Implications of Better PRGs for Permutation Branching Programs
Abstract
We study the challenge of derandomizing constant-width standard-order read-once branching programs (ROBPs). Let be any constant. We prove that if there are explicit pseudorandom generators (PRGs) for width- length- permutation ROBPs with error and seed length , then there are explicit hitting set generators (HSGs) for width- length- ROBPs with threshold and seed length .
For context, there are known explicit PRGs that fool constant-width permutation ROBPs with error and seed length (Koucký, Nimbhorkar, and Pudlák STOC 2011; De CCC 2011; Steinke ECCC 2012). When , there are known constructions of weighted pseudorandom generators (WPRGs) that fool polynomial-width permutation ROBPs with seed length (Pyne and Vadhan CCC 2021; Chen, Hoza, Lyu, Tal, and Wu FOCS 2023; Chattopadhyay and Liao ITCS 2024), but unweighted PRGs with seed length remain elusive. Meanwhile, for width- ROBPs, there are no known explicit PRGs, WPRGs, or HSGs with seed length .
Our reduction can be divided into two parts. First, we show that explicit low-error PRGs for width- permutation ROBPs with seed length would imply explicit low-error PRGs for width- ROBPs with seed length . This would improve Meka, Reingold, and Tal’s PRG (STOC 2019), which has seed length only when the error parameter is relatively large. Second, we show that for any , , , and , an explicit PRG for width- ROBPs with error and seed length would imply an explicit -HSG for width- ROBPs with seed length .
Keywords and phrases:
hitting set generators, pseudorandom generators, read-once branching programsCategory:
RANDOMFunding:
William M. Hoza: Part of this work was done while the author was a graduate student at the University of Texas at Austin, supported by the NSF GRFP under grant DGE-1610403 and by a Harrington Fellowship from UT Austin. Part of this work was done while the author was visiting the Simons Institute for the Theory of Computing.Copyright and License:
2012 ACM Subject Classification:
Theory of computation Pseudorandomness and derandomizationAcknowledgements:
We thank Omer Reingold and Avishay Tal for valuable discussions.Editors:
Alina Ene and Eshan ChattopadhyaySeries and Publisher:
Leibniz International Proceedings in Informatics, Schloss Dagstuhl – Leibniz-Zentrum für Informatik
1 Introduction
One of the classic goals of computational complexity theory is to clarify the relationship between two fundamental computational resources: randomness and space complexity. The “” conjecture asserts that if a language can be decided by a randomized algorithm that uses bits of space and always halts, where , then it can also be decided by a deterministic algorithm that uses bits of space. A particularly satisfying way to prove would be to design a suitable pseudorandom generator (PRG), defined next.
Definition 1.1 (PRGs).
Let be a class of functions , let , and let be a distribution over . We say that -fools , or fools with error , if
Here is shorthand for , where denotes the uniform distribution over . An -PRG for , or a PRG that fools with error , is a function such that fools with error . The parameter is called the seed length of the PRG.
To simulate a randomized algorithm, we would like a PRG that fools some model that captures the behavior of the algorithm on a fixed input as a function of its random bits. In the case of space-bounded algorithms, we can take to be the class of functions computable by polynomial-width standard-order read-once branching programs (ROBPs), defined below.
Definition 1.2 (ROBPs).
Let . A width- length- standard-order ROBP111The qualifier “standard-order” is often omitted; it emphasizes the fact that the program reads the input bits from left to right. is a directed graph in which the vertices are arranged in layers satisfying for every . For every and every , there are two outgoing edges leading from to , labeled and (the “-edge” and the “-edge” respectively). There is a designated “start vertex” . Each input defines a walk through the program: we start at , and in step , we traverse the outgoing -edge of our current vertex. In this manner, we arrive at a final vertex . Each vertex in is labeled either “accept” or “reject,” and the program accepts or rejects based on the label of . In this way, the program defines a function .
For each fixed input, the output of a space- algorithm can be computed by a width- length- standard-order ROBP that reads the random bits used by the algorithm, where and are both bounded by . Consequently, if we could design an explicit222I.e., the space complexity of the generator should be proportional to its seed length. PRG for width- length- standard-order ROBPs with the optimal seed length , then we could derandomize by deterministically simulating the randomized algorithm on all possible outputs of the generator.
Decades ago, Nisan designed an explicit PRG for width- length- standard-order ROBPs with non-optimal seed length [28]. To this day, Nisan’s PRG is the best PRG known for polynomial-width standard-order ROBPs.
1.1 Regular and Permutation Branching Programs
Because it has turned out to be extremely difficult to design better PRGs for polynomial-width standard-order ROBPs, researchers have investigated ROBPs with additional structural restrictions. Two of the most well-studied classes are regular ROBPs and permutation ROBPs, defined next.
Definition 1.3 (Regular and permutation ROBPs).
An ROBP with layers is regular if every vertex has precisely two incoming edges. If these two incoming edges have distinct labels ( and ) for each , then we say that the program is a permutation ROBP.
