introduction

Holant problems were introduced in [14] as a broad framework to study the computational complexity of counting problems. Counting CSP is a special case of Holant problems [18, 4, 3, 19, 13, 21, 8, 5]. In turn, counting CSP includes counting graph homomorphisms (GH), introduced by Lovász [26, 24], which is a special case with a single binary constraint function. Typical Holant problems include counting all matchings, counting perfect matchings #PM (including all weighted versions), counting cycle covers, counting edge colorings, and many other natural problems. It is strictly more expressive than GH; for example, it is known that #PM cannot be expressed in the framework of GH [22, 9].

The complexity classification program of counting problems is to classify as broad a class of problems as possible according to their inherent computational complexity within these frameworks. Let be a set of (real or complex valued) constraint functions defined on some domain set D. It defines a Holant problem Holant() as follows. An input consists of a graph G=(V,E), where each vV has an associated 𝐅, with incident edges to v labeled as input variables of 𝐅. The output is the sum of products of evaluations of the constraint functions over all assignments over D for the variables. The goal of the complexity classification of Holant problems is to classify the complexity of Holant(). A complexity dichotomy theorem for counting problems classifies every problem in a broad class of problems to be either polynomial time solvable or #𝖯-hard.

There has been tremendous progress in the classification of counting GH and counting CSP [18, 19, 13, 3, 21, 8, 5, 20, 1, 23, 7]. Much progress was also made in the classification of Holant problems, particularly on the Boolean domain (|D|=2), i.e., when variables take 0-1 values (but constraint functions take arbitrary values, such as partition functions from statistical physics). This includes the dichotomy for all complex-valued symmetric constraint functions [10] and for all real-valued not necessarily symmetric constraint functions [27]. On the other hand, obtaining higher domain Holant dichotomy has been far more challenging. There is a huge increase in difficulty in proving dichotomy theorems for domain size >2, as already seen in decision CSP of domain size 3, a major achievement by Bulatov [2]. Toward proving these dichotomies one often first considers restricted classes of Holant problems assuming some particular set of constraint functions are present. Two sets stand out: (1) the set of equality functions 𝒬 of all arities (this is the class of all counting CSP problems) and (2) the set of all unary functions 𝒰, i.e., functions of arity one. Indeed, #CSP()=Holant(𝒬); i.e., counting CSP are the special case of Holant problems with 𝒬 assumed to be present. In this paper we study (2): Holant3():=Holant3(𝒰), for an arbitrary set of symmetric real-valued constraint functions on domain size 3.

Previously there were only two significant Holant dichotomies on higher domains. One is for a single ternary constraint function that has a strong symmetry property called domain permutation invariance [11]. That work also solves a decades-old open problem of the complexity of counting edge colorings. The other is a dichotomy for Holant3(f) where f is a single symmetric complex-valued ternary constraint function on domain size 3 [15]. Extending this dichotomy to an arbitrary constraint function, or more ambitiously, to a set of constraint functions has been a goal for more than 10 years without much progress.

In this paper, we extend the result in [15] to an arbitrary set of real-valued symmetric constraint functions. In [25] an interesting observation was made that an exceptional form of complex-valued tractable constraint functions does not occur when the function is real-valued. By restricting ourselves to a set of real-valued constraint functions, we can bypass a lot of difficulty associated with this exceptional form. Another major source of intricacy is related to the interaction of binary constraint functions with other constraint functions in . We introduce a new geometric perspective that provides a unifying principle in the formulation as well as a structural internal logic of what leads to tractability and what leads to #𝖯-hardness. After discovering some new tractable classes of functions aided by the geometric perspective, we are able to prove a Holant3() dichotomy. This dichotomy is dictated by the geometry of the tensor decomposition of constraint functions.

Suppose 𝐆 is a binary constraint function and 𝐅 is a tenary constraint function, with 𝐅=𝐮3+𝐯3 its tensor decomposition. One of the simplest constructions possible with 𝐆 and 𝐅 is to connect 𝐆 at the three edges of 𝐅; the resulting constraint function is 𝐆3𝐅 which has tensor decomposition (𝐆𝐮)3+(𝐆𝐯)3. We see that this gadget construction plays nicely with the tensor decomposition. Generalizing this idea, suppose is a set of binary constraint functions and 𝒯 is a set of ternary constraint functions. Let be the monoid generated by . We may consider the orbit 𝒪 of 𝒯 under the monoid action of , such that 𝐆 acts on 𝐅𝒯 by 𝐆:𝐅𝐆3𝐅. Although the constraint functions in 𝒪 are the results of a very simple gadget construction, we show that 𝒪 contains sufficient information about the interaction of binary constraint functions and other constraint functions, and the simplicity allows us to analyze it by considering the geometry of the vectors of the tensor decomposition of the constraint functions in 𝒪.

Compared to the Boolean domain dichotomy theorem, stated in explicit recurrences on the values of the signatures (see Theorem 2.12 in [6]) the dichotomy theorem (Theorem 3.1) we wish to prove has a more non-explicit form, which is also more conceptual. This is informed by the geometric perspective, but it also causes some difficulty in its proof, when we try to extend to a set of constraint functions of arbitrary arities. We introduce a new technique to overcome this difficulty. First (and this is quite a surprise), it turns out that a dichotomy of two constraint functions of arity 3 is easier to state and prove than the dichotomy of one binary and one ternary constraint functions. Also they can be proven independently of each other. This is a departure from all previous proofs of dichotomy theorems in this area. Second, using the unary constraint functions available in Holant, any symmetric constraint function 𝐅 of arity 4 defines a linear transformation from 3 to the space of symmetric constraint functions of arity 3, which corresponds to the ternary constraint functions constructible by connecting a unary function to 𝐅. In particular, the image of this map, , is a linear subspace. In particular, the image of this map is a linear subspace. Considering the space instead of specific sub-functions allows us to bypass the difficulty from the non-explicit form of the dichotomy statement, which is in terms of tensor decompositions up to an orthogonal transformation. We show that a dichotomy of two ternary constraint functions and the fact that is closed under linear combinations imply that must be of a very special form for Holant3() to be tractable, which in turn implies that 𝐅 must possess a certain regularity.

While the tractability criterion in Theorem 3.1 is stated in a conceptual and succinct way, the tractable cases are actually quite rich and varied. We present here specific examples of new tractable cases. Denote the domain by D={𝖡,𝖦,𝖱}. We use the notation in Figure 1 to denote a symmetric ternary constraint function on domain D.

Figure 1: Notation for expressing a symmetric ternary domain 3 constraint functions. This notation can be extended for higher arity signatures by using a larger triangle.

Consider the four constraint functions 𝐅1,𝐆1,𝐇1,𝐁1 in Figure 2.

(a) 𝐅1
(b) 𝐆1
(c) 𝐇1
(d) 𝐁1
Figure 2: Ternary constraint functions 𝐅1, 𝐆1, 𝐇1, and a binary constraint function 𝐁1.

It is not obvious that Holant3(𝐅1,𝐆1,𝐇1,𝐁1) is polynomial-time computable.

We apply the orthogonal transform T=16[222112330] which transforms 𝐅1,𝐆1 and 𝐇1 to be supported on {𝖡,𝖦},{𝖡,𝖱},{𝖦,𝖱} respectively, Their tensor decompositions have a revealing structure. Ignoring the scalar constants, we have111We use 𝔦 to denote the imaginary unit. Complex numbers do appear, even though the signatures are all real valued. This is similar to eigenvalues.

