Deterministic extractors for bit- fixing sources by obtaining an independent seed Ariel Gabizon Ran Raz Ronen Shaltiel Seedless.

Slides:



Advertisements
Similar presentations
1+eps-Approximate Sparse Recovery Eric Price MIT David Woodruff IBM Almaden.
Advertisements

Tight Bounds for Distributed Functional Monitoring David Woodruff IBM Almaden Qin Zhang Aarhus University MADALGO Based on a paper in STOC, 2012.
Tight Bounds for Distributed Functional Monitoring David Woodruff IBM Almaden Qin Zhang Aarhus University MADALGO.
Optimal Bounds for Johnson- Lindenstrauss Transforms and Streaming Problems with Sub- Constant Error T.S. Jayram David Woodruff IBM Almaden.
Markov models and HMMs. Probabilistic Inference P(X,H,E) P(X|E=e) = P(X,E=e) / P(E=e) with P(X,E=e) = sum h P(X, H=h, E=e) P(X,E=e) = sum h,x P(X=x, H=h,
Unconditional Weak derandomization of weak algorithms Explicit versions of Yao s lemma Ronen Shaltiel, University of Haifa :
Low-End Uniform Hardness vs. Randomness Tradeoffs for Arthur-Merlin Games. Ronen Shaltiel, University of Haifa Chris Umans, Caltech.
On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols Iftach Haitner, Alon Rosen and Ronen Shaltiel 1.
Invertible Zero-Error Dispersers and Defective Memory with Stuck-At Errors Ariel Gabizon Ronen Shaltiel.
An Introduction to Randomness Extractors Ronen Shaltiel University of Haifa Daddy, how do computers get random bits?
Pseudorandomness from Shrinkage David Zuckerman University of Texas at Austin Joint with Russell Impagliazzo and Raghu Meka.
Deterministic Extractors for Small Space Sources Jesse Kamp, Anup Rao, Salil Vadhan, David Zuckerman.
Computing with adversarial noise Aram Harrow (UW -> MIT) Matt Hastings (Duke/MSR) Anup Rao (UW)
Linear-Degree Extractors and the Inapproximability of Max Clique and Chromatic Number David Zuckerman University of Texas at Austin.
Why Simple Hash Functions Work : Exploiting the Entropy in a Data Stream Michael Mitzenmacher Salil Vadhan And improvements with Kai-Min Chung.
Randomness Extractors & their Cryptographic Applications Salil Vadhan Harvard University
Randomness Extractors: Motivation, Applications and Constructions Ronen Shaltiel University of Haifa.
The Contest between Simplicity and Efficiency in Asynchronous Byzantine Agreement Allison Lewko The University of Texas at Austin TexPoint fonts used in.
Extracting Randomness From Few Independent Sources Boaz Barak, IAS Russell Impagliazzo, UCSD Avi Wigderson, IAS.
Foundations of Cryptography Lecture 7 Lecturer:Danny Harnik.
Pseudorandomness from Shrinkage David Zuckerman University of Texas at Austin Joint with Russell Impagliazzo and Raghu Meka.
How to get more mileage from randomness extractors Ronen Shaltiel University of Haifa.
Extracting Randomness David Zuckerman University of Texas at Austin.
Derandomization & Cryptography Boaz Barak, Weizmann Shien Jin Ong, MIT Salil Vadhan, Harvard.
Randomness Extraction and Privacy Amplification with quantum eavesdroppers Thomas Vidick UC Berkeley Based on joint work with Christopher Portmann, Anindya.
Foundations of Cryptography Lecture 2: One-way functions are essential for identification. Amplification: from weak to strong one-way function Lecturer:
1 Efficient Pseudorandom Generators from Exponentially Hard One-Way Functions Iftach Haitner, Danny Harnik, Omer Reingold.
Simple extractors for all min- entropies and a new pseudo- random generator Ronen Shaltiel Chris Umans.
Uniform Hardness vs. Randomness Tradeoffs for Arthur-Merlin Games. Danny Gutfreund, Hebrew U. Ronen Shaltiel, Weizmann Inst. Amnon Ta-Shma, Tel-Aviv U.
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
CIS 5371 Cryptography 3b. Pseudorandomness.
A survey on derandomizing BPP and AM Danny Gutfreund, Hebrew U. Ronen Shaltiel, Weizmann Inst. Amnon Ta-Shma, Tel-Aviv U.
NON-MALLEABLE EXTRACTORS AND SYMMETRIC KEY CRYPTOGRAPHY FROM WEAK SECRETS Yevgeniy Dodis and Daniel Wichs (NYU) STOC 2009.
Randomized Algorithms Kyomin Jung KAIST Applied Algorithm Lab Jan 12, WSAC
Some Limits on Non-Local Randomness Expansion Matt Coudron and Henry Yuen /12/12 God does not play dice. --Albert Einstein Einstein, stop telling.
Randomness Extractors: Motivation, Applications and Constructions Ronen Shaltiel University of Haifa.
Computability and Complexity 20-1 Computability and Complexity Andrei Bulatov Random Sources.
CS151 Complexity Theory Lecture 7 April 20, 2004.
CSE 221: Probabilistic Analysis of Computer Systems Topics covered: Discrete random variables Probability mass function Distribution function (Secs )
ACT1 Slides by Vera Asodi & Tomer Naveh. Updated by : Avi Ben-Aroya & Alon Brook Adapted from Oded Goldreich’s course lecture notes by Sergey Benditkis,
Introduction to Modern Cryptography, Lecture ?, 2005 Broadcast Encryption, Traitor Tracing, Watermarking.
3-source extractors, bi-partite Ramsey graphs, and other explicit constructions Boaz barak rOnen shaltiel Benny sudakov avi wigderson Joint work with GUY.
Derandomizing LOGSPACE Based on a paper by Russell Impagliazo, Noam Nissan and Avi Wigderson Presented by Amir Rosenfeld.
1 Streaming Computation of Combinatorial Objects Ziv Bar-Yossef U.C. Berkeley Omer Reingold AT&T Labs – Research Ronen.
The Power of Randomness in Computation 呂及人中研院資訊所.
On Everlasting Security in the Hybrid Bounded Storage Model Danny Harnik Moni Naor.
Extractors with Weak Random Seeds Ran Raz Weizmann Institute.
Simulating independence: new constructions of Condensers, Ramsey Graphs, Dispersers and Extractors Boaz Barak Guy Kindler Ronen Shaltiel Benny Sudakov.
Why Extractors? … Extractors, and the closely related “Dispersers”, exhibit some of the most “random-like” properties of explicitly constructed combinatorial.
1 New Coins from old: Computing with unknown bias Elchanan Mossel, U.C. Berkeley
© 2015 McGraw-Hill Education. All rights reserved. Chapter 19 Markov Decision Processes.
Fall 2013 CMU CS Computational Complexity Lectures 8-9 Randomness, communication, complexity of unique solutions These slides are mostly a resequencing.
1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.
Extractors: applications and constructions Avi Wigderson IAS, Princeton Randomness.
Umans Complexity Theory Lectures Lecture 7b: Randomization in Communication Complexity.
When is Key Derivation from Noisy Sources Possible?
Pseudo-random generators Talk for Amnon ’ s seminar.
Almost SL=L, and Near-Perfect Derandomization Oded Goldreich The Weizmann Institute Avi Wigderson IAS, Princeton Hebrew University.
Umans Complexity Theory Lecturess Lecture 11: Randomness Extractors.
Information Complexity Lower Bounds
Randomness.
Derandomization & Cryptography
Sampling of min-entropy relative to quantum knowledge Robert König in collaboration with Renato Renner TexPoint fonts used in EMF. Read the TexPoint.
Cryptography Lecture 4.
The Curve Merger (Dvir & Widgerson, 2008)
Non-Malleable Extractors New tools and improved constructions
Indistinguishability by adaptive procedures with advice, and lower bounds on hardness amplification proofs Aryeh Grinberg, U. Haifa Ronen.
Cryptography Lecture 4.
Cryptography Lecture 5.
Computer Simulation Techniques Generating Pseudo-Random Numbers
Presentation transcript:

Deterministic extractors for bit- fixing sources by obtaining an independent seed Ariel Gabizon Ran Raz Ronen Shaltiel Seedless

Randomness extractors (motivation) Randomness is essential in Computer Science: Cryptography (!!) Distributed Protocols (!) Probabilistic Algorithms (?) Algorithm designers always assume that we have access to a stream of independent unbiassed coin tosses. How can we obtain random bits?

Refining randomness from nature We have access to distributions in nature: Weather (?) Particle reactions Key strokes of user Timing of past events These distributions are “somewhat random” but not “truly random”. Solution: Randomness Extractors random coins Probabilistic algorithm input output Somewhat random Randomness Extractor

Randomness Extractors: Definition and two flavors C is a class of distributions over n bit strings. A deterministic (seedless) C-extractor is a function E such that for every XєC, E(X) is ε-close to uniform. A seeded C-extractor has an additional (short i.e. log n) independent random seed as input. source distribution from C Extractor seed random output DeterministicSeeded Two distributions are ε-close if the probability they assign to any event differs by at most ε.

A brief survey of randomness extractors Deterministic von-Neumann sources [vN51]. Markov Chains [Blu84]. Several independent sources [SV86,V86,V87,VV88,C G88,DEOR04,BIW04]. Samplable sources [TV00]. Seeded High min-entropy distributions [Z91,NZ93]. Lower bound of log n on the seed length [NZ93,RT99]. Explicit constructions coming close to matching bound (mass of work). Extractors turn out to have lots of applications in TCS.

