Testing Isomorphism of Boolean Functions over Finite Abelian Groups
Abstract
Let and be Boolean functions over a finite Abelian group , where is fully known and is accessible via queries; that is, given any , we can obtain the value . We study the problem of tolerant isomorphism testing: given parameters and , the goal is to determine, using as few queries as possible, whether there exists an automorphism of such that the fractional Hamming distance between and is at most , or whether for every automorphism , the distance is at least .
We design an efficient tolerant property testing algorithm for this problem over finite Abelian groups with constant exponent. The exponent of a finite group refers to the largest order of any element in the group. The query complexity of our algorithm is polynomial in and , where bounds the spectral norm of the function , and is the tolerance parameter. In addition, we present an improved algorithm in the case where is Fourier sparse, meaning that its Fourier expansion contains only a small number of nonzero coefficients.
Our approach draws on key ideas from Abelian group theory and Fourier analysis, including the annihilator of a subgroup, Pontryagin duality, and a pseudo inner product defined over finite Abelian groups. We believe that these techniques will be useful more broadly in the design of property testing algorithms.
Keywords and phrases:
Analysis of Boolean functions, Abelian groups, Automorphism group, Function isomorphism, Spectral normCategory:
RANDOMFunding:
Arijit Ghosh: A. G. is partially supported by the Science & Engineering Research Board of the DST, India, through the MATRICS grant MTR/2023/001527.Copyright and License:
2012 ACM Subject Classification:
Theory of computation Boolean function learningEditors:
Alina Ene and Eshan ChattopadhyaySeries and Publisher:
Leibniz International Proceedings in Informatics, Schloss Dagstuhl – Leibniz-Zentrum für Informatik
1 Introduction
Let be a finite Abelian group, and let be its dual group, consisting of all characters, that is, homomorphisms from to . The Fourier coefficient for a function corresponding to a character is denoted by 111Note that Fourier coefficients are complex numbers., and the spectral norm of is defined as
For more details refer to Section 2. The spectral norm is a key parameter in the analysis of Boolean functions, with wide-ranging applications in property testing, learning theory, cryptography, pseudorandomness, and quantum computing [43, 38, 46, 28, 44, 39, 13, 42, 27, 41, 45, 4]. Moreover, it plays an important role in understanding the coset complexity of subsets of Abelian groups [17, 31, 32, 15]. We will show that, for the isomorphism testing of Boolean functions over finite Abelian groups, the query complexity is essentially controlled by the spectral norm.
The area of property testing is concerned with determining whether a given object satisfies a fixed property or is “far” from satisfying it, where “far” is typically defined using a suitable distance measure. Over nearly three decades of research, symmetry has played a crucial role in property testing, appearing in various forms.
To illustrate the setup and the role of symmetry, we consider property testing of Boolean functions, which are functions of the form . The fractional Hamming distance between two Boolean functions and on -bit inputs is defined as
that is, the fraction of inputs on which they differ.
Let be the group of all permutations of . For , we define the permuted function by
for all . A fundamental question in this setting is the following.
Question 1 (Function Isomorphism Testing over ).
Given a known Boolean function and query access to an unknown Boolean function , determine if there exists a permutation such that , or for all , is the Hamming distance between and at least , under the promise that one of these is the case?
The above question was first investigated by Fischer et al. [26] and was followed by a long line of work [1, 8, 11, 10, 2, 9].
The domain of Boolean functions discussed so far is the set . It is of great interest, as we discuss later, to study Boolean functions whose domain has some algebraic structure associated with it, like . In these settings, it is natural to study the isomorphism problem for Boolean functions under the group of symmetry of that preserves its underlying algebraic structure.
An extremely important example is that of , that is, functions of the form defined over the vector space . These functions arise in numerous areas of computer science and mathematics, see [40] and the references therein for several examples. A natural group of symmetry for is the group of all non-singular matrices over (see [22, Chapter 3]). We now describe the question of Linear Isomorphism Testing of Boolean Functions over . For , let be the function for all . The Linear Isomorphism Distance between two functions and is defined as
| (1) |
Assume that and satisfy the promise that either or , the question of Linear Isomorphism Testing is that of deciding which is the case.
In this work, we study Boolean functions over a finite Abelian group . The natural symmetries in this setting arise from the automorphism group of , denoted (see Definition 31). For functions , we define their automorphism distance as
where for all . We investigate the following general question.
Question 2 (Testing Isomorphism of Boolean Functions over Finite Abelian Groups).
Let be a finite Abelian group, and let be Boolean functions such that is known and given query access to , determine if and are isomorphic under the automorphism group of (that is, ) or is the automorphism distance between them at least (that is, ), under the promise that one of these is the case?
We now give an equivalent problem in the setting of finite Abelian groups.
Definition 3 (Subset Equivalence Problem).
Given two subsets of a finite Abelian group , does there exist an automorphism such that ?
To formulate a testing version of this problem, we introduce the following definitions. For subsets , the distance between and is defined by
| (2) |
We define the automorphism distance between and as
| (3) |
We assume membership query access to a subset of , meaning that we can query whether any given element of belongs to the subset. The testing version of the Subset Equivalence Problem is formulated below:
Question 4 (Testing Automorphism Distance Between Subsets of Finite Abelian Groups).