𝐅1 =T3𝐅1=33(1,0,0)3+66(0,1,0)3=33𝐞13+66𝐞23
𝐆1 =T3𝐆1=(1,0,𝔦)3+(1,0,𝔦)3=(𝐞1+𝔦𝐞3)3+(𝐞1𝔦𝐞3)3
𝐇1 =T3𝐇1=(0,1,𝔦)3+(0,1,𝔦)3=(𝐞2+𝔦𝐞3)3+(𝐞2𝔦𝐞3)3

The vectors in tensor decompositions show that geometrically, 𝐅1, 𝐆1, and 𝐇1 are associated with three coordinate planes. The function 𝐁1=T2𝐁1 written in matrix form is [010100001], where the (i,j) entry is the function value 𝐁1(i,j), for i,j in the new domain set. Applying Theorem 3.1 we can conclude that {𝐅1,𝐆1,𝐇1,𝐁1} is in tractable class .

For the second example we apply the orthogonal transform T=16[222112330] to the constraint functions in Figure 3.

(a) 𝐅2
(b) 𝐆2
(c) 𝐇2
(d) 𝐁2
Figure 3: Ternary constraint functions 𝐅2, 𝐆2 and bianry constraint functions 𝐇2,𝐁2.
T3𝐅2=33((1,𝔦,0)3+(1,𝔦,0)3)+42𝐞33,T3𝐆2=(3,6,0)3+62𝐞33

and T3𝐇2 and T3𝐁2 can be written in matrix form [110110001] and [001001110] respectively, up to scalar constants. Applying Theorem 3.1 we can conclude that {𝐅2,𝐆2,𝐇2,𝐁2} is in tractable class 𝒟.

Our new algorithm also solves some natural problems. Consider the following problem. For n, ij{𝖡,𝖦,𝖱}, and any a,b, let 𝖯𝖠𝖱𝖨𝖳𝖸a,bn,i,j:{𝖡,𝖦,𝖱}n be the function

𝖯𝖠𝖱𝖨𝖳𝖸a,bn,i,j(𝐱)={aif 𝐱{i,j}n and 𝐱 contains even number of ibif 𝐱{i,j}n and 𝐱 contains odd number of i0otherwise

Let ()pq;r:{𝖡,𝖦,𝖱}2{0,1} for distinct p,q,r{𝖡,𝖦,𝖱} be the function

()pq;r(x,y)={1if x,y{p,q} and xy1if x=y=r0otherwise

Let ={𝖯𝖠𝖱𝖨𝖳𝖸a,bn,i,j:ij{𝖡,𝖦,𝖱},a,b}{()pq;r:distinct p,q,r{𝖡,𝖦,𝖱}}. There is a related constraint satisfaction decision problem, where

b={𝖯𝖠𝖱𝖨𝖳𝖸a,bn,i,j:ij{𝖡,𝖦,𝖱},a,b{0,1}}{()pq;r:distinct p,q,r{𝖡,𝖦,𝖱}},

and we ask if an b signature grid has a nonzero assignment. It is not even immediately obvious whether this decision problem is solvable in polynomial time. Theorem 3.1 tells us that is in class and thus Holant3() is computable in polynomial time, which implies that the decision problem is also solvable in polynomial time.

2 Preliminaries

2.1 Definitions

Let D be a finite domain set, and be a set of constraint functions, also called signatures. Each 𝐅 is a mapping from Dk for some arity k. If the image of 𝐅 is contained in , we say 𝐅 is real-valued.

A signature grid Ω=(G,,π) consists of a graph G=(V,E) where each vertex is labeled by a function 𝐅v and π is the labeling. The arity of 𝐅v must match the degree of v. The Holant problem on instance Ω is to evaluate

HolantΩ=σvV𝐅v(σ|E(v)), (1)

where the sum is over all edge assignments σ:ED and E(v) is the edges adjacent to v, and 𝐅v(σ|E(v)) is the evaluation of 𝐅v on the ordered input tuple σ|E(v).

A signature 𝐅v is listed by its values lexicographically as a table, or it can be expressed as a tensor in (|D|)deg(v). We can identify a unary function 𝐅(x):D with a vector 𝐮|D|. Given two vectors 𝐮 and 𝐯 of dimension |D|, the tensor product 𝐮𝐯 is a vector in |D|2, with entries uivj for 1i,j|D|. For matrices A=(aij) and B=(bkl) the tensor product (or Kronecker product) AB is defined similarly; it has entries aijbkl indexed by ((i,k),(j,l)) lexicographically. We write 𝐮k for 𝐮𝐮 with k copies of 𝐮. Ak is similarly defined.

A signature 𝐅 of arity k is degenerate if 𝐅=𝐮1𝐮k for some vectors 𝐮i. Such a signature is very weak; there is no interaction between the variables. If every signature in is degenerate, then HolantΩ for any Ω=(G,,π) is computable in polynomial time in a trivial way: Simply split every vertex v into deg(v) vertices each assigned a unary 𝐅i and connected to the incident edge. Then HolantΩ becomes a product over each component of a single edge. Thus degenerate signatures are weak and should be properly understood as made up by unary signatures. To concentrate on the essential features that differentiates tractability from intractability, Holant was introduced in [13, 14]. These are the problems where all unary signatures are assumed to be present, i.e. Holant()=Holant(𝒰) where 𝒰 is the set of all unary signatures. We note that for real valued the complexity of Holant() is unchanged whether we use real valued or complex valued 𝒰 [25](Lemma 9), and hence in this paper we use real valued 𝒰. In the proof of #𝖯-hardness, we freely use complex valued unary functions and apply the known Holant dichotomy theorems that may use complex valued unary functions.

2.2 Holographic Transformation

To describe the idea of holographic transformations, it is convenient to consider bipartite graphs. For a general graph, we can always transform it into a bipartite graph while preserving the Holant value, as follows: for each edge in the graph, we replace it by a path of length 2, and assign to the new vertex the binary Equality function (=2).

We use the notation Holant(|𝒢) to denote the Holant problem on bipartite graphs H=(U,V,E), where each signature for a vertex in U or V is from or 𝒢, respectively. An input instance for the bipartite Holant problem is a bipartite signature grid and is denoted as Ω=(H;|𝒢;π). Signatures in are considered as row vectors (or covariant tensors); signatures in 𝒢 are considered as column vectors (or contravariant tensors).

For a |D|×|D| matrix T and a signature set , define

T={𝐆:𝐅 of arity n, such that 𝐆=Tn𝐅},

and similarly for T. Whenever we write Tn𝐅 or T, we view the signatures as column vectors; similarly 𝐅Tn or T as row vectors. A holographic transformation by T is the following operation: given a signature grid Ω=(H;|𝒢;π), for the same graph H, we get a new grid Ω=(H;T|T1𝒢;π) by replacing each signature in or 𝒢 with the corresponding signature in T or T1𝒢.

Theorem 2.1 (Valiant’s Holant Theorem [28]).

If there is a holographic transformation mapping signature grid Ω to Ω, then HolantΩ=HolantΩ.

Therefore, an invertible holographic transformation does not change the complexity of the Holant problem in the bipartite setting. Furthermore, if T is orthogonal, then (=2)T2=TIT=I, so it preserves binary equality. This means that an orthogonal holographic transformation can be used freely in the standard setting.

Corollary 2.2.

Suppose T is an orthogonal matrix, TT=I, and let Ω=(G,,π) be a signature grid. Under a holographic transformation by T, we get a new signature grid Ω=(G,T,π) and HolantΩ=HolantΩ.

2.3 Notation

For two nonzero vectors 𝐱,𝐲n, we write 𝐱𝐲 to denote projective equality, i.e. 𝐱=λ𝐲 for some nonzero λ. Throughout this paper, the symbol 𝐮,𝐯 for 𝐮,𝐯n denotes the dot product, i.e. 𝐮,𝐯=uivi. We say 𝐮,𝐯n are orthogonal if 𝐮,𝐯=0

A signature 𝐅 of arity k is symmetric if 𝐅(x1,,xk)=𝐅(xσ(1),,xσ(k)) for all σSk, the symmetric group. In this paper, if not further specified, a signature 𝐅 is assumed to be real-valued, symmetric, and on domain 3. We consider a signature 𝐅 and its nonzero multiple c𝐅 as the same signature, since replacing 𝐅 by c𝐅 only introduces a easily computable global factor in the Holant value.

