|
. This paper is part of a project that has received funding from the French “Agence de l'innovation de défense”.
. This article has been written using GNU TeXmacs [43].
Given an algebraic germ of a plane curve at the origin, in terms of a bivariate polynomial, we analyze the complexity of computing an irreducible decomposition up to any given truncation order. With a suitable representation of the irreducible components, and whenever the characteristic of the ground field is zero or larger than the degree of the germ, we design a new algorithm that involves a nearly linear number of arithmetic operations in the ground field plus a small amount of irreducible univariate polynomial factorizations.
|
Algebraic curves play a central role in algebraic geometry and various applications in effective algebra. In particular, efficient algorithms are needed to compute topological or analytic invariants, arithmetic genus, desingularized models, integral closures, Riemann–Roch spaces, etc. Usual applications in computer algebra concern the irreducible factorization of multivariate polynomials, the integration of rational functions, the construction of algebraic geometry error correcting codes, the bi-linear complexity of polynomial multiplication, etc. In the present paper, we are interested in computing the irreducible factorization of any given polynomial , where denotes an effective field. Here “effective” means that algorithms are at our disposal for the arithmetic operations and the zero test in .
Let denote the fraction field of of Laurent series in . The field
of power series with fractional exponents is called the field of Puiseux series (or Puiseux expansions) over . Let denote the algebraic closure of . If has characteristic zero, then is the algebraic closure of . In other words, any polynomial in splits into linear factors in .
Computations of Puiseux expansions of roots of go back to Newton [62], and were rediscovered by Puiseux [75]; see [5, p. 198] and [82, 86]. The well known Newton polygon method turns out to be effective whenever is effective. When adopting a suitable algebraic complexity model (in which running times are measured in terms of the required number of arithmetic operations in or ), the complexity is easily seen to be polynomial in the degree of and in the required precision. However, at present time, we are not aware of an algorithm with a softly linear cost for any precision (especially below the valuation of discriminant of ).
For the design of such a quasi-optimal algorithm, it is important to carefully state the problem that needs to be solved. In particular, one has to pay attention to the ways in which algebraic numbers and fractional power series are represented. It turns out that the computation of Puiseux expansions is closely related to the computation of irreducible factorizations in and that representation issues are more straightforward for the latter problem.
In this paper, we therefore focus on the computation of irreducible factorizations. Our main goal is the design of an efficient algorithm for factoring a polynomial that is given modulo for a finite precision , assuming that we already have an algorithm for decomposing polynomials in into irreducible factors.
For complexity analyses, we consider algebraic complexity models (such as computation trees). In other words we simply count numbers of arithmetic operations and zero tests in specified algebraic structures.
Until the end of the paper, is a fixed rational number that can be taken arbitrarily close to zero. For complexity estimates we often use the soft-Oh notation: means that ; see [26, chapter 25, section 7] for technical details. The least integer larger or equal to is written ; the largest one smaller or equal to is written .
For randomized algorithms over a finite effective ring , we assume a special instruction that uniformly generates random elements in with constant cost. For a given input, the cost of a randomized algorithm is thus a random variable. The expected cost for input size is defined as the maximum of the averages of these random variables over all possible inputs of size .
For a finite field of characteristic and with elements, the usual primitive element representation will be used, so elements in will be regarded in where is an irreducible polynomial of degree .
for a separable irreducible monic polynomial and . We set
Products and inversions in take operations in . This was first proved in [45] in the case when is a field and . The result was extended to more general algebraic towers in [46]. Whenever , we may work in an algebraic extension of degree such that . The computation of such an extension can be done using operations in the prime subfield of , thanks to [79, Theorem 4.1]. For a fixed field , this can be regarded as a precomputation, whereas computations with elements in instead of induce only a logarithmic overhead .
so is a non-decreasing function in .
For example, if is the finite field , then a well known probabilistic algorithm due to Cantor and Zassenhaus [12] factors univariate polynomials in using an expected number of bit operations.
The currently best known algorithm is obtained as a combination of results due to von zur Gathen, Kaltofen and Shoup [27, 48, 49], and Kedlaya and Umans [51]: it takes an expected number of
bit operations; see [47, Corollary 5.1].
The case of a tower over (with the above notation) reduces to the case of by means of the fast change of representation of [70, Theorem 1.2], that applies whenever
(1.1) |
In terms of bit complexity, and for a “random access memory” computational model, this yields
Details can be found in [47, Corollary 5.3]. Whenever condition (1.1) is satisfied, we may then use the expected bit complexity bound
When the tower has small degrees , optimized factorization procedures can be found in [44, 47, 48]. In particular, if is smooth, then polynomials of small degree can even be factored in quasi-optimal time. Note that these optimizations do not depend on Kedlaya–Umans' algorithm for modular composition.
For an abstract effective field , there does not exist a general algorithm to factor polynomials in into irreducible ones [24, 25]. Throughout this paper, we will therefore need to assume that such an algorithm is provided by the computational model:
In practice, this property holds whenever is effectively finitely generated over its prime subfield. Once factorization is available in , it is also available in , with a complexity that depends on those of resultants and gcds [81].
Let still denote an effective field, let be monic as a polynomial in , and assume that . So defines a germ of curve at the origin. In practice, we always truncate at a finite order in . For the discussion in the following paragraphs, we therefore take and assume that is monic, primitive, and separable in , of total degree , and of partial degrees in and in .
Consider a Puiseux series that is a root of . The shortest truncation of this series which is different from any truncation of a distinct Puiseux series root of is called the singular part of . In 1978, Kung and Traub [52] showed that the Puiseux expansion of can be computed efficiently using Newton's method, once its singular part is known.
The complexity of the computation of singular parts started to be studied in the eighties. In [35], Henry and Merle showed that the embedded resolution of an irreducible germ of curve defined by at the origin can be computed with operations in . In [19], Duval introduced the notion of rational Puiseux expansions, that allowed computations over to be replaced by computations over . She adapted the usual Newton polygon algorithm to such a rational representation, and made use of dynamic evaluation to handle algebraic extensions without polynomial factorization. She achieved a total cost of operations in , whenever the characteristic is zero or sufficiently large. This analysis was based on slow arithmetic for polynomials and series.
In his PhD thesis [68], Poteaux showed that Duval's algorithm takes at most operations in in order to obtain all the singular parts of the Puiseux expansions. In [69], Poteaux and Rybowicz also proved that the singular parts of the rational Puiseux expansions centered at a single point can be computed using operations in , in the case when ; this bound relies on fast polynomial arithmetic. In [72], Poteaux and Weimann finally gave a probabilistic algorithm that allows singular parts to be computed with operations in , assuming that the characteristic of is zero or sufficiently large. This bound is quasi-optimal in worst cases, when we need order about before root separation takes place [72, Example 8.1]. Their algorithm makes use of dynamic evaluation and the singular parts are represented by truncations of rational Puiseux expansions. These algorithms by Poteaux et al. also extend efficiently to obtain the collection of all singular parts at each of the singularities of the algebraic curve defined by . As a byproduct, Poteaux and Weimann proved the expected complexity bound for the irreducible factors of at precision , still under the assumption that the characteristic of is ; see [72, Theorem 1.6].
When , a polynomial bit complexity for Puiseux series was first achieved by Chistov [13]. The complexity bound for this case was subsequently detailed and improved by Walsh [83, 84]. Since the complexity exponents are rather large, multi-modular approaches turn out to be of practical interest [68].
Once singular parts are known, we have already mentioned that Puiseux expansions can be extended by means of the Newton operator, as described in [52]; see also [39] for recent optimizations. For small and moderate expansion orders, it is often more efficient to use lazy or relaxed arithmetic to expand algebraic power series [38, 85]. For very large expansion orders, yet another method is to compute a differential operator that annihilates the expansions [15, 16]; see [8] for complexity bounds. It is also worth mentioning that individual terms of algebraic Puiseux series over a finite field can be computed even faster than with the Newton iteration [7].
In his 1989 article [1], Abhyankar addressed a question from Kuo about an algorithm to decide the irreducibility of a germ of curve, without using blowups or Puiseux series. In characteristic zero, Abhyankar gave a positive answer to this question, by using expansions of the defining polynomial of the germ with respect to so-called approximate roots. These approximate roots can be determined recursively by means of a generalized Newton polygon, previously introduced in [2, 3]. They generalize Tschirnhaus transforms [80]. Complexity analyses can be found in [71, 73]: in favorable cases irreducibility tests take softly linear time (plus a justifiable amount of irreducibility tests in ).
Abhyankar's work has been completed and extended to arbitrary characteristic by Cossart and Moreno-Socías in [18], where they present an alternative construction based on valuation theory. The mathematical relationship between approximate roots, Puiseux expansions, and Hamburger–Noether expansions can be found in [73, 76].
After that, Pauli [67] designed a factorization algorithm over an algebraic extension of degree of with bit complexity
(1.2) |
Since 1999, Montes has been designing different algorithms; his irreducibility test of [57] has been shown in [23] to have a complexity similar to (1.2).
The next improvements are due to Guàrdia, Montes, and Nart [29, 30]. They exploit previous ideas by MacLane and Okutsu in order to compute so-called OM factorizations (as a shorthand for “Okutsu–Montes factorizations”); see [61] for a survey. In [6], Bauch, Nart, and Stainsby proved the bit complexity bound
for an algebraic extension of degree of . Further refinements and applications, including the computation of integral closures, can be found in [20, 31, 32].
In [74] Poteaux and Weimann recently improved the latter complexity bound to
(discarding factorization costs in ) whenever : they made use of the natural “divide and conquer” extension of the generalized Hensel lifting of [33] and also applied the same “increase of precision” strategy as in [72].
The resolution of algebraic equations over fields of generalized power series is still based on the Newton polygon method. However, the complexity can no longer be analyzed in terms of the truncation order in a non-archimedean context. Instead, one may consider the resolution of equations in Hensel position as a natural building block. In [37], van der Hoeven showed how to reduce the resolution of a general algebraic equation of degree to at most applications of Hensel's lemma. It would be interesting to analyze the complexity of this algorithm in the special cases that were considered above.
Non-archimedean value groups are not merely a theoretical curiosity. Until recently, effective counterparts of Hironaka's theory of standard bases for power series were only known in the case of algebraic power series [4, 58]. In [42], generalized Puiseux series have been put to develop elimination theories for more general power series, such as differentially algebraic power series. Non-archimedean value groups actually arise in a natural way when studying algebraic differential equations, and the Newton polygon method can be generalized to this context; see [5] for recent progress and further references.
The main purpose of this paper is to present a self-contained and quasi-optimal algorithm for approximate factorization over rings of formal power series. We show how to efficiently factor into irreducible polynomials, and for each irreducible factor we construct generators of the valuation group of in a form of a contact tower; see Definition 3.1. An irreducible factorization of modulo is a list of factors of modulo , along with their associated multiplicity and contact tower; see Definition 7.6. In particular the are irreducible, pairwise coprime, and we have
for some integers . The contact tower associated to allows the computation of the valuation in in softly linear time. The following main result will be proved at the end of section 8.2:
operations in .
Example
Note that the term is negligible with respect to as soon as the precision is sufficiently large. By using our approximate factorization algorithm with a sufficiently large precision, we deduce the following complexity bound for the actual irreducible factorization of ; see section 9.5.
operations in .
Theorem 1.3 considers as part of the input. This is not very restrictive in characteristic zero or thanks to [60, Theorem 1]. On the other hand, if belongs then can be computed with operations in . Theorem 1.3 can be regarded as a deterministic counterpart of [72, Theorem 1.6] and is also similar to [74, Theorem 4], although the underlying algorithms are notably different. Our proofs are elaborated from scratch by taking special care of the precisions and the cost of all factorizations in . We rely neither on Puiseux expansions (contrary to [72]), nor on OM factorizations, nor on approximate roots, nor on the “divide and conquer” strategy from [72, 74] on the precision. Instead, our algorithm is based on a natural cascade of factorizations driven by Newton polytopes and a new method to balance the depth of the recursive calls: namely our central shift algorithm of section 7.7. Note that approximate factorizations in the sense of Theorem 1.1 (especially below the valuation of the discriminant) are not assessed in [72, 74].
