Why Extractors? … Extractors, and the closely related “Dispersers”, exhibit some of the most “random-like” properties of explicitly constructed combinatorial.

Slides:



Advertisements
Similar presentations
Randomness Conductors Expander Graphs Randomness Extractors Condensers Universal Hash Functions
Advertisements

Walk the Walk: On Pseudorandomness, Expansion, and Connectivity Omer Reingold Weizmann Institute Based on join works with Michael Capalbo, Kai-Min Chung,
Randomness Conductors (II) Expander Graphs Randomness Extractors Condensers Universal Hash Functions
Pseudorandom Walks: Looking Random in The Long Run or All The Way? Omer Reingold Weizmann Institute.
Low-End Uniform Hardness vs. Randomness Tradeoffs for Arthur-Merlin Games. Ronen Shaltiel, University of Haifa Chris Umans, Caltech.
An Introduction to Randomness Extractors Ronen Shaltiel University of Haifa Daddy, how do computers get random bits?
Linear-Degree Extractors and the Inapproximability of Max Clique and Chromatic Number David Zuckerman University of Texas at Austin.
Randomness Extractors: Motivation, Applications and Constructions Ronen Shaltiel University of Haifa.
Extracting Randomness From Few Independent Sources Boaz Barak, IAS Russell Impagliazzo, UCSD Avi Wigderson, IAS.
How to get more mileage from randomness extractors Ronen Shaltiel University of Haifa.
Deterministic extractors for bit- fixing sources by obtaining an independent seed Ariel Gabizon Ran Raz Ronen Shaltiel Seedless.
Extracting Randomness David Zuckerman University of Texas at Austin.
Approximate List- Decoding and Hardness Amplification Valentine Kabanets (SFU) joint work with Russell Impagliazzo and Ragesh Jaiswal (UCSD)
Talk for Topics course. Pseudo-Random Generators pseudo-random bits PRG seed Use a short “ seed ” of very few truly random bits to generate a long string.
Simple extractors for all min- entropies and a new pseudo- random generator Ronen Shaltiel Chris Umans.
Expander Graphs, Randomness Extractors and List-Decodable Codes Salil Vadhan Harvard University Joint work with Venkat Guruswami (UW) & Chris Umans (Caltech)
List decoding and pseudorandom constructions: lossless expanders and extractors from Parvaresh-Vardy codes Venkatesan Guruswami Carnegie Mellon University.
Extractors: applications and constructions Avi Wigderson IAS, Princeton Randomness.
Derandomized parallel repetition theorems for free games Ronen Shaltiel, University of Haifa.
1 The Monte Carlo method. 2 (0,0) (1,1) (-1,-1) (-1,1) (1,-1) 1 Z= 1 If  X 2 +Y 2  1 0 o/w (X,Y) is a point chosen uniformly at random in a 2  2 square.
Randomized Algorithms Kyomin Jung KAIST Applied Algorithm Lab Jan 12, WSAC
Using Nondeterminism to Amplify Hardness Emanuele Viola Joint work with: Alex Healy and Salil Vadhan Harvard University.
Time vs Randomness a GITCS presentation February 13, 2012.
Randomness Extractors: Motivation, Applications and Constructions Ronen Shaltiel University of Haifa.
1 Algorithms for Large Data Sets Ziv Bar-Yossef Lecture 13 June 25, 2006
Yi Wu (CMU) Joint work with Parikshit Gopalan (MSR SVC) Ryan O’Donnell (CMU) David Zuckerman (UT Austin) Pseudorandom Generators for Halfspaces TexPoint.
1 Algorithms for Large Data Sets Ziv Bar-Yossef Lecture 12 June 18, 2006
Perfect and Statistical Secrecy, probabilistic algorithms, Definitions of Easy and Hard, 1-Way FN -- formal definition.
Derandomization: New Results and Applications Emanuele Viola Harvard University March 2006.
Constant Degree, Lossless Expanders Omer Reingold AT&T joint work with Michael Capalbo (IAS), Salil Vadhan (Harvard), and Avi Wigderson (Hebrew U., IAS)
ACT1 Slides by Vera Asodi & Tomer Naveh. Updated by : Avi Ben-Aroya & Alon Brook Adapted from Oded Goldreich’s course lecture notes by Sergey Benditkis,
Arithmetic Hardness vs. Randomness Valentine Kabanets SFU.
EXPANDER GRAPHS Properties & Applications. Things to cover ! Definitions Properties Combinatorial, Spectral properties Constructions “Explicit” constructions.
3-source extractors, bi-partite Ramsey graphs, and other explicit constructions Boaz barak rOnen shaltiel Benny sudakov avi wigderson Joint work with GUY.
Derandomizing LOGSPACE Based on a paper by Russell Impagliazo, Noam Nissan and Avi Wigderson Presented by Amir Rosenfeld.
1 Streaming Computation of Combinatorial Objects Ziv Bar-Yossef U.C. Berkeley Omer Reingold AT&T Labs – Research Ronen.
CS151 Complexity Theory Lecture 10 April 29, 2004.
1 A Universal Task: Finding Hay in a Haystack Given circuit C: {0,1} n →{0,1} with μ( C) ≥ ½, find x so that C(x)=1. Want: Algorithm polynomial in n and.
The Power of Randomness in Computation 呂及人中研院資訊所.
In a World of BPP=P Oded Goldreich Weizmann Institute of Science.
On the Complexity of Approximating the VC Dimension Chris Umans, Microsoft Research joint work with Elchanan Mossel, Microsoft Research June 2001.
Extractors with Weak Random Seeds Ran Raz Weizmann Institute.
Simulating independence: new constructions of Condensers, Ramsey Graphs, Dispersers and Extractors Boaz Barak Guy Kindler Ronen Shaltiel Benny Sudakov.
Stochastic Algorithms Some of the fastest known algorithms for certain tasks rely on chance Stochastic/Randomized Algorithms Two common variations – Monte.
RANDOMNESS AND PSEUDORANDOMNESS Omer Reingold, Microsoft Research and Weizmann.
Endre Szemerédi & TCS Avi Wigderson IAS, Princeton.
Extractors: applications and constructions Avi Wigderson IAS, Princeton Randomness Seeded.
When is Randomness Extraction Possible? David Zuckerman University of Texas at Austin.
Amplification and Derandomization Without Slowdown Dana Moshkovitz MIT Joint work with Ofer Grossman (MIT)
1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.
Extractors: applications and constructions Avi Wigderson IAS, Princeton Randomness.
My Favorite Ten Complexity Theorems of the Past Decade II Lance Fortnow University of Chicago.
Randomness Extraction Beyond the Classical World Kai-Min Chung Academia Sinica, Taiwan 1 Based on joint works with Xin Li, Yaoyun Shi, and Xiaodi Wu.
RANDOMNESS VS. MEMORY: Prospects and Barriers Omer Reingold, Microsoft Research and Weizmann With insights courtesy of Moni Naor, Ran Raz, Luca Trevisan,
List Decoding Using the XOR Lemma Luca Trevisan U.C. Berkeley.
Pseudo-random generators Talk for Amnon ’ s seminar.
Error-Correcting Codes and Pseudorandom Projections Luca Trevisan U.C. Berkeley.
Almost SL=L, and Near-Perfect Derandomization Oded Goldreich The Weizmann Institute Avi Wigderson IAS, Princeton Hebrew University.
Umans Complexity Theory Lecturess Lecture 11: Randomness Extractors.
Pseudorandomness: New Results and Applications Emanuele Viola IAS April 2007.
Complexity Theory and Explicit Constructions of Ramsey Graphs Rahul Santhanam University of Edinburgh.
Probabilistic Algorithms
Randomness and Computation
Pseudorandomness when the odds are against you
Pseudo-derandomizing learning and approximation
Extractors: Optimal Up to Constant Factors
Cryptography Lecture 5.
The Zig-Zag Product and Expansion Close to the Degree
The Weizmann Institute
On Derandomizing Algorithms that Err Extremely Rarely
Presentation transcript:

Why Extractors? … Extractors, and the closely related “Dispersers”, exhibit some of the most “random-like” properties of explicitly constructed combinatorial structures. In turn, extractors and dispersers have many applications in “removing randomness” in various settings, and in making randomized constructions explicit …

Santa Clause and his (Un)- Biased Elves The Story of Randomized Computations and Weak Random Sources

The Computational Tasks of Santa (and Atnas) Clause Sampling, Simulations, Algorithms (e.g. Approximated TSP). Distributed Computations Cryptography

Santa’s Source of Randomness A coin please …

But the North Pole is no Fairyland … A coin please …

Hey Santa, you can use my cat !! Thanks Erwin but I’ve grown attached to my elves … Pure Randomness in Nature?

Deterministic Extraction source of biased correlated bits almost uniform output E XT Assume b 1 b 2 … b i … are i.i.d. 0/1 variables and b i =1 with some probability p < 1 then translate Other “easy” sources: markov chains [vN51,Eli72,Blu84], two independent sources [SV84,Vaz85,CG85], bit-fixing sources [CGH+85,BBR85,BL85,LLS87,CDH+00], some efficiently samplable sources [TV00].

Can this Work for all Sources? If b 1 b 2 … b i … are 0/1 variables s.t. b i =1 with prob. p = p(b 1 b 2 … b i-1 )  [½- , ½+  ] cannot deterministically extract even a single bit !! A single SV-Source is sufficient to simulate BPP Can use even weaker sources [ChorGo88, CohenWi89, …]

Extractors [, 93 ] X has min-entropy k if  x Pr[X = x]  2 -k (i.e. no likely elements). Nonconstructive & optimal [NZ,RT] : extract all the randomness (i.e. m  k+d ) using d  log n truly random bits (  =.01 ) E XT Distribution on {0,1} n w/ k “bits of randomness” d truly random bits m bits distance  from uniform

Where Does the Seed Come From? If “truly” random bits exist but expensive... Sometimes we can just enumerate over all 2 d seeds: Let A be some probabilistic procedure and e an element from the weak random source. Run A(Ext(e,0…0)), …, A(Ext(e,1…1)) “combine” the outputs (majority, median, best, …). In particular: can simulate BPP using a weak source [Zuc90].

Weak Sources in (Space Bounced) Computations Thm [NZ93] Let A be a (randomized) space S machine (i.e. A can be in 2 s configurations). If A uses poly(S) random bits it can be fully derandomized in space O(S). Basic idea: Let A read a random 2S bit string x. Since A remembers at most S bits, x still contains (roughly) S bits of entropy (independent of A ’s state). Can recycle: G x,y x, Ext(x,y)

Applications of Extractors Randomized algorithms w/ weak random sources. Pseudorandom generators [NZ93,RR99,STV99] Randomness efficient sampling and deterministic amplification [Zuc97] Hardness of approximation [Zuc96,Uma99] Exposure-resilient cryptography [CDHKS00] Superconcentrators, sorting & selecting in rounds, highly expanding graphs [WZ93] Leader election [Zuc96, RZ98], List decodable error correcting codes [TZ00], and more [Sip88,GZ97, …]

Constructions of Extractors The “early days” [Zuc,NZ,WZ,GW,SZ,SSZ,NT,Zuc,TaS] Mainly hashing and various sorts of compositions. Some extractors: –[Zuc97] For k =  (n) can extract m=( 1 -  ) k bits using d =O ( log n/  ) –[NT98] For all k can get m=k and d = poly ( log n/  ) Other results in the high min-entropy case [GW], low min-entropy case [GW,SZ], dispersers [SSZ,TaS]

Constructions of Extractors (cont.) The “new age” [Tre99,RRVa,RRVb,ISW,RSW,RVW, TUZ] (Some) constructions of PRG from hard functions  extractors Ha yes... and there is a very nice one based on the NW generators Some more extractors [RSW]: f or all k, m=  (k) and d = log n polyloglog n or m=k/log k and d = O(log n)

Dispersers [Sipser 88] N=2 n M =2 m D =2 d |  (S)| > (1-  ) M  S, |S|=K=2 k Difference from Expanders: Typically M << N (farewell constant degree). Expansion to almost the entire right hand side.

Extractors imply Dispersers N=2 n ={0,1} n M =2 m ={0,1} m In fact we have the stronger property that  S, |S|=K=2 k and  T, x Ext(x,0…0) Ext(x,1…1) S T

A Construction in Search of Many Applications [WZ] N If G is a disperser (with  < 1/2 ) then  X, Y s.t. |X|=|Y|=K have at least one common neighbors. N M Y X G G Using similar ideas, [WZ93] get Superconcentrators, highly expanding graphs, and much more

Depth 2 Superconcentrators N  X, Y, t s.t. |X|=|Y|=t there exists t vertex-disjoint paths between X and Y. [WZ] A construction with N log 2 N edges. [RT] More carefully gives N log 2 N/loglog N edges. And this is essentially the only possible construction. N Y X

Some Conclusions Need randomness to extract randomness. Weak random sources appear naturally in computations. Expanders, Extractors and Dispersers are closely related combinatorial objects. Extractors are fascinating and very useful objects. Go home and build your own extractor …

Weak Sources in Computations Space bounded computations: A Space S (i.e. 2 s configuration) input random string (read once) (read only)