New Pseudorandom Generators and Correlation Bounds Using Extractors
Abstract
We establish new correlation bounds and pseudorandom generators for a collection of computation models. These models are all natural generalization of structured low-degree -polynomials that we did not have correlation bounds for before. In particular:
-
We construct a PRG for width-2 -length branching programs which read bits at a time with seed length . This comes quadratically close to optimal dependence in and . Improving the dependence on would imply nontrivial PRGs for -degree -polynomials. The previous PRG by Bogdanov, Dvir, Verbin, and Yehudayoff had an exponentially worse dependence on with seed length of .
-
We provide the first nontrivial (and nearly optimal) correlation bounds and PRGs against size- circuits with either gates (computing an arbitrary symmetric function) or gates (computing an arbitrary linear threshold function). This is a generalization of sparse -polynomials, which can be simulated by an circuit with one parity gate at the top. Previous work of Servedio and Tan only handled gates or gates, and previous work of Lovett and Srinivasan only handled polynomial-size circuits.
-
We give exponentially small correlation bounds against degree- -polynomials which are set-multilinear over some arbitrary partition of the input into parts (noting that at parts, we recover all low degree polynomials). This vastly generalizes correlation bounds against degree- polynomials which are set-multilinear over a fixed partition into blocks, which were established by Bhrushundi, Harsha, Hatami, Kopparty, and Kumar.
The common technique behind all of these results is to fortify a hard function with the right type of extractor to obtain stronger correlation bounds for more general models of computation. Although this technique has been used in previous work, they rely on the model simplifying drastically under random restrictions. We view our results as a proof of concept that such fortification can be done even for classes that do not enjoy such behavior.
Keywords and phrases:
Pseudorandom Generators, Correlation Bounds, Constant-Depth CircuitsFunding:
Vinayak M. Kumar: Supported by NSF Grant CCF-2008076, CCF-2312573, and a Simons Investigator Award (#409864, David Zuckerman).2012 ACM Subject Classification:
Theory of computation Circuit complexity ; Theory of computation Pseudorandomness and derandomizationAcknowledgements:
We thank David Zuckerman for helpful discussions. We also thank anonymous reviewers for helpful comments. We thank Jeffrey Champion, Chin Ho Lee, and Geoffrey Mon for comments on an earlier draft of the paper.Editors:
Raghu MekaSeries and Publisher:
Leibniz International Proceedings in Informatics, Schloss Dagstuhl – Leibniz-Zentrum für Informatik
1 Introduction/Outline of Results
Many central questions in complexity theory revolve around proving limitations of various computational models. For example, there are research programs which seek lower bounds against constant depth circuits, low degree polynomials over , and perhaps most famously the complexity class .
Usually, lower bounds against a simple class of -bit Boolean functions is established by demonstrating an explicit function such that no can compute on every input. This is referred to as worst-case hardness. However, we may not be satisfied with this in practice and stipulate that no can even approximate . After all, if there exists a that agrees with on all but one point, the difference may be impossible to detect in practice. Furthermore, establishing average case hardness against can allow us to create PRGs against via the “hardness to randomness” framework introduced by Nisan and Wigderson [24], as well as show hardness results against related function classes, like the majority of functions in . This average-case hardness statement is exactly what the study of correlation bounds capture.
To formally define this, let a distribution over . Define the correlation of two Boolean functions over to be
We will usually be concerned with , the uniform distribution, and should be assumed so if no distribution is specified. Notice that this quantity is a real number in . For intuition, note that if or , the correlation is 1, whereas if and only match on about half the inputs, the correlation becomes small. This fact allows us to observe correlation is the right notion, as being small implies that cannot predict much better than a coin flip. For a function and a function class , we can define . Hence the notion of being average-case hard for is captured by being small.
In this paper, we are most interested in the case is the class of low degree polynomials. Establishing correlation bounds against low degree polynomials is an extremely interesting and central question in complexity theory, as it is either necessary or sufficient to understand a plethora of other problems, some of which concern communication protocols, matrix rigidity, and PRGs for circuits. See Viola’s survey [30] for a detailed exposition on this rich program.
Unfortunately, there is a “-degree barrier” for PRGs and correlation bounds against low degree polynomials. Current PRGs and correlation bounds are asymptotically tight for constant degree polynomials, but become trivial at degree [29]. Getting nontrivial PRGs (or even correlation bounds) against -degree polynomials has been a tantalizing and longstanding open problem.
Towards breaking this barrier, researchers have shown strong correlation bounds for structured subsets of low degree -polynomials (such as sparse polynomials [20, 26], tensors [3], small-read polynomials, and symmetric polynomials [4]) with the hope of being able to generalize them. In this work, we establish new correlation bounds and PRGs for computation models generalizing some of these polynomials, namely width-2 branching programs reading bits at a time, containing a small number of arbitrary symmetric or linear threshold gates, and set-multilinear polynomials.
Interestingly, all of these correlation bounds are obtained by taking a function hard for a more specific class of polynomials, and then fortifying it with a well suited extractor. Although such a fortification technique is not new and has been used for establishing stronger lower bounds for formulas [18, 8], they usually rely on the fact that upon randomly fixing a subset of variables of a formula, there are extremely few possibilities for the resulting function. Our work shows that extractor fortification is a much broader technique that can strengthen lower bounds against function classes even if they do not simplify greatly under a random restriction. In particular, our correlation bounds demonstrate extractor fortification can work if the function class, after a random restriction, has low communication complexity or good algebraic structure.
Inspired by this, we would like to show that extractors will always strengthen correlation bounds, no matter what the proof of the bound is. At a first glance, this may feel intuitive. However, due to technical reasons, this seems challenging to establish.
The remainder of this section is devoted to introducing and motivating each computational model studied, surveying prior work in the topic, and stating all key results proven.
