Abstract 1 Introduction 2 Preliminaries 3 Operator CSP 4 Overview of results and techniques References Appendix A Proof of Lemma 5

Satisfiability of Commutative vs. Non-Commutative CSPs

Andrei A. Bulatov ORCID School of Computing Science, Simon Fraser University, Burnaby, Canada Stanislav Živný ORCID Department of Computer Science, University of Oxford, UK
Abstract

The Mermin-Peres magic square is a celebrated example of a system of Boolean linear equations that is not (classically) satisfiable but is satisfiable via linear operators on a Hilbert space of dimension four. A natural question is then, for what kind of problems such a phenomenon occurs? Atserias, Kolaitis, and Severini answered this question for all Boolean Constraint Satisfaction Problems (CSPs): For 0-Valid-SAT, 1-Valid-SAT, 2-SAT, Horn-SAT, and Dual Horn-SAT, classical satisfiability and operator satisfiability is the same and thus there is no gap; for all other Boolean CSPs, these notions differ as there are gaps, i.e., there are unsatisfiable instances that are satisfiable via operators on Hilbert spaces.

We generalize their result to CSPs on arbitrary finite domains and give an almost complete classification: First, we show that NP-hard CSPs admit a separation between classical satisfiability and satisfiability via operators on finite- and infinite-dimensional Hilbert spaces. Second, we show that tractable CSPs of bounded width have no satisfiability gaps of any kind. Finally, we show that tractable CSPs of unbounded width can simulate, in a satisfiability-gap-preserving fashion, linear equations over an Abelian group of prime order p; for such CSPs, we obtain a separation of classical satisfiability and satisfiability via operators on infinite-dimensional Hilbert spaces. Furthermore, if p=2, such CSPs also have gaps separating classical satisfiability and satisfiability via operators on finite- and infinite-dimensional Hilbert spaces.

Keywords and phrases:
constraint satisfaction, quantum CSP, operator CSP
Category:
Track A: Algorithms, Complexity and Games
Funding:
Andrei A. Bulatov: NSERC Discovery Grant.
Stanislav Živný: UKRI EP/X024431/1.
Copyright and License:
[Uncaptioned image] © Andrei A. Bulatov and Stanislav Živný; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Design and analysis of algorithms
; Theory of computation Problems, reductions and completeness
Related Version:
Full Version: https://arxiv.org/abs/2404.11709 [18]
Acknowledgements:
We thank the anonymous reviewers for their feedback and William Slofstra for useful discussions.
Editors:
Keren Censor-Hillel, Fabrizio Grandoni, Joël Ouaknine, and Gabriele Puppis

1 Introduction

Symmetry leads to efficient computation. This phenomenon has manifested itself in several research areas that have one aspect in common, namely a model of computation with local constraints that restrict the solution space of the problem of interest. An elegant way to describe such problems is in the framework of Constraint Satisfaction Problems (CSPs). CSPs have driven some of the most influential developments in theoretical computer science, from NP-completeness to the PCP theorem to semidefinite programming algorithms to the Unique Games Conjecture. The mathematical structure of tractable decision CSPs [16, 66], infinite-domain CSPs [7, 8], optimization CSPs [61], as well as approximable CSPs [57, 10], is now known to be linked to certain forms of higher-order symmetries of the solution spaces. A recently emerging research direction links CSPs with foundational topics in physics and quantum computation [22, 21, 2, 53, 46].

Constraint Satisfaction Problems

CSPs capture some of the most fundamental computational problems, including graph and hypergraph colorings, linear equations, and variants and generalizations of satisfiability. Informally, one is given a set of variables and a set of constraints, each depending only on constantly many variables. Given a CSP instance, the goal is to find an assignment of values to all the variables so that all constraints are satisfied. For example, if the domain is {r,g,b} and the constraints are of the form R(x,y), where R={(r,g),(g,r),(g,b),(b,g),(r,b),(b,r)} is the binary disequality relation on {r,g,b}, we obtain the classic graph 3-Colorability problem. If the domain is {r,g,b,o} and the constraints are of the form R(x,y), where R={(r,g),(g,r),(g,b),(b,g),(b,o),(o,b),(o,r),(r,o)}, we obtain a variant of the graph 4-Colorability problem in which adjacent vertices must be assigned different colors and, additionally, red and blue vertices must not be adjacent and green and orange vertices must not be adjacent.

Back in 1978, Schaefer famously classified all Boolean CSPs as solvable in polynomial time or NP-hard [58].111We call a CSP Boolean if the domain of all variables is of size two. Some papers call such CSPs binary. We use the term binary for a relation of arity two and for CSPs whose constraints involve binary relations. The tractable cases are the standard textbook problems, namely 2-SAT, Horn-SAT, dual Horn-SAT, and system of linear equations on a two-element set.222There are also two trivial, uninteresting cases called 0-valid and 1-valid. Hell and Nešetřil studied a special case of CSPs known as graph homomorphisms [34]. These are CSPs in which all constraints involve the same binary symmetric relation, i.e., a graph. The above-mentioned 3-Colorability problem is the homomorphism problem to K3, the undirected clique on three vertices, say {r,g,b}. The above-mentioned variant of 4-Colorability is the homomorphism problem to C4, the undirected cycle on four vertices, say {r,g,b,o}. Generalizing greatly the classic result of Karp that k-Colorability is solvable in polynomial time for k2 and NP-hard for k3 and other concrete problems such as the (tractable) variant of 4-Colorability above, Hell and Nešetřil obtained in 1990 a complete classification of such CSPs [33]. Motivated by these two results and the quest to identify the largest subclass of NP that could exhibit a dichotomy and thus avoid NP-intermediate cases, Feder and Vardi famously conjectured that all CSPs on finite domains admit a dichotomy; i.e., are either solvable in polynomial time or are NP-hard [27].

Following the so-called algebraic approach to CSPs, pioneered by Jeavons, Cohen and Gyssens [35] and Bulatov, Jeavons, and Krokhin [12], the conjecture was resolved in the affirmative in 2017 by Bulatov [16] and, independently, by Zhuk [65, 66]. The algebraic approach allows for a very clean and precise characterization of what makes certain CSPs computationally tractable – this is captured by the notion of polymorphisms, which can be thought of as multivariate symmetries of solutions spaces of CSPs. Along the way to the resolution of the Feder-Vardi dichotomy conjecture, the algebraic approach has been successfully used to establish other results about CSPs, e.g., characterizing the power of local consistency algorithms for CSPs [11, 3], characterizing robustly solvable CSPs [31, 24, 4], classifying the complexity of exact optimization CSPs [61, 42], the tremendous progress on classifying the complexity of CSPs on infinite domains [7], and very recently using SDPs for robustly solving certain promise CSPs [9].

Operator Constraint Satisfaction Problems

Consider the following instance of a Boolean CSP, consisting in nine variables x1,,x9 over the Boolean domain {1,+1} and the following six constraints:

x1x2x3=+1,x1x4x7=+1,x4x5x6=+1,x2x5x8=+1,x7x8x9=+1,x3x6x9=1. (1)

Graphically, this system of equations can be represented by a square, where each equation on the left of (1) comes from a row, and each equation on the right of (1) comes from a column.

The system of equations (1) has no solution in the Boolean domain {1,+1}: By multiplying the left-hand sides of all equations we get +1 because every variable occurs twice in the system and xi2=+1 for every 1i9. However, by multiplying the right-hand sides of all equations, we get 1. Note that this argument used implicitly the assumption that the variables commute pairwise even if they do not appear in the same equation, which is true over {1,+1}. Thus, this argument does not hold if one assumes that only variables occurring in the same equation commute pairwise. In fact, Mermin famously established that the system (1) has a solution consisting of linear operators on a Hilbert space of dimension four [50, 51] and the construction is now know as the Mermin-Peres magic square [54]. This construction proves the Bell-Kochen-Specker theorem on the impossibility to explain quantum mechanics via hidden variables [6, 39].

