Abstract 1 Introduction 2 Preliminaries 3 Main results 4 Decomposition lemma 5 Dichotomy for Holantodd 6 Conclusion References

From an Odd Arity Signature to a Holant Dichotomy

Boning Meng111The authors share first author status. ORCID Key Laboratory of System Software (Chinese Academy of Sciences) and State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China
University of Chinese Academy of Sciences, Beijing, China
Juqiu Wang111The authors share first author status. ORCID Key Laboratory of System Software (Chinese Academy of Sciences) and State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China
University of Chinese Academy of Sciences, Beijing, China
Mingji Xia111The authors share first author status. ORCID Key Laboratory of System Software (Chinese Academy of Sciences) and State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China
University of Chinese Academy of Sciences, Beijing, China
Jiayi Zheng111The authors share first author status. ORCID Key Laboratory of System Software (Chinese Academy of Sciences) and State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China
University of Chinese Academy of Sciences, Beijing, China
Abstract

Holant is an essential framework in the field of counting complexity. For over fifteen years, researchers have been clarifying the complexity classification for complex-valued Holant on Boolean domain, a challenge that remains unresolved. In this article, we prove a complexity dichotomy for complex-valued Holant on Boolean domain when a non-trivial signature of odd arity exists. This dichotomy is based on the dichotomy for #EO, and consequently is an FPNP vs. #P dichotomy as well, stating that each problem is either in FPNP or #P-hard.

Furthermore, we establish a generalized version of the decomposition lemma for complex-valued Holant on Boolean domain. It asserts that each signature can be derived from its tensor product with other signatures, or conversely, the problem itself is in FPNP. We believe that this result is a powerful method for building reductions in complex-valued Holant, as it is also employed as a pivotal technique in the proof of the aforementioned dichotomy in this article.

Keywords and phrases:
Complexity dichotomy, Counting, Holant problem, #P
Copyright and License:
[Uncaptioned image] © Boning Meng, Juqiu Wang, Mingji Xia, and Jiayi Zheng; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Problems, reductions and completeness
Related Version:
Full Version: https://arxiv.org/abs/2502.05597 [25]
Funding:
All authors are supported by National Key R&D Program of China (2023YFA1009500) and NSFC 62272448.
Editors:
Srikanth Srinivasan

1 Introduction

Counting complexity is an essential aspect of computational complexity. Basically, it focuses on computing the sum of the weights of the solutions. Holant is one of the most significant frameworks in the field of counting complexity, as it is capable of capturing a number of counting problems, such as counting perfect matchings in a graph or computing the partition function of the six-vertex model in statistical physics. There is a long history studying the complexity of Holant, and much progress has been made. On the other hand, however, the complete complexity classification of complex-valued Holant on Boolean domain remains unclear.

This article focuses on counting problems defined on Boolean domain and develops existing complexity dichotomies. It presents a full dichotomy for complex-valued Holant where there exists a non-trivial222By the term “non-trivial” we mean that the signature does not remain constant at 0. It can be easily verified that if a signature remains constant at 0, then removing such signature from the signature set would not change the complexity of the problem. signature of odd arity, which we denoted by complex Holantodd for short. This dichotomy encompasses the previous results in [9, 3, 30], with the exception that it is an FPNP vs. #P dichotomy. Furthermore, this article also presents a decomposition lemma for complex-valued Holant based on the dichotomy in [24], which is the extension of a widely-used method originally developed in [22].

To begin with, Holant is a framework of counting problems parameterized by a signature set , originally defined in [14]. Each signature of arity r in is a mapping from {0,1}r to , representing a local constraint. Each input, or equivalently an instance of Holant(), is a grid Ω=(G,π) where G is a graph333In this article, the term “graph” is understood to refer to a multi-graph. The presence of self-loops and parallel edges is invariably permitted. and π assigns a signature to each vertex in G. Each edge in G is regarded as a variable subject to constraints imposed by incident vertices, and the output is the summation over the weights of all possible assignments of the variables, where the weight is the production of the output of each signature. See Definition 3 for a detailed definition.

Holant is considered as one of the most important frameworks in the field of counting complexity. On one hand, it is capable of expressing a considerable number of counting problems, such as counting matchings and counting perfect matchings in a graph (#Matching and #PM), counting weighted Eulerian orientations in a graph (#EO), counting constraint satisfaction problem (#CSP) and computing the partition function of the six-vertex and eight-vertex model. On the other hand, Holant was originally inspired by the discovery of the holographic algorithm [28, 29], which in turn was inspired by quantum computation and is closely related to the concept of Stochastic Local Operations and Classical Communication (SLOCC). Furthermore, several non-trivial connections between Holant and quantum computation have also been established [9, 2, 3, 18].

Consequently, Holant has attracted a number of researchers to classify the complexity of this framework. The ultimate goal in this study is to decide the complexity of Holant() for every complex-valued signature set . It is believed that there exists a dichotomy for complex-valued Holant, which means that for arbitrary , Holant() is either polynomial-time computable or #P-hard. Nevertheless, this hypothesis has been open for over 15 years, and currently the dichotomy result can only be stated for several types of signature sets. In the following, an overview of the research history is presented, along with a discussion of the current state of knowledge.

The research commences with symmetric signature sets, where the output of each signature only depends on the Hamming weight, or equivalently the number of 1’s, of the input. Consequently, a symmetric signature f of arity r can be expressed as [f0,f1,,fr]r, where fi is the value of f when the Hamming weight of the input is i. Under this restriction, the Holant framework is denoted as sym-Holant. Besides, sometimes the dichotomy holds when some specific signatures are available. We use Δ0,Δ1,Δ+,Δ to denote [1,0],[0,1],[1,1],[1,1] respectively. If all unary signatures are available, such problem is denoted as Holant; if Δ0,Δ1,Δ+,Δ are available, such problem is denoted as Holant+; if Δ0,Δ1 are available, such problem is denoted as Holantc. In particular, if a non-trivial signature of odd arity belongs to the signature set, we denote such problem as Holantodd for convenience.

The previous results for symmetric cases are summarized in Table 2, and those for general cases are summarized in Table 2. By definition, the result of each individual cell encompasses both the results that are located in the same column above it and the results that are located in the same row to its left. Furthermore, several essential dichotomies for Holant not listed in the table are presented below without exhaustive explanation. These are dichotomies respectively for #CSP [16], six-vertex model [10], eight-vertex model [7], #EO [8, 23, 24] and a single ternary signature [30].

Table 1: Research history of Holant. The term ’/’ is same as that in Table 2.
sym-Holant sym-Holantc sym-Holant
real-valued / [14] [21]
complex-valued [14] [13] [11]
Table 2: Research history of sym-Holant. The term ’/’ denotes that the corresponding dichotomy is directly encompassed by another dichotomy, thus obviating the necessity for separate research.
Holant Holant+ Holantc Holantodd Holant
nonnegative-valued / / / / [22]
real-valued / / [17] [9] [26]
complex-valued [15] [2] [3] Our result Unknown

It is noticeable that except for the last column in Table 2, the majority of works concentrate on scenarios where specific signatures of odd arity are present. Furthermore, the number of such signatures decreases from left to right, being infinite, 4, 2, 1 (and 0 in the last column) respectively. This article proves a definitive conclusion to this series of works, the position of which is also presented in Table 2.

