Abstract 1 Introduction 2 Lower bounds in large fields of positive characteristic References

New Bounds for the Ideal Proof System in Positive Characteristic

Amik Raj Behera ORCID University of Copenhagen, Denmark Nutan Limaye ORCID IT University of Copenhagen, Denmark Varun Ramanathan ORCID Tata Institute of Fundamental Research, Mumbai, India Srikanth Srinivasan ORCID University of Copenhagen, Denmark
Abstract

In this work, we prove upper and lower bounds over fields of positive characteristics for several fragments of the Ideal Proof System (IPS), an algebraic proof system introduced by Grochow and Pitassi (J. ACM 2018). Our results extend the works of Forbes, Shpilka, Tzameret, and Wigderson (Theory of Computing 2021) and also of Govindasamy, Hakoniemi, and Tzameret (FOCS 2022). These works primarily focused on proof systems over fields of characteristic 0, and we are able to extend these results to positive characteristic.

The question of proving general IPS lower bounds over positive characteristic is motivated by the important question of proving 𝖠𝖢0[p]-Frege lower bounds. This connection was observed by Grochow and Pitassi (J. ACM 2018). Additional motivation comes from recent developments in algebraic complexity theory due to Forbes (CCC 2024) who showed how to extend previous lower bounds over characteristic 0 to positive characteristic.

In our work, we adapt the functional lower bound method of Forbes et al. (Theory of Computing 2021) to prove exponential-size lower bounds for various subsystems of IPS. In order to establish these size lower bounds, we first prove a tight degree lower bound for a variant of Subset Sum over positive characteristic. This forms the core of all our lower bounds.

Additionally, we derive upper bounds for the instances presented above. We show that they have efficient constant-depth IPS refutations. This demonstrates that constant-depth IPS refutations are stronger than the proof systems considered above even in positive characteristic. We also show that constant-depth IPS can efficiently refute a general class of instances, namely all symmetric instances, thereby further uncovering the strength of these algebraic proofs in positive characteristic.

Keywords and phrases:
Ideal Proof Systems, Algebraic Complexity, Positive Characteristic
Category:
Track A: Algorithms, Complexity and Games
Funding:
Amik Raj Behera: Supported by Srikanth Srinivasan’s start-up grant from the University of Copenhagen.
Nutan Limaye: Supported by Independent Research Fund Denmark (grant agreement No. 10.46540/ 3103-00116B) and is also supported by the Basic Algorithms Research Copenhagen (BARC), funded by VILLUM Foundation Grant 54451.
Varun Ramanathan: Supported by the Department of Atomic Energy, Government of India, under project number RTI400112. A part of the work was done when the author was visiting the University of Copenhagen and was supported by the European Research Council (ERC) under grant agreement no. 101125652 (ALBA).
Srikanth Srinivasan: Supported by the European Research Council (ERC) under grant agreement no. 101125652 (ALBA).
Copyright and License:
[Uncaptioned image] © Amik Raj Behera, Nutan Limaye, Varun Ramanathan, and Srikanth Srinivasan; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Algebraic complexity theory
Related Version:
Full Version: https://eccc.weizmann.ac.il/report/2025/079/
Acknowledgements:
We would like to thank Iddo Tzameret for his feedback and for sharing information about the independent work of Elbaz, Govindasamy, Lu, and Tzameret. NL thanks Tuomas Hakoniemi and Iddo Tzameret for several discussions on IPS proof systems.
Editors:
Keren Censor-Hillel, Fabrizio Grandoni, Joël Ouaknine, and Gabriele Puppis

1 Introduction

Propositional Proof Systems

A proof system consists of a set of axioms and inference rules. The goal is to start with the given set of axioms and apply the inference rules repeatedly to prove theorems (tautologies) within the proof system. A proof system is sound if it proves only true statements and it is complete if it proves all true statements. The area of Propositional Proof Complexity aims to understand the strength of different proof systems in the propositional setting. In a foundational work, Cook and Reckhow [10] showed that if we could prove that there exist tautologies such that they require exponential proof size (i.e., vaguely the number of times different inference rules are applied in the proof) in any proof system, then it would resolve the famous NP vs. coNP question in computational complexity theory.

Apart from the connection to this central question in complexity theory, understanding the power of different proof systems is also fundamental to mathematical reasoning. This has motivated a lot of research in the area for the last five decades. (See for instance these reference texts for more context [22, 9, 21].) There are many different kinds of propositional proof systems based on the set of axioms they start with and the kind of inference rules they are allowed to use. In this work, we will focus on algebraic proof systems. In algebraic proof systems, propositional tautologies are expressed as an unsatisfiable set of polynomial equations and the inference rules are algebraic, i.e. they involve reasoning based on polynomial arithmetic.

The study of algebraic proof systems originates from the work of Beame, Impagliazzo, Krajíček, Pitassi, and Pudlák [4] who introduced the Nullstellensatz proof system (based on Hilbert’s Nullstellensatz). Their work was followed by the work of Clegg, Edmonds, and Impagliazzo [8] who introduced Polynomial Calculus as a dynamic variant of the Nullstellensatz proof system. Over the years, substantial work on these proof systems has helped us get a good understanding of their power in terms of complexity measures such as sparsity and degree [4, 7, 29, 15, 20, 6, 1].

However, as noted in [13], sparsity and degree only roughly capture the complexity of algebraic proofs. More recently, Grochow and Pitassi [17] proposed the Ideal Proof System (IPS) as a natural generalization of these well-studied algebraic proof systems such as Polynomial Calculus and Nullstellensatz proof systems. In the last decade, several papers studied this proof system. (See for instance [17, 26, 13, 14, 19].) This has allowed us to understand many other aspects of algebraic proofs, such as proof size and proof depth.

In this paper, we extend this line of work. Specifically, we revisit some of the known upper and lower bounds for Ideal Proof Systems over characteristic 0 and show similar bounds over fields of any characteristic111In all the results mentioned here, when we say that a result holds over characteristic 0, it in fact holds over large enough characteristic as well..

1.1 Ideal Proof Systems

We start by describing the general setup for an algebraic (static222In the literature, the following type of proof system is often referred to as a static proof system. There are other algebraic proof systems, where the proof is presented line-by-line and those are known as dynamic proof systems. Here, we will only discuss static proof systems.) proof system. Let 𝐱 denote the set of variables {x1,x2,,xn}. We are given a set of polynomial axioms f1(𝐱),f2(𝐱),,fm(𝐱) 𝔽[𝐱] and the goal is to show that there is no 0-1 assignment to the variables such that it simultaneously satisfies {f1(𝐱)=0,f2(𝐱)=0,,fm(𝐱)=0} over 𝔽. To force a common Boolean solution, the set of axioms is appended with additional axioms, {xi2xi=0}i[n] for i[n]. These are called the Boolean axioms.

Based on Hilbert’s Nullstellensatz, we know that if {f1(𝐱)=0,f2(𝐱)=0,,fm(𝐱)=0} {xi2xi=0}i[n] are simultaneously not satisfiable, then such a refutation333The words “proofs” and “refutations” are treated interchangeably in this paper. What we will be “proving” is a statement that “refutes” the existence of a common solution to a system of equations. can be given by polynomials A1(𝐱),A2(𝐱),,Am(𝐱) and B1(𝐱),B2(𝐱),,Bn(𝐱) such that

i[m]Ai(𝐱)fi(𝐱)+i[n]Bi(𝐱)(xi2xi)=1. (1)

The complexity of such a proof can be defined using complexity parameters of the polynomials {Ai(𝐱)} and {Bi(𝐱)}. In the case of the Ideal Proof System, Grochow, and Pitassi proposed that we assume that Ai(𝐱),Bi(𝐱)𝔽[𝐱] are computed by algebraic circuits. (See Section 1.3 for the formal definition.) Based on this, they defined complexity measures such as circuit size and circuit depth of IPS.