Any Boolean CSP instance, just like the one above, can be associated with a certain non-local game with two players, say Alice and Bob, who are unable to communicate while the game is in progress. Alice is given a constraint at random and must return a satisfying assignment to the variables in the constraint. Bob is given a variable from the constraint and must return an assignment to the variable. The two players win if they assign the same value to the chosen variable. With shared randomness, Alice and Bob can play the game perfectly if and only if the instance is satisfiable [22]. The Mermin-Peres construction [50, 54] was the first example of an instance where the players can play perfectly by sharing an entangled quantum state although the instance is not satisfiable. We note that [50, 54] were looking at quantum contextuality scenarios rather than non-local games and it was Aravind who reformulated the construction in the above-described game setting [1], cf. also [20]. The game was studied systematically for Boolean CSP by Cleve and Mittal [22] and further studied by Cleve, Liu, and Slofstra [21].

Every Boolean relation can be identified with its characteristic function, which has a unique representation as a multilinear polynomial via the Fourier transform. The multilinear polynomial representation of Boolean relations (and thus also Boolean CSPs) makes it possible to consider relaxations of satisfiability in which the variables take values in a suitable space, rather than in {1,+1}. Such relaxations of satisfiability have been considered in the foundations of physics long ago, playing an important role in our understanding of the differences between classical and quantum theories. In detail, given a Boolean CSP instance, a classical assignment assigns to every variable a value from {1,+1}. An operator assignment assigns to every variable a linear operator A on a Hilbert space so that A2=I and each A is self-adjoint, i.e., A=A and thus in particular A is normal, meaning that AA=AA.333For finite-dimensional Hilbert spaces, a linear operator is just, up to a choice of basis, a matrix with complex entries, and the adjoint A of A is the conjugate transpose of A, also denoted by A. For infinite-dimensional Hilbert spaces, the notions are more involved, cf. Section 2 for all details. Furthermore, it is required that operators assigned to variables from the scope of some constraint should pairwise commute.

Ji showed that for Boolean CSPs corresponding to 2-SAT there is no difference between (classical) satisfiability and satisfiability via operators [36]. Later, Atserias, Kolaitis, and Severini established a complete classification for all Boolean CSPs parameterized by the set of allowed constraint relations. In particular, using the substitution method [22] they showed that that only CSPs whose relations are 0-valid, 1-valid, or come from 2-SAT, Horn-SAT, or Dual Horn-SAT have “no satisfiability gap” in the sense that (classic) satisfiability is equivalent to operator satisfiability (over both finite- and infinite-dimensional Hilbert spaces) [2]. For all other Boolean CSPs, Atserias et al. [2] showed that there are satisfiability gaps in the following sense: There are instances that are not (classically) satisfiable but are satisfiable via operators on finite-dimensional Hilbert spaces, relying on the Mermin-Peres magic square – gaps of the first kind. This immediately implies that there are instances that are not (classically) satisfiable but are satisfiable via operators on infinite-dimensional Hilbert spaces – gaps of the second kind. Finally, there are instances that are not satisfiable via operators on finite-dimensional Hilbert spaces but are satisfiable via operators on infinite-dimensional Hilbert spaces, relying on the breakthrough result of Slofstra who proved this for linear equations [59] – gaps of the third kind. The result is established in [2] by showing that reductions between CSPs based on primitive positive formulas, which preserve complexity and were used to establish Schaefer’s classification of Boolean CSPs [58], preserve satisfiability gaps.

Contributions

As our main contribution, we generalize the result of Atserias et al. [2] from Boolean CSPs to CSPs on arbitrary finite domains. As has been done in, e.g, [23, 30, 56], we represent a finite domain of size d by the d-th roots of unity, and require that each operator A in an operator assignment should be normal (i.e. AA=AA) and should satisfy Ad=I. The representation of non-Boolean CSPs relies on multi-dimensional Fourier transform. Our main result is a partial classification of satisfiability gaps for CSPs on arbitrary finite domains, with the remaining cases being related to a well-known open problem in the area, which is the existence of gap instances of the first kind for linear equations over p with p>2.

In detail, as our first result we prove that NP-hard CSPs do have gaps of all three kinds. Second, we show that CSPs of bounded width (on arbitrary finite domains) do not have a satisfiability gap (of any kind), meaning that classical satisfiability is equivalent to satisfiability via operators on finite- and infinite-dimensional Hilbert spaces. Third, all other CSPs (i.e., tractable CSPs of unbounded width) can simulate, in a precise technical sense, linear equations over an Abelian group of prime order p. We prove that these simulations preserve satisfiability gaps. Thus, we obtain a satisfiability gap of the second kind by the result from an upcoming paper by Slofstra and Zhang [60]. Moreover, for p=2, we obtain a satisfiability gap of the first kind (and thus also of the second kind) from the Mermin-Peres magic square [50, 51, 54], and a satisfiability gap of the third kind from Slofstra’s result [59]. Finally, the reductions will also establish the first claim, gaps of all three kinds for NP-hard CSPs via [50, 51, 54, 59].

Theorem 1 (Main result, informal statement).

Let Γ be an arbitrary finite set of relations on a finite domain.

  1. 1.

    If CSP(Γ) is NP-hard then CSP(Γ) has gaps of all three kinds.

  2. 2.

    Otherwise, CSP(Γ) is solvable in polynomial time and

    1. (a)

      either Γ has bounded width and CSP(Γ) has no gaps of any kind,

    2. (b)

      or CSP(Γ) does not have bounded width and CSP(Γ) can simulate linear equations over an Abelian group of prime order p in a satisfiability-gap-preserving fashion. In this case, CSP(Γ) has a gap of the second kind. Furthermore, if p=2 then CSP(Γ) has gaps of all three kinds.

We note that Theorem 1 implies a classification of Boolean CSPs, thus recovering the result by Atserias et al. [2]. Indeed, a Boolean language Γ that is 0-valid, 1-valid, or comes from 2-SAT, Horn-SAT, or Dual Horn-SAT has bounded width; also, for a Boolean Γ one gets p=2 in Theorem 1 (2b).

Theorem 1 also implies a classification for CSPs on graphs (such CSPs are also known as H-Coloring problems): If Γ={R}, where R is a binary symmetric relation, then either R is bipartite or not. In the former case, CSP(Γ) has bounded width [17] and thus has no gaps of any kind. In the latter case, CSP(Γ) is NP-hard [33, 14] and thus has gaps of all three kinds.

Corollary 2.

Let G=(V,E) be a graph. If G is bipartite, CSP({E}) has no satisfiability gap of any kind. Otherwise it has satisfiability gaps of all three kinds.

We note that the remaining cases not covered by Theorem 1 (i.e., CSP(Γ) that are tractable but have unbounded width and can simulate linear equations over an Abelian group of prime order p>2 but not of order 2) relate to the known difficulties of establishing satisfiability gaps of the first kind for linear equations over p with p>2, e.g., there are results showing that such an instance cannot be obtained from generalized Pauli matrices [56] and beyond [29].444We remark that our results show that one can obtain gap instances from homomorphic preimages of already established gap instance (cf. Step 4 in [18]).

