Local correlation breakers and applications Gil Cohen.

Slides:



Advertisements
Similar presentations
Unconditional Weak derandomization of weak algorithms Explicit versions of Yao s lemma Ronen Shaltiel, University of Haifa :
Advertisements

PRG for Low Degree Polynomials from AG-Codes Gil Cohen Joint work with Amnon Ta-Shma.
An Introduction to Randomness Extractors Ronen Shaltiel University of Haifa Daddy, how do computers get random bits?
Pseudorandomness from Shrinkage David Zuckerman University of Texas at Austin Joint with Russell Impagliazzo and Raghu Meka.
Deterministic Extractors for Small Space Sources Jesse Kamp, Anup Rao, Salil Vadhan, David Zuckerman.
Linear-Degree Extractors and the Inapproximability of Max Clique and Chromatic Number David Zuckerman University of Texas at Austin.
Randomness Extractors: Motivation, Applications and Constructions Ronen Shaltiel University of Haifa.
Extracting Randomness From Few Independent Sources Boaz Barak, IAS Russell Impagliazzo, UCSD Avi Wigderson, IAS.
Foundations of Cryptography Lecture 7 Lecturer:Danny Harnik.
Pseudorandomness from Shrinkage David Zuckerman University of Texas at Austin Joint with Russell Impagliazzo and Raghu Meka.
How to get more mileage from randomness extractors Ronen Shaltiel University of Haifa.
Deterministic extractors for bit- fixing sources by obtaining an independent seed Ariel Gabizon Ran Raz Ronen Shaltiel Seedless.
Extracting Randomness David Zuckerman University of Texas at Austin.
Approximate List- Decoding and Hardness Amplification Valentine Kabanets (SFU) joint work with Russell Impagliazzo and Ragesh Jaiswal (UCSD)
Simple extractors for all min- entropies and a new pseudo- random generator Ronen Shaltiel Chris Umans.
May 5, 2010 MSRI 1 The Method of Multiplicities Madhu Sudan Microsoft New England/MIT TexPoint fonts used in EMF. Read the TexPoint manual.
Gillat Kol joint work with Ran Raz Locally Testable Codes Analogues to the Unique Games Conjecture Do Not Exist.
Lecture 3: Source Coding Theory TSBK01 Image Coding and Data Compression Jörgen Ahlberg Div. of Sensor Technology Swedish Defence Research Agency (FOI)
Chapter 10 Shannon’s Theorem. Shannon’s Theorems First theorem:H(S) ≤ L n (S n )/n < H(S) + 1/n where L n is the length of a certain code. Second theorem:
1 Adam O’Neill Leonid Reyzin Boston University A Unified Approach to Deterministic Encryption and a Connection to Computational Entropy Benjamin Fuller.
Gillat Kol (IAS) joint work with Ran Raz (Weizmann + IAS) Interactive Channel Capacity.
Bounds on Code Length Theorem: Let l ∗ 1, l ∗ 2,..., l ∗ m be optimal codeword lengths for a source distribution p and a D-ary alphabet, and let L ∗ be.
NON-MALLEABLE EXTRACTORS AND SYMMETRIC KEY CRYPTOGRAPHY FROM WEAK SECRETS Yevgeniy Dodis and Daniel Wichs (NYU) STOC 2009.
Derandomized parallel repetition theorems for free games Ronen Shaltiel, University of Haifa.
1 Algorithms for Large Data Sets Ziv Bar-Yossef Lecture 13 June 25, 2006
1 Algorithms for Large Data Sets Ziv Bar-Yossef Lecture 12 June 18, 2006
3-source extractors, bi-partite Ramsey graphs, and other explicit constructions Boaz barak rOnen shaltiel Benny sudakov avi wigderson Joint work with GUY.
Estimating Set Expression Cardinalities over Data Streams Sumit Ganguly Minos Garofalakis Rajeev Rastogi Internet Management Research Department Bell Labs,
1 Streaming Computation of Combinatorial Objects Ziv Bar-Yossef U.C. Berkeley Omer Reingold AT&T Labs – Research Ronen.
The moment generating function of random variable X is given by Moment generating function.
Zero-Fixing Extractors for Sub-Logarithmic Entropy Joint with Igor Shinkar Gil Cohen.
Extractors with Weak Random Seeds Ran Raz Weizmann Institute.
Simulating independence: new constructions of Condensers, Ramsey Graphs, Dispersers and Extractors Boaz Barak Guy Kindler Ronen Shaltiel Benny Sudakov.
