Papers
Topics
Authors
Recent
Search
2000 character limit reached

The Mystery Deepens: On the Query Complexity of Tarski Fixed Points

Published 31 Mar 2026 in cs.CC and cs.DS | (2604.00268v1)

Abstract: We give an $O(\log2 n)$-query algorithm for finding a Tarski fixed point over the $4$-dimensional lattice $[n]4$, matching the $Ω(\log2 n)$ lower bound of [EPRY20]. Additionally, our algorithm yields an ${O(\log{\lceil (k-1)/3\rceil+1} n)}$-query algorithm for any constant $k$, improving the previous best upper bound ${O(\log{\lceil (k-1)/2\rceil+1} n)}$ of [CL22]. Our algorithm uses a new framework based on \emph{safe partial-information} functions. The latter were introduced in [CLY23] to give a reduction from the Tarski problem to its promised version with a unique fixed point. This is the first time they are directly used to design new algorithms for Tarski fixed points.

Authors (3)

Summary

  • The paper establishes a Θ(log² n) query complexity for Tarski(n,4) by matching lower and upper bounds using a novel framework.
  • It introduces safe partial-information functions that efficiently shrink candidate sets and improve generic bounds for fixed k.
  • The work deepens our understanding of fixed point computation in monotone lattices, impacting search problems in logic, verification, and economics.

The Query Complexity of Tarski Fixed Points: A Structural Characterization

Introduction

The paper "The Mystery Deepens: On the Query Complexity of Tarski Fixed Points" (2604.00268) delivers new insights into the query complexity of finding fixed points of monotone functions over finite lattices, specifically for the Tarski fixed point problem on the kk-dimensional grid [n]k[n]^k. This work resolves the precise query complexity for dimension k=4k=4, demonstrating that Θ(log2n)\Theta(\log^2 n) queries suffice and are necessary, matching previous lower bounds. Further, it introduces a highly-structured framework based on safe partial-information functions to both advance upper bounds for higher dimensions and illuminate the deep combinatorial nature of these fixed point computations.

Context and Motivation

Tarski's fixed point theorem remains a central result in lattice theory and has rich implications for logic, formal verification, game theory, and economics. In computational terms, the complexity of finding such fixed points informs our understanding of several major total search problems, including those lying at the intersection of NPcoNP\mathbf{NP} \cap \mathbf{coNP} but not known to be in P (e.g., parity games and stochastic mean-payoff games).

Prior approaches—ranging from straightforward iteration to iterative binary search—yielded O(nk)O(nk) or O(logkn)O(\log^k n) upper bounds, with stronger lower bounds only recently established for small kk. Fearnley et al. (2022) demonstrated surprising structural collapses in certain dimensions, notably showing that for k=3k=3, the query complexity drops to Θ(log2n)\Theta(\log^2 n), shattering the expectation that the exponent must grow linearly with [n]k[n]^k0.

However, for [n]k[n]^k1, a gap remained: the lower bound was [n]k[n]^k2 and the best known upper bound [n]k[n]^k3. The present paper resolves this ambiguity for [n]k[n]^k4, and improves bounds for all constant [n]k[n]^k5, utilizing new algorithmic and structural techniques.

Core Contributions

Optimal Query Complexity for [n]k[n]^k6

The primary technical contribution is an [n]k[n]^k7-query algorithm for [n]k[n]^k8, matching the [n]k[n]^k9 lower bound and thus tightly characterizing the complexity for k=4k=40. This closes a previously open case, showing that for k=4k=41 the query complexity remains at k=4k=42.

Improved Generic Bounds

Extending beyond k=4k=43, the authors refine the best-known upper bound for constant k=4k=44 from k=4k=45 to k=4k=46 for general k=4k=47. This leverages a composition principle for their new algorithmic framework, suggesting further polylogarithmic improvements may be possible for higher dimensions.

Safe Partial-Information Functions

A major conceptual contribution is the development and deployment of safe partial-information (PI) functions as an analytic and algorithmic tool. While the idea of safe PI functions originated in reductions relevant to unique fixed point problems, this work is the first to harness them directly for algorithm design. With this, the analysis and search for fixed points becomes a combinatorial game—termed the safe PI function game—where structure and inference play dominant roles, offering new levers for progress. Figure 1

Figure 1

Figure 1

Figure 1: An illustration of information inferred via monotonicity from a query k=4k=48, as captured by monotone PI functions.

Candidate Sets and Combinatorial Trimming

Central to the improved bounds is an intricate characterization of candidate solution sets compatible with accumulated partial information. Unlike naive set-counting approaches, the new definition of candidate sets crucially exploits the structure revealed by safe PI functions. The framework guarantees that after each batch of queries, a constant factor reduction in candidate set size can be enforced, which underlies the k=4k=49 query bound. Figure 2

Figure 2

Figure 2

Figure 2: Visualization of a candidate set after querying Θ(log2n)\Theta(\log^2 n)0, showing the combinatorial trimming enabled by accumulated inferences.

