On Randomness Extraction in AC0

We consider randomness extraction by AC0 circuits. The main parameter, n, is the length of the source, and all other parameters are functions of it. The additional extraction parameters are the min-entropy bound k = k(n), the seed length r = r(n), the output length m = m(n), and the (output) deviation bound e = e(n). For k ≤ n/logω(1) n, we show that AC0-extraction is possible if and only if m/r ≤ 1+poly(log n)· k/n; that is, the extraction rate m/r exceeds the trivial rate (of one) by an additive amount that is proportional to the min-entropy rate k/n. In particular, non-trivial AC0-extraction (i.e., m ≥ r + 1) is possible if and only if k · r > n/poly(log n). For k ≥ n/logO(1) n, we show that AC0-extraction of r + Ω(r) bits is possible when r = O(log n), but leave open the question of whether more bits can be extracted in this case. The impossibility result is for constant e, and the possibility result supports e = 1/poly(n). The impossibility result is for (possibly) non-uniform AC0, whereas the possibility result hold for uniform AC0. All our impossibility results hold even for the model of bit-fixing sources, where k coincides with the number of non-fixed (i.e., random) bits. We also consider deterministic AC0 extraction from various classes of restricted sources. In particular, for any constant δ > 0, we give explicit AC0 extractors for poly(1/δ) independent sources that are each of min-entropy rate δ; and four sources suffice for δ = 0.99. Also, we give non-explicit AC0 extractors for bit-fixing sources of entropy rate 1/poly(log n) (i.e., having n/poly(log n) unfixed bits). This shows that the known analysis of the "restriction method" (for making a circuit constant by fixing as few variables as possible) is tight for AC0 even if the restriction is picked deterministically depending on the circuit.

[1]  Ryan O'Donnell,et al.  Analysis of Boolean Functions , 2014, ArXiv.

[2]  Emanuele Viola,et al.  On constructing parallel pseudorandom generators from one-way functions , 2005, 20th Annual IEEE Conference on Computational Complexity (CCC'05).

[3]  Gheorghe Paun,et al.  Current Trends in Theoretical Computer Science: The Challenge of the New Century , 2004 .

[4]  Johan Håstad,et al.  Almost optimal lower bounds for small depth circuits , 1986, STOC '86.

[5]  Ran Raz,et al.  Deterministic extractors for affine sources over large fields , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).

[6]  Michael E. Saks,et al.  Size-Depth Tradeoffs for Threshold Circuits , 1997, SIAM J. Comput..

[7]  J. Reif,et al.  On Threshold Circuits and Polynomial Computation , 1992, SIAM J. Comput..

[8]  Nathan Linial,et al.  The influence of variables on Boolean functions , 1988, [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science.

[9]  Siyao Guo,et al.  Sparse extractor families for all the entropy , 2012, ITCS '13.

[10]  Oded Goldreich,et al.  Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity , 1988, SIAM J. Comput..

[11]  Emanuele Viola,et al.  The complexity of constructing pseudorandom generators from hard functions , 2005, computational complexity.

[12]  Noam Nisan,et al.  Pseudorandom bits for constant depth circuits , 1991, Comb..

[13]  Michael Sipser,et al.  Parity, circuits, and the polynomial-time hierarchy , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[14]  David Zuckerman,et al.  General weak random sources , 1990, Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science.

[15]  László Babai Random Oracles Separate PSPACE from the Polynomial-Time Hierarchy , 1987, Inf. Process. Lett..

[16]  Yuval Ishai,et al.  On Pseudorandom Generators with Linear Stretch in NC0 , 2006, computational complexity.

[17]  Oded Goldreich,et al.  Computational complexity: a conceptual perspective , 2008, SIGA.

[18]  Jaikumar Radhakrishnan,et al.  Deterministic restrictions in circuit complexity , 1996, STOC '96.

[19]  David Zuckerman,et al.  Electronic Colloquium on Computational Complexity, Report No. 100 (2005) Linear Degree Extractors and the Inapproximability of MAX CLIQUE and CHROMATIC NUMBER , 2005 .

[20]  Uriel Feige,et al.  Noncryptographic selection protocols , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).

[21]  Stephen A. Cook,et al.  Log Depth Circuits for Division and Related Problems , 1986, SIAM J. Comput..

[22]  Ran Raz,et al.  Error reduction for extractors , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).

[23]  Michael Sipser,et al.  Parity, circuits, and the polynomial-time hierarchy , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[24]  Avi Wigderson,et al.  Extracting Randomness via Repeated Condensing , 2006, SIAM J. Comput..

[25]  Moni Naor,et al.  Efficient cryptographic schemes provably as secure as subset sum , 1989, 30th Annual Symposium on Foundations of Computer Science.

[26]  Luca Trevisan,et al.  Extractors and pseudorandom generators , 2001, JACM.

[27]  Salil P. Vadhan,et al.  Constructing Locally Computable Extractors and Cryptosystems in the Bounded-Storage Model , 2003, Journal of Cryptology.

[28]  David Zuckerman Randomness-optimal oblivious sampling , 1997, Random Struct. Algorithms.

[29]  Noam Nisan,et al.  The computational complexity of universal hashing , 1990, Proceedings Fifth Annual Structure in Complexity Theory Conference.