The proof of Theorem 1 relies on several ingredients. Firstly, we observe that results establishing that primitive positive definability preserve satisfiability gaps [2] can be lifted from Boolean to arbitrary finite domains.555[49, Theorem 6.4] considers subdivisions, a special case of conjunctive definitions, which in turn are a special case of primitive positive definitions (without existential quantifiers). Our result shows that [49, Theorem 6.4] extends to conjunctive definitions. Secondly, for CSPs of bounded width we show that there is no difference between classical and operator satisfiability by simulating the inference by the so-called Singleton Linear Arc Consistency (SLAC) algorithm in polynomial equations. We note that while there are several (seemingly stronger) algorithms for CSPs of bounded width, our proof relies crucially on the special structure of SLAC and the breakthrough result of Kozik that SLAC solves all CSPs of bounded width [43]. Thirdly, to prove that NP-hard CSPs and certain CSPs of unbounded width have satisfiability gaps we use the algebraic approach to CSPs, namely, we show that not only primitive positive definitions but also other reductions, namely going to the core, adding constants, and restrictions to subalgebras and factors, preserve satisfiability gaps.

We note that there is a significant hurdle to go from Boolean CSPs to CSPs over arbitrary finite domains. While any non-Boolean CSP can be Booleanized via indicator variables and extra constraints, such constructions do not immediately imply classifications of non-Boolean CSPs as the “encoding constraints” are intended to be used in only a particular way. Indeed, while the complexity of Boolean CSPs was established by Schaefer in 1978 [58] and the complexity of CSPs on three-element domains was established by Bulatov in 2002 [13, 15], the dichotomy for all finite domains was only established in 2017 [16, 65, 66]. Similarly for other variants of CSPs and different notions of tractability, results on Boolean domains, including the work of Atserias et al. [2], rely crucially on the explicit knowledge of the structure of relations on Boolean domains (established by Post [55]), which is not known for non-Boolean CSPs. Indeed, on the tractability side, the structure of relations in tractable Boolean CSPs is simple and very well understood; on the intractability side, reductions based only on primitive positive definitions suffice for a complete classification of Boolean CSPs. Neither of these two facts is true for non-Boolean CSPs.

We find it fascinating that bounded width might be the borderline for satisfiability gaps for CSPs, thus linking a notion coming from a natural combinatorial algorithm for CSPs with a foundational topic in quantum computation. Indeed, if satisfiability gaps of the first kind exist for linear equations over p with p>2 then our main result implies that all CSPs of unbounded width admit satisfiability gaps of all three kinds. This is yet another result indicating the fundamental nature of bounded width, which captures not only the power of the local consistency algorithm [45, 48, 11, 3] as conjectured in [27] with links to Datalog, pebble games, and logic [27, 41], but also robust solvability of CSPs [4], exact solvability of valued CSPs by LP [62] and SDP [63] relaxations, and now also possibly satisfiability via operators.

Related work

Paddock and Slofstra [53] streamlined the results from [2], and also gave an overview of other notions of satisfiability and their relationship, including the celebrated MIP=RE result of Ji et al. [37, 38]. Further, Culf, Mousavi, and Spirig recently studied approximability of operator CSPs [23]. While we used the magic square to construct a gap of the first kind, other systems based on linear equations could be used instead, e.g. the pentagram and the BCS in [59], cf. also [64]. Finally, we note that the notion of quantum homomorphism from the work of Mančinska and Roberson [47], as well as the recent work of Ciardo [19], is different from ours except when d=2. In the case of d=2, as considered in [2], operator assignments have to be self-adjoint and can be transformed to quantum isomorphisms. When d3, the straightforward translation through Fourier transform in cyclic groups result in projectors that are not self-adjoint, and therefore do not give rise to a quantum isomorphism. However, the overall results are somewhat similar, e.g., Ciardo shows [19] that CSPs of bounded width have no quantum advantage (over finite-dimensional spaces) by establishing a so-called minion homomorphism – relying crucially on idempotency – to the minion capturing the basic SDP relaxation, which is known to solve CSPs of bounded width by the work of Barto and Kozik [4]. The methods used in [19] rely, unlike methods and results in this paper, on being in the finite-dimensional case.

2 Preliminaries

CSPs

An instance of the constraint satisfaction problem (CSP) is a triple 𝒫=(V,D,𝒞), where V is a set of variables, D is a set of domain values, and 𝒞 is a set of constraints. Every constraint in 𝒞 is a pair 𝐬,R, where 𝐬Vr is the constraint scope and RDr is the constraint relation of arity r=ar(R). Given a CSP instance 𝒫, the task is to determine whether there is an assignment s:VD that assigns to every variable from V a value from D in such a way that all the constraints are satisfied; i.e., (s(v1),,s(vr))R for every constraint (v1,,vr),R𝒞. An assignment satisfying all the constraints is also called a solution.

Let D be a fixed finite set. A finite set Γ of relations over D is called a constraint language over D. We denote by CSP(Γ) the class of CSP instances in which all constraint relations belong to Γ. A mapping ϱ:DD is an endomorphism or unary polymorphism of Γ if, for any RΓ (say, r-ary) and any (a1,,ar)R, the tuple (ϱ(a1),,ϱ(ar)) belongs to R.

Bounded width

Intuitively, CSPs of bounded width are those CSPs for which unsatisfiable instances can be refuted via local propagation. An obvious obstruction to bounded width, in addition to NP-hard CSPs, is CSPs encoding systems of linear equations [27]. A celebrated result of Barto and Kozik established that CSPs of bounded width are precisely those CSPs that cannot simulate, in a precise sense, linear equations [3]. While bounded width has several characterizations [45, 48, 11, 3, 44],666One characterization implies that checking whether a constraint language has bounded width is decidable [44]. we will rely on the result of Kozik [43] that established that every CSP of bounded width can be solved through constraint propagation of a very restricted type, so-called Singleton Linear Arc-Consistency (SLAC).

In order to explain SLAC, we need to start with Arc-Consistency (AC). AC is one of the basic levels of local consistency notions. It is a property of a CSP and also an algorithm turning an instance 𝒫CSP(Γ) into an equivalent subinstance 𝒫CSP(Γ) that satisfies the AC property. Intuitively, given an instance 𝒫=(V,D,𝒞)CSP(Γ), the AC algorithm starts with setting the domain Dv=D for every variable vV. Then, it prunes the sets {Dv}vV in an iterative fashion, terminating (in polynomial time in the size of 𝒫) with a maximal subinstance of 𝒫 that satisfies the AC condition; namely, for every variable vV, every value aDv, and every constraint 𝐬,R𝒞 such that 𝐬[i]=v for some i, there is a tuple 𝐚R with 𝐚[i]=a. The resulting subinstance 𝒫 is equivalent to 𝒫 in the sense that 𝒫 has a solution if and only if 𝒫 has a solution. We say that AC solves an instance 𝒫 if 𝒫 has a solution whenever 𝒫 is consistent; i.e., none of the sets Dv in 𝒫 is empty. AC is not strong enough to solve all CSPs of bounded width (e.g., 2-SAT) but its full power is understood [27, 25].

Equivalently, Arc-Consistency can be described in terms of a Datalog program [40]. In general, a Datalog program derives facts about an instance 𝒫CSP(Γ) using a fixed set of rules that depend on the constraint language Γ. The rules are defined using relations from Γ called extensional databases (EDBs) as well as a number of auxiliary relations called intensional databases (IDBs). Each rule consists of a head, which is a single IDB, and the body, which is a sequence of IDBs and EDBs. The execution of the program updates the head IDB whenever the body of the rule is satisfied, that is, every EDB and IDB in the body is satisfied. The computation of the program ends when no relation can be updated, or when the goal predicate is reached. If we require that a Datalog program should only include unary IDBs and that every rule should have at most one EDB then the power of the program for CSPs amounts to AC. In detail, the AC Datalog program has a unary relation (IDB) TS(v) for each subset SD. Then for every (v1,,vr),R𝒞 and for any IDBs TS1,,TSm,TS the program contains the rule

TS(vi):R(v1,,vr),TS1(vi1),,TSm(vim)

if for any 𝐚R such that 𝐚[ij]Sj we have 𝐚[i]S. The Arc-Consistency algorithm is Linear if m=1 for every rule in the corresponding Datalog program.

