A New Approach to Affine Extractors and Dispersers

We study the problem of constructing affine extractors over $\GF(2)$. Previously the only known construction that can handle sources with arbitrarily linear entropy is due to Bourgain (and a slight modification by Yehudayoff), which makes extensive use of complicated inequality manipulations and relies on a careful choice of a polynomial. In this paper we give a new and conceptually much cleaner construction of affine extractors for linear entropy sources that outputs a constant fractionof the entropy with exponentially small error. This matches theprevious best result of Bourgain. The extractor can be pushed tohandle affine sources with entropy $n/\sqrt{\log n \logn}$. This slightly improves Bourgain's result andmatches the recent result of Yehudayoff. We also give a zero-error disperser for affine sources with entropy $n/\sqrt {\log n}$that outputs $n^{\Omega(1)}$ bits. This improves previousconstructions of affine dispersers that output more than 1 bit. In contrast to Bourgain's construction, our construction mainly uses extractor machinery and basic properties of polynomials. Some of our techniques may be of independent interest.

[1]  Le Anh Vinh,et al.  The Szemerédi-Trotter type theorem and the sum-product estimate in finite fields , 2007, Eur. J. Comb..

[2]  Emanuele Viola,et al.  Norms, XOR Lemmas, and Lower Bounds for Polynomials and Protocols , 2008, Theory Comput..

[3]  Eli Ben-Sasson,et al.  Affine dispersers from subspace polynomials , 2009, STOC '09.

[4]  Ran Raz,et al.  Deterministic extractors for affine sources over large fields , 2008, Comb..

[5]  Yael Tauman Kalai,et al.  2-Source Extractors under Computational Assumptions and Cryptography with Defective Randomness , 2009, 2009 50th Annual IEEE Symposium on Foundations of Computer Science.

[6]  Avi Wigderson,et al.  Kakeya Sets, New Mergers and Old Extractors , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.

[7]  Madhu Sudan,et al.  Extensions to the Method of Multiplicities, with Applications to Kakeya Sets and Mergers , 2009, 2009 50th Annual IEEE Symposium on Foundations of Computer Science.

[8]  Jean Bourgain,et al.  On the Construction of Affine Extractors , 2007 .

[9]  Elad Haramaty,et al.  On the structure of cubic and quartic polynomials , 2009, STOC '10.

[10]  Oded Goldreich,et al.  Three XOR-Lemmas - An Exposition , 1995, Electron. Colloquium Comput. Complex..

[11]  Luca Trevisan,et al.  Extracting randomness from samplable distributions , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.

[12]  Matt DeVos,et al.  Simple Affine Extractors Using Dimension Expansion , 2010, 2010 IEEE 25th Annual Conference on Computational Complexity.

[13]  Avi Wigderson,et al.  Extracting Randomness Using Few Independent Sources , 2006, SIAM J. Comput..

[14]  Anup Rao,et al.  Extractors for a constant number of polynomially small min-entropy independent sources , 2006, STOC '06.

[15]  Ronen Shaltiel,et al.  Recent Developments in Explicit Constructions of Extractors , 2002, Bull. EATCS.

[16]  Luca Trevisan,et al.  Extractors and pseudorandom generators , 2001, JACM.

[17]  Oded Goldreich,et al.  Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity , 1988, SIAM J. Comput..

[18]  David Zuckerman,et al.  Electronic Colloquium on Computational Complexity, Report No. 100 (2005) Linear Degree Extractors and the Inapproximability of MAX CLIQUE and CHROMATIC NUMBER , 2005 .

[19]  Avi Wigderson,et al.  Extractors: optimal up to constant factors , 2003, STOC '03.

[20]  Jørn Justesen,et al.  Class of constructive asymptotically good algebraic codes , 1972, IEEE Trans. Inf. Theory.

[21]  Ran Raz,et al.  Deterministic extractors for bit-fixing sources by obtaining an independent seed , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.

[22]  Guy Kindler,et al.  Simulating independence: new constructions of condensers, ramsey graphs, dispersers, and extractors , 2005, STOC '05.

[23]  Leonid A. Levin,et al.  Pseudo-random generation from one-way functions , 1989, STOC '89.

[24]  Madhu Sudan,et al.  Optimal Testing of Reed-Muller Codes , 2009, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.

[25]  Amir Yehudayoff,et al.  Affine extractors over prime fields , 2011, Comb..

[26]  David Zuckerman,et al.  DETERMINISTIC EXTRACTORS FOR BIT-FIXING SOURCES AND EXPOSURE-RESILIENT CRYPTOGRAPHY , 2003 .

[27]  David Zuckerman,et al.  Deterministic extractors for small-space sources , 2011, J. Comput. Syst. Sci..

[28]  Anup Rao,et al.  Extractors for Low-Weight Affine Sources , 2009, 2009 24th Annual IEEE Conference on Computational Complexity.

[29]  L. Fortnow,et al.  Recent Developments in Explicit Constructions of Extractors , 2002, Bull. EATCS.

[30]  Avi Wigderson,et al.  2-source dispersers for sub-polynomial entropy and Ramsey graphs beating the Frankl-Wilson construction , 2006, STOC '06.

[31]  Umesh V. Vazirani Towards a strong communication complexity theory or generating quasi-random sequences from two communicating slightly-random sources , 1985, STOC '85.