Presentation is loading. Please wait.

Presentation is loading. Please wait.

New extractors and condensers from Parvaresh- Vardy codes Amnon Ta-Shma Tel-Aviv University Joint work with Chris Umans (CalTech)

Similar presentations


Presentation on theme: "New extractors and condensers from Parvaresh- Vardy codes Amnon Ta-Shma Tel-Aviv University Joint work with Chris Umans (CalTech)"— Presentation transcript:

1 New extractors and condensers from Parvaresh- Vardy codes Amnon Ta-Shma Tel-Aviv University Joint work with Chris Umans (CalTech)

2 Plan -The problem - The GUV condenser - Our Variant of the GUV condenser - Concluding remarks

3 Extractor is a hash function E: {0,1} n x {0,1} t → {0,1} m

4 {0,1} n f Extractor is a hash function E: {0,1} n x {0,1} t → {0,1} m Input f  {0,1} n E(f,y) {0,1} m Seed y  {0,1} t Output in {0,1} m E y

5 {0,1} n f With the property that: E y E(f,y) {0,1} m

6 {0,1} n f With the property that:  X  {0,1} n of size 2 k E y E(f,y) {0,1} m

7 With the property that: {0,1} n f  X  {0,1} n of size 2 k E(X,U t )   U m E y E(f,y) {0,1} m

8 Parameters We hash n bits to fewer m bits, using t auxiliary truly random bits, s.t. any source with k “entropy” is mapped to a source ε close to uniform The entropy loss of the extractor is k-m Our goal to simultaneously minimize the seed length and the entropy loss.

9 Extractor’s best parameters Seed length Entropy lossRemarks Non-explicit & Lower bound O(log n/ε)2log(1/ε)+O(1) LRVW02O(log n)  (k) Constant ε GUV07O(log n/ε)  (k) Sub-constant ε DKSS09O(log n/ε)k/polylog(n)Sub-constant ε

10 Extractor’s best parameters Seed length Entropy lossRemarks Non-explicit & Lower bound O(log n/ε)2log(1/ε)+O(1) LRVW02O(log n)  (k) Constant ε GUV07O(log n/ε)  (k) Sub-constant ε DKSS09 We match the result With a direct construction O(log n/ε)k/polylog(n)Sub-constant ε

11 {0,1} n f Condenser is a hash function G: {0,1} n x {0,1} t → {0,1} m Input f  {0,1} n G(f,y) {0,1} m Seed y  {0,1} t Output in {0,1} m G y

12 {0,1} n f With the property that: G y G(f,y) {0,1} m

13 {0,1} n f With the property that:  X  {0,1} n of size 2 k G y G(f,y) {0,1} m

14 With the property that: {0,1} n f  X  {0,1} n of size 2 k G(X,U t ) is  close to having k’ entropy. G y G(f,y) {0,1} m

15 Parameters We hash n bits to fewer m bits, using t auxiliary truly random bits, s.t. any source with k “entropy” is mapped ε close to having k’ “entropy” The entropy loss of the condenser is k-k’ The entropy rate of the condenser is k’/m

16 Our goal Our goal is to simultaneously: minimize the seed length, minimize the entropy loss, and, maximize the entropy rate. o(k) entropy loss+ 1-o(1) entropy rate  Extractors with sub-linear entropy loss.

17 Condenser’s best parameters Seed lengthEntropy lossEntropy rate Non-explicit & Lower bound O(log n/ε)01-o(1) GUV07O(log n/ε)0Constant Our main resultO(log n/ε)k/log(n)1-1/log(n)

18 Lossless Condensers as unbalanced expanders {0,1} n {0,1} m x (y, w) edge (x,(y,w)) present if G(x,y) = w Any set of size 2 k expands to (1-  )·2 t ·2 k y

19 The GUV condenser

20 The basic condenser: G:  q n x  q   q qnqn f f(y) y The input: f   q n is interpreted as a degree n polynomial f(Y) over  q qq

21 The basic condenser: G:  q n x  q   q qnqn f f(y) y The input: f   q n is interpreted as a degree n polynomial f(Y) over  q qq The seed: y   q from the base field  q

22 The basic condenser: G:  q n x  q   q qnqn f f(y) y The input: f   q n is interpreted as a degree n polynomial f(Y) over  q qq The seed: y   q from the base field  q The output: An element in the base field  q

23 The basic condenser: G:  q n x  q   q qnqn f f(y) y The input: f   q n is interpreted as a degree n polynomial f(Y) over  q qq The seed: y   q from the base field  q The output: An element in the base field  q The standard way to view a RS code as a condenser. Encode, use the seed to choose a symbol from the encoded string.