The algorithm behind Theorem 1.1 decomposes into several subtasks for which we design efficient solutions. The first subtask concerns the computation of so-called distinct-slope and equal-slope factorizations; see section 7. Distinct-slope factorizations separate the factors of according to the slopes of its Newton polygons. Equal-slope factorizations serve a similar purpose for polynomials with a single slope. We achieve these computations in softly linear time by means of a generalized Hensel lifting, as explained in section 4.
The contact factorization algorithm performs a cascade of distinct-slope and equal-slope factorizations over increasing contact towers. When the tree modeling the successive splittings of is not sufficiently well balanced, the total complexity moves away from quasi-linearity. Our central shift algorithm of section 7.7 circumvents this issue through tree-balancing. The top level algorithm is described in section 8.
Computing over contact towers involves two difficulties. First, as for towers of algebraic field extensions, we do not know how to perform arithmetic operations in softly linear time. We overcome this difficulty by doing most of the operations within the original ring using a sufficiently high precision. The second difficulty concerns zero tests and inversions in towers. In section 6, we introduce initial expansions, that can be computed fast thanks to accelerated tower arithmetic [45].
As said, the power series setting from this paper is simpler than the one of general local fields studied by Montes et al. Nevertheless, the main mathematical ideas are roughly the same and go back to the work of MacLane [55, 56] on augmented valuations: approximate roots, OM-factorizations, and contact towers share the same philosophy.
Compared to [55, 56], our contact towers represent a kind of a more general “augmented semi-valuations“. Approximate roots can indeed be regarded as special cases of contact towers but also of so-called “tipos” in [57]. Our contact factorization algorithm does not rely on approximate roots: as explained in section 8.3, such roots may be useful in practice, but it is a drawback that they are not preserved during factorizations. In fact, our new central shift strategy behaves as an algorithmic improvement with respect to approximate roots; see section 2.6. While MacLane, and later Montes, focused on constructing augmented (semi-)valuations over polynomial rings, our down-to-earth and self-contained approach begins with designing efficient data structures in the vein of triangular sets and Hironaka's standard bases [36]. In addition, let us mention that, compared to [74], our multi-factor Hensel lifting of section 4 is based on a faster multi-remaindering strategy.
We would also like to insist on our novel strategy for approximate factorizations, that is behind Theorem 1.1. Roughly speaking, the problem here is similar to approximate factorization in . The first quasi-optimal algorithms for the computation of the distinct roots were designed for the case when the required precision is sufficiently high [66, 78]; more recently, a different algorithm was proposed for small precisions [59]. Detailed comparisons between all known algorithms for local factorization would be too long and technical to be discussed here. Instead, we dedicate our next section to introductory examples that illustrate the computational difficulties that are common to all known approaches.
At the end of the paper, a glossary is dedicated to the specific mathematical notations, and an index gathers references to the main definitions.
Before we give the formal definition of a contact factorization, we review a few motivating examples from the complexity perspective.
Let be a totally ordered abelian group and let be a monoid embedded in . A graded ring with respect to the grading is a direct sum
where the are abelian groups such that for all and in . An element of is said to be homogeneous if it belongs to one of the . Any element in can be uniquely written , where is called the homogeneous component of degree of . If and , then we also denote
The initial form of a non-zero element , written , is the non-zero homogeneous component with the smallest index . By convention we set .
An ideal of is said to be homogeneous whenever it can be generated by homogeneous elements, or equivalently whenever the homogenous components of any element of also belong to .
To each non-zero element we may associate the smallest index such that ; we set . The map is a semi-valuation , which means that it satisfies and for all . Given , we call the truncation of at relative precision .
The Newton polygon of a non-zero polynomial
of degree is the lower border of the convex hull in of the set of points
Figure 2.1 illustrates this definition with and . The Newton polygon is thus a broken line with edges , with , such that:
,
for ,
, for all and with ,
, for all and or with .
Intuitively speaking, these conditions mean that lies on or above the Newton polygon. If , then we have and . Any determines an edge with vertices and . The Newton polynomial associated to is
Whenever , the slope of is . The first slope is whenever . Two consecutive edges have different slopes.
In order to illustrate computations in algebraic extensions of or , let us first consider applying the Newton polygon method to an input polynomial of the form
where is a monic separable irreducible polynomial of degree and has degree in . We then consider
(2.1) |
as a polynomial equation in . The Newton polygon of consists of a single edge starting at and ending at ; its slope is .
Equation (2.1) has a solution in , where . Indeed, let be the class of in . Replacing by in (2.1), we obtain the new equivalent equation
(2.2) |
The separability of implies , which allows us to apply Hensel's lemma: there exists a unique solution with valuation in . This is the point of view of factoring in terms of Puiseux expansions.
In terms of space complexity, we note that computations in typically require times more space than in . Fortunately, this is compensated by the fact that the “unique” solution to (2.2) actually describes all solutions to (2.1) in . Indeed, any solution in is obtained by substituting a root of for in the expression of .
From a time complexity point of view, the resolution of (2.2) can be done efficiently by using Newton's method. However, this involves truncated power series evaluations of expressions such as , where . These give in turn rise to modular compositions (with modulus ). Over general coefficient fields , no quasi-optimal algorithm (of complexity ) is currently known for this task, so it is preferable to avoid such operations whenever possible. In particular, it is better to avoid working over algebraic extensions of the field of coefficients.
In order to avoid modular compositions, one idea is to consider that equation (2.1) does not require any explicit resolution. In other words, it is already in such a simple form that we may essentially consider it as “solved”. More generally, later in this paper, we will consider an equation as “solved” if and only if the Newton polygon of with respect to suitable “contact coordinates” has a single slope for which the associated Newton polynomial is separable (and technically, irreducible).
The problem of solving a general equation with then reduces to the problem of factoring as a product of “solved” polynomials. From this perspective, expressing the solutions of as Puiseux series becomes a rewriting problem for “solved” polynomials, which is independent from the main resolution of the equation itself.
Consider the polynomial equation in over given by
(2.3) |
When solving this equation by means of the Newton polygon method, we see that the Newton polygon of has a single slope with associated Newton polynomial
In other words, all solutions of (2.3) are of the form , where . Usually, the Newton polygon method proceeds by performing a change of variable
while imposing the constraint . So we are reduced to solving
The Newton polygon has two edges: and . Therefore and we have , so , where . We proceed with the change of variable
while imposing the constraint . So we are now led to solving
The unique value of can therefore be computed efficiently by means of the Newton iteration as a regular root of . However, this means that we have to work over the algebraic extension .
The idea behind contact calculus is to avoid computing over this type of algebraic extensions, by working with respect to so-called contact coordinates instead. In the present example, the idea is to rewrite (2.3) as
We next reinterpret this equation as
(2.4) |
where and are two new variables that are subject to the following constraints:
, ,
and .
The variables and can be regarded as unknowns, with values in the ring of Puiseux series in . These unknowns satisfy the system of equations
In other words, computing Puiseux expansions of solutions to is equivalent to computing Puiseux expansions of solutions to the latter system. We note that is separable in and that the solutions for begin with . Then is separable in for each solution , so the system admits the following solutions:
After the change of variable , these solutions are regular roots of the following map modulo :
By means of the Newton iteration, these roots may be lifted efficiently to any required precision, and so may the corresponding solutions of .
The variables and are called contact coordinates. Note that
so the germ of the curve defined by approximates the one defined by . From a geometric point of view, the two germs are “in contact”.
Informally speaking, the Newton polygon of equation (2.4) in has a single edge of vertices and , with associated Newton polynomial , whence . The precise meaning of this “generalized Newton polygon” will be the purpose of section 7. Since the polynomial is separable in , we consider the polynomial to be “solved”.
Working with contact coordinates is a little bit tricky, since and are related by the equation . Basic arithmetic operations and the Newton polygon method therefore have to be adapted with care. It turns out that “contact calculus” with respect to contact coordinates has a double flavor. At small orders in , it boils down to working in towers of algebraic extensions of . At large orders in , we may convert between polynomials in and through the mechanism of -adic expansions.
In this paper, we have chosen to do most actual computations in , since fast algorithms for basic arithmetic operations in this ring are well known. However, conversions between the “plain coordinates” and the “contact coordinates” incur some precision loss. Fortunately, this precision loss can be controlled for the applications in this paper. Of course, it would be interesting to design a genuine fast arithmetic for contact coordinates without precision loss.
Example (2.3) has several variants that motivate the general definition of contact coordinates in the next section. First of all, consider the equation
(2.5) |
In that case, the contact coordinates would rather be and . This illustrates that we do not systematically take , although we always do have when working over .
Let us next consider the equation
(2.6) |
In this case, we start with the same contact coordinates and as for (2.3), but also need to introduce a third one , subject to . In general, we may need to introduce as many as contact coordinates.
Yet another variant of (2.3) is the equation
(2.7) |
We again use the same contact coordinates and as for (2.3), but this time rewrites into , that can be factored:
In general, these types of factorizations can be expensive to compute with respect to the original coordinates and become more transparent for the contact coordinates.
Let us first consider the equation
(2.8) |
When solving this equation using the usual Newton polygon method, we find that there is a single slope , with , for which the associated Newton polynomial has a single root of multiplicity . This means that the leading terms of the Puiseux expansions are and that the remaining terms can be found by performing the change of variable and solving the resulting equation for :
In a similar way, we find the leading term of , which has again multiplicity . We have to go on like this for steps until reaching the equation
At this point there are two possible dominant terms for (namely and ), each of multiplicity one, and we consider that we essentially solved the equation (more terms can be obtained efficiently using Newton's method).
From the complexity point of view, the problem is that we need to recompute a new equation at every step where we discover one more term of the expansion, which is quite expensive. A well known trick to replace the 50 steps by a single one is to compute the solution to the derivative of the equation, that is
and directly set instead of . The new equation in then becomes
after which the resolution process directly splits into two branches and . In general, for a -fold leading term, we need to consider a solution to the -fold derivative of the equation. In that case, the change of variables is called a Tschirnhaus transform.
For general contact coordinates, things become more technical, but similar strategies apply. In general, if is a ring with unity, if is a monic polynomial of degree in , if divides , and if is invertible in , then there exists a unique monic polynomial of degree such that has degree ; see section 8.3. The polynomial is called the -th approximate root of . If , then the -th approximate root corresponds to the Tschirnhaus transform . In general, the -adic expansion of writes as where the are polynomials in of degree , so is the -th approximate root of if and only if .
Let us now consider yet another type of equation with an almost -fold multiple solution
(2.9) |
When solving the equation naively with the Newton polygon method, we obtain a -fold branch at the first step, a single branch and a -fold branch at the second step, a single branch and a -fold branch at the third step, and so on. From the complexity point of view, factoring out a single branch at every step leads to a cost
as a function of , which is not quasi-linear in .
Using Tschirnhaus transforms is not really of any help. For instance, the -fold derivative of the equation yields
with solution . After the change of variable , we still obtain one single branch and one -fold branch.
What really helps in this situation is a way to determine the series
(2.10) |
This series has the property that, after the change of variable , we obtain the equivalent equation
whose Newton polygon has edges. In particular, the resolution process now branches into distinct parts of multiplicity one.