[30]  Avi Wigderson,et al.  Linear-Size Constant-Depth Polylog-Treshold Circuits , 1991, Inf. Process. Lett..

[31]  Richard M. Karp,et al.  The rank of sparse random matrices over finite fields , 1997, Random Struct. Algorithms.

[32]  Emanuele Viola,et al.  On Approximate Majority and Probabilistic Time , 2007, Twenty-Second Annual IEEE Conference on Computational Complexity (CCC'07).

[33]  Avi Wigderson,et al.  On derandomizing algorithms that err extremely rarely , 2014, Electron. Colloquium Comput. Complex..

[34]  Xin Li,et al.  Extractors for a Constant Number of Independent Sources with Polylogarithmic Min-Entropy , 2013, 2013 IEEE 54th Annual Symposium on Foundations of Computer Science.

[35]  Ran Raz,et al.  Improved Randomness Extraction from Two Independent Sources , 2004, APPROX-RANDOM.

[36]  Amir Yehudayoff,et al.  Monotone expansion , 2011, STOC '12.

[37]  Ehud Friedgut,et al.  Influences in Product Spaces: KKL and BKKKL Revisited , 2004, Combinatorics, Probability and Computing.

[38]  L. Fortnow Recent Developments in Explicit Constructions of Extractors , 2002 .

[39]  Michael Ben-Or,et al.  A theorem on probabilistic constant depth Computations , 1984, STOC '84.

[40]  Miklós Ajtai,et al.  ∑11-Formulae on finite structures , 1983, Ann. Pure Appl. Log..

[41]  Ran Raz,et al.  Deterministic Extractors for Bit-Fixing Sources by Obtaining an Independent Seed , 2006, SIAM J. Comput..

[42]  M. Murty Ramanujan Graphs , 1965 .

[43]  Noam Nisan,et al.  Constant depth circuits, Fourier transform, and learnability , 1989, 30th Annual Symposium on Foundations of Computer Science.

[44]  Oded Goldreich,et al.  The bit extraction problem or t-resilient functions , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).

[45]  Avi Wigderson,et al.  Monotone Expanders: Constructions and Applications , 2010, Theory Comput..

[46]  Nathan Linial,et al.  The influence of large coalitions , 1993, Comb..

[47]  J. Bourgain,et al.  MORE ON THE SUM-PRODUCT PHENOMENON IN PRIME FIELDS AND ITS APPLICATIONS , 2005 .

[48]  Oded Goldreich,et al.  A Sample of Samplers - A Computational Perspective on Sampling (survey) , 1997, Electron. Colloquium Comput. Complex..

[49]  Noam Nisan,et al.  Randomness is Linear in Space , 1996, J. Comput. Syst. Sci..

[50]  Guy Kindler,et al.  Simulating independence: new constructions of condensers, ramsey graphs, dispersers, and extractors , 2005, STOC '05.

[51]  Nathan Linial,et al.  The Influence of Variables on Boolean Functions (Extended Abstract) , 1988, FOCS 1988.

[52]  David Zuckerman,et al.  DETERMINISTIC EXTRACTORS FOR BIT-FIXING SOURCES AND EXPOSURE-RESILIENT CRYPTOGRAPHY , 2003 .

[53]  Stasys Jukna,et al.  Boolean Function Complexity Advances and Frontiers , 2012, Bull. EATCS.

[54]  David Zuckerman Simulating BPP using a general weak random source , 2005, Algorithmica.

[55]  Larry Carter,et al.  Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..

[56]  Emanuele Viola,et al.  Constant-Depth Circuits for Arithmetic in Finite Fields of Characteristic Two , 2006, STACS.

[57]  Ravi B. Boppana,et al.  The Average Sensitivity of Bounded-Depth Circuits , 1997, Inf. Process. Lett..

[58]  Avi Wigderson,et al.  Tiny Families of Functions with Random Properties: A Quality-Size Trade-off for Hashing , 1997, Electron. Colloquium Comput. Complex..

[59]  Gil Cohen,et al.  Zero-Fixing Extractors for Sub-Logarithmic Entropy , 2015, ICALP.

[60]  Umesh V. Vazirani Towards a strong communication complexity theory or generating quasi-random sequences from two communicating slightly-random sources , 1985, STOC '85.

[61]  Avi Wigderson,et al.  Extracting Randomness Using Few Independent Sources , 2006, SIAM J. Comput..

[62]  Enkatesan G Uruswami Unbalanced expanders and randomness extractors from Parvaresh-Vardy codes , 2008 .

[63]  Noam Nisan,et al.  Hardness vs Randomness , 1994, J. Comput. Syst. Sci..

[64]  A. Yao Separating the polynomial-time hierarchy by oracles , 1985 .

[65]  Avi Wigderson,et al.  P = BPP if E requires exponential circuits: derandomizing the XOR lemma , 1997, STOC '97.

[66]  Miklos Santha,et al.  Generating Quasi-random Sequences from Semi-random Sources , 1986, J. Comput. Syst. Sci..

[67]  Miklós Ajtai,et al.  Approximate Counting with Uniform Constant-Depth Circuits , 1990, Advances In Computational Complexity Theory.