A symmetric signature 𝐅 on k Boolean variables {0,1} can be expressed as [f0,f1,,fk] where fi is the value of 𝐅 on inputs of Hamming weight i. In this paper, we focus on signatures on domain size 3, and we use the symbols {𝖡,𝖦,𝖱} to denote the domain elements. A binary signature 𝐅 (not necessarily symmetric) can be expressed as a |D|×|D| matrix M𝐅, where the entry (i,j)D×D is the value of 𝐅(i,j). For the ease of notation, we use the term matrix and binary signature interchangeably, and use 𝐅 to refer to both a signature and its matrix M𝐅. To fix an ordering, binary signature on domain 3 is expressed as 𝐅=[f𝖡𝖡f𝖡𝖦f𝖡𝖱f𝖦𝖡f𝖦𝖦f𝖦𝖱f𝖱𝖡f𝖱𝖦f𝖱𝖱]. If 𝐅 is a symmetric signature, then 𝐅 is a symmetric matrix.

Let 𝐆 be a binary signature and 𝐅 be a symmetric signature of arity k2. We use 𝐆k𝐅 to denote the gadget constructed by attaching a 𝐆 at the edges of 𝐅. If 𝐅 is written in a tensor form, i.e. 𝐅=𝐯1k++𝐯sk for 𝐯i|D| we can easily check that 𝐆k𝐅=(𝐆𝐯1)k++(𝐆𝐯s)k. Another gadget construction is connecting a unary signature. Let 𝐮|D| and 𝐅 be a symmetric signature on domain D of arity k. Then, 𝐅,𝐮 is the arity k1 gadget obtained by connecting 𝐮 to any edge of 𝐅. Since 𝐅 is symmetric, the choice of the edge does not matter.

We use Holant2 to denote the Holant problem on Boolean domain {0,1}, and Holant3 to denote the Holant problem on domain {𝖡,𝖦,𝖱}. We say two sets of signatures and 𝒢 are compatible if Holant(𝒢) is tractable.

For a domain 3 signature, we use the symbol 𝐅{i,j} to denote the Boolean domain signature obtained by restricting the inputs of 𝐅 to be from {i,j}{𝖡,𝖦,𝖱} and identifying i and j with 0 and 1 respectively. For a set of signatures , {i,j}:={𝐅{i,j}:𝐅}.

Let 𝐅 be a domain 3 signature. We define supp𝐅 to be the set of inputs for which 𝐅 is nonzero. We say 𝐅 is an EBD signature (a signature defined essentially on a Boolean domain) if supp𝐅{i,j} for some {i,j}{𝖡,𝖦,𝖱}. We say 𝐅 is domain separated to {𝖡,𝖦} and {𝖱}, written 𝐅 is 𝖡𝖦|𝖱, if supp𝐅{𝖡,𝖦}{𝖱}. In other words, 𝐅 is zero on inputs that take values from both {𝖡,𝖦} and {𝖱}. It is possible that supp𝐅{𝖡}{𝖦}{𝖱}, in which case 𝐅=a𝐞𝟏n+b𝐞𝟐n+c𝐞𝟑n for some a,b,c. We call such 𝐅 a GenEQ signature. We similarly define domain separation to {i,j} and {k} and write ij|k for any distinct i,j,k{𝖡,𝖦,𝖱}. We refer to a matrix as 𝖡𝖦|𝖱 if it can be viewed as a 𝖡𝖦|𝖱 binary signature. For example, M=[0000] is a 𝖡𝖦|𝖱 matrix.

Denote by the set of all functions 𝐅 such that if 𝐅 has arity n, then supp𝐅{a,b,c} for a=(a1,,an),b=(b1,,bn),c=(c1,,cn){𝖡,𝖦,𝖱}n such that for all 1in, ai,bi,ci are all distinct. We think of as a generalized form of GenEQ function to not necessarily symmetric functions.

We use 𝒟 to denote the set of 3×3 matrices such that the first two columns are linearly dependent and also the first two rows are linearly dependent. We can easily check that 𝒟 is closed under multiplication. If M is a 𝖡𝖦|𝖱 matrix, we can see that M𝒟,𝒟M𝒟.

We use Oh to denote the symmetry group of an octahedron. As a subgroup of the real 3×3 orthogonal group O(3), Oh consists of the matrices [ϵ1000ϵ2000ϵ3], [ϵ10000ϵ20ϵ30], [0ϵ10ϵ20000ϵ3], [0ϵ1000ϵ2ϵ300], [00ϵ1ϵ2000ϵ30], [00ϵ10ϵ20ϵ300] for ϵ1,ϵ2,ϵ3{1,1}.

We call a signature/matrix of the form [00a00bcd0] for some a,b,c,d a 𝖲𝗐𝖺𝗉𝖡𝖦;𝖱 signature/matrix. The intuition is that a signature of this form swaps the domains {𝖡,𝖦} and {𝖱}. Similarly, we call [0a0b0c0d0] as 𝖲𝗐𝖺𝗉𝖡𝖱;𝖦 and [0abc00d00] as 𝖲𝗐𝖺𝗉𝖦𝖱;𝖡.

Let 𝖲k(n) be the set of complex-valued arity-k signature over a domain of size n. The rank of A𝖲k(n) is defined as rank(A):=min{s:A=i=1s𝐲ik}. Several properties of symmetric rank are shown in [17]: rank is well defined and rank(i=1s𝐲i)=s for linearly independent 𝐲1,,𝐲skn. One can also easily show that the tensor decomposition into linearly independent vectors is unique up to scaling and reordering.

2.4 Known Dichotomy Theorems

An explicit Holant2 dichotomy for a set of symmetric Boolean domain signatures is known [6] (see Appendix A for the statement). The following dichotomy for a single singature of domain 3 is our starting point.

Theorem 2.3 (Theorem 2 in [25]).

Let 𝐅 be a real-valued symmetric ternary function over domain {𝖡,𝖦,𝖱}. Then, Holant3(𝐅) is computable in polynomial time if there exists a real orthogonal matrix T such that one of the following conditions holds. Otherwise, it is #𝖯-hard.

𝔄.

T3𝐅=a𝐞𝟏3+b𝐞𝟐3+c𝐞𝟑3 for some a,b,c.

𝔅.

cT3𝐅=ϵ(𝜷𝟎3+𝜷𝟎¯3)+λ𝐞𝟑3 where 𝜷𝟎=(1,𝔦,0), ϵ{0,1} and for some c,λ and c0.

3 Statement of the Dichotomy Theorem

Let be a set of nondegenerate, real-valued, symmetric signatures over domain {𝖡,𝖦,𝖱}.

Theorem 3.1.

Holant3() is computable in polynomial time if there exists a real orthogonal T, such that one of the following conditions holds. In all other cases, Holant3() is #𝖯-hard.

𝒜.

Every signature in has arity 2.

.

T.

𝒞.

For all 𝐅T of arity 3, supp𝐅{𝖡,𝖦}, and

For all binary 𝐆T, either 𝐆𝒟 or 𝐆 is 𝖡𝖦|𝖱, and

Holant2((T){𝖡,𝖦}) is tractable.

𝒟.

For all 𝐅T of arity 3, 𝐅 is 𝖡𝖦|𝖱, and

For all binary 𝐆T, either 𝐆 is 𝖡𝖦|𝖱 or 𝐆 is 𝖲𝗐𝖺𝗉𝖡𝖦;𝖱, and

Holant2((T){𝖡,𝖦}) is tractable.

.

Let ij={𝐅T:supp𝐅{i,j}}. Let =T(𝖡𝖦𝖡𝖱𝖦𝖱).

Oh, and Oh, where is the monoid generated by =Oh, and

For all i,j{𝖡,𝖦,𝖱}, Holant2({i,j}ij) is tractable, and

For all i,j{𝖡,𝖦,𝖱}, Holant2((𝐆𝐆(T)){i,j}) is tractable.

In classes 𝒞, 𝒟, and , we refer to the Holant2 tractability. By the Boolean domain dichotomy, it is necessary that those Holant2 problems are tractable.

In case (b) of class , it seems like we may need to use the asymmetric Holant2 dichotomy (which is known [16]), because while the signatures in are symmetric, may contain asymmetric signatures. We claim that is not necessary. Let 𝐆Oh. If 𝐆{i,j} is nondegenerate and asymmetric, then 𝐆{i,j}=±[0110]. We can deduce that 𝐆{i,j} is universally compatible, i.e., when appended to any Holant2 tractable class results in a tractable set, without referring to any asymmetric Holant2 dichotomy. For type I(a,b) (see Definitions A.1 and A.2), we see that [0110]=14a2+b2[b2a2ab][2abb2a]. The first matrix in the symmetric signature notation is [b,2a,b], which satisfies the recurrence ab+b(2a)=a(b). The second matrix in the symmetric signature notation is [2a,b,2a], which is the other specified form. For type II, we see that [0110]=[1001][0110], and [1,0,1] and [0,1,0] are type II.

This is not a coincidence. We may view the Holant2 dichotomy in a geometric way. Consider the tractable type I(a,b). There are two norm 1 orthogonal vectors 𝐮,𝐯2 such that any signature of arity 3 of type I(a,b) is of the form c𝐮n+d𝐯n. We may represent type I(a,b) signatures of arity 3 by two orthogonal lines in the 2 plane. Consider the gadget construction of connecting a binary signature 𝐆 to all of the edges of a signature. In the tensor decomposition form, we have 𝐆n(c𝐮n+d𝐯n)=c(𝐆𝐮)n+d(𝐆𝐯)n. For the binary signatures, we can check that the tractable signatures correspond to the linear transformations that fix the union of the two orthogonal lines as a set. This is easily verified for the case of type I(0,1), when 𝐮=𝐞1 and 𝐯=𝐞2, since [,0,] signature corresponds to scaling 𝐞1 and 𝐞2, while [0,,0] signature corresponds to reflection along x=y line, and similarly for other type I(a,b). The asymmetric signature above is a π/2 rotation, which fixes any pair of orthogonal lines, so it is tractable with all I(a,b) types.

The tractable type II may be viewed as a circle in the 2 plane. The justification is that any type II signature can be written as (𝐮+𝔦𝐯)n+(𝐮𝔦𝐯)n for two orthogonal 𝐮,𝐯2 of the same norm, and all such signatures can be constructed from one type II signature. The set of linear transformations that fix the circle is the orthogonal group O(2). We see that up to a scalar factor, the signature [x,y,x] corresponds to a reflection matrix and the signature [x,0,x] to the identity. Since any rotation can be written as a product of two reflections, they are also compatible with type II signatures.

A similar analogy can be made for domain 3 signatures as well, since the tensor decomposition forms in Theorem 2.3 are also about orthogonality of the vectors. Similar to the Boolean domain tractable signatures, a tractable domain 3 signature also can be represented as a set of vectors in the three dimensional space. For instance, let 𝐮13+𝐮23, 𝐯13+𝐯23 and 𝐰13+𝐰23, be three signatures. The idea is depicted in Figure 4, and this intuition is formalized in Lemma 5.3. Class 𝒞 says that the signatures of arity 3 or higher must live in some plane, and we can assume it is the xy-plane after an orthogonal transformation. The compatible binary signatures are those fixing the xy-plane (𝖡𝖦|𝖱) or a degenerate transformation on the xy-plane. The class 𝒟 says that the signatures of arity 3 or higher are formed by the xy-plane and the z-axis. The compatible binary signatures, after the same orthogonal transformation, are those fixing the xy-plane and z-axis line (𝖡𝖦|𝖱) or mapping between the xy-plane and the z-axis (𝖲𝗐𝖺𝗉𝖡𝖦;𝖱). The class says that the signatures of arity 3 or higher must live in one of xy-plane, yz-plane, or xz-plane. The compatible binary signatures are those permuting the three planes without stretching. Such transformations are precisely the group Oh.

(a) 𝐮1,𝐮2,𝐯2,𝐰2 are on the xy plane and 𝐯1,𝐰1 are on the z axis.
(b) 𝐮1,𝐮2 are on xy plane, 𝐯1,𝐯2 are on the yz plane and 𝐰1,𝐰2 are on the xz plane.
Figure 4: Geometric idea behind the dichotomy of Holant3().

4 Tractability

In this section, we prove tractability by giving a polynomial time algorithm for each of the classes in Theorem 3.1. By Corollary 2.2, Holant3() is tractable if and only if Holant3(T) is tractable. Also, we may always assume that the given signature grid is connected, as the Holant value of any signature grid is the product over connected components.

Classes 𝒜 and are tractable by standard arguments. If every signature in has arity 2 (class 𝒜), then, the graph of the signature grid Ω is a disjoint union of paths and cycles. By matrix multiplication, we can compute the Holant value for a path. The Holant value for a cycle is obtained by taking the trace of a path.

Suppose T for an orthogonal T (class ). Let Ω be a T signature grid and e any edge. For any 𝖡,𝖦,𝖱 assignment to e, the assignment must propagate uniquely to all edges, which implies that there are at most three assignments to the whole grid that can result in a nonzero Holant value.

4.1 Class 𝒞

Suppose satisfies the conditions of 𝒞 by an orthogonal T. Let Ω be a connected signature grid over T. We may assume Ω is not in Class 𝒜. If a unary signature is connected to another unary signature then this is the entire Ω and we are done. If a unary signature is connected to a binary signature then they become another unary constraint which we can compute its signature. So, by induction, we can assume any unary remaining is connected to some signature 𝐅T of arity 3, which has supp𝐅{𝖡,𝖦}, and thus we can replace the unary restricted to {𝖡,𝖦}. If there is a chain of binary signatures 𝐆1,𝐆2,,𝐆k, we replace it by a single binary signature 𝐆 by taking the matrix product. If all 𝐆i are 𝖡𝖦|𝖱, then 𝐆 is also 𝖡𝖦|𝖱. In addition, the matrix of 𝐆{𝖡,𝖦} is equal to the product of the matrices of 𝐆i{𝖡,𝖦}. If there is some i such that 𝐆i𝒟, then 𝐆𝒟 as well, since 𝒟 is closed under multiplication and also closed under left or right multiplication by a 𝖡𝖦|𝖱 matrix. Note that if 𝐆𝒟, then 𝐆{𝖡,𝖦} is degenerate. Now since any binary 𝐆 remaining can only be connected to signatures 𝐅 of arity 3 with supp𝐅{𝖡,𝖦}, we can replace 𝐆 by 𝐆{𝖡,𝖦}. Thus we obtain an equivalent signature grid Ω as a Holant2 instance on domain {𝖡,𝖦}. Then condition 3. implies that the Holant value of Ω can be computed in polynomial time.

4.2 Class 𝒟

Suppose satisfies the conditions of 𝒟 by an orthogonal T, and let Ω be a connected T signature grid. If Ω does not use any binary signature of 𝖲𝗐𝖺𝗉𝖡𝖦;𝖱, then all signatures are 𝖡𝖦|𝖱. Then, if any edge gets assigned 𝖡 or 𝖦, all other edges must also be assigned 𝖡 or 𝖦 for the assignment to result in a nonzero value. Similarly, any assignment of 𝖱 to an edge must propagate as 𝖱 to all other edges for the assignment to result in a nonzero value. Therefore, the Holant value is sum of all assignments taking values in {𝖡,𝖦} and an assignment that only assigns 𝖱. The first sum can be computed in polynomial since Holant2((T){𝖡,𝖦}) is tractable, and the second value is computable in polynomial time.

