1 explicit two-source extractors and resilient functions eshan chattopadhyay david zuckerman ut...

48
1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin UT Austin

Upload: myrtle-glenn

Post on 17-Jan-2016

227 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

1

Explicit Two-Source Extractors and Resilient Functions

Eshan Chattopadhyay David ZuckermanUT Austin UT Austin

Page 2: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

2

Randomness in Computation

• Randomness widely used:

• Algorithms: Randomized algorithms can dramatically outperform known deterministic algorithms.

• Distributed Computing, Cryptography, Data Structures etc.

• Applications: require uniform uncorrelated bits.

• Cryptographic tasks: bit commitment, ZK, NIZK etc cannot work with even ‘almost’ random bits [DOPS04].

• Most randomized algorithms: analysis assumes uniform, uncorrelated bits.

2

Page 3: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

3

Weak Random Sources

• Natural sources may be defective.

• Clock drift, thermal noise, Zener diode

• Weak sources arise in cryptography:

• Condition on adversary’s information.

• Weak sources arise in pseudorandom generators:

• Condition on state of computation.

• Goal: Purify weak source.

3

Page 4: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

4

Some Simple Models

• von Neumann 51: Sequence of independent, biased coin flips.

• Blum 84: Sequence of bits produced by a Markov chain.

• Sanha-Vazirani Sources ’84: Each new bit is almost uniform conditioned on the previous bits.

Page 5: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

5

Modelling a Weak Random Sources

Problem:

Modelling a weak source:

Shannon Entropy:

D: with prob. 0.99 0n, with prob 0.01 uniform on n bits

Min-Entropy:

Page 6: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

6

Min-Entropy

X

• X: (n,k)-source (Chor-Goldreich ’88)

• A source on n bits with min-entropy at least k.

• All strings have probability ≤ 2-k.

• Special Case: X uniform on set of size 2k.

• General Case: Enough to deal with special case (Chor-Goldreich 88).

Page 7: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

7

Randomness Extractors

• Extractor: deterministic procedure to extract uniform bits from ANY (n,k)-source.

X

Page 8: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

8

One Source Extractor ?

X

Lemma. There cannot exist such a function.

Ext-1(0) Ext-

1(1)

Proof Idea:Assume Ext.

max|Ext-1(0)|, |Ext-

1(1)|≥2n-1.

Page 9: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

9

Getting past this difficulty

• Make assumptions on weak source:

• Bit-fixing sources, Affine sources, Samplable sources etc.

• Without making assumptions:

• Seeded Extractors: Extract using a short uniform seed.

• Extract using ≥ 2 independent weak source.

• Focus of this talk.

Page 10: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

10

Outline

• Introduction and Results

• Extractors: Seeded, Two-Source

• Ramsey Graphs

• Techniques

• Reduction to ‘generalized’ bit-fixing sources

• Extracting using a resilient function

• Conclusion and Open Questions

Page 11: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

11

2-Source Extractor

X

Y

X, Y are independent (n,k)-sources

More formally,

Page 12: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

12

Existence of 2-Source Extractors

Thm.(Probabilistic method)∃ 2-source extractor for min-entropy k = log n+O(1).

Naive Derandomization: Exponential time.

In fact, a random function is a good 2-source extractor withwith high probability.

Page 13: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

13

Explicit Constructions of Pseudorandom Objects

• Central theme in complexity theory: constructing deterministic objects with strong combinatorial properties.

• Generic goal: black-box ways of reducing randomness requirements in algorithms using such objects.

• Some other examples: hard functions, expanders, pseudorandom generators, error correcting codes.

Constructing explicit extractors is part of a bigger project.

Final goal: BPP=P?

Page 14: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

14

Explicit Constructions?

Thm.(Probabilistic method)∃ 2-source extractor for min-entropy k = log n+O(1).

Santha-Vazirani 86, Chor-Goldreich 88: Explicit 2-source extractor?

Reference k1 k2

[Chor-Goldreich 88]

>0.5n >0.5n

[Bourgain 05] ≥0.49n 0.49n

[Raz 05] >0.5n O(log n)

Explicit Constructions: X : (n,k1), Y: (n,k2)

Page 15: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

15

Relaxation to More Sources

• Barak-Impaggliazzo-Wigderson 04: Explicit extractors for constant number of (n,k)-sources with min-entropy δn.

• Rao 06: Explicit extractors for constant number of (n,k)-sources with min-entropy nɣ.

• Li 11: Explicit extractor for 3 sources at n0.51 min-entropy.

• Li 15: Explicit extractor for 3 sources at logC(n) min-entropy.

Page 16: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

16

Matrix Formulation

‘Efficiently’ construct a low discrepancy Boolean N×N matrix: i.e, Every K×K submatrix contains ‘almost equal’ number of 0’s and 1’s.

