Expander Graphs, Randomness Extractors and List-Decodable Codes Salil Vadhan Harvard University Joint work with Venkat Guruswami (UW) & Chris Umans (Caltech)

Slides:



Advertisements
Similar presentations
Randomness Conductors Expander Graphs Randomness Extractors Condensers Universal Hash Functions
Advertisements

The Weizmann Institute
Walk the Walk: On Pseudorandomness, Expansion, and Connectivity Omer Reingold Weizmann Institute Based on join works with Michael Capalbo, Kai-Min Chung,
Randomness Conductors (II) Expander Graphs Randomness Extractors Condensers Universal Hash Functions
Optimal Space Lower Bounds for All Frequency Moments David Woodruff MIT
Parikshit Gopalan Georgia Institute of Technology Atlanta, Georgia, USA.
Hardness of Reconstructing Multivariate Polynomials. Parikshit Gopalan U. Washington Parikshit Gopalan U. Washington Subhash Khot NYU/Gatech Rishi Saket.
Low-End Uniform Hardness vs. Randomness Tradeoffs for Arthur-Merlin Games. Ronen Shaltiel, University of Haifa Chris Umans, Caltech.
An Introduction to Randomness Extractors Ronen Shaltiel University of Haifa Daddy, how do computers get random bits?
Pseudorandomness from Shrinkage David Zuckerman University of Texas at Austin Joint with Russell Impagliazzo and Raghu Meka.
Deterministic Extractors for Small Space Sources Jesse Kamp, Anup Rao, Salil Vadhan, David Zuckerman.
Linear-Degree Extractors and the Inapproximability of Max Clique and Chromatic Number David Zuckerman University of Texas at Austin.
A Combinatorial Construction of Almost-Ramanujan Graphs Using the Zig-Zag product Avraham Ben-Aroya Avraham Ben-Aroya Amnon Ta-Shma Amnon Ta-Shma Tel-Aviv.
Randomness Extractors & their Cryptographic Applications Salil Vadhan Harvard University
Randomness Extractors: Motivation, Applications and Constructions Ronen Shaltiel University of Haifa.
Short seed extractors against quantum storage Amnon Ta-Shma Tel-Aviv University 1.
Extracting Randomness From Few Independent Sources Boaz Barak, IAS Russell Impagliazzo, UCSD Avi Wigderson, IAS.
Pseudorandomness from Shrinkage David Zuckerman University of Texas at Austin Joint with Russell Impagliazzo and Raghu Meka.
Extracting Randomness David Zuckerman University of Texas at Austin.
Approximate List- Decoding and Hardness Amplification Valentine Kabanets (SFU) joint work with Russell Impagliazzo and Ragesh Jaiswal (UCSD)
Simple extractors for all min- entropies and a new pseudo- random generator Ronen Shaltiel Chris Umans.
Inapproximability of MAX-CUT Khot,Kindler,Mossel and O ’ Donnell Moshe Ben Nehemia June 05.
List decoding and pseudorandom constructions: lossless expanders and extractors from Parvaresh-Vardy codes Venkatesan Guruswami Carnegie Mellon University.
Approximation, Chance and Networks Lecture Notes BISS 2005, Bertinoro March Alessandro Panconesi University La Sapienza of Rome.
The Unified Theory of Pseudorandomness Salil Vadhan Harvard University See also monograph-in-progress Pseudorandomness
Extractors: applications and constructions Avi Wigderson IAS, Princeton Randomness.
The zigzag product, Expander graphs & Combinatorics vs. Algebra Avi Wigderson IAS & Hebrew University ’00 Reingold, Vadhan, W. ’01 Alon, Lubotzky, W. ’01.
Derandomized parallel repetition theorems for free games Ronen Shaltiel, University of Haifa.
Randomness Extractors & their Many Guises Salil Vadhan Harvard University to be posted at
1 The Monte Carlo method. 2 (0,0) (1,1) (-1,-1) (-1,1) (1,-1) 1 Z= 1 If  X 2 +Y 2  1 0 o/w (X,Y) is a point chosen uniformly at random in a 2  2 square.
Randomness Extractors: Motivation, Applications and Constructions Ronen Shaltiel University of Haifa.
Simple Extractors for All Min-Entropies and a New Pseudo-Random Generator Ronen Shaltiel (Hebrew U) & Chris Umans (MSR) 2001.