Now, suppose Ω contains 𝖲𝗐𝖺𝗉𝖡𝖦;𝖱 signatures. First, note that a product of two 𝖲𝗐𝖺𝗉𝖡𝖦;𝖱 signatures is 𝖡𝖦|𝖱 signature that is degenerate on {𝖡,𝖦}: [00a00bcd0][00e00fgh0]=[agah0bgbh000ce+df]. Hence, we may reduce any chain 𝐆1,𝐆2,,𝐆k of 𝖲𝗐𝖺𝗉𝖡𝖦;𝖱 signatures of length k2 by matrix multiplication to a single 𝐆 if k is even and a length 2 chain 𝐆,𝐆k if k is odd, where 𝐆 is a 𝖡𝖦|𝖱 signature that is degenerate on {𝖡,𝖦}. In particular, 𝐆{𝖡,𝖦} is compatible with {𝖡,𝖦}. Therefore, we may assume that we have a signature grid Ω such that any 𝖲𝗐𝖺𝗉𝖡𝖦;𝖱 signature is connected to two 𝖡𝖦|𝖱 signatures. Now, suppose we gather each connected component of 𝖡𝖦|𝖱 signatures as a cluster, so that the connections between clusters are by 𝖲𝗐𝖺𝗉𝖡𝖦;𝖱 signatures. If we imagine a graph with vertices being the clusters and edges being the 𝖲𝗐𝖺𝗉𝖡𝖦;𝖱 signatures, then this graph must be bipartite. Otherwise, suppose there is an odd cycle of clusters C1,C2,,Ck,C1. In any nonzero assignment, each cluster can take only values from {𝖡,𝖦} or 𝖱. If C1 gets {𝖡,𝖦}, then C2 must have 𝖱 because of the 𝖲𝗐𝖺𝗉𝖡𝖦;𝖱 connection. Therefore, if there is an odd cycle, C1 will have an incoming 𝖱, resulting in a zero evaluation. Similar argument shows that an assignment of 𝖱 to C1 evaluates to zero.

Let the bipartition be LR. There are only two types of nonzero assignments: (1) all clusters in L get {𝖡,𝖦} and all clusters in R get 𝖱; (2) all clusters in L get 𝖱 and all clusters in R get {𝖡,𝖦}. For both types of assignments, the 𝖲𝗐𝖺𝗉𝖡𝖦;𝖱 signatures connecting a cluster CLL and CRR factors into two degenerate signatures. In particular, suppose 𝐆=[00a00bcd0] is a 𝖲𝗐𝖺𝗉𝖡𝖦;𝖱 signature connecting CL and CR. Let Ω be obtained from Ω by removing 𝐆 and connecting the unary (a,b,0) to CL and (0,0,1) to CR, as described in Figure 5. Then, since CL only takes values in {𝖡,𝖦} and CR only takes values in 𝖱, the sum of type (1) assignments is the same as the Holant value of Ω.

Figure 5: Factorization of 𝖲𝗐𝖺𝗉𝖡𝖦;𝖱 signature 𝐆=[00a00bcd0] in type (1) assignments.

Therefore, to evaluate the sum of type (1) assignments, we may factor all the 𝖲𝗐𝖺𝗉𝖡𝖦;𝖱 signatures in this way, evaluate in {𝖡,𝖦} domain Holant2 on L and assign 𝖱 to all of R, and multiply the two resulting values. Both can be done in polynomial time since {𝖡,𝖦} is assumed to be tractable. Similarly, we may compute the contribution of type (2) assignments, and the Holant value is just the sum of those two values.

4.3 Class

Suppose satisfies the conditions of by an orthogonal T. Let Ω be a T signature grid. If Ω does not use any signature from , then all signatures in Ω are EBD. Then, whenever there is an edge between two signatures with different support, the edge factors as pinning. For example, if there is an edge e between a signature 𝐅𝖡𝖦𝖡𝖦 and 𝐅𝖦𝖱𝖦𝖱, we may remove the edge and connect the unary (0,1,0) to both 𝐅𝖡𝖦 and 𝐅𝖦𝖱. This is because e can only take value 𝖦 in any nonzero assignment. Also, if there is a connection between any unary signature 𝐮 and a EBD signature supported on {i,j}, then we may replace 𝐮 with 𝐮{ij}. We obtain a new signature grid Ω after factoring all such edges, and each of the connected components of Ω is an instance of Holant2(ij) for some i,j{𝖡,𝖦,𝖱}. By assumption, the Holant value of each of the connected components can be computed in polynomial time.

Now, suppose Ω contains signatures from . We may replace those signatures by the corresponding scalar multiple in Oh. By the above, we may assume that in Ω, there is no edge between EBD signatures of different supports. First, we reduce any chain of signatures into a single binary signature in Oh. Reducing any connection of signature with a unary signature to a unary, we obtain a new grid Ω in which any signature is between two signatures from ij and ij. We imagine Ω is composed of clusters C where each cluster is a connected component of ij signatures for some i,j{𝖡,𝖦,𝖱}, and each cluster has outgoing edges of signatures.

Suppose 𝐆 is a self loop on a cluster C. As its two end points are from C and all signatures in C are EBD on the same {i,j}, we may replace 𝐆 with 𝐆{i,j} which is compatible with signatures in C by assumption, so we may absorb it into C.

Suppose 𝐆 connects two clusters C1 and C2 with supports {i1,j1} and {i2,j2} respectively. Suppose 𝐅1 and 𝐅2 are the signatures in C1 and C2 connected by 𝐆. Let the arity of 𝐅1 be n. We replace all the edges of 𝐅1, except the one connecting to 𝐆, with 𝐆1𝐆. Clearly, the Holant value is unchanged. The process is described in Figure 6 for arity 3 case. We now have 𝐆n𝐅1 connected directly to 𝐅2. If |supp𝐆n𝐅1supp𝐅2|1, the edge factors in to pinning. Otherwise, by the assumption, 𝐆n𝐅1 is compatible with 𝐅2, so we may absorb it into the C2 cluster.

We choose a cluster to begin with, and repeatedly absorb its neighboring signatures or factor the edge into pinning by the above process. Each step of the above process can be done in polynomial time, and the number of steps required is at most the number of edges in Ω. In the end, we will be left with multiple connected components in which all the signatures are EBD supported on the same domain, and their Holant2 values can be computed in polynomial time by the assumption.

Figure 6: Local holographic transformation.

5 Outline of Hardness

Figure 7: Logical dependency diagram: (n) refers to a dichotomy of Holant3(𝐅) for an arity-n signature 𝐅. (n,m) refers to a dichotomy of Holant3(𝐅,𝐆) of an arity-n signature 𝐅 and an arity-m signature 𝐆. ‘Set’ refers to the dichotomy of an arbitrary set of signatures.

After a dichotomy of a single ternary signature [15], a natural next step is proving a dichotomy of a pair of ternary and binary signatures (as binary signatures are the “simplest” signatures after unary signatures), and use it to prove further theorems. However, for domain size 3 in the Holant setting, binary signatures actually allow nontrivial, and somewhat unanticipated, interactions with other signatures. Also, it turns out that a dichotomy for a pair of binary and ternary signatures, while certainly needed on its own, is not easily applicable for showing further dichotomies. We circumvent this difficulty by proving a dichotomy of a pair of ternary signatures directly.