This proof system in its full generality is known to be quite strong. Specifically, it can polynomially simulate Extended Frege [17], which is one of the most powerful among well-studied propositional proof systems. Additionally, the same work also showed that proving lower bounds for this proof system would also imply strong algebraic circuit lower bounds, which is also a very challenging problem.

In light of this (and other reasons explained below), many restricted variants of the IPS have been studied. Let 𝒞 be a class of polynomials. Then, a 𝒞-IPS refutation is an IPS-refutation wherein {Ai(𝐱)}i[m] and {Bi(𝐱)}i[n] belong to the class 𝒞. Forbes, Shpilka, Tzameret, and Wigderson [13], as well as Govindasamy, Hakoniemi, and Tzameret [14], considered different classes of polynomials, for example, the class of polynomials computed by read-once oblivious algebraic branching programs (roABPs), by multilinear formulas, or by constant-depth algebraic formulas. They proved upper and lower bounds on the size of (some variants of) 𝒞-IPS refutations over characteristic 0.

1.2 Motivation

We extend these works and prove similar bounds in arbitrary characteristic. Our work is motivated by the following important strands of research in proof complexity.

IPS-refutations and AC𝟎[𝒑]-Frege

A long-standing open question in proof complexity, open for almost three decades [23], is to prove superpolynomial lower bounds against AC0[p]-Frege proof systems, i.e., a proof system in which the lines of the proof are constant-depth Boolean circuits that use modular gates. In the late 80s, Razborov [28] and Smolensky [33, 34] resolved the Boolean circuit lower bound question for AC0[p], but the corresponding proof complexity question has proved to be elusive.

Over the years, several attempts have been made to resolve this question. The most relevant to our work is the result by Grochow and Pitassi [17, Theorem 3.5] which showed that constant-depth-IPS over characteristic p can efficiently simulate AC0[p]-Frege proofs. This means that proving superpolynomial lower bounds against constant-depth-IPS refutations will give superpolynomial lower bounds against AC0[p]-Frege. This gives a strong motivation to prove IPS lower bounds over small characteristics.

Functional lower bounds over any characteristic

Building on the work of [17], [13] further explored the power of IPS refutations. They proposed a concrete approach towards proving size lower bounds for IPS refutations via functional lower bounds (further explained in Section 1.4). Their method was inspired by the notion of functional lower bounds in in Boolean circuit complexity [16, 12]. They demonstrated the promise of their method by proving several lower bounds for different fragments of IPS.

For example, the strong algebraic complexity lower bounds known for roABPs [25] and multilinear formulas [27] follow from understanding the evaluation dimension complexity measure in these models. Since this measure is essentially functional in nature, [13] used it to successfully prove lower bounds for 𝒞-IPS when 𝒞 is a class of read-once branching programs or multilinear formulas. Their bounds are over characteristic 0.

This approach of [13] was further adapted by Govindasamy, Hakoniemi, and Tzameret [14] to prove superpolynomial lower bounds against (multilinear) constant-depth-IPS refutations. Their proof builds on some of the key components of the superpolynomial lower bound against constant-depth algebraic circuits by Limaye, Srinivasan, and Tavenas. The latter lower bound of [24] only worked over characteristic 0; for this and other reasons, the result of [14] was also limited to characteristic 0. In a recent paper, however, Forbes [11] improved the circuit lower bound result of [24] and proved the same444Some parameters in the lower bound by [24] were subsequently improved by [5] and [11] achieves those improved parameters. lower bound over any characteristic.

In light of these results, the next obvious step is to prove the lower bounds of [13, 14] over any characteristic. We achieve that in this work.555The subset-sum instances from [13, 14] are not always unsatisfiable over fields of positive characteristic; this requires that we tweak their instances to ensure unsatisfiability. Barring these changes, we qualitatively match their lower bounds over fields of positive characteristic.

1.3 Our results

To describe our results, we start with the formal definitions of IPS refutations and its variants.

Definition 1 (IPS proof systems [17, 13]).

Let f1,,fm𝔽[x1,,xn] be a system of unsatisfiable polynomials over the Boolean cube {0,1}n. In other words, there is no Boolean assignment 𝐚{0,1}n to the variables x1,,xn so that fi(𝐚)=0 for all i[m].

Given a class of algebraic circuits 𝒞, a 𝒞-IPS refutation of the system of equations defined by f1,,fm is an algebraic circuit C𝒞 in variables x1,,xn,y1,,ym,z1,,zn such that

  1. 1.

    C(𝐱,𝟎,𝟎)=0, and

  2. 2.

    C(𝐱,f1,,fm,x12x1,,xn2xn)=1.

The size of the refutation is the size of the circuit C.

Further, if the circuit C has individual degree at most 1 in the variables 𝐲 and 𝐳, then we say that C is a 𝒞-IPSLIN refutation. If the circuit C has individual degree at most 1 in the variables 𝐲 (but not necessarily in 𝐳), then C is said to be a 𝒞-IPSLIN refutation.

Finally, we say that a circuit C𝒞 is a multilinear 𝒞-IPSLIN refutation if additionally C(𝐱,𝐲,𝟎) is a multilinear polynomial in the variables 𝐱𝐲.

 Remark 2.

We mostly employ the above definition in the case that m=1, i.e. the case when we have a single polynomial equation that is unsatisfiable over the Boolean cube. Further, while our upper bound results are proved in the more restrictive 𝒞-IPSLIN proof system, our lower bounds results hold in the setting of the stronger 𝒞-IPSLIN proof systems.

We also recall some standard notions about polynomials and algebraic models of computation, which will be useful below.

Multilinear and symmetric polynomials

A polynomial f(𝐱)𝔽[x1,,xn] is a multilinear if the individual degree is at most 1. For a polynomial f(𝐱), the multilinearization operator, denoted by 𝗆𝗅[], changes for each variable xj and any k, every occurrence of xjk in f(𝐱) to xj.

A polynomial f(𝐱)𝔽[x1,,xn] is said to be a symmetric polynomial if the polynomial remains invariant under any permutation of the input variables. For a degree parameter 0dn, the dth elementary symmetric polynomial en,d(x1,,xn) is defined to be the following multilinear polynomial en,d(x1,,xn)=S[n]|S|=diSxi. Whenever n is clear from the context, we will denote the dth elementary symmetric polynomial by ed(𝐱).

Algebraic models of computation

We recall definitions of some of the standard models of computation relevant to our results.

Algebraic circuits and formulas. An algebraic circuit is a directed acyclic graph in which each node either computes a sum (or a linear combination) of its inputs, or a product of its inputs. The leaf nodes are either variables or constants. The size of an algebraic circuit is the number of edges in the circuit, and the depth of an algebraic circuit is the longest path from the output node (a sink) to a leaf node (a source). An algebraic formula is an algebraic circuit where the output of each node feeds into at most another node; in other words, the underlying graph of an algebraic formula is a tree. An algebraic formula is a multilinear formula if every gate of the formula computes a multilinear formula.

Sparse polynomials and constant-depth circuits. The class consists of depth-2 formulas with an addition gate in the top layer and multiplication gates in the bottom (second) layer. All the gates have unbounded fan-in. formulas essentially compute polynomials in the sparse representation i.e. as a sum of monomials. In general, a constant-depth algebraic circuit has O(1) alternating layers of additional and multiplication gates.

Read-Once Oblivious Algebraic Branching Programs. A read-once oblivious algebraic branching program in the variable-order π𝒮n666𝒮n denotes the set of all permutation of [n]. is a directed acyclic graph whose vertices are partitioned into n layers V0={s},V1,V2,,Vn={t}. For each i{1,2,,n}, there are edges directed from layer Vi1 to Vi that are labelled by univariate polynomials in the variable xπ(i). For each s-to-t path p, the polynomial computed by p is defined to be product of the edge labels on p. The polynomial computed by the roABP is defined as the sum of polynomials computed by all s-to-t paths. The width of an roABP is max0in|Vi| i.e. the size of the largest layer of vertices.