Braverman, Rao, Raz, and Yehudayoff showed that there is an explicit PRG that -fools width- length- standard-order regular ROBPs with seed length [5]. This beats Nisan’s seed length [28] provided that and . Their PRG construction consists of an appropriately-parameterized version of the so-called Impagliazzo-Nisan-Wigderson (INW) generator [21]. For constant-width standard-order permutation ROBPs, the seed length can be improved to [6, 22, 13, 33]. However, we emphasize that when , there are still no known explicit PRGs with seed length , even for the case of constant-width standard-order permutation ROBPs.
1.2 Width-, Width-, and Width- Branching Programs
There has also been some success at beating Nisan’s PRG in the case of extremely narrow ROBPs, with no structural restrictions. In the 1990s, Saks and Zuckerman showed that any “small-bias distribution” [27] fools width- branching programs, and consequently, there is an explicit PRG that fools width- programs with the optimal seed length [32, 2, 16, 23].
Width- programs turned out to be much more challenging. Nevertheless, Meka, Reingold, and Tal managed to construct an explicit PRG for width- standard-order ROBPs with seed length [25]. Meka, Reingold, and Tal’s PRG [25] follows the “iterated restrictions with early termination” paradigm. First, they show how to assign pseudorandom values to a pseudorandom subset of a width- ROBP’s input variables in such a way that the expectation of the program is approximately preserved. Second, they show that after several such rounds of pseudorandom restrictions, the program simplifies with high probability, in the sense that it “almost” becomes a permutation ROBP. Finally, they show that the INW generator fools this “near-permutation program” with a good seed length.
For width- standard-order ROBPs, no explicit PRGs are known with seed length . The width- case brings new challenges that are not present in the width- and width- cases. For example, width- ROBPs can compute read-once “” formulas, which have been highlighted as a challenging case for the “iterated restrictions with early termination” paradigm [17]. These formulas are provably not “simple” enough to be fooled by the INW generator with seed length [6, 19], and they apparently do not get any “simpler” under restrictions, due to the layer of parity gates at the bottom. That being said, one can use small-bias distributions to -fool read-once formulas with a seed length of .333After applying the parity gates, the resulting distribution still has small bias, and every -biased distribution fools read-once CNFs with error [7, 14]. This perhaps suggests that we can be optimistic about fooling all width- ROBPs with a similar seed length.
1.3 Hitting Set Generators
Another approach for making progress on the vs. problem is to look at relaxations of the PRG concept. The most famous such relaxation is the classic hitting set generator (HSG) concept, defined next.
Definition 1.4 (HSGs).
Let be a class of functions and let . An -hitting set for is a set such that for every , if , then there is some such that . An -HSG for is a function such that the image of is an -hitting set for .
Every -PRG for a class is also an -HSG, but not vice versa. By working through the definitions, one can easily show that explicit HSGs for polynomial-width ROBPs with seed length would imply , where is the variant of in which we only allow algorithms with one-sided error. In fact, it turns out that such HSGs would imply [11, 29]. Constructing HSGs is thus a route to proving that is potentially easier than constructing PRGs. However, despite the extra flexibility of the HSG definition, we would like to highlight the fact that there are currently no known explicit HSGs for width- standard-order ROBPs with seed length .
1.4 Our Contributions
In this work, we establish new connections between the problems discussed above. Our main result says that if we could construct improved explicit PRGs for constant-width standard-order permutation ROBPs in the low-error regime, then we would get improved explicit HSGs for width- standard-order ROBPs.
Theorem 1.5 (PRGs for width- permutation programs HSGs for width- programs).
Let be any constant. Assume that for every , there exists an explicit -PRG for width- length- standard-order permutation ROBPs with seed length . Then for every and every , there exists an explicit -HSG for width- length- standard-order ROBPs with seed length .
For context, prior work has shown that improved PRGs for regular ROBPs of polynomial width would have huge implications [31, 3, 24]. Indeed, Lee, Pyne, and Vadhan showed that every function computable by a width- length- standard-order ROBP can also be computed by a standard-order regular ROBP of width [24]. Our new reduction shows that improved PRGs for standard-order permutation ROBPs of constant width (a much weaker model) would already have significant consequences.
Our reduction can be divided into two parts, each of which is interesting in its own right. First, we revisit Meka, Reingold, and Tal’s reduction from the problem of fooling width- ROBPs to the problem of fooling “near-permutation” programs [25]. We show a reduction to the problem of fooling programs that exactly satisfy the permutation condition, albeit of width instead of :
Theorem 1.6 (Fooling width- permutation programs fooling width- programs).
There exists a constant such that the following holds. Assume that for every and , there exists an explicit -PRG for width- length- standard-order permutation ROBPs with seed length . Then, for every and , there exists an explicit -PRG for width- length- standard-order ROBPs with seed length , where .
Given Theorem 1.6, we can recover Meka, Reingold, and Tal’s seed length for fooling width- standard-order ROBPs [25] (up to log log factors) by plugging in the state-of-the-art seed length for fooling constant-width standard-order permutation ROBPs [22, 13, 33]. More importantly, Theorem 1.6 shows that hypothetical improved PRGs for constant-width permutation ROBPs would translate to improved PRGs for width- ROBPs.
Second, we show how to convert low-error PRGs for width- ROBPs into HSGs for width- ROBPs, for any :
Theorem 1.7 (PRGs for width- programs HSGs for width- programs).
