{"@context":"https:\/\/schema.org\/","@type":"ScholarlyArticle","@id":"#article12504","name":"Simple and Efficient Pseudorandom Generators from Gaussian Processes","abstract":"We show that a very simple pseudorandom generator fools intersections of k linear threshold functions (LTFs) and arbitrary functions of k LTFs over n-dimensional Gaussian space. The two analyses of our PRG (for intersections versus arbitrary functions of LTFs) are quite different from each other and from previous analyses of PRGs for functions of halfspaces. Our analysis for arbitrary functions of LTFs establishes bounds on the Wasserstein distance between Gaussian random vectors with similar covariance matrices, and combines these bounds with a conversion from Wasserstein distance to \"union-of-orthants\" distance from [Xi Chen et al., 2014]. Our analysis for intersections of LTFs uses extensions of the classical Sudakov-Fernique type inequalities, which give bounds on the difference between the expectations of the maxima of two Gaussian random vectors with similar covariance matrices.\r\nFor all values of k, our generator has seed length O(log n) + poly(k) for arbitrary functions of k LTFs and O(log n) + poly(log k) for intersections of k LTFs. The best previous result, due to [Gopalan et al., 2010], only gave such PRGs for arbitrary functions of k LTFs when k=O(log log n) and for intersections of k LTFs when k=O((log n)\/(log log n)). Thus our PRG achieves an O(log n) seed length for values of k that are exponentially larger than previous work could achieve. \r\nBy combining our PRG over Gaussian space with an invariance principle for arbitrary functions of LTFs and with a regularity lemma, we obtain a deterministic algorithm that approximately counts satisfying assignments of arbitrary functions of k general LTFs over {0,1}^n in time poly(n) * 2^{poly(k,1\/epsilon)} for all values of k. This algorithm has a poly(n) runtime for k =(log n)^c for some absolute constant c>0, while the previous best poly(n)-time algorithms could only handle k = O(log log n). For intersections of LTFs, by combining these tools with a recent PRG due to [R. O'Donnell et al., 2018], we obtain a deterministic algorithm that can approximately count satisfying assignments of intersections of k general LTFs over {0,1}^n in time poly(n) * 2^{poly(log k, 1\/epsilon)}. This algorithm has a poly(n) runtime for k =2^{(log n)^c} for some absolute constant c>0, while the previous best poly(n)-time algorithms for intersections of k LTFs, due to [Gopalan et al., 2010], could only handle k=O((log n)\/(log log n)).","keywords":["Polynomial threshold functions","Gaussian processes","Johnson-Lindenstrauss","pseudorandom generators"],"author":[{"@type":"Person","name":"Chattopadhyay, Eshan","givenName":"Eshan","familyName":"Chattopadhyay","email":"mailto:eshanc@cornell.edu","affiliation":"Cornell University, Ithaca, NY, USA","funding":"Supported by NSF grants CCF-1412958, CCF-1849899, and the Simons foundation. Part of the work done while the author was a postdoctoral researcher at the Institute for Advanced Study, Princeton."},{"@type":"Person","name":"De, Anindya","givenName":"Anindya","familyName":"De","email":"mailto:anindyad@seas.upenn.edu","affiliation":"University of Pennsylvania, Philadelphia, PA, USA","funding":"Supported by NSF CCF 1926872 (transferred from CCF 1814706). Work done while the author was at Northwestern University supported by a start-up grant."},{"@type":"Person","name":"Servedio, Rocco A.","givenName":"Rocco A.","familyName":"Servedio","email":"mailto:rocco@cs.columbia.edu","affiliation":"Columbia University, New York, NY, USA","funding":"Supported by NSF CCF 1814873, NSF CCF 1563155, and by the Simons Collaboration on Algorithms and Geometry."}],"position":4,"pageStart":"4:1","pageEnd":"4:33","dateCreated":"2019-07-16","datePublished":"2019-07-16","isAccessibleForFree":true,"license":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/legalcode","copyrightHolder":[{"@type":"Person","name":"Chattopadhyay, Eshan","givenName":"Eshan","familyName":"Chattopadhyay","email":"mailto:eshanc@cornell.edu","affiliation":"Cornell University, Ithaca, NY, USA","funding":"Supported by NSF grants CCF-1412958, CCF-1849899, and the Simons foundation. Part of the work done while the author was a postdoctoral researcher at the Institute for Advanced Study, Princeton."},{"@type":"Person","name":"De, Anindya","givenName":"Anindya","familyName":"De","email":"mailto:anindyad@seas.upenn.edu","affiliation":"University of Pennsylvania, Philadelphia, PA, USA","funding":"Supported by NSF CCF 1926872 (transferred from CCF 1814706). Work done while the author was at Northwestern University supported by a start-up grant."},{"@type":"Person","name":"Servedio, Rocco A.","givenName":"Rocco A.","familyName":"Servedio","email":"mailto:rocco@cs.columbia.edu","affiliation":"Columbia University, New York, NY, USA","funding":"Supported by NSF CCF 1814873, NSF CCF 1563155, and by the Simons Collaboration on Algorithms and Geometry."}],"copyrightYear":"2019","accessMode":"textual","accessModeSufficient":"textual","creativeWorkStatus":"Published","inLanguage":"en-US","sameAs":"https:\/\/doi.org\/10.4230\/LIPIcs.CCC.2019.4","publisher":"Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik","citation":["http:\/\/arxiv.org\/abs\/1506.06966","http:\/\/arxiv.org\/abs\/math\/0510424","http:\/\/arxiv.org\/abs\/1001.1593","https:\/\/arxiv.org\/abs\/1808.04035"],"isPartOf":{"@type":"PublicationVolume","@id":"#volume6340","volumeNumber":137,"name":"34th Computational Complexity Conference (CCC 2019)","dateCreated":"2019-07-16","datePublished":"2019-07-16","editor":{"@type":"Person","name":"Shpilka, Amir","givenName":"Amir","familyName":"Shpilka","email":"mailto:shpilka@tauex.tau.ac.il","affiliation":"Tel Aviv University, Tel Aviv, 69978, Israel"},"isAccessibleForFree":true,"publisher":"Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik","hasPart":"#article12504","isPartOf":{"@type":"Periodical","@id":"#series116","name":"Leibniz International Proceedings in Informatics","issn":"1868-8969","isAccessibleForFree":true,"publisher":"Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik","hasPart":"#volume6340"}}}