Simple Affine Extractors using Dimension Expansion. Matt DeVos and Ariel Gabizon.

Slides:



Advertisements
Similar presentations
Quantum t-designs: t-wise independence in the quantum world Andris Ambainis, Joseph Emerson IQC, University of Waterloo.
Advertisements

Quantum Software Copy-Protection Scott Aaronson (MIT) |
Hardness of Reconstructing Multivariate Polynomials. Parikshit Gopalan U. Washington Parikshit Gopalan U. Washington Subhash Khot NYU/Gatech Rishi Saket.
Vector Spaces A set V is called a vector space over a set K denoted V(K) if is an Abelian group, is a field, and For every element vV and K there exists.
Invertible Zero-Error Dispersers and Defective Memory with Stuck-At Errors Ariel Gabizon Ronen Shaltiel.
An Introduction to Randomness Extractors Ronen Shaltiel University of Haifa Daddy, how do computers get random bits?
Linear-Degree Extractors and the Inapproximability of Max Clique and Chromatic Number David Zuckerman University of Texas at Austin.
Extracting Randomness From Few Independent Sources Boaz Barak, IAS Russell Impagliazzo, UCSD Avi Wigderson, IAS.
Hash Tables CS 310 – Professor Roch Weiss Chapter 20 All figures marked with a chapter and section number are copyrighted © 2006 by Pearson Addison-Wesley.
Shortest Vector In A Lattice is NP-Hard to approximate
Approximate List- Decoding and Hardness Amplification Valentine Kabanets (SFU) joint work with Russell Impagliazzo and Ragesh Jaiswal (UCSD)
COMP 553: Algorithmic Game Theory Fall 2014 Yang Cai Lecture 21.
Constraint Satisfaction over a Non-Boolean Domain Approximation Algorithms and Unique Games Hardness Venkatesan Guruswami Prasad Raghavendra University.
Derandomized parallel repetition theorems for free games Ronen Shaltiel, University of Haifa.
Notation Intro. Number Theory Online Cryptography Course Dan Boneh
Theoretical Program Checking Greg Bronevetsky. Background The field of Program Checking is about 13 years old. Pioneered by Manuel Blum, Hal Wasserman,
1 Algorithms for Large Data Sets Ziv Bar-Yossef Lecture 13 June 25, 2006
THE DIMENSION OF A VECTOR SPACE
CS151 Complexity Theory Lecture 6 April 15, 2015.
An Algorithm for Polytope Decomposition and Exact Computation of Multiple Integrals.
1 Algorithms for Large Data Sets Ziv Bar-Yossef Lecture 12 June 18, 2006
Simple Extractors for All Min-Entropies and a New Pseudo-Random Generator Ronen Shaltiel (Hebrew U) & Chris Umans (MSR) 2001.
Arithmetic Hardness vs. Randomness Valentine Kabanets SFU.
Complexity 19-1 Complexity Andrei Bulatov More Probabilistic Algorithms.
EXPANDER GRAPHS Properties & Applications. Things to cover ! Definitions Properties Combinatorial, Spectral properties Constructions “Explicit” constructions.
Correlation Immune Functions and Learning Lisa Hellerstein Polytechnic Institute of NYU Brooklyn, NY Includes joint work with Bernard Rosell (AT&T), Eric.
1. 2 Overview Some basic math Error correcting codes Low degree polynomials Introduction to consistent readers and consistency tests H.W.
CS151 Complexity Theory Lecture 6 April 15, 2004.
Module #1 - Logic 1 Based on Rosen, Discrete Mathematics & Its Applications. Prepared by (c) , Michael P. Frank. Modified By Mingwu Chen Induction.
1 2 Introduction In this lecture we’ll cover: Definition of strings as functions and vice versa Error correcting codes Low degree polynomials Low degree.
On Kernels, Margins, and Low- dimensional Mappings or Kernels versus features Nina Balcan CMU Avrim Blum CMU Santosh Vempala MIT.
Correlation testing for affine invariant properties on Shachar Lovett Institute for Advanced Study Joint with Hamed Hatami (McGill)
Great Theoretical Ideas in Computer Science.
Sub-Constant Error Low Degree Test of Almost-Linear Size Dana Moshkovitz Weizmann Institute Ran Raz Weizmann Institute.
Theory of Computing Lecture 15 MAS 714 Hartmut Klauck.
Chapter 2: Vector spaces
Polynomial Factoring Ramesh Hariharan. The Problem Factoring Polynomials overs Integers Factorization is unique (why?) (x^2 + 5x +6)  (x+2)(x+3) Time:
Why Extractors? … Extractors, and the closely related “Dispersers”, exhibit some of the most “random-like” properties of explicitly constructed combinatorial.
On Constructing Parallel Pseudorandom Generators from One-Way Functions Emanuele Viola Harvard University June 2005.
PRIMES is in P Manindra Agrawal NUS Singapore / IIT Kanpur.
Quantum Computing MAS 725 Hartmut Klauck NTU
Mathematical Induction I Lecture 4: Sep 16. This Lecture Last time we have discussed different proof techniques. This time we will focus on probably the.
Probabilistic verification Mario Szegedy, Rutgers www/cs.rutgers.edu/~szegedy/07540 Lecture 5.
Umans Complexity Theory Lectures Lecture 1a: Problems and Languages.
On Constructing Parallel Pseudorandom Generators from One-Way Functions Emanuele Viola Harvard University June 2005.
1/19 Minimizing weighted completion time with precedence constraints Nikhil Bansal (IBM) Subhash Khot (NYU)
6. Elementary Canonical Forms How to characterize a transformation?
Umans Complexity Theory Lectures Lecture 17: Natural Proofs.
Pseudo-random generators Talk for Amnon ’ s seminar.
4 4.5 © 2016 Pearson Education, Inc. Vector Spaces THE DIMENSION OF A VECTOR SPACE.
Sec Sec Sec 4.4 CHAPTER 4 Vector Spaces Let V be a set of elements with vector addition and multiplication by scalar is a vector space if these.
Pseudorandomness: New Results and Applications Emanuele Viola IAS April 2007.
Complexity Theory and Explicit Constructions of Ramsey Graphs Rahul Santhanam University of Edinburgh.
PROBABILITY AND COMPUTING RANDOMIZED ALGORITHMS AND PROBABILISTIC ANALYSIS CHAPTER 1 IWAMA and ITO Lab. M1 Sakaidani Hikaru 1.
Theory of Computational Complexity Probability and Computing Chapter Hikaru Inada Iwama and Ito lab M1.
Tali Kaufman (Bar-Ilan)
Worst case to Average case Reductions for Polynomials
Pseudorandomness when the odds are against you
Background: Lattices and the Learning-with-Errors problem
Some Rules for Expectation
Pseudo-derandomizing learning and approximation
Linear sketching with parities
RS – Reed Solomon List Decoding.
Locally Decodable Codes from Lifting
The Curve Merger (Dvir & Widgerson, 2008)
Linear sketching over
Linear sketching with parities
Affine Spaces Def: Suppose
Elementary Linear Algebra
CS21 Decidability and Tractability
Presentation transcript:

Simple Affine Extractors using Dimension Expansion. Matt DeVos and Ariel Gabizon

Vague Definition: A pseudorandom object(e.g. graph, function) has some nice property a random object would have with high probability. For example: A graph that has no large cliques or large independent sets. The field of pseudorandomness aims to explicitly construct pseudorandom objects. Pseudorandomness

Efficient Det. Alg. Explicitly constructing pseudorandom objects bad objects Universe of exp(n) objects good object

Why do we want to explicitly construct pseudorandom objects? -Insight into the computational power(lessnes) of randomness -Useful tools in derandomizing algorithms (good example-expanders!) Still, is constructing pseudorandom objects more meaningful than making money, or trying to become famous? Thm: Pseudorandomness is meaningless  Theoretical Computer Science is meaningless

NP machine P  NP by explicitly constructing pseudorandom objects functions with poly-size circuits functions on n bits function in NP without poly-size circuits

The nice property can usually be phrased as avoiding a not too large set of bad events. Example: A function of high circuit complexity avoids the event `being computed by circuit C’ for all small circuits C. Circuits are hard to understand – let’s first work with bad events that are easier to understand. The bad event in this paper – a function that is biased on an affine subspace.

Affine Extractors

Finite field F, with |F|=q (q=p l for prime p) Vector Space F n An affine extractor is a coloring of F n such that any large enough affine subspace is colored in a balanced way For simplicity assume only 2 colors FnFn

Just to make sure.. An affine subspace X µ F n of dim. k Defined by vectors a (1),…,a (k),b 2 F n where a (1),…,a (k) are independent X={  (j=1 to k) t j ¢ a (j) + b|t 1,…,t k 2 F}

Now, more formally.. An affine extractor for dim k, field size q and error ² is a function D:F n  {0,1} such that for any affine subspace X µ F n of dim k |Pr x  X (D(x) =1 ) - ½| · ² (We will omit ² from now on, think of it as 1/100) Intuition: D `extracts’ a random bit for the uniform distribution on X. 1/100

Feeling the parameters.. k-dimension of subspace q- field size k larger  problem easier (need to be unbiased only on larger subspaces) q smaller  problem harder(subspaces have less structure - are closed under scalar multiplication from smaller field) Random function D:F n  {0,1} is w.h.p an affine extractor when q=2 and k = 5 ¢ logn