Let be a constant such that ,444This is satisfied when and let be any constant. Assume that for every , there exists an explicit PRG for width- standard-order ROBPs with error and seed length . Then for every and every , there exists an explicit -HSG for width- standard-order ROBPs with seed length .
Conceivably, one could hope to strengthen Theorem 1.7 to the point that it could be iterated. By induction on width, such a strengthened version could imply explicit HSGs for all constant-width standard-order ROBPs with seed length . We find this idea exciting, even if it is admittedly quite speculative.
Our main result (Theorem 1.5) readily follows from Theorems 1.6 and 1.7, as we now briefly explain.
Proof of Theorem 1.5, given Theorems 1.6 and 1.7.
If we truncate a -PRG for width- standard-order permutation ROBPs, then we get another -PRG for width- standard-order permutation ROBPs (of shorter length). Therefore, the assumption of Theorem 1.5 implies the assumption of Theorem 1.6 with . Therefore, by Theorem 1.6, for every , there exists an explicit PRG that fools width- standard-order ROBPs with error and seed length , where . Simplifying, we have . Applying Theorem 1.7 completes the proof.
1.5 Context: Weighted Pseudorandom Generators
Theorems 1.5, 1.6, and 1.7 are especially interesting in light of a recent line of work on weighted pseudorandom generators (WPRGs), defined next.
Definition 1.8 (WPRGs).
Let be a class of functions and let . An -WPRG for is a pair , where and , such that for every , we have
Weighted PRGs were introduced by Braverman, Cohen, and Garg [4]. The key innovation in Definition 1.8 is that the weights can be negative. One can show that WPRGs are “intermediate” between PRGs and HSGs.
The WPRG paradigm has turned out to be especially helpful in low-error regimes. For example, recent work has shown how to construct explicit WPRGs that fool the following models with error and seed length :
In contrast, in all three of the cases listed above, there are no known explicit unweighted PRGs with error and seed length .555In fact, in the case of unbounded-width standard-order permutation ROBPs, unweighted PRGs with error and seed length provably do not exist [18].
Unfortunately, our new reductions (Theorems 1.5, 1.6, and 1.7) require unweighted PRGs. If our reductions could be adapted to work with negative weights, then we would get an explicit HSG for width- standard-order ROBPs with seed length .
1.6 Techniques
Our reductions can be broken down into several smaller parts; see Figure 1. One common theme in our proofs is that, following prior work [15, 3, 26], we study modified versions of the ROBP model in which it is possible to accept or reject “early,” before reaching the end of the computation. We find it most convenient to work with the following models.
Definition 1.9 (-programs and -programs).
An -program is a standard-order ROBP in which every edge is labeled as either “accepting” or “rejecting” (in addition to the usual binary edge label). Given an input , if every edge that the ROBP traverses is an accepting edge, then we say that the -program accepts ; otherwise, we say that the -program rejects . An -program is defined similarly, except that an -program accepts if it traverses at least one accepting edge and it rejects otherwise.
An -program or an -program of width can trivially be simulated by a standard-order ROBP of width , but note that (a) the difference between width and width is crucial in this work, and (b) we are concerned with structural properties such as the permutation condition that are not preserved by such a trivial simulation.
1.6.1 Near-Permutation Programs vs. Exact Permutation Programs
As discussed previously, Meka, Reingold, and Tal reduced the problem of fooling width- ROBPs to the problem of fooling “near-permutation” programs [25]. In more detail, by “near-permutation” programs, we refer to programs that are approximated in a certain sense by programs with few colliding layers. (A “colliding layer” is a layer that violates the definition of a permutation ROBP.) Later, Chen, Hoza, Lyu, Tal, and Wu improved the number of colliding layers in this reduction [10].
For the proof of Theorem 1.6, our main observation is that any width- program with colliding layers can be written as a sum of many width- permutation -programs. We prove this by a simple “guess and check” argument; see Lemma 3.3 for details.
The permutation -program model is stronger than the standard-order permutation ROBP model, but previous work by Bogdanov, Hoza, Prakriya, and Pyne implies that to fool width- permutation -programs, it suffices to fool width- standard-order permutation ROBPs [3]. Thus, combining their work with our observation, we see that PRGs for width- standard-order permutation ROBPs automatically fool width- programs that have a few colliding layers.
The proof of Theorem 1.6 requires some additional technical details, mainly to handle approximation errors that arise in Meka, Reingold, and Tal’s framework [25]. See Section 3 for details.
1.6.2 Using a PRG for Width to Design an HSG for Width
Let be a distribution that fools width- ROBPs with error . The first step in the proof of Theorem 1.7 is to prove that is a -hitting set for width- -programs.
To explain the intuition, let us consider a special case of width- -programs, namely, a function of the form , where are width- standard-order ROBPs on disjoint variables. Since we are aiming to construct a -hitting set, let us assume that . Letting , we have
so . Therefore,
| (Union bound) | ||||
Thus, indeed, hits .666Note that this argument breaks down if we try to replace with a WPRG, because the union bound no longer holds.
Now suppose more generally that is a width- -program. In this case, we let be the probability that traverses a rejecting edge in step . By a probabilistic construction (Lemma 4.1), we show that can be modified to ensure that . Consequently, is a -hitting set for width- -programs by a similar “union bound” calculation as above. The probabilistic modification of is arguably the most novel component of our reductions.