The Singleton Arc-Consistency (SAC) algorithm is a modification of the AC algorithm [26]. SAC updates the sets {Dv}vV as follows: it removes a from Dv if the current instance augmented with the constraint fixing the value a to the variable v is found inconsistent by the AC algorithm. Finally, the Singleton Linear Arc-Consistency algorithm is a modification of SAC (due to Kozik [43] and Zhuk [66]) that uses the Linear AC algorithm rather than the AC algorithm. Kozik has shown that SLAC solves all CSPs of bounded width [43]. As with AC, SLAC is not only an algorithm but also a condition (of the instance 𝒫 produced by the algorithm). We say that an instance 𝒫 is SLAC-consistent if the SLAC algorithm, given in Algorithm 1, does not change the instance.

Algorithm 1 SLAC.

Multi-dimensional Fourier transform

Let Ud be the set of d-th roots of unity, that is, Ud={λk=e2πidk0k<d}. The Fourier transform (FT) of a function f:UdnUd is defined, for 𝐚Udn, as FT(f,𝐚)=𝐛Udnf(𝐛)λ1𝐚𝐛. Then it is not hard to see that f(𝐚)=𝐛UdnFT(f,𝐛)λ1𝐚𝐛, which gives rise to a representation of f by a polynomial

f(x¯)=𝐛UdnFT(f,𝐛)x¯𝐛,

where 𝐛=(k1,,kn) and 𝐛[j]=λkj. This representation is unique [52].

Linear operators and Hilbert spaces

Let V be a complex vector space. A linear operator on V is a linear map from V to V. The identity linear operator on V is denoted by I. The linear operator that is identically 0 is denoted by 0. Let A and B be two linear operators. Their pointwise addition is denoted by A+B, their composition is denoted by AB, and the pointwise scaling of A by a scalar c is denoted by cA. All of these are linear operators and thus we can plug linear operators in a polynomial P. We say that operators A and B commute if AB=BA. A collection of linear operators A1,,An pairwise commute if AiAj=AjAi for every i,j[n]. If A1,,An pairwise commute then P(A1,,An) is well defined. [x1,,xn] denotes the ring of polynomials with complex coefficients and commuting variables x1,,xn. A linear operator is bounded if it maps bounded subsets to bounded subsets. Let A be a densely defined linear operator, i.e., A is defined almost everywhere. We denote by A its adjoint [28] and call A normal if A commutes with its adjoint, i.e., AA=AA. A linear operator U is called unitary if UU=UU=I, the identity operator.

A Hilbert space is a complex vector space with an inner product whose norm induces a complete metric. All Hilbert spaces of finite dimension d are isomorphic to d with the standard complex inner product. Thus, after the choice of basis, linear operators on a d-dimensional Hilbert space can be identified with matrices in d×d, and operator composition becomes matrix multiplication. Thus, for Hilbert spaces of finite dimension we will freely switch between the operator and matrix terminology. A diagonal matrix has all off-diagonal entries equal to 0. For a matrix A, the adjoint operator A is the conjugate transpose. Recall that (AB)=BA. We will use the following form of the so-called strong spectral theorem.

Theorem 3 ([32]).

Let A1,,Ar be normal matrices. If A1,,Ar pairwise commute then there exists a unitary matrix U and diagonal matrices E1,,Er such that Ai=U1EiU for every i[r].

In the infinite-dimensional case, the Strong Spectral Theorem is more complicated. Firstly, it involves general L2- and L-spaces. Let (Ω,,μ) be a measure space, i.e., Ω is a set, is a σ-algebra on the set Ω (i.e. is a nonempty collection of subsets of Ω containing Ω and closed under complements, countable intersections, and countable unions), and μ is a measure on (Ω,) (i.e. μ is nonnegative and countably additive). Then L2(Ω,μ) denotes the collection of square integrable measurable functions, up to almost everywhere equality, and L(Ω,μ) denotes the collection of essentially bounded measurable functions, up to almost everywhere equality; all measure-theoretic terms in these definitions refer to μ, cf. [28] for details. Instead of diagonal matrices, the General Strong Spectral Theorem uses multiplication operators on a L2(Ω,μ)-space. Let V be a complex vector space of functions mapping an index set X to . A multiplication operator of V is a linear operator whose value at a function f:X in V is given by pointwise multiplication by a fixed function a:X. In other words, the multiplication operator given by a is

(Ta(f))(x)=a(x)f(x)for each xX.
Theorem 4 (General Strong Spectral Theorem [28]).

Let A1,,Ar be normal bounded linear operators on a Hilbert space . If A1,,Ar pairwise commute then there exist measure space (Ω,,μ), a unitary map U:L2(Ω,μ), and functions a1,,arL(Ω,μ) such that Ai=U1TaiU for every i[r].

3 Operator CSP

In order to relax the notion of satisfiability, we first consider CSPs on Ud for some d and represent CSPs via polynomials. Let Γ be a constraint language over Ud. Every constraint 𝐬,R of an instance 𝒫=(V,Ud,𝒞) of CSP(Γ) is represented by a polynomial PR(𝐬) that represents the characteristic function fR of R:

fR(𝐬)={λ0,if R(𝐬) is true,λ1,otherwise.

We note that our choice of the polynomial representation is somewhat arbitrary but other choices lead to the same results. (For instance, [2] studied the d=2 case and used λ1 to represent true.)

An operator A on a Hilbert space is a normal operator of order d if A is normal and Ad=I. Operator assignment to the instance 𝒫 on a Hilbert space is a mapping that assigns to every variable from V an operator Av on such that

  1. (a)

    Av is a normal operator of order d for every vV;

  2. (b)

    the operators Av1,,Avr pairwise commute for every constraint (v1,,vr),R𝒞.

We call an operator assignment {Av} satisfying for 𝒫 if PR(Av1,,Avr)=I for every constraint (v1,,vr),R𝒞. Let 𝒫 be a CSP instance. Following the terminology of Atserias et al. [2], we say that 𝒫 has a satisfiability gap of the first kind if 𝒫 is not satisfiable over Ud but is satisfiable by an operator assignment on a finite-dimensional Hilbert space. Similarly, we say that 𝒫 has a satisfiability gap of the second kind if 𝒫 is not satisfiable over Ud but is satisfiable by an operator assignemnt on an infinite-dimensional Hilbert space. Finally, we say that 𝒫 has a satisfiability gap of the third kind if 𝒫 is not satisfiable on finite-dimensional Hilbert spaces but is satisfiable by an operator assignment on an infinite-dimensional Hilbert space. We say that CSP(Γ) has a satisfiablity gap of the i-th kind, i=1,2,3, if there is at least one instance 𝒫CSP(Γ) witnessing such a gap. By definition, a gap of the first kind implies a gap of the second kind. Also, a gap of the third kind implies a gap of the second kind. Put differently, if Γ has no gap of the second kind then it has no gap of the first or third kind either.

We shall repeatedly use the following simple lemma, proved in Appendix A.

Lemma 5.

Let x1,,xr be variables, let Q1,,Qm,Q be polynomials in [x1,,xr], and let be a Hilbert space. If every assignment over Ud that satisfies the equations Q1==Qm=0 also satisfies the equation Q=0, then every fully commuting operator assignment on that satisfies the equations Q1==Qm=0 also satisfies the equation Q=0.

4 Overview of results and techniques

In this section, we give an overview of how our main result is proved. All definitions and details are provided in the full version of the paper [18].

Bounded width

One part of our main result is the following.

Theorem 6.

Let Γ be a constraint language over Ud. If CSP(Γ) has bounded width then it has no satisfiability gap of any kind.

