1. Introduction
The concept of an inverse function is foundational. However, its binary nature, either fully existing or not, limits its descriptive power for intermediate states. This work develops a continuous generalization by introducing a parameter , the degree of partial inversion, such that yields the identity map and yields the full inverse. Intermediate values define a partial inverse that smoothly deforms the identity operation toward a full inversion.
This theory, termed
Functional Partial Inversion (FPI), is distinct from existing uses of
partial inverse in linear algebra or functional programming [
1], and should not be confused with fractional iterative roots or functional interpolation. While philosophically linked to regularization in inverse problems [
2], FPI offers a unique, function-centric framework for controlled interpolation between two fundamental operators. The primary objectives of the present work are,
- 1.
To axiomatically define the partial inverse as an interpolation between the identity and .
- 2.
To propose and analyze constructive schemes for .
- 3.
To demonstrate its utility in applications requiring tunable, regularized inversion.
2. Mathematical Foundations and Axioms
Let be a function. The theory of Functional Partial Inversion applies to intervals where f is a bijection. Formally, we consider a monotone branch of f: an interval such that the restriction is continuous and strictly monotone, ensuring the existence of a classical continuous inverse . The FPI family is defined for such a branch.
Definition 1 (Functional Partial Inverse Family).
A Functional Partial Inverse Family for f is a one-parameter family of operators
satisfying the following axioms,
- 1.
Identity Boundary Condition: for all .
- 2.
Inverse Boundary Condition: for all .
- 3.
Consistency (Semigroup Property):For all with , the following holds wherever composition is defined:
- 4.
Parameter Continuity:The mapping is continuous for fixed .
The operator is called the partial inverse of degree α.
The central challenge is to construct specific families that satisfy Definition 1. The following three schemes provide distinct constructive methods, each leading to a valid FPI family for suitable classes of functions.
3. Interpolation Schemes and Their Properties
All schemes define as an interpolation between the identity output and the full inverse output , but under different metrics.
3.1. Scheme A: Additive Affine Interpolation
This scheme performs a convex combination of the function’s action and the identity, with the weight of the function increasing with .
Definition 2
(Additive FPI).
For a given y, the additive partial inverse is the unique solution p to,
Properties: Well-defined for continuous, strictly monotone
f by the Intermediate Value Theorem [
3]. It is the most general scheme for real-valued functions. For a linear function
, it yields an explicit linear partial inverse:
, which satisfies the group property exactly. The parameter
controls the blend: at
, the equation reduces to
(identity); at
, it becomes
(full inverse). This construction is theoretically appealing for its direct use of
and its connection to iterative methods.
3.2. Scheme M: Multiplicative Geometric Interpolation
Natural for positive functions, this scheme operates multiplicatively, with the exponent on the function value increasing with .
Definition 3
(Multiplicative FPI).
For and , the multiplicative partial inverse is the unique positive solution p to,
Properties: Taking logarithms transforms it into an additive interpolation in log-space:
. It is ideal for exponential and power-law functions. For example, with
, solving for
leads to
, or
, whose solution is
, where
W is the Lambert W function [
4]. The boundary conditions are verified:
gives
;
gives
.
3.3. Scheme R: Resolvent Fixed-Point Interpolation
This scheme uses a fixed-point equation reminiscent of resolvent operators, linearly interpolating between applications of the inverse.
Definition 4
(Resolvent FPI).
The resolvent partial inverse is defined as the solution p to,
Properties: It explicitly uses the known inverse . Its analysis connects to the contractive properties of the map . The boundary conditions are such that when , the equation defines p as a fixed point of , which holds for any p in the domain (identity action); when , it yields (full inverse).
3.3.0.1
Each scheme provides a distinct mechanism for constructing a valid FPI family, with their suitability depending on the properties of f and the intended application, as detailed in the subsequent sections.
4. Core Theoretical Results
This section establishes the fundamental mathematical properties of the three Functional Partial Inversion (FPI) schemes. We present existence and uniqueness theorems, analyze the group-like composition property, derive the governing differential equations for the inversion flow, and discuss stability and convergence characteristics.
4.1. Results for the Additive Scheme
Theorem 1
(Existence and Uniqueness for Additive FPI). Let be strictly monotone on an interval I. For any and any y in the interval , there exists a unique satisfying . Consequently, the additive partial inverse is a well-defined, differentiable, and strictly monotone function.
