On Sums of INW Pseudorandom Generators
Abstract
We study a new approach for constructing pseudorandom generators (PRGs) that fool constant-width standard-order read-once branching programs (ROBPs). Let be the -bit output distribution of the INW PRG (Impagliazzo, Nisan, and Wigderson, STOC 1994), instantiated using expansion parameter . We prove that the bitwise XOR of independent copies of fools width- programs with error . Notably, this error bound is meaningful even for relatively large values of such as .
Admittedly, our analysis does not yet imply any improvement in the bottom-line overall seed length required for fooling such programs – it just gives a new way of re-proving the well-known bound. Furthermore, we prove that this shortcoming is not an artifact of our analysis, but rather is an intrinsic limitation of our “XOR of INW” approach. That is, no matter how many copies of the INW generator we XOR together, and no matter how we set the expansion parameters, if the generator fools width- programs and the proof of correctness does not use any properties of the expander graphs except their spectral expansion, then we prove that the seed length of the generator is inevitably .
Still, we hope that our work might be a step toward constructing near-optimal PRGs fooling constant-width ROBPs. We suggest that one could try running the INW PRG on correlated seeds, sampled via another PRG, and taking the bitwise XOR of the outputs.
Keywords and phrases:
INW generator, pseudorandomness, space-bounded computation, XOR LemmasCategory:
RANDOMCopyright and License:
2012 ACM Subject Classification:
Theory of computation Pseudorandomness and derandomizationAcknowledgements:
We thank Huacheng Yu for collaboration during the early stages of this project. We thank Gil Cohen and Dean Doron for valuable discussions. We thank Aaron Potechin for valuable discussions and helpful comments on a draft of this paper.Editors:
Alina Ene and Eshan ChattopadhyaySeries and Publisher:
Leibniz International Proceedings in Informatics, Schloss Dagstuhl – Leibniz-Zentrum für Informatik
1 Introduction
1.1 Pseudorandom generators for space-bounded computation
Randomness can be considered a type of “fuel” for computation. We prefer to use as little randomness as possible, just like we prefer to minimize consumption of other types of “fuel.” A pseudorandom generator (PRG) is a way of decreasing the number of random bits used in computation.
Definition 1 (PRG).
Let be a distribution over and let . We say that fools with error if
Here is a shorthand for , where, in general, denotes the uniform distribution over the finite set . A pseudorandom generator (PRG) is a function for some finite set . We say that fools with error if fools with error . The seed length of the PRG is the quantity .111Usually we want the domain to have the form for some , but in this work we allow arbitrary domains.
In this paper, we study PRGs in the context of space-bounded computation. If we wish to simulate a randomized space-bounded algorithm, then we ought to use a PRG that fools standard-order read-once branching programs (ROBPs), defined next.
Definition 2 (Standard-order ROBP).
A width- length- standard-order read-once branching program (ROBP) is a directed acyclic multigraph. The vertices are arranged in layers , each consisting of vertices. Each vertex in where has two outgoing edges leading to labeled and . One vertex is designated as the start vertex, and each vertex is labeled with an output value . Each input selects a walk through the program, defined by starting at and traversing the outgoing edge with label in step . This walk ends at some vertex . The program computes the function given by .
Polynomial-width standard-order ROBPs describe what log-space randomized algorithms do on a fixed input as a function of their random bits. In this paper, we focus on the constant-width case. There isn’t necessarily a clear connection between constant-width ROBPs and uniform models of computation such as randomized Turing machines, but constant-width ROBPs still constitute an extremely interesting nonuniform model of space-bounded computation. The width- case is well-understood [44, 4, 19, 29]. In particular, Saks and Zuckerman showed in the 1990s that there is an explicit PRG that fools width- branching programs with seed length [44], which is optimal. Decades later, Meka, Reingold, and Tal showed that there is an explicit PRG that fools width- standard-order ROBPs with seed length [35]. However, the best seed length bound for width- programs is , which is a special case of the following classic theorem.
Theorem 3 ([38]).
For every and every , there exists an explicit PRG that fools width- length- standard-order ROBPs with error and seed length .
The original proof of Theorem 3 is due to Nisan [38]. There is an alternative proof due to Impagliazzo, Nisan, and Wigderson [26] that is more relevant to the present paper. Impagliazzo, Nisan, and Wigderson inductively defined a sequence of PRGs , where , as follows.
-
1.
Base case: Let and .
-
2.
Inductive step: Assume we have already constructed . Let be a -regular undirected multigraph on the vertex set . Define and
Here denotes the -th neighbor of the vertex in .
Impagliazzo, Nisan, and Wigderson’s original analysis [26] shows that if for every , then fools width- length- standard-order ROBPs with error . Here denotes the spectral expansion parameter of , which can be defined as the second largest eigenvalue of its transition probability matrix in absolute value. There are numerous explicit constructions of expander graphs such that and . (See, for example, Vadhan’s pseudorandomness survey [47].) If we use such expander graphs, then the seed length of is . Choosing completes the proof of Theorem 3.
1.2 Instantiating the INW PRG with relatively mild expanders
It is a major open problem to design PRGs that fool constant-width standard-order ROBPs with seed length . A natural thing to try is to simply increase the parameter in the INW construction. Indeed, even when is relatively large, it turns out that the INW generator still does a good job of fooling so-called “regular” and “permutation” ROBPs [8, 15, 28, 45, 22]. More generally, one can try using different values of at the different levels of the recursion, say . For example, Rozenman and Vadhan showed how to use the INW generator, with for most but not all , to solve the undirected - connectivity problem in deterministic log-space [43], re-proving Reingold’s famous theorem [42].
Unfortunately, it turns out that no matter how we set the expansion parameters, the INW generator is provably too weak to fool constant-width standard-order ROBPs with seed length [9, 23]. Making this statement precise is a little subtle, because “the” INW generator is actually a whole family of PRGs, even after we fix the expansion parameters . After all, the definition of the PRG does not specify which specific expander graphs to use. For a vector , let us define to be the set of all PRGs that can be constructed via the INW template using graphs satisfying for every . As a shorthand, let us also write for the special case when is clear from context. (See Definition 23 for a more detailed definition.) Then we have the following theorem due to Brody and Verbin [9], with details filled in by Hoza, Pyne, and Vadhan [23]:
Theorem 4 (Limitations of the INW generator [9, 23]).
