Abstract 1 Introduction 2 Preliminaries 3 Randomized Black-box PIT for Nonassociative circuits 4 Deterministic PIT Algorithms Over 𝔽𝑨¯,𝑪[𝑿] 5 Discussion References

Efficient Polynomial Identity Testing over Nonassociative Algebras

Partha Mukhopadhyay Chennai Mathematical Institute, India C. Ramya ORCID The Institute of Mathematical Sciences (a CI of Homi Bhabha National Institute), Chennai, India Pratik Shastri ORCID The Institute of Mathematical Sciences (a CI of Homi Bhabha National Institute), Chennai, India
Abstract

We design the first efficient polynomial identity testing algorithms over the nonassociative polynomial algebra. In particular, multiplication among the formal variables is commutative but it is not associative. This complements the strong lower bound results obtained over this algebra by Hrubeš, Yehudayoff, and Wigderson [12] and Fijalkow, Lagarde, Ohlmann, and Serre [9] from the identity testing perspective. Our main results are the following:

  • We construct nonassociative algebras (both commutative and noncommutative) which have no low degree identities. As a result, we obtain the first Amitsur-Levitzki type theorems [2] over nonassociative polynomial algebras. As a direct consequence, we obtain randomized polynomial-time black-box PIT algorithms for nonassociative polynomials which allow evaluation over such algebras.

  • On the derandomization side, we give a deterministic polynomial-time identity testing algorithm for nonassociative polynomials given by arithmetic circuits in the white-box setting. Previously, such an algorithm was known with the additional restriction of noncommutativity [4].

  • In the black-box setting, we construct a hitting set of quasipolynomial-size for nonassociative polynomials computed by arithmetic circuits of small depth. Understanding the black-box complexity of identity testing, even in the randomized setting, was open prior to our work.

Keywords and phrases:
Polynomial identity testing, nonassociative algebra, arithmetic circuits, black-box algorithms, white-box algorithms
Category:
RANDOM
Funding:
C. Ramya: Research supported by INSPIRE Faculty Fellowship of DST.
Copyright and License:
[Uncaptioned image] © Partha Mukhopadhyay, C. Ramya, and Pratik Shastri; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Algebraic complexity theory
Related Version:
Full Version: https://eccc.weizmann.ac.il/report/2025/061/
Editors:
Alina Ene and Eshan Chattopadhyay

1 Introduction

The goal of algebraic complexity is to study the complexity of computing multivariate polynomials using basic arithmetic operations, such as addition and multiplication. Arithmetic circuits and formulas are among the well-studied models in this area. In particular, arithmetic circuits are directed acyclic graphs whose leaves are labeled by variables or constants, and whose internal nodes (called gates) are labeled with either + or ×. Formulas are circuits whose underlying graph is a tree. Each gate in a circuit computes a polynomial in the natural way and the output of a circuit is said to be the polynomial computed at a distinguished output gate.

There are two central problems studied in algebraic complexity: one is the question of proving size lower bounds for circuits computing explicit polynomials, and the other is the question of derandomizing polynomial identity testing (PIT for short). The PIT problem comes in two variants. First is the black-box setting, where we are given evaluation access to a circuit (given as a black box), and we must decide whether the polynomial it computes is identically zero. The second, seemingly easier is the white-box setting, where we are explicitly given the circuit as a graph to determine whether it computes the zero polynomial.

Baur and Strassen [5] proved that any circuit computing i=0nxin requires size Ω(nlogn). This is the strongest known lower bound for arithmetic circuits. On the other hand, the PIT problem admits a randomized polynomial-time black-box algorithm over the usual polynomial ring 𝔽[x1,,xn], thanks to the Polynomial Identity Lemma [30, 25, 8] (see Lemma 6 for the exact statement). Here, 𝔽 can be any field of sufficient size, and the variables x1,,xn commute under multiplication. For the black-box case, the derandomization problem is essentially equivalent to the efficient construction of small hitting sets. Despite intense efforts over many years, proving strong lower bounds for circuits and derandomizing PIT for circuits have both remained elusive goals. For more on these problems, the reader is referred to the excellent surveys by Shpilka and Yehudayoff [26] and Saxena [24]. In general, the problems of proving lower bounds and derandomizing PIT are closely related and, in fact, nearly equivalent due to an influential result of Impagliazzo and Kabanets [14]. For example, very recently, a subexponential-size hitting set for PIT of low-depth arithmetic circuits was obtained via a breakthrough lower bound result by Limaye, Srinivasan, and Tavenas [18].

The limitation in our understanding of PIT and lower bounds stems from the difficulty of analyzing how a monomial gets canceled at an intermediate step in an arithmetic circuit computation. In the setting of the usual polynomial ring 𝔽[x1,,xn], multiplication is commutative and associative. In other words, for all xi,xj,xk we have xixj=xjxi and (xi(xjxk))=((xixj)xk). A central line of investigation studies arithmetic circuits by restricting the relations satisfied by the multiplication rule. The hope is that, in the absence of such relations, we can better understand cancellations of monomials and gain insight into general circuits. For example, we can drop commutativity while preserving associativity.

If we drop commutativity, we obtain the noncommutative polynomial ring 𝔽x1,,xn (which remains associative), and noncommutative circuits compute polynomials in the ring 𝔽x1,,xn. In his pioneering work [20], Nisan proved that the noncommutative Permanent and Determinant polynomials require exponential-size noncommutative algebraic branching programs (ABPs for short). ABPs are a subclass of circuits. Up to polynomial blowup, they simulate formulas and are simulated by circuits. In the noncommutative setting, exponential separations are known between ABPs and circuits [20]. On the PIT side, Raz and Shpilka [22] developed a white-box deterministic polynomial-time algorithm for polynomials computed by noncommutative ABPs. In fact, a quasipolynomial time black-box PIT algorithm has also been designed for the same problem by Forbes and Shpilka [10].

However, if we look at general noncommutative circuits (instead of ABPs), again we see that progress on the questions of lower bounds and derandomizing PIT has remained elusive. In fact, for general circuits, the best lower bound and PIT results over 𝔽x1,,xn match those over 𝔽[x1,xn].

Henceforth, we use X to denote the set {x1,,xn}. 𝔽A,C[X] and 𝔽A,C¯[X] stand for the rings 𝔽[X] and 𝔽X, respectively. Instead of dropping commutativity, we may choose to drop associativity. This leads us to the algebra 𝔽A¯,C[X], the polynomial algebra where multiplication is commutative but nonassociative111Formally, an algebra 𝔸 over a field 𝔽 is a vector space equipped with a bilinear product.222In 𝔽A¯,C[X], (xi(xjxk))((xixj)xk) even in the case when xi=xj=xk.. If we drop both commutativity and associativity, we obtain the polynomial algebra 𝔽A¯,C¯[X]. On the lower bounds side, very impressive progress has been made in the algebra 𝔽A¯,C[X]. Hrubeš, Yehudayoff, and Wigderson [12] proved the first exponential-size lower bounds for circuits computing explicit polynomials in 𝔽A¯,C[X]. Subsequently, Fijalkow, Lagarde, Ohlmann, and Serre [9] strengthened this result by providing an exact characterization of the size of a minimal circuit computing a polynomial f𝔽A¯,C[X] in terms of the rank of a certain matrix of coefficients.

On the other hand, in the context of PIT, it is imperative to note that no efficient algorithm is known over the algebra 𝔽A¯,C[X], not even a randomized white-box algorithm. This is surprising given the intimate connections between lower bounds and PIT in various settings. Over the algebra 𝔽A¯,C¯[X], Arvind et al. designed a deterministic white-box polynomial-time algorithm for PIT of arithmetic circuits [4]. Furthermore, as mentioned by the authors in [4], a black-box algorithm is not known even over 𝔽A¯,C¯[X]. Notably, over the algebra 𝔽X, such a randomized PIT algorithm is known due to the Amitsur-Levitzki Theorem [2, 29] (see Theorem 7 for a formal statement).

We note that nonassociative computations are fundamental even beyond algebraic complexity. For example, the composition of operations in computer programs is typically nonassociative. As a concrete algorithmic example, in a seminal work, Valiant designed a sub-cubic algorithm for recognizing Context Free Languages (CFL) [28]. In particular, Valiant developed an algorithm to compute the transitive closure of upper triangular matrices whose entries are elements of a nonassociative monoid [28]. In algebraic complexity, lower bounds for nonassociative circuits have been used prove lower bounds for related associative models of computation [9].

