Gemma De las Cuevas , Matt Hoogsteder Riera , Tim Netzer
{"title":"Tensor decompositions on simplicial complexes with invariance","authors":"Gemma De las Cuevas , Matt Hoogsteder Riera , Tim Netzer","doi":"10.1016/j.jsc.2024.102299","DOIUrl":"10.1016/j.jsc.2024.102299","url":null,"abstract":"<div><p><span>Tensors are ubiquitous in mathematics and the sciences, as they allow to store information in a concise way. Decompositions of tensors may give insights into their structure and complexity. In this work, we develop a new framework for decompositions of tensors, taking into account invariance, positivity and a geometric arrangement of their local spaces. We define an invariant decomposition with indices arranged on a simplicial complex which is explicitly invariant under a group action. We give a constructive proof that this decomposition exists for all invariant tensors, after possibly enriching the simplicial complex. We further define several decompositions certifying positivity, and prove similar existence results, as well as inequalities between the corresponding ranks. Our results generalize results from the theory of </span>tensor networks, used in the study of quantum many-body systems, for example.</p></div>","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139497517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computing the binomial part of a polynomial ideal","authors":"Martin Kreuzer, Florian Walsh","doi":"10.1016/j.jsc.2024.102298","DOIUrl":"10.1016/j.jsc.2024.102298","url":null,"abstract":"<div><p>Given an ideal <em>I</em> in a polynomial ring <span><math><mi>K</mi><mo>[</mo><msub><mrow><mi>x</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><mo>…</mo><mo>,</mo><msub><mrow><mi>x</mi></mrow><mrow><mi>n</mi></mrow></msub><mo>]</mo></math></span> over a field <em>K</em>, we present a complete algorithm to compute the binomial part of <em>I</em>, i.e., the subideal <span><math><mrow><mi>Bin</mi></mrow><mo>(</mo><mi>I</mi><mo>)</mo></math></span> of <em>I</em> generated by all monomials and binomials in <em>I</em>. This is achieved step-by-step. First we collect and extend several algorithms for computing exponent lattices in different kinds of fields. Then we generalize them to compute exponent lattices of units in 0-dimensional <em>K</em>-algebras, where we have to generalize the computation of the separable part of an algebra to non-perfect fields in characteristic <em>p</em>. Next we examine the computation of unit lattices in finitely generated <em>K</em>-algebras, as well as their associated characters and lattice ideals. This allows us to calculate <span><math><mrow><mi>Bin</mi></mrow><mo>(</mo><mi>I</mi><mo>)</mo></math></span> when <em>I</em> is saturated with respect to the indeterminates by reducing the task to the 0-dimensional case. Finally, we treat the computation of <span><math><mrow><mi>Bin</mi></mrow><mo>(</mo><mi>I</mi><mo>)</mo></math></span> for general ideals by computing their cellular decomposition and dealing with finitely many special ideals called <span><math><mo>(</mo><mi>s</mi><mo>,</mo><mi>t</mi><mo>)</mo></math></span>-binomial parts. All algorithms have been implemented in <span>SageMath</span>.</p></div>","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0747717124000026/pdfft?md5=bc32bb62dcb12f7f2c1d113994ec49bf&pid=1-s2.0-S0747717124000026-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139462707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alberto Alzati, Daniele Di Tullio, Manoj Gyawali, Alfonso Tortora
{"title":"A post-quantum key exchange protocol from the intersection of conics","authors":"Alberto Alzati, Daniele Di Tullio, Manoj Gyawali, Alfonso Tortora","doi":"10.1016/j.jsc.2024.102297","DOIUrl":"https://doi.org/10.1016/j.jsc.2024.102297","url":null,"abstract":"<p>In this paper we present a key exchange protocol in which Alice and Bob have secret keys given by two conics embedded in a large ambient space by means of the Veronese embedding and public keys given by hyperplanes containing the embedded curves. Both of them construct some common invariants given by the intersection of two conics.</p>","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139102670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Theta nullvalues of supersingular Abelian varieties","authors":"Andreas Pieper","doi":"10.1016/j.jsc.2023.102296","DOIUrl":"10.1016/j.jsc.2023.102296","url":null,"abstract":"<div><p>Let <em>η</em><span> be a polarization with connected kernel on a superspecial abelian variety </span><span><math><msup><mrow><mi>E</mi></mrow><mrow><mi>g</mi></mrow></msup></math></span>. We give a sufficient criterion which allows the computation of the theta nullvalues of any quotient of <span><math><msup><mrow><mi>E</mi></mrow><mrow><mi>g</mi></mrow></msup></math></span> by a maximal isotropic subgroup scheme of <span><math><mi>ker</mi><mo></mo><mo>(</mo><mi>η</mi><mo>)</mo></math></span> effectively.</p><p>This criterion is satisfied in many situations studied by <span>Li and Oort (1998)</span>. We used our method to implement an algorithm that computes supersingular curves of genus 3.</p></div>","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139065849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Clemens Heuberger , Daniel Krenn , Gabriel F. Lipnik
