The Power of Randomness in Computation 呂及人中研院資訊所.

Slides:



Advertisements
Similar presentations
On the Complexity of Parallel Hardness Amplification for One-Way Functions Chi-Jen Lu Academia Sinica, Taiwan.
Advertisements

Linear-Degree Extractors and the Inapproximability of Max Clique and Chromatic Number David Zuckerman University of Texas at Austin.
Approximate List- Decoding and Hardness Amplification Valentine Kabanets (SFU) joint work with Russell Impagliazzo and Ragesh Jaiswal (UCSD)
Uniform Hardness vs. Randomness Tradeoffs for Arthur-Merlin Games. Danny Gutfreund, Hebrew U. Ronen Shaltiel, Weizmann Inst. Amnon Ta-Shma, Tel-Aviv U.
Complexity Theory Lecture 9 Lecturer: Moni Naor. Recap Last week: –Toda’s Theorem: PH  P #P. –Program checking and hardness on the average of the permanent.
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
The Unified Theory of Pseudorandomness Salil Vadhan Harvard University See also monograph-in-progress Pseudorandomness
CS151 Complexity Theory Lecture 8 April 22, 2004.
Foundations of Cryptography Lecture 5 Lecturer: Moni Naor.
A survey on derandomizing BPP and AM Danny Gutfreund, Hebrew U. Ronen Shaltiel, Weizmann Inst. Amnon Ta-Shma, Tel-Aviv U.
Randomized Algorithms Kyomin Jung KAIST Applied Algorithm Lab Jan 12, WSAC
Probabilistic Algorithms Michael Sipser Presented by: Brian Lawnichak.
Probabilistically Checkable Proofs Madhu Sudan MIT CSAIL 09/23/20091Probabilistic Checking of Proofs TexPoint fonts used in EMF. Read the TexPoint manual.
Time vs Randomness a GITCS presentation February 13, 2012.
Complexity 18-1 Complexity Andrei Bulatov Probabilistic Algorithms.
CS151 Complexity Theory Lecture 7 April 20, 2004.
The Bright Side of Hardness Relating Computational Complexity and Cryptography Oded Goldreich Weizmann Institute of Science.
Complexity and Cryptography
Perfect and Statistical Secrecy, probabilistic algorithms, Definitions of Easy and Hard, 1-Way FN -- formal definition.
Randomized Computation Roni Parshani Orly Margalit Eran Mantzur Avi Mintz
CS151 Complexity Theory Lecture 7 April 20, 2015.
CS151 Complexity Theory Lecture 11 May 4, CS151 Lecture 112 Outline Extractors Trevisan’s extractor RL and undirected STCONN.
Derandomizing LOGSPACE Based on a paper by Russell Impagliazo, Noam Nissan and Avi Wigderson Presented by Amir Rosenfeld.
CS151 Complexity Theory Lecture 8 April 22, 2015.
Introduction to Modern Cryptography, Lecture 7/6/07 Zero Knowledge and Applications.
CS151 Complexity Theory Lecture 13 May 11, CS151 Lecture 132 Outline Natural complete problems for PH and PSPACE proof systems interactive proofs.
Sedgewick & Wayne (2004); Chazelle (2005) Sedgewick & Wayne (2004); Chazelle (2005)
Zero Knowledge Proofs. Interactive proof An Interactive Proof System for a language L is a two-party game between a verifier and a prover that interact.
Lecture 20: April 12 Introduction to Randomized Algorithms and the Probabilistic Method.
Introduction to Modern Cryptography, Lecture 9 More about Digital Signatures and Identification.
Introduction to Computer and Network Security Iliano Cervesato 26 August 2008 – Modern Cryptography.
Sedgewick & Wayne (2004); Chazelle (2005) Sedgewick & Wayne (2004); Chazelle (2005)
CS151 Complexity Theory Lecture 9 April 27, 2004.
Foundations of Cryptography Lecture 9 Lecturer: Moni Naor.