For more background on these models of computation, please refer to one of the standard surveys in algebraic complexity ([32],[30]).

1.3.1 Lower bounds over positive characteristic

We start by stating our lower bound results.

Theorem 3 (Lower bounds for sparse-IPSLIN in positive characteristic).

The following holds for any large enough n. Let p be any prime number. Let k such that pk>2Ω(n). There exist αi𝔽pk and β𝔽p2k𝔽pk such that

  1. 1.

    The polynomial f=i[n]αixiβ has no Boolean satisfying assignment.

  2. 2.

    Any sparse-IPSLIN refutation777Note that sparse-IPSLIN (a weaker system than sparse-IPSLIN) is equivalent to the Nullstellensatz proof system of [4]. of f must have size at least 2Ω(n)

Note that the hard instance above is a sparse polynomial. We show that it has no small sparse refutation over positive characteristic.

Theorem 4 (Lower bounds for fixed-order roABP in positive characteristic).

The following holds for any large enough n. Let p be any prime number. Let k such that pk>2Ω(n). There exist αi𝔽pk and β𝔽p2k𝔽pk such that

  1. 1.

    The polynomial f=i[n]αixiyiβ has no Boolean satisfying assignment.

  2. 2.

    Any roABP-IPSLIN refutation of f in any order of variables where 𝐱 variables come before 𝐲 variables, must have width 2Ω(n).

To obtain lower bounds against more powerful models such as roABP-IPSLIN with respect to any order, or multilinear formulas, [13] used a slightly modified hard instance. We also use an instance the same as theirs up to the choice of coefficients.

Theorem 5 (Lower bounds for any order roABP-IPSLIN and multilinear-formula-IPSLIN).

The following holds for any large enough n. Let p be any prime number. Let k such that pk>2Ω(n). There exist αi,j𝔽pk and β𝔽p2k𝔽pk such that

  1. 1.

    The polynomial f=1i<jnαi,jzi,jxixjβ has no Boolean satisfying assignment.

  2. 2.

    Any roABP-IPSLIN refutation of f must have size at least 2Ω(n).

  3. 3.

    Moreover, any multilinear-formula-IPSLIN refutation of f must have size at least nΩ(logn) and for Δ=o(logn/loglogn), any product-depth888The product-depth of a circuit is the maximum number of product gates appearing in any leaf-to-root path.-Δ multilinear-formula-IPS refutation requires size nΩ(1Δ2(nlogn)1/Δ).

Again notice that, f is a sparse polynomial and hence has a polynomial size roABP. It is also efficiently computable by a multilinear formula.

In general, in Boolean proof complexity, it is typical that the hard-to-refute instances are themselves easy to compute. In algebraic proof complexity, there are some lower bound results that do not have this property. That is, the instances that are hard to refute are also hard to compute. For example, the set of results obtained by the approach of multiples in [13, Theorem 1.18, Theorem 1.19, Theorem 1.20] and in a paper by Andrews and Forbes [3]. Additionally, in a recent work, Hakoniemi, Limaye, and Tzameret [19] presented instances that were hard to refute for roABP-IPSLIN and for multilinear-formula-IPSLIN over any characteristics, i.e., similar to what we prove here. However, unfortunately, their instances were hard to compute and specifically, they could not be computed by roABP or by multilinear formulas. Hence, our result here have the best of both the worlds; the lower bounds hold over any characteristic and the hard instances are easy to compute.

Theorem 6 (Lower bounds for multilinear constant-depth-IPSLIN in positive characteristic).

The following holds for any large enough n. Let p be any prime and let k be large enough so that pk>2Ω((logn)2). There exist αi,j,k,𝔽pk and β𝔽p2k𝔽pk such that

  1. 1.

    The polynomial f=1i<j<k<nαi,j,k,zi,j,k,xixjxkxβ has no Boolean satisfying assignment.

  2. 2.

    Any multilinear constant-depth-IPSLIN refutation of f must have size nω(1).

The characteristic 0 (or large characteristic) version of the above theorem was presented in [14]. Their lower bound is a step towards constant-depth-IPS lower bounds. Our result above can thus be thought of as another step forward in the right direction. Moreover, our input instance is the same as the input instance in Theorem 1 [14] up to the choice of coefficients, and it is easy to compute (while being hard to refute). More specifically, it is computable by polynomial-sized constant-depth multilinear formulas.

 Remark 7.

In all our results, the field characteristic is arbitrary, but the field size is quite large, i.e., pk is either exponential or superpolynomial. This setting is non-trivial because the field elements have polynomial bit complexity. Other results in the area, such as the work of Alekseev, Grigoriev, Hirsch, and Tzameret [2] similarly use polynomial constraints with coefficients from exponentially large domains. Specifically [2] study a variant of the subset sum instance, called the Binary Value Principle, i[n]2i1xi+1=0 in the context of IPS proof systems in fields of characteristic zero.

It is an interesting open question to prove similar IPS lower bounds over finite fields of small size. Unfortunately, as we show below, this forces the polynomial instances to become more complicated. See Section 1.5 for recent independent work that makes progress in this direction.

1.3.2 Upper bounds over positive characteristic

A natural question for hard instances above is: what is the weakest proof system in which they are efficiently refutable? In personal communication, Tzameret observed that the above instances were refutable by constant-depth-IPSLIN hence showing that these proof systems can be exponentially more succinct than their multilinear counterpart. The theorem below shows that the above polynomials have efficient constant-depth-IPSLIN refutations, even in the setting of positive characteristic.

Theorem 8 (Upper bounds for (non-multilinear) constant-depth-IPSLIN).

Fix a prime number p. The following holds for any natural numbers n and k.
Let f𝔽[x1,,xn] be any polynomial with sparsity s and degree D with coefficients from the field 𝔽pk and let β be any element of 𝔽𝔽pk where 𝔽 is a field extension of 𝔽pk.
Then,

  1. 1.

    The polynomial f(𝐱)β has no satisfying assignment over the Boolean cube {0,1}n

  2. 2.

    There is a constant-depth-IPSLIN refutation of degree O(kpD) and size poly(s,p).

Note that since β𝔽pk, the polynomial f(𝐱)β does not have a zero over {0,1}n (in fact it does not have a solution over 𝔽pkn). So the first item of above follows immediately.

 Remark 9.

Suppose the characteristic p is a fixed prime independent of the number of variables n.

  1. 1.

    Theorem 8 shows that the exponential field size in Theorem 3, Theorem 4 and Theorem 5 is not an artifact of the proofs.999Suppose the field 𝔽pk is not large enough, say, k=o(n). Then there is a refutation of degree d=O(kpD), which is o(n) when p and D are constants. In particular, the sparsity of the refutation is at most (n+dd), which is 2o(n) when d=o(n).. For fields of subexponential size, the polynomials in these theorems have refutations of degree o(n) and in particular have roABP-IPSLIN refutations of size 2o(n). 101010When the characteristic p is a growing function of n, this argument breaks down. It might be possible to get rid of the exponential field size.

  2. 2.

    Theorem 8 also shows that the multilinearity assumption in Theorem 6 is not an artifact of the proof. Non-multilinear proofs, even over large fields, allow efficient constant-depth refutations for sparse instances.

Our final result shows a constant-depth upper bound for multilinear and symmetric systems of polynomials, i.e. systems defined by polynomials f(x1,,xn) of the form d=1nαden,d+α0 where en,d denotes the elementary symmetric polynomial of degree d in variables x1,,xn. Such polynomial systems have been employed in [13] to prove lower bounds against restricted systems of constant-depth-IPSLIN. Our results imply that general constant-depth circuit refutations can be exponentially more succinct than these restricted families, even for positive characteristic.

