Reachability in Symmetric VASS
Abstract
We investigate the reachability problem in symmetric vector addition systems with states (vass), where transitions are invariant under a group of permutations of coordinates. One extremal case, the trivial groups, yields general vass. In another extremal case, the symmetric groups, we show that the reachability problem can be solved in PSpace, regardless of the dimension of input vass (to be contrasted with Ackermannian complexity in general vass). We also consider other groups, in particular alternating and cyclic ones. Furthermore, motivated by the open status of the reachability problem in data vass, we estimate the gain in complexity when the group arises as a combination of the trivial and symmetric groups.
Keywords and phrases:
vector addition systems, Petri nets, reachability problem, symmetry, permutation groupFunding:
Łukasz Kamiński: Partially supported by NCN grant 2021/41/B/ST6/00535.Copyright and License:
2012 ACM Subject Classification:
Theory of computation Distributed computing modelsEditors:
Paweł Gawrychowski, Filip Mazowiecki, and Michał SkrzypczakSeries and Publisher:
Leibniz International Proceedings in Informatics, Schloss Dagstuhl – Leibniz-Zentrum für Informatik
1 Introduction
Petri nets, equivalently presentable as vector addition systems with states (vass), are an established model of concurrency with widespread applications. The central algorithmic problem for this model is the reachability problem which asks whether from a given initial configuration there exists a sequence of valid execution steps reaching a given final configuration. The decidability of the problem was established in 1981 by Mayr [19], and subsequently improved by Kosaraju [11] and Lambert [12]. The exponential space lower bound was shown by Lipton already in 1976 [18]. For around 40 years these were the only known complexity bounds, and the complexity of the problem remained for a long time as one of the hardest open questions in the verification of concurrent systems. Only in the last few years we have seen a sudden progress, namely an Ackermannian upper bound [17], a breakthrough non-elementary lower bound [3, 4], and finally the matching Ackermannian lower bound (independently [5] and [16]).
All the above-mentioned bounds are more fine-grained and apply to the problem parametrised by the dimension, where the input is restricted to -dimensional vass (-vass) for fixed . Both the upper and lower bounds have been subsequently further improved [14, 2, 9], and currently the reachability problem for -vass is known to belong to the complexity class , and for -vass it is known to be -hard. Here denotes the th level of the hierarchy of complexity classes corresponding to Grzegorczyk’s fast growing function hierarchy. For instance, the currently best lower bound of [2] shows the reachability problem for -vass to be hard for the class . Subsequently, [6] proved the same complexity bound even for -vass. Summing up, for sufficiently large dimensions the lower bound is prohibitive.
Symmetric VASS.
In this paper we investigate subclasses of -vass which are symmetric, meaning their sets of transitions are invariant under certain permutations of the coordinates . Our study is parametric in the choice of a group of permutations of coordinates, and our objective is to analyze the gain in complexity to be achieved when the input to the reachability problem is restricted to -vass, the subclass of those -vass whose sets of transitions are invariant under permutations . In one extreme case, when is the trivial permutation group containing just the identity permutation, -vass are just general -vass. In another extreme case, when is the symmetric group of degree , transitions of -vass are invariant under all permutations of coordinates. The two extreme cases may be combined. For instance, one can consider the permutation group of degree containing all permutations that are identity inside each of the -element blocks:
but permute arbitrarily the whole blocks.
Our principal motivation is to exploit symmetry of a model in order to lower the prohibitively high complexity of the reachability problem in the general case. Another motivation comes from the model of data vass [13, 15, 20] extending plain vass with data. In terms of Petri nets, the extension allows tokens to carry data value coming from some infinite countable set, and allows transitions to test (dis)equalities between data values of involved tokens. When , the -vass are exactly data vass of dimension , where the set of data values is restricted to be finite111 The other way around, the -dimensional data vass can be defined as -vass, where combines the trivial group with the symmetric group of infinite countable degree. , of size . It is not known if the reachability problem is decidable for data vass, and our current study may shed some more light on this hard open problem.
Contribution.
Intuitively speaking, the larger the group , the lower the complexity of the reachability problem, since whenever , every -vass is automatically a -vass. The main contribution of this paper is twofold. First, we concentrate on the potentially easiest cases, namely symmetric groups , and discover a huge complexity drop: regardless of dimension , the reachability problem is PSpace-complete for vass invariant under symmetric groups.222 In dimension 1 the permutation group is irrelevant, and the problem is NL- or NP-complete, for input represented in unary or binary, respectively [10]. We also prove the same complexity for another potentially easy case, namely for the alternating groups : again, regardless of dimension , the reachability problem is PSpace-complete for vass invariant under alternating groups. Both the PSpace decision procedures are designed for a fixed dimension , but work equally well when is part of input. We thus get uniform PSpace upper bound for vass invariant under symmetric (resp. alternating) groups. At the other side, we prove that cyclic groups are hard, namely the reachability problem for -vass invariant under is as hard as in -vass.
