Extractors for Circuit Sources

We obtain the first deterministic extractors for sources generated (or sampled) by small circuits of bounded depth. Our main results are:(1) We extract k poly( k / n d ) bits with exponentially small error from n-bit sources of min-entropy k that are generated by functions that are d-local, i.e., each output bit depends on at most d input bits. In particular, we extract from NC-zero sources, corresponding to d = O(1).(2) We extract k poly( k / n^(1.001) ) bits with super-polynomially small error from n-bit sources of min-entropy k that are generated by poly(n)-size AC-zero circuits. As our starting point, we revisit the connection by Trevisan and Vadhan (FOCS 2000) between circuit lower bounds and extractors for sources generated by circuits. We note that such extractors (with very weak parameters) are equivalent to lower bounds for generating distributions (FOCS 2010; with Lovett, CCC 2011). Building on those bounds, we prove that the sources in (1) and (2) are (close to) a convex combination of high-entropy "bit-block"sources. Introduced here, such sources are a special case of affine ones. As extractors for (1) and (2) one can use the extractor for low-weight affine sources by Rao (CCC 2009). Along the way, we exhibit an explicit n-bit boolean function bsuch that poly(n)-size AC-zero circuits cannot generate the distribution(X,b(X)), solving a problem about the complexity of distributions. Independently, De and Watson (RANDOM 2011) obtain a result similar to (1) in the special case d = o(log n).

[1]  Ran Raz,et al.  A parallel repetition theorem , 1995, STOC '95.

[2]  Ryan O'Donnell,et al.  Every decision tree has an influential variable , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).

[3]  Xin Li,et al.  Improved Constructions of Three Source Extractors , 2011, 2011 IEEE 26th Annual Conference on Computational Complexity.

[4]  Manuel Blum Independent unbiased coin flips from a correlated biased source—A finite state markov chain , 1986, Comb..

[5]  Nathan Linial,et al.  The influence of variables on Boolean functions , 1988, [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science.

[6]  Nathan Linial,et al.  Collective Coin Flipping , 1989, Adv. Comput. Res..

[7]  Luca Trevisan,et al.  Extracting randomness from samplable distributions , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.

[8]  Ran Raz,et al.  Extracting all the randomness and reducing the error in Trevisan's extractors , 1999, STOC '99.

[9]  Oded Goldreich,et al.  Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity , 1988, SIAM J. Comput..

[10]  Anindya De,et al.  Extractors and Lower Bounds for Locally Samplable Sources , 2011, APPROX-RANDOM.

[11]  Homin K. Lee,et al.  Decision Trees and Influence: an Inductive Proof of the OSSS Inequality , 2010, Theory Comput..

[12]  L. H. Harper Optimal Assignments of Numbers to Vertices , 1964 .

[13]  Ronen Shaltiel,et al.  Dispersers for Affine Sources with Sub-polynomial Entropy , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.

[14]  J. Håstad Computational limitations of small-depth circuits , 1987 .

[15]  Shachar Lovett,et al.  Bounded-Depth Circuits Cannot Sample Good Codes , 2011, 2011 IEEE 26th Annual Conference on Computational Complexity.

[16]  Enkatesan G Uruswami Unbalanced expanders and randomness extractors from Parvaresh-Vardy codes , 2008 .

[17]  Amir Yehudayoff,et al.  Affine extractors over prime fields , 2011, Comb..

[18]  Miklos Santha,et al.  Generating Quasi-random Sequences from Semi-random Sources , 1986, J. Comput. Syst. Sci..

[19]  A. Yao Separating the polynomial-time hierarchy by oracles , 1985 .

[20]  Noga Alon,et al.  Construction Of Asymptotically Good Low-rate Error-correcting Codes Through Pseudo-random Graphs , 1991, Proceedings. 1991 IEEE International Symposium on Information Theory.

[21]  Sergiu Hart,et al.  A note on the edges of the n-cube , 1976, Discret. Math..