The main idea behind the proof of Theorem 6 is to simulate the inference provided by SLAC (see Algorithm 1) by inference in polynomial equations. Let 𝒮 be a SLAC-program solving CSP(Γ). In order to prove Theorem 6 we take an instance 𝒫=(V,Ud,𝒞) of CSP(Γ) that has no solution, and therefore is not SLAC-consistent, as CSP(Γ) has bounded width, and prove that it also has no operator solution. We will prove it by contradiction, assuming 𝒫 has an operator solution {Av} and then using the rules of a SLAC-program solving CSP(Γ) to infer stronger and stronger conditions on {Av} that eventually lead to a contradiction.

Recall that every rule of a SLAC-program has the form (xS)R(x,y,z1,,zr))(yS) for some variables x,yV, a constraint (x,y,z1,,zr),R, and sets S,SUd. Therefore, we need to show how to encode unary relations and rules of a SLAC-program through polynomials. For any SUd, the unary constraint restricting the domain of a variable x to the set S is represented by the polynomial

DomS(x)=kS(λkx)+1.

Similarly, the rule (xS)R(x,y,z1,,zr))(yS) of the SLAC program is represented by

RuleS,R,S(x,y,z1,,zr)=(DomS¯(x)1)(PR(x,y,z1,,zr)λ1)(DomS(y)1).

To give an idea of how Theorem 6 is proved, we sketch the proof of the following.

Lemma 7.

Let (v1S1)(vS) be a derivation in the SLAC-program 𝒮 and {Av} an operator assignment for 𝒫. Then for each i=2,,

(DomS¯1(Av1)I)(DomSi(Avi)I)=0.

Sketch.

First, one shows via Lemma 5 that any operator assignment is a zero of RuleS,R,S, see [18] for details. This can be used to establish the claim for i=2 [18]. The rest of the proof is done by induction on i. In the induction case we have equations

(DomS¯1(Av1)I)(DomSi(Avi)I)=0, (2)

and

(DomS¯i(Avi)I)(DomSi+1(Avi+1)I)=0. (3)

The idea is to multiply (2) by (DomSi+1(Avi+1)I) on the right, then multiply (3) by (DomS¯1(Av1)I) on the left and subtract. The problem is, however, that

DomSi(Avi)DomS¯i(Avi)

is not a constant polynomial. So, we also need to prove that any polynomial of the form

DomS(x)DomS¯(x)

is invertible modulo xd1. The polynomial has the form

p(x)=kS(xλk)kS(xλk).

As is easily seen, if SUd and S, then λk is not a root of p(x) for any λkUd. Therefore the greatest common divisor of p(x) and xd1 has degree 0, and hence there exists q(x) such that

p(x)q(x)=c+r(x)(xd1).

Thus before subtracting equations (2) and (3) we also multiply them by q(Avi). Then we get

(DomS¯1(Av1)I)(DomSi(Avi)q(Avi)q(Avi)DomS¯i(Avi))(DomSi+1(Avi+1)I) = 0
(DomS¯1(Av1)I)q(Avi)(DomSi(Avi)DomS¯i(Avi))(DomSi+1(Avi+1)I) = 0
c(DomS¯1(Av1)I)(DomSi+1(Avi+1)I) = 0.

The first transformation uses the fact that Avi commutes with itself, while the second one uses the property Avid=I. The result follows.

To complete the proof of Theorem 6 note that the lack of SLAC-consistency means that for some vV the statement (v=λk)(vλk) can be derived from 𝒫 for every λkUd. By Lemma 7, for any operator assignment {Aw} and any λkUd the operator Av satisfies the equation jk(AvλjI)=0. By reverse induction on the size of S, one can show that for any SUd these equations imply jS(AvλjI)=0. Then for S= we get I=0, witnessing that 𝒫 has no satisfying operator assignment.

NP-hard CSPs and unbounded width

The second part of our main result boils down to the following.

Theorem 8.

Let Γ be a constraint language over Ud. If CSP(Γ) does not have bounded width then CSP(Γ) can simulate linear equations over an Abelian group of prime order p in a satisfiability-gap-preserving fashion. Moreover, if CSP(Γ) is NP-hard then one can take p=2.

Assume that CSP(Γ) does not have bounded width. The “implementation” of linear equations in CSP(Γ) that preserves gaps will be achieved in several steps via a chain of reductions that lies at the heart of the algebraic approach to CSPs [12]. The reductions are shown in Figure 1. They are known to preserve satisfiability; we show that they also preserve satisfiability gaps.

The most basic reduction (used in the chain in several places) is that of primitive positive definitions. Let Γ be a constraint language over Ud, let r be an integer, and let x1,,xr be variables ranging over the domain Ud. A primitive positive formula (pp-formula) over Γ is a formula of the form

ϕ(x1,,xr)=y1ys(R1(𝐳1)Rm(𝐳m)), (4)

where Ri is either the binary equality relation on Ud or RiΓ is a relation over Ud of arity ri, and each 𝐳i is an ri-tuple of variables from {x1,,xr}{y1,,ys}. A relation RUdr is primitive positive definable (pp-definable) from Γ if there exists a pp-formula ϕ(x1,,xr) over Γ such that R is equal to the set of models of ϕ, that is, the set of r-tuples (a1,,ar)Udr that make the formula ϕ true over Ud if ai is substituted for xi in ϕ for every i[r].

CSP(Γ)CSP(𝖼𝗈𝗋𝖾(Γ))CSP(𝖼𝗈𝗋𝖾(Γ))CSP(𝖼𝗈𝗋𝖾(Γ) B)CSP(𝖼𝗈𝗋𝖾(Γ) B/θ)
Figure 1: Reductions between CSPs corresponding to derivative languages.
Theorem 9.

Let Γ be a constraint language over Ud and let R be pp-definable from Γ. Then, if CSP(Γ{R}) has a satisfiability gap of the first (second, third) kind then so does CSP(Γ).

Weaker forms of Theorem 9 have appeared in the literature. This includes for example subdivisions from Theorem 6.4 of [49].

Let RUdr be a pp-definable formula over Γ via the pp-formula ϕ(x1,,xr) as in (4). Given an instance 𝒫CSP(Γ{R}), one can turn it into an instance 𝒫CSP(Γ) that is equivalent to 𝒫. Intuitively, each constraint 𝐮,R of 𝒫 is replaced with constraints from its pp-definition in (4) over fresh new variables (and similarly for the binary equality relation, cf. [18] for details). This construction is known as the gadget construction in the CSP literature and it is known that 𝒫 has a solution over Ud if and only if 𝒫 has a solution over Ud [12, 5]. Thus, to prove Theorem 9, it suffices to show the following; the proof is a simple generalization of the d=2 case proved in [2].

Lemma 10.

Let Γ be a constraint language over Ud and let R be pp-definable from Γ. Furthermore, let 𝒫CSP(Γ{R}) and let 𝒫CSP(Γ) be the gadget construction replacing constraints involving R in 𝒫. If there is a (finite or infinite dimensional) satisfying operator assignment for 𝒫 then there is a (respectively, finite or infinite dimensional) satisfying operator assignment for 𝒫.

If CSP(Γ{R}) has a satisfiability gap of the first kind then there is an unsatisfiable instance 𝒫CSP(Γ{R}) with a satisfying operator assignment. By [12] (cf. also [5]), 𝒫 is unsatisfiable. By Lemma 10, 𝒫 has a satisfying operator assignment. Hence 𝒫 establishes that CSP(Γ) has a satisfiability gap, and Theorem 9 is proved. This argument also extends to gaps of the second and third kind.

Pp-definitions are the starting point of the algebraic approach to CSPs [12] and suffice for dealing with Boolean CSPs, not only in [2] but also in all papers on Boolean (variants of) CSPs. For CSPs over larger domains, more tools are needed.