Extractors against classical and quantum adversaries AmnonTa-Shma Tel-Aviv University.
Conditional Topic Random Fields Jun Zhu and Eric P. Xing ICML 2010 Presentation and Discussion by Eric Wang January 12, 2011.
1 Part 5 Response of Linear Systems 6.Linear Filtering of a Random Signals 7.Power Spectrum Analysis 8.Linear Estimation and Prediction Filters 9.Mean-Square.
New extractors and condensers from Parvaresh- Vardy codes Amnon Ta-Shma Tel-Aviv University Joint work with Chris Umans (CalTech)
Why Extractors? … Extractors, and the closely related “Dispersers”, exhibit some of the most “random-like” properties of explicitly constructed combinatorial.
1 Two-point Sampling. 2 X,Y: discrete random variables defined over the same probability sample space. p(x,y)=Pr[{X=x}  {Y=y}]: the joint density function.
Private Approximation of Search Problems Amos Beimel Paz Carmi Kobbi Nissim Enav Weinreb (Technion)
Notes for self-assembly of thin rectangles Days 19, 20 and 21 of Comp Sci 480.
Notes on the optimal encoding scheme for self-assembly Days 10, 11 and 12 Of Comp Sci 480.
THEORY The argumentation was wrong. Halting theorem!
Binomial Theorem & Binomial Expansion
When is Randomness Extraction Possible? David Zuckerman University of Texas at Austin.
1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.
Extractors: applications and constructions Avi Wigderson IAS, Princeton Randomness.
Randomness Extraction Beyond the Classical World Kai-Min Chung Academia Sinica, Taiwan 1 Based on joint works with Xin Li, Yaoyun Shi, and Xiaodi Wu.
Constructing Ramsey Graphs Gil Cohen (or Two-source dispersers for polylog-entropy and improved Ramsey graphs)
Derandomized Constructions of k -Wise (Almost) Independent Permutations Eyal Kaplan Moni Naor Omer Reingold Weizmann Institute of ScienceTel-Aviv University.
Pseudo-random generators Talk for Amnon ’ s seminar.
New Results of Quantum-proof Randomness Extractors Xiaodi Wu (MIT) 1 st Trustworthy Quantum Information Workshop Ann Arbor, USA 1 based on work w/ Kai-Min.
Does Privacy Require True Randomness? Yevgeniy Dodis New York University Joint work with Carl Bosley.
Chebyshev’s Inequality Markov’s Inequality Proposition 2.1.
Almost SL=L, and Near-Perfect Derandomization Oded Goldreich The Weizmann Institute Avi Wigderson IAS, Princeton Hebrew University.
Umans Complexity Theory Lecturess Lecture 11: Randomness Extractors.
Additive Combinatorics in Theoretical Computer Science Shachar Lovett (UCSD)
Theory of Computational Complexity Probability and Computing Ryosuke Sasanuma Iwama and Ito lab M1.
Non-malleable Reductions and Applications Divesh Aggarwal * Yevgeniy Dodis * Tomasz Kazana ** Maciej Obremski ** Non-Malleable Codes from Two-Source Extractors.
Unit IV Finite Word Length Effects
Information Complexity Lower Bounds
Sampling of min-entropy relative to quantum knowledge Robert König in collaboration with Renato Renner TexPoint fonts used in EMF. Read the TexPoint.
PRODUCT MOMENTS OF BIVARIATE RANDOM VARIABLES
Objectives Multiply polynomials.
General Expectation So far we have considered expected values separately for discrete and continuous random variables only. This separation is somewhat.
Pseudo-derandomizing learning and approximation
The Curve Merger (Dvir & Widgerson, 2008)
Non-Malleable Extractors New tools and improved constructions
Non-Malleable Extractors
CS151 Complexity Theory Lecture 10 May 2, 2019.
Presentation transcript:

Local correlation breakers and applications Gil Cohen

Breaking correlations X Y X f(X,Y) The “breaking pairwise correlations” problem:

Breaking correlations The “breaking pairwise correlations” problem: * Yet, for applications in mind we do not have truly random bits. * Cannot be done deterministically. * A strengthening of an object used in [Li13].