The case of trivial group coincides with general -vass. As our second contribution we investigate combinations of symmetric groups and trivial groups, providing one positive and one negative result. On one hand, when (as discussed above) and , the reachability problem is as hard as in case of -vass. From the perspective of data vass this may be interpreted as a bad news: the complexity grows with the increasing number of data values. On the other hand, we investigate another combination of the two groups, namely containing all permutations that independently and arbitrarily permute each of -element blocks:
but preserve each of the blocks. In this case we provide an exponential-time reduction to -vass, i.e., this time the complexity is independent of the degree of the symmetric group. The complexity in this case is thus (significantly) lower than for . This is in agreement with being a subgroup of , up to isomorphism of permutation groups.
2 Symmetric VASS
As usual, let denote integers and nonnegative integers, respectively. The value of the th coordinate of a vector is written as , namely , i.e., we identify a vector with a function , where . The norm of a vector is the maximum of absolute values of its coordinates, i.e., . Then the norm of a set of vectors is defined as . For , by we denote the constant vector , in the dimension to be always determined by the context. For a finite set , by we denote its size.
Vector addition systems with states.
For , we define -dimensional vector addition systems with states, denoted shortly as -vass, or simply vass when the dimension is irrelevant or clear from the context. A -vass consists of a finite set of states and a finite set of transitions . A configuration of consists of a state and a nonnegative vector , and is written as . A transition induces steps
| (1) |
between configurations, where . We refer to the vector as the effect of the transition or of an induced step. The norm of a transition is defined as . Similarly, for a configuration , we define . The norm of a vass is the maximal norm of its transitions, i.e., .
A run in is a sequence of steps with the proviso that the target configuration of every step matches the source configuration of the next one:
| (2) |
We say that the run is from to , call the source and the target configuration of the run, respectively, and write . When the source configuration is clear from the context, we may identify a run (2) from with the sequence of transitions fired. The effect of a run is the sum of effects of all steps, and its length is the number of steps. We also write if there is some run from to . We often use the natural operation of concatenation of runs: if and then , assuming that the target configuration of the former run coincides with the source configuration of the latter one. For convenience, we allow ourselves to drop this assumption and use the convention that the latter run is implicitly shifted so that its source matches the target of , as long as the shifted is still a run. Under this convention, we write for -fold concatenation of .
In the sequel we refer to the state graph of a vass , a directed graph whose nodes are states , and edges are those pairs for which there is a transition , for some . This graph may contain self-loops.
Reachability problem.
One of the most fundamental computational problems studied in the setting of vass is the reachability problem (for the sake of this paper we prefer to formulate the problem for a fixed dimension ):
-vass-Reach: given a -vass together with two configurations, source and target , one asks if has a run from to .
Complexity of this problem in subclasses of symmetric vass, to be defined below, is the main topic studied in this paper. An input to the problem is a triple . For simplicity, such a triple , or a pair with just the source state, we also call a vass, hoping that this does not lead to confusion. We also use shorthands and .
Symmetric VASS.
Let denote the symmetric group containing all permutations of . Permutations of act on vectors by permuting dimensions, namely maps to the vector defined by , or equivalently . Treating a vector as a function , we may write
We naturally extend this action to transitions, , and likewise to steps, runs, etc., as expected. Given a group of permutations , by a -vass, we mean any -vass whose transitions are invariant under the action of , namely for every permutation and transition we have . Thus, for every , we identify a subclass of -vass admitting the invariance property. In the most restrictive case of , we get the subclass of -vass invariant under all permutations of dimensions. In the less restrictive case of trivial group , we get the whole class of all -vass.
Reachability problem for symmetric VASS.
In our investigations we always assume that a group (and hence also the dimension of vass) is fixed.333 Nevertheless, all our subsequent PSpace decision procedures are uniform with respect to dimension, namely they work within the same complexity bounds if dimension is part of input. The vass reachability problem, when its input is restricted to -vass for a fixed permutation group , we call -vass-Reach. For the trivial group we get -vass-Reach.
