The deep interconnection between linear algebra and graph theory allows one to interpret classical matrix invariants through combinatorial structures. To each square matrix A over a commutative ring K, one can associate a weighted directed graph D(A), where the algebraic behavior of A is reflected in the combinatorial properties of D(A). In particular, the determinant and characteristic polynomial of A admit elegant formulations in terms of sign-weighted sums over linear subdigraphs of D(A), thereby providing a graphical interpretation of fundamental algebraic quantities. Building upon this correspondence, we establish a combinatorial proof of the trace Cayley-Hamilton theorem. This theorem furnishes explicit trace identities linking the coefficients of the characteristic polynomial of A with the traces of its successive powers.
- Paper ID: 2511.06689
- Title: A combinatorial proof of the trace Cayley-Hamilton theorem
- Author: Sudip Bera (Dhirubhai Ambani University, Gandhinagar, India)
- Classification: math.CO (Combinatorics)
- Publication Date: November 10, 2025 (arXiv preprint)
- Paper Link: https://arxiv.org/abs/2511.06689
- MSC2020 Classification: 05C30; 05C50
This paper exploits the deep connections between linear algebra and graph theory to provide combinatorial interpretations of classical matrix invariants. For an n×n matrix A over a commutative ring K, one can associate a weighted directed graph D(A), where the algebraic behavior of A is reflected in the combinatorial properties of D(A). In particular, the determinant and characteristic polynomial of A can be elegantly expressed as signed weighted sums over linear subdigraphs of D(A), thereby providing graphical interpretations of fundamental algebraic quantities. Based on this correspondence, the paper establishes a combinatorial proof of the trace Cayley-Hamilton theorem, which provides explicit identities connecting the coefficients of the characteristic polynomial with the traces of matrix powers.
This paper aims to provide a purely combinatorial proof of the trace Cayley-Hamilton theorem, which establishes identities relating the coefficients of the characteristic polynomial to the traces of matrix powers:
For the characteristic polynomial pA(λ)=λn+d1λn−1+⋯+dn, we have:
- When r>n: Tr(Ar)+Tr(Ar−1)d1+⋯+Tr(Ar−n)dn=0
- When 1≤r≤n: Tr(Ar)+Tr(Ar−1)d1+⋯+rdr=0
- Theoretical Significance: The trace Cayley-Hamilton theorem is an elegant corollary of the classical Cayley-Hamilton theorem, but for arbitrary r, it lacks a direct algebraic derivation
- Combinatorial Perspective: Provides a new understanding through graph-theoretic methods, revealing deep connections between matrix algebra and combinatorial structures
- Computational Significance: These identities have important applications in matrix computation and symbolic computation
- When r≥n, the result can be obtained by multiplying both sides of the classical Cayley-Hamilton theorem (pA(A)=O) by Ar−n and taking the trace
- However, for arbitrary r (particularly the case r≤n), no direct algebraic derivation is known
- Lacks combinatorial interpretation and intuitive understanding
This paper fills this theoretical gap by providing a unified, purely combinatorial proof method using the framework of weighted directed graphs, exploiting the combinatorial properties of linear subdigraphs and closed paths.