Theorem 10 (Upper bounds for multilinear symmetric systems).

Fix a field 𝔽. Let f1,,fm𝔽[x1,,xn] be a family of multilinear and symmetric polynomials with no common Boolean solution i.e. there does not exist a 𝐱{0,1}n such that each fi(𝐱)=0. This system has a constant-depth-IPSLIN refutation of size 𝒪(m2n5logn) and depth 8.

1.4 Proof techniques

Lower bounds

Our proof uses the functional lower bound method introduced by [13], which can be described as follows. We know that a 𝒞-IPSLIN refutation for f(𝐱) consists of A(𝐱), Bi(𝐱)𝔽[𝐱] such that

f(𝐱)A(𝐱)+i[n](xi2xi)Bi(𝐱)=1,

where A(𝐱),B1(𝐱),,Bn(𝐱) belong to 𝒞. As f(𝐱) is unsatisfiable over the Boolean hypercube, this implies that over the Boolean hypercube, A(𝐱) is a well-defined reciprocal of f(𝐱). Hence, to show that A(𝐱) cannot belong to 𝒞, it is enough to show that any polynomial that agrees with 1/f(𝐱) cannot be computed by 𝒞. That is, the problem of proving a lower bound on the size of 𝒞-IPSLIN is reduced to proving a functional lower bound for 1/f(𝐱).

At the heart of such a functional lower bound lies a degree lower bound, i.e., a lower bound on the degree of f~(𝐱), where f~(𝐱) and f(𝐱) are related. In fact, f(𝐱) is a lifted version of f~(𝐱). Once we have such a degree lower bound for f~(𝐱), we can apply proof ideas from algebraic complexity theory such as the rank-based lower bound methods. These methods allow for the degree lower bounds for f~(𝐱) to be lifted to size lower bounds for f(𝐱).

For their machinery to work over positive characteristic, we prove a positive characteristic version of the degree lower bound (see Lemma 17 for the formal statement). In the case of the lower bound argument in [13], it was important to obtain a tight degree lower bound of exactly n. They needed it for the next step, i.e., lifting, to work. In our case, we show that such a degree lower bound holds with high probability (over the choice of coefficients of the hard instance). Once we have the degree lower bound, the rest of the lower bound proof works similar to the proof by [13]. Please refer to the full version for all the proofs.

Constant-depth upper bounds

We start by describing the main ideas in the proof of Theorem 8. Here, we proceed in two steps. First, we observe that for any sparse polynomial of degree d, we can flatten it to a linear polynomial by renaming the monomials by fresh variables. Our hard instance is indeed sparse, hence the observation can be used to rewrite the polynomial as a linear polynomial over a fresh set of variables.

Now, consider a linear polynomial L(𝐱)β such that L(𝐱)=α1x1+α2x2++αnxn, where α1,,αn𝔽pk for some k and prime p and β𝔽𝔽pk such that it is not satisfiable over 0-1 assignments.

To prove that the polynomial has a refutation over constant-depth circuits, we first prove that for every j, Lj(𝐱)=α1pjx1+α2pjx2++αnpjxnβpj can be expressed as a multiple of L(𝐱) modulo the ideal 𝐱p𝐱, which is a shorthand for the ideal generated by {xipxi}i[n].

We then observe that for j=k, Lk(𝐱)L(𝐱) is a non-zero constant and use this observation to construct small depth circuits for the refutation of L(𝐱)β. Throughout, we use some standard but useful tricks available to positive characteristic fields. Please refer to the full version for all the proofs.

Upper bounds for symmetric polynomials

Now we discuss the proof outline for Theorem 10. For ease of exposition, we explain the ideas for the case of m=1 in Theorem 10, i.e. there is one multilinear symmetric polynomial f(𝐱) that does not have a solution over the Boolean cube {0,1}n. Suppose 𝔽 has characteristic p>0. Any symmetric polynomial is a polynomial of the n elementary symmetric polynomials111111This follows from the Fundamental Theorem of Symmetric Polynomials. i.e. e1(𝐱),,en(𝐱). However, if we restrict to the Boolean cube {0,1}n, then any symmetric polynomial is a polynomial of just 𝒪(logn) elementary symmetric polynomials. Let 𝐞^(𝐱) denotes the tuple of those 𝒪(logn) elementary symmetric polynomials.

Let F(𝐲) be the 𝒪(logn) variate polynomial such that F(𝐲)𝐞^(𝐱) agrees with f(𝐱) on the Boolean cube {0,1}n. The Boolean cube {0,1}n is mapped to 𝔽p𝒪(logn) under the map 𝐞^(𝐱) because char(𝔽)=p. The unsatisfiability of f(𝐱) over the Boolean cube {0,1}n implies the unsatisfiability of F(𝐲) over 𝔽p𝒪(logn). Applying Hilbert’s Nullstellensatz Theorem (see Theorem 15) on the unsatisfiability121212To capture the restriction of 𝔽pn, we add n univariate polynomials, each of which vanishes on one coordinate of 𝔽pn. of F(𝐲) over 𝔽p𝒪(logn), we get a low-variate Nullstellensatz certificate (it is a Nullstellensatz certificate in just 𝒪(logn) variables)131313Loosely speaking, one can imagine this as a “dimension reduction” of our problem. The symmetric structure of f(𝐱) led us to convert a problem in n variables to a problem in just 𝒪(logn) variables.. The coefficients of this low-variate Nullstellensatz certificate can be computed via poly(n)-sized constant-depth circuits. This follows from the fact that we are working over constant characteristic. Refer to the diagram below for a schematic representation of what we discussed so far.

Next we “lift” the Nullstellensatz back to the n variables (x1,,xn). To do so, we plug-in 𝐞^(𝐱) in place of 𝐲. Observe that this substitution by 𝐞^(𝐱) preserves the size and the depth of the coefficients of the low-variate Nullstellensatz certificate because of the Ben-Or’s construction (see Theorem 12).
It remains to prove via constant-depth circuits that F(𝐞^(𝐱)) agrees with f(𝐱) on the Boolean cube, i.e. F(𝐞^(𝐱))f(𝐱) lie in the ideal (𝐱2𝐱). Here “to prove in constant-depth circuits” refers to giving a certificate for the ideal membership whose coefficients can be computed by constant-depth circuits. More precisely, we want to prove that there exists polynomials Bj(𝐱)’s which have poly(n)-sized constant-depth circuits such that

F(𝐞^(𝐱))=f(𝐱)+j=1nBj(𝐱)(xj2xj).

This is the key step in our proof. To prove this, it suffices to prove the following special case.

Lemma 11.

Let =𝒪(logn) and fix an arbitrary sequence (α1,,α) where each αi[n]. There exist polynomials Bj(𝐱)’s such that

i=1eαi(𝐱)=𝗆𝗅[i=1eαi(𝐱)]+j=1nBj(𝐱)(xj2xj),

and each polynomial Bj(𝐱) can be computed by a poly(n)-sized constant-depth circuit.

Please refer to the full version for all the proofs.

1.5 Related work

In an independent work, Elbaz, Govindasamy, Lu, and Tzameret (personal communication) consider related questions. Using the recent lower bound of Forbes [11], which proves the positive characteristic version of the constant-depth formula lower bound of [24], they obtain lower bounds for fragments of the IPS over finite fields of any size.

1.6 Preliminaries

In this subsection, we present a few more definitions and standard facts on polynomials that will be used in our proofs later on.
For a polynomial f(x1,,xn), the individual degree of f is an integer D such that for all i[n], the degree of f when viewed as a univariate polynomial in the variable xi is at most D.
A classical and beautiful construction of Ben-Or shows that every elementary symmetric polynomial can be computed by poly(n)-sized constant-depth circuits.