1.1 Better Bounds and PRGs Against with More Gates
Our knowledge of hardness and PRG results for is far more developed than that of . Our state of the art PRGs for is Lyu’s construction [22], which -fools polysize circuits with seed length , whereas the current best PRG of Hatami, Hoza, Tal, and Tell which -fools size- circuits have seed length [15]. Due to this stark contrast in parameters, it is natural to gradually work upward from by allotting a budget of (calculates an arbitrary symmetric function) or (calculates an arbitrary linear threshold function) gates in the circuit. This approach has been explored for more than a decade [28, 20, 26], building upon the study of PRGs for circuits pioneered by Luby, Velicković, and Wigderson [21]. This context explains why this circuit class a compelling generalization of sparse polynomials (which can be written as a small-size parity of ands). All the mentioned works use the following function introduced by Razborov and Wigderson in 1993 [25] (all arithmetic is over ).
| (1) |
Most recently, Servedio and Tan [26] use to uncorrelate against constant-depth size- circuits whose top gate is (denoted as ). Their explicit bound is
Via techniques used in [20], this can be translated to correlation bounds against circuits with up to gates or gates. As can be surmised by the repeated occurrences of , the strength of the correlation bound dictates how many gates we can afford in our budget.
We show that is just one of many functions from a general class of hard functions with small correlation against circuits. For functions and , denote
Theorem 1 (informal).
Let be computable by a size circuit. Let be average-case hard against multiparty protocols111the formal condition is any function with small “-party norm” or “cube norm”, but this is currently the only technique we know that establishes average case hardness against multiparty protocols., and let be a suitable extractor. Then
To our knowledge, this theorem gives the first context where generically precomposing with an extractor boosts correlation bounds whose proof does not rely on simplification under random restriction (indeed parity does not simplify under restriction and is contained in ). Previously, extractors have only been used to boost correlation bounds for classes that heavily simplify under random restriction [18, 8].222There have been uses of extractors as a hard function against classes that do not simplify under restriction, like DNFs of Parities [9] and strongly read-once linear branching programs [12, 19, 7]. However they directly establish a correlation bound against the extractor rather than amplify a weaker hard function by precomposing with an extractor. Our theorem states that extractors can still boost correlation bounds, even if they were proven using communication complexity rather than random restrictions.
Furthermore, our theorem distills out the reason why was so effective as a hard function. Quantitatively, we can instantiate the template with a suitable extractor to obtain a new hard function with nearly-optimal correlation bounds.
Due to our strengthened correlation bounds, we can now get correlation bounds and PRGs against size- circuits with up to gates or gates. Prior to this, no nontrivial correlation bound or PRG was known to handle such large size and number of gates ([20] could handle the same number of gates but only for -size circuits, and [26] could handle the same size circuits, but only or gates).
Even for circuits which have only one gate, our correlation bounds yields improved PRGs whose seed length is , which has a better dependence on , than previous work (see Table 1). In fact, since the best correlation bound one can hope for is , this dependence is almost optimal under the Nisan-Wigderson framework, and an alternative approach is needed to reach the optimal dependence of . Since any -degree polynomial can be expressed as a circuit of size , any improvement of the dependence of the seed length on would give nontrivial PRGs for -degree polynomials, a breakthrough result.
| Circuit type | Circuit size | Correlation bound | PRG seed length | |
| [28] | ||||
| [20] | ||||
| [20] | ||||
| [26] | ||||
| This work |
1.2 Much Better PRGs Against Width-2 Branching Programs Reading Bits at a Time
Usually, one constructs PRGs for natural computational models, with the idea that we can drastically reduce the randomness we use if the randomized algorithm we are running can be simulated by such a model. Low degree polynomials is an extremely natural mathematical model with applications to circuit complexity, but some may not believe it is well grounded as a computational one and thus not worth finding a PRG for. However, the work of Bogdanov, Dvir, Verbin, and Yehudayoff [5] showed the beautiful connection that PRGs for degree polynomials are also PRGs against a particular model described as width-2 length- branching programs which read bits at a time.
Definition 2 (-2BP ([5], adapted)).
A -2BP (or more colloquially a width-2 length- branching program over bits which reads bits at a time) is a layered directed acyclic graph, where there are layers and each layer contains two nodes, which we label by 0 and 1. Each vertex in each layer is associated with an arbitrary -bit substring of the input . Each node in layer has outgoing edges to layer that are labelled by all possible values in . On input , the computation starts with the first node in the first layer, then follows the edge labelled by onto the second layer, and so on until a node in the last layer is reached. The identity of this last node is the outcome of the computation.
Such branching programs are a well motivated computation model which cover computation with only one bit of usable memory, low degree polynomials, and small width DNFs. The survey of unconditional PRGs by Hatami and Hoza refer to this model as a compelling computational model that places low degree polynomials in the computational landscape [14].
Unfortunately, there is a “-degree barrier” for PRGs and correlation bounds against low degree polynomials. Current PRGs and correlation bounds are asymptotically tight for constant degree polynomials, but become trivial at degree , as can be seen by the current best known PRG for degree- polynomials by Viola which has seed length [29]. Getting nontrivial PRGs (or even correlation bounds) against -degree polynomials has been a tantalizing and longstanding open problem, and thus PRGs for -2BPs also seemingly appeared to inherit this “ barrier” due to the reduction result of [5].
In this work, we construct PRGs against -2BPs with exponentially better seed length, thereby giving nontrivial PRGs even in the regime . Define a -junta to be a function which is solely dependent on input bits (i.e. can be written as for some subset of size ). To get our shortened seed length, we evade the -degree barrier by instead showing the equivalence between PRGs for -2BPs and PRGs for the XOR of many -juntas (denoted as ). This class is already interesting in its own right, as it can be seen as a generalization of sparse -polynomials and combinatorial checkerboards (defined by Watson [32] and also studied by Gopalan, Meka, Reingold and Zuckerman [11]), as well as a specific class bounded collusion protocols studied by Chattopadhyay et al. [6]. However, we are not aware of any literature studying specifically.
Our main technical contribution is strong correlation bounds for . In particular, we show the following.
Theorem 3.
There exists an explicit function such that
By combining this with the “hardness-to-randomness” framework of Nisan and Wigderson [24], we construct a PRG of seed length . This is only a quadratic factor away from optimal dependence on and . Improving the dependence on would be a breakthrough, since if we set , a -2BP can simulate any -degree polynomial over , and so having seed length would effectively be breaking the -degree barrier for -polynomial PRGs.