For the next step in the proof of Theorem 1.7, we build on Gopalan, Meka, Reingold, Trevisan, and Vadhan’s techniques [15]. In our terminology, they show how to convert an explicit -HSG for width- -programs into an explicit -HSG for width- standard-order ROBPs [15, Theorem 6.5]. They used this reduction to construct a near-optimal HSG for width- standard-order ROBPs. We cannot apply their reduction directly, because it requires a low-threshold HSG and we merely have a -HSG. Therefore, we extend their reduction. We show that an explicit -HSG for width- -programs can be combined with an explicit -HSG for width- -programs to produce an explicit -HSG for width- standard-order ROBPs (Lemma 4.5). One can easily show that is a -hitting set for width- -programs (Lemma 4.3), so we get a -HSG for width- standard-order ROBPs.
Finally, we use an adaptation of Hoza and Zuckerman’s error reduction technique [20] to construct an -HSG for width- standard-order ROBPs for any . This error reduction step blows up the seed length by a factor of , but we can get a final seed length of instead of by using the standard “sampler trick.” See Section 4 for details.
1.7 Organization
After some preliminaries in Section 2, we prove Theorem 1.6 in Section 3, and then we prove Theorem 1.7 in Section 4.
2 Preliminaries
2.1 Subprograms, Substrings, Hitting Sets, and Restrictions
Let be an ROBP with layers . For each and each , we define the “subprogram” to be a version of in which is effectively the new start vertex. More precisely, is a length- program on the layers , where . All transitions in the first steps lead to , and after that, the program is identical to . We furthermore define .
If and , we use the notation to denote the string .
Let and . We say that “hits” if there is some such that .
A restriction is a string . If and , then we define the restricted function by the rule , where, for every ,
2.2 Probability
We rely on the following standard lemma from the theory of PRGs.
Lemma 2.1 (Sandwiching lemma).
Let and let be a distribution over . Assume that for every ; assume that ; and assume that fools and with error . Then fools with error .
Proof.
and
We also rely on the following elementary inequality.
Lemma 2.2 (Reverse union bound).
Let be events, and let . Then
Proof.
Let . Then
and hence .
3 Conditional Low-Error PRGs for Width- ROBPs
3.1 Fooling Programs That Have a Few Colliding Layers
The first step in the proof of Theorem 1.6 is the following lemma from the work of Bogdanov, Hoza, Prakriya, and Pyne [3, Lemma 20].
Lemma 3.1 (Fooling permutation -programs [3]).
Let be a distribution over . If fools width- standard-order permutation ROBPs with error , then fools width- permutation -programs with error .
Technically, the model that Bogdanov, Hoza, Prakriya, and Pyne study (“unanimity programs”) [3] is slightly weaker than our -program model, because they require the two outgoing edges of each vertex to be either both accepting or both rejecting. However, their proof applies equally well to both models.
Combining the assumption of Theorem 1.6 with Lemma 3.1 gives us a PRG for width- standard-order permutation -programs. The next step is to show that we can fool width- standard-order -programs that have a few colliding layers, defined next.
Definition 3.2 (Colliding layer).
Let be an ROBP with layers . We say that layer is colliding, where , if there exist two edges going from to with the same binary label leading to the same vertex.
Lemma 3.3 (Fooling -programs with a few colliding layers).
Let be a width- length- -program with at most colliding layers. Then can be written as a sum of many width- permutation -programs.
Proof.
Let the layers of be . Let be the set of colliding layers. For every , we will modify to construct a width- standard-order permutation -program . The construction is as follows.
-
1.
Let .
-
2.
Redirect the outgoing edges of vertices in in such a way that there are no remaining collisions, and re-label them as “rejecting” edges.
Observe that if and only if visits the vertices and accepts. Consequently, .
Next, we show how to fool width- standard-order ROBPs that are well-approximated by a suffix with few colliding layers. More precisely, we will fool -programs, defined below.
Definition 3.4 (-program).
Let be a length- standard-order ROBP with layers . We say that is a -program if has width at most and there exists an such that:
-
1.
There are at most colliding layers among layers .
-
2.
If we sample , then
Lemma 3.5 (Fooling -programs with colliding layers fooling -programs).
Let be a distribution over and let . If fools width- -programs that have at most colliding layers with error , then fools -programs with error .
Proof.
Let be a -program, and let be as in Definition 3.4. Let be any element of . For each , define
We will use the following two approximators to sandwich :
where the summation is over . For every , we have
To see this, note that on either reaches , or else it reaches some , and then we can consider the term. Furthermore,
Thus, indeed, is sandwiched between and with error .
Now we will prove that fools and . The program can be computed by a width- standard-order ROBP with at most colliding layers. The model of width- -programs with at most colliding layers is only more general, so fools with error . Now fix ; we will show that fools .
We can construct an -program that computes as follows.
-
Each vertex of represents an unordered pair of vertices in the corresponding layer of .
-
Let and let be the vertices reached from by following the outgoing -edge. If , then the outgoing -edge of leads to and is an accepting edge. If , then the outgoing -edge of can lead to an arbitrary vertex and is a rejecting edge.