The main technical contributions of this paper are as follows. Over the polynomial algebra 𝔽A¯,C[X], we design a white-box deterministic polynomial-time algorithm for the PIT of arithmetic circuits. In the black-box setting, we develop the first randomized polynomial-time PIT algorithm for nonassociative arithmetic circuits (over both 𝔽A¯,C[X] and 𝔽A¯,C¯[X]). This is achieved by proving analogues of the Amitsur-Levitzki theorem over the nonassociative polynomial algebras 𝔽A¯,C¯[X] and 𝔽A¯,C[X]. Moreover, for the classes of circuits over the algebras 𝔽A¯,C[X] and 𝔽A¯,C¯[X] with polylogarithmic depth, we construct quasipolynomial-size hitting sets over nonassociative algebras of small dimension. To the best of our knowledge, this is the first black-box derandomization result for a well-studied circuit class over a nonassociative polynomial algebra. We elaborate on our results and techniques in the next section.

1.1 Our Results

In this paper, we complement the strong lower bounds results obtained over the algebra 𝔽A¯,C[X] ([12, 9]) by designing efficient PIT algorithms. Our results work over all fields of sufficiently large size.

1.1.1 Black-box randomized nonassociative PIT (Section 3)

Our first result is a black-box randomized polynomial-time identity testing algorithm for polynomials in 𝔽A¯,C[X]. Of course, to capture nonassociativity, the natural idea is to evaluate the given polynomial over nonassociative algebras.

In mathematics, nonassociative algebras are very well-studied. For example, one can see the classic work of Albert [13]. In particular, there are various specific algebras of interest which are nonassociative but commutative. The most important such algebras are, perhaps, the Jordan Algebras. Unfortunately, every Jordan Algebra 𝕁 satisfies the Jordan Identity: a,b𝕁, we have (ab)(aa)(a(b(aa)))=0. This means that performing PIT using Jordan Algebras is not possible. To see why, suppose we are given a circuit computing a non-zero polynomial in the ideal of 𝔽A¯,C[X] generated by {(xixj)(xixi)(xi(xj(xixi)))xi,xjX}. On any input from 𝕁, the circuit will evaluate to 0, whereas the circuit computes a non-zero polynomial. Even over 𝔽A¯,C¯[X], we have a similar difficulty. For example, Matrix Lie algebras are well studied algebras that are nonassociative and noncommutative, but they satisfy the Jacobi Identity [6].

Thus, in order to obtain a fast black-box algorithm, we need to construct a suitable nonassociative algebra that does not satisfy low (in terms of its dimension) degree identities. We should remark that over the noncommutative polynomial ring 𝔽X (equivalently, 𝔽A,C¯[X]), the Amitsur-Levitzki theorem allows us to do black-box randomized PIT for polynomials of degree d, using random matrices of dimension (d/2+1)×(d/2+1) [2, 29]. In our setting of polynomials in 𝔽A¯,C[X], we construct a unital nonassociative, commutative algebra d of dimension d(d+1)2+1 which does not satisfies any identity of degree d.

Lemma 1.

Let f𝔽A¯,C[X] be a non-zero polynomial of total degree d. Then f is not a polynomial identity (PI) for d.

To the best of our knowledge, this is the first Amitsur-Levitzki type theorem in the nonassociative setting. As an immediate consequence, we obtain a nonassociative analogue of the Polynomial Identity Lemma.

Theorem 2.

Let 𝔽 be a field with |𝔽|>d, and S𝔽. Let f𝔽A¯,C[X] be a non-zero polynomial of degree d given as a black-box with query access to evaluations of f on elements of d. Let S𝔽 with |S|>d. Sample b1,,bnd as follows: Pick each of the d(d+1)2+1 entries of each of the bi’s uniformly and independently from S. Then

Prb1,,bnd[f(b1,,bn)=0]d/|S|.

We construct d in two stages. First, we construct a noncommutative, nonassociative algebra 𝔸d (see Section 3.1 for the precise definition) and show that 𝔸d does not satisfy identities of degree d. Note that this also gives us a noncommutative, nonassociative analogue of Theorem 2 (see Theorem 12 for exact statement). We prove this by showing that monomials in 𝔽A¯,C¯[X] can be isolated using substitutions from (𝔸d)n. Each monomial m𝔽A¯,C¯[X] can be viewed as a rooted, ordered binary tree whose leaves are labeled by variables (see Figure 2 for examples). To each occurrence of a variable x in m, we may associate a level which indicates the depth at which it appears in the monomial m (when viewed as a tree). Noncommutativity of 𝔽A¯,C¯[X] also induces a left to right order in which the variables appear in m. We show that given the left to right order and the corresponding sequence of levels, we can fully reconstruct m (Lemma 8). Using this lemma and a three dimensional version of the set-multilinearization procedure introduced by Forbes and Shpilka [10] in the context of PIT for noncommutative ABPs, we show that 𝔸d does not satisfy identities of degree d. The third dimension “keeps track” of the level at which each leaf appears in a monomial. After this, we define the commutative algebra d as follows: the d product of x,y is the anticommutator333The anticommutator of x,y with respect to a product operation is defined as xy+yx. of x,y with respect to the 𝔸d product. In d, there is no unique left to right order of the variables that we can associate with a monomial. But there is a set of orders that we can associate with each monomial. This set, together with the corresponding sequence of levels, determines the monomial uniquely. Using this, we show that d also does not satisfy identities of degree d.

1.1.2 White-box deterministic PIT over 𝔽𝑨¯,𝑪[𝑿] (Section 4.1)

Next, we consider the white-box identity testing problem over 𝔽A¯,C[X]. Raz and Shpilka [22] give a white-box linear algebraic algorithm for identity testing of noncommutative algebraic branching programs. Subsequently, their algorithm has been adapted to obtain PIT algorithms in various settings, for example, for Read-Once Algebraic Branching Programs (ROABPs) [10], noncommutative Unique Parse Tree Circuits [16] and circuits over 𝔽A¯,C¯[X] [4]. In this work, we show that an adaption of the Raz-Shpilka algorithm can be used to do PIT for circuits over 𝔽A¯,C[X]:

Theorem 3.

Let Ψ be a nonassociative arithmetic circuit of size s computing an n variate, degree d polynomial f𝔽A¯,C[X]. Given Ψ as input, we can check whether f0 deterministically in time 𝗉𝗈𝗅𝗒(s,n,d).

The main difference in the application of the Raz-Shpilka algorithm in our setting is that in all previous works (that we are aware of), if a monomial m is generated at a product gate g=g1×g2 in the circuit, then there is a unique way it could have been generated: there exist monomials m1, m2 such that 𝖼𝗈𝖾𝖿𝖿m(g)=𝖼𝗈𝖾𝖿𝖿m1(g1)×𝖼𝗈𝖾𝖿𝖿m2(g2). On the other hand since we are working in the commutative setting of 𝔽A¯,C[X], there are two ways of generating m at g. Either m1 could be contributed by g1 and m2 by g2, or m2 could be contributed by g1 and m1 by g2. We show (somewhat surprisingly) that the Raz-Shpilka algorithm, suitably modified, works even in this setting.

1.1.3 Black-box deterministic nonassociative PIT (Section 4.2)

We consider next the question of derandomizing black-box PIT for circuits over 𝔽A¯,C[X]. Towards this, we provide a hitting set (consisting of elements of (d)n) for such circuits. A hitting set H for a class 𝒞 of circuits is a set of points such that for any non-zero circuit Ψ𝒞, there exists an aH such that Ψ evaluated at a is not 0.

Theorem 4.

There exists a set Hn,s,d,Δ(d)n of size (nsd)O(Δ) of points in (d)n such that for every nonassociative, commutative circuit Ψ of size s and product depth Δ computing a non-zero polynomial f𝔽A¯,C[X] of degree d, there is a point in Hn,s,d,Δ at which f is non-zero. Furthermore, we can compute Hn,s,d,Δ deterministically in time (nsd)O(Δ).

Recall that the product depth of a circuit is the maximum number of product gates encountered on any leaf to root path in the circuit. Theorem 4 gives a non-trivial hitting set when the product depth Δ=o(d). In particular, when Δ is polylogarithmic, we obtain a quasipolynomial size hitting set.

The result of Kabanets and Impagliazzo [14] shows that explicit lower bound results can give subexponential-time black-box PIT algorithms over the usual commutative polynomial ring 𝔽[X]. The main ingredients in their proof are the combinatorial design of Nisan and Wigderson [21] and the factorization algorithm of Kaltofen [15]. Although we have strong and explicit lower bounds over the algebra 𝔽A¯,C[X], it is unclear how to use them for PIT algorithms. Note that such a connection is not known even over 𝔽X.

