Pseudorandomness: New Results and Applications Emanuele Viola IAS April 2007.

Slides:



Advertisements
Similar presentations
Quantum t-designs: t-wise independence in the quantum world Andris Ambainis, Joseph Emerson IQC, University of Waterloo.
Advertisements

Hardness of Reconstructing Multivariate Polynomials. Parikshit Gopalan U. Washington Parikshit Gopalan U. Washington Subhash Khot NYU/Gatech Rishi Saket.
On the Complexity of Parallel Hardness Amplification for One-Way Functions Chi-Jen Lu Academia Sinica, Taiwan.
PRG for Low Degree Polynomials from AG-Codes Gil Cohen Joint work with Amnon Ta-Shma.
Linear-Degree Extractors and the Inapproximability of Max Clique and Chromatic Number David Zuckerman University of Texas at Austin.
Extracting Randomness From Few Independent Sources Boaz Barak, IAS Russell Impagliazzo, UCSD Avi Wigderson, IAS.
Approximate List- Decoding and Hardness Amplification Valentine Kabanets (SFU) joint work with Russell Impagliazzo and Ragesh Jaiswal (UCSD)
1 Efficient Pseudorandom Generators from Exponentially Hard One-Way Functions Iftach Haitner, Danny Harnik, Omer Reingold.
Talk for Topics course. Pseudo-Random Generators pseudo-random bits PRG seed Use a short “ seed ” of very few truly random bits to generate a long string.
Simple extractors for all min- entropies and a new pseudo- random generator Ronen Shaltiel Chris Umans.
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
CS151 Complexity Theory Lecture 17 May 27, CS151 Lecture 172 Outline elements of the proof of the PCP Theorem counting problems –#P and its relation.
CS151 Complexity Theory Lecture 8 April 22, 2004.
Simple Affine Extractors using Dimension Expansion. Matt DeVos and Ariel Gabizon.
Hardness amplification proofs require majority Ronen Shaltiel University of Haifa Joint work with Emanuele Viola Columbia University June 2008.
Better Pseudorandom Generators from Milder Pseudorandom Restrictions Raghu Meka (IAS) Parikshit Gopalan, Omer Reingold (MSR-SVC) Luca Trevian (Stanford),
Derandomized parallel repetition theorems for free games Ronen Shaltiel, University of Haifa.
Using Nondeterminism to Amplify Hardness Emanuele Viola Joint work with: Alex Healy and Salil Vadhan Harvard University.
Time vs Randomness a GITCS presentation February 13, 2012.
Yi Wu (CMU) Joint work with Parikshit Gopalan (MSR SVC) Ryan O’Donnell (CMU) David Zuckerman (UT Austin) Pseudorandom Generators for Halfspaces TexPoint.
Derandomization: New Results and Applications Emanuele Viola Harvard University March 2006.
Simple Extractors for All Min-Entropies and a New Pseudo-Random Generator Ronen Shaltiel (Hebrew U) & Chris Umans (MSR) 2001.
ACT1 Slides by Vera Asodi & Tomer Naveh. Updated by : Avi Ben-Aroya & Alon Brook Adapted from Oded Goldreich’s course lecture notes by Sergey Benditkis,
On Uniform Amplification of Hardness in NP Luca Trevisan STOC 05 Paper Review Present by Hai Xu.
Arithmetic Hardness vs. Randomness Valentine Kabanets SFU.
CS151 Complexity Theory Lecture 7 April 20, 2015.
CS151 Complexity Theory Lecture 8 April 22, 2015.
1 Streaming Computation of Combinatorial Objects Ziv Bar-Yossef U.C. Berkeley Omer Reingold AT&T Labs – Research Ronen.
GOING DOWN HILL: MORE EFFICIENT PSEUDORANDOM GENERATORS FROM ANY ONE-WAY FUNCTION Joint with Iftach Haitner and Salil Vadhan Omer Reingold&
CS151 Complexity Theory Lecture 6 April 15, 2004.
1 Constructing Pseudo-Random Permutations with a Prescribed Structure Moni Naor Weizmann Institute Omer Reingold AT&T Research.
Hardness amplification proofs require majority Emanuele Viola Columbia University Work done at Harvard, IAS, and Columbia Joint work with Ronen Shaltiel.