Let . If every PRG in the family fools width- standard-order ROBPs with error , then for values of , and moreover every PRG in the family has seed length .
Theorem 4 can be interpreted as saying that if one wishes to use the INW template to construct a PRG that fools width- standard-order ROBPs with seed length , then the proof of correctness would have to exploit some property of the specific graphs beyond their spectral expansion. It is not clear what property would be helpful.
1.3 A possible way forward: Unpredictability and Yao’s XOR Lemma
In this paper, we propose a new approach for constructing a near-optimal PRG fooling constant-width standard-order ROBPs. The approach is based on the classic notion of unpredictability. Specialized to the setting of standard-order ROBPs, unpredictability can be defined as follows.
Definition 5 (Unpredictability).
Let be a distribution over . We say that is -unpredictable for width- standard-order ROBPs if, for every and every width- length- standard-order ROBP , we have
If where , then we also describe itself as being -unpredictable for width- standard-order ROBPs.
Interestingly, even though does not fool width- programs (Theorem 4), it turns out that is unpredictable for constant-width programs. More precisely, Fefferman, Shaltiel, Umans, and Viola showed that every PRG in the family is -unpredictable for width- standard-order ROBPs [16].222One way to prove this statement is to use the notion of weight introduced by Braverman, Rao, Raz, and Yehudayoff [8]. For any next-bit predictor , we can define a test that checks whether succeeds: . If can be computed by a width- standard-order ROBP, then can be computed by a width- standard-order ROBP with weight two. From here, Braverman, Rao, Raz, and Yehudayoff’s analysis shows that fools with error [8].
How can we leverage the unpredictability of the INW generator to construct a PRG that actually fools constant-width ROBPs? Fefferman, Shaltiel, Umans, and Viola suggested combining the INW generator with a randomness extractor [16]. We propose a different approach, inspired by Yao’s XOR Lemma in circuit complexity. Yao’s XOR Lemma is about the average-case hardness of computing a Boolean function, or more generally the hardness of guessing a Boolean random variable given some correlated random variable . Let be independent copies of . Roughly speaking, Yao’s XOR Lemma says that if it is “somewhat hard” to guess given , then it is “very hard” to guess given . Here “somewhat hard” means that all small circuits have, e.g., a constant failure probability, and “very hard” means that all small circuits have a failure probability very close to .
Maurer and Tessaro observed that Yao’s XOR Lemma implies that the bitwise XOR operation amplifies cryptographic unpredictability [34]. In more detail, let be a distribution that is -unpredictable for small circuits for a relatively large value of such as . Let , where are independent copies of . Yao’s XOR Lemma implies that if a small circuit attempts to guess the -th bit of given the first bits of each copy , then its success probability will be very close to . If the circuit is only given the first bits of , then the prediction task becomes even more difficult. Thus, is -unpredictable for small circuits where .
Intuitively, we expect the same phenomenon to occur in the ROBP setting. If is the bitwise XOR of independent copies of some distribution that is -unpredictable for constant-width standard-order ROBPs, then we expect to be -unpredictable for such programs, where . By Yao’s so-called “distinguisher-to-predictor lemma,” this would imply that actually fools such programs with error . Based on these considerations, we propose the following two-step approach for constructing near-optimal PRGs fooling constant-width standard-order ROBPs.
-
Step 1: Let be a PRG with seed length . Prove that if we sample seeds independently and uniformly at random, then the bitwise XOR fools constant-width standard-order ROBPs.
-
Step 2: Derandomize the proof of Step 1. That is, prove that fools constant-width standard-order ROBPs even if the seeds are not independent, but rather they are generated in some pseudorandom manner using only truly random bits.
To be clear, “Step 1” is not in any way trivial, even if we ignore “Step 2.” Taking a bitwise XOR of several independent samples from a distribution does not always improve its pseudorandomness properties. For example, if is -wise uniform and uniform over a subspace of (see Section 2.8), then the bitwise XOR of many copies of has the same distribution as a single copy of . See also Theorem 10.
1.4 Sums of INW generators fool constant-width ROBPs
One of the main results of this paper is to accomplish “Step 1” described above. To state our results more precisely, let us make the following definition.
Definition 6 (XOR of INW generators).
Let where is a power of two, and let . Let denote the set of all PRGs of the form
where for every . Here denotes the -th row of . As a shorthand, we also write if every entry of is equal to and is clear from context.
We prove the following.
Theorem 7 ( fools constant-width ROBPs).
Let where is a power of two, and let . Every PRG in the family fools width- length- standard-order ROBPs with error
For example, Theorem 7 implies that there is a value such that fools width- length- standard-order ROBPs with error . By plugging in explicit expanders of degree , we get an explicit PRG that fools width- length- standard-order ROBPs with error and seed length
re-proving Theorem 3 in the case . For context, prior to our work, there were already several different known ways to construct PRGs that fool constant-width standard-order ROBPs (and more general models) using a seed of length [38, 26, 2, 41, 18, 7] or [17]. Our Theorem 7 adds to this list.
We hope that there is value in having yet another proof of the bound, but of course the real goal is to construct a PRG with seed length . As discussed previously, we believe that the most promising approach (“Step 2” in our proposal) is to “derandomize” Theorem 7, i.e., prove that a similar error bound holds even if the seeds for the INW generators are chosen in some pseudorandom manner instead of sampling them independently. So far, we have not figured out how to make such an approach work. However, we would like to point out several “success stories” describing cases in which prior researchers managed to solve similar problems:
-
There are several constructions of low-error “weighted pseudorandom generators” and “hitting set generators” for space-bounded computation that work by plugging several correlated seeds into a “moderate-error” initial PRG and then combining the results in some manner [24, 40, 14, 21, 5, 11, 10, 13].
We find these success stories encouraging.