In order to reach this conclusion, it is necessary to extend the result of the decomposition lemma, originally developed in [22]. This lemma can derive a specific signature from its tensor product with other signatures, and has been employed in numerous recent works [8, 9, 26, 7, 24]. However, the general form of this lemma does not hold for all complex-valued signature sets.

On the other hand, a series of works has classified the complexity of counting weighted Eulerian orientations in a graph (#EO) [10, 8, 27, 23, 24]. An FPNP vs. #P dichotomy dichotomy is established in [24], which claims that a problem in #EO is either in FPNP or #P-hard. This motivates us to prove a generalized version of the decomposition lemma, stating that either the signature can be derived from the tensor product, or the complexity of the problem can be classified by the #EO dichotomy.

Consequently, there are two major results in this article, stated as follows. The detailed forms of them are Theorem 29 and Theorem 30, presented in Section 3. We use T to denote polynomial-time Turing reduction and T to denote polynomial-time Turing equivalence. We use to denote tensor product.

Theorem 1 (Decomposition lemma).

Let be a set of signatures and f, g be two signatures. Then one of the following holds.

  1. 1.

    Holant(,f,g)THolant(,fg);

  2. 2.

    Holant(,fg) is in FPNP.

Theorem 2 (Dichotomy for Holantodd).

Let be a set of signatures that contains a non-trivial signature of odd arity. Then one of the following holds.

  1. 1.

    Holant() is #P-hard;

  2. 2.

    Holant() is in FPNP.

In some cases appearing in Theorem 1, Holant(,fg) is #P-hard. In these cases, the reduction in the first statement trivially holds. We also remark that the definitions of complexity classes appearing in the two theorems can be found in [1]. In particular, the complexity class FPNP is introduced due to the dichotomy for #EO in [24], making Theorem 2 an FPNP vs. #P dichotomy. As analyzed in [24], such dichotomy can separate the computational complexity as well, unless the complexity class PH collapses at the second level. Furthermore, as shown in the proof strategy in Section 3, the proof of Theorem 2 is unfeasible in the absence of the dichotomy for #EO, hence the introduction of the complexity class FPNP is somehow inevitable. On the other hand, when the intermediate results are independent of the dichotomy for #EO, the FPNP term does not manifest. In other words, if a traditional FP vs. #P dichotomy is later proved for #EO, Theorem 2 will consequently become an FP vs. #P dichotomy as well.

Despite the FPNP part, this article makes a great progression towards the complexity classification of complex-valued Holant. With Theorem 2, it is now sufficient for future studies to focus on the case when all signatures in are of even arity. With Theorem 1, we may further assume that these signatures are irreducible, and each realized signature does not contain a factor of odd arity. In addition, Theorem 2 also encompasses the preceding results in [9, 3, 30]. To the best of our knowledge, the dichotomy results in the field of complex-valued Holant that have not been yet encompassed are precisely those in [12, 26, 7, 24] and this article.

Figure 1: The reduction map for Holant with Δ0. We use K-Holant() to denote Holant(2). We use the term “AB” to mean the corresponding reduction in our proof. It is noteworthy that a node may have multiple outgoing arcs, and in this case at least one of the reduction holds.
Figure 2: The reduction map for Holantodd. We use K-Holant() to denote Holant(2). We use the term ’AB’ to mean the corresponding reduction in our proof. It is noteworthy that a node may have multiple outgoing arcs, and in this case at least one of the reduction holds.

The reductions in the proof of Theorem 2 are summarized as two maps, presented in Figure 1 and 2. Now we present the proof strategy for Theorem 2. Please refer to Section 2 for some specific definitions introduced in this strategy. The proof combines the techniques from the dichotomy for real-valued Holantodd [9] and that for complex-valued Holantc [3]. The structure of the proof is also a combination of those from the aforementioned references, and basically consists of four parts. In general, the structure can be stated as follows.

  1. 1.

    Realize a non-trivial unary signature, and transform it into Δ0 through holographic transformation.

  2. 2.

    Use Δ0 and self-loops to obtain an irreducible ternary signature f.

  3. 3.

    Realize a symmetric signature h of GHZ type with f.

  4. 4.

    Transform h into [1,0,0,1] through holographic transformation, and reduce a certain #CSP to this problem.

Step 1 comes from [9], stated as Lemma 40. In Step 1, the proof uses self-loop to reduce the arity of the odd signature by 2 at a time, while keeping the obtained signature non-trivial. If this process fails, we deal with this case by [9, Theorem 5.3] with some slight modifications. Otherwise we may obtain a unary signature.

Step 2 also comes from [9]. In Step 2, we use Δ0, self-loops and the technique of Unique Prime Factorization (UPF) to reduce the arity of an irreducible signature as in [9]. Again we can realize an irreducible ternary signature f, or deal with other cases by the dichotomy in [3] or [17, Lemma 5.2] with some slight modifications on the origin proof. This part corresponds to the first part of Section 5.1.

Step 3 comes from [3]. We do not further reduce the arity of f to 2 as this part of proof in [9] is quite dependent on the properties of real numbers. Rather, we use the knowledge from quantum entanglement theory to classify such f into different types. We also use the methods developed in [3] to realize a symmetric signature h of GHZ type for different types of signatures. This part corresponds to the last part of Section 5.1.

Step 4 involves the method in [13, Theorem 5], which is also employed in [3]. The only difference between this step and the corresponding proof in [3] is the inability to realize Δ1. However, this does not introduce any challenges. This part corresponds to the middle part of Section 5.1.

On the other hand, we remark that nontrivial obstacles occur in Step 1, 2 and 3.

In Step 1, if the obtained signature is a multiple of [1,𝔦] or [1,𝔦], then the obtained unary signature may not be transformed into Δ0. This special case does not appear in the setting of real-valued signatures, and consequently we need to analyze it separately. The analysis of this part includes a number of reductions, which induces a complicated reduction map, as presented in Figure 2. This obstacle is overcome in Section 5.2. We also remark that in these reductions, the dichotomies respectively for HW, HW and single-weighted signatures are employed, hence the complexity class FPNP is also introduced.

In Step 2, the UPF method employs the decomposition lemma from [22]. As the original lemma does not hold for all complex-valued signature sets, this motivated us to prove the generalized version of decomposition lemma, presented as Theorem 1.

In Step 3, due to the absence of Δ1, we are not able to realize a symmetric h of GHZ type for some f of W type. Furthermore, for some specific f, we may not even simulate Δ1 through polynomial interpolation. By carefully analyzing each possible case, we prove that for such f, f^ is restricted to be either [1,1,0,0] or [0,0,1,1]. For this specific case, we prove that the form of each other signature is also restricted to a specific form, otherwise again symmetric h of GHZ type or Δ1 can be realized. This proof is challenging, as it involves detailed classification of signatures, a special holographic transformation to restrict the form of each signature, the UPF method for reducing the arity and a complicated analysis for the support of each signature. Finally, the only case left is when all signatures in take this specific form, which induces the tractability. The proof of this part is also presented in Figure 1, and involves Lemma 51-56.