Theorem 12 (Ben-Or’s construction for elementary symmetric polynomials).

(See [31, Theorem 5.1]). Let 𝔽 be a field with |𝔽|>n. Then for every d[n], the dth elementary symmetric polynomial ed(x1,,xn) has a circuit of size 𝒪(n2) and depth 3 (a ΣΠΣ circuit).
More particularly, for any choice of (n+1) distinct elements γ1,,γn+1𝔽 and for every k[n], there exists coefficients ck,i’s such that

ek(𝐱)=i=1n+1ck,ij=1n(1+γixj)
Theorem 13 (Polynomial Identity Lemma).

(See [18, Lemma 9.2.2]). Let 𝔽 be an arbitrary field. Let f(𝐱) be a nonzero polynomial of degree at most d and let S𝔽. If we choose 𝐚Sn uniformly at random, then:

Pr𝐚Sn[f(𝐚)=0]d|S|

For a natural number k and variables (z1,,zn), we will use (𝐳k𝐳) to denote the following ideal (𝐳k𝐳):=(z1kz1,,znkzk)𝔽[z1,,zn].
Next we recall the definition of an ideal and a variety, and then we state Hilbert’s Nullstellensatz.

Definition 14 (Ideal and Variety).

Fix any field 𝔽 and consider the commutative ring 𝔽[x1,,xn]. For a set of polynomials f1,,fm𝔽[𝐱], the ideal generated by fi’s, denoted by (f1,,fm) is defined as:

(f1,,fm)={h𝔽[𝐱]|g1,,gm𝔽 such that h=i=1mgifi}.

For a set of polynomials f1,,fm𝔽, their variety, denoted by 𝕍(f1,,fm) is a subset of the algebraic closure of 𝔽¯n, defined as:

𝕍(f1,,fm)={𝐚𝔽¯n|f1(𝐚)==fm(𝐚)=0}.

Now we state Hilbert’s Nullstellensatz which essentially says that if a set of polynomials do not have a common zero, then there exists “witness” for this, i.e. one can express 1 as a polynomial combination of fi’s.

Theorem 15 (Hilbert’s Nullstellensatz).

Fix any field 𝔽. Let f1,,fm𝔽[x1,,xn] be a set of multivariate polynomials such that they do not have any common zeros over the algebraic closure of 𝔽. Then the constant 1 lies in the ideal (f1(𝐱),,fm(𝐱)). In other words, there exists polynomials A1,,Am𝔽[x1,,xn] such that

A1(𝐱)f1(𝐱)++Am(𝐱)fm(𝐱)= 1.

Strictly speaking, Hilbert’s Nullstellensatz guarantees that the polynomials Ais are in 𝔽¯[𝐱] (𝔽¯ is the algebraic closure of 𝔽). However, the above statement also follows easily by observing that we can solve for Ai’s by solving a system of linear equations over 𝔽. Throughout this article, we will refer to (A1(𝐱),,Am(𝐱)) as a Nullstellensatz certificate141414There are infinitely many Nullstellensatz certificates for a system {f1,,fm}. To see this, suppose m=2 and let (A1,A2) be a Nullstellensatz certificate. Then for any polynomial g𝔽[𝐱], (A1+gf2,A2gf1) is also a Nullstellensatz certificate. for the system {f1(𝐱),,fm(𝐱)}. We will also refer to Ai’s as coefficients because if we take a polynomial combination of fi’s with Ai’s being the coefficients, then we can generate 1.

2 Lower bounds in large fields of positive characteristic

In this section, we will prove size lower bounds for several fragments of IPS over positive characteristic. As explained in Section 1.3.1, we start by proving a tight degree lower bound (Lemma 17) over positive characteristic. Using our positive characteristic variant of the degree lower bound, we then recover the lower bound results from [13] and [14] over positive characteristic.

2.1 Degree lower bounds over large fields of arbitrary characteristic

For any 𝐚{0,1}n, we use |𝐚| to denote its Hamming weight. For any 𝐚=(a1,,an){0,1}n and any subset of indices S[n], we use 𝐚S to denote iSai. All the statements in this section work over fields of arbitrary characteristic.

First, we state a standard fact about multilinear polynomials, which will be useful in the main lemma.

Fact 16.

Let f(𝐱)=S[n]λS𝐱S be a multilinear polynomial on n variables. Then,

λ[n]=𝐚{0,1}n(1)|𝐚|f(𝐚)

The next lemma is our main degree lower bound which shows that a multilinear polynomial for the inverse of a random linear form will have maximal degree. While similar statements have been observed in the literature (e.g. [15, Proposition 2]), we give an explicit proof for the sake of completeness.

Lemma 17.

Let 𝔽 and 𝔽 be fields such that 𝔽 is a strict subfield of 𝔽. Let n be a natural number and let 𝐱 denote the tuple of variables (x1,,xn). Fix any β𝔽𝔽. For any 𝛂=(α1,,αn)𝔽n, let f𝛂(𝐱) be the unique multilinear polynomial that agrees with the function

1i=1nαixiβ

on the Boolean cube {0,1}n. Let S𝔽 be any finite subset of the field. Then, for a uniformly random 𝛂Sn:

Pr𝜶Sn[degf𝜶(𝐱)=n]12n1|S|
Proof.

By Fact 16, the coefficient of 𝐱[n] in f𝜶(𝐱) is 𝐚{0,1}n(1)|𝐚|f𝜶(𝐚), or equivalently,

V[n](1)|V|1(iVαi)β

Based on the above expression, we define the rational function λ[n](𝐳) as follows.

λ[n](𝐳):=V[n](1)|V|1(iVzi)β

We will use N(𝐳) and D(𝐳) to denote the numerator and denominator of λ[n](𝐳). For any S[n], we will use LS(𝐳) to denote iSzi. It follows that

N(𝐳) =V[n](1)|V|T[n]:TV(LT(𝐳)β)
D(𝐳) =V[n](LV(𝐳)β)

Since β𝔽𝔽, D(𝜶)0 for any 𝜶𝔽. If we prove that N(𝐳) is a non-zero polynomial, then by the Polynomial Identity Lemma (Theorem 13), for any finite subset S𝔽, Pr𝜶Sn[N(𝜶)0]12n1|S|, which implies that Pr𝜶Sn[λ[n](𝜶)0]12n1|S|, and thus proves the theorem. Thus, it is enough to prove that some monomial in N(𝐳) has non-zero coefficient.

For V, T[n]:TV(LT(𝐳)β) has degree at most 2n2 since L(𝐳)β will not increase the degree. The term T(LT(𝐳)β) syntactically contributes monomials of degree 2n1 from TLT(𝐳) , but is possible that these coefficients vanish if the field 𝔽 is of positive characteristic. We will show that there is a monomial of degree 2n1 with coefficient 1, and thus this monomial will survive over any field.

Claim 18.

The coefficient of the monomial151515The same proof works for any monomial i=1nzσ(i)2i1, where σ is an arbitrary permutation on [n]. i=1nzi2i1 in T(LT(𝐳)β) is 1.

Proof sketch..

We would like to count the number of ways of collecting variables from each LT(𝐳) to construct the required monomial. We first observe (via a simple counting argument) that for every i[n], the number of subsets T[n] such that {j[n]:j>i}T=, and iT, is 2i1. Moreover, for each i[n], if 𝒯i is the collection of subsets with the above properties, then we observe that 𝒯i𝒯j= for all ij, i[n], j[n].

With these observations, it inductively follows that for each i[n], conditioned on the degree of variables zn,,zi+1 being correct (i.e. zj2j1), there is exactly one way of ensuring that the degree of zi is 2i1: for each T that is one of the 2i1 subsets satisfying the properties of the above observation, select the zi’s from LT(𝐳).

