Preprint
Article

This version is not peer-reviewed.

Orbit-Collapse Complexity: A Symmetry-Based Lens on P, NP, and Structured Cores

Submitted:

05 September 2025

Posted:

08 September 2025

You are already at the latest version

Abstract
We introduce \emph{Orbit-Collapse Complexity} (OCC), a symmetry-aware framework that explains when NP problems behave as polynomial-time problems. If instances canonically collapse to \emph{polynomially many types} under an explicit group action, with polytime canonicalization and per-type solvers, the whole language is in P. We quantify ``how much structure'' a problem exhibits via (i) \emph{orbit coverage} (fraction of solution orbits captured by a P-core), (ii) a \emph{type-growth exponent} (asymptotic number of canonical types), and (iii) an \emph{orbit-compressibility} index (stabilizer size). We enforce hardness beyond cores via \emph{Layer-Respecting Reductions} (LRR) that preserve or raise layer depth. For Sudoku we give closed formulas for separable classes, a degree-4 certificate for the bi-affine layer, and Pólya blueprints for piecewise families. The result is a measurable frontier between P-like cores and genuinely hard remainder, offering a unifying lens across SAT, Graph Coloring, TSP, IP, and Sudoku.
Keywords: 
;  ;  ;  ;  ;  ;  ;  ;  

1. Introduction

The P vs NP question asks whether every language whose YES-certificates can be verified in polynomial time also admits polynomial-time decision procedures. This work develops a symmetry- and type-theoretic lens, Orbit-Collapse Complexity (OCC), that (i) proves sufficiency criteria for polynomial-time decidability, (ii) quantifies the structured mass of tractable subfamilies, and (iii) provides reduction policies that target hardness outside those subfamilies. Our contributions are:
  • Collapse ⇒ P (Theorem 1): If instances canonically compress to polynomially many types with polytime canonicalization and per-type solvers, the language is in P.
  • Metrics for structure: orbit coverage, type-growth exponents, and orbit-compressibility index make “how much collapses” a measurable notion.
  • Distance-to-core algorithms: XP and FPT meta-theorems for instances at bounded edit distance from a P-core.
  • Layer-Respecting Reductions (LRR): reductions that preserve or raise layer depth, supporting hardness beyond cores.
  • Sudoku case study: exact separable class law, bi-affine degree-4 certificates, and Pólya formulas for piecewise families.

2. Model and Symmetries

We consider finite-domain CSP families; the discussion covers SAT, Graph Coloring, Sudoku/Latin, Integer Programming encodings, TSP with discrete symmetries, etc.
Definition 1 
(CSP family). A CSP family L = { L n } n 1 has instances of size n over a finite domain D. Each instance I L n specifies constraints of bounded arity on variables V ( I ) with | V ( I ) | = poly ( n ) . The language is the decision problem: “Does I admit a solution?”
Definition 2 
(Symmetry group). For each n, let G n be a finite group that acts on instances and solutions. The orbit of X is G n · X = { g · X : g G n } and the stabilizer is Stab G n ( X ) = { g : g · X = X } .
Definition 3 
(Orbit-compressibility). For a solution S, define κ ( S ) = 1 log | Stab G n ( S ) | log | G n | [ 0 , 1 ] . Small κ indicates large stabilizer (high structure).

3. Constructors, Layers, and P-Cores

Definition 4 
(Constructor, Layer). Aconstructor  C is a uniform polytime recognizer that defines a syntactic subfamily K n C L n . A list S 0 , S 1 , defines layers  S t ( n ) = K n S t . A fixed layer order assigns each solution to the first matching layer; layers become disjoint by fiat.
Definition 5 
(P-core). A P-core is a constructor family K = { K n } with polytime membership (and, when needed, polytime canonicalization within its symmetry). Trivial finite sets are excluded.
Proposition 1. 
If membership in K n is decidable in time poly ( n ) , then deciding L restricted to K is in P.

4. Orbit-Collapse ⇒ P

Definition 6 
(Types and canonicalization). Fix an equivalence ∼ (e.g., the G n -action or a coarser invariant). Let T n be the set of canonical representatives. A canonicalizer is a polytime map can ( I ) T n with I can ( I ) .
Theorem 1 
(Orbit-Collapse ⇒ P). Let L = { L n } . Suppose for all n: (i) | T n | n c ; (ii) can ( I ) is computable in poly ( n ) ; (iii) there is a poly ( n ) predicate A on T n with I L n A ( can ( I ) ) = 1 . Then L P .
Proof. 
On input I, compute T = can ( I ) and return A ( T ) . Correctness is by (iii). Runtime is polynomial by (ii)–(iii). The bound (i) ensures that the analysis of types is polynomially bounded and realizable.    □

5. Quantifying Collapse

Let O n ( L ) be solution orbits in L n under G n ; O n ( K ) for a core K. We use:
  • Orbit coverage  μ n ( K L ) = | O n ( K ) | | O n ( L ) | ;
  • Type-growth exponent  γ ( K ) = lim sup n log | T n ( K ) | log n ;
  • Core ratio inside a layer  ρ K R ( n ) = | O n ( K ) | | O n ( R ) | for K R L .