The set of transitions of a -vass is determined uniquely by representatives of orbits, i.e., by representatives of the equivalence relation on transitions: if for some . Unfolding the action of on transitions, if and only if , , and for some . Equivalence classes of are called -orbits of transitions, or simply orbits when the group is clear from the context. When measuring the size of input we assume a succinct representation, where transitions of a -vass are given by orbit representatives, i.e., by a subset containing one transition from every orbit. By the size of such a representation of a -vass we mean the bitsize of its description, e.g.,
where . Note that is independent of a choice of orbit representatives, and logarithmic in terms of .
Whenever , i.e., is a permutation subgroup of , (a representation of) a -vass may be canonically transformed into (a representation of) a -vass in two different ways. Let be a -vass. On one hand, is itself a -vass, as its transitions are automatically invariant under the action of , but the representation of seen as a -vass may be exponentially larger than its representation when seen as -vass (since the number of -orbits of may be exponentially larger than the number of -orbits of ). This yields an exponential (but not necessarily polynomial) reduction from -vass-Reach to -vass-Reach. On the other hand, a representation of is automatically a representation of another -vass , where the set of transitions may be of exponentially smaller size than , but the number of -orbits of is the same as the number of -orbits of . Clearly, every run of is a run of , but the converse does not hold in general.
-reachability.
An important relaxation of reachability is -reachability, where one considers a relaxed notion of configurations, namely -configurations instead of . Contrary to configurations, values in -configurations may drop below 0. We define -runs exactly like runs, but using -configurations instead of configurations. Each -run, and hence also each run, induces a unique path in the state graph. Conversely, every path in the state graph gives rise to multiple different -runs, depending on the choice of source vector, and of transitions witnessing consecutive edges of a path.
The -reachability problem asks, given a -vass , if has a -run from to . We prove that the problem lies in NP, regardless of the choice of dimension of vass and of the group . This observation will be used later in proofs of main results.
Lemma 1.
For every permutation group , the -reachability problem for -vass is NP-complete.
The lemma does not follow immediately from NP upper bound for -reachability in vass, as the input is represented more succinctly in our case. In the proof we use the integer analogue of Caratheodory’s theorem [7] to get a small solution property: if there is a -run between two given configurations then there is one using only a subset of transitions of polynomial size. By guessing this subset we reduce to the -reachability problem in vass, which is in NP.
3 Lower bound
This section contains a proof of PSpace-hardness of the reachability problem in -vass, for any with . Later, we will indicate cases where this lower bound is tight, for instance .
Lemma 2.
For every and , -vass-Reach is PSpace-hard.
Proof.
We show a reduction from the bounded reachability problem for -vass, which is known to be PSpace-complete [8]. The input to this problem consists of a -vass and a number represented in binary, and we ask if has a run with all configurations bounded by . For simplicity, we assume that the vector of a configuration of a -vass is just a nonnegative integer , and the effect of a transition is just an integer . W.l.o.g. we assume that effects of transitions of a -vass are nonzero and at most .
Fix an arbitrary dimension . Given a -vass and , where , we construct a -vass of dimension whose states extend by additional auxiliary states, and whose transitions are defined below. The idea is to represent a configuration of bounded by (), by a configuration
of , while pairs are additional auxiliary states. We define the set of transitions by providing a set of orbit representatives . Below, we use to range over positive integers, and use the vectors
that have value (resp. ) on all coordinates except coordinate which has the opposite value. We also use . The set is defined as follows:
-
For every , we put into two transitions (recall that )
-
For every , we put into two transitions
As all vectors and are constant except for one coordinate, we notice that the size of is at most . This is however not relevant for the reduction, as is represented by , and not by .
We argue that there is a run in whose all configurations are bounded by , if and only if in . For the “only if” direction we observe that every step in which is bounded by is simulated by two steps in , for some intermediate configuration with an auxiliary state. Indeed, when , a step of which is bounded by (), is simulated in by the following two steps:
| (3) |
In the other case, when , a step of which is bounded by (), is simulated in by the following two steps:
| (4) |
For the “if” direction, we consider a configuration , and analyze all possible two-step runs in starting from : By definition of , we deduce that the only possible such two-step runs are of the form (3) or (4). Indeed, the first transition may be only for some , or for some , and then the next transition is uniquely determined by the auxiliary state. In particular, we observe that only transitions from can be used, i.e., all other transitions are useless if one starts from a configuration of the form . In consequence, if in , we have also a run in whose all configurations are bounded by , as required. Correctness of the reduction follows.
Remark 3.
In particular, PSpace-hardness for -vass improves upon PSpace-hardness for -vass [1].
4 Transitive and fair groups
Within this section we fix an arbitrary transitive group , i.e., we assume that for every there exists such that . The results of this section will be applied later to specific transitive groups .
Pumpable VASS.