{"title":"A note on the relation between recognisable series and regular sequences, and their minimal linear representations","authors":"Clemens Heuberger , Daniel Krenn , Gabriel F. Lipnik","doi":"10.1016/j.jsc.2023.102295","DOIUrl":"10.1016/j.jsc.2023.102295","url":null,"abstract":"<div><p>In this note, we precisely elaborate the connection between recognisable series (in the sense of Berstel and Reutenauer) and <em>q</em>-regular sequences (in the sense of Allouche and Shallit) via their linear representations. In particular, we show that the minimisation algorithm for recognisable series can also be used to minimise linear representations of <em>q</em>-regular sequences.</p></div>","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0747717123001098/pdfft?md5=492907babc8de19f0ee8ae11896722d4&pid=1-s2.0-S0747717123001098-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139065963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Axioms for a theory of signature bases","authors":"Pierre Lairez","doi":"10.1016/j.jsc.2023.102275","DOIUrl":"10.1016/j.jsc.2023.102275","url":null,"abstract":"<div><p><span>Twenty years after the discovery of the F5 algorithm, Gröbner bases with signatures are still challenging to understand and to adapt to different settings. This contrasts with Buchberger's algorithm, which we can bend in many directions keeping correctness and termination obvious. I propose an axiomatic approach to Gröbner bases with signatures with the purpose of uncoupling the theory and the algorithms, giving general results applicable in many different settings (e.g. Gröbner for </span>submodules, F4-style reduction, noncommutative rings, non-Noetherian settings, etc.), and extending the reach of signature algorithms.</p></div>","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138742217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computing primitive idempotents in finite commutative rings and applications","authors":"Mugurel Barcau , Vicenţiu Paşol","doi":"10.1016/j.jsc.2023.102294","DOIUrl":"10.1016/j.jsc.2023.102294","url":null,"abstract":"<div><p><span>In this paper, we compute an algebraic decomposition of black-box rings in the generic ring model. More precisely, we explicitly decompose a black-box ring as a direct product of a nilpotent black-box ring and unital local black-box rings, by computing all its primitive idempotents. The algorithm presented in this paper uses quantum subroutines for the computation of the </span><em>p</em>-power parts of a black-box ring and then classical algorithms for the computation of the corresponding primitive idempotents. As a by-product, we get that the reduction of a black-box ring is also a black-box ring. The first application of this decomposition is an extension of the work of <span>Maurer and Raub (2007)</span> on representation problem in black-box finite fields to the case of reduced <em>p</em>-power black-box rings. Another important application is an <span><math><msup><mrow><mtext>IND-CCA</mtext></mrow><mrow><mn>1</mn></mrow></msup></math></span><span> attack for any ring homomorphic encryption scheme<span> in the generic ring model. Moreover, when the plaintext space is a finite reduced black-box ring, we present a plaintext-recovery attack based on representation problem in black-box prime fields. In particular, if the ciphertext space has smooth characteristic, the plaintext-recovery attack is effectively computable in the generic ring model.</span></span></p></div>","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138688298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fast computation of the centralizer of a permutation group in the symmetric group","authors":"Rok Požar","doi":"10.1016/j.jsc.2023.102287","DOIUrl":"10.1016/j.jsc.2023.102287","url":null,"abstract":"<div><p>Let <em>G</em><span> be a permutation group acting on a set Ω. Best known algorithms for computing the centralizer of </span><em>G</em><span> in the symmetric group on Ω are all based on the same general approach that involves solving the following two fundamental problems: given a </span><em>G</em>-orbit Δ of size <em>n</em>, compute the centralizer of the restriction of <em>G</em> to Δ in the symmetric group on Δ; and given two <em>G</em>-orbits Δ and <span><math><msup><mrow><mi>Δ</mi></mrow><mrow><mo>′</mo></mrow></msup></math></span> each of size <em>n</em>, find an equivalence between the action of <em>G</em> restricted to Δ and the action of <em>G</em> restricted to <span><math><msup><mrow><mi>Δ</mi></mrow><mrow><mo>′</mo></mrow></msup></math></span> when one exists. If <em>G</em> is given by a generating set <em>X</em>, previous solutions to each of these two problems take <span><math><mi>O</mi><mo>(</mo><mo>|</mo><mi>X</mi><mo>|</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>)</mo></math></span> time.