This article is organized as follows. In Section 2, we introduce preliminaries needed in this article. In Section 3, we present our main results in detail. In Section 4, we prove Theorem 1. In Section 5, we prove Theorem 2. In Section 6, we conclude our results.

2 Preliminaries

2.1 Definitions and notations

A Boolean domain refers to the set {0,1}, or 𝔽2 for convenience to describe particular classes of tractable signatures. A complex-valued Boolean signature f with r variables is a mapping from {0,1}r to . In particular, this article focuses on algebraic complex-valued Boolean signatures. Given a 01-string α with length r, we use f(α) or fα to denote the value of f on the input α. The set of variables of f is denoted by Var(f), and its size (or arity) is denoted by arity(f). The set of strings on which f has non-zero values is the support of f, denoted by supp(f).

Let α denote a binary string. For s{0,1}, we use #s(α) to denote the number of occurrences of s in α, and #1(α) is also known as the Hamming weight of α. The length of α is denoted by Len(α), and αi refers to its i-th bit. We use 0k and 1k to denote the two strings of length k that only contain 0 and 1 respectively. When the length k is clear from the context, we use 0 and 1 to represent 0k and 1k.

The following notations from [23, 24] are employed in this article.

HW=={α#1(α)=#0(α)}andHW={α#1(α)#0(α)}.

A signature f is an HW= signature or equivalently an EO signature if supp(f)HW=, and such signatures inherently have even arity. Analogously, f is an HW signature if supp(f)HW, and is HW if only contains HW signatures. Similar notations are also defined by replacing “” with “”, “<”, or “>”.

The bitwise addition (XOR) of two strings α and β, denoted by αβ, produces a string γ where γi=αi+βi(mod2) for each i. A set A of strings is affine if αβγA for arbitrary α,β,γA. The affine span of a set S is the minimal affine space containing S. For a signature f, Span(f) denotes the affine span of its support.

A symmetric signature f of arity r is expressed as [f0,f1,,fr]r, where fi is the value of f on all inputs of Hamming weight i and the subscript r can be omitted without causing ambiguity. Commonly used examples include the unary signatures Δ0=[1,0] and Δ1=[0,1], and the binary disequality signature (2)=[0,1,0].

Let 𝒬 denote the class of equality signatures, defined as 𝒬={=1,=2,,=r,}, where =r is the signature [1,0,,0,1]r of arity r. In other words, the output of =r is 1 if all bits of the input are identical (all 0’s or all 1’s), and is 0 otherwise.

The tensor product of signatures is denoted by . We use to denote the closure of under tensor products.

2.2 Frameworks of counting problems

In this subsection, we present pivotal frameworks of counting problems, including Holant and #CSP. We largely refer to [5, Section 1.2] and [8, Section 2.1].

Let denote a fixed finite set of Boolean signatures. A signature grid over , denoted as Ω(G,π), consists of a graph G=(V,E) and a mapping π that assigns to each vertex vV a signature fv, along with a fixed linear order of its incident edges. The arity of each signature fv matches the degree of v, with each incident edge corresponding to a variable of fv. Throughout, we allow graphs to have parallel edges and self-loops. Given any 0-1 edge assignments σ, the evaluation of the signature grid is given by the product vVfv(σ|E(v)), where σ|E(v) represents the restriction of σ to the edges incident to v.

Definition 3 (Holant problems).

A Holant problem, Holant(), parameterized by a set of complex-valued signatures, is defined as follows: Given an instance that is a signature grid Ω(G,π) over , the output is the partition function of Ω,

HolantΩ=σ:E{0,1}vVfv(σ|E(v)).

The bipartite Holant problem Holant(𝒢) is a specific case where G is bipartite, say G(U,V,E), with vertices in U assigned signatures from and vertices in V assigned signatures from 𝒢. We denote the left-hand side (or the right-hand side) in bipartite Holant briefly as LHS (or RHS).

For simplicity of presentation, we omit the curly braces when writing the set of one single signature. For example, we write Holant({f}) as Holant(,f). In addition to bipartite Holant, there are several variants of Holant. We use Holantc() to denote Holant(,Δ0,Δ1). We use K-Holant() to denote Holant(2) and K-Holantc() to denote K-Holant(,Δ0,Δ1).

Another special variant of Holant is counting weighted Eulerian Orientations (#EO) [8]. However, we do not expand on the details here; readers are referred to [23, 24] for relevant works, as well as the full version of this paper [25].

The framework of #CSP is also closely related to Holant [14]. A variant of #CSP, denoted by #CSPd problems [21], also plays a role in our proof.

Definition 4 (#CSP).

Let be a fixed finite set of complex-valued signatures over the Boolean domain. An instance I=(X,C) of #CSP() consists of a finite variable set X={x1,x2,,xn} and a clause set C, where each clause CiC includes a signature fi=f (of arity k) and a selection of variables (xi1,xi2,,xik) from X, allowing repetition. The output of the instance is defined as:

Z(I)=x1,,xn{0,1}(f,xi1,,xik)Cf(xi1,,xik),
Definition 5.

Let d1 be an integer and let be a set of complex-valued signatures. The problem #CSPd() is the restriction of #CSP() to the instances where every variable occurs a multiple of d times.

For an integer d1, let 𝒬d denote the class of equality signatures whose arities are divisible by d, defined by 𝒬d={=d,=2d,,=rd,}. It is well-known that #CSP and #CSPd can be expressed within the Holant framework, as shown in the following lemmas. In this work, we apply polynomial-time Turing reductions (denoted by T) and equivalences (denoted by T) to derive complexity classifications.

Lemma 6 ([5, Lemma 1.2]).

#CSP()THolant(𝒬)

Lemma 7.

For an integer d1, #CSPd()THolant(𝒬d).

2.3 Fundamental methods

In this subsection, we first introduce the theory of unique tensor decomposition for signatures. We then present three pivotal reduction techniques in the study of counting problems: gadget construction, polynomial interpolation, and holographic transformation.

2.3.1 Signature factorization

In the study of Holant problems, the algebraic structure of signatures plays a pivotal role. This section introduces the Unique Prime Factorization (UPF), which is a fundamental method of characterizing signatures.

A non-trivial signature f is irreducible if it cannot be expressed as a tensor product f=gh for non-constant signatures g,h. Then we introduce the Unique Prime Factorization.

Lemma 8 ([8, Lemma 2.13]).

Every non-trivial signature f has a prime factorization f=g1gk, where each gi is irreducible, and the factorization is unique up to variable permutation and constant factors. That is to say, if f=g1gk=h1h, then k=, and there exists a permutation π such that gπ(i)=cihi for each 1ik, where each ci is a constant.

2.3.2 Gadget construction and signature matrix

This subsection introduces two principal concepts in the study of counting problems: gadget construction and the signature matrix. Gadget construction is a critical reduction technique, and the signature matrix provides an algebraic representation bridging gadget construction with matrix multiplication. Please refer to [5] as well as the full version of this paper for details.