1.5 Summing fewer copies of the INW generator does not work
Instead of analyzing correlated seeds, we can also consider a different and more straightforward approach for improving the seed length of our PRG. What happens if we take an XOR of fewer copies of the INW generator while still using relatively mild expander graphs? For example, what if we try ?
We are inspired to ask this question because of a line of work on the bitwise XOR of small-bias distributions. Recall that by definition, a distribution over is -biased if, for every nonempty set , we have . A sequence of works has shown that the bitwise XOR of independent small-bias distributions fools degree- polynomials over , whereas the XOR of only small-bias distributions does not (unless the bias parameter is extremely small) [6, 32, 48, 33]. This demonstrates that a bitwise XOR of a small number of “weak” PRGs can sometimes be quite strong. Indeed, the XOR of just two small-bias distributions has been proposed as a candidate PRG for ROBPs [36, 31].
Unfortunately, we prove that is not capable of fooling width- standard-order ROBPs. More generally, no matter how many or how few copies of the INW generator we XOR together, and no matter how we set the expansion parameters, if the resulting PRG fools width- programs, then the seed length is inevitably :
Theorem 8 (Limitations of ).
Let be a power of two, let , and let . If every PRG in the family fools width- standard-order ROBPs with error , then every PRG in the family has seed length .
1.6 Increasing vs. decreasing : Two incomparable PRG paradigms
Motivated by Theorems 7 and 8, we wish to better understand how our new generator compares to the classic generator. To be more precise, suppose that for some relatively large value of , it turns out that is too weak to fool some class of functions. To strengthen the PRG, one could try using for some , or one could try using for some . Which approach is better?
We prove that these two approaches are in fact incomparable in general. There are cases in which one approach is better, and there are cases in which the other approach is better. We state these results precisely in the following two theorems. The first theorem describes a case in which summing multiple generators is the better approach.
Theorem 9 (A case where XORing is cheaper than using heavy-duty expanders).
-
1.
For every , every PRG in fools quadratic polynomials over with error .
-
2.
Let where is a power of two. If every PRG in fools quadratic polynomials over with error , then for every , and moreover every PRG in has seed length .333We remark that the distinguishers we construct are read-once quadratic polynomials, and hence they can be computed by width- ROBPs that read their input bits in some nonstandard order. This is an example showing that the INW generator does not fool arbitrary-order ROBPs. Tzur previously showed that Nisan’s PRG has this same weakness [46], but to the best of our knowledge, ours is the first such example regarding the INW generator. We thank Adin Gitig for pointing out this gap in the literature.
Item 1 in the theorem above is an immediate consequence of prior work [28, 15, 45, 6, 32, 48]. The main content of the theorem is Item 2. Theorem 9 demonstrates the strength of the “XOR of INW” paradigm. We hope that future researchers can capitalize on the strengths of the generator to develop better PRGs for ROBPs. Next, let us discuss a case in which summing multiple INW generators is worse than simply using one INW generator with a slightly smaller value.
Theorem 10 (A case where using heavy-duty expanders is cheaper than XORing).
Let be a power of two and let . There exist and such that the following hold.
-
1.
Every PRG in fools with error .
-
2.
Let . If every PRG in fools with error , then , and moreover every PRG in has seed length .
Theorem 10 is valuable because it helps us to interpret Theorem 7. As a reminder, Theorem 7 says that constant-width ROBPs are fooled by a sum of generators. In a sense, Theorem 10 shows that Theorem 7 “could have been false” and was not “inevitable.” Indeed, Theorem 10 shows that in general, the fact that a function is fooled by does not automatically imply that it is fooled by a sum of generators. Consequently, Theorem 7 reveals a new weakness of the constant-width ROBP model, above and beyond the well-known weakness of being fooled by . We hope that future researchers can further exploit the weaknesses of such programs to fool them with a shorter seed.
It might be instructive to compare with a different family of PRGs. Let denote the set of generators one can construct by the following recursive paradigm:
where is a graph satisfying . This is the same as the definition of the INW generator, except that we use a -th power of an expander graph instead of using a generic expander graph. Then , so a theorem saying “Every PRG in fools width- length- standard-order ROBPs with error ” would be true but not interesting. In contrast, Theorem 10 implies that , and we believe that Theorem 7 is saying something new and interesting.
1.7 Proof techniques
1.7.1 Our proof that fools ROBPs, even if is relatively large
In this section, we give a brief informal overview of our proof of Theorem 7, our positive result on using to fool constant-width standard-order ROBPs. For simplicity’s sake, let us focus on the case that for every , and let us assume that we take the XOR of copies of the same generator in . The analysis is based on the following alternative, equivalent description of the resulting PRG. We inductively define a sequence of PRGs , where , as follows.
-
1.
Base case: Let and let .
-
2.
Inductive step: Assume we have already constructed . Let be a -regular expander graph on the vertex set satisfying . Define and
(1)
In effect, Equation 1 says that at each stage of the recursion, we use a tensor product of expander graphs () to recycle the seed . Note that tensoring does not improve expansion: .
Our job is to show that fools width- standard-order ROBPs. For simplicity’s sake, let us focus on showing that the last bit of the output of is -unpredictable for such programs where . Let be a width- program that attempts to predict the last bit of the output of , given all the previous bits. The idea is to write the transition probability matrix of in the form
Here is the transition matrix of the complete graph with self-loops, and is an “error matrix” with operator norm at most . After expanding, we get a sum of terms, each of which has the form (after reordering if necessary).
To analyze such a term, we can first consider any fixing of the last parts of the seed, allowing us to focus on the factor. This factor corresponds to running twice, on two independent seeds, and concatenating the results. Since is trying to predict the last bit, the first copy of is completely irrelevant; it does not give any advantage whatsoever. Meanwhile, by induction, the second copy is -unpredictable where . Meanwhile, the matrix has operator norm at most . As it turns out, this has the effect of dampening the inductive advantage bound by a factor of , so that overall the advantage from the term is at most . Summing over all terms, we get an overall advantage bound of .
In the full proof, in order to optimize parameters and to make the proof as simple as possible, we ultimately do not formally use the notion of unpredictability, but the idea remains the same.