We prove Theorem 4 in two stages. In the first stage, we reduce PIT for circuits over 𝔽A¯,C[X] to PIT for unambiguous circuits over 𝔽[Z] (where Z is a fresh set of variables and 𝔽[Z] is the usual polynomial ring) via a set-multilinearization argument. We say that a circuit Ψ over is 𝔽[Z] is unambiguous if for any monomial m𝔽[Z], there exists a reduced parse tree444See 5 for a definition.555The term unambiguous circuit has been used in different contexts in earlier works [3, 17]. Tm such that any reduced parse tree computing m at any gate of Ψ is isomorphic to Tm as a labeled, rooted binary tree. These are the natural associative analogues of nonassociative circuits. We also observe that a similar reduction works over 𝔽A¯,C¯[X], which gives us an analogue of Theorem 4 over the algebra 𝔸d.

In the second stage, we suitably adapt the machinery of basis isolating weight assignments developed by Agrawal et al. [1] to construct hitting sets for unambiguous circuits.

Theorem 5.

There exists a set Hs,n,d,Δ𝔽n such that for any unambiguous circuit Ψ of size s and product depth Δ computing a non-zero polynomial f𝔽[z1,,zn] of degree d, f is non-zero on some point of Hs,n,d,Δ. Furthermore, |Hs,n,d,Δ|=(nds)O(Δ) and Hs,n,d,Δ can be constructed in time (nds)O(Δ).

Informally, given a polynomial f with coefficients coming from a vector space, a basis isolating weight assignment for f is a function from the underlying set of variables to that isolates a minimum weight basis (among the coefficients) for the space spanned by the coefficients of f. Basis isolating weight assignments were used in [1] to construct quasipolynomial size hitting-sets for ROABPs (these are commutative analogues of noncommutative ABPs). Subsequently, they were also used to construct hitting sets for set-multilinear Unique Parse Tree circuits (UPT circuits for short) [23]. UPT set-multilinear circuits generalize ROABPs. In a UPT set-multilinear circuit, every parse tree (see 4 for the definition) at the output has exactly the same shape as a rooted, ordered binary tree. In particular this implies that there is a universal parse tree shape at the root that induces a unique parse tree for each monomial. In unambiguous circuits, this is no longer true. In particular, there is a unique reduced parse tree for each monomial, but two different monomials could have different parse tree shapes. Also, note that unambiguous circuits need not be set-multilinear. On the other hand, we require that for any monomial m, there is a unique parse tree computing it independent of the gate at which m is being computed.

Suppose we have an unambiguous circuit of product depth Δ. We construct a basis isolating weight assignment w for it in multiple stages (as in [1]). At each stage we handle monomials of increasing depths. The proof that w is a basis isolating weight assignment involves isolation of a set Mi of monomials for each depth i[Δ] such that the coefficient of every other monomial of depth i is spanned by coefficients of Mi. The construction of Mi and the proof that its coefficients indeed span coefficients of other monomials is the main technical content of the proof and uses the fact that the circuit is unambiguous. Combining these Mi’s we get the isolated set M of monomials. Identity testing follows from the construction of a basis isolating weight assignment.

The result of Valiant, Skyum, Berkowitz and Rackoff [27] shows that arithmetic circuits can be depth reduced to depth polylogarithmic in the size and degree of the original circuit while incurring only a polynomial blowup in size. Unfortunately, we do not know if such a depth reduction is possible while preserving unambiguousness.

Organization

The paper is organized as follows. In Section 2, we provide the necessary background. Section 3 contains the randomized polynomial-time PIT algorithms over nonassociative algebras. The deterministic PIT algorithms (white-box and black-box) are presented in Section 4. We state a few questions for further research in Section 5.

2 Preliminaries

Definition 1 (Algebra over a field).

Let 𝔽 be a field. An algebra 𝔸 over 𝔽 is an 𝔽-vector space together with a product operation on the elements of the vector space that is bilinear. The dimension of 𝔸 is defined to be the dimension of the underlying vector space. In particular, if the underlying vector space is finite (say n) dimensional and identified with 𝔽n after choice of a basis, an algebra 𝔸 is uniquely defined by n matrices L1,,Ln𝔽n×n as follows: for 𝐱,𝐲𝔽n, their 𝔸-product is precisely

𝐱𝐲=(x1,,xn)(y1,,yn)=(𝐱TL1𝐲,,𝐱TLn𝐲).

An algebra 𝔸 is called unital if it contains a multiplicative identity i such that x𝔸,xi=ix=x. We define the following four different polynomial algebras, depending on the relations the variables satisfy:

  1. (1)

    𝔽A,C[X]: This is the polynomial ring 𝔽[X]. The product operation is both commutative and associative.

  2. (2)

    𝔽A,C¯[X] is the noncommutative polynomial ring 𝔽X. The product operation is noncommutative but associative.

  3. (3)

    𝔽A¯,C[X] is the 𝔽-vector space generated by commutative, nonassociative monomials in the variables X. This vector space becomes an 𝔽-algebra with the commutative, nonassociative product of monomials extended to all of 𝔽A¯,C[X] by bilinearity.

  4. (4)

    𝔽A¯,C¯[X] is the 𝔽-vector space generated by noncommutative, nonassociative monomials in the variables X. This vector space becomes an 𝔽-algebra with the noncommutative, nonassociative product of monomials extended to all elements of 𝔽A¯,C¯[X] by bilinearity.

Definition 2 (Polynomial Identities).

A Polynomial Identity (PI for short) for an algebra 𝔸 is a polynomial f(x1,,xn) in a set of variables {x1,,xn} such that for all A1,,An𝔸, f(A1,,An)=0 where the multiplication is according to the product operation in 𝔸. An algebra that satisfies nontrivial identities is called a PI-algebra.

The study of polynomial identities is a classical and very rich subject in mathematics. For a comprehensive details, see [11].

Definition 3 (Arithmetic Circuit).

An Arithmetic Circuit Ψ over a field 𝔽 is a directed acyclic graph whose leaves (called input gates) are labeled by either variables (say X={x1,,xn}) or field elements and whose internal vertices (called gates) are labeled by either a sum (+) or a product (×). In our case the product operation will often be nonassociative, and we will assume that the fan-in of each product gate is 2. If in addition we are working in 𝔽A¯,C¯[X], the product will also be noncommutative: each product gate will have designated left and and right child. Each gate in a circuit naturally computes a polynomial. The circuit Ψ has a designated output gate and Ψ is said to compute the polynomial computed at the output gate. The size of a circuit is the number of gates in it and the depth of a circuit is the length of the longest leaf-to-root path.

Next we define the concept of a parse tree, that depicts the generation of a particular monomial in the circuit.

Definition 4 (Parse trees).

Let X={x1,,xn} be a set of variables, 𝔽 be a field and Ψ be an arithmetic circuit computing a polynomial f𝔽[X]. The set of parse trees for Ψ will be defined by induction on the size of Ψ as follows:

  • If Ψ is just a leaf labeled by either a variable or a constant, then it has only one parse tree, itself.

  • If the root g of Ψ is a sum gate with subcircuits Ψ1 and Ψ2 as children, the set of parse trees for Ψ is the set of all trees obtained by taking the root g, and attaching to it a parse tree of either Ψ1 or Ψ2.

  • If the root g of Ψ is a product gate with subcircuits Ψ1 and Ψ2, we define the set of parse trees for Ψ to be the set of all trees T obtained by taking a parse tree T1 for Ψ1, a parse tree T2 for a disjoint copy of Ψ2 and making T1,T2 the children of g.

Note that each parse tree T for Ψ computes a monomial (with coefficient).

Definition 5 (Reduced Parse Trees).

From each parse tree T of a circuit Ψ, we may obtain a reduced parse tree T by short-circuiting the sum gates, removing leaves labeled by constants and restructuring the tree in the natural way. T is a full binary tree all of whose leaves are labeled by a variable and all of whose gates are product gates. T captures the multiplicative structure of T. The set of reduced parse trees for Ψ is defined as {TT is a parse tree for Ψ}. See Figure 1(c) for an illustrative example.

(a) A circuit Ψ.
(b) A parse tree T for Ψ.
(c) Reduced parse tree T.

We also recall the following standard result over 𝔽A,C[X]:

Lemma 6 (Polynomial Identity Lemma [30, 25, 8]).

Suppose f(x)𝔽[X] is an n-variate polynomial of degree d, and let SF be a finite set of size strictly larger than d. Then f(a¯)0 for at least (1d|S|) fraction of a¯’s in Sn.

Over the algebra 𝔽A,C¯[X], the following is a well-known result of Amitsur and Levitzki [2].

Theorem 7 (Amitsur-Levitzki Theorem [2]).

Over any field 𝔽, the matrix algebra 𝔽k×k satisfies no PI of (total) degree less than 2k, and satisfies exactly one (up to constant factor) PI of degree 2k.

