Improved Extractors for Recognizable and Algebraic Sources

Authors Fu Li, David Zuckerman



PDF
Thumbnail PDF

File

LIPIcs.APPROX-RANDOM.2019.72.pdf
  • Filesize: 0.55 MB
  • 22 pages

Document Identifiers

Author Details

Fu Li
  • Department of Computer Science, University of Texas at Austin, USA
David Zuckerman
  • Department of Computer Science, University of Texas at Austin, USA

Acknowledgements

We wish to thank Salil Vadhan, Ronen Shaltiel, Avishay Tal, and William Hoza for helpful discussions and comments.

Cite AsGet BibTex

Fu Li and David Zuckerman. Improved Extractors for Recognizable and Algebraic Sources. In Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (APPROX/RANDOM 2019). Leibniz International Proceedings in Informatics (LIPIcs), Volume 145, pp. 72:1-72:22, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2019)
https://doi.org/10.4230/LIPIcs.APPROX-RANDOM.2019.72

Abstract

We study the task of seedless randomness extraction from recognizable sources, which are uniform distributions over sets of the form {x : f(x) = 1} for functions f in some specified class C. We give two simple methods for constructing seedless extractors for C-recognizable sources. Our first method shows that if C admits XOR amplification, then we can construct a seedless extractor for C-recognizable sources by using a mildly hard function for C as a black box. By exploiting this reduction, we give polynomial-time, seedless randomness extractors for three natural recognizable sources: (1) constant-degree algebraic sources over any prime field, where constant-degree algebraic sources are uniform distributions over the set of zeros of a system of constant degree polynomials; (2) sources recognizable by randomized multiparty communication protocols of cn bits, where c>0 is a small enough constant; (3) halfspace sources, or sources recognizable by linear threshold functions. In particular, the new extractor for each of these three sources has linear output length and exponentially small error for min-entropy k >= (1-alpha)n, where alpha>0 is a small enough constant. Our second method shows that a seed-extending pseudorandom generator with exponentially small error for C yields an extractor with exponentially small error for C-recognizable sources, improving a reduction by Kinne, Melkebeek, and Shaltiel [Kinne et al., 2012]. Using the hardness of the parity function against AC^0 [Håstad, 1987], we significantly improve Shaltiel’s extractor [Shaltiel, 2011] for AC^0-recognizable sources. Finally, assuming sufficiently strong one-way permutations, we construct seedless extractors for sources recognizable by BPP algorithms, and these extractors run in quasi-polynomial time.

Subject Classification

ACM Subject Classification
  • Theory of computation → Pseudorandomness and derandomization
  • Theory of computation
Keywords
  • Extractor
  • Pseudorandomness