Let and be a finite Abelian group. Let be a known subset, and suppose we have membership query access to an unknown subset . Under the promise that either or , the goal is to determine which of the two cases holds.
Question 4 is equivalent to the problem of testing can be viewed as a special case of Boolean function isomorphism testing as follows. Define the indicator function of the set by
Similarly, define for the set . Then Question 4 reduces to testing whether the Boolean functions and are isomorphic under the action of .
Previous works on property testing of Boolean functions over critically exploit the Fourier analysis framework, where the vector space structure of the domain is essential to the proofs. However, since we are working with arbitrary finite Abelian groups, these established approaches that rely on the vector space structure do not apply. As a result, we had to develop new ideas, drawing on key concepts from the theory of finite Abelian groups. We outline some of these ideas below:
-
We have used a notion of “orthogonal” subgroup for a subgroup of a finite Abelian group which is not naturally defined in the context of groups. To address this, we used the concept of annihilator of a subgroup. This concept is described in more detail in Section 3.
-
For any group automorphism and any function , we needed a natural way to associate the Fourier coefficients for the function with the Fourier coefficients for . We use ‘Pontryagin duality’ to deal with such scenario, which is of independent interest. More details can be found in Lemma 34 and Lemma 38 from Section 2.
-
The vector space can be naturally partitioned into cosets of a subspace. This property is essential in approaches like “coset hashing”, which is used in algorithms for property testing of Boolean functions over such domains (see [25, 30, 47]). However, for a finite Abelian group , this partitioning is not generally possible, as may not form a vector space. To address this, we instead use normal subgroups and partition using the cosets of these normal subgroups. For details, see Section 2.
-
We use a new notion of inner product, called pseudo-inner product (see Definition 22) to analyze our algorithms.
-
We also introduce a notion of independence for finite Abelian groups, which we call pseudo-independence (see Definition 32), to analyze our algorithms.
-
Note that the characters of are the 2nd roots of unity, meaning they take the values or at each point in . This property is fundamental to the analysis of Boolean functions over , see, for example, Gopalan et al. [30]. Since is a finite Abelian group, it can be written as , where are primes for all , which may not necessarily be distinct. In the case of , the characters are complex numbers, as they correspond to the -th roots of unity at each point in , where is the exponent of . Observe that . Consequently, there is no natural concept of sign, which we address using a completely different approach. For more details, see [20], which we believe offers independent interest in the study of Boolean functions on more general domains.
1.1 Related work
Fischer et al. [26] were the first to investigate the problem of function isomorphism testing, a line of research that has since been extended by several subsequent works [1, 8, 11]. The problem of characterizing the testability222See the definition of testability from Bhattacharyya et al. [6]. of linearly invariant properties of functions has been a central focus in property testing. This question has seen significant progress through various works [33, 37, 7]. Also, Bhattacharyya et al. [6] provided a characterization of linearly invariant properties that are constant-query testable with one-sided error. Testing linear isomorphism of Boolean functions over was studied by Wimmer and Yoshida [47], whose algorithm has polynomial query complexity in terms of the spectral norm of the functions. Grigorescu, Wimmer and Xie [35] studied the same problem in the communication setting. Linear isomorphism of Boolean functions has also been explored in the context of combinatorial circuit design [16, 5, 48], error-correcting codes [21, 24, 36], and cryptography [18, 14, 23].
1.2 Our results
We study Question 2 in the following setting: the function is known, while the function is unknown. We are promised that either or . Additionally, we assume that the exponent of the finite Abelian group is a constant. For the remainder of the paper, we denote the exponent of by , or simply . Observe that if , then
The goal is to design a randomized algorithm that, with probability at least over its internal randomness, determines which case holds while making as few queries as possible to the unknown function . Each query allows the algorithm to obtain the value for a chosen .
Our results are developed in the context of tolerant testing, specifically in the -tolerant testing model. This generalizes the setting of Question 2, which corresponds to the special case of -tolerant testing.
We give an efficient algorithm for the above problem. The algorithm’s query complexity is polynomial in (independent of ) and the spectral norm (see Definition 20) of the known function.
Theorem 5 (Main Result: -Tolerant Isomorphism Testing of Boolean Functions over Finite Abelian Groups).
Let be a finite Abelian group, with
where each is a prime (not necessarily distinct), and let and . Suppose we are given a known function satisfying , and have query access to an unknown function .
Assuming that the exponent of is constant, there exists a randomized algorithm that decides whether
with probability at least , using queries to , where the notation hides factors that are polynomial in and .
Note that Wimmer and Yoshida [47] proved 333Wimmer and Yoshida claimed an lower bound for the case when and . However, their proof applies only to the special case . Even if their argument can be extended to general values of , the lower bound established by Datta et al. [19] is quadratically stronger. lower bound for the special case of . Recently, Datta et al. [19] have been able to show a lower bound of for the above problem when .
The proof of the above theorem generalizes the work of Wimmer and Yoshida [47], who solved the -tolerant linear isomorphism problem for Boolean functions over . Their testing algorithm and analysis crucially rely on the fact that is a vector space over the field . However, finite Abelian groups do not necessarily have a vector space structure. Due to this, we had to introduce several new ideas and incorporate key concepts from the theory of finite Abelian groups. For more details, see Section 1.3 and Section 1.4.
