Download presentation
Presentation is loading. Please wait.
Published byPercival Ramsey Modified over 9 years ago
1
When is Randomness Extraction Possible? David Zuckerman University of Texas at Austin
2
Randomness in Computer Science Many uses of randomness in CS. – Randomized algorithms – Cryptography – Distributed computing But: Natural sources may be defective. – Clock drift, thermal noise, Zener diode.
3
What is minimal randomness requirement? Can we eliminate randomness completely? If not: – Can we minimize quantity of randomness? – Can we minimize quality of randomness? What does this mean?
4
What is minimal randomness requirement? Can we eliminate randomness completely? If not: – Can we minimize quantity of randomness? Pseudorandom generator – Can we minimize quality of randomness? Randomness extractor
5
Pseudorandom Numbers Computers rely on pseudorandom generators: PRG 71294 141592653589793238 short random string long “ random-enough ” string What does “ random enough ” mean?
6
Modern Approach to PRGs [Blum-Micali, Yao] Alg random pseudorandom ≈ same behavior Require PRG to “ fool ” all efficient algorithms.
7
Using Defective (Weak) Randomness Simulate randomized algorithms Stronger: extract high-quality randomness: Which models admit such extraction? Ext n bits m bits ≈ uniform
8
Simple example: extractor random bit Ext(x 1,…,x n ) = Parity(x 1,…,x n ) `bit-fixing’ distribution (don’t know where rand. bit is) 10100 Harder when input bits dependent.
9
Modeling General Weak Sources Source = random variable X on {0,1} n. Attempt #1: Shannon Entropy 9 Problem: D: with prob..99 0 n with prob..01 uniform on n bits Min-Entropy:
10
Min-Entropy X (n,k)-source: X on {0,1} n with min-entropy k. Min-entropy k iff all strings have probability ≤ 2 -k. Special Case: X uniform on set of size 2 k. General Case: Enough to handle special case (Chor-Goldreich 88). 10
11
Can Arise in Different Ways Physical source of randomness. Cryptography: condition on adversary ’ s information, e.g. bounded storage model. Pseudorandom generators (for space s machines): condition on TM configuration.
12
Goal: Extract Randomness Ext n bits m bits statistical error Problem: Impossible, even for k=n-1, m=1, ε<1/2.
13
Impossibility Proof Suppose f:{0,1} n {0,1} satisfies ∀ sources X with H ∞ (X) ≥ n-1, f(X) ≈ U. f -1 (0) f -1 (1) Take X=f -1 (0)
14
What if More Structure? Semirandom sources [Santha-Vazirani ‘84] – δ < Pr[X i |X 1 =x 1,…,X i-1 =x i-1 ] < 1-δ Extraction impossible. But can simulate randomized algorithms [Vazirani-Vazirani ‘85]. Can simulate even in general setting [Z ‘91].
15
Goal: Extract randomness with minimal assumptions on source distribution.
16
Outline Extractors for Structured Sources – Algebraic sources: bit-fixing, affine, additive – Complexity-theoretic sources Seeded Extractors – Gives simulation of randomized algorithms – Other applications Independent-Source Extractors Network extractor Protocols Conclusions
17
Extractors for Structured Sources Probabilistic Method: If ≤ sources of min-entropy k: Can extract m=(1-α)k bits with error 2 -αk/3. Algebraic sources: – Bit-fixing, affine, additive, polynomial, variety. Complexity-theoretic sources: – AC 0 sources, small-space sources. Independent sources.
18
Oblivious Bit-Fixing Source Example: ?0010?111??11. – ? = uniform on {0,1}. – (n-k) bits fixed by adversary; k uniform bits. – Parity extracts 1 bit. For k≥log c n, can extract k-o(k) bits [GRS, Rao]. Application: Exposure Resilient Cryptography. – Adversary learns many bits of secret key. – Can still do cryptography.