Consider a -vass , where and . We say that is forward pumpable if has a run for some . Symmetrically, is backward pumpable if is forward pumpable where , the reverse of , is obtained by replacing each transition of by its reverse . Equivalently, has a run for some . Finally, is pumpable if is forward pumpable, and is backward pumpable. We prove that reachability reduces to -reachability, when the group is transitive and vass are pumpable.
Lemma 4.
If is transitive then every pumpable -vass admitting a -run from to , admits a run from to .
Proof.
Let . We start by proving the following equality for all :
| (5) |
When , the equality follows immediately from the Orbit-Stabilizer Theorem. Otherwise, suppose and take any permutation such that (it exists as is transitive). By post-composing with we get a bijection between permutations that satisfy , and permutations that satisfy . In consequence, we get the equality (5):
Consider a -vass and two configurations and , and suppose has a -run from to , and two runs
for some . We argue that has a run . W.l.o.g. we can assume that is increasing, i.e., every coordinate of is greater than the greatest coordinate of (otherwise we replace by its -fold concatenation , for sufficiently large ). Symmetrically, we can assume that is decreasing, i.e., every coordinate of is greater than the greatest coordinate of .
Let , where is the identity permutation on , and let
As is increasing and , the concatenation of runs
is forcedly a run from to . Symmetrically, as is decreasing and , the concatenation of runs is forcedly a run from to . We argue that for every , i.e., the effect of is a constant vector. Indeed, by point-wise expansion of the equality
and using the equality (5) to deduce that for every , the value of th coordinate of appears the same number of times on both sides of the equality below, we compute:
Therefore, for some . Analogously we prove that for some . Let . Since , we may construct two runs that pump forward and backward by the same vector :
Thus, for sufficiently large , the -fold iterations of and are enough to lift the -run into a run, i.e., to ensure that is a run from to .
Fair groups.
Given and a transitive permutation group , we say that is fair if there is a polynomial such that for every and every -vass with and , the implication holds, where
-
(1)
has a run for some and of norm ,
-
(2)
has a run for some and .
In words: whenever has a run whose target vector exceeds on some coordinate, is guaranteed to have a run whose target vector is greater than on all coordinates; and the property holds for any chosen .
Lemma 5.
If is transitive and fair, then -vass-Reach is in PSpace.
Proof.
We start with some preparatory definitions. A vass is called strongly connected if its state graph is so. A vass is called sequential, if it can be partitioned into a number of strongly connected vass with pairwise disjoint state spaces, called components of , and transitions , for , where and , called bridges of (see Fig. 1). For every non-sequential vass there is a finite set such that each is a sequential vass, and in if and only if in for some . The set , called sequential decomposition of in the sequel, may be computed based on the decomposition of the state graph of into strongly connected components.
Assume an input -vass , where , and , represented by orbit representatives . The PSpace decision procedure to check if , to be described below, proceeds in several steps.
As the first step, the decision procedure decomposes the state graph of into strongly connected components, and nondeterministically picks up one sequential vass from the sequential decomposition of . From now on we may thus assume, w.l.o.g., that is sequential with components , the configuration belongs to the first component, and to the last one. The number of components is bounded by the number of states of . Let . Thus, for every two states from the same component of , there is a path from to that decreases each counter by at most .
For , we say that a configuration is bounded by if . We also say that the first component is bounded by if every configuration reachable in this component from (i.e, satisfying ) is bounded by . Symmetrically, we say that the last component is reverse bounded by if every configuration reverse reachable from (i.e., satisfying ) in this component is bounded by .
As the second step, the decision procedure iteratively removes either the first or the last component from until the following two conditions are met, for and :
-
the first component is not bounded by , and
-
the last component is not reverse bounded by ,
where is the polynomial given by the definition of a fair group. In particular, the first condition implies (1) for , and the second one implies (1) for . Suppose the first component is bounded by (the symmetric case, when the last component is reverse bounded by , is treated in the same way). One iteration of the removal procedure proceeds as follows, depending on whether or :
Case I: .
If this component is the only one, the procedure checks in PSpace if , and terminates. The check is done by a standard nondeterministic walk through the graph of configurations reachable from , which starts at the source configuration , and in every iteration moves to a nondeterministically chosen successor of the current configuration. It terminates when is reached (and answers positively), or when the counter of so far visited configurations exceeds
the total number of configurations bounded by . The memory size, namely the bitsize of a single configuration, and of the value of the counter, are both polynomially bounded, and hence the whole procedure works in (nondeterministic) PSpace.
Case II: .