1.7.2 Our proof that sums of INW PRGs with seed length do not fool ROBPs
Next, let us discuss our proof that if the entries of are large enough that there exists a generator in with seed length , then the entries of are so large that there exists a generator in that does not fool width- programs (Theorem 8). For simplicity’s sake, let us focus on the case . The proof builds on the works of Brody and Verbin [9], Hoza, Pyne, and Vadhan [23], and Lee and Viola [31]. We construct our generator using Cayley graphs over the group , i.e., expander graphs of the form where is a small-bias generator. By using both Cayley graphs and complete graphs where appropriate, we ensure that the output of our generator has many substrings of the form
where for some .
We instantiate using a small-bias generator constructed by Lee and Viola [31]. Their generator outputs noisy codewords, i.e., the output is where is a random element of a subspace and is a random vector of low Hamming weight. Crucially, Lee and Viola observe that the sum of two noisy codewords is another noisy codeword. Consequently, letting , the output of our generator has many substrings of the form
The specific parameters ensure that the description above is nontrivial, i.e., there is some such that such a substring is never equal to . Our width- distinguisher checks all the relevant regions of its input and accepts if it ever sees the specific substring . With some tweaks, it turns out that this approach is strong enough to prove Theorem 8.
1.7.3 Our proof that INW with small is incomparable with with large
Next, let us briefly explain how we construct an INW generator that does not fool quadratic polynomials over (Item 2 in Theorem 9). The construction is based on the inner product function . We construct an expander graph such that for every . The construction is essentially , except that we must redirect a few edges to ensure that the graph is regular. Using this expander graph , we can construct an INW generator whose output is always rejected by . In contrast, under the uniform distribution.
Finally, let us briefly discuss the proof of Theorem 10 (a case where performs poorly, but performs well when is slightly smaller than ). We use Cayley graphs to construct an generator that has many -bit substrings of the form
where are small-bias generators, and, crucially, we ensure that and disagree somewhere in their last bits.
Our distinguisher begins by canceling out the ’s to compute the sums and . Next, the distinguisher inverts these sum-of-small-bias generators to compute the underlying seeds . (We use a probabilistic argument to show that there exist small-bias generators for which this inversion procedure is possible.) Finally, the distinguisher rejects if the last bits of agree with the last bits of , and otherwise it accepts.
By construction, the distinguisher accepts every output of our generator. In contrast, we show that it has low acceptance probability under any generator, where is just a little smaller than . The proof is based on two ideas.
-
In later rounds of the INW recursion, we can use standard techniques based on “communication bottlenecks” to argue that the expander graph in the INW construction does not introduce much error. In particular, after processing and , the distinguisher only needs to remember the last bits of the computed seed . As a result, the acceptance probability is close to what it would be if we used independent seeds instead of correlated seeds in these later rounds of the INW construction.
-
Our remaining task is to bound our distinguisher’s acceptance probability under a concatenation of many independent generators, each of which outputs bits. We are not able to say anything about the distribution of the distinguisher’s computed seed. However, simply because they are independent and identically distributed, there is a noticeable chance that the distinguisher’s computed and seeds happen to agree in their last bits. By doing independent trials, we ensure that the overall acceptance probability is low.
The proofs of Theorems 9 and 10 are omitted from this extended abstract, but they can be found in the full version of this paper [20].
1.8 Additional related work
Assadi and N established a general XOR lemma for streaming algorithms [3] (see also work by Lee, Pyne, and Vadhan [30]). However, their XOR lemma does not imply anything about , because they focus on the scenario in which the streaming algorithm sees instances of a problem in sequence, one after another, instead of seeing the bitwise XOR of the instances.
Several prior works have proved limitations on the power of sums of small-bias distributions to fool various types of tests [6, 33, 36, 4, 31]. Our negative result about using to fool ROBPs (Theorem 8) is in a similar spirit, and indeed the proof builds on Lee and Viola’s work [31] as mentioned previously.
2 Preliminaries
2.1 Read-once evaluation programs (ROEPs)
Ultimately, the model of computation we are interested in is the standard-order ROBP model (Definition 2). At intermediate stages of our argument, we will use a slight generalization of the ROBP model called the “read-once evaluation program” (ROEP) model, introduced by Braveman, Rao, Raz, and Yehudayoff [8]. An ROEP is simply an ROBP with fractional output values:
Definition 11 (Standard-order ROEP [8]).
A width- length- standard-order read-once evaluation program (ROEP) is defined just like a width- length- standard-order ROBP (Definition 2), except that the output values are permitted to be any values in . Thus, the program computes a function . We say that a distribution over fools with error if .
2.2 Graphs
For any graph , we use to denote the vertex set of . As discussed in the introduction, we use the notation to denote the -th neighbor of the vertex in the graph . This is well-defined provided that is a labeled graph, defined as follows.
Definition 12 (Graph labeling).
Let be a -regular directed multigraph. We say that is labeled if for every vertex , the outgoing edges are labeled . In this case, we write to denote the vertex reached from by traversing the outgoing edge labeled . If is a -regular undirected multigraph, then we identify with the symmetric digraph obtained by replacing each undirected edge with two directed edges: and . If we say that is “labeled,” we allow the two edges and to have distinct labels.
We write to denote the complete graph on vertices without self-loops, and we write to denote the complete graph on vertices with self-loops. We write or if the number of vertices is clear from context. Several occurrences of “” in a single equation might represent complete graphs on several different numbers of vertices.
If is a -regular undirected multigraph on vertices, its transition probability matrix is the matrix defined by letting , where denotes the number of edges from to . We often abuse notation by identifying a graph with its transition probability matrix. For example, we use to denote the matrix in which every entry is equal to .
2.3 Spectral expansion
For a matrix , we use the notation to denote the operator norm of , i.e.,
Definition 13 (Expansion parameter).
Let be a regular undirected multigraph. The expansion parameter is defined as
Equivalently, one can define to be the second-largest eigenvalue of in absolute value.
For example, . The complete graph without self-loops also has quite a good expansion parameter:
Fact 14 (Expansion parameter of the complete graph without self-loops).
For every , we have .
Proof sketch.
The following vectors are linearly independent eigenvectors of :
-
The all-ones vector, which has eigenvalue ;
-
Vectors of the form , each of which has eigenvalue .
