XOR lemmas & Direct Product thms - Many proofs Avi Wigderson IAS, Princeton ’82 Yao ’87 Levin ‘89 Goldreich-Levin ’95 Impagliazzo ‘95 Goldreich-Nisan-Wigderson.

Slides:



Advertisements
Similar presentations
Hardness Amplification within NP against Deterministic Algorithms Parikshit Gopalan U Washington & MSR-SVC Venkatesan Guruswami U Washington & IAS.
Advertisements

Unconditional Weak derandomization of weak algorithms Explicit versions of Yao s lemma Ronen Shaltiel, University of Haifa :
Linear-Degree Extractors and the Inapproximability of Max Clique and Chromatic Number David Zuckerman University of Texas at Austin.
Russell Impagliazzo ( IAS & UCSD ) Ragesh Jaiswal ( Columbia U. ) Valentine Kabanets ( IAS & SFU ) Avi Wigderson ( IAS ) ( based on [IJKW08, IKW09] )
Extracting Randomness From Few Independent Sources Boaz Barak, IAS Russell Impagliazzo, UCSD Avi Wigderson, IAS.
Direct Product : Decoding & Testing, with Applications Russell Impagliazzo (IAS & UCSD) Ragesh Jaiswal (Columbia) Valentine Kabanets (SFU) Avi Wigderson.
Pseudorandomness from Shrinkage David Zuckerman University of Texas at Austin Joint with Russell Impagliazzo and Raghu Meka.
Approximate List- Decoding and Hardness Amplification Valentine Kabanets (SFU) joint work with Russell Impagliazzo and Ragesh Jaiswal (UCSD)
Talk for Topics course. Pseudo-Random Generators pseudo-random bits PRG seed Use a short “ seed ” of very few truly random bits to generate a long string.
Simple extractors for all min- entropies and a new pseudo- random generator Ronen Shaltiel Chris Umans.
Uniform Hardness vs. Randomness Tradeoffs for Arthur-Merlin Games. Danny Gutfreund, Hebrew U. Ronen Shaltiel, Weizmann Inst. Amnon Ta-Shma, Tel-Aviv U.
Applied Algorithmics - week7
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Locally Decodable Codes from Nice Subsets of Finite Fields and Prime Factors of Mersenne Numbers Kiran Kedlaya Sergey Yekhanin MIT Microsoft Research.
CS151 Complexity Theory Lecture 8 April 22, 2004.
Circuit Complexity and Derandomization Tokyo Institute of Technology Akinori Kawachi.
Hardness amplification proofs require majority Ronen Shaltiel University of Haifa Joint work with Emanuele Viola Columbia University June 2008.
Derandomized parallel repetition theorems for free games Ronen Shaltiel, University of Haifa.
Using Nondeterminism to Amplify Hardness Emanuele Viola Joint work with: Alex Healy and Salil Vadhan Harvard University.
Time vs Randomness a GITCS presentation February 13, 2012.
CS151 Complexity Theory Lecture 7 April 20, 2004.
Perfect and Statistical Secrecy, probabilistic algorithms, Definitions of Easy and Hard, 1-Way FN -- formal definition.
Derandomization: New Results and Applications Emanuele Viola Harvard University March 2006.
ACT1 Slides by Vera Asodi & Tomer Naveh. Updated by : Avi Ben-Aroya & Alon Brook Adapted from Oded Goldreich’s course lecture notes by Sergey Benditkis,
Arithmetic Hardness vs. Randomness Valentine Kabanets SFU.
CS151 Complexity Theory Lecture 7 April 20, 2015.
The Goldreich-Levin Theorem: List-decoding the Hadamard code
EXPANDER GRAPHS Properties & Applications. Things to cover ! Definitions Properties Combinatorial, Spectral properties Constructions “Explicit” constructions.
Derandomizing LOGSPACE Based on a paper by Russell Impagliazo, Noam Nissan and Avi Wigderson Presented by Amir Rosenfeld.
Private Information Retrieval. What is Private Information retrieval (PIR) ? Reduction from Private Information Retrieval (PIR) to Smooth Codes Constructions.
CS151 Complexity Theory Lecture 8 April 22, 2015.
CS151 Complexity Theory Lecture 10 April 29, 2004.