Interestingly enough, by combining an “simplification under restriction” approach pioneered by Ajtai and Wigderson [1] with a PRG for sparse -polynomials by Servedio and Tan [27], we are able to construct a PRG against , and thus -2BPs, with seed length . This gives us an optimal dependence on , but an exponentially worse dependence on . This suggests perhaps with a combination of these two approaches, one might be able to achieve seed length .
1.3 Near-Optimal Bounds Against High Degree Set-Multilinear Polynomials
As explained earlier, a central open question in complexity theory is to establish better-than- nontrivial correlation bounds against -degree polynomials. In order to make progress on this question, it is natural to consider structured low-degree -polynomials. This is what the work of Bhrushundi et al. does [3].
Define a polynomial to be set-multilinear over a partition of the input bits if every monomial contains at most one variable from each (this is slightly more general than the usual definition of exactly one). The work of Bhrushundi et al. [3] prove that a random degree set-multilinear tensor has exponentially small correlation against generic degree -polynomials for . Towards making this correlation bound explicit, they defined , where multiplication is done by treating the as field elements, and outputs the least significant bit of the string. Bhushrundi et al. were able to give exponentially small correlation bounds against polynomials up to degree which are set-multilinear over the fixed partition . However, this leaves more to be wanted. The partition with respect to which the polynomial is set-multilinear over needing to be fixed and dependent on feels like an extremely strong and asymmetric condition. Can we uncorrelate against degree polynomials set-multilinear over any equipartition of into parts? Can the parts be unequal? Can we have more than of them?
We show the affirmative to all the above questions. If we take to be an arbitrarily small constant, we can obtain exponentially small correlation against degree polynomial for which there exists some partition of into up to (not necessarily equal) parts such that is set-multilinear over it. Notice improving parts to would be a breakthrough, since all polynomials are set-multilinear over the -partition of .
To do so, we fortify the hard function with an extractor. Let be a strong linear seeded extractor (for each fixing of , is linear). For some parameter , define the function
where multiplication is done over a finite field, and outputs the least significant bit of the string. First note that , for a fixed , is set-multilinear over . Hence our intuition that set-multilinear polynomials might correlate the most with the hard function is preserved in as well. Using , we are able to obtain correlation bounds against the more intuitive notion of set-multilinear polynomials, where the structure of the partition does not matter. This gives more leeway since now if we want to implement this approach towards correlation bounds against low-degree polynomials, there is a larger class of set-multilinear polynomials that we can reduce generic polynomials to.
2 Technical Overview Of the Results
In this section, we give the overview of the proofs of the main results we covered above.
2.1 Stronger Correlation Bounds Against
We focus on showing stronger correlation bounds against , since the subsequent arguments turning this into PRGs against with a few gates are standard. The blueprint behind this argument follows the “simplification under restrictions” approach of previous works, but most similarly of Tan and Servedio [26]. A random restriction is a random partial assignment where for each variable, it is left unfixed (or “alive”) with probability , and is otherwise set to a uniform bit. [26] shows that under a random restriction, the hard function maintains integrity and uncorrelates against multiparty protocols, while the simplifies to a short multiparty protocol. However, the roadblock met in [26] preventing a correlation bound of and only giving one of size is due to parameters in being in contention with each other. To elucidate, if is the input size, then we must have . Via the analysis done in [26], the correlation bound ends up being in the form of , which forces any established correlation bound to be at best .
To understand why both conflicting terms show up, we give a quick overview of the argument of [26]. First, (as defined in Equation 1) can be thought of as a fortified version of the generalized inner product, , where each variable is now replaced by the parity of new variables. This is effective against random restrictions, since as long as one of the copies survive the restriction, the corresponding term in will survive. They argue that after a random restriction is applied, the circuit simplifies to a short multiparty protocol, while is still capable of computing with high probability. Conditioning upon this, previous results of Babai, Nisan, and Szegedy [2] show that has correlation against these multiparty protocols, explaining the emergence of the term in the correlation. Conditioning on being able to compute introduces an additive error to the correlation corresponding to the probability fails to simplify. [26] bounds this by the chance all copies of some variable becomes fixed by a restriction, which will be , explaining the occurrence of the term in the correlation.
In summary, the argument of [26] requires needs to be large to strongly fortify the hard function against random restrictions, while needs to be large to have a stronger correlation bound against multiparty protocols. However, with the constraint , we are forced to compromise and reach the setting .
We now propose an abstraction of the hard function, which naturally yields a stronger correlation bound. If we define to be
we observe . The key insight is that our argument can be generalized to not just , but any function
where is average-case hard for multiparty protocols, and is an oblivious bit-fixing source extractor (OBF extractor). Informally, an oblivious bit-fixing source extractor for min-entropy is a function such that if is uniform over and is a restriction which leaves bits alive, the output is close to uniform. Recall our approach first applies a random restriction to simplify our circuit to a small multiparty protocol, which we then deal with using . If the random restriction leaves sufficiently many variables alive with high probability, then should still behave like due to being an OBF extractor. Since the circuit is now a multiparty protocol, the average-case hardness of gives us a correlation bound.
Notice in the construction and the setting of parameters , is an OBF extractor which maps bits to bits. But this means the input to the outer function will only have bits, and so the best correlation bound we can hope to achieve is . The restrictions used in the proof leave variables alive with high probability, so intuitively we could hope that all these “bits of randomness” could be preserved for (or in general any ) rather than only , potetially resulting in a correlation bound alive. We do just this by using a much better OBF extractor of Kamp and Zuckerman [17]. By making this intuition more formal using techniques developed by Viola and Wigderson [31], we obtain correlation bound. The idea of replacing parities with better suited extractors has also appeared in previous work [18, 8].
2.2 PRGs for and -2BPs
Our PRG construction blueprint can be briefly described as follows. We first establish correlation bounds against . We then put this through the Nisan-Wigderson “hardness vs. randomness” framework to create a PRG against . We then show that PRGs which fool actually fool -2BPs, making the PRG our final construction. We first discuss why PRGs for imply PRGs for -2BPs, and then discuss the techniques needed to show strong correlation bounds against .