Let denote a set of signatures. An -gate is similar to a signature grid Ω(G,π), while the edges of G=(V,E,D) are partitioned into internal edges E (edges that have two ends from V) and dangling edges D (edges that are incident to a single vertex). Let |E|=n and |D|=m, with internal edges encoding variables {x1,,xn} and dangling edges corresponding to {y1,,ym}. The -gate induces a signature f:{0,1}m defined by:

f(y1,,ym)=σ:E{0,1}vVfv(σ^|E(v)),

where σ^:ED{0,1} extends σ by incorporating the assignment 𝐲{0,1}m to dangling edges, and fv denotes the signature assigned to vertex v via π. A signature f is called realizable from if it can be represented by an -gate. If E=, the resulting signature is the tensor product vVfv. We denote the set of all signatures realizable from as S(). For any signature set and fS(), it is shown in [5, Lemma 1.3] that Holant()THolant(,f), which provides a powerful tool to build reductions.

Next we introduce the signature matrix, which is an algebraic representation of a given signature. This representation is conducive to computational convenience. For a signature f:{0,1}r with ordered variables (x1,,xr), its signature matrix with parameter l is M(f)2l×2rl. Its row indices correspond to the assignments to the first l variables (x1,,xl) and its column indices correspond to the assignments to the remaining rl variables (xl+1,,xr). The entry is the corresponding value of f given the input that combines the row index and the column index. For even arity signatures, l=r/2 is commonly used. The matrix is denoted by Mx1xl,xl+1xr(f) or simply Mf without causing ambiguity.

We address several operations in gadget construction. The first operation is adding a self-loop. Suppose f is a signature and Var(f)={x1,,xn}. Suppose b is a binary signature with Mb=(b00b01b10b11). By adding a self-loop using a binary signature b on x1 and x2 of f we mean connecting x1 to the first variable of b and x2 to the second variable of b, obtaining a signature f. Here we use x to denote (x3,,xn) and we have: f(x)=b00f(0,0,x)+b01f(0,1,x)+b10f(1,0,x)+b11f(1,1,x). We use ijf (or ij^f^) to denote the signature obtained by adding a self-loop using =2 (or 2) on xi and xj of f (or f^).

The second operation is pinning. Given f as a signature, the pinning operation connects Δ0 or Δ1 to one of f’s variables. We use fx1=0 and fx1=1 to denote the resulting signature after connecting the first variable x1 to Δ0 and Δ1 respectively.

Lemma 9 ([9, Lemma 3.9]).

Let f be a signature of arity n2. If for any index i, by pinning the variable xi of f to 0, we have fxi=00, then fα=0 for any α satisfying #1(α)n. Furthermore, if there is a pair of indices {j,k} such that jkf0, then f0.

2.3.3 Holographic transformations and SLOCC

In the study of Holant problems, holographic transformations provide a powerful tool for complexity classification. This section formalizes key concepts and theorems, and presents their relation with quantum computation.

For any graph G, a bipartite graph preserving the Holant value can be constructed via the 2-stretch operation: each edge e is replaced by a path of length two, introducing a new vertex assigned =2. We present the equivalence that Holant(=2)THolant(), where denotes a set of signatures.

Let T𝐆𝐋2() be an invertible 2×2 matrix. For a signature f of arity n, represented as a column vector f2n, the transformed signature is denoted by Tf=Tnf. For a signature set , we define T={Tff}. The transformation of contra-variant signatures (row vectors) is fT1. When we write Tf or T, f and signatures in are regarded as column vectors by default; similarly for fT or T as row vectors. We also use Tf to denote the matrix MV,Var(f)V(Tf), where V is a subset of Var(f). Suppose |V|=k, we have MV,Var(f)V(Tf)=TkMV,Var(f)V(f)(TT)(nk). Similarly, MV,Var(f)V(fT1)=(TT)kMV,Var(f)V(f)(T1)(nk), where we briefly denote (T1)T as TT and |V|=k.

Suppose TGL2(). A holographic transformation defined by T applies T to all signatures in the RHS and T1 to all signatures in the LHS. In other words, given a signature grid Ω=(H,π) of Holant(𝒢), the transformed grid Ω=(H,π) is an instance of Holant(T1T𝒢).

Theorem 10 ([29]).

For any T𝐆𝐋2(),

Holant(𝒢)THolant(T1T𝒢).

Theorem 10 shows that holographic transformations preserve the complexity of bipartite Holant problems. We use 𝒪 to denote all orthogonal matrices, that is 𝒪={OGL2()OTO=(1001)}. Notably, any holographic transformation by O𝒪 keeps the binary Equality signature invariant: (=2)O1=(=2), hence Holant(=2)THolant(=2O).

A pivotal holographic transformation employs K1=12[1𝔦1𝔦], mapping (=2) to the disequality signature (=2)K=(2), yielding Holant(=2)THolant(2K1). We use f^ and ^ to denote K1f and K1 respectively, and X=(0110) to denote the signature matrix of 2. It can be verified that K=12(11𝔦𝔦). Furthermore, with these notations, we have Holant()TK-Holant(^).

We are also interested in what kind of holographic transformations keeps 2 invariant, and by direct computation we have the following lemma.

Lemma 11.

Let Q^=(1/q00q) or (01/qq0), where q0. Then (2)Q^=(2) and K-Holant()TK-Holant(Q^1). Furthermore, any matrix A satisfying (2)A=(2) is of the form (1/q00q) or (01/qq0), where q0.

Sometimes, it is more convenient to study a Holant problem in the setting of K-Holant. As presented in Lemma 11, holographic transformations that keep 2 invariant do not change the support of signatures on the RHS, except for a possible exchange of the symbol of 0 and 1 for all signatures. Consequently, many results are proved by analyzing the support in the setting of K-Holant. The following lemma is such an example, which is also useful in our proof.

Lemma 12 ([8]).

Let f^ be a signature of arity k3. If for any indices 1i,jk, by adding a self-loop on xi and xj of f^ using 2, ij^f^0, then f^(α)=0 for arbitrary α with 0<#1(α)<n.

A concept in the quantum computation theory called Stochastic Local Operations and Classical Communication (SLOCC) [4, 19] is a generalization of the holographic transformation, which allows distinct transformations on each qubits, or variables in the setting of Holant. For an n-ary signature f, SLOCC applies M1Mn with Mi𝐆𝐋2() on f. When Mi=T for each 1in, it is exactly the holographic transformation defined by T. Backens [2] leveraged SLOCC to establish the dichotomy theorem for Holant+ and Holantc, which implies relations between counting problems and the quantum computation theory.

Besides, a classification of ternary irreducible signatures under SLOCC is given in [19].

Lemma 13 ([19]).

Suppose g is a ternary irreducible signature. Then one of the following holds.

  1. 1.

    g is of GHZ type. That is, g=(M1M2M3)[1,0,0,1];

  2. 2.

    g is of W type. That is, g=(M1M2M3)[0,1,0,0],

where M1,M2,M3𝐆𝐋2().

2.3.4 Polynomial interpolation

Polynomial interpolation is a powerful tool to build reductions as well. Detailed information about it can be found in [5], and it is sufficient for us to use the following lemma in our proof, whose proof follows from polynomial interpolation.

Lemma 14.

In the setting of K-Holant(^), if (n+1) pairwise linearly independent unary signatures with poly(n)-size can be realized in poly(n) time for any n+ in the setting of K-Holant, then K-Holant(^,[1,1])TK-Holant(^).