Computing the series (2.10) is equivalent to “solving” . But instead of peeling off factors of degree one from the left-hand side of (2.9), we rather compute with precision about in a recursive manner. This allows to factor as the product of two polynomials of degree close to , and to repeat this process in a recursive manner. Series such as (2.10) will be called central shifts. For a general polynomial equation , even within contact coordinates, the central shift will allow us to guarantee a suitably balanced factorization for which and can recursively be factored with good complexity.
This section formalizes the concept of contact towers. The effective ground field is written and the contact coordinates will be denoted by .
We endow with the weighted valuation, simply written “”, defined by and for . With
this valuation induces a grading
where is the set of polynomials made only of terms of valuation ; notice that . When no confusion is possible, we drop “weighted”.
Let be the least common multiple of the denominators of . Then, the Chinese remainder theorem implies the following identity for the group completion of :
The integer is called the ramification index of the valuation.
The following definition is central for the rest of this paper.
Rational numbers , called weights.
These data are required to satisfy the following properties:
is monic in of degree ;
, for and ;
and for ;
We endow with the weighted valuation defined by and for . We demand that:
, for ;
, for .
The tower is said to be reduced when for . Unless explicitly stated, the towers in this paper will be almost reduced in the sense that for .
The weights will also be called the contact slopes, in reference to the slopes of the corresponding Newton polygons; see section 7.3. When a contact tower is almost reduced then holds. The degree of the tower is .
Example
Example
We introduce another independent variable of weight and subject to the constraint . We also define the ideal
and the corresponding quotient ring
In the following paragraphs, we show that is effective for computations with finite truncation orders in and . For this, we adopt the point of view of standard bases, while doing the proofs from scratch for completeness. We recall that the lexicographic ordering on is defined as follows:
We also introduce a total ordering with
on the group by
The ordering is a monomial ordering in the sense that
implies
for all . The leading monomial of with respect to this ordering is defined to be the largest monomial with a non-zero coefficient in . The set of monomials spanned by the leading monomials of the elements of an ideal is written . Note that . With the terminology of [28], the ordering is called a negative weighted degree lexicographic local ordering.
A standard basis of an ideal with respect to the monomial ordering is a set of generators such that the leading monomial of any polynomial in is a multiple of the leading monomial of at least one of the . In other words, is generated by . A standard basis is said to be reduced whenever none of the non-leading monomials in the belong to .
For the completeness, we now prove two well known lemmas from the theory of standard bases.
Proof. Since are independent of , it suffices to prove the lemma in . According to the assumptions, is monic of degree in , and for all and . Therefore,
for . The lemma follows from general standard basis theory since the leading monomials of the share no variable. For completeness, we give a dedicated proof.
Let us prove by induction on that is a standard basis for the ideal in . This clearly holds for . Let us assume that the induction hypothesis holds for some and consider . If , then is a multiple of . Otherwise, we write
with and . Then
so belongs to the ideal of . By the induction hypothesis, is a multiple of for some , whence so is . It follows that is a standard basis. The fact that it is reduced is clear from degree considerations.
For , we define
where stands at position and at position . Note that the dot product is identically zero. For , the initial form of , still written , is defined as .
Proof. We prove the lemma by induction on . For , we have nothing to prove, so assume that . Extracting homogeneous components, we may assume without loss of generality that
whenever and . By the induction hypothesis, we may also assume that . Long division of by yields
for homogeneous polynomials with , for .
Reducing the relation modulo , we obtain
Since is monic in , it follows that , and thus that . Consequently, we obtain
which implies
Let . If , then is homogeneous. Otherwise, we have
so is also homogeneous. Each can be expanded with respect to :
with . Then we have
which implies for all . We conclude by applying the induction hypothesis.
Proof. We expand each with respect to the variable :
For all , we get
so Lemma 3.5 ensures the existence of homogeneous polynomials in such that
Letting , we deduce that
Since the are homogeneous, up to replacing the by their homogeneous components of suitable valuation, we may assume that
the are homogeneous,
holds for all with and ,
holds for all with and .
For , we introduce the vectors
where stands at position and at position , so the dot product is identically zero. We set
Using the fact that , we conclude that
Proof. Let , so there exist with
We repeat the following operations:
Let . Since , we always have . If , then we obtain a relation
where is the non-empty subset of indices such that , so we are done.
Otherwise , hence . The latter relation can be lifted to with for , by Lemma 3.6.
Replace the vector by , and go to step 1.
Thanks again to the assumption , the relation holds after each iteration. Furthermore, the value of strictly increases, so the process converges. We conclude that .
Proof. Assume that belongs to . Then , so Lemma 3.7 implies that for some .
From Proposition 3.8, we know that an element of can be uniquely represented by a polynomial of partial degree in for . We call the canonical representative of .
We introduce contact towers as a tool for the local resolution of polynomial equations. For this, we will often reduce to the case when all the roots of the polynomial are in the local region of interest. Such polynomials are said to be “clustered”:
Example
The theory of standard bases comes with algorithms to compute modulo ideals given by standard bases. We now detail how to perform such computations in the case of .
Additions, subtractions and scalar multiplications are straightforward, but other operations require an appropriate treatment of “carries” within -adic expansions. For the contact coordinates of Example 3.3, let us briefly illustrate how carries occur during multiplications.
Example
Let us first illustrate the computation of a product modulo :
Doing a direct polynomial multiplication, we obtain
which is not in canonical representation since the degrees in and are too high. We thus have to rewrite
and
At the end, this leads to the following canonical representation for modulo :
The canonical representative of an element in can uniquely be written as
where satisfies for . Similarly, the canonical representative of another element can be written as
Now assume that for sufficiently large values of . Then we may regard as a univariate polynomial in : the “degree of in ”, written , is defined as the largest integer such that . We say that is “monic of degree in ” when and for .
Now we ask whether we can define and compute a generalized Euclidean division of by . The answer is “yes” under suitable assumptions. More generally, the following lemma shows that there exists a unique -adic expansion of .
and such that for all .
Proof. This lemma is a reformulation of what we have already proved with contact coordinates. In fact, it suffices to increase the height of the tower by one, to set
, and to assign any weight to the new variable . Therefore, the canonical representative of the image of in is given by
where for . Consequently the above -adic expansion of exists with .
As for uniqueness, let the be as in the statement of the lemma, and let us write them
with . The must satisfy
that implies
It follows that the do exist and are uniquely determined by the canonical representative of in .
Example
We have
Therefore the division of by writes with and .
In what follows, we will restrict ourselves to computations with “polynomials” in
instead of “series” in . Elements in can be represented canonically by polynomials of partial degrees in for . In order to alleviate terminology, we call elements in contact polynomials, in which case we always assume that is represented canonically as a polynomial in with ; we will also call this the contact representation. At the same time, we will keep the terminology of “canonical representatives” whenever we need to carefully distinguish between and its actual polynomial representative .
By what precedes, we may recursively expand elements in with respect to until . However, from a computational point of view such recursive -adic expansions are expensive. Indeed such expansions are reminiscent of computations modulo triangular sets, so it would be interesting to examine whether the algorithms of [45] could be adapted or not. In this subsection we follow another direction that leads to efficient algorithms. The key idea is to rewrite elements in with respect to the plain coordinates and . For this purpose, we introduce the following polynomials:
Note that is monic of degree . The change of representation is presented in the following lemma:
Proof. We introduce the following auxiliary evaluation morphism over :
For , we have
so and is well defined.
Let us prove by induction on that is bijective. This is clear when , so assume that . Let be of degree for some integer . The -adic expansion of yields a polynomial
such that and for . Next we recursively compute for . This yields
with . This proves that is surjective.
Now let be non-zero. Since , we must have , that is . The induction hypothesis implies that .
As seen in the proof of Lemma 3.15, the isomorphism corresponds to a cascade of -adic expansions for . We begin with recalling known costs for univariate expansions over an effective ring .
Proof. Without loss of generality, we may assume that for some integer . We compute using operations in . We divide by , so with and . Then we compute the -adic expansion of and in a recursive manner so the expansion of is obtained by merging those of and . The depth of the recursive calls is . The sum of the costs of the operations at depth is , whence the claimed bound.
Proof. Without loss of generality, we may assume that for some integer . We compute with operations in . In a recursive manner we compute and , and finally we compute with operations in . The rest of the complexity analysis follows as in the proof of Lemma 3.16.
Remark
Proof. Let be of degree . Its -adic expansion takes operations in by Lemma 3.16. Then, we perform calls to in degree . A straightforward induction gives a total complexity bound
The backward conversion makes use of Lemma 3.17, and the complexity analysis is similar.
Proof. The product is computed via the following formula:
By Proposition 3.19 the cost of the conversions amounts to . Multiplying and modulo incurs .
For actual machine computations, we only work with truncated power series. The decision of whether it is more efficient to use contact representations or the plain representations in depends on the truncation order. For sufficiently small orders, the “carries” can be neglected, which makes it more efficient to conduct computations directly in the contact representation. For large orders, and thus for asymptotic complexity analyses, the overhead of the conversions using isomorphism (3.2) becomes small, and it is more efficient to perform arithmetic operations in . Until the end of the paper we perform most of the computations directly in , and thereby minimize the number of conversions.
The isomorphism (3.2) also allows for efficient Euclidean divisions in with respect to , in the sense of Lemma 3.12. In fact, let and be as in the lemma, and compute the division of by :
where . The degree in of the canonical representative of is therefore . It follows that equals the remainder of Definition 3.13. Since both and have finite degree in , we note that this also yields an easier way to define the division in comparison to Lemma 3.12. In particular, the assumption that is not needed.
Proof. The division is computed as above via
By Proposition 3.19 the conversions take . Dividing by modulo incurs .
Recall that represents the valuation semi-group of the contact tower
Proof. For of canonical representative , we set
We need to verify that actually defines a semi-valuation in .
If is another element of of canonical representative , then it is straightforward to verify that . As for the product, we compute the long division by the standard basis thanks to Proposition 3.8:
where is the canonical representative of , so . The latter long division begins with setting and then it successively subtracts polynomials of the form from where , , , and . Since the monomials in have valuation , it follows that
This shows that . Since , we deduce that .
We write for the partial valuation in of . The valuation in of an element of will be the valuation in of its canonical representative. In the canonical representation, the degrees of the being bounded, the valuation in of an element in can be related to in terms of the . The following bounds will be useful when converting between the canonical and plain representations.
Proof. Assume . There exists a monomial of the form in . Using and for , we verify that
and then that
The following lemma asserts that preserves the valuation in .
Proof. For any element , the inequality clearly holds. Conversely, for any , we have . It follows that
whence the first assertion. The second assertion is a consequence of the fact that is a -isomorphism; see Lemma 3.15.
The next lemma relates valuations and precisions of approximations of and .
Proof. Lemmas 3.23 and 3.24 give us
(3.4) |
In particular, if then . As for the second assertion, the inequalities (3.4) are equivalent to
In particular, if then .
Remark
For simplicity we will not use this refinement in the sequel.
The usual Hensel lemma asserts that if a monic polynomial factors into two monic coprime polynomials and modulo , then there exist unique monic polynomials and in such that , , and . In addition, and can be obtained with a softly linear cost in the output size.
A variant of Hensel lifting is the Weierstraß preparation theorem, in which case and are no longer monic, but is invertible as a power series in . We will generalize these two kinds of lifting to the contact coordinate framework.
Throughout this section, , are elements in , regarded informally as “polynomials” in the main variable . We will assume that holds for a “sufficient” initial precision, and that are “pairwise coprime”. We want to lift into so that holds up to a required precision. The case when is monic and
corresponds to the multi-factor Hensel lifting. The case when and
is called the Weierstraß normalization of .
Let be the canonical representative of . We recall that , , and is the image of in . If is a non-zero element in that is monic in , then represents the remainder in the division of by , as specified in Definition 3.13.
Let be clustered (see Definition 3.9) at and of degree in . Given with , its inverse modulo , whenever it exists, belongs to for some . In order to determine a bound for , consider satisfying
,
is an integer ,
.