Proof. Define . Then . Since maintains a constant sign (positive for increasing, negative for decreasing) and , we have for all . Therefore, is a strictly monotone, continuously differentiable bijection from I onto its image . The partial inverse is explicitly given by , inheriting its properties from the inverse function theorem. □
Theorem 2
(Group Property for Additive FPI on Linear Functions).
For a linear function with , the additive FPI satisfies the exact group property,
where the composition is defined on appropriate domains. The explicit form is .
Proof. The formula for follows from solving . Direct computation of the composition yields the result. □
Theorem 3
(Inversion Flow for Additive FPI).
Let . For a fixed y in the common domain, G satisfies the first-order flow equation,
with initial condition . This describes the continuous trajectory of the solution as α evolves from 0 (identity) to 1 (full inverse).
Proof. Differentiate the defining equation
with respect to
,
Solving for
yields (
4). The initial condition follows from
. □
4.2. Results for the Multiplicative Scheme
Theorem 4
(Existence and Uniqueness for Multiplicative FPI). Let be a , strictly monotone bijection. For any and any , there exists a unique satisfying . Thus, the multiplicative partial inverse is well-defined and continuous.
Proof. Consider the logarithmic transformation. Define and . The multiplicative equation becomes , where . This is an additive FPI equation for . Since f is strictly monotone and positive, is strictly monotone. Applying Theorem 1 to guarantees a unique solution , and hence a unique . □
Theorem 5
(Group Property for Multiplicative FPI on Power Functions).
For a power function (), the multiplicative FPI satisfies the exact group property:
The explicit form is .
Proof. For , the defining equation is . Solving for p gives the formula. The group property follows by direct calculation. □
Theorem 6
(Logarithmic Flow for Multiplicative FPI).
Let . Then L satisfies the additive flow equation:
This is the counterpart of (4) in logarithmic coordinates.
Proof. This follows from applying the transformation to the multiplicative defining equation and using Theorem 3. □
4.3. Results for the Resolvent Scheme
Theorem 7
(Existence and Uniqueness for Resolvent FPI).
Let be a bijection with a Lipschitz continuous inverse . Consider the fixed-point iteration defined by the resolvent scheme:
For any and , the iteration mapping is a contraction on I provided , where and are the Lipschitz constants of and f respectively. Consequently, exists uniquely as the fixed point of T.
Proof. The mapping T is a convex combination of the constant and the function . The latter is non-expansive. Using the Banach fixed-point theorem, the condition for contraction is met when the weight on the non-expansive part is sufficiently small or when the composition is itself a contraction. □
Proposition 1
(Resolvent as an Implicit Additive Form). For a linear function , the resolvent scheme is equivalent to the additive scheme. For nonlinear f, the resolvent equation can be rearranged to an equation of the form for a suitably transformed function , linking it to the additive framework.
4.4. General Properties
Theorem 8
(Scheme Equivalence under Transformation). The additive and multiplicative schemes are equivalent under a differentiable, strictly monotone transformation ϕ. Specifically, if , then the additive FPI for g is related to the multiplicative FPI for f via , where for the positive real line.
Proposition 2
(Approximate Group Property for General Functions).
For a generic nonlinear, strictly monotone function f, the FPI operators satisfy the group property approximately in a neighborhood of . That is,
for sufficiently small. The error term is related to the curvature of the function f.
Proposition 3
(Global Convergence of Homotopy Iteration).
For the additive FPI scheme applied to solving via the homotopy iteration
with a suitably chosen increasing sequence , the iteration converges globally to a root for any continuous under the conditions of Theorem.1, provided the root exists.
Remark 1.
The flow equation (4) provides a continuous perspective on the inversion process. It can be used to design higher-order numerical methods for computing partial inverses and for analyzing the stability of associated iterative solvers, connecting FPI to dynamical systems theory.
5. Illustrative Examples
This section provides a diverse set of examples demonstrating the construction and properties of Functional Partial Inverses (FPI) across the three schemes. Each example verifies the boundary conditions (identity) and (full inverse). For the identity function , all three schemes trivially yield the identity for all ,
Additive:.
Multiplicative:.
Resolvent:.
This serves as a consistency check for the theory.
