Pseudorandomness for Permutation Branching Programs Without the Group Theory

The typical way we derandomize a randomized computation is to replace the truly random bits used by the computation with suitable pseudorandom bits. We require that using pseudorandom, rather than truly random, bits does not change the output of the computation with probability more than ε; we call this parameter the error. The algorithm that produces the pseudorandom bits is called a pseudorandom generator and the number of random bits needed by this algorithm to sample the distribution is called the seed length. The pseudorandom generator needs to be efficiently computable and the seed length needs to be short enough for all possible seeds to be enumerated in a deterministic simulation.

[1]  Anindya De,et al.  Pseudorandomness for Permutation and Regular Branching Programs , 2011, 2011 IEEE 26th Annual Conference on Computational Complexity.

[2]  Ran Raz,et al.  Pseudorandom Generators for Regular Branching Programs , 2014, SIAM J. Comput..

[3]  Salil P. Vadhan,et al.  Derandomized Squaring of Graphs , 2005, APPROX-RANDOM.

[4]  Luca Trevisan,et al.  Pseudorandom walks on regular digraphs and the RL vs. L problem , 2006, STOC '06.

[5]  BPHSPACE ( S ) DSPACE ( S 3 2 ) * , 1999 .

[6]  Luca Trevisan,et al.  Better Pseudorandom Generators from Milder Pseudorandom Restrictions , 2012, 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science.

[7]  János Komlós,et al.  Deterministic simulation in LOGSPACE , 1987, STOC.

[8]  Ran Raz,et al.  On recycling the randomness of states in space bounded computation , 1999, STOC '99.

[9]  Joshua Brody,et al.  The Coin Problem and Pseudorandomness for Branching Programs , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.

[10]  Pavel Pudlák,et al.  Pseudorandom Generators for Group Products , 2010, Electron. Colloquium Comput. Complex..

[11]  N. Linial,et al.  Expander Graphs and their Applications , 2006 .

[12]  Omer Reingold,et al.  Undirected connectivity in log-space , 2008, JACM.

[13]  Noam Nisan,et al.  Pseudorandomness for network algorithms , 1994, STOC '94.

[14]  Avi Wigderson,et al.  Entropy waves, the zig-zag graph product, and new constant-degree expanders and extractors , 2000, Proceedings 41st Annual Symposium on Foundations of Computer Science.

[15]  Stanislav Zák,et al.  A Sufficient Condition for Sets Hitting the Class of Read-Once Branching Programs of Width 3 - (Extended Abstract) , 2012, SOFSEM.