Finite Abelian groups which are of the form have been used in various works, namely [34, 3]. We give the following two corollaries, which immediately follow from Theorem 5.
Corollary 6.
Let be a finite Abelian group such that can be expressed as where the product takes place -times and itself is a finite Abelian group of constant size. Also, let . Given a known function with , and query access to a unknown function , the query complexity of deciding whether or with probability at least , is , where hides multiplicative factors that are polynomial in and .
More generally we get the following:
Corollary 7.
Let be a finite Abelian group such that can be expressed as where and for all . Also let . Given a known function with , and query access to a unknown function , the query complexity of deciding whether or with probability at least , is , where hides factors that are polynomial in and .
The main technical result we require is the following algorithm to estimate the values of the large Fourier coefficients of , given query access to , without prior knowledge of the coefficients themselves. The set of large Fourier coefficients is defined using a threshold (see Theorem 8). Note that this set is unknown, as the function is not known.
Theorem 8 (Generalized Implicit Sieve for Abelian groups).
Let be a finite Abelian group with constant exponent. Also, let be a threshold and be a set of independently and uniformly chosen random points from . There exists an algorithm, Generalized Implicit Sieve Algorithm (see [20]), that takes and as input, makes queries to the truth table of a Boolean valued function , and returns, with probability at least , a labeled set of examples, and the value of the function at for each , of the form , where is some set that satisfies the following two properties:
-
1.
with then , and
-
2.
, .
The output of this algorithm can be seen as a matrix with entries in powers of , where is a primitive root of unity with being the exponent of .
Remark 9 (Comments on the query complexity in Theorem 8).
Note that the query complexity of the algorithm in Theorem 5 satisfies the following:
-
1.
Query complexity is independent of , and is assumed to be constant, and
-
2.
it is polynomial in , and .
Wimmer and Yoshida [47] proved a special case of the above theorem, which they referred to as the Implicit Sieve Algorithm for functions over and they used for testing linear isomorphism testing. Theorem 8 generalizes the Implicit Sieve algorithm of Wimmer and Yoshida to finite Abelian groups. Note that the Implicit Sieve Algorithm of Wimmer and Yoshida [47] is itself a generalization of the celebrated and widely applicable Goldreich-Levin algorithm [29].
Using Theorem 5 we have the following result for the case of subset isomorphism problem.
Theorem 10.
Let be a finite Abelian group with constant exponent, and . Also let . Given the known set with , and membership query access to an unknown set , the query complexity of deciding whether or with probability at least , is , where hides multiplicative factors polynomial in and .
The above result is part of a broader research program exploring the interplay between the spectral norm of indicator functions and the structure of subsets of finite Abelian groups. In additive combinatorics and additive number theory, the spectral norm serves as a key tool for measuring the non-uniformity or pseudorandomness of functions defined on finite Abelian groups or their vector spaces. Notable breakthroughs in this area include the quantitative version of Cohen’s Idempotent Theorem due to Green and Sanders [32], as well as Chang’s Lemma [12] and its various extensions.
We also prove that for Fourier sparse functions, testing can be performed more efficiently. The proof follows a similar approach to the theorem on tolerant isomorphism testing for Finite Abelian Groups (Theorem 5), with a key observation: when both functions are Fourier -sparse, the number of nonzero Fourier coefficients is at most , which significantly simplifies the learning process in the implicit sieve algorithm (Theorem 8). In particular, we do not need to estimate (see [20]), which is required in the general case.
Theorem 11 (-Tolerant Isomorphism Testing of Sparse Boolean Functions over Finite Abelian Groups).
Let and , and let be a finite Abelian group of constant exponent. Given a known function with sparsity and query access to a unknown -sparse Boolean valued function , the query complexity of deciding whether or with probability at least , is , where notation hides multiplicative factors polynomial in and .
1.3 Proof sketch
We start by giving the ideas behind and a sketch of the proof of our main result, Theorem 5. Throughout this section is assumed to be a finite Abelian group.
Proof sketch of Theorem 5 (Isomorphism Testing for finite Abelian groups).
Given a known function and an unknown function , where either
The goal is to determine which case holds with probability at least . The algorithm has query access to , meaning it can evaluate for any .
-
Our algorithm (see [20]) uses the Generalized Implicit Sieve Algorithm (see [20] and Theorem 8) as a subroutine. Given query access to , random elements and a parameter , the Generalized Implicit Sieve Algorithm returns an matrix which satisfies the following with high probability (ignoring the last column of for simplicity):
-
1.
For some unknown set , the th entry of is . Thus the th column of contains the evaluations of the characters corresponding to on random points in .
-
2.
If then and if satisfies , then .
-
1.
-
Since
for all (see Section 2), the output of the Generalized Implicit Sieve Algorithm can be used to estimate the Fourier coefficients , for , with suitably chosen accuracy and high probability, provided that is large enough. This follows from an application of the Hoeffding bound. However, note that the set remains unknown.
-
We now describe how we use these estimates to construct a function such that for some unknown group automorphism , the correlation between and is large. In order to do this, we need the idea of pseudo-independence over finite Abelian groups (see Definition 32).