Observe that has width . Furthermore, every colliding layer of is also a colliding layer of . Therefore, has at most colliding layers. Consequently, fools with error . Therefore, fools and with error . Applying Lemma 2.1 completes the proof.
3.2 Reducing the Number of Colliding Layers in a Width- Program
To complete the proof of Theorem 1.6, we will take Meka, Reingold, and Tal’s approach [25]: we will apply a few pseudorandom restrictions, and we will argue that with high probability, the restricted program is “almost” a permutation program. In particular:
Lemma 3.6 (Restrictions for width- programs [25, 10]).
For every and , there exists an explicit restriction generator , with , such that if is a width- standard-order ROBP and we sample :
-
1.
The restriction preserves the expectation of up to error . That is,
where is a uniform random string that is independent of .
-
2.
With probability over , the restricted function can be computed by a -program where .
(See Section 2 for the definition of .) In Meka, Reingold, and Tal’s original analysis [25], the number of colliding layers () is (and they use a slightly different notion of approximation). Later, Chen, Hoza, Lyu, Tal, and Wu refined their analysis [10]. Their bound on the number of colliding layers was roughly , but it turns out that merely fiddling with some parameters in their analysis is enough to prove the superior bound stated in Lemma 3.6. We explain some details below.
Proof sketch of Lemma 3.6.
We assume that the reader is familiar with Chen, Hoza, Lyu, Tal, and Wu’s analysis [10], and we merely explain what changes to make to their proofs.
-
In their “Claim 7.25,” we should not assume is a constant. Their proof works for any , provided we choose a suitable value .
-
In their “Claim 7.30,” we should choose rather than . After making this change, there is no longer any need to assume ; the claim holds provided .
-
In their “Lemma 7.31,” we should not assume is a constant. The lemma holds for any that is a power of , with a seed length of
-
In their “Claim 7.35,” instead of taking to be a small enough constant, we should pick . In the proof, we should pick . We should define instead of . That way, at the end, we reach , , and . Applying this modified version of Claim 7.35 with completes the proof of Lemma 3.6.
Proof of Theorem 1.6.
Let be the assumed -PRG. Our new PRG samples a restriction using Lemma 3.6 with error , then samples a pseudorandom string from , and finally uses to fill in the stars of . The seed length is clearly .
To prove that this works, let be a width- length- standard-order ROBP. By Lemma 3.6, preserves the expectation of to within . Furthermore, except with probability , the restricted function can be computed by a -program where . Since we have assumed that , the bound simplifies to .
By Lemmas 3.1, 3.3, and 3.5, the distribution fools width- standard-order permutation -programs with error ; it fools width- standard-order -programs that have at most colliding layers with error ; and it fools -programs with error . (Note that .)
Summing up, our PRG fools with error . If we choose the constant in the definition of large enough, then , completing the proof.
4 Conditional HSGs for Width- ROBPs
4.1 Hitting Width- -Programs
As discussed in Section 1.6, the first step in the proof of Theorem 1.7 is to show that in a -program , without loss of generality, the expected number of rejecting edges traversed under a uniform random input is at most . Constant factors are important here; see Figure 2. We prove it by using the probabilistic method to reroute the rejecting edges; the details follow.
Lemma 4.1 (Expected number of rejecting edges traversed in an -program).
For every width- -program , there exists another width- -program with the following two properties.
-
1.
computes the same function as .
-
2.
When reads a uniform random input, the expected number of rejecting edges that are traversed is at most .
Proof.
Let be the layers of vertices of . For each string , let be the vertex that reaches after reading . For each , let be the set of such that when reads , every edge it traverses is an accepting edge. Furthermore, abusing notation, let denote the uniform distribution over the set . We construct using the probabilistic method as follows.
-
1.
For each independently, we sample a string .
-
2.
Let be , except that for every , all rejecting edges from to are redirected to point to .
Since we only redirected rejecting edges, computes the same function as .
We will prove by induction that for every , we have , where denotes a uniform random -bit string that is independent of the randomness used to construct . When , this is trivial. Now, assuming it holds for , we can sample by the following steps.
-
1.
Sample uniformly at random from (note that ).
-
2.
Sample uniformly at random.
-
3.
If , sample and output .
-
4.
If , output .
Conditioned on the event , clearly . Meanwhile, conditioned on the event that , the string is in fact uniformly distributed over , and hence once again . This completes the inductive step.
Consequently, if we sample , then the expected number of rejecting edges traversed by is
by Lemma 2.2. The best case is at least as good as the average case, so there is some fixing of such that the expected number of rejecting edges traversed by with respect to the randomness of alone is at most .
Corollary 4.2 (PRGs for width- ROBPs are HSGs for width- -programs).
Let and , and let . For every width- length- -program with , there is a set of width- standard-order ROBPs such that the following hold.
-
1.
.
-
2.
If is a distribution over that -fools , then hits .
In particular, if fools all width- length- standard-order ROBPs with error , then hits .
Proof.
Let be the program from Lemma 4.1. For each , there is a width- standard-order ROBP such that if and only if traverses a rejecting edge in step . Let . Then
4.2 Hitting Width- -Programs
Lemma 4.3 (HSGs for width- ROBPs are also HSGs for width- -programs).
For every width- length- -program , there is a width- length- standard-order ROBP such that and . Consequently, for every and every , if is an -hitting set for width- length- standard-order ROBPs, then is also an -hitting set for width- length- -programs.