Hardness amplification proofs require majority Emanuele Viola Columbia University Work done at Harvard, IAS, and Columbia Joint work with Ronen Shaltiel.
Approximate List- Decoding and Uniform Hardness Amplification Russell Impagliazzo (UCSD) Ragesh Jaiswal (UCSD) Valentine Kabanets (SFU)
1 High noise regime Desire code C : {0,1} k  {0,1} n such that (1/2-  ) fraction of errors can be corrected (think  = o(1) )  Want small n  Efficient.
CS151 Complexity Theory Lecture 9 April 27, 2004.
1 On the Power of the Randomized Iterate Iftach Haitner, Danny Harnik, Omer Reingold.
GOING DOWN HILL : EFFICIENCY IMPROVEMENTS IN CONSTRUCTING PSEUDORANDOM GENERATORS FROM ONE-WAY FUNCTIONS Iftach Haitner Omer Reingold Salil Vadhan.
Randomness – A computational complexity view Avi Wigderson Institute for Advanced Study.
CS151 Complexity Theory Lecture 9 April 27, 2015.
Ragesh Jaiswal Indian Institute of Technology Delhi Threshold Direct Product Theorems: a survey.
The Power and Weakness of Randomness (when you are short on time) Avi Wigderson School of Mathematics Institute for Advanced Study.
On Constructing Parallel Pseudorandom Generators from One-Way Functions Emanuele Viola Harvard University June 2005.
Direct-product testing, and a new 2-query PCP Russell Impagliazzo (IAS & UCSD) Valentine Kabanets (SFU) Avi Wigderson (IAS)
Using Nondeterminism to Amplify Hardness Emanuele Viola Joint work with: Alex Healy and Salil Vadhan Harvard University.
Some Fundamental Insights of Computational Complexity Theory Avi Wigderson IAS, Princeton, NJ Hebrew University, Jerusalem.
Fall 2013 CMU CS Computational Complexity Lectures 8-9 Randomness, communication, complexity of unique solutions These slides are mostly a resequencing.
Polynomials Emanuele Viola Columbia University work partially done at IAS and Harvard University December 2007.
Umans Complexity Theory Lectures Lecture 17: Natural Proofs.
Norms, XOR lemmas, and lower bounds for GF(2) polynomials and multiparty protocols Emanuele Viola, IAS (Work partially done during postdoc at Harvard)
Forrelation: A Problem that Optimally Separates Quantum from Classical Computing.
Pseudorandom Bits for Constant-Depth Circuits with Few Arbitrary Symmetric Gates Emanuele Viola Harvard University June 2005.
List Decoding Using the XOR Lemma Luca Trevisan U.C. Berkeley.
Hardness amplification proofs require majority Emanuele Viola Columbia University Work also done at Harvard and IAS Joint work with Ronen Shaltiel University.
Pseudo-random generators Talk for Amnon ’ s seminar.
Error-Correcting Codes and Pseudorandom Projections Luca Trevisan U.C. Berkeley.
Almost SL=L, and Near-Perfect Derandomization Oded Goldreich The Weizmann Institute Avi Wigderson IAS, Princeton Hebrew University.
Umans Complexity Theory Lecturess Lecture 11: Randomness Extractors.
Pseudorandomness: New Results and Applications Emanuele Viola IAS April 2007.
Pseudo-randomness. Randomized complexity classes model: probabilistic Turing Machine –deterministic TM with additional read-only tape containing “coin.
Umans Complexity Theory Lectures
Pseudorandomness when the odds are against you
Pseudorandom bits for polynomials
Cryptography Lecture 12 Arpita Patra © Arpita Patra.
Indistinguishability by adaptive procedures with advice, and lower bounds on hardness amplification proofs Aryeh Grinberg, U. Haifa Ronen.
Emanuele Viola Harvard University June 2005
CS151 Complexity Theory Lecture 10 May 2, 2019.
Switching Lemmas and Proof Complexity
On Derandomizing Algorithms that Err Extremely Rarely
Stronger Connections Between Circuit Analysis and Circuit Lower Bounds, via PCPs of Proximity Lijie Chen Ryan Williams.
Presentation transcript:

XOR lemmas & Direct Product thms - Many proofs Avi Wigderson IAS, Princeton ’82 Yao ’87 Levin ‘89 Goldreich-Levin ’95 Impagliazzo ‘95 Goldreich-Nisan-Wigderson ’97 Impagliazzo-Wigderson ‘99 Sudan-Trevisan-Vadhan ’03 Trevisan ’06 Impagliazzo-Jaiswal-Kabanets ‘07 Impagliazzo-Jaiswal-Kabanets-Wigderson

Hardness Amplification f: U  {0,1} (e.g U={0,1} n ), C (complexity) class of functions suc(f,C) = max c  C Pr x  U [c(x)=f(x)] Assume suc(f,C) ≤ 1-δ. How can we make f harder? Compute f on k independent copies! XOR: f  k : U k  {0,1} f  k (x 1, x 2, …, x k ) = f(x 1 )  f(x 2 )  …  f(x k ) XOR Lemma: suc(f  k,C’) ≤ ½+ε Direct Product: f (k) : U k  {0,1} k f (k) (x 1, x 2, …, x k ) = (f(x 1 ), f(x 2 ), …, f(x k )) Direct Product Theorem: suc(f (k),C’) ≤ ε Information theory intuition Prob guessing f(X) ≤ 1-δ Prob guessing XOR = ½+(1-2δ) k Prob guessing all = (1-δ) k Hope: ε = exp(-δk)

XOR vs. Direct Product XOR Lemma: suc(f,C) ≤ 1-δ  suc(f  k,C’) ≤ ½+ε DP Theorem: suc(f,C) ≤ 1-δ  suc(f (k),C’) ≤ ε Morally, the two conclusions are equivalent!Thm[Goldreich-Levin] suc(f (k),C’’) ≤ ε 2  suc(f (  2k),C’) ≤ ε C’’ = Majority  C’ [Majority of poly(k,1/ε,1/δ) circuits from C’] Thm[Viola-Wigderson] suc(f  k,C’’) ≤ ½+ε  suc(f (3k),C’) ≤ ε- exp(-k) C’’ = Parity  C’

Proof #1 [Levin, Goldreich-Nisan-Wigderson] DP Theorem: suc(f,C) ≤ 1-δ  suc(f (k),C’) ≤ ε DP Theorem: suc(f (k),C’) ≥ ε  suc(f,C) ≥ 1-δ Given c’ such that for random x=(x 1, x 2, …, x k ) ε = (1-δ/2) k ≤ Pr[c’(x 1, x 2, …, x k ) = (f(x 1 ), f(x 2 ), …, f(x k ))] = = Π i Pr[c’(x) i = f(x i ) | E i ] where E i = ∧ j<i c’(x) i = f(x i ) Observe: for all i, Pr[E i ] ≥ ε for some i Pr[c’(x) i = f(x i ) | E i ] ≥1-δ/2 For z  U Let x(z,i) be a random x with z replacing x i c repeats t=(log 2/δ)/ε times: on input z simulate c’(x(z,i)). If E i holds then output c’(x(z,i)) i else output “fail”. Observe: Pr[“fail”] ≤ δ/2 Pr[c(z)≠f(z) | not “fail”] ≤ δ/2 c uses tk values of f (nonuniform). |c| ~ t|c’|. C = Or  C’

Coding theory view [Impagliazzo, Trevisan] DP Theorem: suc(f,C) ≤ 1-δ  suc(f (k),C’) ≤ ε DP Theorem: suc(f (k),C’) ≥ ε  suc(f,C) ≥ 1-δ Encoding Message f (k)  f Noise  (≤1-ε errors) c’  c (≤δ errors) Decoding Local decoding: c = A f,c’ A is an efficient (prob) algorithm List decoding: c  {c 1, c 2, … c t } = A f,c’ t ≥ 1/ε [Rudich] DP code: lousy rate, pathetic distance, large alphabet But we must understand it! Focus on list size & rate

Proof #2 [Impagliazzo] DP Theorem: suc(f,C) ≤ 1-δ  suc(f (k),C’) ≤ ε DP Theorem: suc(f (k),C’) ≥ ε  suc(f,C) ≥ 1-δ Hard-core set Theorem: Assume suc(f,C) ≤ 1-δ. Then there exists a subset H  U, |H| > δ|U|, such that suc H (f,C’) ≤ ½+ε, where C= Majority  C’. Corollary: Assume suc(f,C) ≤ 1-δ. Then there exists a distribution f H on functions which is ε-indistingushable to circuits in C’. f H (x)=$ if x  H and f H (x)=f(x) otherwise. Then suc(f (k),C’) ≤ suc(f H (k),C’) + kε ≤ exp(-δk) + exp(-δk) + kε hybrid Chernoff