2.4 Known dichotomies

In this section, we introduce important results of complexity classifications of counting problems.

2.4.1 #CSP and #CSP𝒅

Let X=(x1,x2,,xd,1)T be a (d+1)-dimensional column vector over 𝔽2 and A be a matrix over 𝔽2. The indicator function χAX takes value 1 when AX=𝟎 and 0 otherwise, which indicates an affine space.

Definition 15.

We denote by 𝒜 the set of signatures which have the form λχAX𝔦L1(X)+L2(X)++Ln(X), where 𝔦 is the imaginary unit, λ, n+. Each Lj is a 0-1 indicator function of the form αj,X, where αj is a (d+1)-dimensional vector over 𝔽2, and the dot product , is computed over 𝔽2.

Definition 16.

We denote by 𝒫 the set of all signatures which can be expressed as a product of unary signatures, binary equality signatures (=2) and binary disequality signatures (2) on not necessarily disjoint subsets of variables.

The following property will be used in our proof, which can be verified from Definition 15 and 16 directly.

Lemma 17.

Suppose f,g are binary signatures and Mf=Mg1. Then f𝒜 (or 𝒫) if and only if g𝒜 (or 𝒫 respectively).

Now we can state the vital theorem that classifies complex-valued Boolean #CSP problems as follows:

Theorem 18 ([16, Theorem 3.1]).

Suppose is a finite set of signatures mapping Boolean inputs to complex numbers. If 𝒜 or 𝒫, then #CSP() is computable in polynomial time. Otherwise, #CSP() is #P-hard.

Next we introduce the complexity classification of #CSPd(). In this article, we focus on the case that d=2 and a special case that 2. Let ρd=eiπ2d be a 4d-th primitive root of unity, Td=(100ρd), and 𝒜dr={Tdrff𝒜}, where r[d]. A signature f:{0,1}n is called local affine if it satisfies (j=1nT2αj)f𝒜 for any αsupp(f). The set of all local affine signatures is denoted by . The dichotomies are stated as follows.

Theorem 19 ([17]).

Suppose is a finite set of signatures. If 𝒜,𝒫,𝒜21 or , then #CSP2() is polynomial-time computable, otherwise it is #P-hard.

Theorem 20 ([9, Theorem 5.3]).

Let be a set of complex-valued signatures. If 𝒫 or 𝒜dr for some r[d], then #CSPd(2,) is tractable; otherwise, #CSPd(2,) is #P-hard.

2.4.2 Holant𝒄

Several important notations and definitions are introduced.

Definition 21.

We use following notations.

  • 𝒯 is the set of all unary and binary signatures.

  • :={fα{0,1}arity(f) such that f(x)=0 if x{α,α¯}}.

  • :={ff(x)=0 if #1(x)>1} is the set of weighted matching signatures.

  • :={MMT{=2,Δ0,Δ1}𝒜}.

Definition 22.

We say a signature set is 𝒞-transformable if there exists a MGL2() such that =2M𝒞 and M1𝒞.

Theorem 23 ([3, Theorem 59]).

Let be finite. Then Holantc() is #P-hard unless:

  1. 1.

    𝒯;

  2. 2.

    {Δ0,Δ1} is 𝒫-transformable. Equivalently, there exists O𝒪 such that O, or K=KX;

  3. 3.

    K or KX;

  4. 4.

    {Δ0,Δ1} is 𝒜-transformable. Equivalently, there exists B such that B𝒜;

  5. 5.

    .

In all of the exceptional cases, Holantc() is polynomial-time computable.

We remark that, if 𝒯, then Holant() is polynomial-time computable directly by sequential matrix multiplication.

2.4.3 K-Holant

Let f be an EO signature of arity 2d with Var(f)={x1,x2,,x2d}. For an arbitrary perfect pairing P of Var(f), say P={{xi1,xi2},{xi3,xi4},,{xi2d1,xi2d}}, we define EOP as the subset of {0,1}2d satisfying that EOP={α{0,1}2dαi1αi2,,αi2d1αi2d}.

Definition 24.

Suppose f is an arity 2d EO signature and SHW=. f|S is the restriction of f to S, which means when αS, f|S(α)=f(α), otherwise f|S(α)=0.

If for any perfect pairing P of Var(f), f|EOP𝒜, then we say that f is EO𝒜.

Similarly, if for any perfect matching P of Var(f), f|EOP𝒫, then f is EO𝒫.

Definition 25.

Let f be an EO signature. If for arbitrary α,β,γsupp(f) and δ=αβγ, either δHW> (or δHW< respectively) or δsupp(f) holds, then f is a 3[Uncaptioned image] signature (or a 3[Uncaptioned image] signature respectively).

Theorem 26 ([23, 24]).

Let be a set of EO signatures. is called #EO-quasi-tractable when the following conditions hold:

  • All signatures in are 3[Uncaptioned image] signatures, or all signatures in are 3[Uncaptioned image] signatures;

  • EO𝒜, or EO𝒫.

K-Holant() is #P-hard, unless is #EO-quasi-tractable, in which cases it is in FPNP.

For a signature f, we use f|EO to denote the signature which satisfies that f|EO(α)=f(α) if αHW=, and f|EO(α)=0 otherwise. This notation is consistent with Definition 24 by regarding the symbol EO as HW=. We use |EO to denote the set {f|EOf}. A direct corollary of Theorem 26 is the dichotomy for K-Holant problems defined by HW (or HW) signatures.

Corollary 27 ([24]).

Suppose is a set of HW (or HW respectively) signatures. Then K-Holant() is #P-hard, unless |EO is #EO-quasi-tractable, in which cases it is in FPNP.

At last we introduce the dichotomy for K-Holant problems defined by single-weighted signatures. Suppose f is a signature of arity k. If f takes the value 0 on all input strings whose Hamming weight is not equal to d, where d is an integer satisfying 0dk, then we say f is a single-weighted signature.

For each single-weighted signature f of arity k which can only take non-zero values at Hamming weight d,0dk, let

fEO={fΔ02dk2dk;fΔ1k2d,2d<k.

Let EO={fEO|f}. Then we can state the dichotomy for K-Holant problems defined by single-weighted signatures.

Theorem 28 ([24]).

Suppose is a set of single-weighted signatures. Then K-Holant() is #P-hard, unless one of the following holds, in which cases it is in FPNP.

  1. 1.

    All signatures in are HW (or HW respectively) signatures, and |EO is #EO-quasi-tractable;

  2. 2.

    There exist a non-HW signature and a non-HW signature belonging to , and EO is #EO-quasi-tractable.

3 Main results

In this section, we present our main results in detail. The first result is the generalized decomposition lemma, which can be applied within the complex-valued Holant framework and provides a powerful tool to make complexity classifications. We give the proof of the following theorem in Section 4.

Theorem 29 (Decomposition lemma).

Let be a set of signatures and f, g be two signatures. Then

Holant(,f,g)THolant(,fg)

holds unless ^ only contains HW signatures (or HW signatures respectively), where ^ denotes ^{f^g^}. In the latter situation, if ^|EO is #EO-quasi-tractable, then Holant(,fg) is in FPNP. Otherwise it is #P-hard.

The second result is the dichotomy for complex-valued Holantodd. The proof of it is in Section 5.3.