-
For any set of elements , if there exists , such that at least one is invertible in , where , and , then we call to be pseudo-dependent (Note that any subset has a pseudo-independent spanning set, see Definition 32). If there does not exist any such ’s, then are pseudo-independent. The idea is, if there exists such with invertible in , then can be written as a combination of the other elements. That is,
(4) where is the inverse of in . Observe that the above definition generalized the notion of linear dependence and independence over vector spaces. Furthermore, whenever we define a group automorphism on the elements , by the property of homomorphism it automatically gets defined on . That is,
Recall that is invertible in and is the inverse of in .
-
To construct we first identify a (without knowing ) such that the elements in are pseudo-independent and is a subset of the subgroup generated by (which can be checked by a brute-force algorithm, see [20]). We prove that such an can be found with high probability. This will allow us to relabel the elements in as and the elements in as a combination of , using Equation (4), for some automorphism of . Relabel the columns of by where such that for all , can be written as
where , and is invertible in . Note that the columns correspond to those in .
-
We will create such that for all , and if where
-
Thus at this point we have constructed that has high correlation with under some unknown group automorphism , with high probability. We show that to decide whether or , it is sufficient to check the correlation between and under all possible group automorphisms on (see [20]) and this can be done without making queries to .
We refer the reader to [20] for the details.
As evident, the Generalized Implicit Sieve Algorithm (see [20]) plays an important role in the proof of our main result.
Proof idea of Theorem 8. (Generalized Implicit Sieve Algorithm).
Before we outline the proof of Theorem 8, let us first explain the goal of the Generalized Implicit Sieve Algorithm (see [20]).
-
The algorithm takes a Boolean valued function as input, where , and are primes, and not necessarily distinct. It is also given a threshold and a set of uniformly random points from , where is sufficiently large. The algorithm considers a randomly permuted coset structure such that the subgroup has codimension in (see Definition 28), where , where . Then (see [20]) is estimated for each bucket with error and confidence . If the estimated weight is , then the algorithm keeps the bucket. Otherwise, it discards the bucket. For each surviving bucket , (see [20]) is estimated with error and confidence . If the estimated weight is , then the algorithm keeps the bucket. Otherwise, it discards the bucket. Then it randomly picks points from , and calculates for all . Note that is the projection operator on functions , which is defined as follows
The Generalized Implicit Sieve Algorithm makes many queries.
We now outline the proof of Theorem 8.
-
The first step in the proof of the theorem is to partition into cosets of a random subgroup. Since is Abelian, all its subgroups are normal. Define a random subgroup by sampling independently and uniformly from and using the pseudo-inner product operator on to obtain
By Definition 22 and Definition 24, forms a subgroup of . Its cosets have the form
where . We refer to the cosets of as “buckets”.
-
We show that with high probability, all the big Fourier coefficients, that is, the coefficients with weight belong to different buckets (see [20]).
-
Moreover, we show that the weight of a bucket is determined by the big coefficient contained in with high probability, assuming that the big coefficients are in different buckets with high probability. We use the second moment method to show this. Let for each ,
And,
Also, let
And,
The case (see [20]) is problematic, as the in this case and hence finding an upper bound for becomes difficult using Chebyshev. We use random shift (see [20]) to avoid this, and study case by case to show that . This gives us an upper bound on the variance of , which in turn helps us to show that the weight of a bucket is determined by the big coefficient contained in with high probability. This implies that with high probability, the Fourier coefficients other than the big coefficient does not contribute much to the bucket .
-
We then show that the algorithm does not discard any bucket with , but it discards any bucket with , for all . Furthermore, we establish that for every bucket (where is the dominating element of ) among those that the algorithm has not discarded.
-
Additionally, we show that the small weight coefficients do not contribute much to the weight of a bucket. That is, we show that is very small, where is the dominating Fourier coefficient of the bucket .
-
Finally, our target is to output a matrix (see [20]) with a small error, whose entries are characters evaluated at the points , where are picked independently and uniformly at random. To show that, we pick independently and uniformly at random, and then prove that the distance between and is with high probability. Then we construct a matrix (see [20]), and estimate the Fourier coefficients for all the large buckets. We then show that, up to some small error, the algorithm outputs the matrix (see [20]) whose entries are given by , , where denotes the number of survived buckets.
1.4 Challenges with finite Abelian Groups
We outline the main challenges encountered in proving our results for finite Abelian groups . Recall that can be written as , where are primes, and not necessarily distinct.
-
While estimating and , it is required to find for a subgroup of . But due to the lack of vector space structure, cannot be defined in terms of “basis”, which is possible when , as is a vector space. This problem had to be taken care of in a different way. Given a subgroup of , we define by
where is a pseudo inner product defined by
and . It is to be noted that is also a subgroup of .
This is extremely useful in proving the fact that, given a bucket , and can be written as an average of some quantity, which in turn helps to reduce the query complexity of and estimation. More precisely, it follows that,
and
respectively (see [20] for more details). Applying a concentration inequality the query complexity becomes dependent on and only, where and are as defined in Theorem 8, and it is not dependent on the order of the group .
-
To prove our main theorem, we also need to show that, for any automorphism and any function , the Fourier coefficients of are same as the Fourier coefficients of upto some permutation. In case of , it was quite easy, as is a vector space. As an Abelian group is not a vector space in general, we needed to use Pontryagin duality and dual automorphisms. For more details, see Lemma 34 and Lemma 38 in Section 2.