We describe the logical dependency of our proof in Figure 7. We start with the known dichotomy, Theorem 2.3, of a single ternary signature. We use it to show the dichotomy of a pair of ternary and binary signatures and a pair of ternary signatures. These two proofs can be found in the full version [12] and we note that they are independent of each other. To arrive at a dichotomy of a set of signatures, we also need to show a dichotomy for any single signature of arbitrary arity n4, which we show in Section 6. The remaining proof leading to a dichotomy of a set of signatures can be found in the full version [12].

The main intuition behind the proof of hardness is the geometry of the vectors in a tensor decomposition of a signature.

Figure 8: Geometric intuition of domain restriction.

We always start with a canonical form of a signature (after a suitable orthogonal transformation), for example, 𝐅=𝐞13+𝐞23. 𝐅 can realize (=𝖡𝖦) and take domain restriction to {𝖡,𝖦}. If the other signature is 𝐆=𝐮3+𝐯3 for orthogonal 𝐮,𝐯3, the domain restriction is 𝐆{𝖡,𝖦}=(projxy𝐮)3+(projxy𝐯)3. Essentially, most of the arguments boil down to showing that the angle between projxy𝐮 and projxy𝐯 must be π/2 (with one exception), otherwise, 𝐆{𝖡,𝖦} is #𝖯-hard by the Boolean domain dichotomy. The other tractable possibility is when projxy𝐮projxy𝐯, which can only happen if the plane that contains 𝐮 and 𝐯 contains the z-axis, which corresponds to the case when 𝐆{𝖡,𝖦} is degenerate.

Using this idea, we can prove the dichotomy of Holant3(𝐅,𝐆) in which 𝐅,𝐆 are ternary signatures. The individual statements can be found in the full version [12]. We can see that the statements are more complex when signatures are of rank 2. We define a notion of a plane of a rank 2 signature, which formalizes the idea behind Figure 4 and allows us to express the dichotomy succinctly. A rank 2 signature of type 𝔄 or type 𝔅 of Theorem 2.3 has a symmetric tensor decomposition such that the two vectors occurring inside it are orthogonal, i.e. 𝐯13+𝐯23 or (𝐯1+𝔦𝐯2)3+(𝐯1𝔦𝐯2)3. The two vectors are unique up to a scalar, so the plane of a signature 𝐅, denoted by P𝐅=span(𝐯1,𝐯2), is well defined.

Definition 5.1.

Let 𝐅 be a rank 2 signature over domain {𝖡,𝖦,𝖱} of type 𝔄 or type 𝔅. If 𝐅 is type 𝔄, we may write 𝐅=𝐯13+𝐯23. If 𝐅 is type 𝔅, we may write 𝐅=(𝐯1+𝔦𝐯2)3+(𝐯1𝔦𝐯2)3. We define the plane of 𝐅 as P𝐅=span(𝐯1,𝐯2).

Note that 𝐅 is EBD if and only if P𝐅 is one of the coordinate planes, i.e. xy-plane, yz-plane or xz-plane. We will say that two planes are orthogonal if their normal vectors are orthogonal. This notion is well defined because a normal vector to a plane in 3 dimensional space is unique up to a scalar. The following proposition can be shown with elementary linear algebra.

Proposition 5.2.

Let be a set of rank 2 signatures of type 𝔄 or type 𝔅. The following two statements are equivalent:

  1. 1.

    For any orthogonal T, there is some signature 𝐅T that is not EBD.

  2. 2.

    There exist 𝐅,𝐆 such that P𝐅 and P𝐆 are not equal or orthogonal.

The next lemma encapsulates the essence of the dichotomy theorems of two ternary signatures of rank 2, and extends it to an arbitrary set of rank 2 ternary signatures.

Lemma 5.3.

Let be a set of rank 2 signatures of type 𝔄 or type 𝔅. Suppose that for every orthogonal matrix T, neither of the following holds:

  1. 1.

    for all 𝐅T, 𝐅 is 𝖦𝖱|𝖡.

  2. 2.

    all signatures in T are EBD.

Then, Holant3() is #𝖯-hard.

The idea of viewing binary signatures as transformation on the signatures is naturally captured by the following construction. Let 𝒯 be a set of ternary signatures and be a set of binary signatures. Let =𝒯. Let be the monoid generated by under multiplication. We define 𝒪 to be

𝒪:={𝐆3𝐅:𝐅𝒯,𝐆,𝐆3𝐅 is non-degenerate}. (2)

Combinatorially, 𝒪 is the set of all gadgets constructible from connecting the same chain of binary signatures to the three edges of a ternary signature, (𝐆1𝐆2𝐆k)3𝐅 for some 𝐆i and 𝐅𝒯. It can also be viewed as the orbit (ignoring degenerate signatures) of 𝒯 under the monoid action of , where the action is defined by 𝐆:𝐅𝐆3𝐅 for 𝐆 and 𝐅𝒯. Note that 𝒢 is a set of symmetric ternary signatures, and if 𝐆 and 𝐅𝒪, then 𝐆3𝐅𝒪 as well.

To complete the proof of the dichotomy of Holant3(), we use Lemma 5.3 on Holant3(𝒪) to analyze . The details can be found in the full version [12].

6 A Single Signature Dichotomy

In this section, we prove a dichotomy of Holant3(𝐅) for an 𝐅 of arbitrary arity n. The case n3 was proved in [15]. Let n4. Similar to the Boolean domain case, it is natural to expect that higher arity tractable signatures also have the same tensor decomposition form, i.e. a𝐞1n+b𝐞2n+c𝐞3n or 𝜷n+𝜷¯n+λ𝐞3n for 𝜷=(1,𝔦,0) after some orthogonal transformation. We show that indeed this is the case.

The proof is an induction on the arity. Assume Holant3(𝐅) is not #P-hard. First, we show that 𝐅 of arity 4 must be of a suitable form, using the dichotomy of two ternary signatures. Then we show that arity 4 signatures must have a tensor decomposition of at most 3 linearly independent vectors. Then we argue that the dichotomy of two arity 4 signatures must take essentially the same form as the dichotomy of two ternary signatures. Finally, we generalize the proof to higher arities. The logical dependency is visualized in Figure 7.

6.1 Subspace of Signatures

Let 𝐅 be a real-valued symmetric signature of arity 4. Consider the set ={𝐅,𝐮:𝐮3}. Note that 𝐮𝐅,𝐮 is a linear map from 3 to the space of ternary real-valued symmetric signatures. We show a dichotomy for an arbitrary subspace of ternary real-valued signatures. For a nonempty , each ternary signature must be a tractable signature, otherwise the problem is already #𝖯-hard. We prove this dichotomy for a subspace by considering each canonical form such a tractable signature can take under an orthogonal T. Note that T is also a subspace. The exact statements can be found in Appendix B. We summarize the dichotomy statements: there exists an orthogonal T such that T is a subset of {a𝐞13+b𝐞23+c𝐞33:a,b,c} or {𝐆+λ𝐞33:λ,supp𝐆{𝖡,𝖦},𝐆{𝖡,𝖦} is type II}, or it is #𝖯-hard. We may prove the dichotomy of using the following three propositions and the dichotomy of two ternary signatures.

Proposition 6.1.

Let 𝐮2 be a nonzero vector. Let 𝐅=𝐯13+𝐯23 be a Boolean domain signature for nonzero 𝐯1,𝐯22 such that 𝐯1,𝐯2=0. Let 𝐆=𝐅+𝐮3. Then, Holant2(𝐅,𝐆) is #𝖯-hard unless 𝐮𝐯1 or 𝐮𝐯2.

Proposition 6.2.

Let (a,b)2 be a nonzero vector. Let 𝐅=𝛃3+𝛃¯3 be a Boolean domain signature where 𝛃=12(1,𝔦). Let 𝐆=𝐅+(a,b)3. Then, Holant2(𝐅,𝐆) is #𝖯-hard.

Proposition 6.3.