On Everlasting Security in the Hybrid Bounded Storage Model Danny Harnik Moni Naor.
CS151 Complexity Theory Lecture 9 April 27, 2004.
On the Complexity of Approximating the VC Dimension Chris Umans, Microsoft Research joint work with Elchanan Mossel, Microsoft Research June 2001.
1 On the Power of the Randomized Iterate Iftach Haitner, Danny Harnik, Omer Reingold.
GOING DOWN HILL : EFFICIENCY IMPROVEMENTS IN CONSTRUCTING PSEUDORANDOM GENERATORS FROM ONE-WAY FUNCTIONS Iftach Haitner Omer Reingold Salil Vadhan.
Pseudorandomness Emanuele Viola Columbia University April 2008.
Why Extractors? … Extractors, and the closely related “Dispersers”, exhibit some of the most “random-like” properties of explicitly constructed combinatorial.
On Constructing Parallel Pseudorandom Generators from One-Way Functions Emanuele Viola Harvard University June 2005.
Using Nondeterminism to Amplify Hardness Emanuele Viola Joint work with: Alex Healy and Salil Vadhan Harvard University.
Communication vs. Computation S Venkatesh Univ. Victoria Presentation by Piotr Indyk (MIT) Kobbi Nissim Microsoft SVC Prahladh Harsha MIT Joe Kilian NEC.
On approximate majority and probabilistic time Emanuele Viola Institute for advanced study Work done during Ph.D. at Harvard University June 2007.
On Constructing Parallel Pseudorandom Generators from One-Way Functions Emanuele Viola Harvard University June 2005.
Polynomials Emanuele Viola Columbia University work partially done at IAS and Harvard University December 2007.
My Favorite Ten Complexity Theorems of the Past Decade II Lance Fortnow University of Chicago.
Umans Complexity Theory Lectures Lecture 17: Natural Proofs.
Norms, XOR lemmas, and lower bounds for GF(2) polynomials and multiparty protocols Emanuele Viola, IAS (Work partially done during postdoc at Harvard)
CS151 Complexity Theory Lecture 16 May 20, The outer verifier Theorem: NP  PCP[log n, polylog n] Proof (first steps): –define: Polynomial Constraint.
Pseudorandom Bits for Constant-Depth Circuits with Few Arbitrary Symmetric Gates Emanuele Viola Harvard University June 2005.
List Decoding Using the XOR Lemma Luca Trevisan U.C. Berkeley.
Hardness amplification proofs require majority Emanuele Viola Columbia University Work also done at Harvard and IAS Joint work with Ronen Shaltiel University.
Lower Bounds Emanuele Viola Columbia University February 2008.
Pseudo-random generators Talk for Amnon ’ s seminar.
The Power of Negations in Cryptography
Almost SL=L, and Near-Perfect Derandomization Oded Goldreich The Weizmann Institute Avi Wigderson IAS, Princeton Hebrew University.
Umans Complexity Theory Lectures Lecture 9b: Pseudo-Random Generators (PRGs) for BPP: - Hardness vs. randomness - Nisan-Wigderson (NW) Pseudo- Random Generator.
Pseudo-randomness. Randomized complexity classes model: probabilistic Turing Machine –deterministic TM with additional read-only tape containing “coin.
Complexity Theory and Explicit Constructions of Ramsey Graphs Rahul Santhanam University of Edinburgh.
B504/I538: Introduction to Cryptography
Circuit Lower Bounds A combinatorial approach to P vs NP
Pseudorandomness when the odds are against you
Pseudorandom bits for polynomials
Pseudo-derandomizing learning and approximation
Cryptography Lecture 12 Arpita Patra © Arpita Patra.
Indistinguishability by adaptive procedures with advice, and lower bounds on hardness amplification proofs Aryeh Grinberg, U. Haifa Ronen.
Emanuele Viola Harvard University June 2005
Emanuele Viola Harvard University October 2005
Pseudorandomness: New Results and Applications
Presentation transcript:

Pseudorandomness: New Results and Applications Emanuele Viola IAS April 2007

Useful throughout Computer Science –Algorithms –Cryptography –Complexity Theory Question: Is “true” randomness necessary? Randomness in Computation InputOutput (error probability 1%)

Goal: low-entropy distributions that ``look random’’ Why study pseudorandomness? Basis for most cryptography [S 49] Algorithmic breakthroughs: Connectivity in logarithmic space [R 04] Primality in polynomial time [AKS 02] Pseudorandomness

Poly(n)-time Computable Stretch s(n) ¸ 1 (e.g., s(n) = 1, s(n) = n 2 ) Output ``looks random’’ Pseudorandom Generator (PRG) [BM,Y] PRG

Outline Overview of pseudorandomness Cryptographic pseudorandom generators –Complexity vs. stretch Specialized pseudorandom generators –Constant-depth, with application to NP –Polynomials

“Looks random”: 8 efficient adversary A : {0,1} n+s(n) ! {0,1} Pr U [A(U) = 1] ¼ Pr X [A(PRG(X)) = 1] Cryptography: sym. encryption(m) := m © G(X) [S49] need big stretch s >> n PRG, One-Way Functions (OWF) [BM,Y,GL,…,HILL] –OWF: easy to compute but hard to invert Cryptographic PRG PRG

STEP 1: OWF f ) G f : {0,1} n ! {0,1} n+1 –Think e.g. f : {0,1} n a ! {0,1} n b STEP 2: G f ) PRG with stretch s(n) = poly(n) [GM] Stretch s ) s adaptive queries to f ) circuit depth ¸ s Question [this work]: stretch s vs. adaptivity & depth? E.g., can have s = n, circuit depth O(log n)? Standard Constructions w/ big stretch GfGf Input X GfGf GfGf GfGf GfGf GfGf Output …

Previous Results [AIK] Log-depth OWF/PRG ) O(1)-depth PRG (!!!) However, any stretch ) stretch s = 1 [GT] s vs. number q of queries to OWF (Thm: q ¸ s) [This work] s vs. adaptivity & circuit depth [ …,IN,NR] O(1)-depth PRG from specific assumptions [This work] general assumptions

Parallel PRG G f : {0,1} n ! {0,1} n+s(n) from OWF f Our Model of PRG construction Input X, |X| = n f ÆÆÆÆÆÆÆÆ Ç ÇÇÇÇÇ ÆÆÆÆÆÆÆÆ ff Constant Depth Circuit Output, n+s(n) bits f q 1 q 2 q 3 q 4 Nonadaptive Queries to f

Our Results on PRG Constructions Theorem [V] Parallel G f : {0,1} n ! {0,1} n+s(n) from OWF ( e.g. f : {0,1} n a ! {0,1} n b ) must have: Proof idea (f = permutation , s = 1) [GL] G f (x,r) :=  (x),r, ( :=  i x i r i ) Problem: can’t compute in constant-depth [GNR] Solution: don’t have to! G f (x,r) :=  (x),r’, f arbitraryf one-to-onef permutation Neg.s(n) · o(n) ? Pos.?s(n) ¸ 1

Outline Overview of pseudorandomness Cryptographic pseudorandom generators –Complexity vs. stretch Specialized pseudorandom generators –Constant-depth, with application to NP –Polynomials

“looks random”: 8 restricted A : {0,1} n+s(n) ! {0,1} Pr U [A(U) = 1] ¼ Pr X [A(PRG(X)) = 1] Sometimes known unconditionally! Specialized PRG PRG

PRG for Constant-Depth Circuits Constant-depth circuit: Theorem [N ‘91]: PRG with stretch s(n) = 2 n  (1) output looks random to constant-depth circuits Input Depth VVVVVVVV ÆÆÆÆÆÆ V

Application: Avg-Case Hardness of NP Study hardness of NP on random instances –Natural question, essential for cryptography Currently cannot relate to P  NP [FF,BT,V] Hardness amplification Definition: f : {0,1} n ! {0,1} is  -hard if 8 efficient algorithm M : Pr x [M(x)  f(x)] ¸ 1/2 -   Hardness Amplification f 0.1-hard f ’  -hard

Previous Results Yao’s XOR Lemma: f 0 (x 1,…, x n ) := f(x 1 ) ©  © f(x n ) f 0 ¼ 2 -n -hard, almost optimal Cannot use XOR in NP: f 2 NP ; f 0 2 NP Idea: f´(x 1,…, x n ) = C( f(x 1 ),…, f(x n ) ), C monotone –e.g. f(x 1 ) Æ ( f(x 2 ) Ç f(x 3 ) ). f 2 NP ) f 0 2 NP Theorem [O’D]: There is C s.t. f 0 ¼ (1/n)-hard Barrier: No monotone C can do better!

Theorem [HVV]: Amplification in NP up to ¼ 2 -n –Matches the XOR Lemma Technique: Pseudorandomness! Intuitively, f´ := C( f(x 1 ),…, f(x n ), … … f(x 2 n ) ) f´ (1/2 n )-hard by previous result Problem: Input length = 2 n Note C is constant-depth Use PRG: input length ! n, keep hardness Our Result on Hardness Amplification C f(x 1 ),…, f(x n ), … … f(x 2 n ) f ’

Previous Results Recall Theorem [N]: PRG with stretch s(n) = 2 n  (1) But constant-depth circuits are weak: –Cannot compute Majority(x 1,…,x n ) :=  i x i > n/2 ? Theorem [LVW]: PRG with stretch s(n) = n log n PRG’s for incomparable classes ÆÆÆÆÆÆ Maj VVVVVVVV ÆÆÆÆÆÆ V