Theorem 30 (Dichotomy for Holantodd).

Let be a set of signatures that contains a non-trivial signature of odd arity, then Holant() is #P-hard unless:

  1. 1.

    ^ only contains HW signatures (or HW signatures respectively), and ^|EO is #EO-quasi-tractable;

  2. 2.

    All signatures in ^ are single-weighted, there exist a non-HW signature and a non-HW signature belonging to ^, and ^EO is #EO-quasi-tractable;

  3. 3.

    𝒯;

  4. 4.

    K or KX;

  5. 5.

    is 𝒜-transformable;

  6. 6.

    is 𝒫-transformable;

  7. 7.

    is -transformable;

In case 1, 2, Holant() is in FPNP; in case 3–7, Holant() is polynomial time computable. We denote Case 1–7 as condition (𝒫𝒞).

 Remark 31.

In case 1, 2 of condition (𝒫𝒞), there are parts of situations where the problem is actually polynomial time computable. One typical example is vanishing signatures. Suppose is a set of signatures. It is called vanishing if the partition functions of all instances of Holant() are 0. By Lemma 39, if ^ is HW< or HW>, or equivalently is vanishing, then Holant() is polynomial-time computable. We do not address these classes in this article, and the detailed information can be found in [23, 24].

The proof of Theorem 30 consists of two parts. Firstly, we prove a dichotomy for complex-valued Holant when Δ0 is available, stated as Lemma 32 in the following. In particular, we remark that it is a traditional FP vs. #P dichotomy. The reduction map of it is presented as Figure 1. Then we prove the dichotomy for complex-valued Holantodd based on this dichotomy, whose reduction map is presented as Figure 2.

Lemma 32.

Let be a set of signatures, then Holant(,Δ0) is #P-hard unless:

  1. 1.

    𝒯;

  2. 2.

    K or KX;

  3. 3.

    {Δ0} is 𝒜-transformable;

  4. 4.

    is 𝒫-transformable;

  5. 5.

    {Δ0} is -transformable;

in which cases, Holant(,Δ0) is polynomial-time computable.

4 Decomposition lemma

In this chapter, we present the generalized decomposition lemma, which demonstrates that, under certain conditions, Holant(f,g,)THolant(fg,), otherwise the computational complexity of Holant(fg,) is known. The proof of this result relies on some preliminary lemmas, which are presented in the following.

Lemma 33 ([22, Lemma 3.1]).

For any signature set and signature f,

Holant(,f)THolant(,fd)

for all d1.

Lemma 34 ([22, Lemma 3.2]).

Let be a set of signatures, and f, g be two signatures. Suppose that there exists an instance Ω of Holant(,f,g) such that HolantΩ0, and the number of occurrences of g in Ω is greater than that of f. Then

Holant(,f,fg)THolant(,fg).
Lemma 35 ([22, Corollary 3.3]).

Let be a set of signatures, and f, g be two signatures. If g is not vanishing, then

Holant(,f,fg)THolant(,fg).
 Remark 36.

As mentioned in [8], the unique prime factorization of a signature f naturally divides Var(f) into several sets, each corresponding to a prime factor of f. It can be easily verified that the partition of Var(f) remains unchanged under holographic transformation (even SLOCC). Therefore, we can apply the three lemmas above in the setting of K-Holant.

Lemma 37.

Suppose f is a signature and αsupp(f). Suppose #0(α)#1(α)=k>0 (or #1(α)#0(α)=k>0), then a signature g of arity k can be obtained by adding self-loops using 2 on f such that g(0)0 (or g(1)0 respectively).

Corollary 38.

Suppose f is an HW> (or HW<) signature, by adding self-loop by 2 we can always obtain λΔ1r (or λΔ0r), where r>0 is an integer.

Symmetric vanishing signatures have been characterized in [12]. The following lemma characterizes vanishing signatures not necessarily to be symmetric.

Lemma 39.

Suppose f is a signature and f^=K1f. Then the following two statements are equivalent:

  1. 1.

    f is vanishing;

  2. 2.

    f^ is a HW> or HW< signature.

5 Dichotomy for Holantodd

In this chapter, we prove the dichotomy for complex-valued Holantodd. We emphasize that in the proofs of this chapter, we often normalize signatures by default for convenience, since this operation does not affect the computational complexity. For example, we write λΔ0,λ0 as Δ0 by default. By Theorem 29, we can always assume the signatures in are irreducible in this section. We commence with the following lemmas, which separate Holantodd into several cases.

Lemma 40.

Suppose f is a non-trivial signature of odd arity. Then one of the following statements holds:

  1. 1.

    There exists some matrix Q2×2 such that Holant(Q,Δ0)THolant();

  2. 2.

    K-Holant(^,Δ0)THolant();

  3. 3.

    K-Holant(^,Δ1)THolant();

  4. 4.

    K-Holant(^,[a,0,,0,b]2k+1)THolant() for some k+, where ab0.

In the following, we classify the complexity of each case in Lemma 40 respectively. In Section 5.1, we deal with Case 1 and prove Lemma 32. In Section 5.2, we deal with other cases. In Section 5.3 we present the proof of Theorem 30.

5.1 A dichotomy for Holant problems when 𝚫𝟎 is available

In this section, we prove Lemma 32. The reductions appearing in this section are summarized as a map in Figure 1.

If 𝒯, Holant(,Δ0) is polynomial-time computable. As a result, we may assume there exists an irreducible signature f with arity(f)3. By replacing the original decomposition lemma by our generalized version Theorem 29, the following result, which previously only holds for real-valued Holant [9, Lemma 1.8], can be extended to complex-valued Holant.

Lemma 41.

Suppose f is irreducible with arity(f)3. Then one of the following holds.

  1. 1.

    There is a ternary irreducible gS(f,Δ0);

  2. 2.

    There is a quaternary gS(f,Δ0) satisfying Mg=(a00b00000000c00d),adbc0;

  3. 3.

    Δ1S(f,Δ0).

The complexity of the third situation can be classified by Theorem 23. The following lemmas can be used to deal with the second situation. Combining them with Theorem 19, the complexity classification of the second situation is done.

Lemma 42 ([6, Part of Lemma 2.40]).

Suppose fS() satisfying Mf=(a00b00000000c00d), adbc0. Then Holant(,=4)THolant().

Lemma 43 ([17, Lemma 5.2]).

Suppose (=4). Then Holant()T#CSP2().

We now focus on the first situation. First, we show that the complexity can be classified if there exists a symmetric signature of GHZ type. A symmetric signature of GHZ type is denoted as the generic case in [13]. We present the following lemmas from [13]. It is noteworthy that the concept of ω-normalized signature is important in the following known lemmas, but its explicit definition does not need to be understood in our proof.

Lemma 44 ([13]).

Suppose g is a symmetric signature of GHZ type, then there exists M𝐆𝐋2() such that g=M[1,0,0,1].

Lemma 45 ([13]).

Suppose [y0,y1,y2] is ω-normalized and nondegenerate, and one of the following holds:

  1. 1.

    y00 or y20;

  2. 2.

    y0=y2=0, and there exists a unary ω-normalized signature [a,b]𝒢1 satisfying ab0.