- Establishes the first purely combinatorial proof of the trace Cayley-Hamilton theorem, independent of algebraic derivations from the classical Cayley-Hamilton theorem
- Proposes a key intermediate theorem (Theorem 2.2), establishing a combinatorial identity between the sum of closed path weights and the sum of linear subdigraph weights:
- cr+cr−1ℓ1+cr−2ℓ2+⋯+cr−nℓn=0 (when r>n)
- cr+cr−1ℓ1+cr−2ℓ2+⋯+rℓr=0 (when 1≤r≤n)
- Constructs a clever sign-reversing involution, using pairing to cancel out the proof of the combinatorial identity
- Provides complete analysis of the 2×2 matrix case, with detailed computation of all linear subdigraphs and closed paths
- Establishes clear correspondence between matrix algebraic concepts and graph-theoretic concepts:
- Characteristic polynomial coefficients ↔ signed weighted sums of linear subdigraphs
- Traces of matrix powers ↔ sums of closed path weights
Input: An n×n matrix A=(aij) over a commutative ring K
Objective: Prove that for all integers r≥1, the trace Cayley-Hamilton identity holds
Key Idea: Convert algebraic objects (matrices, traces, characteristic polynomials) into combinatorial objects (weighted directed graphs, closed paths, linear subdigraphs), and prove the identity at the combinatorial level
For a matrix A=(aij)∈Kn×n, construct a weighted directed graph D(A):
- Vertex set: [n]={1,2,…,n}
- Edges: For each ordered pair (i,j), there is a directed edge from i to j with weight aij
- Definition: A collection γ of vertex-disjoint directed cycles
- Weight w(γ): The product of all edge weights in γ
- Cycle count c(γ): The number of cycles in γ
- Length L(γ): The total number of edges in γ
Define Lr as the set of all linear subdigraphs of length r, and define:
ℓr=∑γ∈Lr(−1)c(γ)w(γ)
Key Lemma (Lemma 1.1): The characteristic polynomial coefficient di=ℓi
- Definition: A path sequence u=x0,x1,…,xk=u starting and ending at vertex u
- Weight w(c): The product of all edge weights in the path
- Length L(c): The number of edges in the path
Define cr as the total weight of all closed walks of length r.
Key Lemma (Lemma 1.4): Tr(Ak)=ck
We need to prove:
- When r>n: cr+cr−1ℓ1+cr−2ℓ2+⋯+cr−nℓn=0
- When 1≤r≤n: cr+cr−1ℓ1+cr−2ℓ2+⋯+rℓr=0
Step 1: Combinatorial Interpretation of Weighted Sums
Consider all ordered pairs (c,γ) where:
- c is a closed walk
- γ is a linear subdigraph (possibly empty)
- L(c)+L(γ)=r
Define the weight: W((c,γ))=(−1)c(γ)w(c)w(γ)
Then the left side of the theorem = ∑(c,γ)W((c,γ))
Step 2: Pairing and Cancellation (Case r>n)
When r>n, either c and γ share vertices, or c is not a simple cycle. For each such pair (c,γ), construct a sign-reversing involution:
Scenario 1: c encounters vertex y in γ
- Let γy be the cycle in γ containing y
- Construct new pair: (c~,γ~), where c~ incorporates γy into the closed walk, γ~=γ∖{γy}
- Key Property: W((c~,γ~))=−W((c,γ))
Scenario 2: c completes a simple cycle cˊ without encountering γ
- Construct new pair: (c~~,γ~~), where c~~ removes cˊ from c, γ~~=γ∪{cˊ}
- Key Property: W((c~~,γ~~))=−W((c,γ))
This involution is sign-reversing, so the contributions of all "bad" pairs cancel out.
Step 3: GOOD Pairs and Extra Terms (Case r≤n)
Define the sets:
- BAD pairs B: c∩γ=∅ or c is not a simple cycle
- GOOD pairs A∖B: c∩γ=∅ and c is a simple cycle
BAD pairs cancel via the same involution. For GOOD pairs:
Key Observation: Each GOOD pair (c,γ) corresponds to a decomposition of a linear subdigraph γ˙=c∪γ on r vertices.
For each linear subdigraph γ˙ on r vertices, there are exactly r GOOD pairs:
- For each vertex vi∈{v1,…,vr}
- Let cvi be the cycle in γ˙ containing vi
- Construct pair (cvi,γi), where γi=γ˙∖{cvi}
The total contribution of these r GOOD pairs is:
∑i=1rW((cvi,γi))=r⋅(−1)c(γ˙)−1w(γ˙)
The contribution of the rℓr term is:
r⋅(−1)c(γ˙)w(γ˙)
Adding these:
r(−1)c(γ˙)[(−1)−1+1]w(γ˙)=0
Therefore the total sum is 0, completing the proof.
