Optimal Query Sets for Generic Automorphism Detection Chad Brewbaker Department of Electrical and Computer Engineering Iowa State University Ames, IA 50010 [email protected] November 19, 2007

Abstract Given a combinatorial object on n elements we classify the minimum set of permutations that need to be tested in order to detect a nontrivial automorphism, or prove that none exist. We show they have size n X

bnc

p X

p∈P RIM ES i=1

pi i!(p

n! . − ip)!(p − 1)

For problem sizes as small as n = 8 an optimal query set can reduce the search space by 90% compared to brute force permutation testing. This size of this set demonstrates that the Hidden Subgroup Problem (HSP) has no tractable solution for arbitrary groups, and domain knowledge of the underlying combinatorial object is required for faster algorithms.

1

1

Background and Context

For the past few decades bounds on isomorphism an automorphism algorithms have been a central area of theoretical computer science research. Problems such as graph isomorphism (GI) and graph automorphim (GA)are not known to be NP-complete, however no polynomial time algorithms are known either, making them prime candidates to separate the classes P and NP. Further evidence such as having relatively easy counting complexity [8] is further proof that these problems might someday prove to be a keystone between tractable and untractable problems. With the advent of Shor’s quantum factoring algorithm [18] the there is also recent interest in attempts to abstract the result to find arbitrary hidden subgroups efficiently. In this paper we prove the best possible runtime for automorphism detection on a combinatorial object where no assumptions are made about it’s underlying structure. This both gives an upper bound on the runtime of automorphism computations and shows that the problem of finding hidden subgroups using only an oracle is intractable. For the group theorist our minimal detection sets are “trivally” single elements of the Abellian prime order subgroups of the symmetric group. However to date no enumeration of this set has appeared in the literature, and we have not been able to find a full description of the permutation structure which is critical from an algorithmic prospective. We pose the following problem. Problem 1 (Oracle Automorphism Detection). Given a combinatorial object on n elements, and an oracle to accept or reject whether a given permutation of the combinatorial object is an automorphism, what is the minimal set of queries needed to detect a non-trivial automorphism or show that none exist? Note that by “automorphism” we mean a permutation of the combinatorial object that leaves it structuraly unchanged, and by “non-trivial” we mean solutions not involving the identity permutation. For graphs and hypergraphs the best known algorithms are due to Babai and Luks. In [6] √ it was shown that graph isomorphism and automorphism are in O(exp(c nlogn)). Furthermore, in [14] it was shown that hypergraph isomorphism and automorphism are in O(cn ). This topic was been touched upon from a graph isomorphism setting in [1, 10, 15]. They used permutations composed of concatenated 2 and 3 2

cycles to generate asymptotic bounds. The harder problem of using an oracle to construct a complete generating set of the automorphism group was discussed from a computational learning theory perspective in Vindochandran’s thesis[19]. This work should not be confused with research on “black box group algorithms” pioneered by Szemeredi and Babai [3][7][20]. In their formulation one is presented with a generating set of some group, while in our case no such information is given.

2

Terminology

Before proceding we outline our terminology. The framework for our proof will be based on a graph optimization problem. Definition 1 (MIN-DOMINATING-SET). A MIN-DOMINATING-SET is the smallest set D ⊆ V of verticies in a graph such that for each vertex v ∈ V , either v ∈ D or there is a (directed) edge from a vertex in D to v. Also, we will use a special relation between two permutations where having one implies the presence of the other. Definition 2 (Detection). We say that a permutation πi detects permutation πj if πi ∈ (πj )n for some natural number n, i.e. πi is in the cyclic group generated by πj . Thus, if πj is present in a group then πi will also be present. Using the detection relation we can form a useful graph. Definition 3 (Detection Graph of Sn ). Let Gn be a directed graph (without loops) whose vertices are labeled with a bijective mapping of the n! permutations of the symmetric group on n elements. Let πi be the permutation label of vertex i, and πj be the permutation label of vertex j. Place and edge from πi to πj if πi detects πj . Note that any MIN-DOMINATING-SET for the detection graph of Sn provides the minimum set of permutations needed to perform oracle automorphism detection. In the general case MIN-DOMINATING-SET is NP-hard [9]. For those studying MIN-DOMINATING-SET problems Niedemeier’s text[17] is useful as it contains polynomial time pre-processing algorithms to simplify the 3