Constant Degree, Lossless Expanders Omer Reingold AT&T joint work with Michael Capalbo (IAS), Salil Vadhan (Harvard), and Avi Wigderson (Hebrew U., IAS)
Correcting Errors Beyond the Guruswami-Sudan Radius Farzad Parvaresh & Alexander Vardy Presented by Efrat Bank.
EXPANDER GRAPHS Properties & Applications. Things to cover ! Definitions Properties Combinatorial, Spectral properties Constructions “Explicit” constructions.
3-source extractors, bi-partite Ramsey graphs, and other explicit constructions Boaz barak rOnen shaltiel Benny sudakov avi wigderson Joint work with GUY.
Derandomizing LOGSPACE Based on a paper by Russell Impagliazo, Noam Nissan and Avi Wigderson Presented by Amir Rosenfeld.
1 On the Benefits of Adaptivity in Property Testing of Dense Graphs Joint work with Mira Gonen Dana Ron Tel-Aviv University.
1 Streaming Computation of Combinatorial Objects Ziv Bar-Yossef U.C. Berkeley Omer Reingold AT&T Labs – Research Ronen.
CS151 Complexity Theory Lecture 10 April 29, 2004.
Extractors with Weak Random Seeds Ran Raz Weizmann Institute.
Expander graphs – Constructions, Connections and Applications Avi Wigderson IAS & Hebrew University ’00 Reingold, Vadhan, W. ’01 Alon, Lubotzky, W. ’01.
Simulating independence: new constructions of Condensers, Ramsey Graphs, Dispersers and Extractors Boaz Barak Guy Kindler Ronen Shaltiel Benny Sudakov.
New extractors and condensers from Parvaresh- Vardy codes Amnon Ta-Shma Tel-Aviv University Joint work with Chris Umans (CalTech)
Why Extractors? … Extractors, and the closely related “Dispersers”, exhibit some of the most “random-like” properties of explicitly constructed combinatorial.
RANDOMNESS AND PSEUDORANDOMNESS Omer Reingold, Microsoft Research and Weizmann.
Endre Szemerédi & TCS Avi Wigderson IAS, Princeton.
Direct-product testing, and a new 2-query PCP Russell Impagliazzo (IAS & UCSD) Valentine Kabanets (SFU) Avi Wigderson (IAS)
Extractors: applications and constructions Avi Wigderson IAS, Princeton Randomness Seeded.
15-853:Algorithms in the Real World
Amplification and Derandomization Without Slowdown Dana Moshkovitz MIT Joint work with Ofer Grossman (MIT)
Extractors: applications and constructions Avi Wigderson IAS, Princeton Randomness.
Randomness Extraction Beyond the Classical World Kai-Min Chung Academia Sinica, Taiwan 1 Based on joint works with Xin Li, Yaoyun Shi, and Xiaodi Wu.
RANDOMNESS VS. MEMORY: Prospects and Barriers Omer Reingold, Microsoft Research and Weizmann With insights courtesy of Moni Naor, Ran Raz, Luca Trevisan,
The zigzag product, Expander graphs & Combinatorics vs. Algebra Avi Wigderson IAS, Princeton ’00 Reingold, Vadhan, W. ’01 Alon, Lubotzky, W. ’01 Capalbo,
When is Key Derivation from Noisy Sources Possible?
Pseudo-random generators Talk for Amnon ’ s seminar.
Error-Correcting Codes and Pseudorandom Projections Luca Trevisan U.C. Berkeley.
RANDOMNESS AND PSEUDORANDOMNESS Omer Reingold, Microsoft Research and Weizmann.
Almost SL=L, and Near-Perfect Derandomization Oded Goldreich The Weizmann Institute Avi Wigderson IAS, Princeton Hebrew University.
Umans Complexity Theory Lecturess Lecture 11: Randomness Extractors.
Complexity Theory and Explicit Constructions of Ramsey Graphs Rahul Santhanam University of Edinburgh.
Coding, Complexity and Sparsity workshop
Quantum expanders: motivation and constructions
Complexity of Expander-Based Reasoning and the Power of Monotone Proofs Sam Buss (UCSD), Valentine Kabanets (SFU), Antonina Kolokolova.
Randomized Algorithms CS648
Extractors: Optimal Up to Constant Factors
Uncertain Compression
The Zig-Zag Product and Expansion Close to the Degree
The Weizmann Institute
Presentation transcript:

Expander Graphs, Randomness Extractors and List-Decodable Codes Salil Vadhan Harvard University Joint work with Venkat Guruswami (UW) & Chris Umans (Caltech)

[GW94,WZ95,TUZ01, RVW00,CRVW02] Connections in Pseudorandomness Randomness Extractors Expander Graphs List-Decodable Error-Correcting Codes Pseudorandom Generators Samplers [Tre99,RRV99, ISW99,SU01,U02] [Tre99,TZ01, TZS01,SU01] [CW89,Z96] This Work [PV05,GR06] This Work

Outline Expander Construction Application to Extractors Connections Conclusions

(Bipartite) Expander Graphs Goals: Minimize D Maximize A Minimize M |  (S)|  A ¢ |S| D N M  S, |S|  K Nonconstructive: D = O(log(N/M)/  ) A = (1-  ) ¢ D M =  (KD/  “ (K,A) expander” O(1) if M=N  log N) if M ·p N =

Applications of Expanders Fault-tolerant networks (e.g., [Pin73,Chu78,GG81]) Sorting in parallel [AKS83] Complexity theory [Val77,Urq87] Derandomization [AKS87,INW94,Rei05,…] Randomness extractors [CW89,GW94,TUZ01,RVW00] Ramsey theory [Alo86] Error-correcting codes [Gal63,Tan81,SS94,Spi95,LMSS01] Distributed routing in networks [ PU89,ALM96,BFU99 ]. Data structures [ BMRS00 ]. Distributed storage schemes [ UW87 ]. Hard tautologies in proof complexity [BW99,ABRW00,AR01 ]. Other areas of Math [KR83,Lub94,Gro00,LP01] Need explicit constructions (deterministic, time poly(log N)).

Advantage of Expansion (1-  ) ¢ D At least (1-2  ) D |S| elements of  (S) are unique neighbors: touch exactly one edge from S |  (S)|  (1-  ) D |S| D N M  S, |S|  K x Fault tolerance: Even if an adversary removes most (say ¾) edges from each vertex, lossless expansion maintained (with  =4  )

Application to Data Structures [BMRS00] Goal: store small S ½ [N] s.t. can test membership by (probabilistically) reading 1 bit. Expansion (1-  ) ¢ D ) 9 0,1 assignment to [M] s.t. for every x 2 [N], a 1-O(  ) fraction of neighbors have correct answer! D N M  S, |S|  K |  (S)|  (1-  ) ¢ D ¢ |S| /

Application to Data Structures [BMRS00] Size: M=O(K ¢ log N) with optimal expander  (K ¢ log N) necessary to represent set. Perfect hashing: same size, but read O(log N)-bit word D N M  S, |S|  K /

Explicit Constructions Nonconstructive O(log(N/M)) (1-  ) ¢ DO(KD  Ramanujan graphs […LPS86,M88] O(1) ¼ D/2 [Kah94] N Zig-zag  CRVW02] O(1) (1-  ) ¢ D  N Ta-Shma, Umans, Zuckerman [TUZ01] polylog(N) quasipoly(log N) (1-  ) ¢ D quasipoly(KD) poly(KD) Our Result polylog(N) (1-  ) ¢ D poly(KD) degree D expansion A |right-side| M   arbitrary constant. quasipoly(t)=exp(polylog t)

Our Result Thm: For every N, K,  >0, 9 explicit (K,A) expander with degree D = poly(log N, 1/  ) expansion A = (1-  ) ¢ D #right vertices M = D 2 ¢ K |  (S)|  A ¢ |S| D N M  S, |S|  K

Our Construction Left vertices = F q n = polys of degree · n-1 over F q Degree = q Right vertices = F q m+1  ( f,y ) = y ’th neighbor of f = (y, f(y), (f h mod E)(y), (f h 2 mod E)(y), …, (f h m-1 mod E)(y)) where E(Y) = irreducible poly of degree n h = a parameter Thm: This is a (K,A) expander with K=h m, A = q-hnm.