5.1. Examples for the Additive Scheme
Example 1
(Linear Function).
Let , with inverse . The additive FPI solves . Solving gives the closed-form partial inverse:
With,
This linear interpolation between identity and inverse provides the simplest illustration of the FPI concept.
Example 2
(Quadratic Function on Restricted Domain).
Consider defined by , with inverse . The additive FPI equation is . This is a quadratic in p,
The positive root (ensuring ) provides the partial inverse,
For , the equation reduces to . Thus,
Example 3
(Sine Function on a Monotone Branch).
Consider the principal branch of the sine function, restricted to the interval where it is strictly increasing and invertible: , defined by . Its classical inverse on this branch is . The additive FPI for this branch solves,
This transcendental equation defines the partial inverse implicitly, it does not admit a simple closed-form solution for general α, but the partial inverse is well-defined by Theorem.1. Numerical methods, as discussed later, can efficiently compute for given y and α. The boundary conditions are satisfied by construction on this branch,
: The equation reduces to . Since I and J are different sets, this maps a point in the codomain J back to the corresponding point in the domain I along the identity line, respecting the branch restriction.
: The equation becomes , whose unique solution in I is .
This example demonstrates the application of FPI to a standard non-injective function by rigorously restricting to a monotone branch, analogous to the definition of standard inverse functions.
5.2. Examples for the Multiplicative Scheme
Example 4
(Power Function).
Let be , with inverse . The multiplicative FPI equation is . Solving gives,
where
This shows that for power functions , the multiplicative FPI yields another power function.
Example 5
(Exponential Function and the Lambert W).
Let , with inverse . The multiplicative FPI solves:
For general , this equation does not simplify to elementary functions. However, it defines the partial inverse uniquely. Boundary verification,
A notable special case occurs for . Equation (1) becomes,
The solution is given by the Lambert W function [4]:
This provides an analytic expression for thehalf-inverseof the exponential function, connecting FPI to known special functions.
Example 6
(Logarithmic Function).
Let be , with inverse . The multiplicative scheme is designed for positive ranges, but can be negative. We consider the shifted function which maps to for . Applying the multiplicative FPI to g,
This implicit equation defines the partial inverse of the shifted logarithm. For the original f, one may use the additive scheme instead, highlighting that scheme choice depends on the function’s range.
5.3. Examples for the Resolvent Scheme
Example 7
(Linear Function via Resolvent Scheme).
Reconsider . The resolvent scheme equation is,
Simplifying the right side, . The equation becomes , which reduces to . For , this gives , which is for all . To recover the identity at , the fixed-point selection must choose . This reveals a nuance; for linear functions, the resolvent scheme’s fixed-point equation is satisfied by the inverse for any , and the continuous selection of the fixed point branch as a function of α is needed to satisfy the boundary conditions continuously.
Example 8
(A Non-Linear Case for Resolvent Scheme).
Let , a strictly increasing function. Its inverse is not elementary. The resolvent FPI is defined by the fixed-point equation,
For a given y, one can compute numerically (as the unique root of ). The equation above then defines an implicit relation for p. An iterative numerical method can be used to find the fixed point . This example shows the resolvent scheme’s utility when can be evaluated numerically but not expressed in closed form.
6. Applications of Functional Partial Inversion
6.1. Homotopy Method for Transcendental Equations
FPI naturally defines a homotopy for solving
. Consider the homotopy
For , , making every point a (trivial) solution. For , , the target equation.
Numerical Path Following: Differentiating with respect to yields a differential equation for the solution path . Starting at an easy solution for (e.g., an initial guess ) and numerically integrating to yields a solution to . This method is globally convergent for convex problems.
Fixed-Point Iteration Form: A simpler approach uses the fixed-point iteration derived from the additive scheme,
where
is increased from 0 to 1 during iteration. This blends a stable identity step (
) with the full inverse step (
), ensuring robustness.
6.1.1. A Concrete Example: Homotopy Solution of
This section provides a detailed, step-by-step numerical demonstration of the FPI-based homotopy method for solving the transcendental equation,
Equation (
6) has two well-known real roots, providing an excellent test case for the global convergence properties of the method.