Bit-fixing sources [CGHFRS85] An (n,k)-(oblivious) bit-fixing source is a distribution on n bit strings s.t. k bits are uniformly distributed (good bits). remaining n-k bits are fixed to arbitrary values (bad bits). x1x1 x2x2 x3x3 xnxn k random bits

Bit-fixing source extractors The exclusive or function extracts one perfectly random bit. Impossible to extract two perfect bits for k<n/3 [CGHFRS85]. A probablistic argument gives an extractor which extracts k-O(log(n/ε)) bits (for statistical distance ε from uniform). Best explicit construction extracts Ω(k 2 /n) bits [KZ03].

Our results: rangebits extracted [KZ03] bits extracted our result error k>n ½ Ω(k 2 /n)k-n ½+a (a>0 is an arbitrary constant) exp(-n a ) k<n ½ k>(log n) c Ω(log k)*k-k b (0<b<1 is a universal constant) k -b We extract (1-o(1))k bits even for small k.

Our approach Start with an extractor that extracts few bits. Convert into an extractor that extracts many bits.

Getting more mileage from extractors: first attempt x1x1 x2x2 x3x3 xnxn k random bits Deterministic Extractor random output Seeded Extractor Seeded Extractors are only guaranteed to work when the source and seed are independent. correlated!

Solution: Seed obtainers x1x1 x2x2 x3x3 xnxn k random bits Seed Obtainer random outputbit fixing source X X’X’ Y We require that X’ and Y are independent! We obtain a seed !

Seed obtainer: Definition A seed obtainer is a function F(X)=(X’,Y) s.t. For every (n,k)-bit-fixing source X: X’ is an (n’,k’)-bit-fixing source with (n’,k’)≈(n,k). Y is uniformly distributed. X’ and Y are independent. Seed Obtainer x1x1 x2x2 x3x3 xnxn X X’X’ Y F(X) is close to a convex combination of distributions X ’,Y s.t. Seeded Extractor random output Seed obtainers allow us to get more randomness from deterministic bit-fixing source extractors.

Construction of seed obtainers (erasing the correlation) k random bits random output bit fixing source X X’X’ Y Deterministic Extractor W seed for averaging sampler Seed obtainer Intuition: Erase parts that are correlated with Y We will pretend red bits are fixed! The extractor won ’ t know! Warning: Intuition is oversimplified! For any set (and in particular set of good bits) The sampled set hits it in the “ correct ” proportion. Set parameters so that: few red bits are in. Most red bits are out. correlated!

Construction for k>n ½ We use the [KZ03] deterministic extractor as basis for the seed- obtainer. Attach a good seeded extractor [RRV99]. Seed Obtainer x1x1 x2x2 x3x3 xnxn X X’X’ Y Seeded Extractor random output

The case of k<n ½ We need a deterministic bit-fixing source extractor to start with. The tecnique of [KZ03] also works for k<n ½, but extracts very few bits. Only Ω(log k) bits. For k=polylog n, we get only log log n bits. Not sufficient for seeded extractors! (Also not sufficient for standard averaging samplers.)

Solution: seeded bit-fixing source extractor. We construct a seeded bit-fixing source extractor that uses seed O(log log n) and extract (1-o(1))k bits. Apply it after the seed obtainer. Seed Obtainer x1x1 x2x2 x3x3 xnxn X X’X’ Y Seeded bit-fixing Extractor random output

A Seeded extractor for bit-fixing sources: log log n -> log n We partition the source into about log n blocks. Each bit tosses a coin to decide on its block. We use ε-pairwise dependent coins [NN93]. Cost: O(log log n) random bits. w.h.p. each block contains at least one good bit. Each block outputs the xor of its bits. log n Output log n random bits.

A Seeded extractor for bit-fixing sources: log n -> (1-o(1))k We have O(log log n) random bits as seed. Use O(log log n) random bits to partition into two blocks. Use seeded bit-fixing extractor from previous slide to extract log n bits. Use the output as a seed for a (standard) seeded extractor. To extract (1- o(1))k bits. log n bits Seeded extractor prvs n/log n

Note on averaging samplers Ingredient in the seed obtainer construction. We need to sample subsets of {1..n}. Sampling one element: log n bits. We already saw: Sampling based on ε-pairwise dependence: log log n bits [EGLNV95,RSW00]. ?????? Possible because query complexity is huge (n/log n). Note: We need samplers that hit very small sets (size<n ½) ) and cannot use samplers based on (seeded) extractors.

Overview We construct deterministic bit-fixing extractors that: Extract almost all randomnes. Work even for small k. Introduce “seed obtainers”. Allow getting more random bits from deterministc bit- fixing extractors. Construction for small k uses seeded bit-fixing extractor, that uses seed of length O(log log n) to “partition” source. Seed Obtainer x1x1 x2x2 x3x3 xnxn X X’X’ Y Seeded Extractor random output

Open problems Improve error for small k (say k<n ½ ). Possible direction: Construct deterministic bit-fixing source with larger output (>>log k) for small k. Can this technique be applied to seeded extractors? (probably not).

That’s it