-
While testing isomorphism, the notion of linear independence is required. But when there is no vector space structure, linear independence does not make any sense. A different notion of “independence” needed to be defined in order to tackle this problem.
For any set of elements , if there exists , with at least one an unit in (that is, is invertible in ), , such that , then we call to be dependent. If there does not exist any such ’s, then are independent. The idea is, if there exists such with an unit, then can be written as a combination of the other elements. That is,
So, whenever we define a group automorphism on the elements , by the property of homomorphism it automatically gets defined on . This plays an important role in the Algorithm (see [20] for more details).
-
We know that the characters of a Boolean function from to takes values or at each point of . So, to determine the dominating character in a bucket at a point with high probability, determining the sign of is sufficient, where being the dominating character of the bucket .
But in our case, the characters of a finite Abelian group are complex-valued at each point of . So sign does not make any sense here. The problem needed to be tackled differently. We first calculate , and then we show that is small with high probability, which helps us to understand the dominating character in the bucket at the point . For details see [20].
2 Background on Finite Abelian Groups
Throughout this paper, denotes a finite Abelian group , where are primes for all and may not be distinct, and denotes a primitive root of unity, where .
Let us define the characters of first.
Definition 12 (Character).
For , where are primes, a character of the group is a homomorphism of , that is, satisfies the following: for all we have .
Equivalently, a character of is of the form
where and is a character of and is defined by
Thus for any we can define a corresponding character of as that on input is defined as
| (5) | ||||
| (6) |
where .
Now let us look at some properties of characters.
Lemma 13.
Let be a character of . Then,
-
1.
for all .
-
2.
for all .
-
3.
For any character of , where , .
-
4.
for all .
Now let us define the dual group of .
Definition 14 (Dual group).
The set of characters of forms a group under the operation and is denoted by , where and are characters of . is called the dual group of .
The following theorem states that is isomorphic to its dual group.
Theorem 15.
, that is and are isomorphic to each other.
Let us look at the definition of Fourier transform for functions on .
Definition 16 (Fourier transform).
For any , with primes, and any function , the Fourier transform is
where .
Remark 17.
The Fourier transform of a function is defined by
where is the conjugate of . The Definition 16 follows from this, as for some .
The following theorem states that any function from to can be written as a linear combination of characters of .
Theorem 18 (Fourier inversion formula).
Any function can be uniquely written as a linear combination of characters of , that is,
| (7) |
where .
Theorem 19 (Parseval).
For any two functions ,
More specifically, if is a Boolean-valued function then
Now let us define the Fourier sparsity of a function on .
Definition 20 (Fourier Spectral Norm).
The Fourier Spectral Norm or the Spectral norm of , denoted by is defined as the sum of the absolute value of its Fourier coefficients. That is,
Definition 21 (Sparsity and Fourier Support).
-
Fourier support of a function denotes the set .
-
The Fourier sparsity of a function is defined to be the number of non-zero Fourier coefficients in the Fourier expansion of (Theorem 18). Alternately, Fourier sparsity can be defined as the size of the Fourier support. In this paper, by sparsity of a function, we mean the Fourier sparsity of the function. Moreover, by -sparse function we mean functions with Fourier Sparsity .
We know that since is also a vector space over the field , it has a linear algebraic structure. The characters are in one-to-one correspondence with -linear forms. However, since a general Abelian group is not a vector space, these do not hold here. But one can define something along similar lines.
An element of is of the form , where is an element of .
Definition 22 (Pseudo inner product).
For we denote by the following pseudo inner product.
where .
Observation 23.
.
Now, we partition with the help of a normal subgroup.
Definition 24.
Let such that , where for all and . Let , where . We define the set by
| (8) |
That is,
If then we use to denote .
Remark 25.
When , then , and we have only one element , so this set becomes .
Lemma 26.
is a normal subgroup of and for any either is a coset of or .
Proof.
Clearly, , where is the identity element of . Let . Then, since for all , so . So is a subgroup of , and hence a normal subgroup of since is Abelian.
Since is a normal subgroup of we can now consider its cosets. For each coset of , let be a fixed coset representative (we choose a coset representative and fix it all through the proof). Then, if , then , where . Now, for each ,
since for all . So, is fixed for each coset . If we assume for each , then we have as a coset of , where .
If for a , there does not exist any such that , .
Remark 27.
Note that since is an Abelian group, any subgroup of is a normal subgroup of .
Definition 28 (Codimension).
Definition 29 (Random coset structure).
Let us consider , which are chosen independently and uniformly at random from . Also let . So is a subgroup, hence a normal subgroup of . Then, we define the sets by , for all .
Remark 30.
Observe that the nonempty are cosets of . We will often refer to them as buckets.
Definition 31.
Let be a group, with group operation . A group automorphism on is a bijective function which satisfies the following.
The set of all automorphisms of forms a group under the composition of functions and is denoted by .
Definition 32.
Let be elements in . We call to be dependent if there exists with at least one invertible in such that .
If there does not exist any such with at least one invertible in such that , then we call to be independent.
For example, consider the group . The element is dependent on the element , but it is independent of the element . Whereas, is dependent on , as . So the set is dependent.
Lemma 33 (Hoeffding’s Inequality).