- Elegance of Involution Construction: The two different pairing strategies (incorporating cycles vs. extracting cycles) achieve complete sign reversal
- Cleverness of GOOD Pair Counting: Exploiting the symmetry that r vertices correspond to r decomposition methods, precisely canceling the extra rℓr term
- Unified Framework: Using a single combinatorial framework to handle both cases (r≤n and r>n)
- Geometric Intuition: Through graphical displays (Figures 8-9), abstract involution processes become visually intuitive
The paper demonstrates the method's effectiveness through a complete n=2 case.
A=(acbd)
The corresponding weighted directed graph D(A) has 2 vertices v1,v2 with edge weights:
- Self-loop at v1: weight a
- Self-loop at v2: weight d
- v1→v2: weight b
- v2→v1: weight c
Linear subdigraphs of length 1 (single self-loops):
- Self-loop at v1: weight a, sign (−1)1=−1
- Self-loop at v2: weight d, sign (−1)1=−1
- Therefore: ℓ1=−(a+d)
Linear subdigraphs of length 2:
- Two self-loops: weight ad, sign (−1)2=+1
- One 2-cycle (v1→v2→v1): weight bc, sign (−1)1=−1
- Therefore: ℓ2=ad−bc
Closed paths of length 1:
- Self-loop at v1: weight a
- Self-loop at v2: weight d
- Therefore: c1=a+d=tr(A)
Closed paths of length 2:
- Self-loop at v1 twice: weight a2
- Self-loop at v2 twice: weight d2
- v1→v2→v1: weight bc
- v2→v1→v2: weight cb
- Therefore: c2=a2+d2+2bc=tr(A2)
Closed paths of length 3 (8 total):
- Self-loops three times: a3,d3
- Self-loop plus 2-cycle combinations: 3abc+3dbc
- Therefore: c3=a3+d3+3bc(a+d)
Case r=1:
c1+ℓ1=(a+d)+(−(a+d))=0✓
Case r=2:
c2+c1ℓ1+2ℓ2=(a2+d2+2bc)+(a+d)(−(a+d))+2(ad−bc)=0✓
Case r=3>n=2:
c3+c2ℓ1+c1ℓ2=[a3+d3+3bc(a+d)]+[a2+d2+2bc][−(a+d)]+[a+d][ad−bc]=0✓
Detailed verification of the expansion process is provided in Example 2.1.
The paper's main result is a purely combinatorial proof of Theorem 2.1 (the trace Cayley-Hamilton theorem), completed through the following logical chain:
- Lemma 1.1: Establishes di=ℓi (characteristic polynomial coefficients = linear subdigraph weight sums)
- Lemma 1.4: Establishes Tr(Ak)=ck (traces of matrix powers = closed path weight sums)
- Theorem 2.2: Proves the combinatorial identity (relationship between closed paths and linear subdigraphs)
- Theorem 2.1: Follows directly from the above three results
Through complete case analysis of 2×2 matrices:
- All 8 closed paths of length 3 are completely enumerated and computed
- All linear subdigraphs (lengths 1 and 2) are completely analyzed
- All three identities (r=1,2,3) are successfully verified
- Demonstrates the operability and correctness of the method
The paper clearly presents through 9 figures (Figures 1-9):
- Construction of weighted directed graphs (Figure 1)
- Enumeration of linear subdigraphs (Figures 2-3)
- Classification of closed paths (Figures 4-7)
- Visualization of involution process (Figure 8)
- Counting of GOOD pairs (Figure 9)
These figures make abstract combinatorial arguments intuitively understandable.