Foundations of Cryptography Lecture 2 Lecturer: Moni Naor.
Quadratic Residuosity and Two Distinct Prime Factor ZK Protocols By Stephen Hall.
Randomness – A computational complexity view Avi Wigderson Institute for Advanced Study.
Approximation Algorithms Pages ADVANCED TOPICS IN COMPLEXITY THEORY.
The Power and Weakness of Randomness (when you are short on time) Avi Wigderson School of Mathematics Institute for Advanced Study.
Why Extractors? … Extractors, and the closely related “Dispersers”, exhibit some of the most “random-like” properties of explicitly constructed combinatorial.
Endre Szemerédi & TCS Avi Wigderson IAS, Princeton.
Fall 2004/Lecture 201 Cryptography CS 555 Lecture 20-b Zero-Knowledge Proof.
CS151 Complexity Theory Lecture 13 May 11, Outline proof systems interactive proofs and their power Arthur-Merlin games.
Cryptography Lecture 7: RSA Primality Testing Piotr Faliszewski.
PROBABILISTIC COMPUTATION By Remanth Dabbati. INDEX  Probabilistic Turing Machine  Probabilistic Complexity Classes  Probabilistic Algorithms.
Zero-knowledge proof protocols 1 CHAPTER 12: Zero-knowledge proof protocols One of the most important, and at the same time very counterintuitive, primitives.
Umans Complexity Theory Lectures Lecture 1a: Problems and Languages.
On Constructing Parallel Pseudorandom Generators from One-Way Functions Emanuele Viola Harvard University June 2005.
Fall 2013 CMU CS Computational Complexity Lectures 8-9 Randomness, communication, complexity of unique solutions These slides are mostly a resequencing.
Extractors: applications and constructions Avi Wigderson IAS, Princeton Randomness.
Umans Complexity Theory Lectures Lecture 7b: Randomization in Communication Complexity.
My Favorite Ten Complexity Theorems of the Past Decade II Lance Fortnow University of Chicago.
Probabilistic verification Mario Szegedy, Rutgers www/cs.rutgers.edu/~szegedy/07540 Lecture 1.
CRYPTOGRAPHY AND NP-HARDNESS Andrej Bogdanov Chinese University of Hong Kong MACS Foundations of Cryptography| January 2016.
CRYPTOGRAPHIC HARDNESS OTHER FUNCTIONALITIES Andrej Bogdanov Chinese University of Hong Kong MACS Foundations of Cryptography| January 2016.
Pseudo-random generators Talk for Amnon ’ s seminar.
Error-Correcting Codes and Pseudorandom Projections Luca Trevisan U.C. Berkeley.
Lecture 20 CSE 331 July 30, Longest path problem Given G, does there exist a simple path of length n-1 ?
Almost SL=L, and Near-Perfect Derandomization Oded Goldreich The Weizmann Institute Avi Wigderson IAS, Princeton Hebrew University.
Umans Complexity Theory Lecturess Lecture 11: Randomness Extractors.
Zero-Knowledge Proofs Ben Hosp. Classical Proofs A proof is an argument for the truth or correctness of an assertion. A classical proof is an unambiguous.
Pseudo-randomness. Randomized complexity classes model: probabilistic Turing Machine –deterministic TM with additional read-only tape containing “coin.
Complexity Theory and Explicit Constructions of Ramsey Graphs Rahul Santhanam University of Edinburgh.
Probabilistic Algorithms
Derandomization & Cryptography
Introduction to Randomized Algorithms and the Probabilistic Method
Randomness and Computation
CS154, Lecture 18:.
Pseudorandomness when the odds are against you
CS 154, Lecture 6: Communication Complexity
Presentation transcript:

The Power of Randomness in Computation 呂及人中研院資訊所

PART I: Randomization

Random Sampling

Polling With probability >99% % in population = % in sample  5% independent of population size Population: 20 million, voting yellow or red Random Sample: 3,000

Lesson A small set of random samples gives a good picture of the whole population. A small set of random samples gives a good picture of the whole population. Allow sub-linear time algorithms! Allow sub-linear time algorithms! More applications: More applications: –Volume estimation –Clustering –Machine learning,...

Fingerprints

Problem Alice:  n x   n x = y ? Measure: communication complexity Bob:  n y   n

First Attempt Alice:  n x   n x = y ? Bob:  n y   n i  r {1..n} i, x i x i = y i ?  (x,y) Works only when  (x,y) is large

Solution Alice:  n x   n Bob:  n y   n x  y: Prob i [C(x) i =C(y) i ]  0 0 x = y: Prob i [C(x) i  C(y) i ] = 0 i  r {1..m} i, C(x) i C(x) i = C(y) i ? C: error-correcting code  with   1 x  C(x)y  C(y) can repeat several times to reduce error

Lesson Transform the data, before random sampling! Transform the data, before random sampling!

Dimensionality Reduction Raw data A  {0,1} n, for very large n. Raw data A  {0,1} n, for very large n. –e.g. images, voices, DNA sequences,... –|A| << 2 n. Goal: Goal: –compressing each element of A, while keeping its “ essence ”

Proof Systems

Classical Proof Systems Prover: provides the proof. Prover: provides the proof. –Hard. Verifier: verifies the proof. Verifier: verifies the proof. –Relatively easy! –Still needs to read through the proof. –What if you, the reviewer, receive a paper of 300 pages to verify...

Probabilistically Correct Proof (PCP) Verifier: flips “ some ” random coins flips “ some ” random coins reads only a “ small ” parts of the proof reads only a “ small ” parts of the proof tolerates a “ small ” error tolerates a “ small ” error

Proof? A format of arguments agreed upon by Prover and Verifier A format of arguments agreed upon by Prover and Verifier –soundness & completeness. Choosing a good proof format Choosing a good proof format  Fast & simple verification!

Probabilistically Correct Proof (PCP) Prover: transforms the proof transforms the proof by encoding it with some error correcting (testing) code!

PCP for NP NP = PCP ( O(log n), 3 ). NP = PCP ( O(log n), 3 ). NP contains S AT, T SP,..., and NP contains S AT, T SP,..., and M ATH = { (S,1 t ) : ZFC | = S in t steps}.

Graph Non- Isomorphism

Isomorphic? G1G1G1G1 G2G2G2G2

Isomorphic! G1G1G1G1 G2G2G2G2

Problem Input: two graphs G 1 and G 2 Input: two graphs G 1 and G 2 Output: yes iff G 1 and G 2 are not isomorphic. Output: yes iff G 1 and G 2 are not isomorphic. G 1 iso. G 2   short proof G 1 iso. G 2   short proof (GNSIO  co-NP) G 1 not iso. G 2   short proof ??? G 1 not iso. G 2   short proof ???

Randomized Algorithm Verifier: Verifier: –Picks a random i  {1,2} –Sends G, a random permutation of G i Prover: Prover: –Sends j  {1,2} Verifier: Verifier: –Outputs “ non-isomorphic ” iff i = j.

New Features Non-transferable proofs Non-transferable proofs Zero-knowledge proofs Zero-knowledge proofs IP=PSACE IP=PSACE “ a lot more can be proved efficiently ”

Reachability

Problem Input: undirected graph G and two nodes s, t Input: undirected graph G and two nodes s, t Output yes iff s is connected to t in G Output yes iff s is connected to t in G Complexity: poly( n ) time! Complexity: poly( n ) time! Question: O(log n ) space? Question: O(log n ) space? number of nodes

Randomized Algorithm Take a random walk a length poly( n ) from s. Take a random walk a length poly( n ) from s. Output yes iff t is visited during the walk. Output yes iff t is visited during the walk. Complexity: randomized O(log n ) space Complexity: randomized O(log n ) space –only need to remember the current node

Lesson Interesting probabilistic phenomenon behind: Interesting probabilistic phenomenon behind: –Mixing rate of Markov chain (related to resistance of electrical networks)

Primality Testing

Problem Input: a number x Input: a number x Output: yes iff x is a prime Output: yes iff x is a prime Important in cryptography,... Important in cryptography,...

Randomized Algorithm Generate a random r  { 1,..., x } Generate a random r  { 1,..., x } Output yes iff Output yes iff –GCD ( x, r ) = 1 & –[ r / x ]  r (x-1)/2 (mod x ) Jacobi symbol

PART II: Derandomization

Issues Randomized algorithm M for A: Randomized algorithm M for A: –M has access to perfectly random y –  x, Prob y [ M(x,y)  A(x) ] < Issues? Issues? –Small probability of error. –Need perfectly random y. How?