Constant-depth circuits with few Majority gates Theorem [V] : PRG with s(n) = n log n Improves on [LVW]; worse stretch than [N] Richest class for which PRG is known Techniques: Communication complexity + switching lemma [BNS,HG,H,HM,CH] Our New PRG ÆÆÆÆÆÆ ÇÇÇÇ Maj Input

Outline Overview of pseudorandomness Cryptographic pseudorandom generators –Complexity vs. stretch Specialized pseudorandom generators –Constant-depth, with application to NP –Polynomials

Field F 2 = GF(2) = {0,1} F 2 -polynomial p : F 2 n ! F 2 of degree d E.g., p = x 1 + x 5 + x 7 d = 1 p = x 1 ¢ x 2 + x 3 d = 2 Theorem[NN90]: PRG for d=1 with stretch s(n)=2  (n) –Applications to algorithm design, PCP’s,… F 2 polynomials

Want: explicit f : {0,1} n ! {0,1}  -hard for degree d: 8 p of degree d : Pr[f(x)  p(x)] ¸ ½ -   =  (n,d) small Implies PRG with s=1. G(X) := X f(X) Interesting beyond PRG –Coding theory –d = log n,  = 1/n 10 ) complexity breakthrough Hardness for F 2 polynomials

Previous Results Want: explicit f : {0,1} n ! {0,1}  -hard for degree d: 8 p of degree d : Pr[f(x)  p(x)] ¸ ½ -   =  (n,d) small [Razborov 1987] Majority: (1/n)-hard (d · polylog(n) ) [Babai et al. 1992] Explicit f: exp(-n/d ¢ 2 d )-hard [Bourgain 2005] Mod 3: exp(-n/8 d )-hard –Mod 3 (x 1,…,x n ) := 1 iff 3 |  i x i

Our Results New approach based on ``Gowers uniformity’’ Theorem [V,VW] : Explicit f: exp(-n/2 d )-hard ([BNS] exp(-n/d ¢ 2 d ) ) Mod 3: exp(-n/4 d )-hard ([Bou] exp(-n/8 d )) –Also arguably simpler proof Theorem [BV, unpublished] : PRG with stretch s(n) = 2  (n) for d = 2,3,…(?) –Even for d=2, previous best was s(n) = n log n [LVW]

Gowers uniformity Idea: Measure closeness to degree-d polynomials by checking if d-th derivative vanishes –[G98] combinat., [A+,J+,…] testing Derivative D y p(x) := p(x+y) + p(x) –E.g. D y (x 1 x 2 + x 3 ) = (y 1 +x 1 )(y 2 +x 2 )+(x 3 +y 3 )+x 1 x 2 +x 3 = y 1 x 2 + x 1 y 2 + y 1 y 2 + y 3 –p degree d ) D y p(x) degree d-1 –Iterate: D y,y’ p(x) := D y ( D y’ p(x)) d-th Gowers uniformity of f: U d (f) := E x,y 1,…,y d [e(D y 1,…,y d f(x))](e(X):=(-1) X ) –U d (p) = 1 if p degree d

Main lemma Lemma [Gow,GT]: Hardness of f for degree-d polynomials · U d (f) 1/2 d –Property of f only! Proof sketch: Let p have degree d. Hardness of f for p = | Pr[f(x)  p(x)] -Pr[f(x)  p(x)] | = E X [e(f(x)+p(x))] = U 0 (f+p) · U 1 (f+p) 1/2 · … · U d (f+p) 1/2 d (Cauchy-Schwartz) = U d (f) 1/2 d (d-th derivative of p = 1) Q.E.D.

Establishing hardness Consider f := x 1  x d+1 + x d+2  x 2d+2 +  –not best parameters, but best to illustrate Theorem [V] f is exp(-n/c d )-hard for degree d Proof: Hardness of f · U d (f) 1/2 d (by lemma) = U d (x 1  x d+1 + x d+2  x 2d+2 +  ) 1/2 d = U d (x 1  x d+1 ) n/(d+1)2 d (by property of U) = exp(-n/c d ) (by calculation) Q.E.D.

Pseudorandom generators (PRG’s): powerful tool Cryptographic PRG’s –Tradeoff between stretch and parallel complexity [V] Specialized PRG’s –Application: Hardness Amplification in NP [HVV] –PRG for const.-depth circuits with few Maj gates [V] –PRG for low-degree polynomials over F 2 using Gowers uniformity [V, VW,BV] Conclusion

Thank you!