Cayley graphs are a more interesting class of expanders. The general definition is as follows.
Definition 15 (Cayley graph).
Let be a group, let be a finite set, and let be a function. The Cayley graph is a labeled -regular directed multigraph on the vertex set defined by
| (2) |
where is the group operation.
We will only use this definition in the special case that , so Equation 2 becomes
It is well-known that if is a small-bias generator, then is an expander. We include the proof for completeness’ sake.
Lemma 16 (Expanders from small-bias generators).
Let and let be a -biased generator. Then .
Proof.
Let be the transition probability matrix of . Then
where if and otherwise.
The eigenvectors of are the character functions (viewed as vectors indexed by ). Indeed,
because the only for which is nonzero is . Hence is an eigenvector of with eigenvalue , and by linearity is an eigenvector of with eigenvalue
Then we have all eigenvalues of . When , one finds , and so
Since is an -biased generator,
2.4 Lower bound on the degree of expander graphs
To prove our seed length lower bounds, we rely on the following standard fact.
Proposition 17 (Expander graph degree lower bound).
Let be an undirected -regular graph on vertices. Then
In particular, , and if , then .
A proof of Proposition 17 can be found in the full version of this paper [20].
2.5 Tensor products
Definition 18 (Tensor product of graphs).
Given a pair of labeled graphs on , vertices with degrees , respectively, define the tensor product to be the -regular graph on vertices with neighbor relation
Proposition 19 (Spectral expansion of a tensor product).
Let be undirected regular graphs. Then
We also use the notation to denote the tensor product of matrices, aka the Kronecker product.
Fact 20 (Operator norm of tensor product).
For any two matrices , we have
2.6 Expander mixing lemma
We will use the following weak version of the famous “expander mixing lemma.”
Lemma 21 (Expander mixing lemma).
Let be a regular undirected multigraph. Let . Sample a uniform random vertex , then sample a uniform random neighbor of . Then
For a proof, see, e.g., Vadhan’s pseudorandomness survey [47].
2.7 INW generators
We now present a more precise definition of the INW generator, in case the informal definition in the introduction was not sufficiently clear.
Definition 22 (Permissible families of graphs).
Let be a power of two, let , let be a labeled -regular undirected multigraph for every , and let . We say that is permissible if and for every , where denotes the vertex set of .
More generally, suppose is a matrix of labeled regular undirected multigraphs:
We say that is permissible if each row is permissible.
Definition 23 (INW generators).
Let be a permissible family of labeled regular undirected multigraphs. We define recursively by the formulas
More generally, let be a matrix of labeled regular undirected multigraphs, say
and assume that is permissible. We define by the formula
where are the rows of .
For a vector , we define
When is clear from context, we use as a shorthand for the case that for every . Similarly, for a matrix , we define
When is clear from context, we use as a shorthand for the case that for every .
2.8 Binary linear code
In this section we briefly review the basic concepts of the coding theory.
Definition 24 (Binary Linear Code).
A binary linear code of block length is a subspace of , where is the field with two elements. The minimum distance of is the smallest Hamming weight among all nonzero codewords in .
Definition 25 (Binary Entropy Function).
For , the binary entropy function is defined as
with the convention that .
Theorem 26 (GV bound for binary linear codes).
For every such that , there exists a binary linear code of block length with minimum distance and dimension at least .
Corollary 27.
For every , there is a subspace of dimension at most such that the uniform distribution over is -wise uniform distribution, which means every bits of this distribution are uniform over .
The proofs of Theorem 26 and Corollary 27 can be found in the full version of this paper [20].
3 Proof that sums of INW generators fool constant-width ROBPs
In this section, we present the proof of Theorem 7, which says that fools width- programs with error . The proof is based on the notion of a robust PRG. Roughly speaking, a robust PRG is a multi-seed PRG that still works even if some seeds are fixed to arbitrary values, with an error bound that depends on the number of random seeds. The precise definition is as follows.
Definition 28 (Robust PRG).
Let be finite sets, let , let , let , and let . We say that robustly -fools if the following holds. For every and every , if we sample uniformly at random, then
For example, if and , then robustly -fools every function . This example will serve as the base case of our analysis of . The inductive step will be based on the following lemma, which shows how to double the output length of a robust PRG fooling ROEPs.
Lemma 29 (Inductive step in the analysis of ).
Let where is even. Let be finite sets. Let . Let and , and assume that robustly -fools all width- length- standard-order ROEPs. For each , let be a -regular multigraph on the vertex set . Let . Define by the formula
Then robustly -fools all width- length- standard-order ROEPs.
Proof.
Let be a width- length- standard-order ROEP. Fix any set . For every , let be arbitrary fixed values. We also write and for every . Meanwhile, for every , sample and independently and uniformly at random, and let . Let and . Our goal is to show that fools with error .
For each vertex in the middle layer of , define by letting indicate whether reaches when it reads . Furthermore, define by letting be the label of the vertex reached in the final layer if we start at and read . Let and . Then for any , we have
The second sum above is computable by a width- standard-order ROEP that ignores the second half of its input. By assumption, fools with error .
Now consider a single term in the first sum, . Under the uniform distribution, we have
Now we analyze the expectation under the pseudorandom distribution . We begin by writing the expectation as a sum. For convenience, for any set , let us use the notation to denote the Cartesian product . Furthermore, let us identify the graph with its transition probability matrix. Then we have
where the notation denotes the vector , and similarly . Next, we use the decomposition , where has in every entry and is some matrix with operator norm . Applying this decomposition entrywise, we get
where the outer sum is over all partitions of into two disjoint sets, and . The product is exactly the entry in the tensor product matrix . Meanwhile, the expectation
splits as a product of expectations. Thus, we get
We can think of the first expectation, , as a single entry in a long vector . Similarly, we think of the second expectation, , as a single entry in a long vector . In this way, the inner sum above becomes a vector-matrix-vector product:
The function is -valued, so . Meanwhile, for any fixing of , the entry is precisely the error when we sample uniformly at random and try to use to fool , a width- length- standard-order ROEP. By assumption, . Therefore,
Consequently, summing up all the errors, we get
Proof of Theorem 7.