24 The GUV condenser: G:  q n x  q  (  q ) m qnqn f (f 0 (y),..,f m-1 (y)) y The input: f   q n is interpreted as a degree n polynomial f(Y) over  q (q)m(q)m The seed: y   q from the base field  q The output: m elements in the base field  q

25 The GUV condenser: G:  q n x  q  (  q ) m qnqn f (f 0 (y),..,f m-1 (y)) y The input: f   q n is interpreted as a degree n polynomial f(Y) over  q (q)m(q)m The seed: y   q from the base field  q The output: m elements in the base field  q where: f k = f h k with operations in  q n

26 The GUV condenser: G:  q n x  q  (  q ) m qnqn f (f 0 (y),..,f m-1 (y)) y The input: f   q n is interpreted as a degree n polynomial f(Y) over  q The seed: y   q from the base field  q The output: m elements in the base field  q where: f k = f h k with operations in  q n The standard way to view a PV code as a condenser. Encode, use the seed to choose a symbol from the encoded string. (q)m(q)m

27 The PV curve C:  q n  (  q n ) m defined by C(f)=(f 0,..,f m-1 ) with f k = f h k operations are in  q n

28 The GUV condenser is an excellent lossless condenser … but has a bottleneck with the entropy rate

29 Analyzing GUV (simplified case) qnqn f (f 0 (y),..,f m-1 (y)) y Any S   q n of size h m (q)m(q)m has an image of size h m

30 Proof idea qnqn f (f 0 (y),..,f m-1 (y) y (q)m(q)m 1. Assume G(S) has size < h m

31 Proof idea qnqn f (f 0 (y),..,f m-1 (y) y (q)m(q)m 1. Assume G(S) has size < h m 2.Find non-zero Q(x 1,..,x m ) s.t. Each var has local deg < h Q(S)=0

32 Proof idea qnqn f (f 0 (y),..,f m-1 (y)) y 3. Prove that for all f  S Q(f,f h,..,f h m-1 )=0 (q)m(q)m 1. Assume G(S) has size < h m 2.Find non-zero Q(x 1,..,x m ) s.t. Each var has local deg < h Q(S)=0

33 Proof idea qnqn f (f 0 (y),..,f m-1 (y)) y 3. Prove that for all f  S Q(f,f h,..,f h m-1 )=0 (q)m(q)m 1. Assume G(S) has size < h m 2.Find non-zero Q(x 1,..,x m ) s.t. Each var has local deg < h Q(S)=0 4. Prove that R(f)= Q(f,f h,..,f h m-1 ) is a non-zero polynomial and conclude that |S| ≤ h m

34 Proof idea qnqn f (f 0 (y),..,f m-1 (y)) y 3. Prove that for all f  S Q(f,f h,..,f h m-1 )=0 (q)m(q)m 1. Assume G(S) has size < h m 2.Find non-zero Q(x 1,..,x m ) s.t. Each var has local deg < h Q(S)=0

35 Proof idea qnqn f (f 0 (y),..,f m-1 (y) y 3. Prove that for all f  S Q(f,f h,..,f h m-1 )=0 qmqm 1. Assume G(S) has size < h m 2.Find non-zero Q(x 1,..,x m ) s.t. Each var has local deg < h Q(S)=0 For every f  S, Q(f 0,..,f m-1 )(y) =Q(f 0 (y),..,f m-1 (y)) has: q roots (for each y in  q ) deg (Q(f 0,..,f m-1 )) < deg(Q)· n < hmn. Thus, if q>hmn, then Q(f 0,..,f m-1 )=0 in  q [Y] and therefore also in  q [Y] mod E.

36 Proof idea qnqn f (f 0 (y),..,f m-1 (y)) y 3. Prove that for all f  S Q(f,f h,..,f h m-1 )=0 (q)m(q)m 1. Assume G(S) has size < h m 2.Find non-zero Q(x 1,..,x m ) s.t. Each var has local deg < h Q(S)=0 4. Prove that R(f)= Q(f,f h,..,f h m-1 ) is a non-zero polynomial and conclude that |S| ≤ h m

37 Proof idea qnqn f (f 0 (y),..,f m-1 (y) y 3. Prove that for all f  S Q(f,f h,..,f h m-1 )=0 qmqm 1. Assume G(S) has size < h m 2.Find non-zero Q(x 1,..,x m ) s.t. Each var has local deg < h Q(S)=0 4. Prove that R(f)= Q(f,f h,..,f h m-1 ) is a non-zero polynomial and conclude that |S| ≤ h m As local degrees in Q are at most h, The coefficient of x 0 i 0..x m-1 i m-1 in Q(x 0,..,x m-1 ) is the same as the coefficient of f i in Q(f,f h,..,f h m-1 ) where (i 0,..,i m-1 ) is the base-h representation of i And so R is non-zero iff Q is.

38 The GUV condenser has constant entropy rate For the analysis to work we need q > hmn For logarithmic seed length we need q=poly(n). Thus, we must have q=h c for some c>1, and the entropy rate is constant. log(q m )= c log(h m ).

39 A remark The basic condenser also has constant entropy rate. For example the set of all squares in  q has as pre-image all square polynomials. So the entropy rate is ½.

40 To overcome the bottleneck [DW08],[DKSS09] Dvir showed a simple algebraic proof that every Kakeya set must be large. Dvir-Wigderson extended the technique to build better mergers, and from that better extractors. DKSS improved the result by using multiplicities.

41 Our variant of the GUV condenser

42 First modification A two stage PV construction

43 Two levels of extension We take the extension fields  p   q   q n Where: q=p 2 and  q =  p [Y] mod F, deg(F)=2, and, As before (  q ) n =  q [Z] mod E, deg(E)=n

44 Applying PV twice qnqn f (f 0 (a),..,f m-1 (a)) a The input: f   q n (q)m(q)m The seed: a   q b   p The output: m elements in  p (p)m(p)m (f 0 (a)(b),..,f m-1 (a)(b))

45 Applying PV twice qnqn f (f 0 (a),..,f m-1 (a)) a The input: f   q n (q)m(q)m The seed: a   q b   p The output: m elements in  p (p)m(p)m (f 0 (a)(b),..,f m-1 (a)(b)) Where: f i   q n is a deg n poly over  q f i (a)   q is a deg 2 poly over  p f i (a)(b)   p

46 Applying PV twice Similar to concatenated codes. Hash and then hash again. But, for the analysis to work we need to analyze the process as a whole.

47 Applying PV twice – Analysis (simplified case) qnqn f (f 0 (a),..,f m-1 (a)) a (q)m(q)m (p)m(p)m (f 0 (a)(b),..,f m-1 (a)(b)) 1. Assume G(S) has size < h m

48 Applying PV twice - Analysis qnqn f (f 0 (a),..,f m-1 (a)) a (q)m(q)m (p)m(p)m (f 0 (a)(b),..,f m-1 (a)(b)) 1. Assume G(S) has size < h m 2.Find non-zero Q(x 1,..,x m ) s.t. Each var has local deg < h Q(S)=0

49 Applying PV twice - Analysis qnqn f (f 0 (a),..,f m-1 (a)) a (q)m(q)m (p)m(p)m (f 0 (a)(b),..,f m-1 (a)(b)) 1. Assume G(S) has size < h m 2.Find non-zero Q(x 1,..,x m ) s.t. Each var has local deg < h Q(S)=0 3.  f  S,  a   q, Q(f 0 (a),..,f m-1 (a))=0, Provided that p> deg(Q)=hm.

50 Applying PV twice - Analysis qnqn f (f 0 (a),..,f m-1 (a)) a (q)m(q)m (p)m(p)m (f 0 (a)(b),..,f m-1 (a)(b)) 1. Assume G(S) has size < h m 2.Find non-zero Q(x 1,..,x m ) s.t. Each var has local deg < h Q(S)=0 3.  f  S,  a   q, Q(f 0 (a),..,f m-1 (a))=0, Provided that p> deg(Q)=hm. 4.  f  S, Q(f,f h,..,f h m-1 )=0, Provided that q=p 2 > n deg(Q)=nhm.

51 Applying PV twice - Analysis qnqn f (f 0 (a),..,f m-1 (a) a (q)m(q)m (p)m(p)m (f 0 (a)(b),..,f m-1 (a)(b)) 1. Assume G(S) has size < h m 2.Find non-zero Q(x 1,..,x m ) s.t. Each var has local deg < h Q(S)=0 3.  f  S,  a   q, Q(f 0 (a),..,f m-1 (a))=0, Provided that p> deg(Q)=hm. 4.  f  S, Q(f,f h,..,f h m-1 )=0, Provided that q=p 2 > n deg(Q)=nhm. 5. Prove that R(f)= Q(f,f h,..,f h m-1 ) is a non-zero polynomial and conclude that |S| ≤ h m

52 What did we gain? For the analysis to work we need: p > deg(Q)=hm **the key equation**, and, q = p 2 > n deg(Q) which translates to, p>n and is fine. Compare with p> deg(Q) n = hmn we had before. We still need to gain the m factor.

53 Massaging Deg(Q) To gain the m factor we need to Work with total degree, and, Work with multiplicities. We should choose Q that vanishes with multiplicity t on the set B=G(S), for some parameter t (t=m 2 ). and this would make the parameters optimal.

54 We now face a problem How do we know that Q(f,f h,..,f h m-1 )  0 is not the zero polynomial? The argument before used that Q has local degree at most h in each variable. The argument does not carry over for high (  ht = hm 2 ) total degree.

55 Second modification 1.A two stage PV construction 2.Change the curve C:  q n  (  q n ) m from the PV curve C k (f)= f h k to the “covering curve”. The covering curve has the property that deg(C i )= h m-1, and C:  p m → (  p ) m covers (  p ) m

56 Modifying the analysis. Q QChoose Q that vanishes with multiplicity t over B=G(S). |B|=(p/2) m. deg(Q)<pt/2. Q QQ has low degree, and so it cannot vanish with multiplicity t/2 over (  p ) m [DKSS]. The curve C covers (  p ) m and so Q cannot vanish with multiplicity t/2 over the curve. QThus, some t/2-derivative of Q : –does not vanish on the curve. –does vanish with multiplicity t/2 over B. Call this derivative Q and work with it.

57 Three modifications that work in concert 1.A two stage PV construction 2.Change the curve C:  q n  (  q n ) m from the PV curve C k (f)= f h k to the “covering curve”. 3. Use total degree and multiplicities plus a new argument to show that Q does not vanish over the curve.

58 Concluding remarks

59 A limit on the covering curve approach We want to argue that for every large set B there exists a Q of degree at most ht-1 that vanishes with multiplicity t on B and does not vanish on (  p ) m However, there exists a Kakeya set B of size about (p/2) m, s.t. any homogenous polynomial Q of degree at most pt-1 that vanishes with multiplicity t over B, vanishes over (  p ) m. Indeed we deal with sets B of size at most (p/2) m.

60 Open problems 1.Can another variant and/or analysis of GUV construct condensers with O(log n) entropy loss and O(log n) seed length? 2.Our results for condensers and extractors (and also previous constructions) work for error  ≥2 -log  n (for any constant  >0). Improve it to  =1/n. 3.Our construction for a condenser with  >0 error is not strong. Make it strong.

61 A step in a chain Early work: Extractors As hash functions Trevisan: Extractors as ECC with good distance TZS,SU,U: Extractors From RM code GUV: Condensers from RS,PV code This work: Condensers from PV 2 code, and a special curve What’s next?

62      ≤    >  ×≥   ρ    α      ≤    >  ×≥   


Download ppt "New extractors and condensers from Parvaresh- Vardy codes Amnon Ta-Shma Tel-Aviv University Joint work with Chris Umans (CalTech)"

Similar presentations


Ads by Google