Lemma 3.23 yields
If , then setting leads to
So we may divide by and subtract from in order to get a “simplified” modular inverse of that satisfies
(4.1) |
If , so that , then multiplication of by also reduces to the case when (4.1) holds. In general, this shows that modular inverses can always be normalized in the sense of the following definition:
,
satisfies ,
.
If , then we say that is the normalized initial inverse of modulo .
The existence and the computation of such inverses are postponed in section 7.1. The next definition concerns the special case when belongs to .
satisfies ,
.
Proof. We have . Definition 4.2 also yields
Concerning the uniqueness, if represents a normalized initial inverse of then
and therefore , whence .
Proof. We extend the contact tower with and apply Lemma 4.3 in order to obtain the equality for the valuation. As for the uniqueness let represent another normalized inverse modulo . We have and thus , whence .
We explain how to increase the relative precision of a normalized modular inverse, in terms of the contact coordinates.
is clustered at of degree in ,
,
is a normalized inverse of modulo with relative precision .
Then, there exists a unique normalized modular inverse of with relative precision such that . More precisely, with and
we have and
Proof. Let represent an unknown in with , and which satisfies
(4.2) |
This equation is equivalent to
and, by Lemma 4.4, to
Hence
We have , and therefore . Lemma 3.23 implies that
so can actually be divided by . We conclude that is the unique solution of (4.2), whence fulfills all requirements.
Proof. Thanks to repeated applications of Proposition 4.5 we can construct the initial inverse of modulo with any finite relative precision. The existence of follows from the completeness of .
The next corollary addresses the precision loss of the initial inverse of modulo when and are truncated modulo .
Proof. Let
represent the truncations of of and modulo , and let be the smallest element of larger or equal to . Thanks to repeated applications of Proposition 4.5 we can compute the initial inverse of modulo with relative precision .
Since and , we have and therefore . From
we deduce that
It follows that and then that
Using , we obtain that
hence
Lemma 3.23 implies that
Thanks to the value taken for it follows that
whence .
We now turn to the Weierstraß normalization of an element . The following definition gathers the necessary technical conditions and data structures.
If , then we say that is an initial Weierstraß context for .
The Weierstraß lifting step summarizes as follows.
we have and
Letting
we also have and
Proof. Consider the unknowns and such that and
It follows that
Lemma 4.4 and the constraints on valuations and precisions equivalently yield
whence
Then Lemma 3.23 gives
This shows that exists and is uniquely determined by
The formula for is straightforward and the one for follows from Proposition 4.5.
Proof. This follows from Proposition 4.9 and the completeness of .
Proof. We introduce the truncation of modulo , and set to the smallest element of larger or equal to . The quadruple , , , is an initial Weierstraß context for . From Proposition 4.9 we know that we can compute the Weierstraß context , , , for with relative precision , so that and
According to Corollary 4.6 we may consider the modular inverse of modulo , so that . Hence
and
Lemma 3.23 implies that
Since and are monic of the same degree in we deduce that .
The above formulas for the Weierstraß lifting can be applied directly in , but for the sake of efficiency it is worth using plain coordinates. As a technical complication, conversions between contact and plain coordinates result in precision loss. Fortunately, this loss is sufficiently small so that it has no serious impact on the complexity of our top-level factorization algorithm. In the following algorithm, the input and output polynomials use plain coordinates. However, the relative precision , to be doubled during a lifting step, refers to the contact coordinates.
Algorithm
in modulo , such that the elements for , , and form a Weierstraß context for with relative precision such that for and .
Set .
Compute in .
Compute and in .
Compute in .
Compute in .
Compute and in .
Return .
Proof. The hypotheses of Proposition 4.9 are satisfied. We let
Lemma 3.25 implies
We have seen in Proposition 4.9 that , whence by Lemma 3.24. Consequently is well defined. With the notation of Proposition 4.9 we verify that
and
By Proposition 4.9, properties
In a similar fashion we verify that
so we have
By Proposition 4.5, property
Applying successively Algorithm 4.1 several times enables us to lift any such initial context to any requested precision. The cost is summarized in the following corollaries.
operations in , where and is the degree of the contact tower.
Proof. We convert the input data into the plain representation modulo using Proposition 3.19, with operations in .
We successively apply Algorithm 4.1 to increase the relative precision from to , for . By Proposition 4.12, the total cost of the lifting contributes to
At the end of the lifting, we convert the polynomials to contact coordinates modulo via Proposition 3.19, again with operations in .
operations in , where is the degree of the contact tower.
Proof. The truncation of at precision does not depend on , as long as the initial Weierstraß context properties are preserved. In particular we may set to the largest slope of (which is if is a power of ), so we have where , whence
(4.3) |
We use Corollary 4.13 with relative precision , as in the proof of Corollary 4.11. The running time is
which yields the claimed bound thanks to inequality (4.3) and
We now turn to the lifting of a factorization of an element , assuming that suitable approximate modular inverses are known. The following definition gathers the necessary technical conditions and data structures.
Informally speaking, the assumption that admits a normalized initial inverse modulo for corresponds to the idea that are “initially coprime”. We revisit the classical Chinese theorem in this context.
Proof. Let us write
By construction this yields
(4.4) |
for . Assume by induction that there exists such that
(4.5) |
holds for some , which is indeed the case for by (4.4). Combined with (4.4) for , there exists such that
(4.6) |
Since is initially invertible modulo , Corollary 4.6 yields the existence of the initial inverse of modulo , so there exists such that
Combining the latter equality to (4.6) gives
thanks to Lemma 4.4 and
Given clustered at , we can increase with and . The contact tower obtained in this way corresponds to the quotient ring : in the sequel is endowed with the semi-valuation induced by .
is a -linear isomorphism and we have , where
Proof. It is clear from the assumptions that the map is well defined and -linear. Let
From Lemma 4.4 we have
so Lemma 3.23 implies
If follows that belongs to and that . By construction we have
that proves that is surjective.
Let be in the kernel of . There exists such that for . By Lemma 4.16 we deduce that
whence . Consequently is injective.
The Hensel lifting step goes as follows.
for , we have ,
Letting and
we also have and
Proof. For , let us consider unknowns in such that and
After expanding the right-hand side of the latter equation, we obtain equivalently that
(4.7) |
By Proposition 4.17, equality (4.7) is in turn equivalent to
For , Lemma 4.4 and the constraints on valuations and precisions then yield
whence
Then Lemma 3.23 gives
For , this shows that is uniquely determined by
whence satisfy the required properties. We finally remark that
for , so the formulas for the follow from Proposition 4.5.
Proof. This follows from a repeated use of Proposition 4.18 with increasing precision.
Proof. We introduce the truncation of modulo and let be the smallest element of larger or equal to . By assumption, form an initial Hensel context for . From Proposition 4.18 we know that we can compute the Hensel context for with relative precision , so that and
Since is the initial inverse of modulo , Corollary 4.6 ensures the existence of the modular inverse of modulo , which satisfies
It follows that
whence
Lemma 3.23 implies that
Since and are monic of the same degree in we deduce that .
Hensel lifting is performed by the following algorithm that is dedicated to doubling the relative precision of a Hensel context.
Algorithm
in modulo , such that the elements , , and for form a Hensel context for with relative precision .
Set , and .
Compute in , for .
For :
Compute in ,
Compute and in .
Compute in .
Compute in for .
For , compute in .
For , compute and in .
Return .
Proof. The hypotheses of Proposition 4.18 are satisfied. We let
Lemma 3.25 implies
We have seen in Proposition 4.18 that , whence by Lemma 3.24. Consequently is well defined for . With the notation of Proposition 4.18 we verify that
By Proposition 4.18, properties
In a similar fashion we verify that
From Proposition 4.18 we know that divides , so it divides . Consequently is well defined for , and we have
By Proposition 4.5, property
Concerning complexities, from Definition 4.2 we first observe that
for . Consequently steps 2, 4, and 5 take
operations in using the sub-product tree technique; see [26, chapter 10, Theorems 10.6 and 10.10], for instance. The other steps require further operations in .
Applying successively Algorithm 4.2 several times enables us to lift an initial Hensel context to any requested precision. The cost is summarized in the following corollary.
operations in , where is the degree of the contact tower.
Proof. We convert the input data into the plain representation modulo using Proposition 3.19, with operations in .
We successively apply Algorithm 4.2 to increase the relative precision from to , for . By Proposition 4.21, the total cost of the lifting contributes to
At the end of the lifting, we convert the polynomials to contact coordinates modulo using Proposition 3.19, again with operations in .
operations in , where is the degree of the contact tower.
Proof. We use Corollary 4.22 with the relative precision as in the proof of Corollary 4.20. The running time is
Then we verify that
Using the cost of the lifting simplifies to .
In this section we introduce the notion of “separability” for contact towers. This will allow the construction of derivations on contact towers, which will be the key ingredient of the central shift algorithm in section 7.7.
Informally speaking, a contact tower is said to be separable when the initial forms of the its defining polynomials are separable. The precise definition is as follows.
Throughout this section, we assume that is effectively separable. For , represents the initial inverse of modulo . More precisely, we assume that is homogeneous and satisfies , where . From Definition 4.1 we know that
since .
Example
where stands for remainder with respect to the variable .
Example
Indeed, we verify that
Since the map is a -isomorphism, from Lemma 3.15, the derivation on induces a derivation on (that is still denoted by for simplicity):
The separability assumption ensures that this derivation satisfies several convenient properties.
Proof. We prove the result by induction on . For we have
and
For we have
By Lemma 4.3, the separability assumption yields
Combined with the induction hypothesis we deduce
On the other hand, for we have
and therefore
We now study the effect of several consecutive differentiations in .
Proof. The inequality follows from
Lemma 5.4, and the inequality
for .
Proof. Writing , we have
Then, for , we have so Lemma 5.5 yields
On the other hand,
(5.1) |
so Lemma 5.4 implies
and
Proof. First note that
holds for all . We prove the lemma by induction on . The result is clear for , so assume that . The induction hypothesis implies that
(5.2) |
for some such that
Differentiating (5.2) with respect to yields
(5.3) |
Since does not depend on , the initial form of also does not depend on . It follows that
whence
(5.4) |
Equation (5.2), the assumption on , and the definition of imply that
(5.5) |
By combining (5.3), (5.4), and (5.5) we deduce
(5.6) |
On the other hand Lemma 5.6 gives us
(5.7) |
We conclude the proof by combining equations (5.6) and (5.7).
Canonical representations are not always the most efficient ones for computations with initial forms. This can be already observed in the case when . Indeed, let us write
with and for . Let and be coprime integers such that
Then, the coefficient is zero whenever is not a multiple of . This shows that is sparse in the sense that it contains at most non-zero terms besides . In particular, computations that use the dense representation are deemed to be suboptimal.
Assume for instance that we need to compute the valuation and the initial inverse of . We first extract the initial part of its canonical representative ; there exist and such that
where . Note that is again sparse. We now have to compute the Bézout relation of the specializations at of and in . Without exploiting the sparsity, this computation takes operations in . In this particular case, the remedy is to compute with respect to instead of , while exploiting the fact that and are dense polynomials in .
In order to generalize this remedy to the case when , we show in this section how to rewrite sparse homogeneous polynomials in into suitable products of coefficients in “algebraic towers” over and “monomials”.
In all computations below, will be an effectively separable contact tower (as in Definition 5.1) that satisfies the following additional property.
This regularity assumption implies that is determined by
An algebraic tower over is a sequence with and , for and monic polynomials . We will write for the image of in and set for . The tower is said to be effectively separable when we are given and in of respective degree and such that the Bézout relation
holds, for . The next definition concerns the alternative representation of homogeneous polynomials modulo .
An effectively separable tower
where is monic of degree in . The class of in is written . For the inverse of exists and is known.