Let 𝐅 and 𝐆 be nondegenerate, real valued, symmetric, ternary signatures such that supp𝐅{𝖡,𝖦} and supp𝐆{𝖦,𝖱}. Let 𝐇=𝐅+𝐆. Then, Holant3(𝐅,𝐆,𝐇) is #𝖯-hard unless 𝐅,𝐆 are both GenEQ.

Proof.

Assume Holant3(𝐅,𝐆,𝐇) is not #𝖯-hard. Then, we may assume that Holant3(𝐅) and Holant3(𝐆) are tractable. We write 𝐅,𝐆,𝐇 as in Figure 9.

(a) 𝐅
(b) 𝐆
(c) 𝐇
Figure 9: 𝐅, 𝐆, and 𝐇=𝐅+𝐆.

We may realize (=𝖡𝖦) using 𝐅 and (=𝖦𝖱) using 𝐆.

Suppose d0, then Holant2(𝐆{𝖦,𝖱},𝐇{𝖦,𝖱}) is #𝖯-hard by Proposition 6.1 and Proposition 6.2 unless 𝐆 is GenEQ because 𝐇{𝖦,𝖱}=d𝐞13+𝐆{𝖦,𝖱}. If 𝐆 is GenEQ, then y,z=0 and thus it must be the case that x0 because otherwise 𝐆 is degenerate. Then, we may make the same argument on Holant2(𝐅{𝖡,𝖦},𝐇{𝖡,𝖦}), which implies that the only way to escape hardness is for 𝐅 to be GenEQ as well.

Therefore, we may assume that d,x=0. Then, since 𝐅 and 𝐆 are assumed to be nondegenerate, 𝐅 and 𝐆 cannot be GenEQ, so b and c cannot both be zero and y and z cannot both be zero. Consider a unary signature 𝐮=(p,q,r) for p,q,r to be determined later. Let

𝐇𝐮=𝐇,𝐮=[ap+bqbp+cq0bp+cqcp+yryq+zr0yq+zrzq+wr].

Regardless of the Boolean domain tractable type of 𝐅{𝖡,𝖦}, if y0, we can choose some p,q,r such that (𝐇𝐮){𝖡,𝖦}=[ap+bq,bp+cq,cp+yr] is not compatible with 𝐅{𝖡,𝖦} because bp+cq and cp+yr can be made to arbitrary values. Similarly, if c0, we can choose some p,q,r such that Holant2(𝐆{𝖦,𝖱},(𝐇𝐮){𝖦,𝖱}) is #𝖯-hard. If c,y=0, then it must be that b,z0. We have 𝐅{𝖡,𝖦}=[a,b,0,0] and 𝐆{𝖦,𝖱}=[0,0,x,y], and neither is a tractable signature. Therefore, Holant2(𝐅{𝖡,𝖦}) is #𝖯-hard, contrary to the assumption made in the beginning.

6.2 A Single Signature of Arity 4

Lemma 6.4.

Let 𝐅 be a nondegenerate, real-valued, symmetric signature of arity 4. Then, Holant3(𝐅) is computable in polynomial time if there exists some real orthogonal matrix T such that one of the following conditions holds. Otherwise, it is #𝖯-hard.

  1. 1.

    T4𝐅=a𝐞14+b𝐞24+c𝐞34 for some a,b,c.

  2. 2.

    T4𝐅=𝜷4+𝜷¯4+λ𝐞34 where 𝜷=12(1,𝔦,0) for some λ.

Proof.

The tractability follows since {𝐅} is in class 𝒟 for both cases.

Assume Holant3(𝐅) is not #𝖯-hard. Let ={𝐅,𝐮:𝐮3}. Then, is a vector space and Holant3()THolant3(𝐅), so we may apply the lemmas in Appendix B. We may assume that for any 𝐆, Holant3(𝐆) is tractable. Fix any 𝐆. We may apply a real orthogonal holographic transformation T such that 𝐆=T3𝐆 is of the canonical form. Note that 𝐆=T, and is a subspace of 𝖲3.

Let 𝐅=T4𝐅. We write 𝐅 by extending the notation of Figure 1 to arity 4 signatures.

Figure 10: 𝐅 and 𝐅,𝐞2.
Figure 11: A generic 𝖡𝖦|𝖱 signature.

We categorize the entries in Figure 11 in the following way. A corner entry is an entry at the corner of the triangle: a,l,p. An outer entry is an entry at the perimeter of the triangle: a,b,d,g,l,m,n,o,p,k,f,c. An inner entry is an entry at the inside of the triangle: e,h,j. The entries of a subsignature correspond to a smaller triangle. For example, the signature 𝐅,𝐞2 is the triangle given by the dashed lines in Figure 11. Note that 𝐅,𝐞i for all 1i3.

Suppose 𝐆 is a signature of rank 3 in type 𝔄. Then, by Lemma B.1, only contains GenEQ signatures. We claim that 𝐅 must be a GenEQ. This can be seen as follows. Note that a GenEQ signature has nonzero value at only the corner entries. The three subsignatures, 𝐅,𝐞i for 1i3 must all be a GenEQ. For that to be possible, only the corner entries can be nonzero. Therefore, 𝐅 is a GenEQ.

Suppose 𝐆 is a signature of rank 3 in type 𝔅. Then, by Lemma B.2, only contains 𝖡𝖦|𝖱 signatures that are type II on the domain {𝖡,𝖦} (see Definition A.1). If an internal entry is nonzero, then there is some subsignature that is not 𝖡𝖦|𝖱 (see Figure 11). Also, 𝐅 cannot have nonzero entries at the outer entries c,f,k,m,n,o, because that means there is a subsignature that is not 𝖡𝖦|𝖱. Therefore, all nonzero entries must be at the domain {𝖡,𝖦} part a,b,d,g,l and p. Further, [a,b,d,g,l] must satisfy the type II recurrence. This is because 𝐅,𝐞1, and thus (𝐅,𝐞1){𝖡,𝖦}=[a,b,d,g] satisfies a=d and b=g, and similarly, [b,d,g,f] satisfies b=g and d=f.

Now, suppose does not contain any signature of rank 3. If there is a signature of rank 2, we may apply the same arguments by using Lemma B.3 and Lemma B.4. The only difference is that p must be 0.

Suppose only contains rank 1 signatures. Then, by Lemma B.5, ={λ𝐯3:λ} for some 𝐯3. Then, 𝐅,𝐞i=λi𝐯3 for some λi, which can be used to show that 𝐅=λ𝐯4 for some λ by looking at the trinagular representation.

