Tensor network complexity of multilinear maps
نویسندگان
چکیده
We study tensor networks as a model of arithmetic computation for evaluating multilinear maps. This model turns out to be strong enough to capture the current best algorithms for a variety of problems, e.g., O(n ) time matrix multiplication, O(n logn) time discrete Fourier transform, O(n ) time 3t-clique counting and O∗(2n) time for computing the permanent of a matrix. For counting homomorphisms of a general pattern graph P into a host graph on n vertices we obtain an upper bound of O(n ) bw(P ) where bw(P ) is the branchwidth of P . This essentially matches the bound for counting cliques, and yields small improvements over previous algorithms for many choices of P . While powerful, the model still has limitations, and we are able to show a number of unconditional lower bounds for various linear maps, including: (a) an Ω(n ) time lower bound for counting homomorphisms from P to an n-vertex graph, matching the upper bound if ω = 2. In particular for P a v-clique this yields an Ω(nd2v/3e) time lower bound for counting v-cliques. (b) an Ω(2) time lower bound for the permanent of an n× n matrix. (c) an Ω(n) time lower bound for the trilinear map Dijk = ∑ lAijlBiklCjkl generalizing matrix multiplication, taking three n× n× n tensors A,B,C and producing an n× n× n tensor D, ruling out tensor networks as an approach to obtaining non-trivial algorithms for hyperclique counting and the Max-3-CSP problem. ar X iv :1 71 2. 09 63 0v 2 [ cs .C C ] 7 A pr 2 01 8
منابع مشابه
Indistinguishability Obfuscation from SXDH on 5-Linear Maps and Locality-5 PRGs
Two recent works [Lin, EUROCRYPT 2016, Lin and Vaikuntanathan, FOCS 2016] showed how to construct Indistinguishability Obfuscation (IO) from constant degree multilinear maps. However, the concrete degrees of multilinear maps used in their constructions exceed 30. In this work, we reduce the degree of multilinear maps needed to 5, by giving a new construction of IO from asymmetric L-linear maps ...
متن کاملNew Multilinear Maps from CLT13 with Provable Security Against Zeroizing Attacks
We devise the first weak multilinear map model for CLT13 multilinear maps (Coron et al., CRYPTO 2013) that captures all known classical polynomial-time attacks on the maps. We then show important applications of our model. First, we show that in our model, several existing obfuscation and order-revealing encryption schemes, when instantiated with CLT13 maps, are secure against known attacks und...
متن کاملNew Multilinear Maps from CLT13 with Provable Security Against Zeroizing Attacks
We devise the first weak multilinear map model for CLT13 multilinear maps (Coron et al., CRYPTO 2013) that captures all known classical polynomial-time attacks on the maps. We then show important applications of our model. First, we show that in our model, several existing obfuscation and order-revealing encryption schemes, when instantiated with CLT13 maps, are secure against known attacks und...
متن کاملAn Iterative Reweighted Method for Tucker Decomposition of Incomplete Multiway Tensors
We consider the problem of low-rank decomposition of incomplete multiway tensors. Since many real-world data lie on an intrinsically low dimensional subspace, tensor low-rank decomposition with missing entries has applications in many data analysis problems such as recommender systems and image inpainting. In this paper, we focus on Tucker decomposition which represents an N th-order tensor in ...
متن کاملNovel Factorization Strategies for Higher Order Tensors: Implications for Compression and Recovery of Multi-linear Data
In this paper we propose novel methods for compression and recovery of multilinear data under limited sampling. We exploit the recently proposed tensorSingular Value Decomposition (t-SVD)[1], which is a group theoretic framework for tensor decomposition. In contrast to popular existing tensor decomposition techniques such as higher-order SVD (HOSVD), t-SVD has optimality properties similar to t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1712.09630 شماره
صفحات -
تاریخ انتشار 2017