Proof.
For each , there is a width- standard-order ROBP such that if and only if traverses an accepting edge in step . If we sample , then
so there is some such that . We can let .
4.3 Hitting Width- Programs
We define the following associative operation on hitting sets.
Definition 4.4 (The operation).
For any two sets , we define
Furthermore, we define
Note that .
As discussed in Section 1.6, Gopalan, Meka, Reingold, Trevisan, and Vadhan showed how to convert an -hitting set for width- -programs into an -hitting set for width- standard-order ROBPs [15]. In particular, they showed that one can take . Extending their techniques, we now show that if and are an -hitting set for width- -programs and an -hitting set for width- -programs, respectively, then is an -hitting set for width- standard-order ROBPs.
Lemma 4.5 (Simulating width- programs using -programs and -programs of width ).
Let . For every width- standard-order ROBP with , there is a set of width- length- -programs and a set of width- length- -programs such that the following hold.
-
1.
and .
-
2.
for every and for every .
-
3.
For every , for every such that hits , and for every such that hits , the set hits .
In particular, if is an -hitting set for width- -programs and is an -hitting set for width- -programs, then hits .
Proof.
Let be the layers of . We assume without loss of generality that for every and , with one accepting vertex and one rejecting vertex in .
For every , there is some “good vertex” such that . Let be the smallest value such that there is some “bad vertex” satisfying . The existence of this first bad vertex implies that for every , there is another bad vertex satisfying .
In brief, our strategy is as follows. We will take the first steps arbitrarily; there is no risk of hitting a bad vertex during this time. Then, we will use to reach one of the good vertices (). Afterward, we will use to avoid the bad vertices ().
In more detail, for each , define by letting if and only if there is a value such that visits the good vertex . Note that we think of as a function on bits that ignores its first many input bits. Observe that can be computed by a width- length- -program. (We can delete the vertices , redirect their incoming edges arbitrarily, and mark those edges as accepting edges. Layers can have width , because that phase of the computation is trivial.) The definition of implies that . The final good vertex is the accepting vertex, so . Let .
Furthermore, for each , define by letting if and only if avoids all of the bad vertices . Observe that can be computed by a width- length- -program. (We can delete the vertices , redirect their incoming edges arbitrarily, and mark those edges as rejecting edges. Layers can have width , because that phase of the computation is trivial.) Furthermore,
| (1) | ||||
(Equation 1 holds because the probability that accepts conditioned on visiting without visiting is precisely , which is at most .) Let .
Finally, let and let be sets that hit and respectively. We must show that hits . Since hits , there is some and some such that visits . Since hits , there is some such that , i.e., avoids all of the bad vertices . Consequently,
4.4 Error Reduction
At this point, given an -PRG for width- programs, we have shown how to construct a -HSG for width- programs. To construct an -HSG where is small, we will use a version of an error reduction technique introduced by Hoza and Zuckerman [20]. We rely on the following lemma, which shows how to split a branching program into two subprograms, each of which has much higher acceptance probability.
Lemma 4.6 (Increasing a branching program’s acceptance probability).
Let , let , and let be a width- length- standard-order ROBP with . Let be the set of vertices in and let be the set of vertices such that . For each , let indicate whether visits at least one vertex in . Then:
-
1.
The function can be computed by a width- standard-order ROBP.
-
2.
.
Proof sketch.
Observe that if intersects a layer of , then also intersects all subsequent layers of . Therefore, to construct a program that computes , we can redirect all outgoing edges from vertices in to other vertices in , and then in the final layer, label the vertices in as accepting and all other vertices as rejecting. Finally, the fact that was proven by Bogdanov, Hoza, Prakriya, and Pyne [3, Lemma 25].777Bogdanov, Hoza, Prakriya, and Pyne state the bound as [3], but their proof establishes the strict inequality .
Given Lemma 4.6, the following error reduction lemma readily follows.
Lemma 4.7 (Error reduction).
Let , let , let , and let . For every width- length- standard-order ROBP such that , there is a set of width- length- standard-order ROBPs such that the following hold.
-
1.
.
-
2.
for every .
-
3.
For any set , if hits , then hits .
In particular, if is a -hitting set for width- length- standard-order ROBPs, then hits .
Proof.
Let . Let be the layers of . For every vertex , we will define a function . The definition is as follows.
-
First, suppose . In this case, we let .
-
Now, suppose . Let be the set of vertices in layers beyond such that . Let indicate whether visits at least one vertex in .
Lemma 4.6 ensures that and can be computed by a width- standard-order ROBP. Let .
Now let be a set that hits . We must show that hits . By inductively applying the definition of , we see that there is some such that visits some vertex such that . By our choices of and , we have
so . Therefore, .
4.5 The Sampler Trick
Combining the lemmas above yields the following.
Theorem 4.8 (If fools width , then hits width ).
Let and be constants, and assume . For every and , there is a value such that for every width- length- standard-order ROBP such that , there is a set of width- length- standard-order ROBPs such that the following hold.
-
1.
.
-
2.
If is a distribution over that fools with error , then hits .
In particular, if fools all width- standard-order ROBPs with error , then hits .
Proof.