Local correlation breakers (LCBs)

* Local correlation breakers * Applications * Mergers with weak-seeds * 3-source extractors * The LCB construction Roadmap * 2-source non-malleable extractors

[Ta-Shma96, LuReingoldVadhanWigderson03, Raz05, DvirShpilka07, Zuckerman07, DvirRaz08, DvirWigderson11, DvirKoppartySarafSudan09] * Existential argument works for Mergers with weak-seeds * Cannot be done deterministically. (n,k)

Theorem. There exists an explicit merger with weak-seeds for Mergers with weak-seeds via LCBs

* Local correlation breakers * Applications * Mergers with weak-seeds * 3-source extractors Roadmap * 2-source non-malleable extractors * The LCB construction

multi-source extractors [ChorGoldreich88, BarakImpagliazzoWigderson06, Bourgain05, Raz05, BarakKindlerShaltielSudakovWigderson05, Rao09, Li11, Li13, Li15] * Explicit 2-source extractors: * Explicit 3-source extractors: + lower exponent

Roadmap * The LCB construction * Seeded extractors * Two-steps look-ahead extractors * The construction

[NisanZuckerman96, …, Trevisan01, RazReingoldVadhan99, Ta-ShmaZuckermanSafra02, Shaltiel Umans01, GuruswamiUmansVadhan09, DvirKoppartySarafWigderson09, Ta-ShmaUmans12] * E is called strong if E(X,S) is uniform for almost all fixings S=s. Seeded extractors * Thou shalt have enough entropy in the source. * Thou shalt have a uniform seed. * Thou shalt not use correlated source and seed.

Hierarchy of independence W1W1 W2W2 WrWr Y AB

W1W1 W2W2 WrWr Y AB

W1W1 W2W2 WrWr Y AB * A of a uniform row is uniform.

Hierarchy of independence AB W1W1 W2W2 WrWr Y * B of a uniform row is uniform even given all A’s. * A of a uniform row is uniform.

[DziembowskiPietrzak07, DodisWichs09] A = E(Y,S ) Y T = E(W,A) B = E(Y,T) W 2-steps look-ahead extractors LA(W,Y) = (A,B) S

Theorem [DziembowskiPietrzak07]. Let W 1 be uniform and W 2 arbitrarily correlated with W 1. Let Y be an independent random variable. Let (A 1, B 1 ) = LA(W 1,Y), (A 2, B 2 ) = LA(W 2,Y). 2-steps look-ahead extractors [DziembowskiPietrzak07, DodisWichs09] Then, B 1 is uniform (even) given W 1, W 2, A 1, A 2.

A 1 = E(Y,S 1 ) Y W1W1 S1S1 W2W2 S2S2 A 2 = E(Y,S 2 ) T 1 = E(W 1,A 1 ) T 2 = E(W 2,A 2 ) B 1 = E(Y,T 1 ) B 2 = E(Y,T 2 ) 2-steps look-ahead extractors [DziembowskiPietrzak07, DodisWichs09]

A 1 = E(Y,s 1 ) Y W1W1 s1s1 W2W2 S2S2 A 2 = E(Y,S 2 ) T 1 = E(W 1,A 1 ) T 2 = E(W 2,A 2 ) B 2 = E(Y,T 2 ) Fixed 2-steps look-ahead extractors [DziembowskiPietrzak07, DodisWichs09] B 1 = E(Y,T 1 )

