Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1250790.1250854acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article

Low-end uniform hardness vs. randomness tradeoffs for AM

Published: 11 June 2007 Publication History

Abstract

In 1998, Impagliazzo and Wigderson [18] proved a hardnessvs. randomness tradeoff for BPP in the uniform setting,which was subsequently extended to give optimal tradeoffs for thefull range of possible hardness assumptions by Trevisan and Vadhan [29] (in a slightly weaker setting). In 2003, Gutfreund,Shaltiel and Ta-Shma [11] proved a uniform hardness vs. randomness tradeoff for AM, but that result only worked on the "high-end" of possible hardness assumptions.
In this work, we give uniform hardness vs. randomness tradeoffsfor AM that are near-optimal for the full range of possiblehardness assumptions. Following [11], we do this by constructing a hitting-set-generator (HSG) for AM with "resilient reconstruction." Our construction is a recursive variant of the Miltersen-Vinodchandran HSG [24], the only known HSG construction with this required property. The main new idea is to have the reconstruction procedure operate implicitly and locally on superpolynomially large objects, using tools from PCPs(low-degree testing, self-correction) together with a novel use ofextractors that are built from Reed-Muller codes [28, 26] for a sort of locally-computable error-reduction. As a consequence we obtain gap theorems for AM (and AM ∩ coAM) that state, roughly, that either AM (or AM ∩ coAM)protocols running in time t(n) can simulate all of EXP("Arthur-Merlin games are powerful"), or else all of AM (or AM ∩ coAM) can be simulated in nondeterministic time s(n) ("Arthur-Merlin games can be derandomized"), for a near-optimal relationship between t(n) and s(n). As in GST, the case of AM ∩ coAM yields a particularly clean theorem that is ofspecial interest due to the wide array of cryptographic and other problems that lie in this class.

References

[1]
A.E. Andreev, A.E.F. Clementi, and J.D.P. Rolim. Hitting sets derandomize BPP. In ICALP, pages 357--368, 1996.
[2]
V. Arvind and J. Kobler. On pseudorandomness and resource-bounded measure. Theoretical Computer Science, 255, 2001.
[3]
L. Babai, L. Fortnow, and C. Lund. Nondeterministic exponential time has two-prover interactive protocols. Computational Complexity, 1(1):3--40, 1991.
[4]
L. Babai, L. Fortnow, N. Nisan, and A. Wigderson. BPP has subexponential time simulations unless EXPTIME has publishable proofs. Computational Complexity, 3(4):307--318, 1993.
[5]
D. Beaver and J. Feigenbaum. Hiding instances in multioracle queries. In Choffrut and Lengauer DBLP:conf/stacs/1990, pages 37--48.
[6]
M. Blum and S. Kannan. Designing programs that check their work. Journal of the ACM, 42(1):269--291, 1995.
[7]
M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM Journal on Computing, 13(4):850--864, Nov. 1984.
[8]
C. Choffrut and T. Lengauer, editors. STACS 90, 7th Annual Symposium on Theoretical Aspects of Computer Science, Rouen, France, February 22-24, 1990, Proceedings, volume 415 of Lecture Notes in Computer Science. Springer, 1990.
[9]
K. Friedl and M. Sudan. Some improvements to total degree tests. In ISTCS, pages 190--198, 1995.
[10]
O. Goldreich. Modern Cryptography, Probabilistic Proofs and Pseudorandomness. Springer-Verlag, Algorithms and Combinatorics, 1998.
[11]
D. Gutfreund, R. Shaltiel, and A. Ta-Shma. Uniform hardness versus randomness tradeoffs for Arthur-Merlin games. Computational Complexity, 12(3-4):85--130, 2003.
[12]
R. Impagliazzo. Hard-core distributions for somewhat hard problems. In 36th Annual Symposium on Foundations of Computer Science, pages 538--545, 1995.
[13]
R. Impagliazzo, V. Kabanets, and A. Wigderson. In search of an easy witness: Exponential time vs. probabilistic polynomial time. In Proceedings of the 16th Annual Conference on Computational Complexity (CCC-01), pages 2--12, 2001.
[14]
R. Impagliazzo, R. Shaltiel, and A. Wigderson. Near-optimal conversion of hardness into pseudo-randomness. In 40th Annual Symposium on Foundations of Computer Science, pages 181--190, 1999.
[15]
R. Impagliazzo, R. Shaltiel, and A. Wigderson. Extractors and pseudo-random generators with optimal seed length. In Proceedings of the thirty second annual Symposium on Theory of Computing, pages 1--10, 2000.
[16]
R. Impagliazzo, R. Shaltiel, and A. Wigderson. Reducing the seed length in the Nisan-Wigderson generator. To appear in Combinatorica, 2006.
[17]
R. Impagliazzo and A. Wigderson. P = BPP if E requires exponential circuits: Derandomizing the XOR lemma. In Proceedings of the Twenty-Ninth Annual ACM Symposium on Theory of Computing, pages 220--229, 1997.
[18]
R. Impagliazzo and A. Wigderson. Randomness vs. time: De-randomization under a uniform assumption. In 39th Annual Symposium on Foundations of Computer Science, pages 734--743, 1998.
[19]
V. Kabanets. Easiness assumptions and hardness tests: Trading time for zero error. In Proceedings of the 15th Annual IEEE Conference on Computational Colmplexity (COCO-00), pages 150--157, 2000.
[20]
V. Kabanets and R. Impagliazzo. Derandomizing polynomial identity tests means proving circuit lower bounds. Computational Complexity, 13(1-2):1--46, 2004.
[21]
A.R. Klivans and D. van Melkebeek. Graph nonisomorphism has subexponential size proofs unless the polynomial-time hierarchy collapses. SIAM Journal on Computing, 31(5):1501--1526, Oct. 2002.
[22]
R.J. Lipton. Efficient checking of computations. In Choffrut and Lengauer DBLP:conf/stacs/1990, pages 207--215.
[23]
C.-J. Lu. Encryption against storage-bounded adversaries from on-line strong extractors. J. Cryptology, 17(1):27--42, 2004.
[24]
P.B. Miltersen and N.V. Vinodchandran. Derandomizing Arthur-Merlin games using hitting sets. In 40th Annual Symposium on Foundations of Computer Science, pages 71--80, 1999.
[25]
N. Nisan and A. Wigderson. Hardness vs. randomness. Journal of Computer and System Sciences, 49(2):149--167, Oct. 1994.
[26]
R. Shaltiel and C. Umans. Simple extractors for all min-entropies and a new pseudo-random generator. In Proceedings of the 42nd Symposium on Foundations of Computer Science, pages 648--657, 2001.
[27]
M. Sudan, L. Trevisan, and S. Vadhan. Pseudorandom generators without the XOR lemma. Journal of Computer and System Sciences, 62:236--266, 2001.
[28]
A. Ta-Shma, D. Zuckerman, and S. Safra. Extractors from Reed-Muller codes. In Proceedings of the 42nd Annual IEEE Symposium on Foundations of Computer Science, 2001.
[29]
L. Trevisan and S. Vadhan. Pseudorandomness and average-case complexity via uniform reductions. In Proceedings of the 17th Annual Conference on Computational Complexity, 2002.
[30]
C. Umans. Pseudo-random generators for all hardnesses. Journal of Computer and System Sciences, 67:419--440, 2003.
[31]
C. Umans. Reconstructive dispersers and hitting set generators. In APPROX-RANDOM, pages 460--471, 2005.
[32]
S.P. Vadhan. Constructing locally computable extractors and cryptosystems in the bounded-storage model. J. Cryptology, 17(1):43--77, 2004.
[33]
A.C. Yao. Theory and applications of trapdoor functions. In Proceedings of the 23th Annual Symposium on Foundations of Computer Science, pages 80--91, 1982.

Cited By

View all
  • (2023)Guest Column: New ways of studying the BPP = P conjectureACM SIGACT News10.1145/3604943.360495054:2(44-69)Online publication date: 14-Jun-2023
  • (2023)On Exponential-time Hypotheses, Derandomization, and Circuit Lower BoundsJournal of the ACM10.1145/359358170:4(1-62)Online publication date: 20-Apr-2023
  • (2023)When Arthur Has Neither Random Coins Nor Time to Spare: Superfast Derandomization of Proof SystemsProceedings of the 55th Annual ACM Symposium on Theory of Computing10.1145/3564246.3585215(60-69)Online publication date: 2-Jun-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
STOC '07: Proceedings of the thirty-ninth annual ACM symposium on Theory of computing
June 2007
734 pages
ISBN:9781595936318
DOI:10.1145/1250790
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 June 2007

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Arthur-Merlin games
  2. derandomization
  3. hardness vs. randomness tradeoff
  4. hitting-set generator

Qualifiers

  • Article

Conference

STOC07
Sponsor:
STOC07: Symposium on Theory of Computing
June 11 - 13, 2007
California, San Diego, USA

Acceptance Rates

Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

Upcoming Conference

STOC '25
57th Annual ACM Symposium on Theory of Computing (STOC 2025)
June 23 - 27, 2025
Prague , Czech Republic

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)18
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Guest Column: New ways of studying the BPP = P conjectureACM SIGACT News10.1145/3604943.360495054:2(44-69)Online publication date: 14-Jun-2023
  • (2023)On Exponential-time Hypotheses, Derandomization, and Circuit Lower BoundsJournal of the ACM10.1145/359358170:4(1-62)Online publication date: 20-Apr-2023
  • (2023)When Arthur Has Neither Random Coins Nor Time to Spare: Superfast Derandomization of Proof SystemsProceedings of the 55th Annual ACM Symposium on Theory of Computing10.1145/3564246.3585215(60-69)Online publication date: 2-Jun-2023
  • (2022)Nearly Optimal Pseudorandomness from HardnessJournal of the ACM10.1145/355530769:6(1-55)Online publication date: 17-Nov-2022
  • (2022)Unstructured Hardness to Average-Case Randomness2022 IEEE 63rd Annual Symposium on Foundations of Computer Science (FOCS)10.1109/FOCS54457.2022.00048(429-437)Online publication date: Oct-2022
  • (2022)Hardness vs Randomness, Revised: Uniform, Non-Black-Box, and Instance-Wise2021 IEEE 62nd Annual Symposium on Foundations of Computer Science (FOCS)10.1109/FOCS52979.2021.00021(125-136)Online publication date: Feb-2022
  • (2020)Nearly Optimal Pseudorandomness From Hardness2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS)10.1109/FOCS46700.2020.00102(1057-1068)Online publication date: Nov-2020
  • (2020)On Exponential-Time Hypotheses, Derandomization, and Circuit Lower Bounds: Extended Abstract2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS)10.1109/FOCS46700.2020.00010(13-23)Online publication date: Nov-2020
  • (2009)Pseudorandom Generators and Typically-Correct DerandomizationProceedings of the 12th International Workshop and 13th International Workshop on Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques10.1007/978-3-642-03685-9_43(574-587)Online publication date: 21-Aug-2009
  • (2008)A (de)constructive approach to program checkingProceedings of the fortieth annual ACM symposium on Theory of computing10.1145/1374376.1374399(143-152)Online publication date: 17-May-2008

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media