Let be real independent random variables, each taking value in [-1, 1]. Then
The following structural result about an Abelian group and its dual will play a key role in our analysis. For a first reading, the proof of this lemma may be skipped without affecting the readability of the rest of the paper.
Lemma 34.
Let be a map from to . Let us define a map by . Also, let us define another map by . Then is an automorphism if and only if is an automorphism if and only if is an automorphism.
Proof.
- Proof of the part [ is an automorphism if and only if is an automorphism]
-
- When is an automorphism.
-
First let us show that is also a homomorphism. Observe
which shows that is indeed a homomorphism.
To show injectivity, let . Then,
where the equality in the second last line holds because is an automorphism. Since is the identity element of , so is injective.
Since the domain and the range of are same, so is bijective, and hence, it is an automorphism on .
- When is an automorphism.
-
To show that is a homomorphism, we observe that, for all ,
Therefore, , hence is a homomorphism.
Now let us show that is injective. To do that, let . Then,
which is only possible if , since is an automorphism and maps characters to characters. So, is injective.
Since the domain and the range of are same, so is bijective, and hence, is an automorphism.
- Proof of the part [ is an automorphism if and only if is an automorphism]
-
- When is an automorphism.
-
Then, for each ,
which implies that for all . So is a homomorphism.
Now, let . Then, for all ,
Since is an automorphism, so is an automorphism by the first part of the proof, therefore for all , where . So , hence is injective.
Since the domain and the range of is same, so is bijective, and hence, it is an automorphism.
- When is an automorphism.
-
Then, for each ,
which shows that is a homomorphism.
Now, let for all . Then, for all ,
since is an automorphism. Therefore, is injective.
Since the domain and the range of is same, so is bijective. Hence, is an automorphism.
Definition 35 (Boolean function isomorphism).
Let be Boolean valued functions. Then is isomorphic to if there exists an automorphism on such that .
Definition 36 (Automorphism distance).
Let be Boolean valued functions. The automorphism distance between and is defined by
where is the fractional Hamming distance between and .
Definition 37 (-close and -far from isomorphic).
Let be two Boolean valued functions. Then is said to be -close (-far) from being isomorphic to if (). That is, is -close to being isomorphic to if there exists an automorphism on such that ; and is -far from being isomorphic to if for all automorphism on , .
Lemma 38.
For any automorphism , we have
Proof.
3 The subgroup
Throughout this section, denotes the finite Abelian group , where are primes for all and not necessarily distinct, denotes the subgroup generated by , and denotes a primitive root of unity and . Let be a subgroup of .
Let us look at the definition of .
Definition 39 (Definition 1).
Let be a subgroup of . Then is the subgroup given by
where
and .
Remark 40.
Observe that is also a subgroup of .
Claim 41.
For ,
where is a primitive root of unity of order , and denotes the order of the subgroup .
Also, for ,
Proof.
- Case 1: When .
-
Then for all . Hence
- Case 2: When .
We need the following isomorphism result:
Lemma 42.
is isomorphic to the quotient group .
Proof.
We will show that is isomorphic to , which implies that is isomorphic to the quotient group , as for any group .
The set of characters of is given by
where is known as the annihilator of the subgroup in . From Definition 39, observe that for , if and only if .
Let us define a group homomorphism by , where is the quotient is the quotient group homomorphism defined by .
-
( is injective) Let such that , where is the identity element of . So, for all , which implies is the identity element of . Therefore, is injective.
-
( is surjective) Let . Let by for all . Since , so any character of is a character of if for all (as then, the value of will be determined only by the coset representatives). Since and is the identity element of , so is a character of . Also, . Therefore, . Hence, is surjective.
Therefore, is an isomorphism, which implies that is isomorphic to the quotient group .
Corollary 43.
.
Proof.
Follows from the fact that , since is isomorphic to the quotient group by Lemma 42, and by Lagrange’s theorem.
References
- [1] Noga Alon and Eric Blais. Testing Boolean Function Isomorphism. In Proceedings of the 14th International Workshop on Randomization and Computation, RANDOM, pages 394–405, 2010. doi:10.1007/978-3-642-15369-3_30.
- [2] Noga Alon, Eric Blais, Sourav Chakraborty, David García-Soriano, and Arie Matsliah. Nearly tight bounds for testing function isomorphism. SIAM J. Comput., 42(2):459–493, 2013. doi:10.1137/110832677.
- [3] Prashanth Amireddy, Amik Raj Behera, Manaswi Paraashar, Srikanth Srinivasan, and Madhu Sudan. Local correction of linear functions over the boolean cube. In Proceedings of the 56th Annual ACM Symposium on Theory of Computing, pages 764–775, 2024. doi:10.1145/3618260.3649746.
- [4] Nikhil Bansal and Makrand Sinha. k-Forrelation Optimally Separates Quantum and Classical Query Complexity. In Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing, STOC, pages 1303–1316, 2021. doi:10.1145/3406325.3451040.
- [5] A. Bemporad. Efficient Conversion of Mixed Logical Dynamical Systems Into an Equivalent Piecewise Affine Form. IEEE Transactions on Automatic Control, 49(5):832–838, 2004. doi:10.1109/TAC.2004.828315.
- [6] Arnab Bhattacharyya, Eldar Fischer, Hamed Hatami, Pooya Hatami, and Shachar Lovett. Every locally characterized affine-invariant property is testable. In Proceedings of the 45th ACM Symposium on Theory of Computing, STOC, pages 429–436, 2013. doi:10.1145/2488608.2488662.