N=2n, K=2k

11

0 0

0

00

1

1

1

1

Truth table of a 2-source extractor Our 2-source extractor

thus implies such low discrepancy matrices.

Page 17: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

17

Our Main Result

Thm.(Main theorem) Explicit 2-source extractor for k=logCn.

Page 18: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

18

Explicit 2-Source Extractors

Reference k1 k2 Output Length

Chor-Goldreich

88>0.5n >0.5n 1 bit

Zuckerman 91

>0.5n >0.5n Ω(n)

Bourgain 05 ≥0.499n ≥0.499n Ω(n)

Raz 05 >0.5n ≥O(log n) Ω(n)

Chattopadhyay-

Zuckerman 15

≥logCn ≥logCn 1 bit

Li 15 ≥logCn ≥logCn 0.9k1

Page 19: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

19

Ramsey Theory

As a corollary of explicit 2-source extractors, we obtain new results in the area of Ramsey Theory.

Ramsey Theory: Branch of combinatorics that studies conditions under which there is unavoidable presence of local structure.

Page 20: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

20

Ramsey Graphs

Erdos (1947): Existence of K-Ramsey graphs on N vertices for K> (2+o(1)) log N.

Bipartite K-Ramsey graph: Bipartite graph with no complete or empty K×K sub-graph.

K-Ramsey graph: No independent set or clique of size K.

Explicit Constructions?

Page 21: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

21

Ramsey Graphs via 2-Source Extractor

NN

N=2n, K=2k

KKX

Y

Ext: 2-source extractor for min-entropy k

abExt(a,b)=1

Ext(c,d)=0 dc

Page 22: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

22

Explicit Ramsey GraphsReference K Bipartite

Erdös 47 (existential) ≥ 2 log N Yes

Hadamard Matrix √N Yes

Frankl-Wilson81, Naor92, Alon98, Grolmusz00, Ba, Gop

2Ω(√(log N log log N)) No

Pudlak-Rödl 04 √N/2√log N Yes

Barak-Kindler-Shaltiel-Sudakov-Wigderson 10

No(1) Yes

Barak-Rao-Shaltiel-Wigderson 12 2(log N)o(1) Yes

Cohen 15 2(log log N)C Yes

[CZ15] 2(log log N)C Yes

(N=2n, K=2k)

Page 23: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

23

Matching Erdos’ Challenge

• The exponent C in our work is 75.

• Subsequent refinement by Meka makes C=10.

• Open to get C=1 and earn $100!

Page 24: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

24

Techniques

Page 25: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

25

Strong Seeded Extractors[Nisan-Z 93]

Ext:0,1n×0,1d→0,1m

X: (n,k)-source

Ext(X, Ud ), Ud ≈ε Um, Ud

Explicit Construction: d=O(log(n/ε)), m=.99k.

[…Guruswami-Umans-Vadhan 07…]

Thus for most seeds s:Ext(X,s) ≈ Um.

Page 26: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

26

Resilient Function

(q,ε)-resilient function: For any subset of q co-ordinates, probability f is fixed on uniform sampling of the remaining co-ordinates is ≥1-ε.

Example: MAJORITY is (n0.49,ε)-resilient.

f: 0,1n→0,1

PARITY is NOT (q, ε)-resilient for any q>0, ε <1.

Page 27: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

27

A Preliminary Attempt

X: (n,k)-source

Z’

Z’i = Ext(X,si)

(1-ε) fraction of the bits in Z’ are uniform

Majority

b

Does not work: The uniform bits are arbitrarily correlated

Ext:0,1n × 0,1d 0,1: Strong-seeded extractor

Min-entropy k, error ε.

Bad bit: Depends on good bits.

D=2d=(n/ε)O(1)

Page 28: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

28

• Most t-tuples of seeds (s1,s2,....,st) satisfy a t-independence property:

Ext(X, s1), Ext(X, s2),....,Ext(X, st) ≈ U tm.

t-Non-malleable Extractors

Page 29: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

29

A Second Attempt

Use a t-non-malleable extractor from Chattopadhyay-Goyal-Li 15.

X: (n,k)-source

Z’i = nmExt(X,si)

Z’

Majority

b

Idea: Make the uniform bits almost t-wise independent

Does not work: >D0.5 bad bits.(not surprisingly! since we have 1 source)

D=(n/ε)poly(t, log(n/ε))

Page 30: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

30

Our Approach: A Very High Level Idea

• Step 1: Use X and Y to construct Z on D=nO(1) bits such that ≥(D -D0.99) bits are uniform and polylog-wise independent.

• Step 2: An explicit function that extracts from Z.