A tower of purely ramified extensions of , written
where are positive integers called ramification indices,
for , and is invertible in for . The class of in is written .
and a uniformizing parameter such that , where , for .
coprime with along with integers and such that and , for .
The construction of an initial expansion associated to a contact tower is achieved by induction on . This subsection is devoted to the case when . As in the introduction of this section, we write
with and for . Note that because the tower is regular. As before, we let and be coprime integers such that
We define
where . Note that whenever is not a multiple of . The inverse of is:
With and , the map
is well defined because
Let us now show how to compute conversions via . Let be homogeneous of valuation and write
with . Then the formula
allows for the computation of without any arithmetic operations or zero tests. This also shows that is an isomorphism.
Assume that two elements and in with have the same valuation, that is
If (that corresponds to ), then so and therefore . Otherwise we have
and and are coprime. So divides , whence and . In other words, any homogeneous element in can be written in a unique way as with , , and .
Now consider the Bézout relation between and , with and . The element
has valuation . From
and
we obtain formulas to rewrite and in terms of :
Consequently is a uniformizing parameter of , whose valuation group is
and . In particular, is a purely ramified extension of . It remains to make effectively separable. To this end, we first compute
Let and be such that and let be such that . Then we have
Necessarily and is the inverse of . From this inverse we easily recover the Bézout relation of and , that makes the tower effectively separable.
The next lemma deals with the construction of an initial expansion associated to a contact tower. We extend the above construction for .
is a -algebra isomorphism, for . We set . In addition, with , has valuation group
The algebra inherits the grading of . We still write for the semi-valuation induced over , so and for . Any homogeneous element of can uniquely be written as , where and
Proof. We prove the lemma by induction on The case has been addressed in the previous subsection, so we assume that and recall that is a uniformizing parameter of . We write
where is homogeneous for . Then we define
where and , for . We introduce
so we have
(6.2) |
Since the tower is regular, is invertible. Since is homogeneous, we have whenever is not a multiple of and
for . The latter equation is equivalent to
We define as
and
(6.3) |
The inverse of is then given by
(6.4) |
From the induction hypothesis, can uniquely be rewritten as
where is invertible in and . We also have
so Lemma 3.23 further yields
Inside , the following equalities hold:
which shows that is well defined.
Let be homogeneous of valuation , such that for , and let us write it in the form
with homogeneous in and . Then
shows that it is straightforward to compute recursively, and that is a -algebra isomorphism; an explicit recursive formula for will be given in the proof of Proposition 6.4 below.
Now assume that two elements and , with , have the same valuation, that is
or, equivalently
Since , from Definition 3.1, , and since and are coprime, divides , whence and . In other words, any homogeneous element in can be uniquely written with , and .
Let
be the Bézout relation of and , with and . The element
has valuation
On the other hand we verify that
(6.5) |
and
(6.6) |
Consequently, the valuation group of is
and is a uniformizing parameter. In addition we have
whence
(6.7) |
In order to show that is separable, we verify that
Let and be such that and let be such that . Then we have
It follows that and
whence
(6.8) |
From this inverse we easily recover the Bézout relation of and so the tower is effectively separable.
Before turning the above construction of the initial expansion into an algorithm, we study the costs of the conversions and . We recall from section 1.2 that products in take operations in .
operations in . Conversely, given with , we can compute
with the same cost bound. In addition, if has degree in and if divides , then we can compute using
operations in .
Proof. Let denote the canonical representative of . There exists such that and
For we recursively compute with . Then we verify
Recall that the inverse of is at our disposal and that the belong to . So we need to compute using binary powering and fast tower arithmetic. Then, we multiply this quantity by . These products require
operations in . Since and , we may simplify
Let be the cost of evaluating at any valuation . We have shown that
whence
The above formulas can be read in reverse order for performing a backward conversion , with a similar cost; note that .
The second assertion of the proposition corresponds to the special case where , which leads to the cost via the following formulas:
Having shown how the conversions and can be computed efficiently, let us now turn to the incremental construction of an initial expansion. We keep the same notation as in section 6.3.
operations in .
Proof. The case has been detailed in section 6.1: it takes
arithmetic operations in . By induction on we may assume that the initial expansion has been computed up to height . We write
with the homogeneous in . Since and , Proposition 6.4 allows us to compute for using
(6.9) |
operations in . This is sufficient to obtain .
If stands for the normalized initial inverse of , then we can compute . Hence
so the computation of the inverse of requires one evaluation of at and products in . The inverse of is then obtained via (6.4) with operations in . The cost of these two tasks does not exceed the bound (6.9).
The computation of the inverse of modulo then requires one evaluation of at the initial inverse of , then products in , and products in , by using formula (6.8). The second cofactor of the Bézout relation of and , namely , requires further operations in .
By using formula (6.7), the computation of from takes
operations in , that is operations in . The sum of the costs for all levels of the tower is bounded by
In this section we apply the lifting algorithms of section 4 in order to compute so-called Newton factorizations of a polynomial that is clustered at (Definition 3.9). These are partial factorizations that are related to the contact Newton polygon of with respect to the current contact coordinates (Definition 7.7).
Until the end of the paper, contact towers will be effectively separable (Definition 5.1) and regular (Definition 6.1). Since we occasionally will have to manipulate multiple contact towers at multiple levels, it is convenient to
regard an element as an element in any other via the natural isomorphism ;
write
for the initial form, the valuation, and the truncation of , when regarded as an element in ;
given , write
for the initial form and the valuation of in .
Since we assumed from the outset that we have an algorithm or oracle for factoring univariate polynomials over , we are interested in factoring elements of into irreducible factors. There is a corresponding notion of irreducible contact towers and, thanks to our oracle, all contact towers that we will need for our main factoring algorithm can be forced to be of this type.
In view of the initial expansion and of a contact tower , we observe from Lemma 6.3 that is irreducible if and only if is a field. Equivalently, is a tower of field extensions. In this case, any non-zero element in admits a unique normalized initial inverse.
Proof. If is reducible then their exists a smallest index such that admits an initial factorization regarded in . This initial factorization yields an initial Hensel context that can be lifted into a non trivial factorization of by Corollary 4.19.
Conversely assume that is irreducible and let be a factor of . Then, initially divides , hence cannot be a non trivial factor of .
The next lemmas are devoted to the complexity of initial inversions.
operations in .
Proof. From Lemma 3.23 we know that . The computation of
takes
operations in by Proposition 6.4. Then we compute in time
Proposition 6.4 allows us to obtain
with further operations. Since , Lemma 3.23 implies . We verify that
by using identity stated in Definition 6.2. It follows that . After multiplying or dividing by a suitable power of we obtain the normalized initial inverse of .
Proof. We increment the tower with . The extended tower is not necessarily separable or irreducible because of its top level, but this does not prevent from building the corresponding incremented initial expansion with the difference that is not a field extension of , that is not even necessarily separable. By Proposition 6.5 this “almost initial expansion” incurs operations in . The conclusion follows from Lemma 7.3: still writing , the required initial modular inverse exists if and only if is invertible in .
The following lemma asserts that is clustered at any for as soon as it is clustered at .
Proof. Note that is monic in of degree . Therefore is monic in of degree when regarded in , for . The rest of the proof is done by induction on from down to . The case corresponds to the hypothesis of the lemma. Now let us assume that holds for some , and consider the contact representation
in , with
for . It follows that
where the second inequality is strict for . Consequently, .
is an effectively separable, regular, and irreducible contact tower for ;
and for ;
is a power of the last contact coordinate of for ;
(this equality can be regarded equivalently in any for ).
Consider a contact polynomial
with for and . The Newton polygon of is the lower border of the convex hull of the set of pairs with and . More precisely, is a broken line with vertices , where
,
for ,
for all such that , the point is on or above the Newton polygon.
Any determines an edge between the vertices and , of slope . The set of points above the Newton polygon is convex. When we have , so the slope of the first edge is . In order to establish the usual relationship between and the Newton polygons of the factors of , we introduce the following definition.
The following lemma extends a special case of a classical result about Minkowski sums of polytopes due to Ostrowski [63] (translated in [65], and revisited later in [64]). In our variant we need to take care of “carries” involved by the contact arithmetic.
In addition, the contact polynomial
satisfies for and for .
Proof. First of all, note that the hypothesis on the slopes guarantees that the region of the plane above the Newton polygon
is actually convex.
Let be a point above . For all , we have
(7.1) |
Similarly, for any point above and for all we have
(7.2) |
Since the slope of the edge is smaller than the slope of , for , we obtain
Combining the latter inequality with (7.1) leads to
which means that is above the line spanned by and . Similarly, since and since the slope of the edge is smaller than the one of , we obtain
for . In combination with (7.2), this yields
so is above the line spanned by and . So far, we have proved that is above , for all and .
Since and are invertible, for in , Lemma 4.3 yields
Now consider the contact polynomial with , so we have and . Because the slopes of are , the point is strictly above .
Let us fix to a value different from the slopes of and . Let us assume first that is less than the smallest slope of . If is less than the largest slope of we let to be the largest integer such that is less than the slope of , otherwise we let . Let be the corresponding valuation induced in : for and ; we write for the corresponding initial part. We verify that
Consequently, Lemma 4.3 implies
belongs to the Newton polygon of , and .
Assume now that is greater than the smallest slope of then we let to be the first integer such that is greater than the slope of . Using a similar argument as above, we may prove that
(7.3) |
belongs to the Newton polygon of , and that . This concludes the proof.
be a contact polynomial with the and truncated modulo with . Then, the effectively regular Newton polygon of can be computed using
operations in .
Proof. We first compute the initial expansion of , that contributes to from Proposition 6.5. Set in . In order to compute the valuation of we run over all its homogeneous components in in increasing valuation order. Up to precision , the number of such components is . Each such component has terms. Overall the number of zero tests in is .
From the valuations of the , the computation of the Newton polygon does not involve arithmetic operations in , but bit operations (with the usual “divide and conquer” algorithm). Finally, for a vertex of abscissa of the Newton polygon we need to compute the initial inverse of . For this purpose we extract and appeal to Lemma 7.3.
Let be clustered at given with its effectively regular Newton polygon . We are to show that each edge of gives rise to a factor of .
Algorithm
Let be the abscissas of the vertices of the Newton polygon, as in Definition 7.7. The normalized initial inverse of is part of the input for .
Contact polynomials modulo , clustered at , such that , admits a single Newton polynomial that coincides with the -th one of , for .
If then return .
Let and set , where is the slope of the edge between abscissas and .
Compute , , , .
Via Corollary 4.14 called with precision , compute contact polynomials and in modulo such that , is clustered at , , and .
Recursively call the algorithm with input : the vertices of the Newton polygon of are and the normalized initial inverses are rescaled by suitable powers of .
Recursively call the algorithm with input : the vertices of the Newton polygon of are , with normalized initial inverses .
Return the union of the sets of factors returned by the above recursive calls.
Proof. If then the algorithm is clearly correct. From now assume . By definition of the effectively regular Newton polygon, the value of occurring in step 3 writes as
From and for , Lemma 4.3 yields
Then Lemma 3.23 implies , hence step 3 computes an initial Weierstraß context for .
Let and be as in Corollary 4.14: , , and hold in step 4. From Lemma 7.8 we know that the Newton polygon of a is the Minkowski sum of those of and (up to the occasional vertex at infinity of and ). Since the vertices of the Newton polygon of have valuation in (or infinity), so are those of the polygons of and .
Let be the first index such that . From , Lemma 3.23 implies , whence
(7.4) |
It follows that the Newton polygon of coincides with the one of for , and that these polygons are effectively regular, with the initial inverses as in steps 4 and 5.
In step 3, for , we compute with operations in thanks to Proposition 3.20. The same cost applies to the computation of in step 5. By Corollary 4.14, and since , the cost of the lifting in step 4 is
The depth of the recursive calls is , so the complexity bound follows from a standard induction.