2.1 A structural lemma about nonassociative monomials

2.1.1 Over the algebra 𝔽𝑨¯,𝑪¯[𝑿]

Let 𝔽 be a field and X={x1,,xn} be a set of variables. There is a natural correspondence between rooted binary trees with leaves labeled by elements of X and monomials in 𝔽A¯,C¯[X]. The nonassociativity introduces a unique product structure which may be interpreted as a binary tree: Let m𝔽A¯,C¯[X] be a monomial. Then there is a unique rooted binary tree Tm whose the leaves (labeled by elements of X) represent the variables, and whose internal nodes compute the product their two children. The root computes the monomial m. For instance, the binary trees in Figure 2(a) and 2(b) compute monomials m=((xi1xi2)xi3) and m=(xi1(xi2xi3)) respectively. Noncommutativity implies that each internal node has designated left and right children, and swapping this order changes the monomial.

Suppose m has degree d. Noncommutativity gives us a unique string σm=(i1,,id)[n]d which is the unique left to right order xi1,xi2xid in which the variables appear in m. We will think of σm:[d][n] as a function defined as σm(j)=ij for all j[d]. Note that σm does not uniquely define a monomial. For instance, for the monomials m,m𝔽A¯,C¯[X] shown in Figure 2, σm=σm but mm. Given a monomial m𝔽A¯,C¯[X] as a binary tree Tm, we assign level numbers to the nodes of Tm. Define the level of a node v in Tm to be 1+d(root,v), where d(,) is the distance function. That is, the root is at level 1, the children of the root are at level 2 and so on. For each j[d], let ljm denote the level at which the jth variable (in the left to right order) appears in m.

For monomials m=((xi1xi2)xi3) and m=(xi1(xi2xi3)) shown in Figure 2, l1m=3,l2m=3,l3m=2 and l1m=2,l2m=3,l3m=3. In general, the variable order σm and the level numbers (l1m,,ldm) together uniquely determine the monomial m.

(a) m=((xi1xi2)xi3).
(b) m=(xi1(xi2xi3)).
(c) m′′=((xi2xi1)xi3).
Figure 2: Examples of nonassociative, noncommutative monomials.

We state this formally in the following lemma:

Lemma 8.

Let m,m be distinct monomials in 𝔽A¯,C¯[X]. Let 𝖽𝖾𝗀(m)=d and 𝖽𝖾𝗀(m)=d. Then the tuples (σm,l1m,,ldm) and (σm,l1m,,ldm) are distinct.

Proof.

We assume that σm=σm, for otherwise the statement is evidently true. In particular, assume that the degrees of m and m are both equal to d. Next, we simply observe that it is possible to iteratively reconstruct m uniquely, given the sequence l1m,,ldm of levels. Start with just the root. To it, add a path of length l1m1 consisting entirely of left edges (every node is a left child of it’s parent). Label the ultimate node (leaf) on the path by xσm(1). Now suppose we already have a leaf for the i-th variable, xσm(i). To generate the leaf labeled by xσm(i+1), find the ancestor v of xσm(i) closest to xσm(i) that only has a left child. Let the level of v be l. Add a right v to child to v. If v is at level lσm(i+1), label it by xσm(i+1). Otherwise, add to it a path of length lσm(i+1)l1 consisting only of left edges and label the ultimate node on this path by xσm(i). This process recovers m. The key property of trees representing nonassociative monomials that is used in the procedure above is that they are full binary trees, that is, each node either has exactly two children or none at all. This justifies our choice of going back to the the closest ancestor v of xσm(i) that only has a left child and no right child.

2.1.2 Over the algebra 𝔽𝑨¯,𝑪[𝑿]

Next, we consider the case of monomials in 𝔽A¯,C[X]. One may partition the set of all monomials in 𝔽A¯,C¯[X] into equivalence classes under commutativity: For all monomials m,m𝔽A¯,C¯[X], mm if and only if m and m are equal up commutativity. For example the monomials shown in Figure 2(a) and Figure 2(b) belong to different equivalence classes. On the other hand, monomials in Figure 2(a) and Figure 2(c) belong to the same equivalence class.

Each equivalence class may be identified with a monomial in 𝔽A¯,C[X]. Looking at it from the other direction, suppose m,m are monomials in 𝔽A¯,C[X] and suppose Mm, Mm are the equivalence classes of monomials in 𝔽A¯,C¯[X] they represent. Since as defined above is an equivalence relation, we have the following simple observation:

Observation 9.

For any two distinct monomials m,m𝔽A¯,C[X] we have MmMm=.

3 Randomized Black-box PIT for Nonassociative circuits

Let 𝔽 be a field and let X={x1,,xn}. In this section, we work with both the nonassociative, noncommutative polynomial algebra 𝔽A¯,C¯[X] as well as the commutative 𝔽A¯,C[X]. In subsection 3.1, we give a randomized, polynomial time black-box algorithms to test whether a nonassociative, noncommutative circuit Φ over 𝔽 computes the identically zero polynomial. The algorithm assumes that we have access to evaluations of Φ on a suitable k dimensional 𝔽-algebra A, and that the cost of one A-query is 𝗉𝗈𝗅𝗒(𝗌𝗂𝗓𝖾(Φ),k). That is, the cost is polynomial in the size of the circuit and the dimension of the algebra. To the best of our knowledge, this gives the first Amitsur-Levitzki type theorem [2] over nonassociative polynomial algebras.

3.1 Nonassociative, Noncommutative Randomized Black-box PIT

The key idea is to construct a noncommutative, nonassociative 𝔽-algebra and show that it does not satisfy low degree polynomial identities. This will imply that a random non-zero substitution from this algebra will make a non-zero circuit Φ evaluate to something non-zero, with high probability.

We will query noncommutative, nonassociative circuits computing a polynomial f𝔽A¯,C¯[X] of degree d on a particular d(d+1)2+1 dimensional algebra 𝔸d that we now describe. First, we construct an algebra 𝔸d of dimension d(d+1)2 and then construct the desired algebra 𝔸d by adjoining an identity element to 𝔸d. Additively, 𝔸d is an 𝔽-vector space of dimension d(d+1)2. We will think of an element of 𝔸d as a set of d matrices each of dimension (d+1)×(d+1):

Figure 3: 3-dimensional view of an element of 𝔸d.

Let x,y𝔽d(d+1)2. We index x,y as x[i,j,k] and y[i,j,k] for 1i,jd+1 and 1kd. Here, k can be thought of as indexing the set of d matrices and for a fixed k, i and j index respectively the rows and columns of the k-th matrix. Next, we define the bilinear 𝔸d-product of x,y as follows: zxy such that

z[i,j,k]={0k=dl=1d+1x[i,l,k+1]y[l,j,k+1]1kd1

Clearly, 𝔸d is an 𝔽-algebra. From the proof of Lemma 10, it will be evident that 𝔸d is a nonassociative algebra.

We require the algebra 𝔸d to be unital to make sense of 𝔸d-evaluations of polynomials with a non-zero constant term: For any f𝔽A¯,C¯[X], f(0,,0)=c𝟏 where f has constant term c𝔽 and 𝟏 is the identity element of 𝔸d. However, 𝔸d is non-unital. To construct the unital algebra 𝔸d (from 𝔸d), we use a standard procedure of adjoining an identity to an algebra:

The Algebra 𝔸𝐝

Define the algebra 𝔸d to be the vector space 𝔽d(d+1)2+1={(a,α)a𝔸d,α𝔽} together with the bilinear product defined as follows:

(a1,α1)(a2,α2)=(a1a2+α1a2+α2a1,α1α2)

We will refer to this newly added index as the last index. It is easy to verify that 𝔸d is indeed a nonassociative algebra with (𝟎,1) being the multiplicative identity, and that 𝔸d is isomorphic to the sub-algebra {(a,0)a𝔸d} of 𝔸d.

Now, we show that 𝔸d cannot have polynomial identities of degree d.

Lemma 10.

Let f𝔽A¯,C¯[X] be a non-zero polynomial of total degree d. Then f is not a PI for 𝔸d.

Proof.

It suffices to consider polynomials that do not have a constant term, since a polynomial with a non zero constant term evaluates to a non-zero value at the all zeroes input. Also, it suffices to prove Lemma 10 for the algebra 𝔸d instead of 𝔸d, since 𝔸d is a subalgebra of Ad. In order to prove the lemma, we reduce the problem to the associative, commutative setting.

For each xi, we introduce an associative, commutative set of variables {zi,j,k1j,kd}. For convenience, denote the vector (zi,j,k)j,k[d] by 𝐳𝐢. Extend the ground field 𝔽 to the function field 𝔽=𝔽(𝐳1,,𝐳n). We define the algebra 𝔸d over the field 𝔽 as described earlier. Eventually, the 𝐳 variables will be fixed suitably from the base field 𝔽.

