Computation
of
the
Smith
normal Gilles
Laboratoire
LMC-lMAG,
We describe
46 Av. F. Viallet,
matrices.
and
a new algorithm
of the Smith This
normal
algorithm
form
and pre- and post-multipliers
istic
polynomial
time.
putation
reduces
over
the
field
good
worst-case
the normal in determin-
Noticing
that
to a linear
of the
of polynomial
computes
complexity
a rigourous
methods
trices
and
The a
bound,,
related
This
paper
establishes
for
the
be
computed
Smith
Smith
normal in
normal
ideal
We will
in
also
well
known
some
with
using
Euclid’s
input
from
problems
the
a principal
over
within
Hermite
Hermite
point
of view
to be solved
when
the
Kannan
of matrices
and
Bachem
mite
and
Smith
mial
time.
The
peated
have
done,
been the
arithmetic faster
entries,
computed
the in
is computed
for
matrix.
first
order
Their
bounds during
which
by several
by Chou the
authors
[5, 19, 9, 1’2]. More
algorithms
have
been
the
its
and
trices,
mod-
root
We
is
granted provided that the copies are not made or distributed for diract commercial advantage, the ACM copyright notice and tha title of the publication and ite date appear, and notice is given that copying is by permission of the Association for Computing Machinery. To copy otherwise, or to republish, requires a fee and/or spacific permission. ACM4SSAC ‘93-7/93/Kiev, Ukraine @1993 ACM 0.89791 -60~2/93/0007/0209< ..$l” .50
tipliers)
to copy
without
fee all or part of this material
directly
nomial itly
new
is in ~, time the
there
multipliers bounded
lengths
of the randomly
where
problems.
matrix
Smith
degree
3 that
Q[a]
7 is the
class
We obtain
a good-conditionning matrix
in
without
as not
normal
such
manner.
form result
matrix. a way
being
variables.
TO and mul-
of sequential
the
on ma-
REDUCTION
(the
with
form
form
in many
The
has,
Smith
in a deterministic
section
cho-
matrix.
of the the
input
the input
characterized
of a large
over
input
exist
a certain
to
can a con-
“good -conditionning”
were
computable in
of the As
polynomially
coefficients
shown
the multipliers
randomized
leading
30RM
computing
gularize
209
not
show
have
is to “pre-condition”
it with
In
is given
computation
say a “conditioning”
the
by [11].
time.
coefficient
key idea
of Hermite,
were will
SMITH
Permission
and
of a polynomial
They
in [8]
are
Unfortunately
i.e.
it
trans-
computation
polynomial that
probability,
of the
and
entries
of this
diagonal.
authors
cost
of the
shown
matrix,
form
in
theorem,
algorithm
The
form
have
dimensions
repetition
cost
Smith
by multiplying
high
the
whose
Their
polynomial appeared
was done
form.
randomized
they
form
equivalence
probabilistic
is the
The
form,
Hermite
recently,
given
the
sen constant
computausing
form in
(or
breakthrough
Vegas
probability,
form.
matrix
re-
appearing
improved in
Her-
last
the Smith
Smith
first form
remainder
multipliers
time
normal
the
normal
Chinese
divisor
polynomial
such that if S is the Smith form of A,
V
high
matrices.
polynousing
with
sequence,
to
Frumkin,
[6, 14] that
be
of the integers
and then
U1O determinant asymptotically
shown
can
of the
of digits
[3] changing were
integer
diagonalization
calculations
Collins tions
have
forms
triangularizations
on the number the
with
the
a Las
be obtain
in
case
paper
Hermite
be computed. In
compute
encountered
Hermite
And
Smith
to
polynomials.
common
direct
in-
sufficient
to those
into
[13].
the
on the
U and
of the
are
have
based
= S. The
that
[7, 18] but
they
Kannan
are not
greatest
A first
ma-
polynomials
of those
similar
a matrix
for computing
as an
forms
not
this
is a triangularnormal
but
UAV
matrix.