Let be any PRG in the family . We will prove by induction on that robustly -fools width- length- standard-order ROEPs, where and . For the base case, if , then there is exactly one PRG in the family , namely is given by . This PRG indeed robustly -fools all functions . Now, for the inductive step, suppose . By definition of , the PRG has the form , where for every . By definition of , the seed is a pair , and the generator has the form
for some and some -spectral expander . Define a PRG by the rule
Then , where consists of all but the last column of . By induction, robustly -fools width- length- standard-order ROEPs, where . Working through the definitions, we see that the PRG can be written as
Applying Lemma 29 completes the inductive step.
Finally, since robustly -fools width- length- standard-order ROEPs, it follows that fools width- length- standard-order ROBPs with error , where
4 Seed length lower bound for fooling ROBPs
In this section, we prove Theorem 8, which states that no matter how many (or how few) copies of the INW generator we XOR together, and regardless of how we set the expansion parameters, if the resulting PRG fools width-3 programs, then the seed length is inevitably .
4.1 Sums of small-bias distributions
We begin by analyzing a family of a small-bias distributions introduced by Lee and Viola [31]. This construction guarantees that summing independent samples from these distributions does not substantially increase the overall number of distinct strings.
Definition 30 (Sum of sets).
For ,
Lemma 31 (Small-bias distributions with a small sum set).
For every and every such that , there exist distributions over such that is -biased for every , and
Furthermore, the probability mass function of each only takes on rational values.
Proof.
For each , we construct by taking the bitwise XOR , where is distributed uniformly over which is -wise uniform constructed by Corollary 27, and is an independent “noise vector” constructed as follows. Repeat the following process times independently, where : choose a position uniformly at random from , and set it to a uniform bit. The remaining bits of are zero. Note that is uniform over a subspace of and the probability of getting a particular noise vector is a multiple of , which is a rational number.
First we prove that each is -biased. For any character function with , since and are independent and is -wise uniform, is perfectly fooled by . Next, consider any character function , where . In this case, the bias is nonzero only if none of the elements in are selected by the random noise . So the bias is at most
Thus, we have shown that each is -biased.
By the closure property of linear subspaces,
The set is precisely the set of all binary strings within Hamming distance at most from . Therefore,
Remark 32 (The benefit of noisy codewords).
In the proof of Lemma 31, we use small-bias distributions based on noisy codewords [31]. A more straightforward approach for minimizing would be to simply make as small as possible and then use the trivial bound
This approach is too weak to prove Lemma 31. Indeed, every small-bias distribution satisfies [1], so we inevitably have , so the bound is trivial when . In contrast, Lemma 31 is meaningful even when .
4.2 Constructing an generator that does not fool ROBPs
Recall that the seed length of is . Our goal is to show that if every PRG in fools width- programs, then every PRG in has seed length . Indeed, we will show that for each PRG in , the seed length grows by in each of of the rounds of the INW recursion. The lemma below makes this precise, formulated in the contrapositive.
Lemma 33 (One-round seed length lower bound for fooling width-3 programs).
Let be a sufficiently large power of two, let , let , and let . Assume that there exists a permissible family of labeled regular undirected multigraphs such that for every and Then there exists another permissible family of labeled regular undirected multigraphs such that for every , along with a length-, width-, standard-order ROBP such that but for every seed .
Proof.
We first partition based on whether . Let be the indices such that and let , which means for all , by Proposition 17. Without loss of generality, we assume that and . Note that if for some , then .
Let be a power of two satisfying , and let . Now we can construct a new family of graphs . For indices , we use Lemma 31 to construct a family of distributions over such that each is -biased. By Proposition 17, we know that for any graph such that , we have . Thus,
where we used the fact that if , then . Let , where is some generator such that . (Such a generator exists, because all probabilities under are rational numbers.) This graph satisfies by Lemma 16, and each vertex in has distinct neighbors. Let and , and we define
Recall that denote the rows of . For each , let
that is, for all indices , is the complete graph of appropriate size, and in -th index, we use our constructed before.
For each , let
i.e. the graphs up to are exactly same as the corresponding graphs in , and after , we use the complete graphs of appropriate size. By combining and accordingly, we get a new family graphs . Since is a family of graphs that satisfy the constraint , so is .
By the definition of ,
where and are the substrings of of appropriate length, and each as a generator in , so that , , is defined recursively. By recursively expanding these generators until the -th round, where we can express the output of as independent copies, as are complete graphs for and , of the following form
as is the identity function for , where are the corresponding input strings.
Let be the set of all possible where we allow to range over all vertices and we allow to range over all edge labels, and let , which is the set of first bits of strings in . In the following, we are going to show that , hence there is at least one such that . Our approach is to bound
We will bound and separately.
For each , let be the first bits of , and to be the substring of after , so that . For , since , we have where and . Thus, for , we have
By our construction of , for any choice of , we have , and
Therefore, by Lemma 31, we have
For , we have
For , and is a vertex label in ,
We know that . By Proposition 17, for any undirected graph with degree , we know , so that for any , , which means Therefore,
By the bounds above, the number of possible choices for is at most
Therefore, there is at least one such that .
Encoding this missing element to a width- branching program computing the function as
we know that for any input seed . However, for a truly random input satisfies each clause with probability , and since there are such clauses, the acceptance probability is
We can then prove Theorem 8.
Theorem 34 (Restatement of Theorem 8).
Let be a power of two, let , and let . If every PRG in the family fools width- standard-order ROBPs with error , then every PRG in the family has seed length .
Proof.
For every , Lemma 33 implies that for every PRG in the family and for each ,
Consequently, the overall seed length is at least
5 Directions for future research
It would be very interesting to prove a general “XOR lemma” saying that taking the bitwise XOR of many copies of a distribution amplifies its unpredictability for bounded-width ROBPs. Proving such a general lemma might be the key to analyzing derandomized sums of INW generators.