Then,

Holant(𝒢1,[y0,y1,y2]𝒢2,=3)T#CSP(𝒢1,𝒢2,[y0,y1,y2])

Let Ω3={ωω3=1}. To apply Lemma 45, the following facts would be useful.

Lemma 46 ([13]).

[0,1,0] is ω-normalized.

For any symmetric binary signature f, there exists Mω=(100ω),ωΩ3 such that fMω is ω-normalized.

For any unary signature f=[a,b],ab0, there exists Mω=(100ω),ωΩ3 such that fMω is ω-normalized.

Now we are ready to prove the following lemma.

Lemma 47.

Suppose g is a symmetric signature of GHZ type, then there exists an invertible matrix N such that

Holant(,g,Δ0)T#CSP(=2N,Δ0N,N1,N1Δ0)

Noticing that by Lemma 47, once a symmetric ternary signature of GHZ type is realized, we can apply the complexity classification from the #CSP dichotomy. Backens also presents methods for symmetrization [2, 3]. Using those methods, we can realize a symmetric signature of GHZ type in most situations.

Lemma 48 ([2]).

Suppose f is of GHZ type. Then there exists an irreducible symmetric signature hS({f}).

Lemma 49 ([2]).

Suppose f is of W type and fKKX. Then there exists a symmetric signature hS({f}) of GHZ type.

Lemma 50 ([2]).

Suppose there is an irreducible ternary signature fK and a binary signature gK. Then there exists a symmetric signature hS({f,g}) of GHZ type. The same statement also holds after replacing K with KX.

In the following analysis, we assume there is an irreducible ternary signature fK, and the analysis when fKX is similar. Furthermore, we consider this case in the setting of K-Holant. We remark that K1Δ0=[1,1].

We begin with the analysis of f^.

Lemma 51.

Suppose g^^ satisfies Mg^=(abc0),abc0. Then,

K-Holant(^,[1,1])THolantc()
Lemma 52.

Suppose f^^ is an irreducible ternary function and not a multiple of [1,1,0,0]. Then,

K-Holant(^,[1,1])THolantc()

By Lemma 52 and Theorem 23, the only unsolved case is when f^=[1,1,0,0]. Consequently we can assume [1,1,0,0]^. In this case, firstly we consider the form of unary and binary signatures in ^.

Lemma 53.

Suppose [1,1,0,0],g^^, where g^=[a,1],a1. Then

K-Holant(^,[1,1])THolantc()
Lemma 54.

Suppose [1,1,0,0],g^^, where g^ is an irreducible binary signature and not a multiple of [0,1,0]. Then one of the following holds:

  1. 1.

    There exists an invertible matrix N such that

    Holant(,Δ0)T#CSP(=2N,Δ0N,N1,N1Δ0).

  2. 2.

    K-Holant(^,[1,1])THolantc().

This result can also be extended to irreducible ternary signatures.

Lemma 55.

Suppose [1,1,0,0],g^^, where g^ is an irreducible ternary signature and not a multiple of [1,1,0,0]. Then one of the following holds:

  1. 1.

    There exists an invertible matrix N such that

    Holant(,Δ0)T#CSP(=2N,Δ0N,N1,N1Δ0).
  2. 2.

    K-Holant(^,[1,1])THolantc().

By Lemma 53, 54 and 55, the only case left is that all irreducible unary, binary and ternary signatures in ^ belong to {Δ0,[1,1],[0,1,0],[1,1,0,0]}. The following lemma analyzes this last case.

Lemma 56.

Suppose [1,1,0,0]^ and ={Δ0}{[k,1,0,,0]k+2k1}. Then one of the following statements holds:

  1. 1.

    ^.

  2. 2.

    An irreducible signature h^ with arity less than 4 can be realized in the setting of K-Holant(^,[1,1]).

It is noteworthy that when ^, K-Holant(^) is polynomial time computable. When the second statement holds, by Lemma 53, 54 and 55, the complexity classification of Holant() is done.

5.2 Other cases

In this section, we classify the complexity of Case 2-4 in Lemma 40. The reductions in this section are summarized as a map, presented as Figure 2. We commence with the following lemmas employed in Case 4.

Lemma 57 ([9, Lemma 5.2]).

For any k3, #CSPk(2,F)TK-Holant(=k,F).

Lemma 58.

For arbitrary integer k3 and ab0, there exists Q^2×2 such that #CSPk(2,Q^^)TK-Holant(^,[a,0,,0,b]k).

Lemma 59.

If #CSPk(2,Q^^) is tractable, then K-Holant(^,[a,0,,0,b]k) is also tractable.

Lemma 59 can be proved by directly checking the tractable cases of #CSPk problems and holographic transformation. Combining Lemma 58 and 59 we have #CSPk(2,Q^^)TK-Holant(^,[a,0,,0,b]k), which completes the complexity classification in Case 4.

For Case 2 and 3 in Lemma 40, we have the following lemma.

Lemma 60.

Let c{0,1}. Then one of the following statements holds:

  1. 1.

    All signatures in ^{Δc} are HW (or HW respectively);

  2. 2.

    Holant(Q,Δ0,[1,(1)c𝔦])TK-Holant(^,Δc) for some Q𝒪;

  3. 3.

    K-Holantc(^)TK-Holant(^,Δc).

The complexity of the first and second situation in Lemma 60 is already classified in Theorem 27 and Lemma 32. We now focus on the situation that the third statement holds.

Lemma 61.

Suppose f^ is of arity k3, α,βsupp(f^) and one of α,β is not in {0k,1k}. Then there exists a signature f^ satisfying the following conditions.

  • K-Holantc(f^,f^)TK-Holantc(f^) and arity(f^)<k.

  • α,βsupp(f^) and #1(α)#1(β)=#1(α)#1(β).

Lemma 62.

One of the following statements holds for K-Holantc(^).

  1. 1.

    All signatures in ^ are single-weighted.

  2. 2.

    There exists a Q^=(1/r00r) such that K-Holantc(Q^^,[1,0,,0,1]k)TK-Holantc(^).

In the first statement of Lemma 62, the complexity of K-Holantc(^) is already classified by Theorem 28. In the second statement of Lemma 62, when k3, the complexity is already classified by Lemma 58 and 59. When k=1, the complexity is already classified by Lemma 32. By the following lemma and Theorem 23 we complete the complexity classification when k=2.

Lemma 63.

Holantc(^,2)TK-Holantc(^,=2).

5.3 Proof of the main theorem

In preparation for the proof of Theorem 30, we introduce an important lemma.

Lemma 64.

Let be a set of complex-valued signatures that satisfies condition (𝒫𝒞). Then for any O𝒪, O satisfies condition (𝒫𝒞).

We remark that by Lemma 64 and reduction to absurdity, for any O𝒪, if does not satisfy condition (𝒫𝒞), then O also does not satisfy condition (𝒫𝒞). A direct corollary is presented in the following.

Corollary 65.

Let be a set of complex-valued signatures and does not satisfy condition (𝒫𝒞). Then for any O𝒪, #CSP(O), #CSP2(O), Holantc(O), K-Holant(K1O) are #P-hard.

6 Conclusion

In this article, we prove a generalized decomposition lemma for complex-valued Holant. Based on this lemma, we further prove a dichotomy for Holant when a non-trivial signature of odd arity exists (Holantodd).