form
[10]:
methods
polynomial
the
they
coefficients are
for
for
of
but
algorithm.
by
algorithm
forms)
The
the domain input
normal form
Those
a theoretical
can
defined
of the
matrix.
remain
matrices
given
be applied
a polynomial
bringing
time did
time.
computed
the
post-multipliers
polync)mial
a diagonalization
form:
of the
and
of polynomial
is generally
deal
intermediate ization
form
it is entirely
consists
pm-
deterministic
form
domain,
and
that
the
problems
computing
determinant
degrees
calculations,
when
was
Introduction
also the
bound
method
1
can
in the
of modulo in [16].
bound
correctly
problem
we obtain
matrices
study
developed
These volved
the com-
algebra
coefficients,
polynomial
F38031 Grenoble C6dex.
has been
for the compu-
form
of
Villard
Abstract tation
form
poly-
by explicWe trian-
that
at each
step,
the
diagonal
corresponding Furthermore, recent
aa a “big
gcd”,
shown
that
Q[~]
the
over
authors
the
Q . Using
the
idea
of the
Smith
by triangularizing
show
They
have
form
over
matrix
in section
over
a big
Q[z]
4 that
may
matrix
Kannan’s
algorithm
[13]
the
Hermite
normal
steps,
step
i the
form,
Algorithm Input: At”)
Previous
for
Hermite.
Put
form.
process
It works
in n – 1
(i + 1) x (i + 1) principal
and
the
matrix
minor
is denoted
by Ati).
KHNF := A,
the
n x n matrix.
(z’ + 1) x (i+
triangular
Q .
Reduce
1) principal
H
At
step
the
first
minor
in upper
form. off-diagonal
Output:
on
results
is an elimination
forifromlton–1
also
over
after
principal
2
algorithm
to compute
is in Hermite
an efficient
Hermite
form
[15]
Hermite
of a big
we will
of the
be computed
developed
triangularization
their
computation
Kannan’s
The
the
Marlin
subresultants.
computation
to
and
with
By viewing
have
on generalized
reduces
the
bounds.
2.1
the
form.
Lombardi
complexity
based
is exactly
Smith
we use can be combined
of Labhalla,
good
method
we obtain
of the
the idea
method
to obtain
coefficient
coefficient
entries
of the
(i+
1) x (i+
1)
minor. :=
A(n-l).
■
i unimodular i +
row
1 rows
1 ,. ... i, become
operations
only.
zero by left
The
are performed
entries
multiplying
Ai+l,j,
j
=
by the Bezout’s
matrices: will
We put
restrict
ourselves
matrices,
with
no
but
great
matrices.
the
this
section
[7, 18] concerning
the
matrix of Q[x],
and
The
degrees
absolute
values)
of the
spectively
bounded
is called
unimodular
element
of
column
and
recall
basic
results
normal
forms
and
Smith
the
n whose
main and
of the
d and
/3.
entries
algorithms
the
singular
for
coefficient entries
form.
Q[*]”
the
‘n
A non
is in
non
form: Let
the
singular
UA
h;
are hl,l
‘n
square form
diagonal
ma-
if it
are monic,
is
in each
entry
are of
= hj,l
formed and
is left
equivalent mal
with
common
the jirst
of the Hermite
divisor
of A; H
of A
J i = 2, . . .,n.
UAV
Let s;
= S, denote
the i x i minors normal i=2
form >. ... n.
S
matrix
S which
U
V
and
the greatest
of A;
the
diagonal
of A
are
S1 =
is in Smith
nor-
unimodular. common
divisor
entries s!
and
of all
of the Smith si
=
and r = unimodular
off-diagonal
of the
entry
diagonal
PAj,j row
haa degree
entry
in its
+ qAi+l,j. operations
strictly
lower
column.
mite
1 ([13])
normal
singular
Algorithm
form
matrix
(and over
KHNF
jinds
the multiplier)
Q[x]
the
Her-
of a square
in polynomial
non
time.
ing
the
unicit
polynomial
Hermite
form
y of the
tiplier
form,
is unique:
from
time
can one
can
=
HA-1.