19
Non-Oblivious Bit-Fixing Source Adversarial bits may depend on random bits. – k uniform bits; (n-k) bits fixed by adversary. Parity fails even when k=n-1. Extraction impossible when k≤n-cn/log n. Majority extracts when k≥n-c√n. Ajtai-Linial: extractor for k≥n-cn/log 2 n.
20
Affine Source Random vector from (unknown) affine subspace. Generalizes oblivious bit-fixing sources. Large fields: dimension>0 [Gabizon-Raz 2005]. Over F 2 : extractor for min-entropy αn, any α>0 [Bourgain 2007]. New extractor for min-entropy k≥log c n [Li 2015, building on Chattopadhyay-Z 2015] Affine extractors used for other extractors. Gives circuit lower bound [Demenkov-Kulikov‘11]
21
Minimum additive structure? [Bhowmick-Gabizon-Le-Z 2015] Attempt 1: A is an additive set if |A+A|≤2|A| Additive source: uniform on additive set. Claim: No extractor f for such sources. Proof: A:= Larger of f -1 (0) and f -1 (1). |A+A|≤2|A|, but f(A) constant. For smaller A, intersect f -1 (0) with B: |B+B|≤2|B|. – |A+A|≤4|A|
22
Symmetric Sets A = subset of additive group G. SYM(A): elements of G that can be written in many ways as difference of elements of A. x= a 1 -b 1 = a 2 -b 2 =a 3 -b 3 =.. If A is a subgroup/subspace: Any x in A can be written in |A| ways.
23
Extractors for Additive Sources SYM 0.5 (A), {x in G | x can be written in |A|/2 ways as x= a-b, a,b in A} Dfn: A is an additive set if: -|A+A| ≤ |A| 1.1 -SYM 0.5 (A) > |A|/2 Thm [BGLZ]: For large p, any constant δ>0 : Explicit extractor for additive sources in Z p and (Z p ) n with entropy rate δ.
24
Complexity-Theoretic Sources X=f(Uniform), complexity(f) small. Deterministic extraction possible under assumptions [Trevisan-Vadhan ‘00]. No assumptions: – NC 0 [De-Watson ‘11, Viola ‘11] – AC 0 [Viola ‘11] – Proofs reduce to low-weight affine extractors [Rao ‘09].
25
Small Space Sources Space s source: min-entropy k source generated by width 2 s branching program. n+1 layers 110100 1/ , 0 1-1/ , 0 1,1 0.1,0 0.8,1 0.1,0 0.3,0 0.5,1 0.1,1 0.1,0 1 width 2 s
26
Bit Fixing Sources can be modelled by Space 0 sources ? 1 ? ? 0 1 0.5,1 0.5,0 1,11,01,1
27
Extractors for Small Space Sources For k ≥ n 1-δ, space n 1-3δ, can extract k-o(k) bits [Kamp-Rao-Vadhan-Z ‘06]. Proof idea: – Condition on intermediate states. – Reduces to variants of independent sources.
28
Seeded Extractor [Nisan-Z ‘93,…, Guruswami-Umans-Vadhan ’07,…] Ext n bits m =.99k bits statistical error d=O(log (n/ε)) random bit seed Y Strong extractor: (Ext(X,Y),Y) ≈ Uniform
29
Simulating Randomized Algorithms Randomized algorithm R using m random bits. Assume no high-quality randomness available. – Available random source X has H ∞ (X)≥k>m. Given extractor for H ∞ (X)≥k – seed length d=O(log n), output length m. Simulate with factor 2 d blowup: – Run R with random string Ext(x,y 1 ),…,Ext(x,y 2 d ). – Take majority vote or median.
