2015 IEEE 56th Annual Symposium on Foundations of Computer Science 2015
DOI: 10.1109/focs.2015.81
|View full text |Cite
|
Sign up to set email alerts
|

A Holant Dichotomy: Is the FKT Algorithm Universal?

Abstract: We prove a complexity dichotomy for complex-weighted Holant problems with an arbitrary set of symmetric constraint functions on Boolean variables. This dichotomy is specifically to answer the question: Is the FKT algorithm under a holographic transformation [38] a universal strategy to obtain polynomial-time algorithms for problems over planar graphs that are intractable in general? This dichotomy is a culmination of previous ones, including those for Spin Systems [25], Holant [21,6], and #CSP [20].In the stud… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
1
1

Relationship

4
4

Authors

Journals

citations
Cited by 20 publications
(31 citation statements)
references
References 37 publications
0
31
0
Order By: Relevance
“…When this is indeed the case, any solution (y ′ , y ′′ ) to (6) is also a solution to (7), and vice versa. Also notice that for u = v, condition (8) always holds.…”
Section: Equivalence Of Clifford Gates and Unitary Affine Signaturesmentioning
confidence: 94%
See 1 more Smart Citation
“…When this is indeed the case, any solution (y ′ , y ′′ ) to (6) is also a solution to (7), and vice versa. Also notice that for u = v, condition (8) always holds.…”
Section: Equivalence Of Clifford Gates and Unitary Affine Signaturesmentioning
confidence: 94%
“…We may assume that (8) holds. Furthermore, we may assume that y ′′ is substituted by (6), which is the same as (7) under (8), and drop the indicator function χ. Since λ is chosen so that µµ = λλ = 1/2 r (recall (5)), we have that…”
Section: Equivalence Of Clifford Gates and Unitary Affine Signaturesmentioning
confidence: 99%
“…Essentially we want the validity of the very statement we want to prove to provide its own guarantee of success in every step in its proof. Given the fact that there are other tractable classes for Pl-Holant problems [4] not encompassed in the list given in Theorem 6.1, the validity of this vision for Pl-#CSP problems is at least not obvious. Luckily, this vision is correct.…”
Section: Outline Of the Proofmentioning
confidence: 99%
“…This implies that |a| = 1. So we can get the unary signatures [1,2], [1,3], [1,4] (in fact, we can get any constantly many unary signatures) using interpolation, by Lemma 2.37. Then by Theorem 3.5 and f / ∈ P, we can get a symmetric signature f ′′ that is not in P. Note that the symmetric signature set { [1,2], f ′′ } satisfies…”
Section: {1}mentioning
confidence: 99%
“…In the past decade significant progress was made in the understanding of these remarkable algorithms [3,5,6,10,14,19,23,25,24]. In an interesting twist, it turns out that the idea of a holographic reduction is not only a powerful technique to design unexpected algorithms (tractability), but also an indispensable tool to prove intractability and then to prove classification theorems.…”
Section: Introductionmentioning
confidence: 99%