- Fills Theoretical Gap: Provides the first direct proof of the trace Cayley-Hamilton theorem for the case r≤n
- Methodological Innovation: Novel application of sign-reversing involution technique in matrix theory
- Unification: Single framework handling all cases (r≤n and r>n)
This paper builds on the foundation of Brualdi and Cvetkovic's monograph 1, which systematically presents combinatorial methods in matrix theory, including:
- Correspondence between weighted directed graphs and matrices
- Combinatorial interpretation of determinants (Equation 3)
- Relationship between matrix powers and paths (Lemma 1.3)
Related combinatorial proof work includes:
- Straubing (1983) 4: Combinatorial proof of the Cayley-Hamilton theorem
- Zeilberger (1984, 1985) 5, 6:
- Combinatorial proof of Newton's identities
- Combinatorial methods in matrix algebra
- Mukherjee & Bera (2019) 3: Combinatorial proofs of Newton-Girard and Chapman-Costas-Santos identities
This paper directly responds to a question posed by Grinberg (2019) 2, which noted:
- The trace Cayley-Hamilton theorem can be derived from the classical theorem when r≥n
- However, for arbitrary r (particularly r≤n), direct algebraic or combinatorial proofs are lacking
Compared to related work, this paper:
- Provides the first purely combinatorial proof: Independent of the classical Cayley-Hamilton theorem
- Handles complete cases: Unified proof for both r≤n and r>n
- Technical Innovation: Introduces new sign-reversing involution construction
- Enhanced Visualization: Detailed graphical presentation improves comprehensibility
- Establishes the first purely combinatorial proof of the trace Cayley-Hamilton theorem, proving that the trace identity holds for all r≥1
- Reveals deep algebraic-combinatorial correspondence:
- Algebraic properties of matrices ↔ combinatorial properties of directed graphs
- Characteristic polynomial coefficients ↔ linear subdigraphs
- Traces of matrix powers ↔ closed paths
- Provides new proof techniques: Systematic application of sign-reversing involutions in matrix identity proofs
- Theoretical Nature: This paper is a pure mathematical proof, not addressing computational efficiency or numerical stability
- Scope of Applicability:
- Method applies to matrices over commutative rings
- Non-commutative cases and other algebraic structures not discussed
- Complexity:
- For large matrices, the number of linear subdigraphs and closed paths grows exponentially
- No computational optimization strategies provided
- Generalizability:
- Whether the method can be generalized to other matrix identities remains unexplored
- Relationship with other combinatorial proof techniques not deeply discussed
- Limited Case Coverage: Only complete n=2 case provided; larger-scale examples might be more convincing
While not explicitly proposed in the paper, possible research directions include:
- Generalization to Other Identities: Apply the method to combinatorial proofs of other matrix identities
- Computational Algorithms: Develop efficient graph-theoretic algorithms for computing characteristic polynomials and matrix functions
- Non-commutative Cases: Explore generalization of the method to non-commutative rings or quantum groups
- Higher-Order Identities: Study identities involving higher-order traces
- Random Matrix Theory: Apply combinatorial methods to expected trace computations in random matrices
- Complete Proof: Clear logical chain from basic definitions to final theorem
- Sufficient Detail: Key steps (such as involution construction) are thoroughly explained
- No Circular Reasoning: Does not depend on the theorem being proved
- Clever Application of Sign-Reversing Involution: Elegant design of two pairing strategies (incorporating/extracting cycles)
- GOOD Pair Counting: Precise cancellation of extra terms using symmetry (r vertices correspond to r decompositions)
- Unified Framework: Single technique handles different cases (r≤n vs r>n)
- Graphical Presentation: 9 carefully designed figures make abstract concepts concrete
- Complete Case: Thorough analysis of 2×2 matrices demonstrates method operability
- Clear Structure: Progression from simple to complex, specific to general, well-organized
- Fills Gap: Solves the open problem posed by Grinberg (2019)
- Deepens Understanding: Reveals new connections between matrix algebra and graph theory
- Methodological Value: Provides a paradigm for combinatorial proofs of other matrix identities
- Clear Expression: Precise definitions, consistent notation
- Logical Organization: Complete structure from introduction through case study to proof and conclusion
- Adequate References: Appropriate citations of related work
- Only n=2 Complete Case: Examples with n=3 or larger would be more convincing
- Lack of Concrete Involution Examples: While Figure 8 provides schematic diagrams, specific numerical examples are missing
- Combinatorial Meaning of Involution: Why this particular involution works lacks deeper intuitive explanation
- Geometric or Topological Perspective: Whether deeper geometric or topological interpretations exist is unexplored
- No Complexity Analysis: Exponential complexity of enumerating all linear subdigraphs and closed paths not analyzed
- No Algorithm Implementation: Lacks algorithmic description or pseudocode for practical computation
- Method Limitations: Which types of matrix identities can be proved using similar methods?