Proof. Since the tower is irreducible, the Newton polygon of can be made effectively regular, thanks to Lemma 7.3. Consequently the existence of the distinct-slope factorization of follows from Proposition 7.10.
Given a distinct-slope factorization , by Lemma 7.8 the slopes of the are those of the Newton polygon of . If is set to the opposite of the slope of then is a Newton polynomial of of slope (up to a power of and up to a factor in ). The uniqueness of the thus follows from the uniqueness of the lifting of the distinct slope factors.
Consider the factorization of an element whose Newton polygon has a single edge with finite slope. We have already seen that an initial factorization into pairwise coprime factors of lifts into a factorization of . We now explain how to obtain this initial factorization. The contact polynomial is assumed to be truncated modulo with .
We assume that the initial expansion of the contact tower has already been computed. We extend the map (defined in Lemma 6.3) as follows:
We set to be the opposite of the unique slope of the Newton polygon of
Note that . Let
(7.5) |
with prime to and let . Note that is an integer. In the next subsection we shall see that the notation is consistent since will be the “next ramification index”.
We compute with , for , and construct
so we have
(7.6) |
We factor
where each is a power of a monic irreducible factor and the are pairwise coprime. For , we let and
(7.7) |
We compute using
where stands for the coefficient of in .
Proof. The first assertion is clear by construction. The second assertion follows from the fact that is a ring isomorphism that preserves the valuation.
We next compute the modular inverses
for . Let us write the expansion of as follows
let be the smallest integer such that is a multiple of and set
From (7.5), we deduce
Recall from Definition 6.2 that . We further set
so we have
From
we deduce that
whence
After a division by a suitable power of , we deduce the normalized initial inverse of modulo for .
The following algorithm makes use of the separable factorization of univariate polynomials: see [54]. In the case of characteristic zero or sufficiently large, that holds in the present paper, the separable factorization coincides with the squarefree factorization.
Algorithm
A factorization of into clustered polynomials at modulo , each has a single edge of slope in its Newton polygon and the associated Newton polygon is the initial power of an irreducible polynomial.
The characteristic of is zero or .
Compute and such that .
Factor , where are pairwise coprime powers of irreducible factors of : this can be done by computing the separable factorization of and then the irreducible factors of the separable ones.
For compute .
For compute as defined in (7.7).
For compute as defined in (7.8), and set .
Lift the initial factorization of into to precision by using Corollary 4.23 at precision .
Return modulo .
operations in , where is the degree of the separable part of .
Proof. From the above discussion the required initial Hensel context is known when entering step 6, so lifting is possible thanks to Corollary 4.23. Using Lemma 3.23 we verify that
It follows that the Newton polygon of modulo has a single edge of slope . We are done with the correctness of the algorithm.
Let . Steps 1, 4, and 5 take
by Proposition 6.4. For the factorization of in step 2, as indicated we first compute the separable factorization using operations in by [54], and then factor (which are pairwise coprime). Consequently the cost of factoring over is
Step 3 contributes to
operations in : this includes the computation of via [26, chapter 10, Theorem 10.10], the remainders by the via [26, chapter 10, Theorem 10.6], and modular inversions. Finally, the cost of step 6 follows from Corollary 4.23 and .
Proof. The existence follows from Proposition 7.14. As for the uniqueness, assume that is an equal-slope factorization of . In the same way as we constructed from in equation (7.6), we define the polynomial of degree by
for . The are powers of pairwise distinct irreducible polynomials, so they coincide with those computed in Algorithm 7.2.
After distinct-slope and equal-slope factorizations, we have reduced the general situation to the case where the Newton polygon of has a single edge and the associated Newton polynomial is an initial power of an irreducible homogeneous polynomial. This allows us to increment the underlying contact tower with a new contact coordinate at level and then to pursue the factorization of with respect to the extended tower. In order to ensure that the extended contact tower is separable, we assume from now on that the characteristic of is zero or sufficiently large.
Algorithm
An extended tower modulo , still effectively separable, regular, and irreducible, and such that is clustered at it of degree in .
The characteristic of is zero or .
Compute into the form , with .
Compute the separable factorization , where is irreducible and separable, according to the assumptions.
Set , as above, and compute
Extend the contact tower with and extend the initial expansion accordingly.
Make level of the tower effectively separable by computing the inverse of modulo .
Proof. By construction, is homogeneous of valuation in , and satisfies all the requirements of Definition 3.1. The incremented tower remains effectively regular, since the known initial inverse of straightforwardly yields an initial inverse of . We extend the initial expansion at level accordingly. The initial inverse in step 5 does exist because is separable.
Steps 1 and 3 contribute to
by Proposition 6.4. Step 2 takes operations in by [54]. The cost of step 5 is by Lemma 7.4. Finally, is initially equal to whenever , which means that is clustered at .
In principle, Algorithm 7.3 might introduce a new contact coordinate of degree one in . For complexity reasons it is better to avoid this from happening. As outlined in the introductory sections 2.5 and 2.6, we now work out the central shift algorithm.
Let be an effectively separable, regular, and irreducible contact tower. Let be clustered at . An initial root of is an element such that
If is a Newton polynomial of , then an initial root of is an initial root of regarded with set to the opposite of the slope of . One key idea behind the central shift algorithm is the following lemma, that will be used in a “divide and conquer” fashion in the subsequent algorithm.
Proof. Set . Lemma 5.7 implies
(7.10) |
Since the tower is separable, we know from Lemma 5.4 that is initially invertible, hence is an initial root of of multiplicity .
Algorithm
An effectively separable, regular, and irreducible tower ; a contact polynomial clustered at and of degree in modulo , with ; we assume that , where is initially invertible in .
An effectively separable, regular, and irreducible tower such that for , and the non-zero initial roots of the Newton polynomials of have multiplicity .
If then replace by and return .
Let and compute the Weierstraß normalization of modulo via Corollary 4.14. The initial context is made of
and the normalized initial inverse of in .
Call the algorithm recursively with input and modulo . Let be the tower obtained in return.
Compute the effectively regular Newton polygon of in modulo via Lemma 7.9.
Compute the distinct-slope factorization of in modulo with Algorithm 7.1.
If all the non-zero initial roots of the Newton polynomials of have multiplicity , then return modulo .
Otherwise, compute the factor modulo of of degree in whose initial is the -th power of a linear factor with , non-zero, and where is set to .
Let and compute the Weierstraß normalization of modulo via Corollary 4.14. The initial context is made of
and the normalized initial inverse of in .
Call the algorithm recursively with input and modulo . Return the tower obtained in the output.
Proof. If the algorithm exits at step 1, then when regarded in the returned tower. Since the initial form of the returned is the same as the initial form of the input value of , hence the returned tower is effectively separable, regular, and irreducible. The Newton polynomial of cannot have non-zero initial roots with respect to the returned contact tower, so the output is correct.
The initial Weierstraß context in step 2 follows from equation (7.10). If the algorithm exits at step 6, then the output is clearly correct. Let us now examine the situation when the algorithm does not exit at step 6.
In step 7, Lemma 7.18 ensures that is a non-zero initial root of a Newton polynomial of of multiplicity , regarded in . Since , is a non-zero initial root of a Newton polynomial of of multiplicity . As a non-zero initial root of a Newton polynomial of modulo we necessarily have , hence
by Lemma 3.23. From Lemma 4.3, we deduce that
and consequently that
It follows that is a non-zero initial root of a Newton polynomial of of multiplicity modulo , hence that . Consequently,
(7.11) |
We verify that , so . In step 8, the contact polynomial has degree in . By Lemma 7.18, inequality (7.11), and by following the same reasoning as for , a non-zero initial root of a Newton polynomial of in has multiplicity
Let us now examine the Newton polynomials of in . For this purpose, by means of Corollaries 7.12 and 7.16, we may decompose into
where has Newton polynomials with slopes , where has Newton polynomials with slope , and where has a single Newton polynomial of slope but that does not admit for initial root.
The initial of is , so its valuation is . Therefore the Newton polygon of in has a single edge of slope . We also verify that the Newton polygon of in admits a single edge of slope . Then, the Newton polygon of in is the same as in . Finally the Newton polygon of in has slopes . Consequently the non-zero initial roots of the Newton polynomials of in cannot have multiplicities . We are done with the proof of the correctness.
From Lemma 5.4 we have
Therefore, by using Proposition 3.20, the initial inverse of can be obtained with operations in from the precomputations attached to . The needed initial Weierstraß contexts in steps 2 and 8 can be obtained with operations in thanks to Proposition 3.20 again. The corresponding Weierstraß normalizations take further operations in by Corollary 4.14.
Let represent the cost of the algorithm with input of degree . In step 1, the cost is . In step 4 the effectively regular Newton polygon can be determined with cost by Lemma 7.9. Step 5 amounts to by using distinct-slope factorization and Proposition 7.10. In step 6, we appeal to the equal-slope factorization but discarding the irreducible factorizations: in fact, having a root of multiplicity is equivalent to having a separable factor of multiplicity , that can thus be read off from the separable factorization. So Proposition 7.14 provides us with a cost for steps 6 and 7. Consequently the cost of the algorithm in degree in satisfies
We conclude by a standard induction.
We are now in a position to present our top level algorithm for contact factorization. The distinct-slope and equal-slope factorizations are intertwined in order to increase the current contact tower and split the input polynomials. The process finishes once the polynomial to be factored is a power of the top level contact coordinate, up to the input precision. The central shift algorithm ensures that the “divide and conquer” approach only incurs a logarithmic complexity overhead.
The main step of the contact factorization is summarized in the following algorithm.
Algorithm
effectively separable, regular, and irreducible; a contact polynomial modulo clustered at , with .
A set of contact factors with precision for such that:
, for ;
;
is clustered at , for ;
The Newton polygon of with respect to has a single edge whose Newton polynomial is an initial power of an homogeneous polynomial of degree in ;
If the Newton polygon of has a non-zero initial root, then its multiplicity is .
The characteristic of is zero or .
Initialize with the empty set.
Compute the effectively regular Newton polygon of modulo via Lemma 7.9, and then the distinct-slope factorization of modulo by using Algorithm 7.1. Let be the set of factors obtained in return.
For each in , compute the equal-slope factorization of over by using Algorithm 7.2. Let be the set of all resulting factors along with their multiplicities.
For each in of multiplicity written :
If , then insert in .
If (so is an initial power of a polynomial of degree one in ), then call Algorithm 7.4 and append the resulting factorization to .
Return .
Proof. Properties (a) to (e) are satisfied by construction. Step 2 takes by Lemma 7.9 and Proposition 7.10. Step 3 totalizes by Proposition 7.14. Step 4 contributes to by Proposition 7.19.
Our top level algorithm finally makes a repeated use of Algorithm 8.1.
Algorithm
Initialize and with the empty set.
Call Algorithm 8.1 and let denote the returned contact factors for .
For :
If is a power of then insert into .
Otherwise, call Algorithm 7.3 with and and let be the returned tower.
If equals then insert into .
If has degree in and writes , then replace by and insert the pair into .
Otherwise insert the pair into .
Call the algorithm recursively for each element of . Include the returned factors into .
Return .
Proof. On the one hand, if the initial of is a power of a degree one polynomial, then according to the specification of Algorithm 8.1 we have
On the other hand, if is an initial power of a polynomial of degree , then
Consequently the depth of the recursive calls is . Let us analyze the valuation of . If comes from a proper distinct-slope factor or a proper equal-slope factor of then inequalities (7.4) and (7.9) ensure that
Otherwise has a single slope and its initial is separable, so , and this case does not yield a recursive call. We conclude that the algorithm behaves as specified.