We emphasize that this dichotomy for Holantodd is still an FPNP vs. #P dichotomy due to the dichotomy for #EO in [24]. As stated in [24], a specific problem defines the NP oracle and leads to the study of Boolean constraint satisfaction problems [20]. It is our hope that a complete complexity classification of this kind of problems can be established in the future.

Furthermore, it is worthwhile to pursuit the dichotomy for complex-valued Holant. By Theorem 29 and 30, the only remaining case is when all signatures in are of even arity and irreducible. Nevertheless, the analysis of this case may present significant challenges, as was evidenced in the proof of its sub-cases [26, 7].

References

  • [1] Sanjeev Arora and Boaz Barak. Computational complexity: a modern approach. Cambridge University Press, 2009. URL: http://www.cambridge.org/catalogue/catalogue.asp?isbn=9780521424264.
  • [2] Miriam Backens. A new Holant dichotomy inspired by quantum computation. arXiv preprint arXiv:1702.00767, 2017. arXiv:1702.00767.
  • [3] Miriam Backens. A full dichotomy for Holantc, inspired by quantum computation. SIAM Journal on Computing, 50(6):1739–1799, 2021.
  • [4] Charles H Bennett, Sandu Popescu, Daniel Rohrlich, John A Smolin, and Ashish V Thapliyal. Exact and asymptotic measures of multipartite pure-state entanglement. Physical Review A, 63(1):012307, 2000.
  • [5] Jin-Yi Cai and Xi Chen. Complexity dichotomies for counting problems: Volume 1, Boolean domain. Cambridge University Press, 2017.
  • [6] Jin-Yi Cai and Zhiguo Fu. Holographic algorithm with matchgates is universal for planar #CSP over Boolean domain. SIAM Journal on Computing, 51(2):STOC17–50, 2019.
  • [7] Jin-Yi Cai and Zhiguo Fu. Complexity classification of the eight-vertex model. Information and Computation, 293:105064, 2023. doi:10.1016/j.ic.2023.105064.
  • [8] Jin-Yi Cai, Zhiguo Fu, and Shuai Shao. Beyond #CSP: A dichotomy for counting weighted Eulerian orientations with ARS. Information and Computation, 275:104589, 2020. doi:10.1016/j.ic.2020.104589.
  • [9] Jin-Yi Cai, Zhiguo Fu, and Shuai Shao. From Holant to quantum entanglement and back. arXiv preprint, 2020. arXiv:2004.05706.
  • [10] Jin-Yi Cai, Zhiguo Fu, and Mingji Xia. Complexity classification of the six-vertex model. Information and Computation, 259:130–141, 2018. doi:10.1016/j.ic.2018.01.003.
  • [11] Jin-Yi Cai, Heng Guo, and Tyson Williams. A complete dichotomy rises from the capture of vanishing signatures. In Proceedings of the forty-fifth annual ACM symposium on Theory of computing, pages 635–644. Association for Computing Machinery, 2013. doi:10.1145/2488608.2488687.
  • [12] Jin-Yi Cai, Heng Guo, and Tyson Williams. A complete dichotomy rises from the capture of vanishing signatures. In Proceedings of the forty-fifth annual ACM symposium on Theory of computing, pages 635–644, 2013.
  • [13] Jin-Yi Cai, Sangxia Huang, and Pinyan Lu. From Holant to #CSP and back: Dichotomy for Holantc problems. Algorithmica, 64:511–533, 2012. doi:10.1007/s00453-012-9626-6.
  • [14] Jin-Yi Cai, Pinyan Lu, and Mingji Xia. Holant problems and counting CSP. In Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, STOC ’09, pages 715–724. Association for Computing Machinery, 2009. doi:10.1145/1536414.1536511.
  • [15] Jin-Yi Cai, Pinyan Lu, and Mingji Xia. Dichotomy for Holant* problems of Boolean domain. In Proceedings of the twenty-second annual ACM-SIAM symposium on Discrete Algorithms, pages 1714–1728. SIAM, 2011. doi:10.1137/1.9781611973082.132.
  • [16] Jin-Yi Cai, Pinyan Lu, and Mingji Xia. The complexity of complex weighted Boolean #CSP. Journal of Computer and System Sciences, 80(1):217–236, 2014. doi:10.1016/j.jcss.2013.07.003.
  • [17] Jin-Yi Cai, Pinyan Lu, and Mingji Xia. Dichotomy for real Holantc problems. In Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, pages 1802–1821. SIAM, 2018. doi:10.1137/1.9781611975031.118.
  • [18] Jin-Yi Cai and Ben Young. Planar #CSP equality corresponds to quantum isomorphism–a Holant viewpoint. ACM Transactions on Computation Theory, 16(3):1–41, 2024. doi:10.1145/3689486.
  • [19] Wolfgang Dür, Guifre Vidal, and J Ignacio Cirac. Three qubits can be entangled in two inequivalent ways. Physical Review A, 62(6):062314, 2000.
  • [20] Tomás Feder and Daniel Ford. Classification of bipartite boolean constraint satisfaction through delta-matroid intersection. SIAM Journal on Discrete Mathematics, 20(2):372–394, 2006. doi:10.1137/S0895480104445009.
  • [21] Sangxia Huang and Pinyan Lu. A dichotomy for real weighted Holant problems. computational complexity, 25:255–304, 2016. doi:10.1007/s00037-015-0118-3.
  • [22] Jiabao Lin and Hanpin Wang. The complexity of Boolean Holant problems with nonnegative weights. SIAM Journal on Computing, 47(3):798–828, 2018. doi:10.1137/17M113304X.
  • [23] Boning Meng, Juqiu Wang, and Mingji Xia. P-time algorithms for typical #EO problems. arXiv preprint, 2024. doi:10.48550/arXiv.2410.11557.
  • [24] Boning Meng, Juqiu Wang, and Mingji Xia. The FPNP versus #P dichotomy for #EO, 2025. doi:10.48550/arXiv.2502.02012.
  • [25] Boning Meng, Juqiu Wang, Mingji Xia, and Jiayi Zheng. From an odd arity signature to a Holant dichotomy, 2025. doi:10.48550/arXiv.2502.05597.
  • [26] Shuai Shao and Jin-Yi Cai. A dichotomy for real Boolean Holant problems. In 2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS), pages 1091–1102. IEEE, 2020. doi:10.1109/FOCS46700.2020.00105.
  • [27] Shuai Shao and Zhuxiao Tang. Eulerian orientations and Hadamard codes: A novel connection via counting. arXiv preprint, 2024. doi:10.48550/arXiv.2411.02612.
  • [28] Leslie G. Valiant. Accidental algorthims. In Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science, FOCS ’06, pages 509–517. IEEE Computer Society, 2006. doi:10.1109/FOCS.2006.7.
  • [29] Leslie G Valiant. Holographic algorithms. SIAM Journal on Computing, 37(5):1565–1594, 2008. doi:10.1137/070682575.
  • [30] Peng Yang, Yuan Huang, and Zhiguo Fu. The computational complexity of Holant problems on 3-regular graphs. Theoretical Computer Science, 982:114256, 2024. doi:10.1016/j.tcs.2023.114256.