Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3564246.3585134acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
research-article
Open access

Almost Chor-Goldreich Sources and Adversarial Random Walks

Published: 02 June 2023 Publication History

Abstract

A Chor–Goldreich (CG) source is a sequence of random variables X = X1 ∘ … ∘ Xt, where each Xi ∼ {0,1}d and Xi has δ d min-entropy conditioned on any fixing of X1 ∘ … ∘ Xi−1. The parameter 0<δ≤ 1 is the entropy rate of the source. We typically think of d as constant and t as growing. We extend this notion in several ways, defining almost CG sources. Most notably, we allow each Xi to only have conditional Shannon entropy δ d.
We achieve pseudorandomness results for almost CG sources which were not known to hold even for standard CG sources, and even for the weaker model of Santha–Vazirani sources: We construct a deterministic condenser that on input X, outputs a distribution which is close to having constant entropy gap, namely a distribution Z ∼ {0,1}m for m ≈ δ dt with min-entropy mO(1). Therefore, we can simulate any randomized algorithm with small failure probability using almost CG sources with no multiplicative slowdown. This result extends to randomized protocols as well, and any setting in which we cannot simply cycle over all seeds, and a “one-shot” simulation is needed. Moreover, our construction works in an online manner, since it is based on random walks on expanders.
Our main technical contribution is a novel analysis of random walks, which should be of independent interest. We analyze walks with adversarially correlated steps, each step being entropy-deficient, on good enough lossless expanders. We prove that such walks (or certain interleaved walks on two expanders), starting from a fixed vertex and walking according to X1∘ … ∘ Xt, accumulate most of the entropy in X.