The next lemma proves a stronger version of the previous lemma: for a random linear form, the inverse of every restriction of the linear form (by setting some variables to 0) will have maximal degree. It follows from the previous lemma and an union bound.

Lemma 19.

Let 𝔽 and 𝔽 be fields such that 𝔽 is a strict subfield of 𝔽. Let n be a natural number and let 𝐱 denote the tuple of variables (x1,,xn). Fix any β𝔽𝔽. For any U[n], let f𝛂,U(𝐱) be the unique multilinear polynomial that agrees with the function

1iUαixiβ

on the Boolean cube {0,1}n. Let S𝔽 be a finite subset of the field. Then, for an 𝛂Sn chosen uniformly at random:

Pr𝜶Sn[ a non-empty U[n]:degf𝜶,U(𝐱)<|U|]U[n]2|U|1|S|<22n|S|

In particular, with probability at least 1(22n/|S|) over the choice of 𝛂Sn, for every U[n], the leading monomial of f𝛂,U(𝐱) is ciUxi for some c𝔽{0}.

2.2 Constant-depth multilinear 𝐈𝐏𝐒𝐋𝐈𝐍 lower bounds over large fields of arbitrary characteristic

In [14], Govindasamy, Hakoniemi, and Tzameret prove super polynomial lower bounds against constant-depth multilinear IPSLIN refutations of the subset sum variant

i,j,k,l[n]zi,j,k,lxixjxkxlβ

In particular, they prove the following theorem.

Theorem 20 (Constant-depth functional lower bounds [14]).

Let n,Δ+ with Δ𝒪(logloglogn) and assume that char(𝔽)=0. Let f be the multilinear polynomial such that

f=1i,j,k,l[n]zi,j,k,lxixjxkxlβ

over the Boolean cube. Then, any circuit of product-depth Δ computing f has size at least

n(logn)exp(𝒪(Δ))

We prove the same statement for large fields of arbitrary characteristic. Our proof exactly follows the structure of [14]. Their proof requires the char𝔽=0 condition for two reasons:

  1. 1.

    They use the results of Limaye, Srinivasan, and Tavenas [24], which gave superpolynomial lower bounds against constant-depth circuits over any field 𝔽 with char(𝔽)=0 or greater than the degree d of the hard polynomial. In particular, they use the result that over fields with char(𝔽)=0 or greater than d, any low-degree set-multilinear polynomial computed by a constant-depth circuit can also be computed by a set-multilinear constant-depth circuit.161616They also use other ideas from [24] such as relative rank, word polynomial, etc., but those ideas do not require any restrictions on the characteristic of the underlying field.

  2. 2.

    They use the degree lower bound for the multilinear representation of 1/(i[n]xiβ), proved by Forbes, Shpilka, Tzameret, and Wigderson [13].

To deal with the first requirement, we use the recent beautiful result of Forbes [11], which extends the results of [24] to arbitrary fields. In particular, we will use the following statement from [11], which says that the set-multilinear projection of a constant-depth circuit can be efficiently computed by a constant-depth circuit over arbitrary fields.

Theorem 21.

[11, Corollary 27]. Let 𝔽 be an arbitrary field. Let 𝐱=𝐱1𝐱2𝐱d be a partition of the variables 𝐱. Suppose f can be computed by a size s product-depth Δ arithmetic circuit. Then the set-multilinear projection of f (the restriction of f to monomials that are set-multilinear with respect to the specified partition) can be computed by a size poly(s,Θ(dlogd)d)-size circuit of product-depth 2Δ.

To deal with the second requirement, we use our degree lower bound from Lemma 19, which works for arbitrary fields of exponential size i.e. there is no restriction on the characteristic of the field.

Overview of [14]
  1. 1.

    Using the word polynomials framework of [24], construct a knapsack polynomial ks𝐰 (for a partition given by a word wd) with the property that the set-multilinear projection of 1ks𝐰 over the Boolean cube requires superpolynomially large set-multilinear constant-depth circuits.

  2. 2.

    Consider a degree-4 subset-sum variant f(𝐳,𝐱):=i,j,k,lzi,j,k,lxixjxkxlβ so that for the word wd that will be used to instantiate the previous point, there exists an assignment of some of the variables in 𝐳, 𝐱 that maps f(𝐳,𝐱) to ks𝐰 (upto a renaming of variables).

  3. 3.

    If there is a multilinear polynomial computing 1/f(𝐳,𝐱) over {0,1}n that has a small constant-depth circuit, then there is a multilinear polynomial computing 1/ks𝐰 over {0,1}n that has a small constant-depth circuit. Moreover by the set-multilinearization of [24], there is a small set-multilinear constant-depth circuit computing the set-multilinear projection of 1/ks𝐰.

  4. 4.

    Combining the first point with the contrapositive of the third point, conclude that any multilinear polynomial computing 1/f(𝐳,𝐱) over {0,1}n requires superpolynomially large constant-depth circuits. The multilinear constant-depth IPSLIN lower bound follows.

In [14], the proof for the hardness of 1ks𝐰 requires the underlying field to be of large characteristic essentially because it requires the degree lower bound from [13], which requires large characteristic. To make Theorem 20 work over fields of positive characteristic, we will employ our degree lower bound from Lemma 19 with a variant of the knapsack polynomial; the rest of the proof remains the same as that of Theorem 20. To provide the necessary details, we first describe the construction of the knapsack polynomial. Then, we state the particular claim from [14] that uses the degree lower bound from [13]. Finally, we show how our degree lower bound Lemma 19 fits into the rest of the proof.

Constructing the knapsack polynomial

We shall now recall the definitions required for defining the hard polynomial in [14] via the word polynomials template of [24].

Let 𝐰d be an arbitrary word. For any S[d], let w|S denote the subword of w indexed by the set S. Consider the sequence X¯(w)=(X(w1),,X(wd)) of sets of variables. Define the positive indices and negative indices of 𝐰 as:

P𝐰:={i[d]:wi0} and N𝐰:={i[d]:wi<0}

Let any iP𝐰, the variables of X(wi) will be of the form xσ(i), where σ is a binary string indexed by the set:

A𝐰(i):=[iP𝐰i<iwi+1,iP𝐰iiwi]

We will call these sets positive indexing sets. The size of each A𝐰(i) is |wi|. The number of strings in A𝐰(i) is 2|wi|.
For iN𝐰, we similarly define the negative indexing sets B𝐰(i) that will be used to index the variables of X(wi) for iN𝐰.
A word wd is balanced if:

  1. 1.

    iP𝐰jN𝐰 such that A𝐰(i)B𝐰(j) (i.e. jN𝐰 is a witness that 𝐰 is balanced at iP𝐰)

  2. 2.

    jN𝐰iP𝐰 such that A𝐰(i)B𝐰(j) (i.e. iP𝐰 is a witness that 𝐰 is balanced at jN𝐰)

For any iP𝐰,σ{0,1}A𝐰(i), define:

fσ(i):=jN𝐰A𝐰(i)B𝐰(j)σj{0,1}B𝐰(j)σj(k)=σ(k)kA𝐰(i)B𝐰(j)yσj(j) (2)

The product ranges over each jN𝐰 that witnesses the fact that 𝐰 is balanced at i. The sum ranges over each σj that is consistent with σ on A𝐰(i)B𝐰(j). Now, we define the knapsack polynomial as

ks𝐰:=(iP𝐰σ{0,1}A𝐰(i)xσ(i)fσ(i))β (3)

where β𝔽 is any field element such that ks𝐰 has no Boolean roots. To make the proof work over fields of positive characteristic, we define a variant of ks𝐰 as:

ks𝐰,𝜶:=(iP𝐰αiσ{0,1}A𝐰(i)xσ(i)fσ(i))β (4)

where 𝜶=(αi)iP𝐰𝔽|P𝐰|, and β will be chosen from an extension field 𝔽~𝔽 so that ks𝐰,𝜶 has no Boolean roots.