Setting Parameters  ( f,y ) = (y, f(y), (f h mod E)(y), …, (f h m-1 mod E)(y)) f = poly of degree · n-1, E = irreducible of degree n N = F q n, D = q, M = F q m+1 Thm: This is a (K,A) expander with K=h m, A = q-hnm. Set h = poly ( nm /  )  q = h 1.01  Then: D = q = poly(log N, 1/  ) A = q-hnm ¸ (1-  ) ¢ D M = q m+1 = q ¢ (h 1.01 ) m = D ¢ K 1.01

Rel’n to Parvaresh-Vardy Codes [PV05]  ( f,y ) = (y, f(y), (f h mod E)(y), …, (f h m-1 mod E)(y)) f = poly of degree · n-1, E = irreducible of degree n Thm: This is a (K,A) expander with K=h m, A = q-hnm.  ( f,y ) = ( y, y ’th symbol of PV encoding f ) Proof of expansion inspired by list-decoding algorithm for PV codes.

List-Decoding View of Expanders For T µ [M], define LIST(T) = {x 2 [N] :  (x) µ T} Lemma: G is a (=K,A) expander iff for all T µ [M] of size AK-1, we have |LIST(T)| · K-1 |  (S)|  A ¢ K D N  S, |S|=K M “ (=K,A) expander”

Comparing List-Decoding Views  : [N] £ [D] ! [D] £ [M] T µ [D] £ [M] ObjectInterpretation x 2 LIST(T) iffDecoding Problem expanders  x,y) = y ’th nbr of x 8 y  (x,y) 2 T |T| < AK ) |LIST(T)| < K list-decodable codes  x,y) = (y,ECC(x) y ) Pr y [  (x,y) 2 T] ¸ 1/M +  T = {(y,r y )} ) |LIST(T)| < K

Proof of Expansion  ( f,y ) = (y, f(y), (f h mod E)(y), …, (f h m-1 mod E)(y)) f = poly of degree · n-1, E = irreducible of degree n Thm: For A=q-nmh and any K · h m, we have T µ F q m+1 of size AK-1 ) |LIST(T)| · K-1 Proof Outline (following [S97,GS99,PV05] ): 1.Find a low-degree poly Q vanishing on T. 2.Show that every f 2 LIST(T) is a “root” of a related polynomial Q’. 3.Show that deg(Q’) · K-1 =

Proof of Expansion: Step 1  ( f,y ) = (y, f(y), (f h mod E)(y), …, (f h m-1 mod E)(y)) f = poly of degree · n-1, E = irreducible of degree n Thm: For A=q-nmh, K= h m, |T| · AK-1 ) |LIST(T)| · K-1. Step 1: Find a low-degree poly Q vanishing on T. Take Q(Y,Z 1,…,Z m ) to be of degree · A-1 in Y, degree · h-1 in each Z i. # coefficients = A K > |T| = # constraints ) nonzero solution WLOG E(Y) doesn’t divide Q(Y,Z 1,…,Z m ).

Proof of Expansion: Step 2  ( f,y ) = (y, f(y), (f h mod E)(y), …, (f h m-1 mod E)(y)) f = poly of degree · n-1, E = irreducible of degree n Thm: For A=q-nmh, K= h m, |T| · AK-1 ) |LIST(T)| · K-1. Step 1: 9 Q vanishing on T, deg · A-1 in Y, h-1 in Z i, E - Q Step 2: Every f 2 LIST(T) is a “root” of a related Q’. f(Y) 2 LIST(T) ) 8 y 2 F q Q(y, f(y), (f h mod E)(y), …, (f h m-1 mod E)(y)) = 0 ) Q(Y, f(Y), (f h mod E)(Y), …, (f h m-1 mod E)(Y))  0 ) Q(Y, f(Y), f(Y) h, …, f(Y) h m-1 )  0 (mod E(Y)) ) Q’(f) = 0 in F q [Y]/E(Y), where Q’(Z) = Q(Y,Z,Z h,…,Z h m-1 ) mod E(Y)

