Top Banner
1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin UT Austin
48

1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

Jan 17, 2016

Download

Documents

Myrtle Glenn
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

1

Explicit Two-Source Extractors and Resilient Functions

Eshan Chattopadhyay David ZuckermanUT Austin UT Austin

Page 2: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

2

Randomness in Computation

• Randomness widely used:

• Algorithms: Randomized algorithms can dramatically outperform known deterministic algorithms.

• Distributed Computing, Cryptography, Data Structures etc.

• Applications: require uniform uncorrelated bits.

• Cryptographic tasks: bit commitment, ZK, NIZK etc cannot work with even ‘almost’ random bits [DOPS04].

• Most randomized algorithms: analysis assumes uniform, uncorrelated bits.

2

Page 3: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

3

Weak Random Sources

• Natural sources may be defective.

• Clock drift, thermal noise, Zener diode

• Weak sources arise in cryptography:

• Condition on adversary’s information.

• Weak sources arise in pseudorandom generators:

• Condition on state of computation.

• Goal: Purify weak source.

3

Page 4: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

4

Some Simple Models

• von Neumann 51: Sequence of independent, biased coin flips.

• Blum 84: Sequence of bits produced by a Markov chain.

• Sanha-Vazirani Sources ’84: Each new bit is almost uniform conditioned on the previous bits.

Page 5: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

5

Modelling a Weak Random Sources

Problem:

Modelling a weak source:

Shannon Entropy:

D: with prob. 0.99 0n, with prob 0.01 uniform on n bits

Min-Entropy:

Page 6: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

6

Min-Entropy

X

• X: (n,k)-source (Chor-Goldreich ’88)

• A source on n bits with min-entropy at least k.

• All strings have probability ≤ 2-k.

• Special Case: X uniform on set of size 2k.

• General Case: Enough to deal with special case (Chor-Goldreich 88).

Page 7: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

7

Randomness Extractors

• Extractor: deterministic procedure to extract uniform bits from ANY (n,k)-source.

X

Page 8: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

8

One Source Extractor ?

X

Lemma. There cannot exist such a function.

Ext-1(0) Ext-

1(1)

Proof Idea:Assume Ext.

max|Ext-1(0)|, |Ext-

1(1)|≥2n-1.

Page 9: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

9

Getting past this difficulty

• Make assumptions on weak source:

• Bit-fixing sources, Affine sources, Samplable sources etc.

• Without making assumptions:

• Seeded Extractors: Extract using a short uniform seed.

• Extract using ≥ 2 independent weak source.

• Focus of this talk.

Page 10: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

10

Outline

• Introduction and Results

• Extractors: Seeded, Two-Source

• Ramsey Graphs

• Techniques

• Reduction to ‘generalized’ bit-fixing sources

• Extracting using a resilient function

• Conclusion and Open Questions

Page 11: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

11

2-Source Extractor

X

Y

X, Y are independent (n,k)-sources

More formally,

Page 12: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

12

Existence of 2-Source Extractors

Thm.(Probabilistic method)∃ 2-source extractor for min-entropy k = log n+O(1).

Naive Derandomization: Exponential time.

In fact, a random function is a good 2-source extractor withwith high probability.

Page 13: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

13

Explicit Constructions of Pseudorandom Objects

• Central theme in complexity theory: constructing deterministic objects with strong combinatorial properties.

• Generic goal: black-box ways of reducing randomness requirements in algorithms using such objects.

• Some other examples: hard functions, expanders, pseudorandom generators, error correcting codes.

Constructing explicit extractors is part of a bigger project.

Final goal: BPP=P?

Page 14: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

14

Explicit Constructions?

Thm.(Probabilistic method)∃ 2-source extractor for min-entropy k = log n+O(1).

Santha-Vazirani 86, Chor-Goldreich 88: Explicit 2-source extractor?

Reference k1 k2

[Chor-Goldreich 88]

>0.5n >0.5n

[Bourgain 05] ≥0.49n 0.49n

[Raz 05] >0.5n O(log n)

Explicit Constructions: X : (n,k1), Y: (n,k2)

Page 15: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

15

Relaxation to More Sources

• Barak-Impaggliazzo-Wigderson 04: Explicit extractors for constant number of (n,k)-sources with min-entropy δn.

• Rao 06: Explicit extractors for constant number of (n,k)-sources with min-entropy nɣ.

• Li 11: Explicit extractor for 3 sources at n0.51 min-entropy.

• Li 15: Explicit extractor for 3 sources at logC(n) min-entropy.

Page 16: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

16

Matrix Formulation

‘Efficiently’ construct a low discrepancy Boolean N×N matrix: i.e, Every K×K submatrix contains ‘almost equal’ number of 0’s and 1’s.

N=2n, K=2k

11

0 0

0

00

1

1

1

1

Truth table of a 2-source extractor Our 2-source extractor

thus implies such low discrepancy matrices.

Page 17: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

17

Our Main Result

Thm.(Main theorem) Explicit 2-source extractor for k=logCn.

Page 18: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

18

Explicit 2-Source Extractors

Reference k1 k2 Output Length

Chor-Goldreich

88>0.5n >0.5n 1 bit

Zuckerman 91

>0.5n >0.5n Ω(n)

Bourgain 05 ≥0.499n ≥0.499n Ω(n)

Raz 05 >0.5n ≥O(log n) Ω(n)

Chattopadhyay-

Zuckerman 15

≥logCn ≥logCn 1 bit

Li 15 ≥logCn ≥logCn 0.9k1

Page 19: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

19

Ramsey Theory

As a corollary of explicit 2-source extractors, we obtain new results in the area of Ramsey Theory.

Ramsey Theory: Branch of combinatorics that studies conditions under which there is unavoidable presence of local structure.

Page 20: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

20

Ramsey Graphs

Erdos (1947): Existence of K-Ramsey graphs on N vertices for K> (2+o(1)) log N.

Bipartite K-Ramsey graph: Bipartite graph with no complete or empty K×K sub-graph.

K-Ramsey graph: No independent set or clique of size K.

Explicit Constructions?

Page 21: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

21

Ramsey Graphs via 2-Source Extractor

NN

N=2n, K=2k

KKX

Y

Ext: 2-source extractor for min-entropy k

abExt(a,b)=1

Ext(c,d)=0 dc

Page 22: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

22

Explicit Ramsey GraphsReference K Bipartite

Erdös 47 (existential) ≥ 2 log N Yes

Hadamard Matrix √N Yes

Frankl-Wilson81, Naor92, Alon98, Grolmusz00, Ba, Gop

2Ω(√(log N log log N)) No

Pudlak-Rödl 04 √N/2√log N Yes

Barak-Kindler-Shaltiel-Sudakov-Wigderson 10

No(1) Yes

Barak-Rao-Shaltiel-Wigderson 12 2(log N)o(1) Yes

Cohen 15 2(log log N)C Yes

[CZ15] 2(log log N)C Yes

(N=2n, K=2k)

Page 23: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

23

Matching Erdos’ Challenge

• The exponent C in our work is 75.

• Subsequent refinement by Meka makes C=10.

• Open to get C=1 and earn $100!

Page 24: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

24

Techniques

Page 25: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

25

Strong Seeded Extractors[Nisan-Z 93]

Ext:0,1n×0,1d→0,1m

X: (n,k)-source

Ext(X, Ud ), Ud ≈ε Um, Ud

Explicit Construction: d=O(log(n/ε)), m=.99k.

[…Guruswami-Umans-Vadhan 07…]

Thus for most seeds s:Ext(X,s) ≈ Um.

Page 26: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

26

Resilient Function

(q,ε)-resilient function: For any subset of q co-ordinates, probability f is fixed on uniform sampling of the remaining co-ordinates is ≥1-ε.

Example: MAJORITY is (n0.49,ε)-resilient.

f: 0,1n→0,1

PARITY is NOT (q, ε)-resilient for any q>0, ε <1.

Page 27: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

27

A Preliminary Attempt

X: (n,k)-source

Z’

Z’i = Ext(X,si)

(1-ε) fraction of the bits in Z’ are uniform

Majority

b

Does not work: The uniform bits are arbitrarily correlated

Ext:0,1n × 0,1d 0,1: Strong-seeded extractor

Min-entropy k, error ε.

Bad bit: Depends on good bits.

D=2d=(n/ε)O(1)

Page 28: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

28

• Most t-tuples of seeds (s1,s2,....,st) satisfy a t-independence property:

Ext(X, s1), Ext(X, s2),....,Ext(X, st) ≈ U tm.

t-Non-malleable Extractors

Page 29: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

29

A Second Attempt

Use a t-non-malleable extractor from Chattopadhyay-Goyal-Li 15.

X: (n,k)-source

Z’i = nmExt(X,si)

Z’

Majority

b

Idea: Make the uniform bits almost t-wise independent

Does not work: >D0.5 bad bits.(not surprisingly! since we have 1 source)

D=(n/ε)poly(t, log(n/ε))

Page 30: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

30

Our Approach: A Very High Level Idea

• Step 1: Use X and Y to construct Z on D=nO(1) bits such that ≥(D -D0.99) bits are uniform and polylog-wise independent.

• Step 2: An explicit function that extracts from Z.