For any word 𝐰d, M𝐰(f) denotes the matrix with rows indexed by all monomials m that are set-multilinear over 𝐰|P𝐰, and columns indexed by all monomials m that are set-multilinear over 𝐰|N𝐰. For each such pair of monomials (m,m), the corresponding entry in M𝐰(f) carries the coefficient of mm in f. To show that the set-multilinear projection of any multilinear polynomial f computing 1/ks𝐰 over {0,1}n requires superpolynomially large set-multilinear constant-depth circuits, [14] shows that M𝐰(f) is full-rank.

Lemma 22 (Rank lower bound lemma (Lemma 6 [14])).

Let 𝐰d be a balanced word, and let f be the multilinear polynomial such that f=1ks𝐰 over {0,1}n. Then, M𝐰(f) is full-rank.

With this lemma, the lower-bound follows via the arguments from [24]. Importantly for us, this lemma uses the degree lower bound from [13]; we describe a sketch of the same.

The use of degree lower bound in [14]

Suppose f=mgm(𝐱)m, where the sum runs over all multilinear monomials m in the 𝐲 variables, and gm(𝐱) is some multilinear polynomial in the 𝐱 variables. They show that for any m which is set-multilinear on 𝐰|N𝐰, the leading monomial of gm(𝐱) is the set-multilinear monomial m on positive variables such that σ(m) is consistent with σ(m) ([14] describes this formally). For each monomial m that is set-multilinear on 𝐰|N𝐰, the leading monomial of gm(𝐱) turns out to be a different set-multilinear monomial on the positive variables, and together, these leading monomials span the space of all set-multilinear monomials on the positive variables. This makes M𝐰(f) full-rank. To get a handle on gm(𝐱) (for m being a monomial on 𝐰|N𝐰, consisting only of 𝐲 variables), [14] sets all the variables in m to 1 and all the 𝐲 variables outside m to 0. They call this transformation τm. For the proof of Lemma 22, an important requirement is that:

For every TN𝐰 and for every set-multilinear monomial m on 𝐰|T, the leading monomial of τm(f) is iUTxσi(i), which is the product of all the variables that show up in the denominator of 1τm(ks𝐰)=1iUTxσ(i)(i)β where UT={iP𝐰:A𝐰(i)B𝐰T}, and for each iP𝐰, σ(i) is the unique indexing string that agrees with σ(m) on A𝐰(i), the ith positive indexing set.

This requirement is satisfied due to the degree lower bound from [13], which requires the field to be of characteristic 0. The proof in [14] includes helpful figures and the reader is encouraged to refer to the paper.
Let us recall our variant of ks𝐰:

ks𝐰,𝜶:=(iP𝐰αiσ{0,1}A𝐰(i)xσ(i)fσi)β (5)

where 𝜶=(αi)iP𝐰𝔽|P𝐰|. To prove Theorem 20 in positive characteristic, we use the following lemma that follows by a union bound over all TN𝐰 and all set-multilinear monomials on 𝐰|T, on top of Lemma 17.

Lemma 23.

Let d be a natural number and 𝐰d be a balanced word. Let m=|P𝐰|. For any 𝛂=(α1,,αm)𝔽m, TN𝐰 and any mT that is a set-multilinear monomial on 𝐰|T, let f𝛂,T,mT(𝐱) be the unique multilinear polynomial that agrees with the function

τmT(1ks𝐰,𝜶)=1iUTαixσ(i)(i)β

on the Boolean cube, where β𝔽 is chosen so that ks𝐰,𝛂 has no Boolean roots, and UT={iP𝐰:A𝐰(i)B𝐰T}. Let S𝔽 be a finite subset of the field. Let γ:=|N𝐰|+iN𝐰|wi|. Then, for an 𝛂Sm chosen uniformly at random:

Pr𝜶Sm[TN𝐰,mT:degf𝜶,T,mT(𝐱)<|UT|]<2γ+m|S|

In particular, with probability at least 1(2γ+m/|S|) over the choice of 𝛂Sm, for every choice of TN𝐰 and set-multilinear monomial mT over 𝐰|T, the leading monomial of f𝛂,T,mT(𝐱) is ciUTxσi(i) for some c𝔽{0}.

Proof.

The number of TN𝐰 is 2|N𝐰|. The number of set-multilinear monomials on 𝐰|T for any TN𝐰 is 2iT|wi|, which is at most 2iN𝐰|wi| . For any fixed TN𝐰 and mT that is a set-multilinear monomial on 𝐰|T, Lemma 17 implies that for an 𝜶Sm chosen uniformly at random:

Pr𝜶Sm[degf𝜶,T,mT(𝐱)<|UT|]<2m|S|

Applying a union bound over all TN𝐰 and mT implies that for an 𝜶Sm chosen uniformly at random:

Pr𝜶Sm[TN𝐰,mT:degf𝜶,T,mT(𝐱)<|UT|]<TN𝐰,mT2m|S|2γ+m|S|

With this lemma, the rest of the proof of [14] works out verbatim. We state the final theorem, which is a version of Theorem 20 for finite fields of positive characteristic.

Theorem 24 ([14] over positive characteristic).

Let n,Δ+ with Δ𝒪(logloglogn). Let p be any prime. Let 𝔽~ be a field of characteristic p and size p2k, where k is the smallest integer that satisfies pk>2C(logn)2 for an absolute constant C1171717This C is a fixed constant that depends on the exact choice of parameters in the proof of [14]. Let β be an arbitrary element in 𝔽~𝔽, where 𝔽 denotes the subfield of size pk. For any 𝛂𝔽n4, Let f𝛂 be the multilinear polynomial such that

f=1i,j,k,l[n]αi,j,k,lzi,j,k,lxixjxkxlβ

over the Boolean cube. Then, there exists an 𝛂𝔽n4 such that any circuit of product-depth Δ computing f𝛂 has size at least

n(logn)exp(𝒪(Δ))
The reason for |𝔽|>𝟐𝛀((𝐥𝐨𝐠𝒏)𝟐) in Theorem 24.

When we instantiate Lemma 23 inside the proof of Theorem 24, the parameter d, which is the number of variable sets, will be O(logn), and the word 𝐰d will also be chosen so that for each i[d], |wi|O(logn). Thus, iN𝐰|wi|=O((logn)2), and the union bound in Lemma 23 will require the field to be larger than 2O((logn)2).