- [7] Arnab Bhattacharyya, Elena Grigorescu, and Asaf Shapira. A Unified Framework for Testing Linear-Invariant Properties. Random Struct. Algorithms, 46(2):232–260, 2015. doi:10.1002/RSA.20507.
- [8] Eric Blais and Ryan O’Donnell. Lower Bounds for Testing Function Isomorphism. In Proceedings of the 25th Annual IEEE Conference on Computational Complexity, CCC, pages 235–246, 2010. doi:10.1109/CCC.2010.30.
- [9] Eric Blais, Amit Weinstein, and Yuichi Yoshida. Partially symmetric functions are efficiently isomorphism testable. SIAM J. Comput., 44(2):411–432, 2015. doi:10.1137/140971877.
- [10] Sourav Chakraborty, Eldar Fischer, David García-Soriano, and Arie Matsliah. Junto-symmetric functions, hypergraph isomorphism and crunching. In Proceedings of the 27th Conference on Computational Complexity, CCC 2012, Porto, Portugal, June 26-29, 2012, pages 148–158. IEEE Computer Society, 2012. doi:10.1109/CCC.2012.28.
- [11] Sourav Chakraborty, David García-Soriano, and Arie Matsliah. Nearly tight bounds for testing function isomorphism. In Proceedings of the 22nd Annual ACM-SIAM Symposium on Discrete Algorithms, SODA, pages 1683–1702, 2011. doi:10.1137/1.9781611973082.130.
- [12] Mei-Chu Chang. A polynomial bound in Freiman’s theorem. Duke Mathematical Journal, 113(3):399–419, 2002.
- [13] Eshan Chattopadhyay, Pooya Hatami, Shachar Lovett, and Avishay Tal. Pseudorandom Generators from the Second Fourier Level and Applications to AC0 with Parity Gates. In Proceedings of the 10th Innovations in Theoretical Computer Science Conference, ITCS, volume 124, pages 22:1–22:15, 2019. doi:10.4230/LIPIcs.ITCS.2019.22.
- [14] Jung Hee Cheon, Hyunsook Hong, Joohee Lee, and Jooyoung Lee. An efficient affine equivalence algorithm for multiple s-boxes and a structured affine layer. In International Conference on Selected Areas in Cryptography, pages 299–316, 2016. doi:10.1007/978-3-319-69453-5_17.
- [15] Tsun-Ming Cheung, Hamed Hatami, Rosie Zhao, and Itai Zilberstein. Boolean functions with small approximate spectral norm. Discrete Analysis, to appear, 2022.
- [16] V. Ciriani. Synthesis of SPP three-level logic networks using affine spaces. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 22(10):1310–1323, 2003. doi:10.1109/TCAD.2003.818121.
- [17] Paul J. Cohen. On a Conjecture of Littlewood and Idempotent Measures. American Journal of Mathematics, 82(2):191–212, 1960.
- [18] Lingguo Cui and Yuanda Cao. A new S-box structure named Affine-Power-Affine. International Journal of Innovative Computing, Information and Control, 3(3):751–759, 2007.
- [19] Swarnalipa Datta, Arijit Ghosh, Chandrima Kayal, Manaswi Paraashar, and Manmatha Roy. Spectral norm, economical sieve, and linear invariance testing of boolean functions, 2025.
- [20] Swarnalipa Datta, Arijit Ghosh, Chandrima Kayal, Manaswi Paraashar, and Manmatha Roy. Testing isomorphism of boolean functions over finite abelian groups, 2025. arXiv:2507.07654.
- [21] S. Dautovic and L. Novak. A comment on “Boolean functions classification via fixed polarity Reed-Muller form”. IEEE Transactions on Computers, 55(8):1067–1069, 2006. doi:10.1109/TC.2006.114.
- [22] David Steven Dummit and Richard M Foote. Abstract Algebra, volume 3. Wiley Hoboken, 2004.
- [23] Orr Dunkelman, Nathan Keller, and Adi Shamir. Minimalism in cryptography: The even-mansour scheme revisited. In Advances in Cryptology – EUROCRYPT 2012: 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings 31, pages 336–354, 2012. doi:10.1007/978-3-642-29011-4_21.
- [24] I. M. Duursma, C. Rentería, and H. Tapia-Recillas. Reed-muller codes on complete intersections. Applicable Algebra in Engineering, Communication and Computing, 11(6):455–462, 2001. doi:10.1007/S002000000047.
- [25] Vitaly Feldman, Parikshit Gopalan, Subhash Khot, and Ashok Kumar Ponnuswami. New Results for Learning Noisy Parities and Halfspaces. In Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science, FOCS, pages 563–574, 2006. doi:10.1109/FOCS.2006.51.
- [26] Eldar Fischer, Guy Kindler, Dana Ron, Shmuel Safra, and Alex Samorodnitsky. Testing Juntas. J. Comput. Syst. Sci., 68(4):753–787, 2004. doi:10.1016/J.JCSS.2003.11.004.
- [27] Michael A. Forbes and Zander Kelley. Pseudorandom Generators for Read-Once Branching Programs, in Any Order. In 59th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2018, Paris, France, October 7-9, 2018, pages 946–955, 2018. doi:10.1109/FOCS.2018.00093.