Otherwise, let be the first bridge. We observe that if has a run , then its last configuration in the first component is necessarily bounded by . In consequence, since the bridge transition may increase the norm by at most , the first configuration of the run in the second component, where , is forcedly bounded by . Relying on this observation, the decision procedure nondeterministically chooses a vector with , and checks in PSpace if in the first component, similarly as above. Then the procedure removes the first component from , and takes as the source configuration, thus obtaining a new -vass with one less component than .
This removal is iteratively repeated until either the procedure terminates, or produces a with the first component not bounded by , and the last component not reverse bounded by , where and . The bound on the norm of the vass cannot increase, and so . However, in each iteration the bound on norm of the new source vector increases, compared to the bound on the norm of the previous source vector , by a multiplicative factor , namely
and therefore the bitsize of the source vector increases by (bounding roughly) at most . As the number of iterations is bounded by , the final bitsize is polynomial in the input size, and therefore all the iterations are doable in PSpace. Note that due to iterative increase of , the first (resp. last) component not bounded (resp. not reverse bounded) by in some iteration may become bounded (resp. reverse bounded) in subsequent iterations.
Finally, the procedure arrives at a sequential -vass , , , whose first component is not bounded by , and whose last component is not reverse bounded by . As is fair, there is a configuration reachable from in the first component, and a configuration reverse reachable from in the last component (i.e., is reachable from ), both with vectors :
As is large enough so that every two states in the same component are connected by a path that decreases each counter by at most , we have some runs
in the first and the last component, respectively, with . As , this means that is pumpable. Since is transitive, Lemma 4 applies. In the last step, the decision procedure checks if there is a -run from to , which is doable in NP due to Lemma 1.
5 Symmetric group
In this section we prove PSpace-completeness of the reachability problem in case of the symmetric groups , . Our PSpace upper bound works not only for arbitrary fixed dimension , but even in the uniform setting when is part of input. When , the problem is known to be NP-complete [10].
The upper bound is shown using Lemma 5, which requires proving that satisfies its assumptions. The symmetric groups are obviously transitive, it is thus sufficient to show:
Lemma 6.
is fair, for every .
Proof.
Consider an -Vass and a configuration . Let , let be any constant, and . We demonstrate that is fair, and that this property is witnessed by the constant polynomial . Towards this we prove a slightly stronger fact: we assume that has a run with , and construct a run whose target vector satisfies .
W.l.o.g. assume that . For we inductively construct runs satisfying
| (6) |
We start with . Assuming has already been constructed, we construct as follows. If then we take . Otherwise, we split into
where is the longest suffix of the run in which the value of coordinate does not drop below .
Therefore, , as otherwise would be longer. Let be the difference between the target and source of . We observe that the value of coordinate is increased by by at least
while the value of coordinate is increased by at most Therefore, . In consequence, contains some steps
induced by transitions with effects
such that for , that is, each of the steps increases the difference between the values of coordinate and , and moreover
| (7) |
that is, the steps jointly increase the difference between the values of coordinate and by more than . We may choose a minimal set of transitions satisfying (7). Hence, knowing that one step can change the difference between the values of coordinate and by at most by , we may safely assume
| (8) |
that is, the steps jointly increase the difference between the values of coordinate and by at most . Let be the permutation that swaps coordinates and and preserves the others. We define a run by replacing each transition in with the transition . Due to the inequality (8), the coordinate never drops below
in , and . Furthermore, due to the inequality (7) we get , because the coordinate was increased by more than . Other coordinates are not affected, i.e., their values are the same in and . Therefore, the run satisfies the condition (6), as required.
Finally, we arrive at a run with for every , and this completes the proof.
Theorem 7.
-vass-Reach is PSpace-complete, for every .
Proof.
6 Combining groups
In this section we investigate groups arising as combinations of smaller permutation groups. The way of combining two permutation groups and will be their wreath product . The set we conveniently split into blocks:
and write to denote , for and . Given a -tuple of permutations from and one permutation from , we define the permutation that applies, for each , the permutation on the block independently, plus permutes the blocks according to , namely
The wreath product444 The operation is definable more concisely, as semidirect product of -fold direct product of with . of and consists of all so constructible permutations of :
In the sequel we are mostly interested in combining trivial permutation groups with symmetric groups , and relating the complexity of the reachability problem for the combined group to the complexity of the problem for component groups. As we show in Theorems 8 and 10 below, it turns out that the complexity significantly depends on the order of composing the groups. In the case of the group which allows for arbitrary permutations of blocks (of size each) but disallows permutations inside blocks, the complexity of -vass-Reach is at least as high as the complexity of -vass-Reach (Theorem 8). On the other hand, in the dual case of the group , which disallows permutations of blocks (of size each) but allows arbitrary simultaneous independent permutations inside blocks, we prove (in Theorem 10 below) that the complexity of -vass-Reach drops to the complexity of -vass-Reach. Summing up, in the former case the impact of symmetric group is essentially nullified as both degrees and contribute significantly to the complexity of the combined group, while in the latter case the impact of symmetric group is preserved, as the degree of the symmetric group is irrelevant for complexity. We notice that the difference of complexities is in agreement with the fact that up to the isomorphism of permutation groups, is a subgroup of .