U
A, in a polynomial
system
over
method
has
view
and
Q
seems the
also It
unique
computFrom
that
is possible
the
the
mul-
to
build
of operations,
from
to be costly
next
[10].
a linear
is (H, U).
solution
developed
for
in
deduce
number
whose
been
algorithm
be found
a parallel
in sequential.
This
point We will
of use
result.
of all
i columns
normalform
h~,$ = h~,i/h~_l,i_l
to a unique
form:
each
that
instead,
U unimodular.
the greatest
entries
A of Q[z]nxn
matrix
, 4+l,j), to perform
zero
Smith normal form. A non singular square matrix S of Q[z]~’~ is in Smith normal form if it is diagonal, its diagonal entries are monic, each divides the next. Every non singular matrtx A of Q[x]nxn is (III)
(IV)
than
Theorem
rnatr~z H which is in He~i~e
= H,
denote
i x i minors
the diagonal
gcd(Aj,j
‘
)
their
lengths
is a non
normal
entries
preceding
equ~v~lent to a Un@e normal
=
it is easy
so that
are
of Q[z]n
singular
Hermite
its diagonal
entries
Every
(II)
r
Then
of A are re-
A matrix
determinant
with
degree,
(I)
the
rectangular
A different
triangular,
lower
generalized
some
!l Aj,j/r
(
to
if its
normal
H
upper
be
P –Ai+l,j/r
in-
of Q .
Hermite trix
by
singular
we
Hermite
computation.
non
could
A of dimension
polynomials (log
square
approach
difficulties
In
of an input
to
S~/s~_l,
2.2 We
Subresultants present
in
Lombardi
and
Hermite
form
solution
over
appropriate
this
Q , but
for
the computation
the
210
that
operations
coefficients
[10],
avoid
the
The
main
idea
Sylvester
computation Hermite
Sylvester
only, of the
method
they
of the if the
the As in
Q[z]
use of the the
Hermite
over
system.
subresultants [17]
[15].
computation
the
by row
section
Marlin
to generalize
from
for
then
Labhalla, reduce
to a linear cost
matrix
gtd.
the
system
of finding
the
of the
method
matrix
and
of polynomial form.
the last
polynomial
of they
Indeed,
is
of the gcd to
we know
is triangularized non zero row
gives
The
method
matrix
first
A a matrix
bound
on the
(UA
= H).
degrees
A(d)
If d is a bound take
6 =
cl,
...,
It provides by the
n(d+
the
3 ([11])
dimension
n with
entries
role
Then
of the
of the Hermite
6 is a
multiplier
Sylvester
of the entries
the
canonical
a natural
elements
less than Li
of the
en the
Q[z]n.
Let
Theorem
where
in Q,
U
d. then
the
is obtained
form
and
basis
of
of the
the
Q-vector
whose
space
entries
have
This
de-
. . ..e~.
row-vectors
zd+6en,6,e
of A.
with
A($)
entries
7r) .
n). .,en). is the
n(6
in Q whose
“ “ “ ~~d-’~n,
2 ([15])
form
of A followed
by row
In section form
In
in
of
. . . . ~n]
-the
the
base B(6))
of A(t)
using
by the reduction
4 below of the
consists
method
we extend with
Herrnite are
matrix
iterations
Smith
this
row
theorem,
gorithm
Hermite
for
two
matrix.
tries
of the
iterations
Smith
normal
form
opera-
With
are the
entries 3.4),
high
for
The
The
H’,
form.
number
unit
lower
are chosen
the
Smith
simple on
con-
Hermite.
to compute
do not we
form
will
we
algorithm
good
a root
of
how
to
show
consequently time
the
gcd
columns
refer
to
the
will
give
to compute
characterizations
entm’es
diagonal
all i,
A
entries
of the
of A is equal
(II)
of the Hermite
and the
of the Hermite
Smith
form
of the i x i minors
new
have
if
and
formed
form only
with
if
the i
to the gcd of all i x i minors
method
for
Smith
entries
that
en-
viously,
Hermite,
([11],
at random
matrix
Hermite
normal
form
of A’.