</p><p>In this paper, we first solve each fundamental problem in <span><math><mi>O</mi><mo>(</mo><mi>δ</mi><mi>n</mi><mo>+</mo><mo>|</mo><mi>X</mi><mo>|</mo><mi>n</mi><mi>log</mi><mo></mo><mi>n</mi><mo>)</mo></math></span> time, where <em>δ</em> is the depth of the breadth-first-search Schreier tree for <em>X</em> rooted at some fixed vertex. For the important class of small-base groups <em>G</em>, we improve the theoretical worst-case time bound of our solutions to <span><math><mi>O</mi><mo>(</mo><mi>n</mi><msup><mrow><mi>log</mi></mrow><mrow><mi>c</mi></mrow></msup><mo></mo><mi>n</mi><mo>+</mo><mo>|</mo><mi>X</mi><mo>|</mo><mi>n</mi><mi>log</mi><mo></mo><mi>n</mi><mo>)</mo></math></span> for some constant <em>c</em>. Moreover, if <span><math><mo>⌈</mo><mn>20</mn><msub><mrow><mi>log</mi></mrow><mrow><mn>2</mn></mrow></msub><mo></mo><mi>n</mi><mo>⌉</mo></math></span> uniformly distributed random elements of <em>G</em><span> are given in advance, our solutions have, with probability at least </span><span><math><mn>1</mn><mo>−</mo><mn>1</mn><mo>/</mo><mi>n</mi></math></span>, a running time of <span><math><mi>O</mi><mo>(</mo><mi>n</mi><msup><mrow><mi>log</mi></mrow><mrow><mn>2</mn></mrow></msup><mo></mo><mi>n</mi><mo>+</mo><mo>|</mo><mi>X</mi><mo>|</mo><mi>n</mi><mi>log</mi><mo></mo><mi>n</mi><mo>)</mo></math></span>. We then apply our solutions to obtain a more efficient algorithm for computing the centralizer of <em>G</em> in the symmetric group on Ω. In an experimental evaluation we demonstrate that it is substantially faster than previously known algorithms.</p></div>","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138513693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jasper Nalbach , Erika Ábrahám , Philippe Specht , Christopher W. Brown , James H. Davenport , Matthew England
{"title":"Levelwise construction of a single cylindrical algebraic cell","authors":"Jasper Nalbach , Erika Ábrahám , Philippe Specht , Christopher W. Brown , James H. Davenport , Matthew England","doi":"10.1016/j.jsc.2023.102288","DOIUrl":"10.1016/j.jsc.2023.102288","url":null,"abstract":"<div><p><em>Satisfiability modulo theories (SMT)</em> solvers check the satisfiability of quantifier-free first-order logic formulae over different theories. We consider the theory of <em>non-linear real arithmetic</em> where the formulae are logical combinations of polynomial constraints. Here a commonly used tool is the <em>cylindrical algebraic decomposition (CAD)</em> to decompose the real space into cells where the constraints are truth-invariant through the use of <em>projection polynomials</em>.</p><p>A CAD encodes more information than necessary for checking satisfiability. One approach to address this is to repackage the CAD theory into a search-based algorithm: one that guesses sample points to satisfy the formula, and generalizes guesses that conflict constraints to cylindrical cells around samples which are avoided in the continuing search. This can lead to a satisfying assignment more quickly, or conclude unsatisfiability with far fewer cells. A notable example of this approach is Jovanović and de Moura's <em>NLSAT</em> algorithm. Since these cells are being produced locally to a sample there is scope to use fewer projection polynomials than the traditional CAD projection. The original NLSAT algorithm reduced the set a little; while Brown's <em>single cell construction</em> reduced it much further still. However, it refines a cell polynomial-by-polynomial, meaning the shape and size of the cell produced depends on the order in which the polynomials are considered.</p><p>The present paper proposes a method to construct such cells <em>levelwise</em>, i.e. built level-by-level according to a variable ordering instead of polynomial-by-polynomial for all levels. We still use a reduced number of projection polynomials, but can now consider a variety of different reductions and use <em>heuristics</em> to select the projection polynomials in order to optimize the shape of the cell under construction. The new method can thus improve the performance of the NLSAT algorithm. We formulate all the necessary theory that underpins the algorithm as a <em>proof system</em>: while not a common presentation for work in this field, it is valuable in allowing an elegant decoupling of heuristic decisions from the main algorithm and its proof of correctness. We expect the symbolic computation community may find uses for it in other areas too. In particular, the proof system could be a step towards formal proofs for non-linear real arithmetic.</p><p>This work has been implemented in the SMT-RAT solver and the benefits of the levelwise construction are validated experimentally on the SMT-LIB benchmark library. We also compare several heuristics for the construction and observe that each heuristic has strengths offering potential for further exploitation of the new approach.</p></div>","PeriodicalId":50031,"journal":{"name":"Journal of Symbolic Computation","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0747717123001025/pdfft?md5=f45eafa5ba7d71b914304fbba6948761&pid=1-s2.0-S0747717123001025-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138513690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}