Trivial symmetry inside blocks.
The first result we formulate slightly more generally, with an arbitrary group in place of the symmetric group . The reachability problem for wreath product of the trivial permutation group with any , regardless of the choice of (which seems to be quite surprising), is at least as hard as the reachability problem for vass of dimension :
Theorem 8.
-vass-Reach reduces in polynomial time to -vass-Reach, for every , and .
Proof.
Given a vass of dimension , we define a -Vass simulating , whose states extend by a number of auxiliary states:
A configuration of , will be simulated by a configuration of whose vector extends , on the last th coordinate of every block, by
| (9) |
(we write instead of , for readability). We define transitions of by its orbit representatives . For every vector we define vectors as follows:
Thus, the value on the last coordinate of th block equals , while on the last coordinate of other blocks equals . Furthermore, coincides with on the remaining coordinates of th block, while it is 0 on the remaining coordinates of other blocks. For every transition , we put to the set the following transitions:
We need to prove that there is a run in if and only if there is a run in . The “only if” direction follows due to observation that every step in is simulated by a sequence of transitions , namely
| (10) |
in , as every transition updates coordinates of block , and the effect of on last th coordinate of every block is 0.
For the “if” direction, we observe that due to the auxiliary states in , every run in , starting and ending in a state from , necessarily splits into segments of length , where each segment is of the form
| (11) |
for some and . In particular, the segment starts in and ends in . It is thus enough to argue that whenever in along a single segment (11), there is a vector such that and in ().
A single segment updates coordinates in all the blocks, in the order determined by . The crucial observation is that this order is necessarily . Indeed, by the definition of the vector in (9), the first update is in the th block as the last th coordinate is only in this block. As a result of this update, the th block is the only one with value on the last -th coordinate, and therefore the second update necessarily happens in this block. And so on, until the last update in the first block. In consequence, for all . Therefore, the segment (11) is necessarily of the form (10), and the implication () is shown. In particular, we have shown that only transitions from can be used in when starting from a configuration .
Trivial symmetry between blocks.
Now we investigate the other case of wreath product of the symmetric group of degree with the trivial permutation group of degree , and show the complexity of the reachability problem in this case to be essentially the same as of the reachability problem for vass of dimension .
We start with a definition and a lemma, both stated for any in place of . A configuration of a -vass is -balanced if
| (12) |
for every and . In words: in every block, the maximal difference of values is at most . A run of is -balanced if all its configurations are so. Finally, is -balanceable if an existence of a run implies an existence of a run which is -balanced.
Lemma 9.
There is a polynomial such that for every and , every -Vass is -balanceable.
Proof.
Let be an arbitrary -Vass, and let , , and . Suppose has a run . We iteratively modify this run until it becomes -balanced.
By definition , and therefore the source configuration and the target one are -balanced. We make balanced in stages. For each , in an arbitrary order, we modify the run to make it balanced inside the th block, i.e., to make all configurations of satisfy (12) where range over but is fixed. As the modification does not affect the other blocks, the final run is thus balanced.
From now on we concentrate on one stage, for a fixed . For a vector and , we use the notation for the difference between the values of on coordinates and . The stage amounts to iteratively modifying the run until it finally becomes balanced inside the th block. Each such individual modification we call a microstage. Below we describe a single microstage, and argue that it decreases a certain nonnegative rank, which ensures termination of the whole stage.
Microstage.
Suppose the run is not balanced in the th block, namely contains a configuration such that for some . Consider the longest infix
| (13) |
of , such that all its configurations satisfy . Since one step may change the difference between the values of coordinates and by at most by , we notice that , as otherwise would be longer. Likewise, . In consequence and , and therefore contains at least steps that increase the difference between the values of coordinates and and similarly contains at least steps that decrease this difference. As there are at most different values by which a single step can increase (or decrease) this difference, by the pigeonhole principle contains some steps that increase this difference by the same value , and likewise contains some steps that decrease this difference by the same value . We pick any among the steps in , executing transitions , say, and replace them by , where is a permutation that swaps and . Likewise, we choose any among the steps in , executing transitions , say, and replace them by . Importantly, this modification of the run does not change its target configuration. The only coordinate whose value decreases in some configurations along the run is , but it never drops below zero since the decrease is never larger than , and . Therefore, the modification produces a run.
