K-wise vs almost K-wise permutations, and general group actions

Slides:



Advertisements
Similar presentations
Quantum t-designs: t-wise independence in the quantum world Andris Ambainis, Joseph Emerson IQC, University of Waterloo.
Advertisements

Parikshit Gopalan Georgia Institute of Technology Atlanta, Georgia, USA.
Estimating the detector coverage in a negative selection algorithm Zhou Ji St. Jude Childrens Research Hospital Dipankar Dasgupta The University of Memphis.
PRG for Low Degree Polynomials from AG-Codes Gil Cohen Joint work with Amnon Ta-Shma.
Linear-Degree Extractors and the Inapproximability of Max Clique and Chromatic Number David Zuckerman University of Texas at Austin.
A Combinatorial Construction of Almost-Ramanujan Graphs Using the Zig-Zag product Avraham Ben-Aroya Avraham Ben-Aroya Amnon Ta-Shma Amnon Ta-Shma Tel-Aviv.
Why Simple Hash Functions Work : Exploiting the Entropy in a Data Stream Michael Mitzenmacher Salil Vadhan And improvements with Kai-Min Chung.
Fast Johnson-Lindenstrauss Transform(s) Nir Ailon Edo Liberty, Bernard Chazelle Bertinoro Workshop on Sublinear Algorithms May 2011.
Models of Computation Prepared by John Reif, Ph.D. Distinguished Professor of Computer Science Duke University Analysis of Algorithms Week 1, Lecture 2.
Russell Impagliazzo ( IAS & UCSD ) Ragesh Jaiswal ( Columbia U. ) Valentine Kabanets ( IAS & SFU ) Avi Wigderson ( IAS ) ( based on [IJKW08, IKW09] )
Extracting Randomness From Few Independent Sources Boaz Barak, IAS Russell Impagliazzo, UCSD Avi Wigderson, IAS.
Approximate List- Decoding and Hardness Amplification Valentine Kabanets (SFU) joint work with Russell Impagliazzo and Ragesh Jaiswal (UCSD)
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
List decoding Reed-Muller codes up to minimal distance: Structure and pseudo- randomness in coding theory Abhishek Bhowmick (UT Austin) Shachar Lovett.
Chapter 10 Shannon’s Theorem. Shannon’s Theorems First theorem:H(S) ≤ L n (S n )/n < H(S) + 1/n where L n is the length of a certain code. Second theorem:
Models and Security Requirements for IDS. Overview The system and attack model Security requirements for IDS –Sensitivity –Detection Analysis methodology.
Yi Wu (CMU) Joint work with Parikshit Gopalan (MSR SVC) Ryan O’Donnell (CMU) David Zuckerman (UT Austin) Pseudorandom Generators for Halfspaces TexPoint.
An Elementary Construction of Constant-Degree Expanders Noga Alon *, Oded Schwartz * and Asaf Shapira ** *Tel-Aviv University, Israel **Microsoft Research,
Constant Degree, Lossless Expanders Omer Reingold AT&T joint work with Michael Capalbo (IAS), Salil Vadhan (Harvard), and Avi Wigderson (Hebrew U., IAS)
The Goldreich-Levin Theorem: List-decoding the Hadamard code
EXPANDER GRAPHS Properties & Applications. Things to cover ! Definitions Properties Combinatorial, Spectral properties Constructions “Explicit” constructions.
1 Constructing Pseudo-Random Permutations with a Prescribed Structure Moni Naor Weizmann Institute Omer Reingold AT&T Research.
1 On the Power of the Randomized Iterate Iftach Haitner, Danny Harnik, Omer Reingold.
Correlation testing for affine invariant properties on Shachar Lovett Institute for Advanced Study Joint with Hamed Hatami (McGill)
An Algorithmic Proof of the Lopsided Lovasz Local Lemma Nick Harvey University of British Columbia Jan Vondrak IBM Almaden TexPoint fonts used in EMF.
Why Extractors? … Extractors, and the closely related “Dispersers”, exhibit some of the most “random-like” properties of explicitly constructed combinatorial.
NEAREST NEIGHBORS ALGORITHM Lecturer: Yishay Mansour Presentation: Adi Haviv and Guy Lev 1.
1 Private codes or Succinct random codes that are (almost) perfect Michael Langberg California Institute of Technology.
1 CSC 421: Algorithm Design & Analysis Spring 2014 Complexity & lower bounds  brute force  decision trees  adversary arguments  problem reduction.
Derandomized Constructions of k -Wise (Almost) Independent Permutations Eyal Kaplan Moni Naor Omer Reingold Weizmann Institute of ScienceTel-Aviv University.
Pseudo-random generators Talk for Amnon ’ s seminar.
Does Privacy Require True Randomness? Yevgeniy Dodis New York University Joint work with Carl Bosley.
Almost SL=L, and Near-Perfect Derandomization Oded Goldreich The Weizmann Institute Avi Wigderson IAS, Princeton Hebrew University.
Pseudorandomness: New Results and Applications Emanuele Viola IAS April 2007.
Why getting it almost right is OK and Why scrambling the data may help Oops I made it again…
CMPT 438 Algorithms.
Random Access Codes and a Hypercontractive Inequality for
Tali Kaufman (Bar-Ilan)
Chapter 7. Classification and Prediction
Information Complexity Lower Bounds
Coding, Complexity and Sparsity workshop
Basic Business Statistics (8th Edition)
Lower bounds for approximate membership dynamic data structures
Approximating the MST Weight in Sublinear Time
Circuit Lower Bounds A combinatorial approach to P vs NP
General Strong Polarization
The Learning With Errors Problem
Digital Signature Schemes and the Random Oracle Model
Background: Lattices and the Learning-with-Errors problem
Equivalence of Search and Decisional (Ring-) LWE
Faster Space-Efficient Algorithms for Subset Sum
Local Error-Detection and Error-correction
Randomized Algorithms CS648
Linear sketching with parities
When are Fuzzy Extractors Possible?
Locally Decodable Codes from Lifting
Y. Kotidis, S. Muthukrishnan,
Probabilistic existence of regular combinatorial objects
Uncertain Compression
Locality Sensitive Hashing
Linear sketching over
Introduction to PCP and Hardness of Approximation
When are Fuzzy Extractors Possible?
Linear sketching with parities
The Byzantine Secretary Problem
Imperfectly Shared Randomness
Every set in P is strongly testable under a suitable encoding
The Zig-Zag Product and Expansion Close to the Degree
Minwise Hashing and Efficient Search
Zeev Dvir (Princeton) Shachar Lovett (IAS)
Presentation transcript:

K-wise vs almost K-wise permutations, and general group actions Noga Alon, Tel-Aviv University Shachar Lovett, IAS / UCSD

Limited indepdence Distributions with limited independence are a powerful derandomization tool K-wise bits: well understood K-wise permutations: not so much… This work: Simplify analysis of algorithms (using existing constructions)

K-wise bits A distribution D over {0,1}n is k-wise if Explicit, efficient constructions (based on error-correcting codes) Sample x using O(k log n) random bits

K-wise permutations Distribution D over permutations on n elements is k-wise if Explicit constructions: k=1,2,3 only One solution: allow errors

Almost K-wise permutations Distribution D over permutations on n elements is almost k-wise with error if Explicit, efficient constructions known [...,Kaplan-Naor-Reingold’05, Kassabov’07]

K-wise vs almost K-wise permutations No errors No constructions… Almost K-wise permutations: Allow errors Explicit efficient constructions This work: bridge the gap

Main results (1) Thm 1: Any almost k-wise distribution over permutations with good enough error is close in statistical distance to a k-wise distribution over permutations Extends [Alon,Goldreich,Mansour’03] who showed a similar result for k-wise bits

Main results (1) Thm 1: Any almost k-wise distribution over permutations with good enough error is close in statistical distance to a k-wise distribution over permutations What does it mean? To derandomize a decision algorithm: Analyze assuming k-wise permutations Actually use almost k-wise permutations

Main results (2) Thm 2: Any almost 2k-wise distribution over permutations with good enough error supports a k-wise distribution over permutations What does it mean? To derandomize a search algorithm: Analyze assuming k-wise permutations Actually use almost 2k-wise permutations

General group actions It turns out that k-wise permutations is an instance of a more general framework General setup: group actions

General setup: group actions Group G acts on a set X (e.g. permutations on k-tuples) Distribution D on G acts on X uniformly if It acts almost uniformly with error if

Examples K-wise permutations: K-wise bits: Group G=Sn acts on disjoint k-tuples X={(i1,…,ik): i1,…,ik[n]} K-wise bits: Group G=SnZ2n acts of indices & values X={(i1,…,ik,v): i1,…,ik[n], vZ2n}

Main results (1) G acts on X Thm 1: any almost X-uniform distribution with good enough error is close in statistical distance to an X-uniform distribution

Main results (2) G acts on X G naturally acts on X2 Thm 2: Any almost X2-uniform distribution with good enough error supports an X-uniform distribution

Proof idea Main tool: basic representation theory Focus on thm 1 in this talk Thm 1: any almost X-uniform distribution with good enough error is close in statistical distance to an X-uniform distribution

Alon, Goldreich, Mansour Thm [AGM]: any distribution on {0,1}n which is almost k-wise with good enough error is close in statistical distance to a k-wise distribution Proof idea: Correct all Fourier coefficients of size ≤k to be zero

Extension to group action Thm 1: Any almost X-uniform distribution with good enough error is close in statistical distance to an X-uniform distribution What is the analog of “Fourier coefs of size at most k” used in [AGM]? Answer: irreducible representations occurring in the action of G on X (X is small - not too many of them)

Proof idea Proof uses only elementary properties of irreducible representations (e.g. nothing specific for permutations) This is why the results extend to general group actions

Summary Main message: simplify analysis of algorithms Analyze assuming you have k-wise permutations (which we currently don’t know how to construct) Actually use only almost k-wise permutations (which we know how to construct)

Thank you! Further research Combinatorial problem: construct efficient sample spaces of k-wise independent permutations [Kuperberg-L.-Peled’12]: they exist Now we need to find them… Thank you!