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads

References

  1. Noga Alon, Jehoshua Bruck, Joseph Naor, Moni Naor, and Ron M Roth. Construction of asymptotically good low-rate error-correcting codes through pseudo-random graphs. IEEE Transactions on information theory, 38(2):509-516, 1992. Google Scholar
  2. Benny Applebaum, Sergei Artemenko, Ronen Shaltiel, and Guang Yang. Incompressible functions, relative-error extractors, and the power of nondeterministic reductions. Computational complexity, 25(2):349-418, 2016. Google Scholar
  3. László Babai, Noam Nisant, and Márió Szegedy. Multiparty protocols, pseudorandom generators for logspace, and time-space trade-offs. Journal of Computer and System Sciences, 45(2):204-232, 1992. Google Scholar
  4. Andrej Bogdanov, Akinori Kawachi, and Hidetoki Tanaka. Hard functions for low-degree polynomials over prime fields. ACM Transactions on Computation Theory (TOCT), 5(2):5, 2013. Google Scholar
  5. Jean Bourgain. On the construction of affine extractors. GAFA Geometric And Functional Analysis, 17(1):33-57, 2007. Google Scholar
  6. Ashok K Chandra, Merrick L Furst, and Richard J Lipton. Multi-party protocols. In Proceedings of the fifteenth annual ACM symposium on Theory of computing, pages 94-99. ACM, 1983. Google Scholar
  7. Benny Chor and Oded Goldreich. Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM Journal on Computing, 17(2):230-261, 1988. Google Scholar
  8. Gil Cohen and Avishay Tal. Two Structural Results for Low Degree Polynomials and Applications. Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, page 680, 2015. Google Scholar
  9. Zeev Dvir. Extractors for varieties. Computational complexity, 21(4):515-572, 2012. Google Scholar
  10. Zeev Dvir, Ariel Gabizon, and Avi Wigderson. Extractors and rank extractors for polynomial sources. Computational Complexity, 18(1):1-58, 2009. Google Scholar
  11. O Goldreich. Three XOR-Lemmas - An exposition, 1995. Google Scholar
  12. Alexander Golovnev and Alexander S Kulikov. Weighted gate elimination: Boolean dispersers for quadratic varieties imply improved circuit lower bounds. In Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, pages 405-411. ACM, 2016. Google Scholar
  13. Johan Håstad. Computational limitations of small-depth circuits. MIT Press, 1987. Google Scholar
  14. Jørn Justesen. Class of constructive asymptotically good algebraic codes. IEEE Transactions on Information Theory, 18(5):652-656, 1972. Google Scholar
  15. Jesse Kamp, Anup Rao, Salil Vadhan, and David Zuckerman. Deterministic extractors for small-space sources. Journal of Computer and System Sciences, 77(1):191-220, 2011. Google Scholar
  16. Jeff Kinne, Dieter van Melkebeek, and Ronen Shaltiel. Pseudorandom generators, typically-correct derandomization, and circuit lower bounds. Computational complexity, 21(1):3-61, 2012. Google Scholar
  17. Ilan Komargodski, Ran Raz, and Avishay Tal. Improved Average-Case Lower Bounds for De Morgan Formula Size: Matching Worst-Case Lower Bound. SIAM Journal on Computing, 46(1):37-57, 2017. Google Scholar
  18. Xin Li. Improved two-source extractors, and affine extractors for polylogarithmic entropy. In Foundations of Computer Science (FOCS), 2016 IEEE 57th Annual Symposium on, pages 168-177. IEEE, 2016. Google Scholar
  19. Noam Nisan. The communication complexity of threshold gates. Combinatorics, Paul Erdos is Eighty, 1:301-315, 1993. Google Scholar
  20. Noam Nisan and Avi Wigderson. Hardness vs. randomness. In Foundations of Computer Science, 1988., 29th Annual Symposium on, pages 2-11. IEEE, 1988. Google Scholar
  21. Noam Nisan and David Zuckerman. Randomness is linear in space. Journal of Computer and System Sciences, 52(1):43-52, 1996. Google Scholar
  22. Ran Raz. Extractors with weak random seeds. In Proceedings of the thirty-seventh annual ACM symposium on Theory of computing, pages 11-20. ACM, 2005. Google Scholar
  23. Zachary Remscrim. The Hilbert Function, Algebraic Extractors, and Recursive Fourier Sampling. In Foundations of Computer Science (FOCS), 2016 IEEE 57th Annual Symposium on, pages 197-208. IEEE, 2016. Google Scholar
  24. Miklos Santha and Umesh V Vazirani. Generating quasi-random sequences from semi-random sources. Journal of Computer and System Sciences, 33(1):75-87, 1986. Google Scholar
  25. Ronen Shaltiel. Weak derandomization of weak algorithms: explicit versions of Yao’s lemma. Computational complexity, 20(1):87, 2011. Google Scholar
  26. Roman Smolensky. Algebraic methods in the theory of lower bounds for Boolean circuit complexity. In Proceedings of the nineteenth annual ACM symposium on Theory of computing, pages 77-82. ACM, 1987. Google Scholar
  27. Luca Trevisan and Salil Vadhan. Extracting randomness from samplable distributions. In Foundations of Computer Science, 2000. Proceedings. 41st Annual Symposium on, pages 32-42. IEEE, 2000. Google Scholar
  28. Emanuele Viola. Guest Column: correlation bounds for polynomials over 0 1. ACM SIGACT News, 40(1):27-44, 2009. Google Scholar
  29. Emanuele Viola. Extractors for circuit sources. SIAM Journal on Computing, 43(2):655-672, 2014. Google Scholar
  30. Emanuele Viola and Avi Wigderson. Norms, XOR Lemmas, and Lower Bounds for Polynomials and Protocols. Theory of Computing, 4(1):137-168, 2008. Google Scholar
  31. Andrew C Yao. Theory and application of trapdoor functions. In Foundations of Computer Science, 1982. SFCS'08. 23rd Annual Symposium on, pages 80-91. IEEE, 1982. Google Scholar
  32. Andrew Chi-Chih Yao. Some complexity questions related to distributive computing (preliminary report). In Proceedings of the eleventh annual ACM symposium on Theory of computing, pages 209-213. ACM, 1979. Google Scholar
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail