Download presentation
Presentation is loading. Please wait.
1
CS151 Complexity Theory Lecture 9 April 27, 2015
2
2 NW PRG NW: for fixed constant δ, G = {G n } with seed length t = O(log n) t = O(log m) running time n c m c output length m = n δ m error ε < 1/m fooling size s = m Using this PRG we obtain BPP = P –to fool size n k use G n k/δ –running time O(n k + n ck/δ )2 t = poly(n)
3
April 27, 20153 NW PRG First attempt: build PRG assuming E contains unapproximable functions Definition: The function family f = {f n }, f n :{0,1} n {0,1} is s(n)-unapproximable if for every family of size s(n) circuits {C n }: Pr x [C n (x) = f n (x)] ≤ ½ + 1/s(n).
4
April 27, 20154 One bit Suppose f = {f n } is s(n)-unapproximable, for s(n) = 2 Ω(n), and in E a “1-bit” generator family G = {G n }: G n (y) = y◦f log n (y) Idea: if not a PRG then exists a predictor that computes f log n with better than ½ + 1/s(log n) agreement; contradiction.
5
April 27, 20155 One bit Suppose f = {f n } is s(n)-unapproximable, for s(n) = 2 δn, and in E a “1-bit” generator family G = {G n }: G n (y) = y◦f log n (y) –seed length t = log n –output length m = log n + 1 (want n δ ) –fooling size s s(log n) = n δ –running time n c –error ε 1/ s(log n) = 1/ n δ
6
April 27, 20156 Many bits Try outputting many evaluations of f: G(y) = f(b 1 (y))◦f(b 2 (y))◦…◦f(b m (y)) Seems that a predictor must evaluate f(b i (y)) to predict i-th bit Does this work?
7
April 27, 20157 Many bits Try outputting many evaluations of f: G(y) = f(b 1 (y))◦f(b 2 (y))◦…◦f(b m (y)) predictor might notice correlations without having to compute f but, more subtle argument works for a specific choice of b 1 …b m
8
April 27, 20158 Nearly-Disjoint Subsets Definition: S 1,S 2,…,S m {1…t} is an (h, a) design if –for all i, |S i | = h –for all i ≠ j, |S i S j | ≤ a {1..t} S1S1 S2S2 S3S3
9
April 27, 20159 Nearly-Disjoint Subsets Lemma: for every ε > 0 and m < n can in poly(n) time construct an (h = log n, a = εlog n) design S 1,S 2,…,S m {1…t} with t = O(log n).
10
April 27, 201510 Nearly-Disjoint Subsets Proof sketch: –pick random (log n)-subset of {1…t} –set t = O(log n) so that expected overlap with a fixed S i is εlog n/2 –probability overlap with S i is > εlog n is at most 1/n –union bound: some subset has required small overlap with all S i picked so far… –find it by exhaustive search; repeat n times.
11
April 27, 201511 The NW generator f E s(n)-unapproximable, for s(n) = 2 δn S 1,…,S m {1…t} (log n, a = δlog n/3) design with t = O(log n) G n (y)=f log n (y |S 1 )◦f log n (y |S 2 )◦…◦f log n (y |S m ) 010100101111101010111001010 f log n : seed y
12
April 27, 201512 The NW generator Theorem (Nisan-Wigderson): G={G n } is a pseudo-random generator with: –seed length t = O(log n) –output length m = n δ/3 –running time n c –fooling size s = m –error ε = 1/m
13
April 27, 201513 The NW generator Proof: –assume does not ε-pass statistical test C = {C m } of size s: |Pr x [C(x) = 1] – Pr y [C( G n (y) ) = 1]| > ε –can transform this distinguisher into a predictor P of size s’ = s + O(m): Pr y [P(G n (y) 1 … i-1 ) = G n (y) i ] > ½ + ε/m
14
April 27, 201514 The NW generator Proof (continued): Pr y [P(G n (y) 1 … i-1 ) = G n (y) i ] > ½ + ε/m –fix bits outside of S i to preserve advantage: Pr y’ [P(G n ( y’ ) 1 … i-1 ) = G n ( y’ ) i ] > ½ + ε/m G n (y)=f log n (y |S 1 )◦f log n (y |S 2 )◦…◦f log n (y |S m ) 010100101111101010111001010 f log n : y ’ SiSi
15
April 27, 201515 The NW generator Proof (continued): –G n ( y’ ) i is exactly f log n (y’) –for j ≠ i, as vary y’, G n ( y’ ) j varies over 2 a values! –hard-wire up to (m-1) tables of 2 a values to provide G n ( y’ ) 1 … i-1 G n (y)=f log n (y |S 1 )◦f log n (y |S 2 )◦…◦f log n (y |S m ) 010100101111101010111001010 f log n : y ’ SiSi
16
April 27, 201516 The NW generator G n (y)=f log n (y |S 1 )◦f log n (y |S 2 )◦…◦f log n (y |S m ) 010100101111101010111001010 f log n : P output f log n (y ’) y’ size m + O(m) + (m-1)2 a < s(log n) = n δ advantage ε/m=1/m 2 > 1/s(log n) = n -δ contradiction hardwired tables
17
April 27, 201517 Worst-case vs. Average-case Theorem (NW): if E contains 2 Ω(n) -unapp- roximable functions then BPP = P. How reasonable is unapproximability assumption? Hope: obtain BPP = P from worst-case complexity assumption –try to fit into existing framework without new notion of “unapproximability”
18
April 27, 201518 Worst-case vs. Average-case Theorem (Impagliazzo-Wigderson, Sudan-Trevisan-Vadhan) If E contains functions that require size 2 Ω(n) circuits, then E contains 2 Ω(n) –unapp- roximable functions. Proof: –main tool: error correcting code
19
April 27, 201519 Error-correcting codes Error Correcting Code (ECC): C:Σ k Σ n message m Σ k received word R –C(m) with some positions corrupted if not too many errors, can decode: D(R) = m parameters of interest: –rate: k/n –distance: d = min m m’ Δ(C(m), C(m’)) C(m) R
20
April 27, 201520 Distance and error correction C is an ECC with distance d can uniquely decode from up to d/2 errors ΣnΣn d
21
April 27, 201521 Distance and error correction can find short list of messages (one correct) after closer to d errors! Theorem (Johnson): a binary code with distance (½ - δ 2 )n has at most O(1/δ 2 ) codewords in any ball of radius (½ - δ)n.
22
April 27, 201522 Example: Reed-Solomon alphabet Σ = F q : field with q elements message m Σ k polynomial of degree at most k-1 p m (x) = Σ i=0…k-1 m i x i codeword C(m) = (p m (x)) x F q rate = k/q
23
April 27, 201523 Example: Reed-Solomon Claim: distance d = q – k + 1 –suppose Δ(C(m), C(m’)) < q – k + 1 –then there exist polynomials p m (x) and p m’ (x) that agree on more than k-1 points in F q –polnomial p(x) = p m (x) - p m’ (x) has more than k-1 zeros –but degree at most k-1… –contradiction.
24
April 27, 201524 Example: Reed-Muller Parameters: t (dimension), h (degree) alphabet Σ = F q : field with q elements message m Σ k multivariate polynomial of total degree at most h: p m (x) = Σ i=0…k-1 m i M i {M i } are all monomials of degree ≤ h
25
April 27, 201525 Example: Reed-Muller M i is monomial of total degree h –e.g. x 1 2 x 2 x 4 3 –need # monomials (h+t choose t) > k codeword C(m) = (p m (x)) x (F q ) t rate = k/q t Claim: distance d = (1 - h/q)q t –proof: Schwartz-Zippel: polynomial of degree h can have at most h/q fraction of zeros
26
April 27, 201526 Codes and hardness Reed-Solomon (RS) and Reed-Muller (RM) codes are efficiently encodable efficient unique decoding? –yes (classic result) efficient list-decoding? –yes (RS on problem set)
27
April 27, 201527 Codes and Hardness Use for worst-case to average case: truth table of f:{0,1} log k {0,1} (worst-case hard) truth table of f’:{0,1} log n {0,1} (average-case hard) 01001010 m:m: 01001010 Enc(m): 00010
28
April 27, 201528 Codes and Hardness if n = poly(k) then f E implies f’ E Want to be able to prove: if f’ is s’-approximable, then f is computable by a size s = poly(s’) circuit
29
April 27, 201529 Codes and Hardness Key: circuit C that approximates f’ implicitly gives received word R Decoding procedure D “computes” f exactly 01100010 R: 01000 01001010 Enc(m): 00010 D C Requires special notion of efficient decoding
30