We claim that the following nonnegative rank decreases as a result of the microstage (where the first sum ranges over configurations along the run):
on the basis of the following three observations. First, the value never increases, and decreases for some , namely for in (13), the value decreases by (but remains positive). Second, in all cases when the value changes (i.e., decreases) in the microstage, this is due to adding opposite values to and . Therefore, for every and every configuration in , the value of does not increase. Finally, for , the value of is preserved. In consequence, the rank of the whole run decreases, as required.
Theorem 10.
-vass-Reach reduces in exponential time to -vass-Reach, for every .
Proof.
Let be -Vass and its configurations. Let , where is the polynomial of Lemma 9 and . Let . Relying on Lemma 9 we construct an -vass , where , that simulates -balanced runs of . Specifically, every th block of coordinates of is simulated by a single coordinate of whose value is invariantly equal to the largest value in the th block. The simulation is possible due to the auxiliary component of states that keeps the difference between the value of every coordinate of , and the largest value inside the th block (to which belongs). The transitions of simulate transitions of , and accordingly update the auxiliary component of states. We claim that has a -balanced run if and only if has a run , where are obtained from by computing the auxiliary component of states, and replacing the values of each block of coordinates by the largest value in this block. The reduction is thus completed.
7 Other groups
We complete Section 5 by showing that alternating groups admit similar complexity drop as symmetric groups. We also demonstrate that sole transitivity is not enough to achieve significant drop, namely the complexity of the reachability problem in case of cyclic groups is comparable to general vass.
Alternating group.
Let denote the alternating group of degree , i.e., the group of all even permutations of . The group is generated by 3-cycles, permutations of the form for pairwise distinct . When the alternating group is trivial, -vass = -vass, and the reachability problem is PSpace-complete [1]. In the sequel we thus consider degrees .
Lemma 11.
is fair, for .
The argument elaborates on the proof of Lemma 6, and proceeds in two steps. First, assuming a run with one sufficiently large coordinate at the end, by applying a permutation from to a properly chosen suffix of we construct a run with two large coordinates at the end. Second, we further modify the run to increase all coordinates above a required threshold, similarly to the proof of Lemma 6.
Theorem 12.
-vass-Reach is PSpace-complete, for every .
Proof.
Cyclic groups.
Let denote the cyclic group of degree , i.e., the group generated by the single cyclic shift
Theorem 13.
-vass-Reach reduces in polynomial time to -vass-Reach, for every .
In the proof, an -vass is simulated using consecutive counters of a -vass. The remaining counters are used to enforce that only one transition from each -orbit can be applied, which assures faithfulness of the simulation.
8 Final remarks
In this paper we have investigated the impact of symmetry in vass on the complexity of the reachability problem. The permutation groups considered in this paper split clearly into two groups. On one side there are “easy” groups, which includes both symmetric and alternating groups featuring PSpace-completeness, but also the combinations of symmetric groups and trivial ones, where the complexity is independent of the degree of the symmetric group (dependence on the degree of the trivial group is unavoidable). On the other side there are “hard” groups, which includes both trivial and cyclic groups, which not differ significantly in complexity, but also the dual combinations of symmetric groups and trivial ones, where the complexity is dependent on both and . We end up with a research question left for further research: can one classify all finite permutation groups into “easy” and “hard” ones?
The model of data vass is definable in our setting as -vass. Therefore, “hardness” of may suggest that the reachability problem for data vass is harder than for plain vass. On the other hand, “easiness” of suggests that the reachability problem for the subclass of data vass invariant under independent data permutations in each dimension (definable as -vass in our setting) is not significantly harder than for plain vass (and, in particular, decidable). Our initial results seem to confirm both these suggestions.
References
- [1] Michael Blondin, Alain Finkel, Stefan Göller, Christoph Haase, and Pierre McKenzie. Reachability in Two-Dimensional Vector Addition Systems with States Is PSPACE-Complete. In Proceedings of LICS 2015, pages 32–43, 2015. doi:10.1109/LICS.2015.14.
- [2] Wojciech Czerwinski, Ismaël Jecker, Slawomir Lasota, Jérôme Leroux, and Lukasz Orlikowski. New lower bounds for reachability in vector addition systems. In Proc. FSTTCS 2023, volume 284 of LIPIcs, pages 35:1–35:22. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2023. doi:10.4230/LIPICS.FSTTCS.2023.35.
