Computing in Quotient Groups

Computing in Quotient Groups

Computing in Quotient Groups William M. Kantor x Eugene M. Luks 2 University of Oregon University of Oregon Abstract One essential ingredient has, to a great extent, been We present polynomial-time algorithms for computation lacking. The facility to deal with quotient groups (equiv- in quotient groups G/K of a permutation group G. In alently, homomorphic images of groups) is a central effect, these solve, for quotient groups, the problems methodology of group theory, but there has not seemed that are known to be in polynomial-time for permutation to be an effective computational analogue. In practice, groups. Since it is not computationally feasible to rep- group theory systems do offer permutation representa- resent G/K itself as a permutation group, the method- tions of quotients [Ca]. But, from the standpoint of ology for the quotient-group versions of such problems worst-case complexity, this reduction back to permuta- frequently differ markedly from the procedures that have tion groups cannot work. The reason is that quotients been observed for the K = 1 subcases. Whereas the al- of given permutation groups need not have faithful (1-1) gorithms for permutation groups may have rested on el- permutation representations on a polynomial-size set. ementary notions, procedures underlying the extension For example, in illustrating the computational blowup, to quotient groups often utilize deep knowledge of the Neumann [Ne] gives an example of a 2-group acting on n structure of the group. letters, a quotient of which has no faithful representation In some instances, we present algorithms for problems on less than 2n/4 letters. that were not previously known to be in polynomial time, The above difficulties notwithstanding, we introduce even for permutation groups themselves (K = 1). These methods for dealing with quotient group problems that problems apparently required access to quotients. close the apparent complexity gap. In fact, we are mo- tivated to conjecture a Quotient Group Thesis: 1. Introduction If a problem for quotient groups G/K of per- Since the order of a permutation group G on n letters mutation groups has a polynomial-time solution can be exponential in n, it is customary, in both the- when K = 1 then it has a polynomial-time so- ory and practice (see, e.g., [Ca], [FHL], [Si]), to spec- lution in general. ify G by a small set of generating permutations (less Corroborating testimony for the Quotient Group The- than n are needed and typically many fewer suffice). sis is our extension of the polynomial-time library for Despite the succinctness of such representations, a sub- permutation groups (as we see it) to quotients of per- stantial polynomial-time machinery has developed for mutation groups. We employ a variety of techniques in computing with permutation groups. A major stimulus this extension, including two very useful tools (the Sy- for this activity was the application to the graph iso- low and Frattini methods in §5) for lifting problems on morphism problem (ISO), for early work ([Bal], [FHL], G/K to problems on a "reasonable" G. In the process, [Lull, [Mill, [Mi2], [BL]) used groups to put significant we enhance the algorithmic infrastructure even for the instances of ISO into polynomial time. Ensuing studies case K = 1: some issues seem to have required access to resulted in algorithms for deciphering the basic build- quotients. ing blocks of the group ([BKL], [Lu2], [Ne], [KT], [Kal], For several problems, the procedures for handling [Ka2], [Ka3], [BLS1]), making available constructive ver- G/K are easy consequences of those for the special case sions of standard theoretical tools. K = 1. But in other, critical instances this is far from 1Research partially supported by NSF Grant DMS 87-01784 the case. As confirmation, witness the difference in the and NSA grant MDA 904-88-H-2040. nature of the underlying theoretical tools. For example, 2 Research partially supported by NSF Grant DCl=t-8609491 and ONR Grant N00014-86-0419. demonstrating, from first principles, that the center of a permutation group is computable in polynomial-time in- volves only elementary properties of groups and no other knowledge of the group structure ([Lu2], [CFL]); it is, in Permission to copywithout fee all or part of this material is granted pro- vided that the copies are not made or distributed for direct commercial fact, interpretable as the subgroup fixing a set of points advantage, the ACM copyrightnotice and the title of the