A constraint language Γ is a core language if all its endomorphisms are permutations; that is, Γ has no endomorphisms that are not automorphisms. There always exists an endomorphism ϱ of Γ such that ϱ(Γ) is core and ϱϱ=ϱ [12]. We will denote this core language by 𝖼𝗈𝗋𝖾(Γ), as it (up to an isomorphism) does not depend on the choice of ϱ.

A constraint language Γ is called idempotent if it contains all the constant relations, that is, relations of the form Ca={(a)}, aUd. For an arbitrary language Γ over Ud we use Γ=Γ{CaaUd}. A unary relation (a set) BUd pp-definable in Γ is called a subalgebra of Γ. For a subalgebra B we introduce the restriction Γ B of Γ to B defined as Γ B={RBar(R)RΓ}.

An equivalence relation θ pp-definable in Γ is said to be a congruence of Γ. The equivalence class of θ containing aUd will be denoted by a/θ, and the set of all equivalence classes, the factor-set, by Ud/θ. Congruences of a constraint language allow one to define a factor-language as follows. For a congruence θ of the language Γ the factor language Γ/θ is the language over Ud/θ given by Γ/θ={R/θRΓ}, where R/θ={(a1/θ,,an/θ)(a1,,an)R}.

All the languages above are related to each other by the reducibility of the corresponding CSPs, as Figure 1 indicates. In the full version [18], we show that all arrows in Figure 1 preserve satisfiability gaps. To relate these reductions with bounded width and magic squares we use the following result.

Proposition 11 ([11, 3, 5]).

For a constraint language Γ over Ud, CSP(Γ) does not have bounded width if and only there exists a language Δ pp-definable in Γ, a subalgebra B of 𝖼𝗈𝗋𝖾(Δ), a congruence θ of 𝖼𝗈𝗋𝖾(Δ) B, and an Abelian group 𝔸 of prime order p such that Γ=𝖼𝗈𝗋𝖾(Δ) B/θ contains relations R3,a,Rp+2 for every a𝔸 given by R3,a={(x,y,z)x+y+z=a} and Rp+2={(a1,,ap+2)a1++ap+2=0}. If CSP(Γ) is NP-hard, then Δ can be chosen to contain R3,a,Rp+2 for p=2.888The relations R3,a,Rp+2 are chosen here because they are needed for our purpose. In fact, they can be replaced with any relations expressible by linear equations over 𝔸.

To prove Theorem 8, suppose that CSP(Γ) does not have bounded width. By Proposition 11 there is a language Δ pp-definable in Γ, a subalgebra B of 𝖼𝗈𝗋𝖾(Δ), a congruence θ of 𝖼𝗈𝗋𝖾(Δ) B, and an Abelian group 𝔸 of prime order p such that Γ=𝖼𝗈𝗋𝖾(Δ) B/θ contains relations R3,a,Rp+2 for every a𝔸. Our goal is to show that if CSP(Γ) has a satisfiability gap then so does CSP(Γ).

To give an idea of the gap-preservation proofs, we sketch how a satisfiability gap is preserved. Let Γ be a constraint language over the set Ud and let B be its subalgebra. We show that if CSP(Γ B) has a satisfiability gap then so does CSP(Γ). We show this for a gap of the first kind (over finite-dimensional Hilbert spaces); the infinite-dimensional case is more complicated, cf. [18] for details. Let Δ=Γ B. Then by Theorem 9 we may assume ΔΓ and BΓ. Let e=|B| and π:UeUd a bijection between Ue and B. Let 𝒫=(V,Ue,𝒞) be a gap instance of CSP(π1(Δ)) and the instance 𝒫π=(V,Ud,𝒞π) constructed as follows: For every 𝐬,R𝒞 the instance 𝒫π contains 𝐬,π(R). As is easily seen, 𝒫π has no classic solution. Therefore, it suffices to show that for any satisfying operator assignment {AvvV} for 𝒫, the assignment Cv=π(Av) is a satisfying operator assignment for 𝒫π.

By a technical lemma that shows that injective maps on finite sets that are interpolated by polynomials preserve normal operators that pairwise commute [18], the Cv’s are normal, satisfy the condition Cvd=I, and locally commute. For 𝐬,R𝒞, 𝐬=(v1,,vk), let fRπ(x1,,xk)=fR(π1(x1),,π1(xk)). It can be shown that π1(Cv)=Av, and therefore fRπ(Cv1,,Cvk)=I. For any a1,,akUd, if (a1,,ak)π(R) then a1,,akB. Therefore, fRπ(a1,,ak)=1 then fπ(R)(a1,,ak)=1. By Lemma 5 this implies fπ(R)(Cv1,,Cvk)=I.

The other reductions use similar ideas, carefully relying on the spectral theorem given in Theorem 3 to simultaneously diagonalize the restriction of an operator assignment to the scope of a constraint, Lemma 5 that relates polynomial equations over Ud and operators, and the above mentioned result on preservation of operator assignments by certain polynomials. The infinite-dimensional case is more delicate, relying on the General Strong Spectral Theorem (Theorem 4).

To finish the proof of Theorem 1, assume that CSP(Γ) does not have bounded width and Γ from Proposition 11 is over a group of prime order p. As reductions preserve satisfiability gaps, it suffices that CSP(Δp), where Δp={R3,aa𝔸}{Rp+2}, has a satisfiability gap. The result of Slofstra and Zhang [60] provides a gap instance of CSP({R3,1,R3,1}) of the second kind for any prime p, and thus the same holds for CSP(Γ). For p=2 the Mermin-Peres magic square from [50] provides a gap instance of CSP({R3,1,R3,1}) of the first kind, and same holds for CSP(Γ). Finally, the result by Slofstra [59] provides a gap instance of CSP({R3,1,R3,1}) of the third kind, and we get the same for CSP(Γ{RT}), where RT is the full binary relation on Ud. Finally, if CSP(Γ) is NP-hard then Γ can simulate any constraint language [12], and thus in particular Δ2.