30
Applications of Extractors PRGs for Space-Bounded Computation [Nisan-Z] PRGs for Random Sampling [Z] Cryptography [Lu, Vadhan, CDHKS, Dodis-Smith] Expander graphs and superconcentrators [Wigderson-Z] Coding theory [Ta-Shma- Z] Hardness of approximation [Z, Umans, Mossel-Umans] Efficient deterministic sorting [Pippenger] Time-space tradeoffs [Sipser] Data structures [Fiat-Naor, Z, BMRV, Ta-Shma]
31
Use in Privacy Amplification [Bennett, Brassard, Robert 1985] Goal: convert weak shared secret X to uniform secret. Unbounded passive adversary. public Pick Y Shared secret = Ext(X,Y). Correct by strong extractor definition.
32
Graph-Theoretic View: “Expansion” (1- )M K=2 k D=2 d N=2 n M=2 m Can use this to construct expanders beating eigenvalue bound [WZ] xy Ext(x,y) output uniform
33
Alternate View S BAD S D=2 d N=2 n M=2 m x Other direction: Error S ≤ |BAD S |2 -k + ε
34
Averaging Sampler via Alternate View [Z ‘96] Goal: Estimate mean μ of – Black box access to f. Algorithm: Pick x randomly in {0,1} n. Sample f at Γ(x) = {x 1,…,x D }. Output μ f. Pr[error > ε] = |BAD f |/2 n. Use 1.01m random bits: Pr[error >1/poly]=2 -Ω(m).
35
Independent Sources n bits Ext m =Ω(k) bits statistical error
36
2-Source Extractors Inner product extracts for min-entropy > n/2. Bourgain 2005: min-entropy.49n. Chattopadhyay-Z ‘15: min-entropy polylog(n) – Uses non-malleable extractors and extractors for non-oblivious bit-fixing sources.
37
Interleaved Sources Independent sources interleaved arbitrarily – e.g. X 1 X 2 Y 1 X 3 Y 2 Y 3 Y 4 X 4 Raz-Yehudayoff 2011: Extractor for min-entropy.99n each. Chattopadhyay-Z 2015:.99n and clog n. – Larger fields.51n and clog n. – Gives extractor for any-order small-space sources with min-entropy.51n. Gives lower bound on best-partition communication complexity.
38
Construction Idea Use 2-source extractor of form f(X+Y) in F p r. – e.g., Quadratic character in F p r. Find vectors v 1,…,v 2n in F p r with span of any n having dimension at least d. Want r lg p < 2n. Ext(z 1,…,z 2n ) = f(Σz i v i ) H ∞ (Σ’z i v i ) ≥ k–(n-d), where Σ’ is over i from X. – Same for Y.
39
Cryptography with Weak Sources Players have independent weak sources. Allow Byzantine faults. For 2 players, impossible [DOPS]. For more players, possible!
40
Network Extractor Protocol [Goldwasser-Sudan-Vaikunthanatan05, Dodis-Oliveira03] 010101010 01001 011011011 11010 100100101 10100 010100101 10110 011110101 11001 01010101 01001 001010101 01001 010111101 10101 Input: x 1,…,x p 2 {0,1} n from independent weak random sources Output: z 1,…,z p 2 {0,1} m private nearly-uniform random strings (for honest parties) Byzantine faults: can send arbitrary messages
41
Network Extractor Protocols After running network extractor protocol, run standard protocol, e.g., Byzantine Agreement. Naïve idea to design protocol: – A few players broadcast sources. – Remaining players apply independent-source extractor to those sources and own source. – Problem: what if only malicious players broadcast?
42
Network Extractor Constructions Information-theoretic setting [Kalai-Li-Rao-Z]: – For k ≥ exp(log α n), can still tolerate linear number of faults in BA and leader election, any α>0. Computational setting [Kalai-Li-Rao]: – Under certain crypto assumptions, for k = αn, secure multiparty computation if ≥ 2 honest players.
43
Conclusions Extraction possible for: – Algebraic: Oblivious bit-fixing; affine; additive. – Complexity: AC 0 ; small space. Extraction impossible for: – Non-oblivious bit-fixing (unless k>n - n/log 2 n). – SV sources. Can extract from general sources if add: – O(log n) uniform bits. – A second weak source.
44
Thank you!
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.