- [28] Uma Girish, Avishay Tal, and Kewen Wu. Fourier Growth of Parity Decision Trees. In Proceedings of the 36th Computational Complexity Conference, CCC, volume 200, pages 39:1–39:36, 2021. doi:10.4230/LIPIcs.CCC.2021.39.
- [29] Oded Goldreich and Leonid A Levin. A hard-core predicate for all one-way functions. In Proceedings of the twenty-first annual ACM symposium on Theory of computing, pages 25–32, 1989. doi:10.1145/73007.73010.
- [30] Parikshit Gopalan, Ryan O’Donnell, Rocco A Servedio, Amir Shpilka, and Karl Wimmer. Testing fourier dimensionality and sparsity. SIAM Journal on Computing, 40(4):1075–1100, 2011. doi:10.1137/100785429.
- [31] Ben Green and Tom Sanders. Boolean functions with small spectral norm. Geometric and Functional Analysis, 18:144–162, 2008.
- [32] Ben Green and Tom Sanders. A quantitative version of the idempotent theorem in harmonic analysis. Annals of Mathematics, 168(3):1025–1054, 2008.
- [33] Elena Grigorescu, Tali Kaufman, and Madhu Sudan. 2-Transitivity Is Insufficient for Local Testability. In Proceedings of the 23rd Annual IEEE Conference on Computational Complexity, CCC, pages 259–267, 2008. doi:10.1109/CCC.2008.31.
- [34] Elena Grigorescu, Swastik Kopparty, and Madhu Sudan. Local decoding and testing for homomorphisms. In International Workshop on Approximation Algorithms for Combinatorial Optimization, pages 375–385. Springer, 2006. doi:10.1007/11830924_35.
- [35] Elena Grigorescu, Karl Wimmer, and Ning Xie. Tight Lower Bounds for Testing Linear Isomorphism. In Proceedings of the 17th International Workshop on Randomization and Computation, RANDOM, pages 559–574, 2013. doi:10.1007/978-3-642-40328-6_39.
- [36] Xiang-Dong Hou. Classification of cosets of the Reed-Muller code R(m-3,m). Discrete Mathematics, 128(1):203–224, 1994. doi:10.1016/0012-365X(94)90113-9.
- [37] Tali Kaufman and Madhu Sudan. Algebraic Property Testing: The Role of Invariance. In Proceedings of the 40th Annual ACM Symposium on Theory of Computing, STOC, pages 403–412, 2008. doi:10.1145/1374376.1374434.
- [38] Eyal Kushilevitz and Yishay Mansour. Learning Decision Trees Using the Fourier Spectrum. SIAM J. Comput., 22(6), 1993. doi:10.1137/0222080.
- [39] Raghu Meka, Omer Reingold, and Avishay Tal. Pseudorandom generators for width-3 branching programs. In Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, STOC, pages 626–637, 2019. doi:10.1145/3313276.3316319.
- [40] Ryan O’Donnell. Analysis of Boolean Functions. Cambridge University Press, 2014.
- [41] Ran Raz and Avishay Tal. Oracle Separation of BQP and PH. Journal of the ACM, 69(4):30:1–30:21, 2022. doi:10.1145/3530258.
- [42] Omer Reingold, Thomas Steinke, and Salil P. Vadhan. Pseudorandomness for Regular Branching Programs via Fourier Analysis. In Proceedings of the 17th International Workshop on Randomization and Computation, RANDOM, pages 655–670, 2013. doi:10.1007/978-3-642-40328-6_45.
- [43] Amir Shpilka, Avishay Tal, and Ben lee Volk. On the Structure of Boolean Functions with Small Spectral Norm. Comput. Complex., 26(1), 2017. doi:10.1007/S00037-015-0110-Y.
- [44] Avishay Tal. Tight Bounds on the Fourier Spectrum of AC0. In Proceedings of the 32nd Computational Complexity Conference, CCC, volume 79, pages 15:1–15:31, 2017. doi:10.4230/LIPIcs.CCC.2017.15.
- [45] Avishay Tal. Towards Optimal Separations between Quantum and Randomized Query Complexities. In 61st IEEE Annual Symposium on Foundations of Computer Science, FOCS 2020, Durham, NC, USA, November 16-19, 2020, pages 228–239, 2020. doi:10.1109/FOCS46700.2020.00030.
- [46] Hing Yin Tsang, Chung Hoi Wong, Ning Xie, and Shengyu Zhang. Fourier Sparsity, Spectral Norm, and the Log-Rank Conjecture. In Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science, FOCS, pages 658–667, 2013. doi:10.1109/FOCS.2013.76.
- [47] Karl Wimmer and Yuichi Yoshida. Testing Linear-Invariant Function Isomorphism. In Proceedings of the 40th International Colloquium on Automata, Languages and Programming, ICALP, volume 7965, pages 840–850, 2013. doi:10.1007/978-3-642-39206-1_71.
- [48] Boyan Yordanov, Jana Tumova, Ivana Cerna, Jiří Barnat, and Calin Belta. Temporal Logic Control of Discrete-Time Piecewise Affine Systems. IEEE Transactions on Automatic Control, 57(6):1491–1504, 2012. doi:10.1109/TAC.2011.2178328.