There is a well-known variant of the INW generator in which we use an extractor to recycle the seed at each stage instead of using an expander, i.e., the recursive step is . This construction and its analysis are similar to the Nisan-Zuckerman PRG [39]. Intriguingly, it is not clear how to carry out the proof of Theorem 7 using extractors instead of expanders. Conceivably, an extractor-based proof might be more amenable to derandomization.
We would also like to highlight the problem of determining the optimal dependence on in Theorem 7. Can the term be improved to ?
References
- [1] Noga Alon, Oded Goldreich, Johan Håstad, and René Peralta. Simple constructions of almost -wise independent random variables. Random Structures Algorithms, 3(3):289–304, 1992. doi:10.1002/rsa.3240030308.
- [2] Roy Armoni. On the derandomization of space-bounded computations. In Proceedings of the 2nd Workshop on Randomization and Approximation Techniques in Computer Science (RANDOM), pages 47–59, 1998. doi:10.1007/3-540-49543-6_5.
- [3] Sepehr Assadi and Vishvajeet N. Graph streaming lower bounds for parameter estimation and property testing via a streaming XOR lemma. In Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing (STOC), pages 612–625, 2021. doi:10.1145/3406325.3451110.
- [4] Andrej Bogdanov, Zeev Dvir, Elad Verbin, and Amir Yehudayoff. Pseudorandomness for width-2 branching programs. Theory Comput., 9:283–292, 2013. doi:10.4086/toc.2013.v009a007.
- [5] Andrej Bogdanov, William M. Hoza, Gautam Prakriya, and Edward Pyne. Hitting Sets for Regular Branching Programs. In Proceedings of the 37th Computational Complexity Conference (CCC), pages 3:1–3:22, 2022. doi:10.4230/LIPIcs.CCC.2022.3.
- [6] Andrej Bogdanov and Emanuele Viola. Pseudorandom bits for polynomials. SIAM J. Comput., 39(6):2464–2486, April 2010. doi:10.1137/070712109.
- [7] Mark Braverman, Gil Cohen, and Sumegha Garg. Pseudorandom pseudo-distributions with near-optimal error for read-once branching programs. SIAM J. Comput., 49(5):STOC18–242–STOC18–299, 2020. doi:10.1137/18M1197734.
- [8] Mark Braverman, Anup Rao, Ran Raz, and Amir Yehudayoff. Pseudorandom generators for regular branching programs. SIAM J. Comput., 43(3):973–986, 2014. doi:10.1137/120875673.
- [9] Joshua Brody and Elad Verbin. The coin problem and pseudorandomness for branching programs. In 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, pages 30–39, 2010. doi:10.1109/FOCS.2010.10.
- [10] Eshan Chattopadhyay and Jyun-Jie Liao. Recursive Error Reduction for Regular Branching Programs. In 15th Innovations in Theoretical Computer Science Conference (ITCS), pages 29:1–29:20, 2024. doi:10.4230/LIPIcs.ITCS.2024.29.
- [11] Lijie Chen, William M. Hoza, Xin Lyu, Avishay Tal, and Hongxun Wu. Weighted pseudorandom generators via inverse analysis of random walks and shortcutting. In Proceedings of the 64th Annual Symposium on Foundations of Computer Science (FOCS), pages 1224–1239, 2023. doi:10.1109/FOCS57990.2023.00072.
- [12] Lijie Chen and Xin Lyu. Inverse-exponential correlation bounds and extremely rigid matrices from a new derandomized XOR lemma. In Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing (STOC), pages 761–771, 2021. doi:10.1145/3406325.3451132.
- [13] Kuan Cheng and Ruiyang Wu. Weighted pseudorandom generators for read-once branching programs via weighted pseudorandom reductions, 2025. doi:10.48550/arXiv.2502.08272.
- [14] Gil Cohen, Dean Doron, Oren Renard, Ori Sberlo, and Amnon Ta-Shma. Error Reduction for Weighted PRGs Against Read Once Branching Programs. In Proceedings of the 36th Computational Complexity Conference (CCC), pages 22:1–22:17, 2021. doi:10.4230/LIPIcs.CCC.2021.22.
- [15] Anindya De. Pseudorandomness for permutation and regular branching programs. In Proceedings of the 2011 IEEE 26th Annual Conference on Computational Complexity, CCC ’11, pages 221–231, USA, 2011. IEEE Computer Society. doi:10.1109/CCC.2011.23.
- [16] Bill Fefferman, Ronen Shaltiel, Christopher Umans, and Emanuele Viola. On beating the hybrid argument. Theory Comput., 9:809–843, 2013. doi:10.4086/toc.2013.v009a026.
- [17] Michael A. Forbes and Zander Kelley. Pseudorandom generators for read-once branching programs, in any order. In Proceedings of the 59th Annual IEEE Symposium on Foundations of Computer Science (FOCS), pages 946–955, 2018. doi:10.1109/FOCS.2018.00093.
- [18] Anat Ganor and Ran Raz. Space Pseudorandom Generators by Communication Complexity Lower Bounds. In Klaus Jansen, José Rolim, Nikhil R. Devanur, and Cristopher Moore, editors, Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (APPROX/RANDOM 2014), volume 28 of Leibniz International Proceedings in Informatics (LIPIcs), pages 692–703, Dagstuhl, Germany, 2014. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.APPROX-RANDOM.2014.692.
- [19] Pooya Hatami and William Hoza. Paradigms for unconditional pseudorandom generators. Found. Trends Theor. Comput. Sci., 16(1-2):1–210, 2024. doi:10.1561/0400000109.
- [20] William Hoza and Zelin Lv. On sums of inw pseudorandom generators. ECCC preprint TR25-050, 2025. URL: https://eccc.weizmann.ac.il/report/2025/050/.
- [21] William M. Hoza. Better Pseudodistributions and Derandomization for Space-Bounded Computation. In Proceedings of the 25th International Conference on Randomization and Computation (RANDOM), pages 28:1–28:23, 2021. doi:10.4230/LIPIcs.APPROX/RANDOM.2021.28.
- [22] William M. Hoza, Edward Pyne, and Salil Vadhan. Pseudorandom Generators for Unbounded-Width Permutation Branching Programs. In 12th Innovations in Theoretical Computer Science Conference (ITCS), pages 7:1–7:20, 2021. doi:10.4230/LIPIcs.ITCS.2021.7.