April 27, 201530 Codes and Hardness 01001010 m:m: 01001010 Enc(m): 00010 01100010 R: 01000 D C f:{0,1} log k {0,1} f ’:{0,1} log n {0,1} small circuit C approximating f’ decoding procedure i 2 {0,1} log k small circuit that computes f exactly f(i)
31
April 27, 201531 Encoding use a (variant of) Reed-Muller code concatenated with the Hadamard code –q (field size), t (dimension), h (degree) encoding procedure: –message m 2 {0,1} k –subset S µ F q of size h –efficient 1-1 function Emb: [k] ! S t –find coeffs of degree h polynomial p m :F q t ! F q for which p m (Emb(i)) = m i for all i (linear algebra) so, need h t ≥ k
32
April 27, 201532 Encoding encoding procedure (continued): –Hadamard code Had:{0,1} log q ! {0,1} q = Reed-Muller with field size 2, dim. log q, deg. 1 distance ½ by Schwartz-Zippel –final codeword: (Had(p m (x))) x 2 F q t evaluate p m at all points, and encode each evaluation with the Hadamard code
33
April 27, 201533 Encoding 01001010 m:m: Emb: [k] ! S t StSt FqtFqt p m degree h polynomial with p m (Emb(i)) = m i 57292103 836 0100 1010... evaluate at all x 2 F q t encode each symbol with Had:{0,1} log q ! {0,1} q
34
April 27, 201534 Decoding small circuit C computing R, agreement ½ + Decoding step 1 –produce circuit C’ from C given x 2 F q t outputs “guess” for p m (x) C’ computes {z : Had(z) has agreement ½ + with x-th block}, outputs random z in this set 01001010 Enc(m): 0001 01100010 R: 0100
35
April 27, 201535 Decoding Decoding step 1 (continued): –for at least /2 of blocks, agreement in block is at least ½ + /2 –Johnson Bound: when this happens, list size is S = O(1/ 2 ), so probability C’ correct is 1/S –altogether: Pr x [C’(x) = p m (x)] ≥ ( 3 ) C’ makes q queries to C C’ runs in time poly(q)
36
April 27, 201536 Decoding small circuit C’ computing R’, agreement ’ = ( 3 ) Decoding step 2 –produce circuit C’’ from C’ given x 2 emb(1,2,…,k) outputs p m (x) idea: restrict p m to a random curve; apply efficient R-S list-decoding; fix “good” random choices 57292103 836 pm:pm: 57699103 R’: 816
37
April 27, 201537 Restricting to a curve –points x= 1, 2, 3, …, r 2 F q t specify a degree r curve L : F q ! F q t w 1, w 2, …, w r are distinct elements of F q for each i, L i :F q ! F q is the degree r poly for which L i (w j ) = ( j ) i for all j Write p m (L(z)) to mean p m (L 1 (z), L 2 (z), …, L t (z)) p m (L(w 1 )) = p m (x) degree r ¢ h ¢ t univariate poly x= 1 22 33 rr
38
April 27, 201538 Restricting to a curve Example: –p m (x 1, x 2 ) = x 1 2 x 2 2 + x 2 –w 1 = 1, w 2 = 0 –L 1 (z) = 2z + 1(1-z) = z + 1 –L 2 (z) = 1z + 0(1-z) = z –p m (L(z)) = (z+1) 2 z 2 + z = z 4 + 2z 3 + z 2 + z FqtFqt 1 = (2,1) 2 = (1,0)
39
April 27, 201539 Decoding small circuit C’ computing R’, agreement ’ = ( 3 ) Decoding step 2 (continued): –pick random w 1, w 2, …, w r ; 2, 3, …, r to determine curve L –points on L are (r-1)-wise independent –random variable: Agr = |{z : C’(L(z)) = p m (L(z))}| –E[Agr] = ’q and Pr[Agr < ( ’q)/2] < O(1/( ’q)) (r-1)/2 57292103 836 pm:pm: 57699103 R’: 816
40
April 27, 201540 Decoding small circuit C’ computing R’, agreement ’ = ( 3 ) Decoding step 2 (continued): –agr = |{z : C’(L(z)) = p m (L(z))}| is ¸ ( ’q)/2 with very high probability –compute using Reed-Solomon list-decoding: {q(z) : deg(q) · r ¢ h ¢ t, Pr z [C’(L(z)) = q(z)] ¸ ( ’q)/2} –if agr ¸ ( ’q)/2 then p m (L( ¢ )) is in this set! 57292103 836 pm:pm: 57699103 R’: 816
41
April 27, 201541 Decoding Decoding step 2 (continued): –assuming ( ’q)/2 > (2r ¢ h ¢ t ¢ q) 1/2 –Reed-Solomon list-decoding step: running time = poly(q) list size S · 4/ ’ –probability list fails to contain p m (L( ¢ )) is O(1/( q)) (r-1)/2
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.