- [3] Wojciech Czerwinski, Slawomir Lasota, Ranko Lazic, Jérôme Leroux, and Filip Mazowiecki. The reachability problem for Petri nets is not elementary. In Proceedings of STOC 2019, pages 24–33. ACM, 2019. doi:10.1145/3313276.3316369.
- [4] Wojciech Czerwinski, Slawomir Lasota, Ranko Lazic, Jérôme Leroux, and Filip Mazowiecki. The Reachability Problem for Petri Nets Is Not Elementary. Journal of the ACM, 68(1):7:1–7:28, 2021. doi:10.1145/3422822.
- [5] Wojciech Czerwinski and Lukasz Orlikowski. Reachability in Vector Addition Systems is Ackermann-complete. In Proceedings of FOCS 2021, pages 1229–1240. IEEE, 2021. doi:10.1109/FOCS52979.2021.00120.
- [6] Wojciech Czerwiński and Łukasz Orlikowski. Lower bounds for the reachability problem in fixed dimensional vasses. In Proceedings of LICS 2022, pages 40:1–40:12. ACM, 2022. doi:10.1145/3531130.3533357.
- [7] Friedrich Eisenbrand and Gennady Shmonin. Carathéodory bounds for integer cones. Operations Research Letters, 34(5):564–568, 2006. doi:10.1016/J.ORL.2005.09.008.
- [8] John Fearnley and Marcin Jurdziński. Reachability in two-clock timed automata is pspace-complete. Information and Computation, 243:26–36, 2015. doi:10.1016/J.IC.2014.12.004.
- [9] Yuxi Fu, Qizhe Yang, and Yangluo Zheng. Improved algorithm for reachability in d-vass. In Proc. ICALP 2024, volume 297 of LIPIcs, pages 136:1–136:18. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2024. doi:10.4230/LIPICS.ICALP.2024.136.
- [10] Christoph Haase, Stephan Kreutzer, Joël Ouaknine, and James Worrell. Reachability in succinct and parametric one-counter automata. In Proceeding of CONCUR 2009, volume 5710, pages 369–383. Springer, 2009. doi:10.1007/978-3-642-04081-8_25.
- [11] S. Rao Kosaraju. Decidability of reachability in vector addition systems (preliminary version). In Proc. STOC 1982, pages 267–281, 1982. doi:10.1145/800070.802201.
- [12] Jean-Luc Lambert. A structure to decide reachability in Petri nets. Theor. Comput. Sci., 99(1):79–104, 1992. doi:10.1016/0304-3975(92)90173-D.
- [13] Slawomir Lasota. Decidability border for Petri nets with data: WQO dichotomy conjecture. In Proc. Petri Nets 2016, volume 9698 of Lecture Notes in Computer Science, pages 20–36. Springer, 2016. doi:10.1007/978-3-319-39086-4_3.
- [14] Slawomir Lasota. Improved Ackermannian Lower Bound for the Petri Nets Reachability Problem. In Proceedings of STACS 2022, volume 219 of LIPIcs, pages 46:1–46:15. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2022. doi:10.4230/LIPICS.STACS.2022.46.
- [15] Ranko Lazic, Thomas Christopher Newcomb, Joël Ouaknine, A. W. Roscoe, and James Worrell. Nets with tokens which carry data. In Proc. ICATPN 2007, volume 4546 of Lecture Notes in Computer Science, pages 301–320. Springer, 2007. doi:10.1007/978-3-540-73094-1_19.
- [16] Jérôme Leroux. The Reachability Problem for Petri Nets is Not Primitive Recursive. In Proceedings of FOCS 2021, pages 1241–1252. IEEE, 2021. doi:10.1109/FOCS52979.2021.00121.
- [17] Jérôme Leroux and Sylvain Schmitz. Reachability in Vector Addition Systems is Primitive-Recursive in Fixed Dimension. In Proceedings of LICS 2019, pages 1–13. IEEE, 2019. doi:10.1109/LICS.2019.8785796.
- [18] Richard J. Lipton. The Reachability Problem Requires Exponential Space. Technical report, Yale University, 1976.
- [19] Ernst W. Mayr. An algorithm for the general Petri net reachability problem. In Proc. STOC 1981, pages 238–246, 1981. doi:10.1145/800076.802477.
- [20] Fernando Rosa-Velardo and David de Frutos-Escrig. Decidability and complexity of Petri nets with unordered data. Theor. Comput. Sci., 412(34):4439–4451, 2011. doi:10.1016/J.TCS.2011.05.007.