References

  • [1] Andrei Bulatov and Martin Grohe. The complexity of partition functions. Theor. Comput. Sci., 348(2):148–186, December 2005. doi:10.1016/j.tcs.2005.09.011.
  • [2] Andrei A. Bulatov. A dichotomy theorem for constraint satisfaction problems on a 3-element set. J. ACM, 53(1):66–120, January 2006. doi:10.1145/1120582.1120584.
  • [3] Andrei A. Bulatov. The complexity of the counting constraint satisfaction problem. J. ACM, 60(5), October 2013. doi:10.1145/2528400.
  • [4] Andrei A. Bulatov and Víctor Dalmau. Towards a dichotomy theorem for the counting constraint satisfaction problem. Inf. Comput., 205(5):651–678, May 2007. doi:10.1016/j.ic.2006.09.005.
  • [5] Jin-Yi Cai and Xi Chen. Complexity of counting CSP with complex weights. Journal of the ACM (JACM), 64:1–39, 2011.
  • [6] Jin-Yi Cai and Xi Chen. Complexity Dichotomies for Counting Problems. Cambridge University Press, 1 edition, 2017. doi:10.1017/9781107477063.
  • [7] Jin-Yi Cai, Xi Chen, and Pinyan Lu. Graph homomorphisms with complex values: A dichotomy theorem: (extended abstract). In Samson Abramsky, Cyril Gavoille, Claude Kirchner, Friedhelm Meyer Auf Der Heide, and Paul G. Spirakis, editors, Automata, Languages and Programming, volume 6198, pages 275–286. Springer Berlin Heidelberg, 2010. Series Title: Lecture Notes in Computer Science. doi:10.1007/978-3-642-14165-2_24.
  • [8] Jin-Yi Cai, Xi Chen, and Pinyan Lu. Nonnegative weighted #CSP: An effective complexity dichotomy. SIAM J. Comput., 45(6):2177–2198, January 2016. doi:10.1137/15M1032314.
  • [9] Jin-Yi Cai and Artem Govorov. Perfect matchings, rank of connection tensors and graph homomorphisms. Comb. Probab. Comput., 31(2):268–303, 2022. doi:10.1017/S0963548321000286.
  • [10] Jin-Yi Cai, Heng Guo, and Tyson Williams. A complete dichotomy rises from the capture of vanishing signatures. SIAM Journal on Computing, 45(5):1671–1728, 2016. doi:10.1137/15M1049798.
  • [11] Jin-Yi Cai, Heng Guo, and Tyson Williams. The complexity of counting edge colorings and a dichotomy for some higher domain Holant problems. Research in the Mathematical Sciences, 3(1):18, 2016. doi:10.1186/s40687-016-0067-8.
  • [12] Jin-Yi Cai and Jin Soo Ihm. Holant* dichotomy on domain size 3: A geometric perspective, 2025. arXiv:2504.14074.
  • [13] Jin-Yi Cai, Pinyan Lu, and Mingji Xia. Holant problems and counting CSP. In Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, STOC ’09, pages 715–724, New York, NY, USA, 2009. Association for Computing Machinery. doi:10.1145/1536414.1536511.
  • [14] Jin-Yi Cai, Pinyan Lu, and Mingji Xia. Computational complexity of Holant problems. SIAM Journal on Computing, 40(4):1101–1132, 2011. doi:10.1137/100814585.
  • [15] Jin-Yi Cai, Pinyan Lu, and Mingji Xia. Dichotomy for Holant problems with a function on domain size 3. In Proceedings of the Twenty-Fourth Annual ACM-SIAM Symposium on Discrete Algorithms, pages 1278–1295. Society for Industrial and Applied Mathematics, 2013. doi:10.1137/1.9781611973105.93.
  • [16] Jin-Yi Cai, Pinyan Lu, and Mingji Xia. Dichotomy for Holant* problems on the Boolean domain. Theory of Computing Systems, 64(8):1362–1391, 2020. doi:10.1007/s00224-020-09983-8.
  • [17] Pierre Comon, Gene Golub, Lek-Heng Lim, and Bernard Mourrain. Symmetric tensors and symmetric tensor rank. arXiv:0802.1681[math].
  • [18] Nadia Creignou and Miki Hermann. Complexity of generalized satisfiability counting problems. Inf. Comput., 125:1–12, 1996. doi:10.1006/INCO.1996.0016.
  • [19] Martin Dyer, Leslie Ann Goldberg, and Mark Jerrum. The complexity of weighted Boolean #CSP. SIAM Journal on Computing, 38(5):1970–1986, 2009. doi:10.1137/070690201.
  • [20] Martin Dyer and Catherine Greenhill. The complexity of counting graph homomorphisms. Random Struct. Algorithms, 17(3–4):260–289, October 2000. doi:10.1002/1098-2418(200010/12)17:3/4\%3C260::AID-RSA5\%3E3.0.CO;2-W.
  • [21] Martin E. Dyer and David Richerby. An effective dichotomy for the counting constraint satisfaction problem. SIAM J. Comput., 42(3):1245–1274, 2013. doi:10.1137/100811258.
  • [22] Michael H. Freedman, László Lovász, and Alexander Schrijver. Reflection positivity, rank connectivity, and homomorphism of graphs. Journal of the American Mathematical Society, 20:37–51, 2004.
  • [23] Leslie Ann Goldberg, Martin Grohe, Mark Jerrum, and Marc Thurley. A complexity dichotomy for partition functions with mixed signs. SIAM Journal on Computing, 39(7):3336–3402, 2010. doi:10.1137/090757496.
  • [24] Pavol Hell and Jaroslav Nesetril. Graphs and homomorphisms. In Oxford lecture series in mathematics and its applications, 2004.
  • [25] Yin Liu, Austen Z. Fan, and Jin-Yi Cai. Restricted holant dichotomy on domain sizes 3 and 4. Theoretical Computer Science, 1023:114931, 2025. doi:10.1016/j.tcs.2024.114931.
  • [26] László Lovász. Operations with structures. Acta Mathematica Academiae Scientiarum Hungarica, 18:321–328, 1967.
  • [27] Shuai Shao and Jin-Yi Cai. A dichotomy for real Boolean Holant problems. In 2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS), pages 1091–1102, 2020. doi:10.1109/FOCS46700.2020.00105.
  • [28] Leslie G. Valiant. Accidental algorthims. In Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science, FOCS ’06, pages 509–517, USA, 2006. IEEE Computer Society. doi:10.1109/FOCS.2006.7.

Appendix A Boolean Domain Dichotomy Theorem

Definition A.1 (Definition 2.9 in [6]).

A signature [x0,x1,,xn], where n2, has type I(a,b), if there exist a and b (not both 0), such that axk+bxk+1=axk+2 for 0kn2. We say it it is of type II, if xk=xk+2 for 0kn2.

Theorem A.2 (Theorem 2.12 in [6]).

Let be a set of nondegenerate symmetric signatures over in Boolean variables. Then Holant2() is computable in polynomial time for the following three classes of . In all other cases, Holant2() is #𝖯-hard.

  1. 1.

    Every signature in is of arity 2.

  2. 2.

    There exists a and b (not both 0, depending only on ), such that every signature in either (1) has type I(a,b) or (2) has arity 2 and is of the form [2aλ,bλ,2aλ].

  3. 3.

    Every signature in either (1) has type II or (2) has arity 2 and is of the form [λ,0,λ].

Appendix B Subspace of Signatures

Let 𝖲3 denote the set of all real-valued symmetric ternary signatures. We list the dichotomy statements of Holant3() for a subspace 𝖲3. The complete proof can be found in the full version [12].

Lemma B.1.

Let be a subspace of 𝖲3. Suppose 𝐅=c1𝐞13+c2𝐞23+c3𝐞33 for nonzero c1,c2,c3. Then, Holant3() is #𝖯-hard unless every 𝐆 is a GenEQ.

Lemma B.2.

Let be a subspace of 𝖲3. Suppose 𝐅=c(𝛃3+𝛃¯3)+λ𝐞33 where 𝛃=12(1,𝔦,0) and nonzero c,λ. Then, Holant3() is #𝖯-hard unless every 𝐆 is such that 𝐆 is 𝖡𝖦|𝖱 and 𝐆{𝖡,𝖦}=[x,y,x,y] for some x,y.

Lemma B.3.

Let be a subspace of 𝖲3 such that all signatures in are of rank at most 2. Suppose 𝐅=c1𝐞13+c2𝐞23 for nonzero c1,c2. Then, Holant3() is #𝖯-hard unless every 𝐆 is d1𝐞13+d2𝐞23 for some d1,d2.

Lemma B.4.

Let be a subspace of 𝖲3 such that all signatures in are of rank at most 2. Suppose 𝐅=𝛃3+𝛃¯3 where 𝛃=12(1,𝔦,0). Then, Holant3() is #𝖯-hard unless every 𝐆 is such that supp𝐆{𝖡,𝖦} and 𝐆{𝖡,𝖦}=[x,y,x,y] for some x,y.

Lemma B.5.

Let be a subspace of 𝖲3 such that all signatures in are of rank at most 1. Then, there exists some 𝐯3 such that 𝐅={λ𝐯3:λ}.