References

  • [1] Padmanabhan K Aravind. Bell’s theorem without inequalities and only two distant observers. Found. Phys., 15:397–405, 2002. doi:10.1023/A:1021272729475.
  • [2] Albert Atserias, Phokion G. Kolaitis, and Simone Severini. Generalized satisfiability problems via operator assignments. J. Comput. Syst. Sci., 105:171–198, 2019. doi:10.1016/J.JCSS.2019.05.003.
  • [3] Libor Barto and Marcin Kozik. Constraint satisfaction problems solvable by local consistency methods. J. ACM, 61(1):3:1–3:19, 2014. doi:10.1145/2556646.
  • [4] Libor Barto and Marcin Kozik. Robustly solvable constraint satisfaction problems. SIAM J. Comput., 45(4):1646–1669, 2016. doi:10.1137/130915479.
  • [5] Libor Barto, Andrei Krokhin, and Ross Willard. Polymorphisms, and how to use them. In Andrei Krokhin and Stanislav Živný, editors, The Constraint Satisfaction Problem: Complexity and Approximability, volume 7 of Dagstuhl Follow-Ups, pages 1–44. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, Dagstuhl, Germany, 2017. doi:10.4230/DFU.Vol7.15301.1.
  • [6] John S Bell. On the problem of hidden variables in quantum mechanics. Rev. Mod. Phys., 38(3):447, 1966. doi:10.1103/RevModPhys.38.447.
  • [7] Manuel Bodirsky. Complexity of infinite-domain constraint satisfaction, volume 52. Cambridge University Press, 2021.
  • [8] Manuel Bodirsky and Jakub Rydval. On the descriptive complexity of temporal constraint satisfaction problems. J. ACM, 70(1):2:1–2:58, 2023. doi:10.1145/3566051.
  • [9] Joshua Brakensiek, Venkatesan Guruswami, and Sai Sandeep. SDPs and robust satisfiability of promise CSP. In Proc. 55th Annual ACM Symposium on Theory of Computing (STOC’23), pages 609–622. ACM, 2023. doi:10.1145/3564246.3585180.
  • [10] Jonah Brown-Cohen and Prasad Raghavendra. Combinatorial optimization algorithms via polymorphisms. CoRR, abs/1501.01598, 2015. arXiv:1501.01598.
  • [11] Andrei Bulatov. Bounded relational width. Unpublished manuscript, 2009. URL: https://www2.cs.sfu.ca/˜abulatov/papers/relwidth.pdf.
  • [12] Andrei Bulatov, Peter Jeavons, and Andrei Krokhin. Classifying the complexity of constraints using finite algebras. SIAM J. Comput., 34(3):720–742, 2005. doi:10.1137/S0097539700376676.
  • [13] Andrei A. Bulatov. A Dichotomy Theorem for Constraints on a Three-Element Set. In Proc. 43rd Symposium on Foundations of Computer Science (FOCS’02), pages 649–658. IEEE Computer Society, 2002. doi:10.1109/SFCS.2002.1181990.
  • [14] Andrei A. Bulatov. H-coloring dichotomy revisited. Theor. Comput. Sci., 349(1):31–39, 2005. doi:10.1016/J.TCS.2005.09.028.
  • [15] Andrei A. Bulatov. A dichotomy theorem for constraint satisfaction problems on a 3-element set. J. ACM, 53(1):66–120, 2006. doi:10.1145/1120582.1120584.
  • [16] Andrei A. Bulatov. A dichotomy theorem for nonuniform CSPs. In Proc. 58th Annual IEEE Symposium on Foundations of Computer Science (FOCS’17), pages 319–330, 2017. doi:10.1109/FOCS.2017.37.
  • [17] Andrei A. Bulatov. Constraint satisfaction problems: complexity and algorithms. ACM SIGLOG News, 5(4):4–24, 2018. doi:10.1145/3292048.3292050.
  • [18] Andrei A. Bulatov and Stanislav Živný. Satisfiability of commutative vs. non-commutative CSPs. CoRR, 2024. arXiv:2404.11709.
  • [19] Lorenzo Ciardo. Quantum advantage and CSP complexity. In Proc. 39th Annual ACM/IEEE Symposium on Logic in Computer Science (LICS’24), pages 23:1–23:15. ACM, 2024. doi:10.1145/3661814.3662118.
  • [20] Richard Cleve, Peter Høyer, Benjamin Toner, and John Watrous. Consequences and limits of nonlocal strategies. In Proc. 19th Annual IEEE Conference on Computational Complexity (CCC’04), pages 236–249. IEEE Computer Society, 2004. doi:10.1109/CCC.2004.1313847.
  • [21] Richard Cleve, Li Liu, and William Slofstra. Perfect commuting-operator strategies for linear system games. J. Math. Phys., 58(1), 2017. doi:10.1063/1.4973422.
  • [22] Richard Cleve and Rajat Mittal. Characterization of binary constraint system games. In Proc. 41st International Colloquium on Automata, Languages, and Programming (ICALP’14), volume 8572 of Lecture Notes in Computer Science, pages 320–331. Springer, 2014. doi:10.1007/978-3-662-43948-7_27.
  • [23] Eric Culf, Hamoon Mousavi, and Taro Spirig. Approximation algorithms for noncommutative constraint satisfaction problems. CoRR, 2023. doi:10.48550/arXiv.2312.16765.
  • [24] Víctor Dalmau and Andrei A. Krokhin. Robust Satisfiability for CSPs: Hardness and Algorithmic Results. ACM Trans. Comput. Theory, 5(4):15:1–15:25, 2013. doi:10.1145/2540090.
  • [25] Víctor Dalmau and Justin Pearson. Closure functions and width 1 problems. In Proc. 4th International Conference on Principles and Practice of Constraint Programming (CP’99), volume 1713 of Lecture Notes in Computer Science, pages 159–173. Springer, 1999. doi:10.1007/978-3-540-48085-3_12.
  • [26] Romuald Debruyne and Christian Bessière. Some Practicable Filtering Techniques for the Constraint Satisfaction Problem. In Proc. 15th International Joint Conference on Artificial Intelligence (IJCAI’97), pages 412–417. Morgan Kaufmann, 1997.
  • [27] Tomás Feder and Moshe Y. Vardi. The computational structure of monotone monadic SNP and constraint satisfaction: A study through Datalog and group theory. SIAM J. Comput., 28(1):57–104, 1998. doi:10.1137/S0097539794266766.
  • [28] Gerald B. Folland. A Course in Abstract Harmonic Analysis. Studies in Advanced Mathematics. Taylor & Francis, 1994.
  • [29] Markus Frembs and Cihan Okay amd Ho Yiu Chung. No state-independent contextuality can be extracted from contextual measurement-based quantum computation with qudits of odd prime dimension. CoRR, 2022. arXiv:2209.14018.
  • [30] Michel X. Goemans and David P. Williamson. Approximation algorithms for Max-3-Cut and other problems via complex semidefinite programming. J. Comput. Syst. Sci., 68(2):442–470, 2004. doi:10.1016/J.JCSS.2003.07.012.
  • [31] Venkatesan Guruswami and Yuan Zhou. Tight Bounds on the Approximability of Almost-Satisfiable Horn SAT and Exact Hitting Set. Theory Comput., 8(1):239–267, 2012. doi:10.4086/TOC.2012.V008A011.
  • [32] Paul R Halmos. Introduction to Hilbert space and the theory of spectral multiplicity. Courier Dover Publications, 2017.
  • [33] Pavol Hell and Jaroslav Nešetřil. On the complexity of H-coloring. J. Comb. Theory, Ser. B, 48(1):92–110, 1990. doi:10.1016/0095-8956(90)90132-J.
  • [34] Pavol Hell and Jaroslav Nešetřil. Graphs and homomorphisms, volume 28 of Oxford Lecture Series in Mathematics and its Applications. OUP Oxford, 2004.
  • [35] Peter G. Jeavons, David A. Cohen, and Marc Gyssens. Closure properties of constraints. J. ACM, 44(4):527–548, 1997. doi:10.1145/263867.263489.
  • [36] Zhengfeng Ji. Binary constraint system games and locally commutative reductions. CoRR, 2013. arXiv:1310.3794.
  • [37] Zhengfeng Ji, Anand Natarajan, Thomas Vidick, John Wright, and Henry Yuen. MIP=RE. CoRR, 2020. arXiv:2001.04383.
  • [38] Zhengfeng Ji, Anand Natarajan, Thomas Vidick, John Wright, and Henry Yuen. MIP = RE. Commun. ACM, 64(11):131–138, 2021. doi:10.1145/3485628.
  • [39] Simon Kochen and E. P. Specker. The problem of hidden variables in quantum mechanics. J. Mathematics and Mechanics, 17(1):59–87, 1967. URL: http://www.jstor.org/stable/24902153.
  • [40] Phokion G. Kolaitis and Moshe Y. Vardi. On the expressive power of datalog: Tools and a case study. J. Comput. Syst. Sci., 51(1):110–134, 1995. doi:10.1006/jcss.1995.1055.
  • [41] Phokion G. Kolaitis and Moshe Y. Vardi. Conjunctive-query containment and constraint satisfaction. J. Comput. Syst. Sci., 61(2):302–332, 2000. doi:10.1006/jcss.2000.1713.
  • [42] Vladimir Kolmogorov, Andrei A. Krokhin, and Michal Rolínek. The complexity of general-valued CSPs. SIAM J. Comput., 46(3):1087–1110, 2017. doi:10.1137/16M1091836.
  • [43] Marcin Kozik. Solving CSPs Using Weak Local Consistency. SIAM J. Comput., 50(4):1263–1286, 2021. doi:10.1137/18M117577X.
  • [44] Marcin Kozik, Andrei Krokhin, Matt Valeriote, and Ross Willard. Characterizations of several Maltsev conditions. Algebra Univers., 73(3):205–224, 2015. doi:10.1007/s00012-015-0327-2.
  • [45] Benoit Larose and Lázló Zádori. Bounded width problems and algebras. Algebra Univers., 56:439–466, 2007. doi:10.1007/s00012-007-2012-6.
  • [46] Laura Mančinska and David E. Roberson. Quantum isomorphism is equivalent to equality of homomorphism counts from planar graphs. In Proc. 61st IEEE Annual Symposium on Foundations of Computer Science (FOCS’20), pages 661–672. IEEE, 2020. doi:10.1109/FOCS46700.2020.00067.
  • [47] Laura Mančinska and David E. Roberson. Quantum homomorphisms. J. Comb. Theory, Ser. B, 118:228–267, 2016. doi:10.1016/J.JCTB.2015.12.009.
  • [48] Miklós Maróti and Ralph McKenzie. Existence theorems for weakly symmetric operations. Algebra Univers., 59(3-4):463–489, 2008. doi:10.1007/s00012-008-2122-9.
  • [49] Kieran Mastel and William Slofstra. Two prover perfect zero knowledge for MIP. In Proc. 56th Annual ACM Symposium on Theory of Computing (STOC’24), pages 991–1002. ACM, 2024. doi:10.1145/3618260.3649702.
  • [50] N. David Mermin. Simple unified form for the major no-hidden-variables theorems. Phys. Rev. Lett., 65(27):3373, 1990. doi:10.1103/PhysRevLett.65.3373.
  • [51] N. David Mermin. Hidden variables and the two theorems of John Bell. Rev. Mod. Phys., 65(3):803, 1993. doi:10.1103/RevModPhys.65.803.
  • [52] Ryan O’Donnell. Analysis of Boolean Functions. Cambridge University Press, 2014.
  • [53] Connor Paddock and William Slofstra. Satisfiability problems and algebras of boolean constraint system games. CoRR, 2023. arXiv:2310.07901.
  • [54] Asher Peres. Incompatible results of quantum measurements. Phys. Lett., 151(3-4):107–108, 1990. doi:10.1016/0375-9601(90)90172-K.
  • [55] E.L. Post. The two-valued iterative systems of mathematical logic, volume 5 of Annals of Mathematical Studies. Princeton University Press, 1941. doi:10.2307/2268608.
  • [56] Hammam Qassim and Joel J Wallman. Classical vs quantum satisfiability in linear constraint systems modulo an integer. J. Phys. A, 53(38):385304, 2020. doi:10.1088/1751-8121/aba306.
  • [57] Prasad Raghavendra. Optimal algorithms and inapproximability results for every CSP? In Proc. 40th Annual ACM Symposium on Theory of Computing (STOC’08), pages 245–254. ACM, 2008. doi:10.1145/1374376.1374414.
  • [58] Thomas Schaefer. The complexity of satisfiability problems. In Proc. 10th Annual ACM Symposium on the Theory of Computing (STOC’78), pages 216–226, 1978. doi:10.1145/800133.804350.
  • [59] William Slofstra. Tsirelson’s problem and an embedding theorem for groups arising from non-local games. J. Am. Math. Soc., 33(1):1–56, 2020. doi:10.1090/jams/929.
  • [60] William Slofstra and Luming Zhang. Small cancellation for solution groups. In preparation.
  • [61] Johan Thapper and Stanislav Živný. The complexity of finite-valued CSPs. J. ACM, 63(4):37:1–37:33, 2016. doi:10.1145/2974019.
  • [62] Johan Thapper and Stanislav Živný. The power of Sherali–Adams relaxations for general-valued CSPs. SIAM J. Comput., 46(4):1241–1279, 2017. doi:10.1137/16M1079245.
  • [63] Johan Thapper and Stanislav Živný. The limits of SDP relaxations for general-valued CSPs. ACM Trans. Comput. Theory, 10(3):12:1–12:22, 2018. doi:10.1145/3201777.
  • [64] Xingjian Zhang, Zhaokai Pan, and Guoding Liu. Unconditional quantum MAGIC advantage in shallow circuit computation. CoRR, 2024. arXiv:2402.12246.
  • [65] Dmitriy Zhuk. A proof of CSP dichotomy conjecture. In Proc. 58th Annual IEEE Symposium on Foundations of Computer Science (FOCS’17), pages 331–342, 2017. doi:10.1109/FOCS.2017.38.
  • [66] Dmitriy Zhuk. A proof of the CSP dichotomy conjecture. J. ACM, 67(5):30:1–30:78, 2020. doi:10.1145/3402029.