Homotopy Construction via Additive FPI
Following the additive FPI scheme, we construct the homotopy
,
For a fixed
, a zero of
satisfies
. The homotopy trivializes at
, where
. Using the implicit definition of the additive partial inverse
, the homotopy equation
can be rewritten in a fixed-point form suitable for numerical path following,
For our specific functions, with
and
, equation (
7) becomes: find
p such that,
where
q is the value from the previous iteration or continuation step.
Numerical Continuation Algorithm
We implement a numerical continuation (path-following) method to trace the solution curve from to . The algorithm proceeds as follows:
- 1.
Initialization: Discretize the interval
with step size
, so
for
. Choose initial values
for distinct solution branches. For equation (
6), we start two paths:
and
.
- 2.
Predictor Step: For each new , use the solution at as an initial guess: .
- 3.
-
Corrector Step: Solve equation (
8) for
p at
, using
on the right-hand side. This requires solving the scalar nonlinear equation,
for
p. This is efficiently accomplished with 2-3 iterations of Newton’s method, leveraging the derivative,
The corrected value is assigned to .
- 4.
Final Solution: The value at
,
, is a root of the original equation (
6).
Results and Analysis
The algorithm was implemented in double-precision arithmetic. The progression of the two solution paths
and
is shown in
Table 1.
The final values at converge to the known roots and . The homotopy paths are smooth and monotonic, demonstrating the stability of the FPI framework. The key advantage is evident: the method successfully tracks both roots from initial guesses that are not particularly close to the final solutions, showcasing the global convergence characteristic of well-constructed homotopy methods.
6.1.2. Numerical Comparison: Newton’s Method vs. FPI Homotopy Method
To demonstrate the practical utility of the FPI framework, we present a direct comparison between the classical Newton’s method and the FPI-based homotopy continuation method for solving the transcendental equation .
Implementation of the Methods
- 1.
-
Newton’s Method (NM): The standard iteration is given by
The iteration terminates when or after 100 iterations.
- 2.
FPI Homotopy Method (FPI-H): We employ the additive scheme continuation algorithm detailed in
Section 6.1.1. The homotopy parameter
is increased from 0 to 1 in 20 uniform steps (
). At each step, the implicit equation
is solved for
p using 3 iterations of Newton’s method as a corrector, initialized with the previous path value
.
Comparison of Convergence Behavior
The key distinction between the methods lies in their basins of attraction. Newton’s method exhibits local quadratic convergence but is highly sensitive to the initial guess . In contrast, the FPI homotopy method, by constructing a continuous path from a trivial problem, can achieve global convergence from a much wider set of starting points.
Table 2 summarizes the outcome for various initial guesses. Success is defined as convergence to either of the two true roots
or
with a residual error less than
. Failure denotes convergence to the other root (when undesired), divergence, or exceeding the iteration limit.
Analysis and Discussion
The results clearly illustrate the stabilizing effect of the FPI homotopy approach.
Robustness: Newton’s method fails for initial guesses that are negative or too large because the local linear model becomes a poor approximation, leading to divergent steps. The FPI-H method succeeds in all tested cases because the continuation process, starting at , ensures the initial corrections are small and guided by the stable homotopy path.
Root Selection: A significant finding is the case . Newton’s method converges to the larger root , despite being closer to the smaller root ( 0.73 vs. 1.15 in absolute distance). This highlights the unpredictable nature of local basins of attraction. The FPI-H method, tracking the specific path from , correctly converges to the appropriate root , demonstrating that the homotopy path preserves topological information about the solution branch.
Computational Cost: The superior robustness of FPI-H comes with a higher computational cost per run. A single Newton convergence typically requires 5-10 iterations. The FPI-H run involves 20 continuation steps, each using 3 Newton corrections, totaling 60 function evaluations. This represents a trade-off between efficiency (favoring NM when a good initial guess is known) and reliability (favoring FPI-H for autonomous solving or with poor initial information).
This comparison substantiates the primary application claim of the FPI theory: it provides a systematic framework for constructing globally convergent homotopy methods. For the challenging equation , the FPI-based method reliably locates roots from arbitrary initial guesses, effectively mitigating the main weakness of Newton’s method. This makes FPI-H particularly valuable in applications where robust, fail-safe numerical solutions are required, and prior knowledge of root locations is minimal.
6.2. Cryptographic Primitive with Progressive Revelation
The partial inverse can act as a one-way function whose invertibility is controlled by . Let f be a public one-way function. A secret s is hidden as , with acting as a decryption key. The legitimate user, knowing , computes . An adversary with a partial key computes , which only yields a different value between s and c, not the true secret. The system’s security relies on the sensitivity of the final output to near .
6.3. Data Privacy via Progressive Obfuscation
For sensitive data
, FPI can generate a transform where
controls privacy level [
5], by applying a multiplicative FPI:
. For
, this gives
(solving
). An analyst receives
. With
, they see the true data
x. With
, they see fully squared data
. A trusted party can use
to recover
, while others see an obscured value.
6.4. Regularized Signal Deconvolution
Recovering signal
x from data
(with blur
f, noise
) is ill-posed [
2]. Direct inverse
is noisy. A FPI approach is to use
with
. Here,
is a regularization parameter:
gives maximal inversion (and noise),
gives the identity (smooth, no inversion). This is a tunable filter.
6.5. Modeling Path-Dependence in Dynamics
FPI can interpolate between a forward process and its inverse, modeling systems with path-dependent memory or hysteresis [
6]. Let a forward dynamic be
and its reverse be
. An
-dependent process is
. For
, the state doesn’t change (identity/memory) while for
, it follows the forward law. At intermediate
, the next state is a
partial update, blending past state and forward evolution, which can model inertia or partial reversibility/irreversibility.
7. Conclusions
We have presented Functional Partial Inversion as a coherent theory where interpolates continuously from the identity to the full inverse. This framework provides a powerful tool for homotopy methods, regularization, and modeling controlled transformations. Future work includes extending FPI to multivariate and operator settings, exploring its connection to fractional calculus and Tikhonov regularization, and developing adaptive algorithms for optimal -selection in applications.
References
- Almendros-Jiménez, J.M.; Vidal, G. Automatic Partial Inversion of Inductively Sequential Functions. In Proceedings of the Implementation and Application of Functional Languages; Springer Berlin Heidelberg, 2007; pp. 253–270. [Google Scholar] [CrossRef]
- Tarantola, A. Inverse Problem Theory and Methods for Model Parameter Estimation; Society for Industrial and Applied Mathematics, 2005. [Google Scholar]
- Rudin, W. Principles of Mathematical Analysis, 3 ed.; McGraw-Hill, 1976. [Google Scholar]
- Corless, R.M.; Gonnet, G.H.; Hare, D.E.G.; Jeffrey, D.J.; Knuth, D.E. On the Lambert W function. Advances in Computational Mathematics 1996, 5, 329–359. [Google Scholar] [CrossRef]
- Gurevich, Y.; Hudis, E.; Wing, J.M. Inverse Privacy. Communications of the ACM 2015, 59, 38–42. [Google Scholar] [CrossRef]
- Ostrich, K.; Parley, J.T.; Marlow, H. Irreversibility in dynamical phases and transitions. Nature Communications 2021, 12, 392. [Google Scholar] [CrossRef] [PubMed]
Table 1.
Evolution of solution paths for via FPI-based homotopy continuation.
Table 1.
Evolution of solution paths for via FPI-based homotopy continuation.
|
Path 1:
|
Path 2:
|
| 0.00 |
0.50000000 |
2.50000000 |
| 0.20 |
0.40119361 |
2.25431594 |
| 0.40 |
0.33125074 |
2.17142493 |
| 0.60 |
0.28765942 |
2.15393487 |
| 0.80 |
0.26923390 |
2.15329536 |
| 1.00 |
0.26716893 |
2.15329236 |
Table 2.
Comparison of convergence for the equation .
Table 2.
Comparison of convergence for the equation .
| Initial Guess
|
Newton’s Method Outcome |
FPI-H Outcome |
Remarks |
|
Diverges |
Converges to
|
NM fails for negative starts. |
|
Converges to
|
Converges to
|
Both succeed. |
|
Converges to
|
Converges to
|
Both succeed. |
|
Converges to
|
Converges to
|
NM finds the wrong root for this guess. |
|
Converges to
|
Converges to
|
Both succeed. |
|
Converges to
|
Converges to
|
Both succeed. |
|
Converges to
|
Converges to
|
Both succeed. |
|
Diverges |
Converges to
|
NM diverges for large . |
|
Diverges |
Converges to
|
NM diverges severely. |
|
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).