Proof of Expansion: Step 3  ( f,y ) = (y, f(y), (f h mod E)(y), …, (f h m-1 mod E)(y)) f = poly of degree · n-1, E = irreducible of degree n Thm: For A=q-nmh, K= h m, |T| · AK-1 ) |LIST(T)| · K-1. Step 1: 9 Q vanishing on T, deg · A-1 in Y, h-1 in Z i, E - Q Step 2: 8 f 2 LIST(T) Q’(f) = 0 where Q’(Z) = Q(Y,Z,Z h,…,Z h m-1 ) mod E(Y) Step 3: Show that deg(Q’) · K-1 Q’(Z) nonzero because Q(Y,Z 1,….,Z m ) not divisible by E(Y) & is of deg · h-1 in Z i deg(Q’(Z)) · h-1+(h-1) ¢ h+  +(h-1) ¢ h m-1 = h m -1 = K-1

Proof of Expansion: Wrap-Up  ( f,y ) = (y, f(y), (f h mod E)(y), …, (f h m-1 mod E)(y)) f = poly of degree · n-1, E = irreducible of degree n Thm: For A=q-nmh, K= h m, |T| · AK-1 ) |LIST(T)| · K-1. Step 1: 9 Q vanishing on T, deg · A-1 in Y, h-1 in Z i, E - Q Step 2: 8 f 2 LIST(T) Q’(f) = 0 where Q’(Z) = Q(Y,Z,Z h,…,Z h m-1 ) mod E(Y) Step 3: Show that deg(Q’) · K-1 Proof of Thm: |LIST(T)| · deg(Q’) · K-1. ¥

Our Result Thm: For every N, K,  >0, 9 explicit (K,A) expander with degree D = poly(log N, 1/  ) expansion A = (1-  ) ¢ D #right vertices M = D 2 ¢ K |  (S)|  A ¢ |S| D N M  S, |S|  K

Outline Expander Construction Application to Extractors Connections Conclusions

Extractors: Original Motivation [SV84,Vaz85,VV85,CG85,Vaz87,CW89,Zuc90,Zuc91] Randomization is pervasive in CS –Algorithm design, cryptography, distributed computing, … Typically assume perfect random source. –Unbiased, independent random bits –Unrealistic? Can we use a “weak” random source? –Source of biased & correlated bits. –More realistic model of physical sources. (Randomness) Extractors: convert a weak random source into an almost-perfect random source.

Applications of Extractors Derandomization of (poly-time/log-space) algorithms [Sip88,NZ93,INW94, GZ97,RR99, MV99,STV99,GW02] Distributed & Network Algorithms [WZ95,Zuc97,RZ98,Ind02]. Hardness of Approximation [Zuc93,Uma99,MU01,Zuc06] Data Structures [Ta02] Cryptography [BBR85,HILL89,CDHKS00,Lu02,DRS04,NV04] Metric Embeddings [Ind06]

Def: A (k,  ) -extractor is Ext : {0,1} n £ {0,1} d ! {0,1} m s.t. 8 k -source X, Ext ( X,U d ) is  -close to U m. 8 x Pr [ X = x ] · 2 -k Extractors [NZ93] d random bits “seed” Optimal (nonconstructive): d = log(n-k)+2log(1/  )+O(1) m = k+d-2log(1/  )-O(1) E XT k - source of length n m almost-uniform bits in variation distance

Our Result d random bits “seed” E XT k - source of length n m almost-uniform bits Thm: For every n, k,  >0, 9 explicit (k,  ) extractor with seed length d=O(log(n/  )) and output length m=.99k. Previously achieved by [LRVW03] –Only worked for  ¸ 1/n o(1) –Complicated recursive construction

Approach: Condensers [RR99,RSW00] d random bits “seed” C ON k - source of length n ¼ k’ - source of length m Def: A k !  k’ condenser is Con : {0,1} n £ {0,1} d ! {0,1} m s.t. 8 k -source X, Con ( X,U d )  -close to some k’- source. Can extract from output: easier if k’/m > k/n. Called lossless if k’=k+d.