Let , let , let , and let . Let be the set from Lemma 4.7. For each , let be the sets from Lemma 4.5. Let and . For every , let be the program from Lemma 4.3. For every , let be the set from Corollary 4.2. Let .
Let us confirm the cardinality bound. We have . For each , we have and ; therefore, and . For each , we have ; therefore, since is a constant.
Now suppose is a distribution over that fools with error . By Corollary 4.2, is an -hitting set for . By Lemma 4.3, is an -hitting set for . Therefore, by Lemma 4.5, is a -hitting set for . Finally, applying Lemma 4.7, we conclude that hits .
At this point, we are nearly done with the proof of Theorem 1.7. Applying Theorem 4.8 directly would lead to a seed length of . To achieve the superior seed length , we use the so-called “sampler trick.” This trick, which was perhaps first used in the context of PRGs by Armoni [1], is based on the concept of an averaging sampler, defined as follows.
Definition 4.9 (Sampler).
Let . An -sampler is a function such that for every function , we have
We need an explicit sampler with good parameters. The following recent construction, by Xun and Zuckerman [34], is more than sufficient for our purposes.
Theorem 4.10 ([34]).
For every and every , there exists an explicit -sampler with and .
Proof of Theorem 1.7.
Let be the given PRG. Let be a constant small enough that ,888This is satisfied provided . and let . Let , and let be the -sampler from Theorem 4.10, where will be specified later.
Let be the value from Theorem 4.8. For each , let . Our hitting set is given by
Let us prove that this works. Let be a width- standard-order ROBP such that . Let be the set from Theorem 4.8. For each , we define by . We choose such that . That way, by the sampler definition and the union bound, there exists some such that for every , we have
Since fools with error , we have . Therefore, fools with error . By Theorem 4.8, it follows that hits .
The seed length of our HSG is , which is as promised.
References
- [1] Roy Armoni. On the derandomization of space-bounded computations. In Proceedings of the 2nd Workshop on Randomization and Approximation Techniques in Computer Science (RANDOM), pages 47–59, 1998. doi:10.1007/3-540-49543-6_5.
- [2] Andrej Bogdanov, Zeev Dvir, Elad Verbin, and Amir Yehudayoff. Pseudorandomness for width-2 branching programs. Theory Comput., 9:283–292, 2013. doi:10.4086/toc.2013.v009a007.
- [3] Andrej Bogdanov, William M. Hoza, Gautam Prakriya, and Edward Pyne. Hitting Sets for Regular Branching Programs. In Proceedings of the 37th Computational Complexity Conference (CCC), pages 3:1–3:22, 2022. doi:10.4230/LIPIcs.CCC.2022.3.
- [4] Mark Braverman, Gil Cohen, and Sumegha Garg. Pseudorandom pseudo-distributions with near-optimal error for read-once branching programs. SIAM J. Comput., 49(5):STOC18–242–STOC18–299, 2020. doi:10.1137/18M1197734.
- [5] Mark Braverman, Anup Rao, Ran Raz, and Amir Yehudayoff. Pseudorandom generators for regular branching programs. SIAM J. Comput., 43(3):973–986, 2014. doi:10.1137/120875673.
- [6] Joshua Brody and Elad Verbin. The coin problem, and pseudorandomness for branching programs. In Proceedings of the 51st Annual Symposium on Foundations of Computer Science (FOCS), pages 30–39, 2010. doi:10.1109/FOCS.2010.10.
- [7] Suresh Chari, Pankaj Rohatgi, and Aravind Srinivasan. Improved algorithms via approximations of probability distributions. J. Comput. System Sci., 61(1):81–107, 2000. doi:10.1006/jcss.1999.1695.
- [8] Eshan Chattopadhyay and Jyun-Jie Liao. Recursive Error Reduction for Regular Branching Programs. In 15th Innovations in Theoretical Computer Science Conference (ITCS), pages 29:1–29:20, 2024. doi:10.4230/LIPIcs.ITCS.2024.29.
- [9] Ben Chen and Amnon Ta-Shma. Better weighted pseudorandom generators against low weight read-once branching programs. ECCC preprint TR25-067, 2025. URL: https://eccc.weizmann.ac.il/report/2025/067/.
- [10] Lijie Chen, William M. Hoza, Xin Lyu, Avishay Tal, and Hongxun Wu. Weighted pseudorandom generators via inverse analysis of random walks and shortcutting. In Proceedings of the 64th Annual Symposium on Foundations of Computer Science (FOCS), pages 1224–1239, 2023. doi:10.1109/FOCS57990.2023.00072.
- [11] Kuan Cheng and William M. Hoza. Hitting sets give two-sided derandomization of small space. Theory Comput., 18:Paper No. 21, 32, 2022. doi:10.4086/toc.2022.v018a021.
- [12] Kuan Cheng and Ruiyang Wu. Weighted pseudorandom generators for read-once branching programs via weighted pseudorandom reductions. ECCC preprint TR25-027, 2025. URL: https://eccc.weizmann.ac.il/report/2025/027/.
- [13] Anindya De. Pseudorandomness for permutation and regular branching programs. In 26th Annual Conference on Computational Complexity (CCC), pages 221–231, 2011. doi:10.1109/CCC.2011.23.