References

[1]
Noga Alon and Michael Capalbo. 2002. Explicit unique-neighbor expanders. In Proceedings of the 43rd Annual Symposium on Foundations of Computer Science (FOCS). 73–79.
[2]
Nir Aviv and Amnon Ta-Shma. 2019. On the entropy loss and gap of condensers. ACM Transactions on Computation Theory (TOCT), 11, 3 (2019), 1–14.
[3]
Marshall Ball, Oded Goldreich, and Tal Malkin. 2022. Randomness extraction from somewhat dependent sources. In Proceedings of the 13th Innovations in Theoretical Computer Science Conference (ITCS).
[4]
Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, François-Xavier Standaert, and Yu Yu. 2011. Leftover hash lemma, revisited. In Annual Cryptology Conference. 1–20.
[5]
Boaz Barak, Guy Kindler, Ronen Shaltiel, Benny Sudakov, and Avi Wigderson. 2010. Simulating independence: New constructions of condensers, ramsey graphs, dispersers, and extractors. Journal of the ACM (JACM), 57, 4 (2010), 20.
[6]
Salman Beigi, Omid Etesami, and Amin Gohari. 2017. Deterministic Randomness Extraction from Generalized and Distributed Santha–Vazirani Sources. SIAM J. Comput., 46, 1 (2017), 1–36.
[7]
Avraham Ben-Aroya, Gil Cohen, Dean Doron, and Amnon Ta-Shma. 2019. Two-source condensers with low error and small entropy gap via entropy-resilient functions. In Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (APPROX/RANDOM 2019).
[8]
Avraham Ben-Aroya, Dean Doron, and Amnon Ta-Shma. 2019. An efficient reduction from two-source to nonmalleable extractors: achieving near-logarithmic min-entropy. SIAM J. Comput., STOC17–31.
[9]
Radu Berinde, Anna C. Gilbert, Piotr Indyk, Howard Karloff, and Martin J. Strauss. 2008. Combining geometry and combinatorics: A unified approach to sparse signal recovery. In Proceedings of the 46th Annual Allerton Conference on Communication, Control, and Computing. 798–805.
[10]
Michael Capalbo, Omer Reingold, Salil Vadhan, and Avi Wigderson. 2002. Randomness conductors and constant-degree lossless expanders. In Proceedings of the 34th Annual Symposium on Theory of Computing (STOC). ACM, 659–668.
[11]
Eshan Chattopadhyay and Jesse Goodman. 2022. Improved extractors for small-space sources. In Proceedings of the 62nd Annual Symposium on Foundations of Computer Science (FOCS). 610–621.
[12]
Eshan Chattopadhyay, Jesse Goodman, and Jyun-Jie Liao. 2022. Affine extractors for almost logarithmic entropy. In Proceedings of the 62nd Annual Symposium on Foundations of Computer Science (FOCS). 622–633.
[13]
Lijie Chen and Roei Tell. 2021. Simple and fast derandomization from very hard functions: eliminating randomness at almost no cost. In Proceedings of the 53rd Annual Symposium on Theory of Computing (STOC). ACM, 283–291.
[14]
Xue Chen, Kuan Cheng, Xin Li, and Minghui Ouyang. 2022. Improved Decoding of Expander Codes. In Proceedings of the 13th Innovations in Theoretical Computer Science Conference (ITCS).
[15]
Benny Chor and Oded Goldreich. 1988. Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM J. Comput., 17, 2 (1988), 230–261.
[16]
Anindya De and Thomas Watson. 2012. Extractors and lower bounds for locally samplable sources. ACM Transactions on Computation Theory (TOCT), 4, 1 (2012), 1–21.
[17]
Domingos Dellamonica Jr. and Yoshiharu Kohayakawa. 2008. An algorithmic Friedman–Pippenger theorem on tree embeddings and applications. The Electronic Journal of Combinatorics, R127–R127.
[18]
Yevgeniy Dodis, Siyao Guo, Noah Stephens-Davidowitz, and Zhiye Xie. 2021. No Time to Hash: On Super-Efficient Entropy Accumulation. In CRYPTO (Lecture Notes in Computer Science, Vol. 12828). Springer, 548–576.
[19]
Yevgeniy Dodis, Siyao Guo, Noah Stephens-Davidowitz, and Zhiye Xie. 2021. Online linear extractors for independent sources. In Proceedings of the 2nd Conference on Information-Theoretic Cryptography (ITC).
[20]
Yevgeniy Dodis, Krzysztof Pietrzak, and Daniel Wichs. 2014. Key derivation without entropy waste. In Advances in Cryptology–EUROCRYPT 2014. Springer, 93–110.
[21]
Yevgeniy Dodis, Thomas Ristenpart, and Salil Vadhan. 2012. Randomness condensers for efficiently samplable, seed-dependent sources. In Theory of Cryptography Conference. 618–635.
[22]
Yevgeniy Dodis and Yu Yu. 2013. Overcoming weak expectations. In Theory of Cryptography Conference. 1–22.
[23]
Dean Doron, Dana Moshkovitz, Justin Oh, and David Zuckerman. 2020. Nearly optimal pseudorandomness from hardness. In Proceedings of the 61st Annual Symposium on Foundations of Computer Science (FOCS). 1057–1068.
[24]
Dean Doron, Dana Moshkovitz, Justin Oh, and David Zuckerman. 2022. Almost Chor–Goldreich Sources and Adversarial Random Walks. In Electronic Colloquium on Computational Complexity (ECCC).
[25]
Zeev Dvir. 2012. Extractors for varieties. computational complexity, 21, 4 (2012), 515–572.
[26]
Dmitry Gavinsky and Pavel Pudlák. 2020. Santha-Vazirani sources, deterministic condensers and very strong extractors. Theory of Computing Systems, 64, 6 (2020), 1140–1154.
[27]
Oded Goldreich and Salil Vadhan. 1999. Comparing entropies in statistical zero knowledge with applications to the structure of SZK. In Proceedings. Fourteenth Annual IEEE Conference on Computational Complexity (Formerly: Structure in Complexity Theory Conference)(Cat. No. 99CB36317). 54–73.
[28]
Oded Goldreich and Avi Wigderson. 1997. Tiny families of functions with random properties: A quality-size trade-off for hashing. Random Structures & Algorithms, 11, 4 (1997), 315–343.
[29]
Venkatesan Guruswami, Christopher Umans, and Salil Vadhan. 2009. Unbalanced expanders and randomness extractors from Parvaresh–Vardy codes. Journal of the ACM (JACM), 56, 4 (2009), 20.
[30]
Jesse Kamp, Anup Rao, Salil Vadhan, and David Zuckerman. 2006. Deterministic extractors for small-space sources. In Proceedings of the 38th Annual Symposium on Theory of Computing (STOC). ACM, 691–700.
[31]
Ting-Chun Lin and Min-Hsiu Hsieh. 2022. Good quantum LDPC codes with linear time decoder from lossless expanders. arXiv preprint arXiv:2203.03581.
[32]
Chi-Jen Lu, Omer Reingold, Salil Vadhan, and Avi Wigderson. 2003. Extractors: Optimal up to constant factors. In Proceedings of the 35th Annual Symposium on Theory of computing (STOC). 602–611.
[33]
Noam Nisan and David Zuckerman. 1996. Randomness is Linear in Space. J. Comput. System Sci., 52, 1 (1996), 43–52.
[34]
Jaikumar Radhakrishnan and Amnon Ta-Shma. 2000. Bounds for dispersers, extractors, and depth-two superconcentrators. SIAM Journal on Discrete Mathematics, 13, 1 (2000), 2–24.
[35]
Ran Raz and Omer Reingold. 1999. On recycling the randomness of states in space bounded computation. In Proceedings of the 61st Annual Symposium on Theory of Computing (STOC). ACM, 159–168.
[36]
Omer Reingold, Ronen Shaltiel, and Avi Wigderson. 2006. Extracting randomness via repeated condensing. SIAM J. Comput., 35, 5 (2006), 1185–1209.
[37]
Omer Reingold, Salil Vadhan, and Avi Wigderson. 2002. Entropy waves, the zig-zag graph product, and new constant-degree expanders. Annals of Mathematics, 157–187.
[38]
Omer Reingold, Salil Vadhan, and Avi Wigderson. 2004. A note on extracting randomness from Santha-Vazirani sources. Manuscript. In Electronic Colloquium on Computational Complexity (ECCC).
[39]
Miklos Santha and Umesh V. Vazirani. 1986. Generating quasi-random sequences from semi-random sources. J. Comput. System Sci., 33, 1 (1986), 75–87.
[40]
Ronen Shaltiel and Emanuele Viola. 2022. On Hardness Assumptions Needed for “Extreme High-End” PRGs and Fast Derandomization. In Proceedings of the 13th Innovations in Theoretical Computer Science Conference (ITCS).
[41]
Aravind Srinivasan and David Zuckerman. 1999. Computing with very weak random sources. SIAM J. Comput., 28, 4 (1999), 1433–1459.
[42]
Amnon Ta-Shma, Christopher Umans, and David Zuckerman. 2007. Lossless condensers, unbalanced expanders, and extractors. Combinatorica, 27 (2007), 213–240.
[43]
Luca Trevisan and Salil Vadhan. 2000. Extracting randomness from samplable distributions. In Proceedings of the 41st Annual IEEE Symposium on Foundations of Computer Science (FOCS 2000). 32–42.
[44]
Emanuele Viola. 2014. Extractors for circuit sources. SIAM J. Comput., 43, 2 (2014), 655–672.
[45]
David Zuckerman. 1990. General weak random sources. In Proceedings of the 31st Annual Symposium on Foundations of Computer Science (FOCS). 534–543.
[46]
David Zuckerman. 2007. Linear Degree Extractors and the Inapproximability of Max Clique and Chromatic Number. Theory of Computing, 3 (2007), 103–128.