2.2.1 PRGs for PRGs for -2BPs
Adopting the exposition in [14], the previous work of [5] can be outlined as follows. Consider a -2BP . By noticing that all transition functions in are -juntas, one can derive that , where is a branching program. By Fourier expanding , this can be decomposed as
[5] shows that is bounded , so by linearity of expectation and the Triangle Inequality, it suffices to fool the terms . The approach in [5] makes the observation that each , by virtue of being a -junta, can be written as a degree polynomial. Consequently, a PRG for degree polynomials will fool -2BPs with seed length . The issue here is that at , the seed length becomes trivial.
However, we can notice that the -polynomial has some additional structure. If , is the sum of only a polynomial number of -juntas. If there was a way to leverage this, and get a better PRG that fools , then we might hope to get nontrivial PRGs even in the regime .
This observation already yields nontrivial PRGs for . Servedio and Tan [26] provide a PRG fooling -polynomials with terms with seed length . Since each junta can be written as a polynomial with up to terms, each can be written as a polynomial with terms, yielding a PRG with seed length . Hence we get nontrivial seed length for . 333it is actually the case that a PRG from [21] already gets nontrivial seed length in the same regime, albeit with exponentially worse dependence in However, we proceed alternatively to get an exponentially better seed length.
2.3 The Nisan-Wigderson Framework and Correlation Bounds for
We will once again use as our hard function444we also precompose with parities in the formal argument to establish exponentially small correlation bounds against the class, and then apply the Nisan-Wigderson [24] framework to construct the PRG. The latter portion is straightforward, so we focus on establishing the correlation bounds.
Let . We first show that there exist a subset of variables, , such that upon arbitrarily fixing bits outside of this set, can be expressed as a sparse polynomial, whereas each input block of heavily intersect . Hence if we fix and take the correlation over , each input block still maintains high min-entropy while becomes a sparse polynomial, which is a small circuit. Since the hard function is also the same, we can then apply techniques in the previous section to conclude.
2.4 Correlation Bounds against Set-Multilinear Polynomials
Recall that [3] has shown uncorrelates against any lower degree polynomial which is set-multilinear over . The key ingredient behind proving strong correlation bounds against set-multilinear polynomials over arbitrary parititons is to first fortify each input block with extractors, and instead consider . This allows us to establish the following structural lemma, which intuitively states that even if you do not start out with a polynomial that is set-multilinear over , if not too many bits in each input block can be restricted to 1s such that the resulting function is set-multilinear over induced by the live variables in each block, exponential correlation bounds can still be obtained.
Theorem 4.
Let be a polynomial of degree . Let be subsets, and let denote the restriction created by fixing the bits in whose index is outside to for each . If the restricted function becomes set-multilinear in , then have
To explain the proof at a high level, if the sets we leave alive aren’t too small, then our strong extractor (conditioned on a good seed) will keep each block approximately uniform, and since the restricted function is now set-multilinear over we may use a similar approach as [3] to prove the theorem.
It turns out that via a combinatorial argument, one can show that polynomials which are set-multilinear over a large number of blocks can be turned into polynomials set-multilinear over by fixing not too many bits per input block . The correlation bounds then follow by the structural lemma.
3 Preliminaries
For positive integer , and is the set of all subsets of with . We denote .
3.1 Convention About Input Blocks
We will canonically fix a partition of bit strings into contiguous blocks, each with bits. In particular, any can be written as where each is the -bit substring. If a string is defined, will be assumed to mean the length substring of contained in the th input block, defined with respect to the canonical partition. Also, we will denote to be the input with the th block removed.
For a string , we may sometimes identify the bit string as an -bit string in the following way: the th block is filled with , and all other blocks are filled with 0s. Hence, if we interpret bit strings as elements of , and we have , the expression is well defined.
For parameters and two functions and , we will define
3.2 Finite Fields
We will be working with finite fields of characteristic 2. For the finite field over elements, , we can naturally identify each element with an -bit string.
Definition 5 (character).
A map is called an additive character if for all , . It is nontrivial if it is not the zero function.
Since is an -dimensional vector space, we see the valuations on basis vectors uniquely define the character. Consequently there are such characters. Notice we can conveniently characterize all characters either by , or by fixing some character , and then defining . This can be seen by verifying these maps are characters, are distinct, and that there are of them (the latter is obvious since there are values of ).
3.3 Models of Computation
Definition 6 (-polynomials).
An -polynomial (or polynomial for short) is a function of the form for some (all arithmetic here are over ).
Definition 7 (set-multilinearity).
An -polynomial is set-multilinear over a partition of variables if every monomial of contains at most one variable from each . Notice that all polynomials are trivially set-multililinear over .
Definition 8 (junta).
Define the class to be a function which is solely dependent on input bits (i.e. can be written as for some subset of size ). Define to be the class of functions which is the parity of -juntas.
Definition 9 (-party NOF protocol).
A boolean function can be computed by a -party NOF protocol with bits of communication if on input , players, can take turns writing a bit on the board, where player ’s bit can only depend on and the other bits on the board, and the th bit written is . We denote this class of functions to be .
Circuits
We measure the size of a circuit by the total number of wires (including input wires) in it. are depth circuits with unbounded fan-in whose gate set is . is a gate which computes an arbitrary symmetric function, and is a gate which computes an arbitrary linear threshold function. In general, if we have a gate , a subscript will refer to its fan-in (in this case, is fixed to have fan-in ).
Definition 10 (-tree).
Let be an integer and a computational model (e.g. a circuit class). A function is computable by a -tree if it is computable by a depth decision tree with functions as its leaves. That is, there exists a depth decision tree such that for every path in , .
3.4 Probability
We will denote to be the uniform distribution over the finite set . We will also denote to be a random subset of where each is added to independently with probability .
Definition 11 (-wise uniform).
Consider a distribution over . We say that is -wise uniform if for all subsets and all strings ,
Definition 12 (-close in distribution).