- Necessary Conditions: Under what conditions can sign-reversing involutions be successfully constructed?
- Comparison with Other Techniques: Relationship with generating functions and other methods not discussed
- Computational Applications: Advantages or disadvantages of combinatorial methods in practical matrix computation not discussed
- Numerical Stability: From a computational perspective, does this method have practical applications?
- Combinatorial Matrix Theory: Adds important new results and techniques to the field
- Symbolic Computation: May inspire new symbolic matrix computation algorithms
- Educational Value: Provides new perspective for teaching matrix theory
- Short-term: Will attract interest from combinatorists and matrix theorists
- Medium-term: May inspire combinatorial proof research for other matrix identities
- Long-term: Likely to become standard content in combinatorial matrix theory textbooks
- Theory-Focused: Primarily theoretical contribution, limited practical computational applications
- High Educational Value: Excellent for teaching, demonstrating connections between algebra and combinatorics
- Strong Inspirational Value: Provides methodological reference for related problems
- Fully Reproducible: Clear logical proof, explicit steps
- Highly Verifiable: 2×2 case can be verified by hand
- Extensible: Method applicable to arbitrary matrix sizes (though computational cost increases)
- Combinatorial Matrix Theory: Study combinatorial interpretations of matrix invariants
- Algebraic Combinatorics: Explore correspondences between algebraic and combinatorial structures
- Graph Theory: Study properties of weighted directed graphs
- Advanced Linear Algebra Courses: Present combinatorial perspective on matrix theory
- Combinatorics Courses: Use as case study of graph theory applications
- Graduate Seminars: Learn combinatorial proof techniques through this example
- Symbolic Computation Software: Develop graph-theoretic matrix computation modules
- Other Identities: Apply similar methods to prove related theorems
- Generalization Research: Explore method applications in broader algebraic structures
This is a high-quality pure mathematics paper with main strengths:
- ✅ Solves a clearly defined open problem
- ✅ Innovative and rigorous method
- ✅ Complete and comprehensible proof
- ✅ Clear writing with excellent figures
Main weaknesses:
- ⚠️ Limited case coverage (only n=2)
- ⚠️ Lacks deeper intuitive explanation
- ⚠️ Insufficient discussion of practical value
- ⚠️ Generalizability not fully explored
Recommendation Index: ⭐⭐⭐⭐ (4/5)
Recommended for researchers and students interested in combinatorial matrix theory and algebraic combinatorics. For pure mathematicians, this is an elegant theoretical contribution; for applied researchers, it offers primarily inspirational value.
Key references cited in this paper:
- Brualdi & Cvetkovic (2009): A combinatorial approach to matrix theory and its application - Authoritative monograph on combinatorial matrix theory
- Grinberg (2019): The trace Cayley-Hamilton theorem - Posed the problem addressed in this paper
- Mukherjee & Bera (2019): Combinatorial proofs of the Newton–Girard and Chapman–Costas-Santos identities - Related prior work by the author
- Straubing (1983): A combinatorial proof of the Cayley-Hamilton theorem - Combinatorial proof of classical Cayley-Hamilton theorem
- Zeilberger (1984, 1985): Series on combinatorial methods in matrix algebra - Pioneering combinatorial proof techniques
Reading Recommendations:
- Suitable for graduate-level mathematics students and above
- Requires background in linear algebra and graph theory
- Recommended to carefully study the n=2 case first (Example 2.1)
- Focus on understanding the sign-reversing involution construction (proof of Theorem 2.2)
- Consider verifying the n=3 case independently to deepen understanding