Previous results and ours: (explicit) G-Raz: Affine Extractor for all k ¸ 1, when q>n 2. Bourgain: Affine Extractor for k= ® ¢ n, for any constant ® >0, and q=2. (exponentially small error) Our result: Affine Extractor for all k ¸ 1, when q=  ((n/k) 2 ) Simple Construction and Proof! However: need char(F)=  (n/k) (have weaker result for arbitrary characteristic)

Warm Up Suppose q>n. How can we get a function f:F n  F that is non-constant on lines? i.e, for every a  0, b 2 F n want g(t), f(a ¢ t + b) = f(a 1 ¢ t + b 1,…,a n ¢ t + b n ) to be a non-constant function

Answer: Take f(x 1,..,x n ) =   i=1 to n) x i i. g(t), f(a ¢ t + b) =   i=1 to n) (a i ¢ t + b i ) i Note: a i  0 for some i. Suppose that a n  0.  g(t) is a non-constant polynomial of degree n. as q>n, this is a non-constant function on F. (from G-Raz)

Quadratic Residue Function: QR:F  {0,1}, QR(a) = 1 $9 b 2 F such that b 2 =a Thm[Weil]: Let F be a field of odd size q. Let g(t) be a non-constant polynomial over F of odd degree d. Choose t 2 F randomly.. QR(g(t)) has bias at most d/q 1/2 works for multivariate g too.. Weil’s Theorem

Subspace X of dim k defined by a (1),…,a (k),b For f:F n  F, define f| X (t 1,..,t k ) = f(  (j=1 to k) t j ¢ a (j) + b ) Using Weil: Poly f(X 1,..,X n ) of degree d such that: f| X  constant for all X of dim k  Affine Extractor for dim k and q » d 2

`trick’: Using this view can multiply vectors x,y 2 (F q ) n - not just add them! Vector Space\Field Duality

Fix 1-1 Φ:(F q ) n -->F q n s.t. ∀ a,b ∈ F q n s,t ∈ F q : Φ(at+ bs) = Φ(a)∙t + Φ(b)∙s We identify the source output with an element of F q n : ∑a j ∙t j +b --> Φ[∑ a j ∙t j +b] =∑Φ(a j )∙t j +Φ(b) (as t j ∈ F q )  our source coincides with a multivariate polynomial with coeff in F q n (from now omit Φ and think of a j ∈ F q n ) Viewing the source over the `big’ field

Suppose we allow f| X to have coeff. in the `big field’ F q n  can take f(x) = x. For any subspace X f| X (t 1,..,t k ) =  (j=1 to k) a j ¢ t j + b is non- constant. but to use Weil need f| X with coeff. in F q Idea- if coeff. of f| X span F q n. over F q – we can `project down to F q ’ without becoming zero\constant

A,B linear subspaces in F q n Dfn: A ¢ B, span{a ¢ b|a 2 A, b 2 B} (enough to take products of basis elements) [Heur-Lieng-Xiang] Suppose n is prime. Then dim(A ¢ B) ¸ min{dim(A)+dim(B)-1,n} (analogous to the classic Cauchy-Davenport on Z p ) `dimension expansion of products of subspaces’

Thm: Suppose n is prime. Let T: F q n  F q be any non-trivial F q -linear map. Let d=n/(k-1). Suppose Char(F)>d. Let f(x)=T(x d ). Then for any affine subspace X of dim k, f| X is a non-constant poly of degree d with coeff in F q. Proof idea: When Char(F) is large enough, coefficients of f| X are `independent products’ of basis elements.

Open question: Similar results over F 2 Relates to following: n is prime.V a linear subspace of dim k in (F 2 ) n, k>min{100logn,n/100}. t= ┌ 2n/k ┐. V t ={x ^{t} | x 2 V}. Show that V t spans (F 2 ) n over F 2.

Cauchy – Davenport A,B ½ Z p A+B, {a+b| a 2 A, b 2 B} C-D: |A+B| ¸ min{|A|+|B|-1,p}

Proof: Induction on |A|. |A|=1 : |A+B| = |B| (=|A|+|B|-1) Induction step: Assume first that ; ( A Å B ( A Using Inclusion-Exclusion + Ind. Hyp |A Å B + A [ B| ¸ min{|A Å B| + |A [ B| -1,p} = min{|A| +|B| -1,p} Done as A Å B + A [ B ½ A+B

justify assumption ; ( A Å B ( A: w.l.g: 0 2 A,B (can replace A by –a +A, for some a 2 A. This does not change |A+B|) |A|>1, so can fix 0≠a 2 A. If B=Z p we are done. Otherwise, fix first c s.t. c ∙ a ∉ B. Replace B by –(c-1) ∙ a + B. We have 0 2 B but a ∉ B. (which justifies above assumption)