- [23] William M. Hoza, Edward Pyne, and Salil Vadhan. Limitations of the Impagliazzo-Nisan-Wigderson pseudorandom generator against permutation branching programs. Algorithmica, 2024, 2024. URL: https://link.springer.com/article/10.1007/s00453-024-01251-2.
- [24] William M. Hoza and David Zuckerman. Simple optimal hitting sets for small-success . SIAM J. Comput., 49(4):811–820, 2020. doi:10.1137/19M1268707.
- [25] Russell Impagliazzo. Hard-core distributions for somewhat hard problems. In Proceedings of the 36th Annual Symposium on Foundations of Computer Science (FOCS), pages 538–545, 1995. doi:10.1109/SFCS.1995.492584.
- [26] Russell Impagliazzo, Noam Nisan, and Avi Wigderson. Pseudorandomness for network algorithms. In Proceedings of the 26th Annual Symposium on Theory of Computing (STOC), pages 356–364, 1994. doi:10.1145/195058.195190.
- [27] Russell Impagliazzo and Avi Wigderson. P = BPP if E requires exponential circuits: derandomizing the XOR lemma. In Proceedings of the 29th Annual ACM Symposium on Theory of Computing (STOC), pages 220–229, 1997. doi:10.1145/258533.258590.
- [28] Michal Koucký, Prajakta Nimbhorkar, and Pavel Pudlák. Pseudorandom generators for group products: extended abstract. In Proceedings of the Forty-Third Annual ACM Symposium on Theory of Computing, STOC ’11, pages 263–272, New York, NY, USA, 2011. Association for Computing Machinery. doi:10.1145/1993636.1993672.
- [29] Vinayak M. Kumar. New Pseudorandom Generators and Correlation Bounds Using Extractors. In Proceedings of the 16th Innovations in Theoretical Computer Science Conference (ITCS), volume 325, pages 68:1–68:23, 2025. doi:10.4230/LIPIcs.ITCS.2025.68.
- [30] Chin Ho Lee, Edward Pyne, and Salil Vadhan. On the Power of Regular and Permutation Branching Programs. In Proceedings of the 27th International Conference on Randomization and Computation (RANDOM), pages 44:1–44:22, 2023. doi:10.4230/LIPIcs.APPROX/RANDOM.2023.44.
- [31] Chin Ho Lee and Emanuele Viola. Some limitations of the sum of small-bias distributions. Theory of Computing, 13(16):1–23, 2017. doi:10.4086/toc.2017.v013a016.
- [32] Shachar Lovett. Unconditional pseudorandom generators for low-degree polynomials. Theory of Computing, 5(3):69–82, 2009. doi:10.4086/toc.2009.v005a003.
- [33] Shachar Lovett and Yoav Tzur. Explicit lower bound for fooling polynomials by the sum of small-bias generators. ECCC preprint TR09-088, 2009. URL: https://eccc.weizmann.ac.il/report/2009/088/.
- [34] Ueli Maurer and Stefano Tessaro. Computational indistinguishability amplification: tight product theorems for system composition. In Proceedings of the 29th International Cryptology Conference (CRYPTO), pages 355–373, 2009. doi:10.1007/978-3-642-03356-8_21.
- [35] Raghu Meka, Omer Reingold, and Avishay Tal. Pseudorandom generators for width-3 branching programs. In Proceedings of the 51st Annual Symposium on Theory of Computing (STOC), pages 626–637, 2019. doi:10.1145/3313276.3316319.
- [36] Raghu Meka and David Zuckerman. Small-bias spaces for group products. In Proceedings of the 13th International Workshop on Randomization and Computation (RANDOM), pages 658–672, 2009. doi:10.1007/978-3-642-03685-9_49.
- [37] Joseph Naor and Moni Naor. Small-bias probability spaces: efficient constructions and applications. SIAM J. Comput., 22(4):838–856, 1993. doi:10.1137/0222053.
- [38] Noam Nisan. Pseudorandom generators for space-bounded computation. Combinatorica, 12(4):449–461, 1992. doi:10.1007/BF01305237.
- [39] Noam Nisan and David Zuckerman. Randomness is linear in space. J. Comput. System Sci., 52(1):43–52, 1996. doi:10.1006/jcss.1996.0004.
- [40] Edward Pyne and Salil Vadhan. Pseudodistributions That Beat All Pseudorandom Generators (Extended Abstract). In Proceedings of the 36th Computational Complexity Conference (CCC), pages 33:1–33:15, 2021. doi:10.4230/LIPIcs.CCC.2021.33.
- [41] Ran Raz and Omer Reingold. On recycling the randomness of states in space bounded computation. In The 31st Annual ACM Symposium on Theory of Computing (STOC), pages 159–168, 1999. doi:10.1145/301250.301294.
- [42] Omer Reingold. Undirected connectivity in log-space. J. ACM, 55(4):Art. 17, 24, 2008. doi:10.1145/1391289.1391291.
- [43] Eyal Rozenman and Salil Vadhan. Derandomized squaring of graphs. In Proceedings of the 9th International Workshop on Randomization and Computation (RANDOM), pages 436–447, 2005. doi:10.1007/11538462_37.
- [44] Michael Saks and David Zuckerman, 1995. Unpublished.
- [45] Thomas Steinke. Pseudorandomness for permutation branching programs without the group theory. ECCC preprint TR12-083, 2012. URL: https://eccc.weizmann.ac.il/report/2012/083/.
- [46] Yoav Tzur. Notions of weak pseudorandomness and -polynomials. M.Sc. thesis, Weizmann Institute of Science, 2009. URL: https://eccc.weizmann.ac.il/static/books/Notions_of_Weak_Pseudorandomness/.
- [47] Salil P. Vadhan. Pseudorandomness. Foundations and Trends in Theoretical Computer Science, 7(1–3):1–336, 2012. doi:10.1561/0400000010.
- [48] Emanuele Viola. The sum of small-bias generators fools polynomials of degree . Comput. Complexity, 18(2):209–217, 2009. doi:10.1007/s00037-009-0273-5.