Next, consider the evaluation map Φ:𝔽A¯,C¯[X]𝔸d that sends xi to Zi where for each 1j,kd, the (j,j+1,k)-th entry of Zi is zi,j,k and the rest of the entries are zero. For an illustration, we describe Z1 explicitly in Figure 4.

Figure 4: Z1=Φ(x1) visualized as an element of 𝔸d.

Let us look at the image of a monomial m𝔽A¯,C¯[X] (of degree at most d) under Φ. Let dd be the degree of m. We interpret m as a binary tree with leaves labeled by variables. Since we are in the noncommutative setting, there is a unique function σm:[d][n] that describes the left-to-right order in which the variables appear in m. We will level the nodes (including leaves) of m as described in Section 2.1. Let ltm denote the level at which the t-th variable in σm (i.e., variable xσm(t)) appears in m. Let the depth of m (i.e., 𝗆𝖺𝗑i{li}) be l.

Claim 11.

Let m be as above. For each k1[dd+1] and each k2[dl+1], the (k1,k1+d,k2)-th entry of Φ(m) is the monomial t=1dzσm(t),t+k11,ltm+k21, and every other entry is zero.

Proof.

We prove this by induction on the degree d of m. For 𝖽𝖾𝗀(m)=1, the claim follows from the definition of Zi’s. Now suppose d>1 and m is uniquely written as m1m2 such that 𝖽𝖾𝗀(m1)=d1, 𝖽𝖾𝗀(m2)=d2 and d1+d2=d. Then,

Φ(m)[k1,k1+d,k2]=i=1d+1Φ(m1)[k1,i,k2+1]Φ(m2)[i,k1+d,k2+1]

By induction, we see that exactly one term in this sum is non zero, the one corresponding to i=k1+d1 and the sum is therefore equal to

(t=1d1zσm1(t),t+k11,ltm1+k2)(t=1d2zσm2(t),t+d1+k11,ltm2+k2) (1)

Notice that

σm(t)={σm1(t)1td1σm2(td1)d1+1td

and that

ltm={ltm1+11td1ltd1m2+1d1+1td

Using these observations, we find that (1) is exactly equal to t=1dzσm(t),t+k11,lσm(t)m+k21.

Now let us look at Φ(m)[i1,i2,i3] such that i2i1+d and i3[d1] (if i3=d, Φ(m)[i1,i2,i3]=0 by definition of the 𝔸d product).

Φ(m)[i1,i2,i3]=i=1d+1Φ(m1)[i1,i,i3+1]Φ(m2)[i,i2,i3+1]

Using the induction hypothesis, we see that each summand in the sum above is actually zero, and therefore so is Φ(m)[i1,i2,i3].

Let us also look at Φ(m)[i1,i2,i3] with i3>dl+1. If d=2 then all such entries of Φ(m) are easily seen to be zero. Now suppose d>2 and assume, without loss of generality, that the depth of m1 is l1. Then by induction, all entries Φ(m1)[i1,i2,i3] of Φ(m1) with i3>dl are zero and therefore so are all the entries Φ(m)[i1,i2,i3] of Φ(m) with i3>dl+1.

This concludes the proof of Claim 11. Now, by setting k1,k2=1 in the statement of Claim 11 we see that for a monomial m of degree d, the (1,d+1,1)-th entry of Φ(m) is t=1dzσm(t),t,lt. For any monomial of degree d, this entry is zero. This observation combined with Lemma 8 gives us Lemma 10.

Using Lemma 10, we exhibit a randomized black-box identity testing algorithm for nonassociative, noncommutative circuits.

Theorem 12.

Let 𝔽 be a field with |𝔽|>d, and S𝔽. Let f𝔽A¯,C¯[X] be a non-zero polynomial of degree d given as a black-box with query access to evaluations of f on elements of 𝔸d. Let S𝔽 with |S|>d. Sample b1,,bn𝔸d as follows: Pick each of the d(d+1)2+1 entries of each of the bi’s uniformly and independently from S. Then

Prb1,,bn𝔸d[f(b1,,bn)=0]d/|S|.
Proof.

From Lemma 10, it follows that f is not a PI for 𝔸d. By slight abuse of notation, define 𝔸d over the field 𝔽(Y) where Y is a commutative, associative set of variables and |Y|=nd(d+1)2+1. Replace each xi by Yi𝔸d defined as follows: Yi has dimension d(d+1)2+1 and each entry of each Yi is a fresh variable from Y. Since f is not a PI for 𝔸d, f(Y1,,Yn)0 and so at least one entry of f(Y1,,Yn) is a non-zero polynomial in 𝔽[Y]. By the Polynomial Identity Lemma (Lemma 6), under a random S-substitution, the probability that that entry of f(Y1,,Yn) evaluates to zero is d/|S|.

Theorem 12 can be thought of as a version of Theorem 7 over 𝔽A¯,C¯. It immediately gives us the desired black-box PIT algorithm.

3.2 Nonassociative, Commutative Randomized Black-box PIT

Next, we construct a nonassociative, commutative algebra d that does not satisfy low degree identities in 𝔽A¯,C[X]. d is constructed using the algebra 𝔸d from the previous section (Section 3.1). Recall that denotes the 𝔸d-product.

The Algebra 𝒅

d is isomorphic to 𝔸d as a vector space, and the d product of a,b (denoted by ) is simply the anticommutator of a,b with respect to the 𝔸d product “”. That is, ab=ab+ba. Let d denote the sub-algebra of d obtained by setting the last index to 0. It is easily verified that d is isomorphic to the algebra whose product is the anticommutator with respect to the 𝔸d product . For convenience, in the sequel, we will drop the last index of elements of d.

Lemma 1. [Restated, see original statement.]

Let f𝔽A¯,C[X] be a non-zero polynomial of total degree d. Then f is not a polynomial identity (PI) for d.

Proof.

The proof of Lemma 1 is similar to the proof of Lemma 10. As before, we note that it suffices to prove the lemma for constant free polynomials and that it suffices to prove the claim for d instead of d, because any identity of d is also an identity of d.

For each xi, we introduce the same associative, commutative set of variables {zi,j,k1j,kd} as before. Denote the vector (zi,j,k)j,k[d] by 𝐳𝐢. As in the proof of Lemma 10, we consider the extended field 𝔽=𝔽(𝐳1,,𝐳n) and define d over 𝔽. We consider the evaluation map Φ:𝔽A¯,C[X]d that sends xi to Zi where for each 1j,kd, the (j,j+1,k)-th entry of Zi is zi,j,k and the rest of the entries are zero. Again, we would like to inspect the image of a monomial m𝔽A¯,C[X] of degree dd under Φ. As before, we interpret m as a binary tree. Without loss of generality, let the variables appearing in m be x1,,xd. Unlike in the noncommutative case, there is no unique left to right order of variables that one can associate with the monomial m.

There is, however, a set of orders that one can associate with m: For each internal node in the tree representing m, arbitrarily designate one of the children to be the left child and the other to be the right child. This procedure induces an order σ on the variables of m. Furthermore, every distinct way of designating left and right children at the internal nodes of m induces a unique order. Consider the union of all these orders and denote this set by Σm. Each σΣm corresponds to a unique monomial from 𝔽A¯,C¯[X] in the equivalence class Mm corresponding to the monomial m (see Section 2.1, the commutative case). Also, for a fixed σΣm, let ltm,σ denote the level at which the t-th variable in the order σ (i.e., variable xσ(t)) appears in m. Let the depth of m (i.e., 𝗆𝖺𝗑i{li}) be l.

Claim 13.

Let m be as above. For each k1[dd+1] and each k2[dl+1], the (k1,k1+d,k2)-th entry of Φ(m) is the polynomial σΣmt=1dzσ(t),t+k11,ltm,σ+k21, and every other entry is zero.

Proof.

We prove this by induction on the degree d of m. For 𝖽𝖾𝗀(m)=1, |Σm|=1 and the claim follows from the definition of Zi’s. Now suppose d>1 and m is uniquely written as m1m2 such that 𝖽𝖾𝗀(m1)=d1, 𝖽𝖾𝗀(m2)=d2 and d1+d2=d. Then,

Φ(m)[k1,k1+d,k2]= i=1d+1Φ(m1)[k1,i,k2+1]Φ(m2)[i,k1+d,k2+1]
+ i=1d+1Φ(m2)[k1,i,k2+1]Φ(m1)[i,k1+d,k2+1]

By induction, we see that the first sum i=1d+1Φ(m1)[k1,i,k2+1]Φ(m2)[i,k1+d,k2+1] is equal to

(πΣm1t=1d1zπ(t),t+k11,ltm1,π+k2)(τΣm2t=1d2zτ(t),t+d1+k11,ltm2,τ+k2)

while the second sum i=1d+1Φ(m2)[k1,i,k2+1]Φ(m1)[i,k1+d,k2+1] is equal to

(τΣm2t=1d2zτ(t),t+k11,ltm2,τ+k2)(πΣm1t=1d1zπ(t),t+d2+k11,ltm1,π+k2)

Expanding the products, we see that the first sum generates the monomials in the polynomial σΣmt=1dzσ(t),t+k11,ltm,σ+k21 corresponding to the σΣm that make m1 the left child of the root of m and m2 the right, and the second term generates the rest of the monomials.

