Explicit dispersers with polylog degree

An (N, M, ‘T)-disperser is a duected bipartite Multigraph G = (V, W,E) with IV[ = N, IW[ = M and all edges directed from V to W, having the following expansion property: any subset of V having at least T vertices has a neighbor set of sise at least M/2. For any pair of constants (, ~, 1 z ~ > ~ z 0, ~y suffiaently large N, and for any T ~ 2(106@, M < 2(I%N)A , we give an explicit elementary construction ~f an (N, M, T)-disperser such that the out-degree of any vertex in V is at most polylogarithmic in N. Using this with known applications of dispersers yields several results. First, our construction implies that the complexity class Strong-RP defined by Sipser, equals RP. Second, for arty fixed q > 0, we give the first polynomial-time simulation of RP algorithms using the output of any “minimally randomn source. For any integral R >0, such a source accepts a single request for an R-bit string and generates the string according to a distribution that assigns probahiity at most 2-R’ to any string. It is minimally random in the sense that any weaker source is insufficient to do a blackbox polynomial-time simulation of RP algorithms. Third, we show improvements on the expander construction and the consequent applications given by Wlgderson and Zuck“The full version of thk work will be available at the DIMACS www site soon (URIJ http:ildirnacs. r-utgers. edu). The first and third authors were supported in part by NSF grant CCR-92 15293. The secoud author was supported in part by grant 93-6-6 of the Alfred P. Sloan Foundation to the Institute for Advanced Study, and in part by ESPRIT Bcsic Research Action Programme of the EC under contract No. 7141 (project ALCOM II). All three authors were also supported in part by DIMACS (Center for Discrete Mathematics & Theoretical Computer Science), through NSF grant NSF-STC91-19999 and by the New Jersey Commission on Science and Technology. *Dep~ment of Mathematics, Rutgem University, New Brunswick, NJ 08854, USA. Email: saka@math.ntgers. edn. $ school of Mathematics, Institute for Advanced Study, prince ton, NJ 08540, USA. Parts of this work were done while at DIMACS, while visiting the Department of Applied Mathematics and Computer Science, \Veizmann Institute of Science, Rehovot 76100, Israel, and while visiting the Department of Computer Science, University of Warwick, Coventry CV4 7AL, UK. Email: aravind@dca.warwick. ac.uk. SrJep~ment of Computer Science, Rutgers University, New Brunswick, NJ 08854, USA. Email: szhou@cs. rutgers. edu. Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the ACM copyri ht notice and the 3 title of the publication and. tis date appear,. an notice is given that copym IS by pernws~n of the Asscqatlon of Computing Machinery. o cop otherwe, or to repubkh, requires ‘{ a fee ancVor spec m permissmn. STOC’ 95, Las Vegas, Nevada, USA O 1995 ACM 0-89791 -718-9195/0005 ..$3.50 erman. Applying our disperser to a reduction due to Zuckerman, we show that approximating log log u(G) (where w(G) denotes the maximum clique sise of a given graph G) to within any constant tkctor cannot be done in deterministic quaei-polynomial time, assuming that rion-deterministic quasbpolynomial time does not equal deterministic quaaipolynomial time. Finally, we improve knolwn results due to Fiat and Naor and Zuckerman, for a problem in data structures: implicit 0(1 ) probe search.

[1]  U. Vazirani Randomness, adversaries and computation (random polynomial time) , 1986 .

[2]  Miklos Santha,et al.  On Using Deterministic Functions to Reduce Randomness in Probabilistic Algorithms , 1987, Inf. Comput..

[3]  Aravind Srinivasan,et al.  Computing with very weak random sources , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[4]  Manuel Blum,et al.  Independent unbiased coin flips from a correlated biased source—A finite state markov chain , 1984, Comb..

[5]  David Zuckerman,et al.  NP-complete problems have a version that's hard to approximate , 1993, [1993] Proceedings of the Eigth Annual Structure in Complexity Theory Conference.

[6]  David Zuckerman,et al.  General weak random sources , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.

[7]  Alan M. Ferrenberg,et al.  Monte Carlo simulations: Hidden errors from "good" random number generators. , 1992, Physical review letters.

[8]  Manuel Blum Independent unbiased coin flips from a correlated biased source—A finite state markov chain , 1986, Comb..

[9]  Vijay V. Vazirani,et al.  Random polynomial time is equal to slightly-random polynomial time , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).

[10]  V. Vazirani,et al.  Random Polynomial Time is Equal to Semi-Random Polynomial Time , 1988 .

[11]  Avi Wigderson,et al.  Expanders That Beat the Eigenvalue Bound: Explicit Construction and Applications , 1993, Comb..

[12]  Oded Goldreich,et al.  Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity , 1988, SIAM J. Comput..

[13]  Tsan-Sheng Hsu,et al.  Graph augmentation and related problems: theory and practice , 1993 .

[14]  Umesh V. Vazirani,et al.  Efficiency considerations in using semi-random sources , 1987, STOC.

[15]  Avi Wigderson,et al.  Dispersers, deterministic amplification, and weak random sources , 1989, 30th Annual Symposium on Foundations of Computer Science.

[16]  Michael Sipser,et al.  Expanders, Randomness, or Time versus Space , 1988, J. Comput. Syst. Sci..

[17]  Amos Fiat,et al.  Implicit O(1) probe search , 1989, STOC '89.

[18]  Miklos Santha,et al.  Generating Quasi-Random Sequences from Slightly-Random Sources (Extended Abstract) , 1984, FOCS.

[19]  David Zuckerman,et al.  Simulating BPP using a general weak random source , 1991, [1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science.

[20]  Noam Nisan,et al.  More deterministic simulation in logspace , 1993, STOC.

[21]  Miklos Santha,et al.  Generating Quasi-random Sequences from Semi-random Sources , 1986, J. Comput. Syst. Sci..

[22]  Leonid A. Levin,et al.  Pseudo-random generation from one-way functions , 1989, STOC '89.

[23]  Umesh V. Vazirani,et al.  Strong communication complexity or generating quasi-random sequences from two communicating semi-random sources , 1987, Comb..

[24]  Tsan-sheng Hsu,et al.  Parallel implementation of algorithms for finding connected components in graphs , 1994, Parallel Algorithms.