Discarding factorization costs, step 2 takes operations in , by Proposition 8.1. In step 3, by Proposition 6.5, for each the initial expansion of takes , where represents the degree of . By Proposition 7.17, the cost of Algorithm 7.3 is , where denotes the degree of in its main variable . The total cost of steps 3 is
Let for denote the elements of when entering step 4. By construction we have
If represents the cost function of the algorithm (still discarding factorizations), we have shown that
and that . Unrolling the recursion times leads to
Let us now turn to the cumulated cost of factoring separable polynomials over algebraic extensions of during the execution of Algorithm 8.2. Let us show by induction on and that
(8.1) |
This is easy if , so assume that . We recall that
holds for any positive integers . Assume first that has a non-trivial distinct-slope factorization during Algorithm 8.1 and let be the degrees of in . Then the induction hypothesis implies
Assume next that the Newton polygon of has a unique slope and that the associated Newton polynomial is the -th power of an irreducible polynomial of degree , for some . Then the induction hypothesis yields
Assume finally that the Newton polygon of has a unique slope and that the associated Newton polynomial has at least two distinct prime factors. Consider the separable factorization
and let be the degrees of in . Note that and
Applying the induction hypothesis, this again yields
We conclude by induction that (8.1) indeed holds.
Proof of Theorem 1.1. Theorem 1.1 is a consequence of Proposition 8.2 by applying Algorithm 8.2 with input and the trivial contact tower of height zero.
We explain how Abhyankar's approximate roots theory could improve our contact factorization algorithm in some cases. If is a monic polynomial of degree and if is a divisor of that is invertible in , then there exists a unique polynomial of degree such that
(8.2) |
This polynomial is called the -th approximate root of . In particular, is monic and the -adic expansion of is of the form
where . Let , that is the reverse of , and . Condition (8.2) is equivalent to
which means that is uniquely determined by , whenever is a perfect field. The computation of the -th approximate root of can be done using the Newton operator if is not in : we define the sequence
A standard computation shows that this sequence converges quadratically to . The computation of by this method takes operations in . Let us now extend this construction to contact coordinates.
Proof. The condition rewrites
and we have , . Therefore is uniquely determined as the -th approximate root of .
In the context of Lemma 8.3, the -adic expansion of has the form
The algorithmic purpose of approximate roots is as follows. Suppose that
for some monic in . We can add one level to with
We write for the image of in and examine the Newton polygon of . If we had
with some , this would mean that
for some sufficiently small positive value of . In particular, the -adic expansion of would be
whence
The latter equality is not possible since it contradicts the fact that is an approximate root of .
Consequently, the Newton polygon of cannot have a single edge with a Newton polynomial of the form . Either it has at least two edges, or a single edge but the initial factors of the Newton polynomial have multiplicity . For the situations similar to the one of section 2.5 these computations are expected to be faster and easier than the central shift method.
In this section we consider a monic and separable polynomial . We are interested in computing the irreducible factorization of modulo for some requested precision . Our strategy naturally relies on computing a contact factorization of for a sufficiently large precision. We begin with analyzing the precision loss induced by the distinct slope and equal-slope factorizations.
Let be monic and separable, and let be a contact tower. Let ()¯ denote an algebraic closure of , we still write for the extended valuation.
Proof. From Lemma 7.5 we know that is clustered at , hence
where . Since , necessarily holds.
Assume that the lemma holds up to some index . From Lemma 7.5, the contact polynomial is clustered at . Let us canonically write
where and . By induction we have
for . Since
necessarily holds. Let be canonically written
with . Thanks to the induction hypothesis, we verify that
Finally the lemma holds for index .
If is a separable, regular, and irreducible contact tower, then Lemmas 4.3 and 7.3 imply that is a valuation of that extends .
for all in .
Proof. Proposition 7.2 ensures that is irreducible. By setting to infinity we obtain that is a valuation of . The uniqueness and the resultant-based expression are well known; for instance, see [53, chapter XII, Corollary 6.2].
Let be monic in and clustered at an effectively separable, regular, and irreducible contact tower . We assume that is larger than or equal to the smallest slope of the Newton polygon of . As before, stands for the image of in , whose degree in is written .
Proof. Poisson's formula for resultants yields
Thanks to Lemma 5.7, we deduce:
(by Lemma 9.1) | |||
Next, we consider and monic in . Let and stand for the canonical representatives of and in , of respective degrees and in . In the sequel, we define to be the constant coefficient of , when regarded as a univariate polynomial in .
Proof. Again, we use Poisson's formula for the resultants:
It follows that
Let be the distinct-slope factors of (as in Definition 7.11) and let stand for their image in . We verify that:
By Lemma 9.1, if is a root of then is larger or equal to the opposite of the slope of the single edge of the Newton polygon of , that is
It follows that
(by Lemma 4.3)
|
In the rest of the section, we study the precision loss encountered in each Newton factorization. For a partial factorization with monic and , the following well known formula will be used several times:
(9.1) |
In the sequel represents the precision at which the irreducible factors of the input polynomial are required. Let in be given modulo with
where . We assume that the Newton polygon of has been computed. Following Definition 7.11, we let stand for the product of factors of with slopes and let stand for the product of factors of with slopes , hence . Let and , let represent the normalized initial inverse of .
According to Corollary 4.11, we may obtain with precision , where
Setting for , equation (9.1) and Lemma 9.4 imply
Since we have , that yields
We also compute with precision , where , and the same calculation yields
Then, Algorithm 7.1 computes truncations of the distinct slope factors of modulo some such that
for .
Proof. We apply the above precision analysis in the “divide and conquer” fashion used in Algorithm 7.1.
Now we examine the precision loss during the equal-slope factorization. The input is a polynomial clustered at and which has a single slope and known with precision such that
Let represent the equal slope factors of as in Definition 7.15, and set . By Corollary 4.23 the contact polynomial can be computed with relative precision where
for . Setting and for , Lemma 9.4 implies that
Since
and , we obtain that
for .
Then Algorithm 7.2 computes the equal-slope factors modulo such that
Proof. In fact Algorithm 7.2 computes the equal-slope factors of with a precision higher than the one requested here, but the above discussion leads to the lower bounds.
We are now ready to prove Theorem 1.3. We assume that is monic and separable of degree in and known modulo where . We combine Theorem 1.1 with the above precision analyses.
Proof of Theorem 1.3. We apply Algorithm 8.2 with entry modulo , and with the trivial contact tower of height zero. The above precision analyses for the intermediate steps of the contact factorization algorithm, namely Lemmas 9.5 and 9.6, show by induction that all intermediate factors of occurring in the top level algorithm are computed along with a contact tower of degree with precision such that
Such a factor is proved to be irreducible when it has degree one in . In this case, by inequality (3.3), the coefficients of are uniquely determined up to precision in at least
which equals
by Lemma 5.4. On the other hand, Lemma 9.3 yields
so the precision of is at least as claimed. Note that the central shift algorithm does not produce factors, so it does not involve any loss of precision.
The contact factorization presented in this paper is subject to further improvements. A first research direction concerns the design of a contact factorization algorithm that would not rely on univariate irreducible factorization, by using the directed evaluation paradigm of [46] instead; so the computed contact towers would not be necessarily irreducible any longer. Another research direction concerns the design of fast algorithms for the contact coordinates in the vein of [45, 46]: we could avoid the conversions to plain coordinates and their precision loss. Another research direction concerns fields of small positive characteristic .
S. S. Abhyankar. Irreducibility criterion for germs of analytic functions of two complex variables. Adv. Math., 74(2):190–257, 1989.
S. S. Abhyankar and T. Moh. Newton–Puiseux expansion and generalized Tschirnhausen transformation. I. J. Reine Angew. Math., 260:47–83, 1973.
S. S. Abhyankar and T. Moh. Newton–Puiseux expansion and generalized Tschrinhausen transformation. II. J. Reine Angew. Math., 261:29–54, 1973.
M. E. Alonso, F. J. Castro-Jiménez, and H. Hauser. Encoding algebraic power series. J. Found. Comput. Math., 18(3):789–833, 2018.
M. Aschenbrenner, L. van den Dries, and J. van der Hoeven. Asymptotic Differential Algebra and Model Theory of Transseries. Number 195 in Annals of Mathematics studies. Princeton University Press, 2017.
J.-D. Bauch, E. Nart, and H. D. Stainsby. Complexity of OM factorizations of polynomials over local fields. LMS J. Comput. Math., 16:139–171, 2013.
A. Bostan, G. Christol, and Ph. Dumas. Fast computation of the Nth term of an algebraic series over a finite prime field. In M. Rosenkranz, editor, Proceedings of the 2016 ACM International Symposium on Symbolic and Algebraic Computation, ISSAC '16, pages 119–126. New York, NY, USA, 2016. ACM.
A. Bostan, F. Chyzak, G. Lecerf, B. Salvy, and É. Schost. Differential equations for algebraic functions. In C. W. Brown, editor, Proceedings of the 2007 International Symposium on Symbolic and Algebraic Computation, ISSAC '07. New York, NY, USA, 2007. ACM.
A. Campillo and J. I. Farrán. Symbolic Hamburger–Noether expressions of plane curves and applications to AG codes. Math. Comp., 71(240):1759–1780, 2002.
D. G. Cantor and D. M. Gordon. Factoring polynomials over -adic fields. In W. Bosma, editor, Algorithmic Number Theory. 4th International Symposium, ANTS-IV Leiden, The Netherlands, July 2-7, 2000. Proceedings, volume 1838 of Lecture Notes in Comput. Sci., pages 185–208. Springer-Verlag, 2000.
D. G. Cantor and E. Kaltofen. On fast multiplication of polynomials over arbitrary algebras. Acta Inform., 28:693–701, 1991.
D. G. Cantor and H. Zassenhaus. A new algorithm for factoring polynomials over finite fields. Math. Comp., 36(154):587–592, 1981.
A. L. Chistov. Polynomial complexity of the Newton–Puiseux algorithm. In Mathematical Foundations of Computer Science 1986. Proceedings of the 12th Symposium Bratislava, Czechoslovakia August 25–29, 1986, volume 233 of Lecture Notes in Comput. Sci., pages 247–255. Springer-Verlag, 1986.
A. L. Chistov. Efficient factoring polynomials over local fields and its applications. In Proceedings of the International Congress of Mathematicians, Kyoto, Japan, 1990, volume 1, pages 1509–1519. Springer-Verlag, 1991.
D. V. Chudnovsky and G. V. Chudnovsky. On expansion of algebraic functions in power and Puiseux series, I. J. Complexity, 2(4):271–294, 1986.
D. V. Chudnovsky and G. V. Chudnovsky. On expansion of algebraic functions in power and Puiseux series, II. J. Complexity, 3(1):1–25, 1987.
H. Cohen. A course in computational algebraic number theory. Graduate Texts in Mathematics. Springer, Berlin, Heidelberg, 1993.
V. Cossart and G. Moreno-Socías. Racines approchées, suites génératrices, suffisance des jets. Annales de la Faculté des sciences de Toulouse 6e série, 14(3):353–394, 2005.
D. Duval. Rational Puiseux expansions. Compos. Math., 70(2):119–154, 1989.
J. Fernández, J. Guàrdia, J. Montes, and E. Nart. Residual ideals of MacLane valuations. J. Algebra, 427:30–75, 2015.
D. Ford and P. Letard. Implementing the Round Four maximal order algorithm. J. Théor. Nombres Bordeaux, 6(1):39–80, 1994.
D. Ford, S. Pauli, and X.-F. Roblot. A fast algorithm for polynomial factorization over . J. Théor. Nombres Bordeaux, 14(1):151–169, 2002.
D. Ford and O. Veres. On the complexity of the Montes ideal factorization algorithm. In G. Hanrot, F. Morain, and E. Thomé, editors, Algorithmic Number Theory. 9th International Symposium, ANTS-IX, Nancy, France, July 19-23, 2010. Proceedings, volume 6197 of Lecture Notes in Comput. Sci., pages 174–185. Springer-Verlag, 2010.