- [14] Anindya De, Omid Etesami, Luca Trevisan, and Madhur Tulsiani. Improved pseudorandom generators for depth 2 circuits. In Proceedings of the 14th International Workshop on Randomization and Computation (RANDOM), pages 504–517, 2010. doi:10.1007/978-3-642-15369-3_38.
- [15] Parikshit Gopalan, Raghu Meka, Omer Reingold, Luca Trevisan, and Salil Vadhan. Better pseudorandom generators from milder pseudorandom restrictions. In Proceedings of the 53rd Annual Symposium on Foundations of Computer Science (FOCS), pages 120–129, 2012. doi:10.1109/FOCS.2012.77.
- [16] Pooya Hatami and William Hoza. Paradigms for unconditional pseudorandom generators. Found. Trends Theor. Comput. Sci., 16(1-2):1–210, 2024. doi:10.1561/0400000109.
- [17] William M. Hoza. Recent progress on derandomizing space-bounded computation. Bull. Eur. Assoc. Theor. Comput. Sci. EATCS, 138:114–143, 2022. URL: http://bulletin.eatcs.org/index.php/beatcs/article/view/728.
- [18] William M. Hoza, Edward Pyne, and Salil Vadhan. Pseudorandom Generators for Unbounded-Width Permutation Branching Programs. In 12th Innovations in Theoretical Computer Science Conference (ITCS), pages 7:1–7:20, 2021. doi:10.4230/LIPIcs.ITCS.2021.7.
- [19] William M. Hoza, Edward Pyne, and Salil Vadhan. Limitations of the Impagliazzo–Nisan–Wigderson pseudorandom generator against permutation branching programs. Algorithmica, 2024. doi:10.1007/s00453-024-01251-2.
- [20] William M. Hoza and David Zuckerman. Simple optimal hitting sets for small-success . SIAM J. Comput., 49(4):811–820, 2020. doi:10.1137/19M1268707.
- [21] Russell Impagliazzo, Noam Nisan, and Avi Wigderson. Pseudorandomness for network algorithms. In Proceedings of the 26th Annual Symposium on Theory of Computing (STOC), pages 356–364, 1994. doi:10.1145/195058.195190.
- [22] Michal Koucký, Prajakta Nimbhorkar, and Pavel Pudlák. Pseudorandom generators for group products [extended abstract]. In Proceedings of the 43rd ACM Symposium on Theory of Computing (STOC), pages 263–272, 2011. doi:10.1145/1993636.1993672.
- [23] Vinayak M. Kumar. New Pseudorandom Generators and Correlation Bounds Using Extractors. In Proceedings of the 16th Innovations in Theoretical Computer Science Conference (ITCS), volume 325, pages 68:1–68:23, 2025. doi:10.4230/LIPIcs.ITCS.2025.68.
- [24] Chin Ho Lee, Edward Pyne, and Salil Vadhan. On the Power of Regular and Permutation Branching Programs. In Proceedings of the 27th International Conference on Randomization and Computation (RANDOM), pages 44:1–44:22, 2023. doi:10.4230/LIPIcs.APPROX/RANDOM.2023.44.
- [25] Raghu Meka, Omer Reingold, and Avishay Tal. Pseudorandom generators for width-3 branching programs. In Proceedings of the 51st Annual Symposium on Theory of Computing (STOC), pages 626–637, 2019. doi:10.1145/3313276.3316319.
- [26] Augusto Modanese. Pseudorandom generators for sliding-window algorithms. arXiv preprint 2301.07384, 2023. doi:10.48550/arXiv.2301.07384.
- [27] Joseph Naor and Moni Naor. Small-bias probability spaces: efficient constructions and applications. SIAM J. Comput., 22(4):838–856, 1993. doi:10.1137/0222053.
- [28] Noam Nisan. Pseudorandom generators for space-bounded computation. Combinatorica, 12(4):449–461, 1992. doi:10.1007/BF01305237.
- [29] Edward Pyne, Ran Raz, and Wei Zhan. Certified hardness vs. randomness for log-space. In Proceedings of the 64th Annual Symposium on Foundations of Computer Science (FOCS), pages 989–1007, 2023. doi:10.1109/FOCS57990.2023.00061.
- [30] Edward Pyne and Salil Vadhan. Pseudodistributions That Beat All Pseudorandom Generators (Extended Abstract). In Proceedings of the 36th Computational Complexity Conference (CCC), pages 33:1–33:15, 2021. doi:10.4230/LIPIcs.CCC.2021.33.
- [31] Omer Reingold, Luca Trevisan, and Salil Vadhan. Pseudorandom walks on regular digraphs and the vs. problem. In Proceedings of the 38th Annual Symposium on Theory of Computing (STOC), pages 457–466, 2006. doi:10.1145/1132516.1132583.
- [32] Michael Saks and David Zuckerman, 1995. Unpublished.
- [33] Thomas Steinke. Pseudorandomness for permutation branching programs without the group theory. ECCC preprint TR12-083, 2012. URL: https://eccc.weizmann.ac.il/report/2012/083/.
- [34] Zhiyang Xun and David Zuckerman. Near-optimal averaging samplers and matrix samplers. ECCC preprint TR24-097, 2024. URL: https://eccc.weizmann.ac.il/report/2024/097/.