publication and (in an augmentation of the set) [Lu2] and so computable its date appear, and notice is given that copyingis by permission of the Associationfor Computing Machinery.To copyotherwise, or to republish, requires a fee and/or specific permission. © 1990 ACM 089791-361-2/90/0005/0524 $1.50 524 by the most basic algorithm in [FILL]. Such a concrete Throughout, let G be a finite group. We write H < G interpretation is not available for quotient groups. To to indicate that H is a subgroup of G, and H <I G to show that the center of a quotient group can be com- indicate that H is a normal subgroup; then H < G and puted efficiently, we make essential use of the Sylow H <1 G indicate that the inclusions are strict. A group G structure made available via procedures in [Ka2], [Ka3], is simple if there is no H such that 1 <1 H <1 G. We say procedures that are dependent upon the (~ 15000 page) that H is subnormal in G if there is a chain of subgroups classification of finite simple groups. Nevertheless, we of the form H = L0<! L1 <1 ...<1L,n = G. ItS C G then emphasize that our new methods do not require a deep (S) is the subgroup of G generated by S. For s,t 6 G, knowledge of this classification or of other algebraic the- we write s t for the conjugate of s by t, namely, s-its; ory of great depth. The procedures that we cite (e.g., and extend the notation to subsets S, T C G via S T = from [Lu2], [Ka2], [Ka3]) have elementary specifications; { s~ I s 6 S,I 6 T}. The normalizer and centralizer of so they are quite accessible to non-specialists. S in G are NG(S) = {g 6 G [ S g = S} and CG(S) = Another aspect of the procedures seems worth high- {g 6 G I sg = s, Vs e S}, respectively; subsets of lighting. From one point of view, we are effectively ma- NG(S) or Ca(S) are said to normalize or centralize S, nipulating induced permutation representations in which respectively. The center of G is Z(G) = Ca(G). The the new permutation domains are themselves too large normal closure S in G is the smallest normal subgroup to enumerate. One example occurs in the consideration of G containing S, namely (SG). IfH < G then the core of the transitive action of a permutation group G on its, of H in G, Coree(H), is the largest normal subgroup of possibly exponential, collection 79 of Sylow p-subgroups G contained in H, namely N{H a ]g 6 G}. of G (where g 6 G maps P ~-* p9 = g-1 pg); given two We refer to [Ha] for a discussion of Sylow's Theorem: "points" /'1, P~ 6 79, we need to find some (and some- (i) If p is a prime then a Sylow p-subgroup of G is a times all) g 6 G such that P~ = P2. Another example p-subgroup whose order is the p-part of IGI; (ii) any p- is our computation of cores of subgroups H of G, for subgroup of G is contained in a Sylow p-subgroup; (iii) the core is interpretable as the kernel of the permuta- any two Sylow p-subgroups P1, P2 are conjugate in G: tion representation of G on the set of (right) cosets of H P~ -- P~. for some g 6 G. in G. For s,t 6 G, we write [s,t] for the commutator Section 2 has an extended glossary of group-theoretic s-lt-Xst, and for S,T < G, we set [S,T] = ([s,t] I s e terminology, most of which is standard; the reader S, t 6 7"). The derived subgroup of G is G' = [G, G]. The should refer back to this as needed. In Section 3, we derived series of G is the series G > G' ___ (G')' > --. ; recall a few fundamental algorithmic results for permu- G is solvable if this series terminates with the group 1. tation groups. We present, in Section 4, the backbone of The lower central series of G is defined recursively by: the polynomial-time library for computing with permu- La(G) = G and Li+I(G) = [G, Li(G)]; G is nilpotent if tation groups as well as with quotients of permutation this series terminates with the group 1. The upper cen- groups; see that section also for a pointer to the proofs tral series of G is defined recursively by: Zo(G) = G and in Sections 5-12. Some intriguing open questions are in- Zi+I(G)/Zi(G) = Z(G/Zi(G)); G is nilpotent iff this dicated in Section 13. series terminates with the group G. In the Appendix, we discuss some problems that are We refer to [Ha, Ch. 8] for an amplification of the routinely solved in practical computation but are of un- following facts about composition series and chief se- certain complexity. A polynomial-time solution to any ries. A composition series of G is a maximal chain of these would also resolve ISO.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    11 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us