Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Public Access

Bounded Independence versus Symmetric Tests

Published: 11 July 2019 Publication History

Abstract

For a test T ⊆ {0, 1}n, define k*(T) to be the maximum k such that there exists a k-wise uniform distribution over {0, 1}n whose support is a subset of T.
For Ht = {x ∈ {0, 1}n : | ∑ixin/2| ≤ t}, we prove k*(Ht) = Θ (t2/n + 1).
For Sm, c = {x ∈ {0, 1}n : ∑ixic (mod m)}, we prove that k*(Sm, c) = Θ (n/m2). For some k = O(n/m) we also show that any k-wise uniform distribution puts probability mass at most 1/m + 1/100 over Sm, c. Finally, for any fixed odd m we show that there is an integer k = (1 − Ω(1))n such that any k-wise uniform distribution lands in T with probability exponentially close to |Sm, c|/2n; and this result is false for any even m.

References

[1]
Miklos Ajtai and Avi Wigderson. 1989. Deterministic simulation of probabilistic constant-depth circuits. Advances in Computing Research—Randomness and Computation 5 (1989), 199--223.
[2]
Noga Alon, Oded Goldreich, and Yishay Mansour. 2003. Almost k-wise independence versus k-wise independence. Inf. Process. Lett. 88, 3 (2003), 107--110.
[3]
Louay M. J. Bazzi. 2009. Polylogarithmic independence can fool DNF formulas. SIAM J. Comput. 38, 6 (2009), 2220--2272.
[4]
Avraham Ben-Aroya, Dean Doron, and Amnon Ta-Shma. 2017. An efficient reduction from two-source to non-malleable extractors: Achieving near-logarithmic min-entropy. In Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing (STOC’17). ACM, New York, 1185--1194.
[5]
Ravi Boppana, Johan Håstad, Chin Ho Lee, and Emanuele Viola. 2016. Bounded independence vs. moduli. In Proceedings of the 20th International Workshop on Randomization and Computation (RANDOM’16), Leibniz International Proceedings in Informatics, Vol. 60. Schloss Dagstuhl, 24:1--24:9.
[6]
Mark Braverman. 2010. Polylogarithmic independence fools AC<sup>0</sup> circuits. J. ACM 57, 5 (2010).
[7]
Neal Carothers. {n.d.}. A Short Course on Approximation Theory. Retrieved from http://fourier.math.uoc.gr/&sim;mk/approx1011/carothers.pdf.
[8]
J. Lawrence Carter and Mark N. Wegman. 1979. Universal classes of hash functions. J. Comput. Syst. Sci. 18, 2 (1979), 143--154.
[9]
Suresh Chari, Pankaj Rohatgi, and Aravind Srinivasan. 2000. Improved algorithms via approximations of probability distributions. J. Comput. Syste. Sci. 61, 1 (2000), 81--107.
[10]
Eshan Chattopadhyay and David Zuckerman. 2016. Explicit two-source extractors and resilient functions. In Proceedings of the 48th ACM Symposium on the Theory of Computing (STOC’16). 670--683.
[11]
Elliott Cheney. 1966. Introduction to Approximation Theory. McGraw-Hill, New York, NY.
[12]
Ilias Diakonikolas, Parikshit Gopalan, Ragesh Jaiswal, Rocco A. Servedio, and Emanuele Viola. 2010. Bounded independence fools halfspaces. SIAM J. Comput. 39, 8 (2010), 3441--3462.
[13]
Ilias Diakonikolas, Daniel Kane, and Jelani Nelson. 2010. Bounded independence fools degree-2 threshold functions. In Proceedings of the 51st IEEE Symposium on Foundations of Computer Science (FOCS’10). IEEE, 11--20.
[14]
Guy Even, Oded Goldreich, Michael Luby, Noam Nisan, and Boban Velickovic. 1992. Approximations of general independent distributions. In Proceedings of the 24th ACM Symposium on the Theory of Computing (STOC’92). 10--16.
[15]
William Feller. 1971. An Introduction to Probability Theory and Its Applications (2nd ed.). Vol. 2. Wiley.
[16]
Parikshit Gopalan, Raghu Meka, Omer Reingold, Luca Trevisan, and Salil Vadhan. 2012. Better pseudorandom generators from milder pseudorandom restrictions. In Proceedings of the 53rd IEEE Symposium on Foundations of Computer Science (FOCS’12). 120--129.
[17]
Parikshit Gopalan, Ryan O’Donnell, Yi Wu, and David Zuckerman. 2010. Fooling functions of halfspaces under product distributions. In Proceedings of the 25th IEEE Conference on Computational Complexity (CCC’10). IEEE, 223--234.