Solutions Randomness extractors Randomness extractors Pseudo-random generators Pseudo-random generators Derandomization Derandomization

Randomness Extractors

Setting slightly random almost random E XT short random seed: catalyst short seed, long output Goal: short seed, long output

Applications Complexity Complexity Cryptography Cryptography Data structures Data structures Distributed computing Distributed computing Error-correcting codes Error-correcting codes Combinatorics, graph theory Combinatorics, graph theory......

Pseudo-Random Generators

Random? Are coin tosses really random? Are coin tosses really random? They “ look random ” to you, because you don ’ t have enough power (computation / measurement). They “ look random ” to you, because you don ’ t have enough power (computation / measurement). In many cases, “ look random ” is good enough! In many cases, “ look random ” is good enough!

PRG random seed pseudo-random P RG short seed, long output Goal: short seed, long output

Definition {0,1} n  {0,1} m G: {0,1} n  {0,1} m, for n<m, is an  - PRG against a complexity class C:  predicate T  C, | Prob r [T(G(r)) = 1]  Prob y [T(y) = 1] | < .

PRG exists? From an “average-case hard” function From an “average-case hard” function f: {0,1} n  {0,1}, define PRG G: {0,1} n  {0,1} n+1 as G(r) = r 。 f(r)

PRG exists? From an “worst-case hard” function From an “worst-case hard” function f: {0,1} n  {0,1}, define PRG G: {0,1} n  {0,1} n+1 as G(r) = r 。 f(r) From a one-way function... From a one-way function...

Pseudo-Randomness Foundation of cryptography Foundation of cryptography –Public-key encryption –zero-knowledge proofs, –secure function evaluation,... Secret is there, but it looks random More applications: learning theory, mathematics, physics,... More applications: learning theory, mathematics, physics,...

Derandomizatoin

Open Problems Does randomness help poly-time / log-space / nondet. poly-time computation? Does randomness help poly-time / log-space / nondet. poly-time computation? BPP = P? BPL = L? BPNP = NP?

Open Problems Is there a PRG with seed length O(log n) that fools poly-time / log- space / nondet. poly-time computation? Is there a PRG with seed length O(log n) that fools poly-time / log- space / nondet. poly-time computation?

Derandomization Rand. algorithm M for language A: Rand. algorithm M for language A: Prob y [ M( x, y ) = A( x ) ] > 0.99,  x Construct PRG G (fooling M) s.t. Construct PRG G (fooling M) s.t. Prob r [ M( x, G(r) ) = A( x ) ] > 0.5,  x To determine A( x ), take majority vote of M( x, G(r) ) over all possible r. To determine A( x ), take majority vote of M( x, G(r) ) over all possible r.

Breakthroughs Primality  P: Primality  P: Agrawal-Kayal-Saxena 2002 Undirected Reachability  L: Undirected Reachability  L: Reingold 2005

Still Open Graph non-isomorphism in NP? Graph non-isomorphism in NP? (If two graphs are non-isomorphic, is there always a short proof for that?)

Conclusion

Randomness is useful Randomness is useful Interesting probabilistic phenomena behind Interesting probabilistic phenomena behind Randomness is in the eye of the beholder Randomness is in the eye of the beholder Exciting area! Exciting area!

Appendix

PCP for any L  NP  efficient verifier V  efficient verifier V –uses O(log n) random bits, –reads 3 bits from the proof. Correctness: Correctness: –x  L   short proof p, Prob [ V accepts p ] > 0.9 –x  L   short proof p, Prob [ V accepts p ] < 0.5

Definitions (extractor) Randomness measure: min-entropy. Randomness measure: min-entropy. H  (X)  k   x, Prob [ X=x ]  2 -k. Z is  -random if || Z  U || 1  . Z is  -random if || Z  U || 1  . E XT is an (k,  )-extractor if E XT is an (k,  )-extractor if H  (X)  k  E XT (X,U) is  -random.