Page 31: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

31

Z’Z’i = nmExt(X,si)

The good bits of Z are almost t-wise independent

Idea: Sample a pseudorandom subset T of [D] using Y.

# of bad indices ≤ εD

X: (n,k)-source

X

Executing Step 1

D=(n/ε)poly(t, log(n/ε))

Page 32: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

32

Z’Z’i = nmExt(X,si)

D=2poly(t, log(n/ε))

Pseudorandom Subset: T= Ext(Y,r1),...,Ext(Y,rM), M = 2O(log(n/ε’))

indices in T

No. of bad indices in T: (ε+ε’)M<M0.99

Executing Step 1

An alternate way of achieving this is by modifying a construction by Li.

Z=Z’T

Page 33: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

33

No. of bad indices < M0.99 The good bits of Z are (t=polylog(M))-wise independent.

MZ

∧ ∧∧ ∧∨∨∨

Executing Step 2

Step 2a: Good bits can be assumed to uniform, independent

Page 34: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

34

Easy to Check if a Monotone function is Fixed

Z

∧ ∧∧ ∧∨∨∨

Page 35: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

35

Z

∧ ∧∧ ∧∨∨∨

Limited Independence fools Small Circuits!

Page 36: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

36

Z

∧ ∧∧ ∧∨∨∨

Thus, we can assume good bits are independent, uniform.

Executing Step 2

Page 37: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

37

∧ ∧∧ ∧∨∨∨

Executing Step 2

Remaining Task:

Explicit construction of a monotone C in AC0 on M bits s.t:(1) C is (M1-δ,ε)-resilient and(2) almost unbiased.

Page 38: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

38

∧ ∧∧ ∧∨∨∨

Executing Step 2

Remaining Task:

We construct such a C by derandomizing Ajtai-Linial.

Ajtai-Linial function (Probabilistic): Resilient to coalitions of size O(n/log2 n).

Page 39: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

39

Ajtai-Linial FunctionTribes function:

AL Function: T1∧T2........∧Tn

Resilient to coalitions of size O(n/log2 n).

(2) Not Monotone.

(1) Probabilistic: Naive derandomization takes time nO(n2).Problems:

∧ ∧∧ ∧

n

Ti: randomly-negated Tribes on randomly chosen partitions.

Page 40: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

40

Derandomizing Ajtai-Linial

Key Ingredient: An explicit construction of a collection of partitions of [n] s.t:

(1) Any small subset of [n] has small intersection with most partitions.

(2) The partitions are pairwise pseudorandom:- the intersection of any two blocks is bounded.

n1-δ

Used to bound influence

Used to bound bias

Page 41: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

A Pseudorandom Collection of Partitions

BAD=x: |N(x) ∩ T|>|N(x)|(µ(T)+ε)

Thm.(Zuckerman 97)|BAD|≤2k.

[M]R

x

x’

Graph of a seeded extractor

T

Idea: Use explicit seeded extractor to construct partitions.

Page 42: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

42

A Pseudorandom Collection of Partitions

Let [n] = [MB] and S1,....,SR ⊂[n], |Si|=B,

Si=(₁,i1),..., (B,iB).Each Si defines a partition of [n]: Si, Si+[₁],....,

Si+[M-₁].

M

B

Si

Si+1

Page 43: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

43

A Pseudorandom Collection of Partitions

[n] = [MB] and S1,....,SR ⊂[n],

Sx=N(x)

[M]R

x

x’

Page 44: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

44

A Pseudorandom Collection of Partitions

Properties required:

(1) Any T ⊂ [n], |T|<n1-δ, small intersection with partitions.

[M]R

x

x’

We show Trevisan Extractor satisfies these. (Slightly simpler version of Property 2 proved by Li ’12).

(2) For all x ≠ x’, i, j

|(N(x)+i) ∩ (N(x’)+j)|<0.9B

Page 45: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

45

Some Ingredients in Analysis

New way of analyzing bias of Ajtai-Linial function: AND of TRIBE functions

Crucial in achieving monotonicity, derandomizing.

A useful inequality: Janson’s Inequality

If the Si’s are small and have low pairwise intersection, then

T: Each element r in R picked independently with probability p.

S1,..., St⊂ [R].

Page 46: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

46

Subsequent Applications and Extensions of our Work

• Li: explicit affine extractor for min-entropy logCn.

• Li: explicit 2-source extractor output length 0.9k.

• Meka: explicit resilient function to match the probabilistic Ajtai-Linial construction.

Page 47: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

47

Open Questions

• Negligible error? We achieve error 1/nΩ(1); not enough for cryptographic applications.

• More applications? Of results or techniques.

Page 48: 1 Explicit Two-Source Extractors and Resilient Functions Eshan Chattopadhyay David Zuckerman UT Austin

48

Thank You!