Figure 1: The detection graph for S3 , the set of permutations on 3 elements ??

search. Also, of note is that this graph seems to exhibit exponential runtime behavior with NAUTY[16] version 2.2.

3

Structure of the Minimal Detection Sets

We would now like to show which sets of permutations form a MIN-DOMINATINGSET in our detection graph. Let Sn be the n! permutations for a set of n elements. Given an oracle that tells us if a permutation is in our hidden automorphism subgroup Hn ∈ Sn we would like to construct an efficent testing procedure to detect the non-trivial permutations in Hn . The following permutations will be of interest. Definition 4 (Concatinated Prime Cycle Permutation (CPCP)). A permutation composed of 1 or more prime length cycles, all disjoint, and all of the same size. Lemma 1. Only CPCPs detect CPCPs. Proof. Since the cyclic group of a CPCP only contains CPCPs nothing else can detect them. Lemma 2. Every permutation is detected by a CPCP. Proof. Let n be the size of the cyclic group of a given permutation π. If the permutation is a CPCP, then by the previous lemma we are done. If the cycle is not a CPCP then we can extract a CPCP that detects it by setting taking the element π i , where i is constructed by multiplying all but one prime of the factors of n together. The number i will be modulo zero for every one of its divisors except the prime we have left out, so all other cycles will go to the identity and we will have extracted a CPCP.

4

From the previous two lemmas we can derive the following following theorem. Theorem 1. A minimal detection set for Sn consists of one element from each CPCP’s cyclic group.

4

Enumeration of the Minimal Detection Sets

We now count the number of elements in the minimum detection set for Sn . The sum over all repeated prime cycles that can fit into the number n is bnc

n X

p X

.

p∈P RIM ES i=1

Now over-count and take all permutations of n composed of i disjoint p cycles. n! − ip)!

pi i!(p

Finally, we only want one element for each cyclic group generated by a CPCP. If the cycle has p elements then it will have period p, however we are not adding the identity permutation, so multiply by 1 . p−1 This gives us a total of n X

bnc

p X

p∈P RIM ES i=1

n! 1 . pi i!(p − ip)! p − 1

By collapsing the denominators we get the following theorem. Theorem 2 (Minimal Detection Set Enumeration). The size of a minimal query set for generic automorphism detection in Sn is n X

bnc

p X

p∈P RIM ES i=1

pi i!(p

5

n! . − ip)!(p − 1)

5

Conclusion

The minimum query set can yield significant savings over checking all n! − 1 permutations. This is illustrated in Table 1.

n 3 4 5 6 7 8 9 10 11 12 13

Table 1: Savings for small n Percent Reduction Total Savings 20.0% 1 43.4782608695652% 10 65.546218487395% 78 78.9986091794159% 568 87.060924786664% 4387 93.3654108484834% 37644 97.084703165518% 352300 98.3721611475312% 3569728 98.2174522561291% 39205263 98.7097523238122% 472821292 98.7693990838716% 6150391024

For problem sizes as small as n = 8 there is a 90% reduction in the number of queries required. Even though minimal the minimal query sets are O(n!), their use can achieve significant improvement for tractable problem sizes over brute force testing. The size of the minimal detection sets for n = 1, ..., 19 have sizes {0, 1, 4, 13, 41, 151, 652, 2675, 10579, 59071, 711536, 6180307, 76629775, 873676259, 7496233396, 49493077951, 1571673343007, 24729597043375, 584039297226784}. The size of the minimal detection sets are asymptotically O(n)!. For prime n one element the n cycles must be checked is making the set larger than size (n − 2)!. This demonstrates that hidden subgroup detection is not tractable without additional structural knowledge of the combinatorial object under consideration.