Also, note that the same argument as in the proof of Lemma 10 tells us that if we have i1,i2,i3 such that i2i1+d and i3[d] then Φ(m)[i1,i2,i3]=0 and that if i3>dl+1 then again Φ(m)[i1,i2,i3]=0.

In particular, by setting k1,k2=1 in the statement of Claim 13 we see that for a monomial m of degree d, the (1,d+1,1)-th entry of Φ(m) is σΣmt=1dzσ(t),t,ltm,σ. For a monomial of degree d, this entry is zero.

Therefore, Combining Claim 13, Lemma 8 and Observation 9, we see that f cannot be an a PI for d (and therefore for d).

The proof of Theorem 2 follows from Lemma 1, in a way similar to the proof of Theorem 12. We record the statement here for completeness

Theorem 2. [Restated, see original statement.]

Let 𝔽 be a field with |𝔽|>d, and S𝔽. Let f𝔽A¯,C[X] be a non-zero polynomial of degree d given as a black-box with query access to evaluations of f on elements of d. Let S𝔽 with |S|>d. Sample b1,,bnd as follows: Pick each of the d(d+1)2+1 entries of each of the bi’s uniformly and independently from S. Then

Prb1,,bnd[f(b1,,bn)=0]d/|S|.

4 Deterministic PIT Algorithms Over 𝔽𝑨¯,𝑪[𝑿]

In this section, we develop efficient deterministic PIT algorithms over the algebra 𝔽A¯,C[X]. First, we present the white-box algorithm and then the black-box algorithm.

4.1 White-box Deterministic PIT over 𝔽𝑨¯,𝑪[𝑿]

We give a polynomial time white-box PIT algorithm for commutative, nonassociative circuits. We use linear algebraic ideas from the PIT algorithm by Raz and Shpilka [22] for noncommutative algebraic branching programs. These ideas have later been used to give polynomial time white-box PIT algorithms for various models, such as nonassociative, noncommutative circuits [4] and noncommutative unique parse tree circuits [16].

Theorem 3. [Restated, see original statement.]

Let Ψ be a nonassociative arithmetic circuit of size s computing an n variate, degree d polynomial f𝔽A¯,C[X]. Given Ψ as input, we can check whether f0 deterministically in time 𝗉𝗈𝗅𝗒(s,n,d).

Proof.

For each monomial m of degree d, we may associate a vector vm𝔽s where s is the number of gates in Ψ. The vector vm is indexed by the gates of Ψ such that vm(g)=𝖼𝗈𝖾𝖿𝖿m(g). For each i{0}[d], we wish to maintain a polynomially bounded set Mi of monomials of degree i and a corresponding set Bi={vmmMi} of vectors such that 𝗌𝗉𝖺𝗇{Bi}=𝗌𝗉𝖺𝗇{vm𝖽𝖾𝗀(m)=i}, and we build these sets inductively, starting from i=0,1. For i=0,1, we set Mi to be the set of all monomials of degree i and populate the vectors in Bi in a brute force manner.

Next, suppose we have the sets Mi,Bi for 0i<j and we want to construct Mj and Bj (j2). We set

Mj=i+k=ji,k1{m×mmMi and mMk}

For all m=m1m2Mj we do the following: we sort the gates of Ψ in topological order and fill the entries of vm in that order as follows:

  • If g is a leaf, we set vm(g)=0 (since j=𝖽𝖾𝗀(m)2).

  • If g=g1×g2 is a product gate, set vm(g)=vm1(g1)vm2(g2)+vm2(g1)vm1(g2)+vm(g1)v1(g2)+v1(g1)vm(g2). We can do this since we know the vectors vm1,vm2 by induction on the degree, and we know vm(g1),vm(g2) as g1,g2 appear before g in the topological order.

  • If g=g1+g2 is a sum gate, set vm(g)=vm(g1)+vm(g2). Again, we know vm(g1),vm(g2) as g1,g2 appear before g.

Finally, we select a maximal linearly independent subset Bj (using Gaussian elimination) from the set of vectors {vmmMj} and call the corresponding set of monomials Mj. Clearly, |Mj|s.

Claim 14.

For any monomial m such that 𝖽𝖾𝗀(m)=j, vm𝗌𝗉𝖺𝗇{Bj}.

Proof.

The proof is by induction on the degree j. For j=0,1, the claim is trivially true, so assume j2. Now suppose m is uniquely decomposed (up to commutativity) as m=m1m2 such that 𝖽𝖾𝗀(m1)=i and 𝖽𝖾𝗀(m2)=k (with i,k1). By induction on degree, we assume that

vm1=mMiαmvm and vm2=m′′Mkβm′′vm′′ (2)

for constants {αmmMi} and {βm′′m′′Mk}. We will prove that for each gate g of Ψ

vm(g)=mMim′′Mkαmβm′′vmm′′(g) (3)

This puts vm in 𝗌𝗉𝖺𝗇{Bj} by construction. We prove (3) gate by gate, by induction on the depth of the gate.

  • For a leaf g, g is labeled by a variable or a constant, so vm(g)=0 (recall that j2) and vmm′′(g) for each mBi,m′′Bk is also all zero by construction, so (3) is true in this case.

  • For a product gate g=g1×g2,

    vm(g) =vm1(g1)vm2(g2)+vm2(g1)vm1(g2)+vm(g1)v1(g2)+v1(g1)vm(g2).

    After substituting (2) for vm1 and vm2 using the (degree) induction hypothesis, substituting (3) for vm(g1),vm(g2) using induction on the depth of g1,g2 and simplifying, we get that

    vm(g)=mMim′′Mkαmβm′′((r,t){(1,2),(2,1)}vm(gr)vm′′(gt)+vmm′′(gr)v1(gt))

    Note that the inner expression is nothing but vmm′′(g) (by construction), and therefore (3) is true when g is a product gate.

  • For a sum gate g=g1+g2, we have

    vm(g) =vm(g1)+vm(g2)
    =mMim′′Mkαmβm′′vmm′′(g1)+mMim′′Mkαmβm′′vmm′′(g2)
    =mMim′′Mkαmβm′′(vmm′′(g1)+vmm′′(g2))
    =mMim′′Mkαmβm′′vmm′′(g)

    where the second step follows by induction on depth and the fourth by construction of vmm′′. This verifies (3) when g is a sum gate.

These three cases together prove the claim.

Clearly, this procedure of constructing Bj’s and Mj’s takes polynomial time since |Bj|max{s,n,1} for each 0jd. To check whether Ψ0, we simply check whether there exists an i{0,,d} such that there exists a monomial mMi such that vm(gs)0, where gs is the output gate of Ψ. If yes, we say Ψ0, otherwise we say Ψ0.

4.2 Deterministic Nonassociative Black-box PIT

Due to space constraints, many of the proofs in this section are omitted, and can be found in the full version of this paper [19]. In this section, we design black-box PIT algorithms for polynomials in 𝔽A¯,C[X] and 𝔽A¯,C¯[X] computed by low depth circuits. Our algorithms run in quasipolynomial time as long as the input circuit Ψ has depth polylogarithmic in the size of Ψ and the degree of the polynomial computed by it. The algorithms query Ψ on elements of the algebra 𝔸d in the non-commutative case and on elements of d in the commutative case, defined in sections 3.1 and 3.2 respectively. In particular, we construct hitting sets of quasipolynomial size in both the commutative and noncommutative setting, for circuits that have depth polylogarithmic in its size and degree.

Theorem 4. [Restated, see original statement.]

There exists a set Hn,s,d,Δ(d)n of size (nsd)O(Δ) of points in (d)n such that for every nonassociative, commutative circuit Ψ of size s and product depth Δ computing a non-zero polynomial f𝔽A¯,C[X] of degree d, there is a point in Hn,s,d,Δ at which f is non-zero. Furthermore, we can compute Hn,s,d,Δ deterministically in time (nsd)O(Δ).

Over the algebra 𝔽A¯,C¯[X], we have the following analogous result.

Theorem 15.