[22]  Neil Thapen Notes on switching lemmas , 2009 .

[23]  Ran Raz,et al.  Deterministic extractors for bit-fixing sources by obtaining an independent seed , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.

[24]  David Zuckerman,et al.  Deterministic extractors for small-space sources , 2011, J. Comput. Syst. Sci..

[25]  P. Beame A switching lemma primer , 1994 .

[26]  Anup Rao,et al.  Extractors for Low-Weight Affine Sources , 2009, 2009 24th Annual IEEE Conference on Computational Complexity.

[27]  Noam Nisan,et al.  Pseudorandomness for network algorithms , 1994, STOC '94.

[28]  Miklós Ajtai,et al.  ∑11-Formulae on finite structures , 1983, Ann. Pure Appl. Log..

[29]  Guy Kindler,et al.  Simulating independence: new constructions of condensers, ramsey graphs, dispersers, and extractors , 2005, STOC '05.

[30]  Aravind Srinivasan,et al.  Randomized Distributed Edge Coloring via an Extension of the Chernoff-Hoeffding Bounds , 1997, SIAM J. Comput..

[31]  Russell Impagliazzo,et al.  Constructive Proofs of Concentration Bounds , 2010, APPROX-RANDOM.

[32]  GuruswamiVenkatesan,et al.  Unbalanced expanders and randomness extractors from Parvaresh--Vardy codes , 2009 .

[33]  Noam Nisan,et al.  Pseudorandom bits for constant depth circuits , 1991, Comb..

[34]  Pavel Pudlák,et al.  Threshold circuits of bounded depth , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).

[35]  Emanuele Viola,et al.  The Complexity of Distributions , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.

[36]  Kristoffer Arnsfelt Hansen,et al.  Some Meet-in-the-Middle Circuit Lower Bounds , 2004, MFCS.

[37]  Emanuele Viola,et al.  Pseudorandom bits for constant depth circuits with few arbitrary symmetric gates , 2005, 20th Annual IEEE Conference on Computational Complexity (CCC'05).

[38]  Noga Alon,et al.  Construction of asymptotically good low-rate error-correcting codes through pseudo-random graphs , 1992, IEEE Trans. Inf. Theory.

[39]  David Zuckerman,et al.  DETERMINISTIC EXTRACTORS FOR BIT-FIXING SOURCES AND EXPOSURE-RESILIENT CRYPTOGRAPHY , 2003 .

[40]  Oded Goldreich,et al.  The bit extraction problem or t-resilient functions , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).

[41]  Luca Trevisan,et al.  Extractors and pseudorandom generators , 2001, JACM.

[42]  Moni Naor,et al.  Efficient cryptographic schemes provably as secure as subset sum , 1989, 30th Annual Symposium on Foundations of Computer Science.

[43]  Jean Bourgain,et al.  On the Construction of Affine Extractors , 2007 .

[44]  Emanuele Viola,et al.  Hardness amplification proofs require majority , 2008, SIAM J. Comput..

[45]  Emanuele Viola,et al.  On constructing parallel pseudorandom generators from one-way functions , 2005, 20th Annual IEEE Conference on Computational Complexity (CCC'05).

[46]  Rocco A. Servedio,et al.  Bounded Independence Fools Halfspaces , 2009, 2009 50th Annual IEEE Symposium on Foundations of Computer Science.

[47]  Xin Li,et al.  A New Approach to Affine Extractors and Dispersers , 2011, 2011 IEEE 26th Annual Conference on Computational Complexity.

[48]  Michael Sipser,et al.  Parity, circuits, and the polynomial-time hierarchy , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[49]  Russell Impagliazzo,et al.  Communication complexity towards lower bounds on circuit depth , 2001, computational complexity.

[50]  Eli Ben-Sasson,et al.  Affine dispersers from subspace polynomials , 2009, STOC '09.