Proof #2 [Impagliazzo] DP Theorem: suc(f,C) ≤ 1-δ  suc(f (k),C’) ≤ ε DP Theorem: suc(f (k),C’) ≥ ε  suc(f,C) ≥ 1-δ Hard-core set Theorem: Assume suc(f,C) ≤ 1-δ. Then there exists a subset H  U, |H| > δ|U|, such that suc H (f,C’) ≤ ½+ε, where C= Majority  C’. Corollary: Sufficient to prove suc(f (k),C’) ≥ ε  suc H (f,C’) ≥ ½+ε for every such H. Claim: Assume ε>1/δk, Pr[c’(x) = (f(x 1 ), f(x 2 ), …, f(x k ))] > ε. Then for every such H there exist i,j  [k], predicate g Pr H [f(x i )=g(c’(x) i,c’(x) j, f(x j ))] ≥ ½+ε (try first H=U) Bad news: ε is very suboptimal Good news: Analysis works for pairwise independent x 1,x 2, …, x k

Derandomization [Impagliazzo] DP Theorem: suc(f (k),C’) ≥ ε  suc(f,C) ≥ 1-δ A “generator” G:{0,1} s  U k fools the DP theorem (with k,ε,δ) if suc(f (k) G,C’) ≥ ε  suc(f,C) ≥ 1-δ Theorem [Impagliazzo]: A t-wise independent generator fools the DP theorem with ε = (1/δk) t Corollary: Polynomial rate code for t=O(1).

Proof #3 [Impagliazzo-Wigderson] DP Theorem: suc(f,C) ≤ 1-δ  suc(f (k),C’) ≤ ε DP Theorem: suc(f (k),C’) ≥ ε  suc(f,C) ≥ 1-δ Corollary to HC Theorem: Sufficient to prove suc(f (k),C’) ≥ ε  suc H (f,C’) ≥ ½+ε for every H  U, |H|> δ|U|. Claim: Assume Pr[c’(x) = (f(x 1 ), f(x 2 ), …, f(x k ))] ≥ ε. Then for every such H there exist i  [k], predicate g such that Pr H [f(x i )=g(c’(x) -i,, f(x -i ))] ≥ ½+ε-exp(-δk). Theorem: For k=n=log |U|, δ =1/3, there is an efficient generator with seed O(n) for ε = exp(-n). Corollary: Polynomial rate code with optimal ε. Corollary: E requires exp( Ω (n)) circuits  BPP=P.

Proof #3 [Impagliazzo-Wigderson] Claim: Assume Pr[c’(x) = (f(x 1 ), f(x 2 ), …, f(x k ))] ≥ ε. Then for every such H there exist i  [k], predicate g such that Pr H [f(x i )=g(c’(x) -i,, f(x) -i )] ≥ ½+ε-exp(-δk). Focus on H=U. B i = c’(x) i  f(x i ) B=(B 1,B 2, …, B k ). q m = Pr[wt(B) =m]. q 0 ≥ ε. Task: For random i, guess B i from B -i Claim: The exists a (prob) g s.t. p=Pr[g(B -i )=B i ] ≥ ½+ε-2 -k/3. Proof: Let w=wt(B -i ). g(B -i )=0 with prob. 2 -w, and $ otherwise. Let m=wt(B). Then p-½ = Σ m q m [ ((k-m)/k)2 -m - (m/k)2 -m+1 ] = = Σ m q m ((k-3m)/k)2 -m ≥ ε-2 -k/3 For H, i random s.t. x i  H. Same g yields p ≥ ½+ε-2 -k/3 Derandomization: Generate x -i from x i : “hitting” H, “know” f(x) -i

Proof #4 [Impagliazzo-Jaiswal-Kabanets-Wigderson] Uniform DP Theorem: suc(f (k),C’) ≥ ε  suc(f,C) ≥ 1-δ via a PPT algorithm A, s.t. A(C’)=C. It is best to think of C’ as taking k-subsets (as opposed to k- vectors) of inputs. Thus, the assumption is that for a random subset B of k inputs, Pr[C’(B) = f (k) (B)] ≥ ε A picks a random k-subset B 0, and a random (k/2)-subset S of B 0, and let r=C’(B 0 )| S (r is the set of answers C’ gives on S). The circuit C, on input x, will try 100(log 1/δ)/ε times the following till the first success (if no success, output default): Pick a random k-set B containing S and x. If C’(B)| S =r then output C’(B)| x Claim: Pr[C(x) = f(x)] ≥ 1-δ for ε = exp(-δk). Proof: Symmetry arguments. Derandomization: polynomial rate code, k= √ n, ε = exp(- √ n)