Hermite
normal
form
of ‘Al.
form
of the
next
also con-
doing the
some
diagonal
Smith
in this
section.
is then
Herstage
form.
section,
on the generalized
entries
Notice
a
subthat
it
form:
as seen
pre-
directly
obtained
by
by
column
operations
3.4).
entries
be an
conditioning
. . . . an)
of Qn–l
is replaced
columns
B
good
given B{
:=
are those method
main
form but
that
triangular
off-diagonal
1 Let
A
in Q .
Al
the
Smith form,
bssed in
on
Smith
lemma
Definition
whose
focus
the
the
to ensure of the
algorithm,
the
for
the
The
the
of B
triangular
idea
is studied
to
reducing
([1 1], on
main
ants,
diagonal
matrix
are computed
the
computing
a triangular operations
corresponding suffices
algorithms
row operations.
we propose
column
result
the only
computing
We give
input
that
perform
method in
con-
new
seen
form
(az,~s,
A2 :=
by the
n x n of
such linear
B
that:
non is
singular a (n
–
if the first
combination
ma1)-uple column
of the
other
by
:=Bl+~zBz+~sBs+...+~~B~,
then
A2 if it is diagonal the
The
simple
form~ of A.
:= AC.
whose
us
entries
sists
al-
the
the
A’
In fact,
normal
form.
the
chosen
of this of
of
although
Ccmsequently
application
form
randomized
a randomly
say
Smith
gives
and
is the
a way
(that
polynomial
form.
3
Algorithm RSNF Input: A, n x n matrix.
of Q
Smith
of r,
time.
4 below
matrices
are
triz.
Output:
the
a root
theorems
provide
3 and
1 Let
mite
normal
aa 0(n3)
probability,
form,
of the
not
of the diagonal
of A
for the
Smith.
in pre-conditionning it by
a second
of H’,
C :=
of
complexity
matrices
such
(IV)
first
computations
[14].
suffice.
consists
Hermite
lemma transpose
the
y bounded
A by multiplying
stant
variables
form.
and on its transpose
of [11]
matrix
– 1)/2
and per-
operations
algorithm.
is theoretical
in practice
does
and Smith
com-
of the o~-diagonal
column
to compute
in iterating
on the
by
does not form
previous
Remark
of the usual
of
bounded
of A.
Randomized
The
two
sections
Smith
We
2.3
of Q[z]”x”
entries
computes
time
the
a deterministic
operations.
a triangularization
computation
of
compute
+ 1) x
row-vectors
. . . . L,,
‘The row-vectors (written
by a triangulari.zation only,
in n(n
in polynomial
polynomial
theorem
the
entries
of the
if C
RSNF
pre-conditionning
. . :;t::;”;n’t;~;~:6;;;”
tions
be a matrix r
that
multipliers
sequence
d +6:
6 + 1) matrix
normal
such
algorithm
The
module
are the
Theorem
A
degrees
is a polynomial
O(n3d)
of A, we can
form
bssis
of Q[z]n
=(zd+Jel,
be the
puted
There
degree
matrix.
Let the
A($).
formed
B(5)
to the input
entries
on the degrees
(n – l)d.
Let
in associating
with
plays
by triangularizing
grees
consists A(JJ
entries
construction
or Failed.
of C can
in [11].
gcd
equal
■
be chosen
is detailed
The
in a subset
to the gcd of all
The tries
211
gcd~