Let and be distributions over . We say , or equivalently is -close to , if for all ,
3.5 Random Restrictions and Partial Assignments
A partial assignment or restriction is a string . Intuitively, a represents an index that is still “alive” and hasn’t been fixed to a value yet.
We also define a composition operation on partial assignments. For two restrictions , define so that
Intuitively, one can see this as fixing bits determined by first, and then out of the remaining alive positions, fix them according to .
A random restriction is simply a distribution over restrictions. A common random restriction we will use is , the distribution where each index will be assigned with probability , and each with probability .
The main reason for defining restrictions is to observe their action on functions. Given a restriction and function , we define to be the restricted function mapping .
3.6 Pseudorandomness
Our work will involve working with pseudorandomness primitives, like pseudorandom generators (PRGs) and randomness extractors (or simply extractors).
Definition 13 (-PRG).
A polytime computable function is an -PRG for a subset of functions if for all ,
We also say that -fools . The parameter is the seed length. In this paper, we will use a PRG of [27] which -fools polynomials with terms with seed length .
Definition 14 (min-entropy).
Let be a distribution over , and define . Define the min-entropy of to be the quantity
It is helpful to note that if for a particular and all , all probabilities , then we know has min-entropy .
Definition 15 (Strong/Linear/Seeded Extractors).
A -seeded extractor is a function such that for any with min-entropy , we have for and the following
is a strong seeded extractor if we also have
is a linear seeded extractor if for every fixed , is linear over . The Leftover Hash Lemma [16] allows us to construct a strong seeded extractor with seed length ,
Definition 16 (Oblivious Bit-Fixing Source Extractors).
An oblivious bit-fixing source (or OBF) is a distribution over created by fixing some of the bits, and then filling in the remaining indices with uniform and independent bits. An oblivious bit-fixing source extractor (or OBF extractor) is a function such that for every OBF , we have that for ,
For any , Kamp and Zuckerman [17] allows us to construct OBF extractors .
3.7 Correlation Bounds
We will need some tools and definitions from the literature of correlation bounds. We first give a formal definition of correlation.
Definition 17 (correlation).
For two Boolean functions , and a distribution over , define the correlation of and over to be
If no distribution is mentioned, we always assume . Furthermore, for a subset of functions , we define
Viola and Wigderson defined a convenient quantity , which is very useful in bounding correlations against NOF protocols.
Definition 18 (-party Norm).
For a function , define the -party norm of to be
This norm is useful due to the following theorem.
Theorem 19 ([31]).
Let be arbitrary, and let be computable by a -party NOF protocol exchanging bits. Then
We will also use the following theorem of Nisan and Wigderson, which allow us to translate correlation bounds into PRGs.This version is seen in the survey of Hatami and Hoza [14]
4 Nearly Optimal Correlation Bounds against
We strictly improve upon the result [26] by proving a stronger correlation bound against circuits. This immediately gives PRGs against this class with improved seed length via the “hardness vs. randomness” framework [24] All previous work [28, 20, 26] looked at the function introduced in [25] created by taking the generalized inner product of parities. We present a new function comprised of field multiplication of extractors in order to prove stronger correlation bounds. Let be parameters, and define . We now prove the following result:
Theorem 21.
Let be a OBF-source extractor (explicit ones exist due to [17]). Let be any function such that . Define to be the function
Let be any function implementable by a -size circuit, and let . Then
In particular, by instantiating this template, say, with being the extractor of [17] and being either [2] or [10], we get explicit . We also note by simple adjusting of constants, we can get any for constant . This gives an improvement of the correlation bound given in [26] of .
Proof.
We follow the same approach as done in [26]. The uniform distribution can be expressed as applying a random restriction, and then filling in the remaining bits uniformly. For good random restrictions, we argue that simplifies to a circuit. We then argue that even after the random restriction, maintains its structural integrity due to the extractor. We then finish the argument by using Hastad and Goldmann’s connection between and NOF protocols, and the fact that has small correlation with -party protocols.
The proof for the simplification of is the same as seen in [26] so we merely cite it here. The only change is the tuning of parameters. Here is the lemma restated for our use.
Lemma 22.
Let with circuit size . Then for
Notice that for constant this gives a bound of , versus its use in [26] in which a error was gained. We will see later that we can liberally set parameters here because our hard function maintains integrity even after traversing down a path of size (equivalent to randomly fixing bits), whereas the previous GIP function could only withstand bits. This is result of using an OBF extractor with much better parameters than simply taking the XOR of many copies.
The leaves of our tree is now much simpler class of circuits, but it is not simple enough. Our correlation bounds can only handle circuits with fan in , but we currently have fan in . Fix a leaf of the tree, and let be a collection of subsets of where contains the indices of the variables that feed into the th gate in the bottom layer. We now use the following basic fact, as in [20] and [26], that there is a large subset of variables that minimally intersect with each .
Claim 23.
A random (add each element to with probability ) satisfies
Instantiating this claim with our parameter setting of and , and setting tells us
Hence there exists such an such that restricting all bits outside makes only variables feed into each gate as desired.
To summarize, our restriction is sampled by a distribution specified by these three steps.
-
1.
We first perform restriction ,
-
2.
and then randomly restrict while walking down the depth- tree to a leaf ,
-
3.
and then randomly restrict all the variables alive in this leaf that is not in the set that we showed existed
At the end of this process, we have by the union bound that with all but probability, becomes a circuit.
We now observe what happens to under this restriction . We claim retains its structure. Our wish is for at least bits in each block to survive. That way, we will have a high entropy oblivious bit-fixing source fed into each extractor, and the function will be able to continue to strongly uncorrelate with -party protocols. In Step 1, we draw a restriction from . Notice the live variables are distributed like a set . We see that by a simple Chernoff and union bound,
Hence except for probability , each block will have live variables. Conditioned on this, when we follow Step 2 and perform a random walk down the decision tree to a leaf, we will assign at most bits, so we are guaranteed that each block will contain at least live variables. Step 3 is to take set and arbitrarily restrict variables outside of it. We showed there exists an which minimally overlaps with the input variables to the gates, but we want it to simultaneously overlap heavily with each block. That way most of the will stay alive after restricting the bits outside of The existence of such an can be established by “completing the probabilistic method” started a few paragraphs above. Conditioning on good restrictions so far, let denote the variables that survived in (hence ). We see that
Hence, the probability that either intersects some too much or some too little will happen with probability . Thus there exists an such that restricting all variables outside of it will simultaneously simplify to a and also leave at least variables alive. Stringing all three steps together, we know that except with probability , our random restriction reduces to , while simultaneously keeping variables in each block alive.