6. Algorithms by Distance-to-Core

Definition 7 
(Edit distance). Fix a finite set Δ of local edit templates. For instance I, let dist Δ ( I , K ) be the minimum number of Δ-edits sending I into K.
Lemma 1 
(XP by bounded edits). For bounded-arity CSPs and any P-core K, satisfiability is decidable in time n O ( d ) · poly ( n ) , where d = dist Δ ( I , K ) .
Proof. 
Branch over n O ( d ) candidate edit sets of size d, test membership in K in polynomial time, and verify consistency.    □
Theorem 2 
(FPT under bounded boundary width). Assume: (i) constraints have bounded arity; (ii) any set of d edits induces a defect substructure of treewidth w ( d ) ; (iii) the core K is MSO-definable on bounded-treewidth hosts. Then satisfiability is decidable in time f ( d ) · poly ( n ) .
Proof sketch. 
Enumerate the interface between the edited region and K; apply DP/Courcelle on a tree decomposition of width w ( d ) to glue feasible assignments consistent with K. All combinatorics depend on d only.    □

7. Layer-Respecting Reductions (LRR)

Definition 8 
(Layer depth). Given layers S 0 , S 1 , , define ( I ) = min { t : I has a solution in S t } .
Definition 9 
(LRR at depth t). A reduction R : A B is layer-respecting at depth t if ( R ( I ) ) min { ( I ) , t } for all I.
Proposition 2 
(Closure). If R 1 is LRR at depth t 1 and R 2 at depth t 2 , then R 2 R 1 is LRR at depth min { t 1 , t 2 } .
Proof. 
Immediate from the definition.    □
Conjecture 1 (Layered ETH (L-ETH)). 
For each fixed t, there exists c t > 0  such that deciding instances with  ( I ) > t requires time 2 c t n (under ETH/SETH-style assumptions), witnessed by LRRs from 3-SAT that pushℓabove t.

8. Layered Orbit Sums (Accounting)

Let Ω n be all solutions at size n, with layer-ordered assignment (each solution taken by the first matching layer). Then:
Theorem 3 
(Layered Orbit Sum). | Ω n | = L [ S ] L / G n | G n | | Stab G n ( S ) | , with an extra factor m ! / | Aut s y m ( S ) | if symbol relabeling is counted, where m = | D | .
Proof. 
Orbit–stabilizer plus disjointness of layer assignment.    □

9. Proof-Complexity Calibration inside Layers

Proposition 3 
(Bi-affine ⇒ low-degree certificates). In bi-affine layers (e.g. Sudoku S 1 ), feasibility/infeasibility has polynomial-size polynomial-calculus and degree-4 sum-of-squares certificates after standard symmetry breaking.
Proof sketch. 
Encode row/column/box bijectivity by quadratic equations over 0 / 1 indicators; the bi-affine placement map linearizes under a fixed normal form so constraints reduce to degree 2 identities. SOS/PC derives these with degree 4 .    □

10. Sudoku Case Study: Formulas and Laws

Let k be the box order; grid size n = k 2 ; position symmetry G k = ( S k S k ) r o w s × ( S k S k ) c o l s with canonical digit relabeling.

Separable layer S 0

Two orbit sizes arise: large  = 2 φ ( k ) 2 and small = φ ( k ) 2 . Let r 2 ( k ) = | { x ( Z k ) × : x 2 1 ( mod k ) } | , v 2 ( k ) the 2-adic valuation, and ω o d d ( k ) the number of distinct odd primes dividing k.
Theorem 4 
(Separable class law). S s e p ( k ) = φ ( k ) 2 + E ( k ) 2 with E ( k ) = 2 r 2 ( k ) , v 2 ( k ) 1 and ω o d d ( k ) 1 , 4 r 2 ( k ) , otherwise . Moreover #small classes = E ( k ) and #large = ( φ ( k ) 2 E ( k ) ) / 2 .
Proof outline. 
Parameterize separable constructors by ( α , β ) ( ( Z k ) × ) 2 producing type pairs ( s , t ) . The group G k together with internal permutations on ( s , t ) acts on this parameter space. By the Chinese Remainder Theorem, ( Z k ) × p e k ( Z p e ) × and each factor contributes fixed points corresponding to involutions ( x 2 1 ). These yield index-2 stabilizers responsible for small orbits; counting across CRT components gives a factor r 2 ( k ) . The doubling E ( k ) = 2 r 2 ( k ) in the prime-lean regime ( v 2 1 , at most one odd prime) and E ( k ) = 4 r 2 ( k ) in composite-rich cases reflects whether both axes admit independent involutive symmetries after normal forms. A detailed orbit–stabilizer enumeration (omitted here for brevity) completes the count.    □