[18]
Uffe Haagerup. 1981. The best constants in the Khintchine inequality. Stud. Math. 70, 3 (1981), 231--283.
[19]
Elad Haramaty, Chin Ho Lee, and Emanuele Viola. 2018. Bounded independence plus noise fools products. SIAM J. Comput. 47, 2 (2018), 493--523.
[20]
Prahladh Harsha and Srikanth Srinivasan. 2016. On polynomial approximations to AC<sup>0</sup>. In Proceedings of the 20th International Workshop on Randomization and Computation (RANDOM’16), Leibniz International Proceedings in Informatics, Vol. 60. Schloss Dagstuhl, 32:1--32:14.
[21]
Aleksandr Khintchine. 1923. Über dyadische Brüche. Math. Zeitschr. 18, 1 (1923), 109--116.
[22]
Chin Ho Lee and Emanuele Viola. 2017. More on bounded independence plus noise: Pseudorandom generators for read-once polynomials. Retreived from http://www.ccs.neu.edu/home/viola/.
[23]
Chin Ho Lee and Emanuele Viola. 2017. Some limitations of the sum of small-bias distributions. Theory Comput. 13, Article 16 (2017), 23 pages.
[24]
Raghu Meka and David Zuckerman. 2009. Small-bias spaces for group products. In Proceedings of the 13th Workshop on Randomization and Computation (RANDOM’09), Lecture Notes in Computer Science, Vol. 5687. Springer, 658--672.
[25]
Ryan O’Donnell. 2014. Analysis of Boolean Functions. Cambridge University Press.
[26]
Yuval Rabani and Amir Shpilka. 2010. Explicit construction of a small epsilon-net for linear threshold functions. SIAM J. Comput. 39, 8 (2010), 3501--3520.
[27]
Alexander A. Razborov. 1987. Lower bounds on the dimension of schemes of bounded depth in a complete basis containing the logical addition function. Akad. Nauk SSSR. Mat. Zamet. 41, 4 (1987), 598--607.
[28]
Alexander A. Razborov. 2009. A simple proof of Bazzi’s theorem. ACM Trans. Comput. Theory 1, 1 (2009). https://dl.acm.org/citation.cfm?id&equals;1490273.
[29]
Herbert Robbins. 1955. A remark on Stirling’s formula. Am. Math. Month. 62, 1 (Jan. 1955), 26--29.
[30]
Roman Smolensky. 1987. Algebraic methods in the theory of lower bounds for Boolean circuit complexity. In Proceedings of the 19th ACM Symposium on the Theory of Computing (STOC’87). ACM, 77--82.
[31]
Avishay Tal. 2017. Tight bounds on the Fourier spectrum of AC<sup>0</sup>. In Proceedings of the 32nd Computational Complexity Conference. LIPIcs. Leibniz Int. Proc. Inform., Vol. 79. Schloss Dagstuhl. Leibniz-Zent. Inform., Wadern, 15:1--15:31.
[32]
Emanuele Viola. 2017. Special topics in complexity theory. Lecture notes of the class taught at Northeastern University. Retrieved from http://www.ccs.neu.edu/home/viola/classes/spepf17.html.
[33]
Emanuele Viola and Avi Wigderson. 2008. Norms, XOR lemmas, and lower bounds for polynomials and protocols. Theory Comput. 4 (2008), 137--168.

Cited By

View all
  • (2023)On Correlation Bounds against PolynomialsProceedings of the conference on Proceedings of the 38th Computational Complexity Conference10.4230/LIPIcs.CCC.2023.3(1-35)Online publication date: 17-Jul-2023

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Computation Theory
ACM Transactions on Computation Theory  Volume 11, Issue 4
December 2019
252 pages
ISSN:1942-3454
EISSN:1942-3462
DOI:10.1145/3331049
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 July 2019
Accepted: 01 April 2019
Revised: 01 January 2019
Received: 01 May 2018
Published in TOCT Volume 11, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Pseudorandomness
  2. bounded independence
  3. modulus
  4. symmetric functions
  5. thresholds

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)175
  • Downloads (Last 6 weeks)17
Reflects downloads up to 10 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)On Correlation Bounds against PolynomialsProceedings of the conference on Proceedings of the 38th Computational Complexity Conference10.4230/LIPIcs.CCC.2023.3(1-35)Online publication date: 17-Jul-2023

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media