We are now in the final phase of the argument where we now directly bound the correlation against the simplified circuit. We first state the results that will convert our circuits to NOF protocols.
Theorem 24 ([13]).
Let be a Boolean function computed by a size- circuit. Then for any partition of the inputs of into blocks, there is a deterministic NOF -party communication protocol that computes using bits of communication.
Theorem 25 ([23]).
Let be a Boolean function computed by a circuit. Then for any partition of the inputs of into blocks, there is a randomized NOF -party communication protocol that computes with error using bits of communication.
We now need to show an average-case hardness result for against NOF protocols. To do so, we will first calculate the -party norm of .
Lemma 26.
Let be a restriction which keeps variables in each alive. Then
Proof.
Now notice that
| (2) |
By assumption of , each over uniform is an OBF source with min-entropy , and so each . Since all for are mutually independent, it follows by a hybrid argument that
Therefore, we can upper bound Equation 2 by
as desired.
With this, we can show that uncorrelates against randomized multiparty protocols.
Theorem 27.
Let be a Boolean function, and let be a restriction such that has live variables for each , and can be computed by an -party NOF randomized protocol with with bits and with error . Then
This proof is deferred to the full version.
We now have all the ingredients to finish. Say is good if keeps variables alive in each block and is computable by . We have shown for , this doesn’t happen only with probability . If has a gate at the top, then Theorem 24 says the circuit can be computed by a deterministic NOF protocol over using bits. Plugging this in to Theorem 27 tells us
If the top gate is a , use Theorem 25 with to get that the circuit is a randomized NOF protocol over using bits. Plugging this into Theorem 27 gives us a correlation bound of
In either case we get the same bound, so we can bound
The theorem is proved.
Remark 28.
We note that the original function instantiated with different parameters can also get the same strengthened correlation bound. This requires a more nuanced analysis than present in [26], and does not extend to general functions of the form as it relies on the specific structure of and .
To recap the argument for a size circuit, we first use the multi-switching lemma to reduce to a depth-2 circuit of fan-in . We then restrict more variables so that the fan-in reduces to . We then apply correlation bounds for -party protocols to get an error of . If one trusts that this error is the bottleneck in the argument, one can imagine running through the above argument again with to get a better error.
Corollary 29.
Let be a function implementable by a size -size circuit, and let . Define , and let be a -extractor constructed from [17]. Then
This refinement will be useful for our correlation bounds against branching programs in the next section. As the proof is extremely similar to the above, we defer the sketch to the full version.
From 21, we derive the following two theorems as well.
Theorem 30.
There exists an -PRG against size- circuits with seed length .
Theorem 31.
There is an efficient -PRG which fools with seed length and an -PRG which fools with seed length .
The proofs of these theorems follow by applying the Nisan-Wigderson hardness to randomness approach, as well as the decision tree bootstrapping idea of [20]. The details are deferred to the full version of the paper.
5 PRGs against -2BPs
In this section, we use fortified hard functions to establish strong correlation bounds against the XOR of juntas, . These are then pushed through the Nisan-Wigderson “hardness vs. randomness” framework to create PRGs which can fool -2BPs. We first establish the correlation bounds, and then we show that this implies our desired PRG.
5.1 Correlation Bounds Against
This subsection is devoted to proving the following result.
Theorem 32.
Let , let be the hard function in Corollary 29 instantiated on bits, and let be the parity function on bits. We then have
Proof.
Consider arbitrary . We will show that there exists a subset of variables such that upon fixing all variables outside , simplifies to a sparse polynomial, while at least one input variable in each stays alive. Write , where each is a -junta. Let be the indices of the variables that depends on. Pick . For a fixed , we can bound
for . Union bounding over all , it follows that
| (3) |
Let be the input blocks of size feeding into . We can easily calculate
| (4) |
Union bounding Equation 3 and Equation 4, it follows that there exists a subset that simultaneously intersects at most variables alive in each junta , and intersects at least one variable in each . By pruning out elements, we can assume WLOG that there is exactly one variable in each .
Since a function over bits can be written as an -polynomial with up to terms, it follows for any restriction with , is a polynomial with terms. Therefore, is a polynomial with terms as well, which can be written as a -sized circuit. Furthermore, we know that is equivalent to up to negations of the inputs. As is invariant under shifts of the input, we can appeal to Corollary 29 and observe
5.2 Constructing and Analyzing the PRG
With this correlation bound in hand, we can construct good PRGs against the XOR of juntas using the Nisan-Wigderson framework.
Corollary 33.
There is an -PRG for with seed length
The proof is a straightforward application of the Nisan-Wigderson framework that we defer to the full version.
Fooling the parity of juntas actually allow us to fool arbitrary functions of juntas as long as the function has low Fourier norm.
Theorem 34.
Let be an -PRG for , and let . Then is an -PRG for .
We also defer this proof to the full version.
Finally, as an application, we show PRGs against -2BPs, branching programs over bits with width 2, length , and reads bits at a time. We will use the fact that width-2 branching programs which read one bit at a time have low Fourier norm (a proof can be found in [14]).
Lemma 35.
If is a -2BP, then .
We now use the fact that a -2BP can be represented by a normal width-2 branching program acting on juntas to prove that the PRG from Corollary 33 fools -2BPs.
Theorem 36.
There exists an -PRG for -2BPs with seed length .
Proof.
Given a -2BP , we note that at each vertex of , the transition function is some -junta which will map the bits read at that vertex to the next vertex to move to. Now consider the -2BP defined with the same vertex set as , and define the transition function for in to read the th bit of the input, and then map to the node in the next layer labeled by that bit. It is easy to see by construction that , which is a function in . By Theorem 34, this can be -fooled by an -PRG for . Using the bound from Lemma 35 and the construction from Corollary 33, we see that such a PRG has seed length .