There exists a set Hn,s,d,Δ(𝔸d)n of size (nsd)O(Δ) of points in (𝔸d)n such that for every nonassociative, noncommutative circuit Ψ of size s and product depth Δ computing a non-zero polynomial f𝔽A¯,C¯[X] of degree d, there is a point in Hn,s,d,Δ at which f is non-zero. Furthermore, we can compute Hn,s,d,Δ in time (nsd)O(Δ).

The proofs of Theorems 4 and 15 involve reducing PIT for nonassociative circuits to PIT for associative, unambiguous circuits (see below for a formal definition) and then giving hitting sets for unambiguous circuits.

Definition 6 (Unambiguous Circuits).

Let Z={z1.,zn} be a commutative, associative set of variables and let mons(Z) denote the set of monomials in the variables in Z. We say that a circuit Ψ computing a polynomial f𝔽[Z] is unambiguous if for each monomial m in f there is a unique reduced parse tree Tm in Ψ generating m. That is, if another reduced parse tree T generates m at any gate in Ψ, then the trees T and Tm are identical as labeled rooted binary trees.

4.2.1 Reduction from non-associative to associative, unambiguous circuits

The first, fairly straightforward step is to reduce PIT for nonassociative circuits to PIT for associative, unambiguous circuits. We do this via a set-multilinearization argument. This type of reduction is commonplace in noncommutative PIT literature (see for example [10, 23]).

We first describe the reduction in the nonassociative, commutative setting. The proof is along exactly the same lines in the noncommutative setting as well (in fact it is simpler).

Let {x1,,xn} be a set of variables. Let Ψ be a circuit computing a polynomial f𝔽A¯,C[X] of degree dd. For each variable xi,i[n], we introduce a set {zi,j,k1j,kd}. Let Z=i=1n{zi,j,k1j,kd} and define the algebras d and d over the field 𝔽(Z). We consider the evaluation map Φ:𝔽A¯,C[X]d defined in Section 3.2. Let us recall the definition of Φ: Φ maps xi to Zi where for each 1j,kd, the entry (j,j+1,k) of Zi is zi,j,k and the rest of the entries are zero.

We will examine the image of the circuit Ψ under Φ. To this end, we define another map ϕ:𝔽A¯,C[X]𝔽[Z]. Let m be a monomial in {x1,,xn} of degree d. Recall that in Section 3.2, we associated to m a set Σm of “orders” and for each σΣm, we had ltm,σ (for each 1td), the level at which the t-th variable in the order σ appears in m. For a monomial m in 𝔽A¯,C[X] define

ϕ(m)σΣmt=1dzσ(t),t,ltm,σ

and extend ϕ linearly to all of 𝔽A¯,C[X].

Lemma 16.

Let f𝔽A¯,C[X] be a homogeneous polynomial of degree dd. The (1,d+1,1)-th entry of Φ(f) is equal to ϕ(fd) where fd is the homogeneous degree d component of f.

Proof.

This is a simple corollary of Claim 13. Setting k1,k2=1 in the statement of Claim 13, we see that for a monomial m of degree d, the (1,d+1,1)-th entry of Φ(m) is ϕ(m). On the other hand, for a monomial m of degree d, we get that the (1,d+1,1)-th entry of Φ(m) is 0. Therefore, Lemma 16 follows by summing over monomials of f.

Lemma 17.

Let Ψ be a nonassociative, commutative arithmetic circuit of size s and product depth Δ computing a polynomial f𝔽A¯,C[X] of degree dd. Then, there exists an unambiguous circuit Ψ computing ϕ(fd) where fd is the homogeneous degree d component of f. Furthermore, the size of Ψ is at most 3d4s and product depth at most Δ.

In the non-commutative setting, let {x1,,xn} be a set of variables and let the set Z of variables be as before. We consider the map Φ:𝔽A¯,C¯[X]𝔸d from Section 3.1 (where 𝔸d is an algebra over the field 𝔽(Z)). In this case, Φ sends xi to Zi𝔸d where for each 1j,kd the (j,j+1,k)-th entry of Zi is zi,j,k and every other entry is zero.

Recall that for any monomial m𝔽A¯,C¯[X] of degree d there is a unique left to right order σm:[d][n] of variables associated to m. To study the image of a polynomial under Φ, we need the auxiliary map ϕ:𝔽A¯,C¯[X]𝔽[Z] defined as follows: for a monomial m as above,

ϕ(m)=t=1dzσm(t),t,ltm

Using these definitions of Φ and ϕ, and along the same lines as the proofs of Lemmas 16 and 17, we obtain the following:

Lemma 18.

Let f𝔽A¯,C¯[X] be a homogeneous polynomial of degree dd. The (1,d+1,1)-th entry of Φ(f) is equal to ϕ(fd) where fd is the homogeneous degree d component of f.

Lemma 19.

Let Ψ be a nonassociative, noncommutative arithmetic circuit computing a polynomial f𝔽A¯,C¯[X] of degree dd. Then, there exists an unambiguous circuit Ψ computing ϕ(fd) (where fd is the homogeneous degree d component of f). Furthermore, the size of Ψ is at most 3d4s and product depth at most Δ.

4.2.2 Hitting sets for low-depth associative, unambiguous circuits

In this section, we construct hitting sets for low-depth unambiguous circuits in the commutative, associative setting. We first define the most important tool in the design of hitting sets for unambiguous circuits: basis isolating weight assignments. Agrawal et al. [1] defined basis isolating weight assignments and used them to construct hitting sets for Read-Once oblivious ABPs. These weight assignements were subsequently also used in a work of Saptharishi and Tengse [23] for PIT of noncommutative unique parse tree circuits.

Let Z={z1,,zn} and let Ψ an unambiguous circuit with s gates computing a polynomial f𝔽[Z] of degree d. Define fΨ𝔽s[Z] to be the polynomial mmons(Z)vmm where for each monomial m, vm, the coefficient of m in fΨ, is (as before) an s dimensional vector whose entries are indexed by gates of Ψ and for each gate g in Ψ, vm(g)coeffm(g). Let w:Z be a weight function that assigns weights to variables in Z. w extends to mons(Z) naturally as follows: w(z1i1z2i2znin)=j=1nijw(zj).

Definition 7 (Basis Isolating Weight Assignment).

A weight function w:Z is said to be a basis isolating weight assignment for fΨ𝔽s[Z] if there exists a set M of isolated monomials in mons(Z) such that the following conditions hold:

  1. 1.

    B={vmmM} forms a basis for span{vmmmons(Z)}

  2. 2.

    For m,mM such that mm, we have that w(m)w(m)

  3. 3.

    For each mM, vmspan{vmmM,w(m)<w(m)}.

We construct such weight assignments for unambiguous circuits.

Theorem 20.

Let Ψ be an unambiguous circuit with s gates and product depth Δ computing f𝔽[Z] of degree d. Let fΨ=mmons(Z)vmm be as above. Then, we can construct a basis isolating weight assignment w:Z for fΨ such that w(zi)=(nds)O(Δ), for each i[n]. Furthermore, we can construct w in time (nds)O(Δ).

Next, we show that a basis isolating weight assignment is useful for PIT.

Lemma 21.

Let Ψ be a circuit computing f(z1,,zn)𝔽[Z] and fΨ=mmons(Z)vmm be as defined earlier. Suppose w is a basis isolating weight assignment for fΨ. Let ϕ be the polynomial map that sends zi to tw(zi) where t is a new variable. Then ϕ(f)0f0.

PIT for unambiguous circuits of low depth follows easily from Lemmas 20 and 21, just by noting that the degree of the univariate polynomial ϕ(f) (as above) is 𝗉𝗈𝗅𝗒(n,d,s)Δ. To check if a univariate is identically zero, we can query it on 𝖽𝖾𝗀𝗋𝖾𝖾+1 points in 𝔽 (recall that a non-zero univariate has at most degree many roots). If Δ is polylogarithmic in n,d,s, we get the quasipolyomial running time bound. We record this as our next theorem.

Theorem 5. [Restated, see original statement.]

There exists a set Hs,n,d,Δ𝔽n such that for any unambiguous circuit Ψ of size s and product depth Δ computing a non-zero polynomial f𝔽[z1,,zn] of degree d, f is non-zero on some point of Hs,n,d,Δ. Furthermore, |Hs,n,d,Δ|=(nds)O(Δ) and Hs,n,d,Δ can be constructed in time (nds)O(Δ).

Theorems 4 and 15 are a direct consequence of combining the reduction from nonassociative circuits to commutative, associative, unambiguous circuits and the hitting set for unambiguous circuits.

5 Discussion

Two interesting question that stem from our work are the following:

  1. 1.

