On Pseudorandomness with respect to Deterministic Observes

In the theory of pseudorandomness, potential (uniform) observers are modeled as probabilistic polynomial-time machines. In fact many of the central results in that theory are proven via probabilistic polynomial-time reductions. In this paper we show that analogous deterministic reductions are unlikely to hold. We conclude that randomness of the observer is essential to the theory of pseudorandomness. What we actually prove is that the hypotheses of two central theorems (in the theory of pseudorandomness) hold unconditionally when stated with respect to deterministic polynomial-time algorithms. Thus, if these theorems were true for deterministic observers, then their conclusions would hold unconditionally, which we consider unlikely. For example, it would imply (unconditionally) that any unary language in BPP is in P. The results are proven using diagonalization and pairwise independent sample spaces.

[1]  Oded Goldreich,et al.  On the power of two-point based sampling , 1989, J. Complex..

[2]  Joe Kilian,et al.  Primality testing using elliptic curves , 1999, JACM.

[3]  Noam Nisan,et al.  Hardness vs. randomness , 1988, [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science.

[4]  Avi Wigderson,et al.  P = BPP if E requires exponential circuits: derandomizing the XOR lemma , 1997, STOC '97.

[5]  Ming-Deh A. Huang,et al.  Primality Testing and Abelian Varieties over Finite Fields , 1992 .

[6]  Volker Strassen,et al.  A Fast Monte-Carlo Test for Primality , 1977, SIAM J. Comput..

[7]  Avi Wigderson,et al.  Randomness vs. time: de-randomization under a uniform assumption , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).

[8]  Oded Goldreich,et al.  Modern Cryptography, Probabilistic Proofs and Pseudorandomness , 1998, Algorithms and Combinatorics.

[9]  Silvio Micali,et al.  Probabilistic Encryption , 1984, J. Comput. Syst. Sci..

[10]  Manuel Blum,et al.  How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).

[11]  Andrew Chi-Chih Yao,et al.  Theory and application of trapdoor functions , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).

[12]  M. Rabin Probabilistic algorithm for testing primality , 1980 .