Remark 37.
There is an alternative PRG construction using the Ajtai-Wigderson framework [1] which gives optimal dependence on , but exponentially worse dependence on . This is presented in the full version of the paper.
6 Correlation Bounds Against Set-Multilinear Polynomials
Our correlation bound for set-multilinear polynomials follows from an instantiation of the following theorem.
Theorem 38.
Let be an integer. Let be a strong linear seeded -extractor with seed length created from the Leftover Hash Lemma [16], and let some nontrivial additive character of . Define to be
Let be a function, and let be subsets of size such that for any restriction created by arbitrarily fixing all bits in and outside in for each , always becomes set multilinear in . We then have
Proof.
For brevity, we let in this proof. We will first split the correlation expectation into first randomizing over all restrictions of the bits in outside of , then over the seed , and then over the remaining live variables denoted by the , which we denote . Now let be the set of seeds such that for all . As is strong-seeded, it follows by a union bound that cover all but a fraction of seeds. Thus one can write
| (5) |
Now fix a partial assignment and seed . For brevity, let , and similarly for . By assumption, is set-multilinear over We now apply a similar argument showing up in [3]. Let be a map taking linear forms in to its vector of coefficients . Note that by this definition, for any linear form , . Letting . We then see
| (6) |
where we used the facts that is linear in (as here is a linear seeded extractor), is independent of , and linear forms are perfectly unbiased if their coefficient vector is nonzero. We now repeatedly use the simple inequality that for a linear map and , as follows.
| (7) | ||||
| (8) |
To analyze this probability, we state a lemma whose proof is deferred to the full version.
Lemma 39.
For a linear form , if and only if for all .
Therefore, by Lemma 39,
Clearly if , becomes identically zero. When this doesn’t happen, the function becomes of the form for some nonzero . We now claim that there must exist some such that . Notice that for exactly values of , . As , the probability that a random has hit one of these values must be , proving the claim. Therefore, in order for , it is necessary that . Therefore,
As a very nice application of this structural theorem, we show that we can achieve exponentially small correlation against -degree polynomials which are set-multilinear over some partition of the input into up to parts.
Corollary 40.
Let be a degree polynomial which is set-multilinear over an arbitrary partition of into parts. Then
Proof.
For each , define to be the largest set among (arbitrarily pick one if there are ties). Notice that the sets partition , and . Therefore, we know that each . We now claim that any restriction formed by arbitrarily fixing all the bits in which are outside , for each , will make set-multilinear over . Assume for the sake of contradiction there existed some monomial in that contained 2 variables from some . Since and for , both of these variables had to have come from . But note that for some , and we know no monomial has 2 terms from the same by our assumption of . This yields our desired contradiction.
Therefore, we can apply Theorem 38 on the sets with and to deduce that
References
- [1] Miklos Ajtai and Avi Wigderson. Deterministic simulation of probabilistic constant depth circuits. In 26th Annual Symposium on Foundations of Computer Science (sfcs 1985), pages 11–19, 1985. doi:10.1109/SFCS.1985.19.
- [2] L. Babai, N. Nisan, and M. Szegedy. Multiparty protocols and logspace-hard pseudorandom sequences. In Proceedings of the Twenty-First Annual ACM Symposium on Theory of Computing, STOC ’89, pages 1–11, New York, NY, USA, 1989. Association for Computing Machinery. doi:10.1145/73007.73008.
- [3] Abhishek Bhrushundi, Prahladh Harsha, Pooya Hatami, Swastik Kopparty, and Mrinal Kumar. On Multilinear Forms: Bias, Correlation, and Tensor Rank. In Jarosław Byrka and Raghu Meka, editors, Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (APPROX/RANDOM 2020), volume 176 of Leibniz International Proceedings in Informatics (LIPIcs), pages 29:1–29:23, Dagstuhl, Germany, 2020. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.APPROX/RANDOM.2020.29.
- [4] Jaroslaw Blasiok, Peter Ivanov, Yaonan Jin, Chin Ho Lee, Rocco A. Servedio, and Emanuele Viola. Fourier growth of structured -polynomials and applications. In Mary Wootters and Laura Sanità, editors, Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, APPROX/RANDOM 2021, August 16-18, 2021, University of Washington, Seattle, Washington, USA (Virtual Conference), volume 207 of LIPIcs, pages 53:1–53:20. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2021. doi:10.4230/LIPICS.APPROX/RANDOM.2021.53.
- [5] Andrej Bogdanov, Zeev Dvir, Elad Verbin, and Amir Yehudayoff. Pseudorandomness for width-2 branching programs. Theory of Computing, 9(7):283–293, 2013. doi:10.4086/toc.2013.v009a007.
- [6] Eshan Chattopadhyay, Jesse Goodman, Vipul Goyal, Ashutosh Kumar, Xin Li, Raghu Meka, and David Zuckerman. Extractors and secret sharing against bounded collusion protocols. In 2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS), pages 1226–1242, 2020. doi:10.1109/FOCS46700.2020.00117.
- [7] Eshan Chattopadhyay and Jyun-Jie Liao. Hardness Against Linear Branching Programs and More. In Amnon Ta-Shma, editor, 38th Computational Complexity Conference (CCC 2023), volume 264 of Leibniz International Proceedings in Informatics (LIPIcs), pages 9:1–9:27, Dagstuhl, Germany, 2023. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.CCC.2023.9.
- [8] Ruiwen Chen, Valentine Kabanets, Antonina Kolokolova, Ronen Shaltiel, and David Zuckerman. Mining circuit lower bound proofs for meta-algorithms. In 2014 IEEE 29th Conference on Computational Complexity (CCC), pages 262–273, 2014. doi:10.1109/CCC.2014.34.
- [9] Gil Cohen and Igor Shinkar. The complexity of dnf of parities. In Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, ITCS ’16, pages 47–58, New York, NY, USA, 2016. Association for Computing Machinery. doi:10.1145/2840728.2840734.