Page 31: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

31

Z’Z’i = nmExt(X,si)

The good bits of Z are almost t-wise independent

Idea: Sample a pseudorandom subset T of [D] using Y.

# of bad indices ≤ εD

X: (n,k)-source

X

Executing Step 1

D=(n/ε)poly(t, log(n/ε))

Page 32: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

32

Z’Z’i = nmExt(X,si)

D=2poly(t, log(n/ε))

Pseudorandom Subset: T= Ext(Y,r1),...,Ext(Y,rM), M = 2O(log(n/ε’))

indices in T

No. of bad indices in T: (ε+ε’)M<M0.99

Executing Step 1

An alternate way of achieving this is by modifying a construction by Li.

Z=Z’T

Page 33: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

33

No. of bad indices < M0.99 The good bits of Z are (t=polylog(M))-wise independent.

MZ

∧ ∧∧ ∧∨∨∨

Executing Step 2

Step 2a: Good bits can be assumed to uniform, independent

Page 34: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

34

Easy to Check if a Monotone function is Fixed

Z

∧ ∧∧ ∧∨∨∨

Page 35: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

35

Z

∧ ∧∧ ∧∨∨∨

Limited Independence fools Small Circuits!

Page 36: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

36

Z

∧ ∧∧ ∧∨∨∨

Thus, we can assume good bits are independent, uniform.

Executing Step 2

Page 37: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

37

∧ ∧∧ ∧∨∨∨

Executing Step 2

Remaining Task:

Explicit construction of a monotone C in AC0 on M bits s.t:(1) C is (M1-δ,ε)-resilient and(2) almost unbiased.

Page 38: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

38

∧ ∧∧ ∧∨∨∨

Executing Step 2

Remaining Task:

We construct such a C by derandomizing Ajtai-Linial.

Ajtai-Linial function (Probabilistic): Resilient to coalitions of size O(n/log2 n).

Page 39: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

39

Ajtai-Linial FunctionTribes function:

AL Function: T1∧T2........∧Tn

Resilient to coalitions of size O(n/log2 n).

(2) Not Monotone.

(1) Probabilistic: Naive derandomization takes time nO(n2).Problems:

∧ ∧∧ ∧

n

Ti: randomly-negated Tribes on randomly chosen partitions.

Page 40: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

40

Derandomizing Ajtai-Linial

Key Ingredient: An explicit construction of a collection of partitions of [n] s.t:

(1) Any small subset of [n] has small intersection with most partitions.

(2) The partitions are pairwise pseudorandom:- the intersection of any two blocks is bounded.

n1-δ

Used to bound influence

Used to bound bias

Page 41: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

A Pseudorandom Collection of Partitions

BAD=x: |N(x) ∩ T|>|N(x)|(µ(T)+ε)

Thm.(Zuckerman 97)|BAD|≤2k.

[M]R

x

x’

Graph of a seeded extractor

T

Idea: Use explicit seeded extractor to construct partitions.

Page 42: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

42

A Pseudorandom Collection of Partitions

Let [n] = [MB] and S1,....,SR ⊂[n], |Si|=B,

Si=(₁,i1),..., (B,iB).Each Si defines a partition of [n]: Si, Si+[₁],....,

Si+[M-₁].

M

B

Si

Si+1

Page 43: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

43

A Pseudorandom Collection of Partitions

[n] = [MB] and S1,....,SR ⊂[n],

Sx=N(x)

[M]R

x

x’

Page 44: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

44

A Pseudorandom Collection of Partitions

Properties required:

(1) Any T ⊂ [n], |T|<n1-δ, small intersection with partitions.

[M]R

x

x’

We show Trevisan Extractor satisfies these. (Slightly simpler version of Property 2 proved by Li ’12).

(2) For all x ≠ x’, i, j

|(N(x)+i) ∩ (N(x’)+j)|<0.9B

Page 45: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

45

Some Ingredients in Analysis

New way of analyzing bias of Ajtai-Linial function: AND of TRIBE functions

Crucial in achieving monotonicity, derandomizing.

A useful inequality: Janson’s Inequality

If the Si’s are small and have low pairwise intersection, then

T: Each element r in R picked independently with probability p.

S1,..., St⊂ [R].

Page 46: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

46

Subsequent Applications and Extensions of our Work

• Li: explicit affine extractor for min-entropy logCn.

• Li: explicit 2-source extractor output length 0.9k.

• Meka: explicit resilient function to match the probabilistic Ajtai-Linial construction.

Page 47: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

47

Open Questions

• Negligible error? We achieve error 1/nΩ(1); not enough for cryptographic applications.

• More applications? Of results or techniques.

Page 48: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin.

48

Thank You!