Technical Insights

The methodology is rooted in a round-based query model, where the algorithm interacts with the unknown monotone function by successively issuing queries, refining its partial-information function at each step. The safe PI function formalism allows the algorithm to encode, propagate, and infer monotonicity-driven facts beyond direct query answers, broadly tightening the possible fixed point locations.

Key technical steps include:

  • Monotone Partial-Information Functions: Encoding the closure of information inferred via monotonicity as a PI function whose symbol lattice tracks knowns, possible intervals, and indeterminacy.
  • Safe PI Functions: Enriching PI functions by requiring that every slice (subgrid with fixed coordinates) still has at most one fixed point, enforcing a global structural constraint on feasible extensions.
  • Candidate Set Construction: Advanced combinatorial techniques are used to construct and update sets Θ(log2n)\Theta(\log^2 n)1 of possible solutions, ensuring they shrink rapidly under carefully selected queries ("constant fraction reduction").
  • Decomposition Theorem: For arbitrary Θ(log2n)\Theta(\log^2 n)2, candidate set reductions for lower dimensions can be composed using a slice-and-reduce approach, leading to the improvements in the exponent of the generic upper bound.

An important geometric lemma determines that, for subsets of Θ(log2n)\Theta(\log^2 n)3, one can always find a query point that splits the candidate set into well-balanced regions, guaranteeing progress at every stage.

Numerical and Structural Implications

The algorithm achieves the following:

  • For Θ(log2n)\Theta(\log^2 n)4, both upper and lower bounds are sharp: query complexity is Θ(log2n)\Theta(\log^2 n)5.
  • For constant Θ(log2n)\Theta(\log^2 n)6, the upper bound is improved to Θ(log2n)\Theta(\log^2 n)7 queries.
  • For the relaxed Θ(log2n)\Theta(\log^2 n)8 problem (allowing an "oriented" solution), a Θ(log2n)\Theta(\log^2 n)9 exponent replaces the previous NPcoNP\mathbf{NP} \cap \mathbf{coNP}0 in the upper bound, further bridging the remaining gaps.

No explicit time efficiency is claimed: the algorithms as described depend on combinatorial or brute-force enumeration that may be computationally intensive, focusing squarely on query efficiency.

The work also provides a pathway hinting that, up to small polynomial losses in NPcoNP\mathbf{NP} \cap \mathbf{coNP}1, the query complexity for fixed NPcoNP\mathbf{NP} \cap \mathbf{coNP}2 could remain NPcoNP\mathbf{NP} \cap \mathbf{coNP}3, a point not foreclosed by existing lower bounds.

Theoretical and Algorithmic Implications

This work unveils the surprisingly rich structure inherent in fixed point search within monotone lattices. Safe PI functions abstract the type of logical closure seen in formal verification and model checking, potentially linking these complexity insights to structural results in logic (e.g., NPcoNP\mathbf{NP} \cap \mathbf{coNP}4-calculus) and game-theoretic equilibrium computation.

Practically, the framework paves the way for more advanced fixed point and equilibrium finding algorithms in verification and economic modeling, where the black-box oracle model reflects limited access or high cost to solution space exploration.

The decomposition and candidate set techniques may be transferable to related search problems—such as contraction mappings or unique equilibrium settings—where inductive combinatorial structure is key.

Future Directions

The safe PI function framework creates a foundation for further tightening the query complexity of Tarski fixed points. Primary open challenges include:

  • Extending the structural trimming approach beyond NPcoNP\mathbf{NP} \cap \mathbf{coNP}5, potentially proving NPcoNP\mathbf{NP} \cap \mathbf{coNP}6 sufficiency for all fixed NPcoNP\mathbf{NP} \cap \mathbf{coNP}7.
  • Developing fully time-efficient (not just query-efficient) algorithms under this framework.
  • Illuminating connections to NPcoNP\mathbf{NP} \cap \mathbf{coNP}8, NPcoNP\mathbf{NP} \cap \mathbf{coNP}9, and other subclasses of TFNP, especially for classes of fixed point problems that avoid the exponential lower bounds observed in, for example, Brouwer settings.

Conclusion

This paper delivers a definitive characterization of the query complexity for the Tarski fixed point problem up to dimension four, unifying and extending prior lines of attack and establishing a new analytic toolkit for the domain. The introduction and direct use of safe partial-information functions not only advances upper bounds, but also deepens our understanding of the combinatorial landscape underlying fixpoint computation. The methods and results presented are likely to influence both the structural theory and the algorithmic practice of search problems in lattices, games, and beyond.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.