2k2k Lossless Condensers  Expanders Lemma [TUZ01]: Con : {0,1} n £ {0,1} d ! {0,1} m is a k !  k+d condenser iff it defines a (2 k,(1-  ) ¢ 2 d ) expander. Proof ( ( ): Suffices to condense sources uniform on 2 k strings. Expansion ) can make 1-1 by moving  fraction of edges {0,1} n {0,1} m 2d2d ¸ (1-  )  2 d ¢ 2 k n - bit k - source ¼ m -bit ( k+d) - source d -bit seed C ON x Con(x,y) y

Our Condenser Thm: For every N, K,  >0, 9 explicit (K,A) expander with degree D = poly(log N, 1/  ) expansion A = (1-  ) ¢ D #right vertices M = D 2 ¢ K  ( f,y ) = (y, f(y), (f h mod E)(y), …, (f h m-1 mod E)(y)) Thm: For every n, k,  >0, 9 explicit k !  k+d condenser w/ seed length d = O(log n+log(1/  )) output length m=2d+1.01 ¢ k Con ( f,y ) = (y, f(y), (f h mod E)(y), …, (f h m-1 mod E)(y))

Our Extractor Condense: 9 explicit k !  k+d condenser w/ seed length d = O(log n+log(1/  )) output length m ¼ 1.01k Con ( f,y ) = (y, f(y), (f h mod E)(y), …, (f h m-1 mod E)(y)) Then Extract: apply extractor for min-entropy rate.99: Constant  –Ext(x,y) = y’th vertex on expander walk specified by x. –Extraction follows from Chernoff bound for expander walks [G98], via equivalence of extractors and samplers [Z96].

Our Extractor Condense: 9 explicit k !  k+d condenser w/ seed length d = O(log n+log(1/  )) output length m ¼ 1.01k Con ( f,y ) = (y, f(y), (f h mod E)(y), …, (f h m-1 mod E)(y)) Then Extract: apply extractor for min-entropy rate.99: Arbitrary  –Zuckerman’s extractor for constant min-entropy rate [Z96].

Variations on the Condenser Thm: 9 explicit k !  k+d condenser w/ seed length d = O(log n+log(1/  )) output length m ¼ 1.01k Con ( f,y ) = (y, f(y), (f h mod E)(y), …, (f h m-1 mod E)(y)) Variations (lose constant fraction of min-entropy): “Repeated roots” [GS99] in analysis –seed length d = log n+log(1/  )+O(1) –output length m = O(k ¢ log(n/  ))

Variations on the Condenser Thm: 9 explicit k !  k+d condenser w/ seed length d = O(log n+log(1/  )) output length m ¼ 1.01k Con ( f,y ) = (y, f(y), (f h mod E)(y), …, (f h m-1 mod E)(y)) Variations (lose constant fraction of min-entropy): E(Y) = Y q-1 - , for primitive root  [GR06] ) (f h i mod E)(y) = f (  i y) ) univariate analogue of Shaltiel-Umans extractor [SU01].

Outline Expander Construction Application to Extractors Connections Conclusions

Comparing List-Decoding Views  : {0,1} n £ {0,1} d ! {0,1} d £ {0,1} m T µ {0,1} d £ {0,1} m N=2 n,D=2 d,… ObjectInterpretation x 2 LIST(T) iffDecoding Problem expanders  x,y) = y ’th nbr of x 8 y  (x,y) 2 T |T| < AK ) |LIST(T)| < K list-decodable codes  x,y) = (y,ECC(x) y ) Pr y [  (x,y) 2 T] ¸ 1/2 m +  T = {(y,r y )} ) |LIST(T)| < K extractors Pr y [  (x,y) 2 T] ¸ |T|/2 m+d +  8 T |LIST(T)| < K lossy condensers Pr y [  (x,y) 2 T] ¸ |T|/2 m+d +  |T| · K’-1 ) |LIST(T)| · K

Outline Expander Construction Application to Extractors Connections Conclusions

List-decoding view ) best known constructions of –Highly unbalanced expanders –Lossless condensers –Randomness extractors Push it further? –Nonbipartite expanders –Direct construction of extractor –Extractors optimal up to additive constants –Better list-decodable codes