A. Fröhlich and J. C. Shepherdson. On the factorisation of polynomials in a finite number of steps. Math. Z., 62:331–334, 1955.
A. Fröhlich and J. C. Shepherdson. Effective procedures in field theory. Philos. Trans. Roy. Soc. London. Ser. A., 248:407–432, 1956.
J. von zur Gathen and J. Gerhard. Modern computer algebra. Cambridge University Press, New York, 3rd edition, 2013.
J. von zur Gathen and V. Shoup. Computing Frobenius maps and factoring polynomials. Comput. Complexity, 2(3):187–224, 1992.
G.-M. Greuel and G. Pfister. A Singular introduction to commutative algebra. Springer-Verlag Berlin Heidelberg, 2002.
J. Guàrdia, J. Montes, and E. Nart. Higher Newton polygons in the computation of discriminants and prime ideal decomposition in number fields. J. Théor. Nombres Bordeaux, 23(3):667–696, 2011.
J. Guàrdia, J. Montes, and E. Nart. Newton polygons of higher order in algebraic number theory. Trans. Amer. Math. Soc., 364(1):361–416, 2012.
J. Guàrdia, J. Montes, and E. Nart. A new computational approach to ideal theory in number fields. Found. Comput. Math., 13(5):729–762, 2013.
J. Guàrdia, J. Montes, and E. Nart. Higher Newton polygons and integral bases. J. Number Theory, 147:549–589, 2015.
J. Guàrdia, E. Nart, and S. Pauli. Single-factor lifting and factorization of polynomials over local fields. J. Symbolic Comput., 47(11):1318–1346, 2012.
D. Harvey and J. van der Hoeven. Polynomial multiplication over finite fields in time . J. ACM, 69(2):1–40, 2022. Article No.: 12.
J. P. G. Henry and M. Merle. Complexity of computation of embedded resolution of algebraic curves. In J. H. Davenport, editor, Eurocal '87. European Conference on Computer Algebra. Leipzig, GDR, June 2–5, 1987. Proceedings, volume 378 of Lect. Notes Comput. Sci., pages 381–390. Springer Berlin Heidelberg, 1989.
H. Hironaka. Resolution of singularities of an algebraic variety over a field of characteristic zero. Annals of Math., 79:109–326, 1964.
J. van der Hoeven. Automatic asymptotics. PhD thesis, École polytechnique, Palaiseau, France, 1997.
J. van der Hoeven. Relax, but don't be too lazy. J. Symbolic Comput., 34:479–542, 2002.
J. van der Hoeven. Newton's method and FFT trading. J. Symbolic Comput., 45(8):857–878, 2010.
J. van der Hoeven. Faster Chinese remaindering. Technical Report, HAL, 2016. https://hal.archives-ouvertes.fr/hal-01403810.
J. van der Hoeven. Computing with D-algebraic power series. Appl. Algebra Engrg. Comm. Comput., 30(1):17–49, 2019.
J. van der Hoeven. Effective power series computations. Found. Comput. Math., 19(3):623–651, 2019.
J. van der Hoeven. The Jolly Writer. Your Guide to GNU TeXmacs. Scypress, 2020.
J. van der Hoeven and G. Lecerf. Modular composition via factorization. J. Complexity, 48:36–68, 2018.
J. van der Hoeven and G. Lecerf. Accelerated tower arithmetic. J. Complexity, 55:101402, 2019.
J. van der Hoeven and G. Lecerf. Directed evaluation. J. Complexity, 60:101498, 2020.
J. van der Hoeven and G. Lecerf. Univariate polynomial factorization over finite fields with large extension degree. Appl. Algebra Eng. Commun. Comput., 2022. https://doi.org/10.1007/s00200-021-00536-1.
E. Kaltofen and V. Shoup. Fast polynomial factorization over high algebraic extensions of finite fields. In Proceedings of the 1997 International Symposium on Symbolic and Algebraic Computation, ISSAC '97, pages 184–188. New York, NY, USA, 1997. ACM.
E. Kaltofen and V. Shoup. Subquadratic-time factoring of polynomials over finite fields. Math. Comput., 67(223):1179–1197, 1998.
K. S. Kedlaya. On the algebraicity of generalized power series. Beitr. Algebra Geom., 58:499–527, 2017.
K. S. Kedlaya and C. Umans. Fast polynomial factorization and modular composition. SIAM J. Comput., 40(6):1767–1802, 2011.
H. T. Kung and J. F. Traub. All algebraic functions can be computed fast. J. ACM, 25(2):245–260, 1979.
S. Lang. Algebra, volume 211 of Graduate Texts in Mathematics. Springer-Verlag, New York, 3rd edition, 2002.
G. Lecerf. Fast separable factorization and applications. Appl. Algebra Engrg. Comm. Comput., 19(2):135–160, 2008.
S. MacLane. A construction for absolute values in polynomial rings. Trans. Am. Math. Soc., 40(3):363–395, 1936.
S. MacLane. A construction for prime ideals as absolute values of an algebraic field. Duke Math. J., 2(3):492–510, 1936.
J. Montes. Polígonos de Newton de orden superior y aplicaciones aritméticas. PhD thesis, Universitat de Barcelona, Spain, 1999.
F. Mora. An algorithm to compute the equations of tangent cones. In J. Calmet, editor, Computer Algebra. EUROCAM '82, European Computer Algebra Conference, Marseilles, France, April 5-7, 1982, volume 144 of Lect. Notes in Computer Sc., pages 158–165. Springer-Verlag Berlin Heidelberg, 1982.
G. Moroz. New data structure for univariate polynomial approximation and applications to root isolation, numerical multipoint evaluation, and other problems. In 2021 IEEE 62nd Annual Symposium on Foundations of Computer Science (FOCS), pages 1090–1099. Los Alamitos, CA, USA, 2022. IEEE.
G. Moroz and É. Schost. A fast algorithm for computing the truncated resultant. In M. Rosenkranz, editor, Proceedings of the ACM on International Symposium on Symbolic and Algebraic Computation, ISSAC '16, pages 341–348. New York, NY, USA, 2016. ACM.
E. Nart. Okutsu–Montes representations of prime ideals of one-dimensional integral closures. Publicacions Matemàtiques, 55(2):261–294, 2011.
I. Newton. De methodis serierum et Fluxionum. Manuscript, 1671.
A. M. Ostrowski. Über die Bedeutung der Theorie der konvexen Polyeder für die formale Algebra. Jahresber. Deutsch. Math.-Verein., 30(2):98–99, 1921. Talk given at Der Deutsche Mathematikertag vom 18–24 September 1921 in Jena.
A. M. Ostrowski. On multiplication and factorization of polynomials. I. Lexicographic orderings and extreme aggregates of terms. Aequationes Math., 13(3):201–228, 1975.
A. M. Ostrowski. On the significance of the theory of convex polyhedra for formal algebra. SIGSAM Bull., 33(1):5, 1999. Translated from [63].
V. Y. Pan. Univariate polynomials: nearly optimal algorithms for numerical factorization and root-finding. J. Symbolic Comput., 33(5):701–733, 2002.
S. Pauli. Factoring polynomials over local fields. J. Symbolic Comput., 32(5):533–547, 2001.
A. Poteaux. Calcul de développements de Puiseux et application au calcul de groupe de monodromie d'une courbe algébrique plane. PhD thesis, Université de Limoges, France, 2008.
A. Poteaux and M. Rybowicz. Improving complexity bounds for the computation of Puiseux series over finite fields. In Proceedings of the 2015 ACM on International Symposium on Symbolic and Algebraic Computation, ISSAC'15, pages 299–306. New York, NY, USA, 2015. ACM.
A. Poteaux and É. Schost. Modular composition modulo triangular sets and applications. Comput. Complex., 22(3):463–516, 2013.
A. Poteaux and M. Weimann. Using approximate roots for irreducibility and equi-singularity issues in . Technical Report, arXiv:1904.00286, 2019.
A. Poteaux and M. Weimann. Computing Puiseux series: a fast divide and conquer algorithm. Ann. Henri Lebesgue, 5:1061–1102, 2021.
A. Poteaux and M. Weimann. A quasi-linear irreducibility test in . Comput. Complex., 31:6, 2022.
A. Poteaux and M. Weimann. Local polynomial factorisation: improving the Montes algorithm. In A. Hashemi, editor, Proceedings of the 2022 International Symposium on Symbolic and Algebraic Computation, ISSAC '22, pages 149–157. New York, NY, USA, 2022. ACM.
M. V. Puiseux. Recherches sur les fonctions algébriques. J. Math. Pures et Appliquées, 15:365–480, 1850.
P. Russell. Hamburger–Noether expansions and approximate roots of polynomials. Manuscripta Math., 31:25–95, 1980.
A. Schönhage. Schnelle Multiplikation von Polynomen über Körpern der Charakteristik 2. Acta Inform., 7:395–398, 1977.
A. Schönhage. The fundamental theorem of algebra in terms of computational complexity. Technical Report, Math. Inst. Univ. of Tübingen, 1982.
V. Shoup. New algorithms for finding irreducible polynomials over finite fields. Math. Comp., 54(189):435–447, 1990.
S. Smith. On the higher singularities of plane curves. Prod. London Math. Soc., 6:153–182, 1875.
B. L. van der Waerden. Algebra. Springer, 7th edition, 1991. Based in part on lectures by E. Artin and E. Noether.
R. J. Walker. Algebraic Curves, volume 13 of Princeton mathematical series. Princeton University Press, 1950.
P. Walsh. A polynomial-time complexity bound for the computation of the singular part of a Puiseux expansion of an algebraic function. Math. Comp., 69(231):1167–1182, 2000.
P. G. Walsh. On the complexity of rational Puiseux expansions. Pacific J. Math., 188(2):369–387, 1999.
S. M. Watt. A fixed point method for power series computation. In P. Gianni, editor, Symbolic and Algebraic Computation. International Symposium ISSAC' 88, Rome, Italy, July 4-8, 1988. Proceedings, volume 358 of Lect. Notes in Computer Sc., pages 206–217. Springer-Verlag, 1989.
O. Zariski. Le problème des modules pour les branches planes. Hermann, Paris, 1986.
polynomials in of degree 2
cost function for univariate polynomial factorization 3
homogeneous component of of degree 9
homogeneous components of from degree to 9
initial form of 9
valuation semi-group of the -th level of a contact tower 15
group generated by 15
ramification index of 15
-th defining polynomial of a contact tower 15
defining ideal of a contact tower of height 16
level of a contact tower 16
degree of with respect to the contact variable 21
polynomials at the level of a contact tower 22
expression of in terms of the plain coordinates 22
conversion to plain coordinates 22
valuation of with respect to 25
derivative of with respect to 40
valuation of regarded in 51
homogeneous components of regarded in 51
algebraic tower 3
approximate root 69
canonical representation 20
central shift 62
clustered polynomial 20
contact coordinates 15
contact factorization 53
contact polynomial 22
contact representation 22
contact slope 16
contact tower 15
degree 16
irreducible 52
reduced 16
regular 43
separable 39
distinct-slope factorization 57
equal-slope factorization 61
graded ring 8
Hensel context 34
initial 34
homogeneous component 9
initial expansion 44
initial form 9
initial root 62
initially reducible 52
leading monomial 17
monic in 21
Newton polygon 9
contact 54
regular 54
Newton polynomial 10
normalized inverse
initial 27
modulo 27
plain coordinates 22
regular
effectively 43
relative precision 9
semi-valuation 9
separable
effectively 39
slope 10
standard basis 17
reduced 17
uniformizing parameter 45
Weierstraß context 30
initial 30
Weierstraß
normalization 27
part 31