References

  • [1] M. Alekhnovich and A.A. Razborov. Lower bounds for polynomial calculus: non-binomial case. In Proceedings 42nd IEEE Symposium on Foundations of Computer Science, pages 190–199, 2001. doi:10.1109/SFCS.2001.959893.
  • [2] Yaroslav Alekseev, Dima Grigoriev, Edward A. Hirsch, and Iddo Tzameret. Semi-algebraic proofs, ips lower bounds, and the τ-conjecture: can a natural number be negative? In Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, STOC 2020, pages 54–67, New York, NY, USA, 2020. Association for Computing Machinery. doi:10.1145/3357713.3384245.
  • [3] Robert Andrews and Michael A. Forbes. Ideals, determinants, and straightening: proving and using lower bounds for polynomial ideals. In Proceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2022, pages 389–402, New York, NY, USA, 2022. Association for Computing Machinery. doi:10.1145/3519935.3520025.
  • [4] Paul Beame, Russell Impagliazzo, Jan Krajíček, Toniann Pitassi, and Pavel Pudlák. Lower bounds on hilbert’s nullstellensatz and propositional proofs. Proceedings of the London Mathematical Society, s3-73(1):1–26, 1996. doi:10.1112/plms/s3-73.1.1.
  • [5] C.S. Bhargav, Sagnik Dutta, and Nitin Saxena. Improved lower bound, and proof barrier, for constant depth algebraic circuits. ACM Trans. Comput. Theory, 16(4), November 2024. doi:10.1145/3689957.
  • [6] Sam Buss, Dima Grigoriev, Russell Impagliazzo, and Toniann Pitassi. Linear gaps between degrees for the polynomial calculus modulo distinct primes. Journal of Computer and System Sciences, 62(2):267–289, 2001. doi:10.1006/jcss.2000.1726.
  • [7] Samuel R. Buss, Russell Impagliazzo, Jan Krajícek, Pavel Pudlák, Alexander A. Razborov, and Jirí Sgall. Proof complexity in algebraic systems and bounded depth frege systems with modular counting. Comput. Complex., 6(3):256–298, 1997. doi:10.1007/BF01294258.
  • [8] Matthew Clegg, Jeffery Edmonds, and Russell Impagliazzo. Using the groebner basis algorithm to find proofs of unsatisfiability. In Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, STOC ’96, pages 174–183, New York, NY, USA, 1996. Association for Computing Machinery. doi:10.1145/237814.237860.
  • [9] Peter Clote and Evangelos Kranakis. Boolean Functions and Computation Models. Texts in Theoretical Computer Science. An EATCS Series. Springer, 2002. doi:10.1007/978-3-662-04943-3.
  • [10] Stephen A. Cook and Robert A. Reckhow. The relative efficiency of propositional proof systems. Journal of Symbolic Logic, 44(1):36–50, 1979. doi:10.2307/2273702.
  • [11] Michael A. Forbes. Low-Depth Algebraic Circuit Lower Bounds over Any Field. In Rahul Santhanam, editor, 39th Computational Complexity Conference (CCC 2024), volume 300 of Leibniz International Proceedings in Informatics (LIPIcs), pages 31:1–31:16, Dagstuhl, Germany, 2024. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.CCC.2024.31.
  • [12] Michael A. Forbes, Mrinal Kumar, and Ramprasad Saptharishi. Functional Lower Bounds for Arithmetic Circuits and Connections to Boolean Circuit Complexity. In Ran Raz, editor, 31st Conference on Computational Complexity (CCC 2016), volume 50 of Leibniz International Proceedings in Informatics (LIPIcs), pages 33:1–33:19, Dagstuhl, Germany, 2016. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.CCC.2016.33.
  • [13] Michael A. Forbes, Amir Shpilka, Iddo Tzameret, and Avi Wigderson. Proof complexity lower bounds from algebraic circuit complexity. Theory Comput., 17:1–88, 2021. doi:10.4086/TOC.2021.V017A010.
  • [14] Nashlen Govindasamy, Tuomas Hakoniemi, and Iddo Tzameret. Simple hard instances for low-depth algebraic proofs. In 2022 IEEE 63rd Annual Symposium on Foundations of Computer Science (FOCS), pages 188–199, 2022. doi:10.1109/FOCS54457.2022.00025.
  • [15] D. Grigoriev. Tseitin’s tautologies and lower bounds for nullstellensatz proofs. In Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280), pages 648–652, 1998. doi:10.1109/SFCS.1998.743515.
  • [16] Dima Grigoriev and Alexander A. Razborov. Exponential lower bounds for depth 3 arithmetic circuits in algebras of functions over finite fields. Applicable Algebra in Engineering, Communication and Computing, 10:465–487, 2000. doi:10.1007/S002009900021.
  • [17] Joshua A. Grochow and Toniann Pitassi. Circuit complexity, proof complexity, and polynomial identity testing: The ideal proof system. J. ACM, 65(6), November 2018. doi:10.1145/3230742.
  • [18] Venkatesan Guruswami, Atri Rudra, and Madhu Sudan. Essential Coding Theory. 2023. Available online: https://cse.buffalo.edu/faculty/atri/courses/coding-theory/book/web-coding-book.pdf. URL: https://cse.buffalo.edu/faculty/atri/courses/coding-theory/book/web-coding-book.pdf.
  • [19] Tuomas Hakoniemi, Nutan Limaye, and Iddo Tzameret. Functional lower bounds in algebraic proofs: Symmetry, lifting, and barriers. In Proceedings of the 56th Annual ACM Symposium on Theory of Computing, STOC 2024, pages 1396–1404, New York, NY, USA, 2024. Association for Computing Machinery. doi:10.1145/3618260.3649616.
  • [20] Russell Impagliazzo, Pavel Pudlák, and Jirí Sgall. Lower bounds for the polynomial calculus and the gröbner basis algorithm. Comput. Complex., 8(2):127–144, 1999. doi:10.1007/s000370050024.
  • [21] J. Krajíček. Proof Complexity. Encyclopedia of Mathematics and its Applications. Cambridge University Press, 2019. URL: https://books.google.dk/books?id=uOyKuQEACAAJ.
  • [22] Jan Krajícek. Bounded arithmetic, propositional logic, and complexity theory, volume 60 of Encyclopedia of mathematics and its applications. Cambridge University Press, 1995. doi:10.1017/CBO9780511529948.
  • [23] Jan Krajíček. A reduction of proof complexity to computational complexity for 𝖠𝖢0[p] frege systems. Proceedings of the American Mathematical Society, 143(11):4951–4965, 2015. URL: http://www.jstor.org/stable/24507779.
  • [24] Nutan Limaye, Srikanth Srinivasan, and Sébastien Tavenas. Superpolynomial lower bounds against low-depth algebraic circuits. In 2021 IEEE 62nd Annual Symposium on Foundations of Computer Science (FOCS), pages 804–814, 2021. doi:10.1109/FOCS52979.2021.00083.
  • [25] Noam Nisan. Lower bounds for non-commutative computation. In Proceedings of the Twenty-Third Annual ACM Symposium on Theory of Computing, STOC ’91, pages 410–418, New York, NY, USA, 1991. Association for Computing Machinery. doi:10.1145/103418.103462.
  • [26] Toniann Pitassi and Iddo Tzameret. Algebraic proof complexity: progress, frontiers and challenges. ACM SIGLOG News, 3(3):21–43, August 2016. doi:10.1145/2984450.2984455.
  • [27] Ran Raz. Multi-linear formulas for permanent and determinant are of super-polynomial size. J. ACM, 56(2), April 2009. doi:10.1145/1502793.1502797.
  • [28] Alexander A. Razborov. Lower bounds on the size of bounded depth circuits over a complete basis with logical addition. Mathematical notes of the Academy of Sciences of the USSR, 41:333–338, 1987. URL: https://api.semanticscholar.org/CorpusID:121744639.
  • [29] Alexander A. Razborov. Lower bounds for the polynomial calculus. Comput. Complex., 7(4):291–324, 1998. doi:10.1007/s000370050013.
  • [30] Ramprasad Saptharishi. A survey of lower bounds in arithmetic circuit complexity. Github survey, 2021. URL: https://github.com/dasarpmar/lowerbounds-survey/releases/tag/v9.0.3.
  • [31] Amir Shpilka and Avi Wigderson. Depth-3 arithmetic circuits over fields of characteristic zero. Comput. Complex., 10(1):1–27, 2001. doi:10.1007/PL00001609.
  • [32] Amir Shpilka and Amir Yehudayoff. Arithmetic circuits: A survey of recent results and open questions. Foundations and Trends® in Theoretical Computer Science, 5(3–4):207–388, 2010. doi:10.1561/0400000039.
  • [33] Roman Smolensky. Algebraic methods in the theory of lower bounds for boolean circuit complexity. Proceedings of the nineteenth annual ACM symposium on Theory of computing, 1987. URL: https://api.semanticscholar.org/CorpusID:2214101.
  • [34] Roman Smolensky. On representations by low-degree polynomials. Proceedings of 1993 IEEE 34th Annual Foundations of Computer Science, pages 130–138, 1993. doi:10.1109/SFCS.1993.366874.