6

Acknowledgements

We would like to thank Johnathan D.H. Smith and Pavan Aduri for our useful discussions. Funding for this research was provided by US Dept. of Education GAANN fellowship. 6

References [1] V. Arvind and Piyush P. Kurur. Graph isomorphism is in spp. Information and Computation, 204:835–852, 2006. [2] V. Arvind and N. V. Vindochandran. The complexity of groupdefineable np languages. Theoretical Computer Science, 242:199–218, 2000. [3] V. Arvind and N. V. Vinodchandran. Solvable black-box group problems are low for pp. Theoretical Computer Science, 180:17–47, 1997. [4] Lazlo Babai. On the length of subgroup chains in the symmetric group. Comm. in Alg, 14:1729–1736, 1986. [5] Lazlo Babai, S. Kannan, and Eugene M. Luks. Computational complexity and the clasification of finite simple groups. Proc. 24th FOCS, pages 162–171, 1983. [6] Lazlo Babai and Eugene M. Luks. Canonical labeling of graphs. STOC, pages 171–183, 1983. [7] Lazlo Babai and Endre Szemeredi. On the complexity of matrix group problems. IEEE FOCS, 1984. [8] Robert Beals, Richard Chang, William Gasarch, and Jacbo Toran. On finding the number of graph automorphisms. Chicago Journal of Theoretical Computer Science, 1, February 1999. [9] M. Garey and D. Johnson. Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman, 1979. [10] Pettri Kaski and Patric R. J. Ostergard. Classification Algorithms for Codes and Designs. Springer, 2006. [11] Antoni Lozano and Vijay Raghavan. On the complexity of counting the number of vertices moved by graph automorphisms. LNCS, 1530:295– 306, 1998. [12] Anna Lubiw. Some np-complete problems similar to graph isomorphism. SIAM Journal on Computing, 10:11–21, 1981. [13] Eugene M. Luks. Permutation groups and polynomial-time computation. Groups and Computation, pages 139–175, 1991. 7

[14] Eugene M. Luks. Hypergraph isomorphism and structural equivalence of boolean functions. STOC, pages 652–658, 1999. [15] Ka Leung Ma. In Solving the Dominating Set Problem: Group Theory Approach. PhD thesis, Concordia University of Montreal, 1998. [16] Brendan McKay. Practical graph isomorphism. Congressus Numerantium, pages 45–87, 1981. [17] Rolf Niedermeier. Invitation to Fixed Parameter Algorithms. Oxford University Press, 2006. [18] Peter W. Shor. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing, 16(5):1484–1509, 1997. [19] N. V. Vinodchandran. Counting Complexity and Computational Group Theory. PhD thesis, Institute of Mathematical Sciences, Chennai, India, 1999. [20] N. V. Vinodchandran. Counting complexity of solvable black-box group problems. SIAM Journal on Computing, 33(4):852–869, 2004.

8

Optimal Query Sets for Generic Automorphism Detection

Nov 19, 2007 - For the group theorist our minimal detection sets are “trivally” single ... v ∈ V , either v ∈ D or there is a (directed) edge from a vertex in D to v.

116KB Sizes 0 Downloads 128 Views

Recommend Documents

Video Query Reformulation for Near-Duplicate Detection
video detection approach based on video query reformulation to expedite the video subsequence search process. The proposed video query reformulation ...

A Query-Dependent Duplication Detection Approach for ...
duplicate detection is a crucial technique for search engines. “Duplicate .... Several optimization techniques have been proposed to reduce the number of.

A Query-Dependent Duplication Detection Approach for ...
Duplication of Web pages greatly hurts the perceived rele- vance of a search .... and storage space will be needed, making these algorithms only feasible for a ... We investigate a log file provided by MSN 1, which contains 32, 183, 256 queries.