Appendix A Proof of Lemma 5

Lemma 12 (Lemma 5 restated).

Let x1,,xr be variables, let Q1,,Qm,Q be polynomials in [x1,,xr], and let be a Hilbert space. If every assignment over Ud that satisfies the equations Q1==Qm=0 also satisfies the equation Q=0, then every fully commuting operator assignment on that satisfies the equations Q1==Qm=0 also satisfies the equation Q=0.

The proof of this lemma is very similar to that of the analogous claim in [2, Lemma 3], where it was established for d=2. The main difference is to use Ad=I rather than A2=I. For the sake of completeness we give the proof here.

Proof.

Finite-dimensional case.

Suppose that the conditions of the lemma hold and A1,,Ar are pairwise commuting operators such that the equations Q1==Qm=0 are true when these matrices are assigned to x1,,xr. Then, since A1,,Ar are normal and commute, by Theorem 3 there is a unitary matrix U such that Ei=UAiU1 is a diagonal matrix. Then, Eid=I, because Aid=I. Therefore, every diagonal entry Ei(jj) belongs to Ud. For every equation Q we have Q(A1,,Ar)=0 implying Q(E1,,Er)=UQ(A1,,Ar)U1=0. Since every Ei is diagonal, for every j it also holds Q(E1(jj),,Er(jj))=0. By the conditions of the lemma we also have Q((E1(jj),,Er(jj))=0, and Q(A1,,Ar)=U1Q(E1,,Er)U=0.

Infinite-dimensional case.

Suppose that the conditions of the lemma hold and A1,,Ar are pairwise commuting operators such that the equations Q1==Qm=0 are true when these operators are assigned to X1,,Xr. Then, since A1,,Ar are normal and commute, by Theorem 4 there exist a measure space (Ω,,μ), a unitary map U:L2(Ω,μ), and functions a1,,arL(Ω,μ) such that, for the multiplication operators Ei=Tai of L2(Ω,μ), the equalities Ai=U1EiU hold for i[r]. This implies UAiU1=Ei. As Aid=I we also have Eid=I. Therefore ai(ω)d=1 for almost all ωΩ, or more formally μ({ωΩ(ai(ω)d1})=0. Hence ai(ω)Ud for almost all ωΩ. For every [m] we have Q(E1,,Er)=UQ(A1,,Ar)U1, implying by the conditions of the lemma that Q(E1,,Er)=0. Since Ei is the multiplication operator given by the function ai, it holds that Q(a1(ω),,ar(ω))=0 for almost all ωΩ. As for almost all ωΩ, it holds that the value ai(ω)Ud for each i[r], we have Q(a1(ω),,ar(ω))=0 for almost all ωΩ. Therefore Q(E1,,Er)=0 and this implies Q(A1,,Ar)=0 as before.