Cited By

View all
  • (2024)Improved Condensers for Chor-Goldreich Sources2024 IEEE 65th Annual Symposium on Foundations of Computer Science (FOCS)10.1109/FOCS61266.2024.00096(1513-1549)Online publication date: 27-Oct-2024
  • (2024)On the Existence of Seedless Condensers: Exploring the Terrain2024 IEEE 65th Annual Symposium on Foundations of Computer Science (FOCS)10.1109/FOCS61266.2024.00093(1451-1469)Online publication date: 27-Oct-2024

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
STOC 2023: Proceedings of the 55th Annual ACM Symposium on Theory of Computing
June 2023
1926 pages
ISBN:9781450399135
DOI:10.1145/3564246
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 June 2023

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Santha--Vazirani sources
  2. condensers
  3. expander Graphs
  4. extractors
  5. random Walks
  6. randomized algorithm

Qualifiers

  • Research-article

Funding Sources

Conference

STOC '23
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

Upcoming Conference

STOC '25
57th Annual ACM Symposium on Theory of Computing (STOC 2025)
June 23 - 27, 2025
Prague , Czech Republic

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)326
  • Downloads (Last 6 weeks)21
Reflects downloads up to 08 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Improved Condensers for Chor-Goldreich Sources2024 IEEE 65th Annual Symposium on Foundations of Computer Science (FOCS)10.1109/FOCS61266.2024.00096(1513-1549)Online publication date: 27-Oct-2024
  • (2024)On the Existence of Seedless Condensers: Exploring the Terrain2024 IEEE 65th Annual Symposium on Foundations of Computer Science (FOCS)10.1109/FOCS61266.2024.00093(1451-1469)Online publication date: 27-Oct-2024

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media