Optimal Detection of Heterogeneous and ... - Semantic Scholar
Oct 28, 2010 - where ¯Φ = 1 − Φ is the survival function of N(0,1). Second, sort the .... (β;σ) is a function of β and ...... When σ ≥ 1, the exponent is a convex.

Optimal Sampling for State Change Detection with ...
Feb 17, 2009 - Best-Effort traffic ... vacations with application to IEEE 802.16e power saving mechanism, ... We consider different strategies of power saving, and derive ..... Introduced a model for control of vacation taking into account the.

On efficient k-optimal-location-selection query ...
a College of Computer Science, Zhejiang University, Hangzhou, China ... (kOLS) query returns top-k optimal locations in DB that are located outside R. Note that ...

On efficient k-optimal-location-selection query ... - Semantic Scholar
Dec 3, 2014 - c School of Information Systems, Singapore Management University, ..... It is worth noting that, all the above works are different from ours in that (i) .... develop DBSimJoin, a physical similarity join database operator for ...

Anomaly Detection via Optimal Symbolic Observation of ...
Condition monitoring and anomaly detection are essential for the prevention of cascading ..... no false alarm, and no missed detection of special events (such as ...

Novel Techniques for Automorphism Group Computation
This is also reflected in a reduction of the running time, which is substantial .... time, the execution time of conauto-2.03 does not become superpolynomial. Fur-.

Exploiting Query Logs for Cross-Lingual Query ...
General Terms: Algorithms, Performance, Experimentation, Theory ..... query is the one that has a high likelihood to be formed in the target language. Here ...... Tutorial on support vector regression. Statistics and. Computing 14, 3, 199–222.

Optimal Model Detection in Distributed Sensor ...
determine the environment model for decentralized detection in sensor networks. We develop a clustering ... Utilizing model clustering, Genetic-Fuzzy Model Detection. (GFMD) can obtain the optimal threshold in a ..... computer intrusion detection,”

STABILITY CONDITIONS FOR GENERIC K3 ...
It is extremely difficult to obtain any information about the space of stability conditions on a general triangulated category. Even the most basic questions, e.g. ...

Microbase2.0 - A Generic Framework for Computationally Intensive ...
Microbase2.0 - A Generic Framework for Computationally Intensive Bioinformatics Workflows in the Cloud.pdf. Microbase2.0 - A Generic Framework for ...

Generic Load Regulation Framework for Erlang - GitHub
Erlang'10, September 30, 2010, Baltimore, Maryland, USA. Copyright c 2010 ACM ...... rate on a budget dual-core laptop was 500 requests/s. Using parallel.

generic postcard.pdf
Page 1 of 1. a little. Note. a little. Note. a little. Note. a little. Note. Page 1 of 1. generic postcard.pdf. generic postcard.pdf. Open. Extract. Open with. Sign In.

Template - Generic -
Dec 1, 2016 - This three-hour awareness session, led by the New Jersey Office of Homeland Security and Preparedness (NJOHSP), provides you with an ...

OPTIMAL RESOURCE PROVISIONING FOR RAPIDLY ...
OPTIMAL RESOURCE PROVISIONING FOR RAPIDL ... UALIZED CLOUD COMPUTING ENVIRONMENTS.pdf. OPTIMAL RESOURCE PROVISIONING FOR ...

Query-driven Ontology for BigData.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Query-driven ...

Query-driven Ontology for BigData.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Query-driven ...

Query-driven Ontology for BigData.pdf
Query-driven Ontology for BigData.pdf. Query-driven Ontology for BigData.pdf. Open. Extract. Open with. Sign In. Main menu.

Generic Desired Adaptation Outcomes
Robust policies, programmes and actions for CC adaptation. 3. Accurate weather forecasting, reliable seasonal predictions, climate projections & effective early.