Bi-affine layer S 1

Empirically (and provably for small k): C l i n ( k ) = 3 k 2 5 k + ε ( k ) , with ε ( k ) = 2 if 6 k , else 0; and C n o n s e p = C l i n S s e p . For prime k > 3 , φ ( k ) = k 1 and the ratio S s e p C l i n = ( k 1 ) 2 + 4 2 ( 3 k 2 5 k ) = 1 6 + O ( 1 / k ) shows a constant-order core inside S 1 .

Piecewise Layers S 2 , S 3

With multiplicative local catalogs T * ( k ) = p e k t * ( p e ) (tabulated by small fixed-point counts), exact Pólya forms are C S 2 ( k ) = 1 2 T U ( k ) + k 1 k T V ( k ) + k 1 k , C S 3 ( k ) = 1 2 T Q ( k ) + k 1 k 2 .

11. Taxonomy by Collapse

  • S-OC: complete constructor + polytime canonicalization + | T n | n O ( 1 ) ⇒ language in P (Thm. 1).
  • W-OC: large P-cores with subexponential type growth and nontrivial orbit coverage; full language may remain NP-hard.
  • NC: no such collapse under the chosen symmetries; expect NP-hardness beyond cores; target LRR.

12. How to Apply OCC

Pick G n ; design constructors S 0 , S 1 , ; count types; establish canonicalization and per-type tests; compute μ n , γ , ρ ; design distance-to-core algorithms; and craft LRR gadgets for hardness outside cores.

13. What is Proved vs Conjectured

Proved here: Collapse ⇒ P (Thm. 1); layered orbit sum; core-in-P; LRR closure; XP/FPT meta-results (with stated locality assumptions); bi-affine degree-4 certificates (Prop. 3) with constructive sketch.
Conjectural: L-ETH; full proof of the bi-affine count C l i n ( k ) for all k; Wreath-invariant SoS lower bounds beyond cores.

Funding

No external funding.

Data Availability Statement

Tables and code snippets sufficient to reproduce all counts are included in the appendix; additional scripts will be provided upon request.

Acknowledgments

The author thanks collaborators and the broader community for feedback on early drafts of the OCC framework.

Conflicts of Interest

The author declares no conflict of interest.

Ethics

This study involves no human or animal subjects.

Appendix A. Python Utilities

import math
def phi(n):
    r, m, p = n, n, 2
    while p*p <= m:
        if m % p == 0:
            while m % p == 0: m //= p
            r -= r // p
        p += 1
    if m > 1: r -= r // m
    return r
def r2(n):
    c = 0
    for x in range(1, n):
        if math.gcd(x, n) == 1 and (x*x) % n == 1:
            c += 1
    return c
def v2(n):
    e = 0
    while n % 2 == 0 and n > 0:
        n //= 2
        e += 1
    return e
def omega_odd(n):
    s, m, p = set(), n, 2
    while p*p <= m:
        if m % p == 0:
            if p % 2: s.add(p)
            while m % p == 0: m //= p
        p += 1
    if m > 1 and m % 2 == 1:
        s.add(m)
    return len(s)
def S_sep(k):
    phi2 = phi(k)**2
    R2 = r2(k)
    E = (2*R2) if (v2(k) <= 1 and omega_odd(k) <= 1) else (4*R2)
    return (phi2 + E)//2

References

  1. S. Cook, “The Complexity of Theorem-Proving Procedures,” Proceedings of the Third Annual ACM Symposium on Theory of Computing (STOC), 1971.
  2. R. M. Karp, “Reducibility among Combinatorial Problems,” in Complexity of Computer Computations, 1972.
  3. Courcelle, B. The Monadic Second-Order Logic of Graphs I: Recognizable Sets of Finite Graphs. Information and Computation 1990, 85(1), 12–75. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

Disclaimer

Terms of Use

Privacy Policy

Privacy Settings

© 2025 MDPI (Basel, Switzerland) unless otherwise stated