- [10] Jeff Ford and Anna Gál. Hadamard tensors and lower bounds on multiparty communication complexity. Comput. Complex., 22(3):595–622, 2013. doi:10.1007/s00037-012-0052-6.
- [11] Parikshit Gopalan, Raghu Meka, Omer Reingold, and David Zuckerman. Pseudorandom generators for combinatorial shapes. SIAM Journal on Computing, 42(3):1051–1076, 2013. doi:10.1137/110854990.
- [12] Svyatoslav Gryaznov, Pavel Pudlák, and Navid Talebanfard. Linear branching programs and directional affine extractors. In Proceedings of the 37th Computational Complexity Conference, CCC ’22, Dagstuhl, DEU, 2022. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.CCC.2022.4.
- [13] J. Hastad and M. Goldmann. On the power of small-depth threshold circuits. In Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science, pages 610–618 vol.2, 1990. doi:10.1109/FSCS.1990.89582.
- [14] Pooya Hatami and William Hoza. Theory of unconditional pseudorandom generators. Electron. Colloquium Comput. Complex., TR23-019, 2023. URL: https://eccc.weizmann.ac.il/report/2023/019, arXiv:TR23-019.
- [15] Pooya Hatami, William M. Hoza, Avishay Tal, and Roei Tell. Fooling constant-depth threshold circuits (extended abstract). In 2021 IEEE 62nd Annual Symposium on Foundations of Computer Science (FOCS), pages 104–115, 2022. doi:10.1109/FOCS52979.2021.00019.
- [16] R. Impagliazzo, L. A. Levin, and M. Luby. Pseudo-random generation from one-way functions. In Proceedings of the Twenty-First Annual ACM Symposium on Theory of Computing, STOC ’89, pages 12–24, New York, NY, USA, 1989. Association for Computing Machinery. doi:10.1145/73007.73009.
- [17] Jesse Kamp and David Zuckerman. Deterministic extractors for bit-fixing sources and exposure-resilient cryptography. SIAM Journal on Computing, 36(5):1231–1247, 2007. doi:10.1137/S0097539705446846.
- [18] Ilan Komargodski, Ran Raz, and Avishay Tal. Improved average-case lower bounds for demorgan formula size. In 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, pages 588–597, 2013. doi:10.1109/FOCS.2013.69.
- [19] Xin Li and Yan Zhong. Explicit Directional Affine Extractors and Improved Hardness for Linear Branching Programs. In Rahul Santhanam, editor, 39th Computational Complexity Conference (CCC 2024), volume 300 of Leibniz International Proceedings in Informatics (LIPIcs), pages 10:1–10:14, Dagstuhl, Germany, 2024. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.CCC.2024.10.
- [20] Shachar Lovett and Srikanth Srinivasan. Correlation bounds for poly-size ac0 circuits with n(1-o(1)) symmetric gates. In Leslie Ann Goldberg, Klaus Jansen, R. Ravi, and José D. P. Rolim, editors, Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, pages 640–651, Berlin, Heidelberg, 2011. Springer Berlin Heidelberg.
- [21] M. Luby, B. Velickovic, and A. Wigderson. Deterministic approximate counting of depth-2 circuits. In [1993] The 2nd Israel Symposium on Theory and Computing Systems, pages 18–24, 1993. doi:10.1109/ISTCS.1993.253488.
- [22] Xin Lyu. Improved pseudorandom generators for ac0 circuits. In Proceedings of the 37th Computational Complexity Conference, CCC ’22, Dagstuhl, DEU, 2022. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.CCC.2022.34.
- [23] Noam Nisan. The communication complexity of threshold gates. Combinatorics, Paul Erdős is eighty, Vol. 1, 1993.
- [24] Noam Nisan and Avi Wigderson. Hardness vs randomness. Journal of computer and System Sciences, 49(2):149–167, 1994. doi:10.1016/S0022-0000(05)80043-1.
- [25] Alexander Razborov and Avi Wigderson. w(log n) lower bounds on the size of depth-3 threshold cicuits with and gates at the bottom. Information Processing Letters, 45(6):303–307, 1993. doi:10.1016/0020-0190(93)90041-7.
- [26] Rocco A. Servedio and Li-Yang Tan. Luby-Velickovic-Wigderson Revisited: Improved Correlation Bounds and Pseudorandom Generators for Depth-Two Circuits. In Eric Blais, Klaus Jansen, José D. P. Rolim, and David Steurer, editors, Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (APPROX/RANDOM 2018), volume 116 of Leibniz International Proceedings in Informatics (LIPIcs), pages 56:1–56:20, Dagstuhl, Germany, 2018. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.APPROX-RANDOM.2018.56.
- [27] Rocco A. Servedio and Li-Yang Tan. Improved pseudorandom generators from pseudorandom multi-switching lemmas. Theory Comput., 18:1–46, 2022. URL: https://theoryofcomputing.org/articles/v018a004/, doi:10.4086/TOC.2022.V018A004.
- [28] Emanuele Viola. Pseudorandom bits for constant-depth circuits with few arbitrary symmetric gates. SIAM Journal on Computing, 36(5):1387–1403, 2007. doi:10.1137/050640941.
- [29] Emanuele Viola. The sum of d small-bias generators fools polynomials of degree d. In 2008 23rd Annual IEEE Conference on Computational Complexity, pages 124–127, 2008. doi:10.1109/CCC.2008.16.
- [30] Emanuele Viola. Correlation bounds against polynomials. Electron. Colloquium Comput. Complex., TR22-142, 2022. URL: https://eccc.weizmann.ac.il/report/2022/142, arXiv:TR22-142.
- [31] Emanuele Viola and Avi Wigderson. Norms, xor lemmas, and lower bounds for gf(2) polynomials and multiparty protocols. In Twenty-Second Annual IEEE Conference on Computational Complexity (CCC’07), pages 141–154, 2007. doi:10.1109/CCC.2007.15.
- [32] Thomas Watson. Pseudorandom generators for combinatorial checkerboards. In 2011 IEEE 26th Annual Conference on Computational Complexity, pages 232–242, 2011. doi:10.1109/CCC.2011.12.