    Depth reduction for unambiguous circuits: As briefly mentioned in the introduction, we leave open the question of whether unambiguous circuits can be depth reduced without too much blowup in size. More precisely, suppose we have an unambiguous circuit Ψ of size s, computing a polynomial f𝔽[z1,,zn] of degree d. Does there exist another unambiguous circuit Ψ computing f, with size quasipolynomial in n,s,d and depth polylogarithmic in n,s,d? A positive answer to this question would imply that the size of the hitting sets from Theorem 4 and Theorem 15 can be improved to quasipolynomial, irrespective of the depth of the circuit. As far as we know, standard depth reduction techniques due to Valiant et al. [27] and Brent [7] do not preserve unambiguity of circuits, even if we allow quasipolynomial blowup in size.

  2. 2.

    Tightness of the dimension of d and 𝔸d: Consider the following, purely mathematical question: What is the smallest possible dimension k(d) of a unital algebra that does not satisfy any identity f𝔽A¯,C[X] of degree d? We show k(d)d(d+1)2+1. One could also ask the analogous question over the algebra 𝔽A¯,C¯[X]. The Amitsur-Levitzki Theorem (Theorem 7) gives such a tight characterization over 𝔽X, for matrix algebras.

References

  • [1] Manindra Agrawal, Rohit Gurjar, Arpita Korwar, and Nitin Saxena. Hitting-sets for roabp and sum of set-multilinear circuits. SIAM Journal on Computing, 44(3):669–697, 2015. doi:10.1137/140975103.
  • [2] A. S. Amitsur and J. Levitzki. Minimal identities for algebras. Proceedings of the American Mathematical Society, 1(4):449–463, 1950. URL: http://www.jstor.org/stable/2032312.
  • [3] V. Arvind and S. Raja. Some lower bound results for set-multilinear arithmetic computations. Chicago Journal of Theoretical Computer Science, 2016, April 2016.
  • [4] Vikraman Arvind, Rajit Datta, Partha Mukhopadhyay, and S. Raja. Efficient identity testing and polynomial factorization in nonassociative free rings. In Kim G. Larsen, Hans L. Bodlaender, and Jean-François Raskin, editors, 42nd International Symposium on Mathematical Foundations of Computer Science, MFCS 2017, August 21-25, 2017 - Aalborg, Denmark, volume 83 of LIPIcs, pages 38:1–38:13. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2017. doi:10.4230/LIPICS.MFCS.2017.38.
  • [5] Walter Baur and Volker Strassen. The complexity of partial derivatives. Theoretical Computer Science, 22(3):317–330, 1983. doi:10.1016/0304-3975(83)90110-X.
  • [6] Nicolas Bourbaki. Lie Groups and Lie Algebras. Springer Science, 1989.
  • [7] Richard P. Brent. The parallel evaluation of general arithmetic expressions. J. ACM, 21(2):201–206, April 1974. doi:10.1145/321812.321815.
  • [8] Richard A. DeMillo and Richard J. Lipton. A probabilistic remark on algebraic program testing. Inf. Process. Lett., 7(4):193–195, 1978. doi:10.1016/0020-0190(78)90067-4.
  • [9] Nathanaël Fijalkow, Guillaume Lagarde, Pierre Ohlmann, and Olivier Serre. Lower bounds for arithmetic circuits via the hankel matrix. computational complexity, 30(2):14, October 2021. doi:10.1007/s00037-021-00214-1.
  • [10] Michael A. Forbes and Amir Shpilka. Quasipolynomial-time identity testing of non-commutative and read-once oblivious algebraic branching programs. In 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, pages 243–252, 2013. doi:10.1109/FOCS.2013.34.
  • [11] A. Giambruno and Mikhail Zaicev. Polynomial Identities and Asymptotic Methods, volume 122 of Mathematical surveys and monographs. American Mathematical Soc., 2005.
  • [12] Pavel Hrubes, Avi Wigderson, and Amir Yehudayoff. Relationless completeness and separations. In Proceedings of the 25th Annual IEEE Conference on Computational Complexity, CCC 2010, Cambridge, Massachusetts, USA, June 9-12, 2010, pages 280–290. IEEE Computer Society, 2010. doi:10.1109/CCC.2010.34.
  • [13] Nathan Jacobson, Daniel Zelinsky, Richard E. Block, David J. Saltman, and J. Marshall Osborn. A. Adrian Albert Collected Mathematical Papers, volume 3. American Mathematical Society, 1993.
  • [14] Valentine Kabanets and Russell Impagliazzo. Derandomizing polynomial identity tests means proving circuit lower bounds. Comput. Complex., 13(1-2):1–46, 2004. doi:10.1007/s00037-004-0182-6.
  • [15] K. A. Kalorkoti. A lower bound for the formula size of rational functions. SIAM Journal on Computing, 14(3):678–687, 1985. doi:10.1137/0214050.
  • [16] Guillaume Lagarde, Nutan Limaye, and Srikanth Srinivasan. Lower bounds and pit for non-commutative arithmetic circuits with restricted parse trees. computational complexity, 28(3):471–542, September 2019. doi:10.1007/s00037-018-0171-9.
  • [17] Guillaume Lagarde, Guillaume Malod, and Sylvain Perifel. Non-commutative computations: lower bounds and polynomial identity testing. Chicago Journal of Theoretical Computer Science, 2019(2), September 2019. URL: http://cjtcs.cs.uchicago.edu/articles/2019/2/contents.html.
  • [18] Nutan Limaye, Srikanth Srinivasan, and Sébastien Tavenas. Superpolynomial lower bounds against low-depth algebraic circuits. In 62nd IEEE Annual Symposium on Foundations of Computer Science, FOCS 2021, Denver, CO, USA, February 7-10, 2022, pages 804–814. IEEE, 2021. doi:10.1109/FOCS52979.2021.00083.
  • [19] Partha Mukhopadhyay, C. Ramya, and Pratik Shastri. Efficient polynomial identity testing over nonassociative algebras. Electron. Colloquium Comput. Complex., TR25-061, 2025. URL: https://eccc.weizmann.ac.il/report/2025/061.
  • [20] Noam Nisan. Lower bounds for non-commutative computation (extended abstract). In Cris Koutsougeras and Jeffrey Scott Vitter, editors, Proceedings of the 23rd Annual ACM Symposium on Theory of Computing, May 5-8, 1991, New Orleans, Louisiana, USA, pages 410–418. ACM, 1991. doi:10.1145/103418.103462.
  • [21] Avi Wigderson Noam Nisan. Hardness vs randomness. Journal of Computer and System Sciences, 49(2):149–167, 1994. doi:10.1016/S0022-0000(05)80043-1.
  • [22] R. Raz and A. Shpilka. Deterministic polynomial identity testing in non commutative models. In Proceedings. 19th IEEE Annual Conference on Computational Complexity, 2004., pages 215–222, 2004. doi:10.1109/CCC.2004.1313845.
  • [23] Ramprasad Saptharishi and Anamay Tengse. Quasipolynomial Hitting Sets for Circuits with Restricted Parse Trees. In Sumit Ganguly and Paritosh Pandya, editors, 38th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2018), volume 122 of Leibniz International Proceedings in Informatics (LIPIcs), pages 6:1–6:19, Dagstuhl, Germany, 2018. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.FSTTCS.2018.6.
  • [24] Nitin Saxena. Progress on polynomial identity testing – II. CoRR, abs/1401.0976, 2014. arXiv:1401.0976.
  • [25] Jacob T. Schwartz. Fast probabilistic algorithm for verification of polynomial identities. J. ACM., 27(4):701–717, 1980. doi:10.1145/322217.322225.
  • [26] Amir Shpilka and Amir Yehudayoff. Arithmetic circuits: A survey of recent results and open questions. Found. Trends Theor. Comput. Sci., 5(3-4):207–388, 2010. doi:10.1561/0400000039.
  • [27] L. G. Valiant, S. Skyum, S. Berkowitz, and C. Rackoff. Fast parallel computation of polynomials using few processors. SIAM Journal on Computing, 12(4):641–644, 1983. doi:10.1137/0212043.
  • [28] Leslie G. Valiant. On non-linear lower bounds in computational complexity. In Proceedings of the Seventh Annual ACM Symposium on Theory of Computing, STOC ’75, pages 45–53, New York, NY, USA, 1975. Association for Computing Machinery. doi:10.1145/800116.803752.
  • [29] H. Wee and A. Bogdanov. More on noncommutative polynomial identity testing. In Proceedings. Twentieth Annual IEEE Conference on Computational Complexity, pages 92–99, Los Alamitos, CA, USA, June 2005. IEEE Computer Society. doi:10.1109/CCC.2005.13.
  • [30] R. Zippel. Probabilistic algorithms for sparse polynomials. In Proc. of the Int. Sym. on Symbolic and Algebraic Computation, pages 216–226, 1979.