A 1 = E(Y,s 1 ) Y W1W1 s1s1 W2W2 s2s2 A 2 = E(Y,s 2 ) T 1 = E(W 1,A 1 ) T 2 = E(W 2,A 2 ) B 2 = E(Y,T 2 ) Fixed 2-steps look-ahead extractors [DziembowskiPietrzak07, DodisWichs09] Fixed B 1 = E(Y,T 1 )

a 1 = E(Y,s 1 ) Y W1W1 s1s1 W2W2 s2s2 A 2 = E(Y,s 2 ) T 1 = E(W 1,a 1 ) T 2 = E(W 2,A 2 ) B 2 = E(Y,T 2 ) Fixed 2-steps look-ahead extractors [DziembowskiPietrzak07, DodisWichs09] Fixed B 1 = E(Y,T 1 ) Fixed

a 1 = E(Y,s 1 ) Y W1W1 s1s1 W2W2 s2s2 a 2 = E(Y,s 2 ) T 1 = E(W 1,a 1 ) T 2 = E(W 2,a 2 ) B 2 = E(Y,T 2 ) Fixed 2-steps look-ahead extractors [DziembowskiPietrzak07, DodisWichs09] Fixed B 1 = E(Y,T 1 ) Fixed

a 1 = E(Y,s 1 ) Y W1W1 s1s1 W2W2 s2s2 a 2 = E(Y,s 2 ) t 1 = E(W 1,a 1 ) T 2 = E(W 2,a 2 ) B 2 = E(Y,T 2 ) Fixed 2-steps look-ahead extractors [DziembowskiPietrzak07, DodisWichs09] Fixed B 1 = E(Y,t 1 ) Fixed

Roadmap * The LCB construction * Seeded extractors * Two-steps look-ahead extractors * The construction

X1X1 AB W’ 1 = E(X 1,B 1 ) W’ 2 = E(X 2,A 2 ) W’ 3 = E(X 3,A 3 ) A’B’ A’’B’’ X2X2 X3X3 Z 1 = E(X 1,A’’ 1 ) Z 2 = E(X 2,A’’ 2 ) Z 3 = E(X 3,B’’ 3 ) W’’ 1 = E(X 1,A’ 1 ) W’’ 2 = E(X 2,B’ 2 ) W’’ 3 = E(X 3,A’ 3 ) 3-LCB for 3 rows Y W1W1 W2W2 W3W3 (A 1, B 1 ) = LA(W 1,Y) (A 2, B 2 ) = LA(W 2,Y) (A 3, B 3 ) = LA(W 3,Y) (A’ 1, B’ 1 ) = LA(W’ 1,Y) (A’ 2, B’ 2 ) = LA(W’ 2,Y) (A’ 3, B’ 3 ) = LA(W’ 3,Y) (A’’ 1, B’’ 1 ) = LA(W’’ 1,Y) (A’’ 2, B’’ 2 ) = LA(W’’ 2,Y) (A’’ 3, B’’ 3 ) = LA(W’’ 3,Y) (Z 1,Z 2,Z 3 ) = LCB((X 1,X 2,X 3 ),Y)

X1X1 AB W’ 1 = E(X 1,B 1 ) W’ 2 = E(X 2,A 2 ) W’ 3 = E(X 3,A 3 ) A’B’ A’’B’’ X2X2 X3X3 Z 1 = E(X 1,A’’ 1 ) Z 2 = E(X 2,A’’ 2 ) Z 3 = E(X 3,B’’ 3 ) W’’ 1 = E(X 1,A’ 1 ) W’’ 2 = E(X 2,B’ 2 ) W’’ 3 = E(X 3,A’ 3 ) 3-LCB for 3 rows Y W1W1 W2W2 W3W3 (Z 1,Z 2,Z 3 ) = LCB((X 1,X 2,X 3 ),Y)

X1X1 AB W’ 1 = E(X 1,B 1 ) W’ 2 = E(X 2,A 2 ) W’ 3 = E(X 3,A 3 ) A’B’ A’’B’’ X2X2 X3X3 Z 1 = E(X 1,A’’ 1 ) Z 2 = E(X 2,A’’ 2 ) Z 3 = E(X 3,B’’ 3 ) W’’ 1 = E(X 1,A’ 1 ) W’’ 2 = E(X 2,B’ 2 ) W’’ 3 = E(X 3,A’ 3 ) 3-LCB for 3 rows Y W1W1 W2W2 W3W3 (Z 1,Z 2,Z 3 ) = LCB((X 1,X 2,X 3 ),Y)

X1X1 AB W’ 1 = E(X 1,B 1 ) W’ 2 = E(X 2,A 2 ) W’ 3 = E(X 3,A 3 ) A’B’ A’’B’’ X2X2 X3X3 Z 1 = E(X 1,A’’ 1 ) Z 2 = E(X 2,A’’ 2 ) Z 3 = E(X 3,B’’ 3 ) W’’ 1 = E(X 1,A’ 1 ) W’’ 2 = E(X 2,B’ 2 ) W’’ 3 = E(X 3,A’ 3 ) 3-LCB for 3 rows Y W1W1 W2W2 W3W3 (Z 1,Z 2,Z 3 ) = LCB((X 1,X 2,X 3 ),Y) The assumption on the input is maintained

X1X1 AB W’ 1 = E(X 1,B 1 ) W’ 2 = E(X 2,A 2 ) W’ 3 = E(X 3,A 3 ) A’B’ A’’B’’ X2X2 X3X3 Z 1 = E(X 1,A’’ 1 ) Z 2 = E(X 2,A’’ 2 ) Z 3 = E(X 3,B’’ 3 ) W’’ 1 = E(X 1,A’ 1 ) W’’ 2 = E(X 2,B’ 2 ) W’’ 3 = E(X 3,A’ 3 ) 3-LCB for 3 rows Y W1W1 W2W2 W3W3 (Z 1,Z 2,Z 3 ) = LCB((X 1,X 2,X 3 ),Y)

X1X1 AB W’ 1 = E(X 1,B 1 ) W’ 2 = E(X 2,A 2 ) W’ 3 = E(X 3,A 3 ) A’B’ A’’B’’ X2X2 X3X3 Z 1 = E(X 1,A’’ 1 ) Z 2 = E(X 2,A’’ 2 ) Z 3 = E(X 3,B’’ 3 ) W’’ 1 = E(X 1,A’ 1 ) W’’ 2 = E(X 2,B’ 2 ) W’’ 3 = E(X 3,A’ 3 ) 3-LCB for 3 rows Y W1W1 W2W2 W3W3 (Z 1,Z 2,Z 3 ) = LCB((X 1,X 2,X 3 ),Y) The good row gains its independence when given the lead

X1X1 AB W’ 1 = E(X 1,B 1 ) W’ 2 = E(X 2,A 2 ) W’ 3 = E(X 3,A 3 ) A’B’ A’’B’’ X2X2 X3X3 Z 1 = E(X 1,A’’ 1 ) Z 2 = E(X 2,A’’ 2 ) Z 3 = E(X 3,B’’ 3 ) W’’ 1 = E(X 1,A’ 1 ) W’’ 2 = E(X 2,B’ 2 ) W’’ 3 = E(X 3,A’ 3 ) 3-LCB for 3 rows Y W1W1 W2W2 W3W3 (Z 1,Z 2,Z 3 ) = LCB((X 1,X 2,X 3 ),Y)

X1X1 AB W’ 1 = E(X 1,B 1 ) W’ 2 = E(X 2,A 2 ) W’ 3 = E(X 3,A 3 ) A’B’ A’’B’’ X2X2 X3X3 Z 1 = E(X 1,A’’ 1 ) Z 2 = E(X 2,A’’ 2 ) Z 3 = E(X 3,B’’ 3 ) W’’ 1 = E(X 1,A’ 1 ) W’’ 2 = E(X 2,B’ 2 ) W’’ 3 = E(X 3,A’ 3 ) 3-LCB for 3 rows Y W1W1 W2W2 W3W3 (Z 1,Z 2,Z 3 ) = LCB((X 1,X 2,X 3 ),Y) The independence is preserved when other rows are given the lead

Reducing the number of rounds B A B A B A …

A B B A Use arbitrary cuts in a “flip-flop”. …

Reducing the number of rounds A B B A Use a sequence of log(r) cuts such that for any two distinct vertices there is a cut that separates them. Use arbitrary cuts in a “flip-flop”.

* We’ve introduced and constructed LCBs. Summary and problem problems * Applications: * Mergers with weak-seeds with double-logarithmic entropy. * 3-source extractors with one double-logarithmic entropy source. A possible future research direction * Improved two-source extractors - perhaps further ideas can be used to remove the need for the third loglog(n)-entropy source. Thank you! * 2-source non-malleable extractors.