Derandomization
Total Page:16
File Type:pdf, Size:1020Kb
Derandomization In the early 1980's, Yao demonstrated how one way functions can be used to construct pseudorandom generators, which suffice for T n partial derandomization of BPP, i.e. BPP ⊆ >0 TIME(2 ). 1. A. Shamir. On the Generation of Cryptographically Strong Pseudorandom Sequences. ICALP, 1981. 2. M. Blum and S. Micali. How to Generate Cryptographically Strong Sequences of Pseudorandom Bits. SIAM J. Computing, 1984. 3. Q. Yao. Theory and Applications of Trapdoor Functions. FOCS, 1982. Computational Complexity, by Fu Yuxi Derandomization 1 / 72 Since late 1980's researchers have looked for non-cryptographic assumptions for derandomization. I There is a hard function whose inverse is easy. I There is a hard function in EXP or E. Computational Complexity, by Fu Yuxi Derandomization 2 / 72 Synopsis 1. Derandomization Using Pseudorandom Generator 2. Hardness-Randomness Tradeoff 3. Derandomization Implies Circuit Lower Bound 4. Randomness vs Time Computational Complexity, by Fu Yuxi Derandomization 3 / 72 Derandomization Using Pseudorandom Generator Computational Complexity, by Fu Yuxi Derandomization 4 / 72 The strings produced by a generator must look pseudorandom to a class of distinguishers. There are several issues. 1. Quality of generator I stretch function I distinguisher's computing power I error bound (constant or reciprocal of polynomial) 2. Price of generator I seed length I running time Computational Complexity, by Fu Yuxi Derandomization 5 / 72 Pseudorandom generators used in cryptography are required to be P-time computable. In present setting we drop this requirement since it is not necessary for the purpose of derandomization. Computational Complexity, by Fu Yuxi Derandomization 6 / 72 Pseudorandomness A distribution Y over f0; 1gm is (S; )-pseudorandom, where S 2 N and > 0, if for every circuit C with jCj ≤ S it holds that jPr[C(Y ) = 1] − Pr[C(Um) = 1]j < . We require that distinguishers are nonuniform. Computational Complexity, by Fu Yuxi Derandomization 7 / 72 Pseudorandom Generator Suppose ` : N ! N is P-time computable and S : N ! N is time constructible and nondecreasing. We call a function family n `(n) S(`(n))o G = Gn : f0; 1g ! f0; 1g n2N an S(`)-pseudorandom generator if the distribution Gn(U`(n)) is 3 1 (S(`(n)) ; 10 )-pseudorandom for all input size n. I ` computes seed length from input size. I S is the stretch function. O(`) I S(`) is the computation bound, dominated by 2 . 3 O(`) I S(`) is the circuit size bound, dominated by 2 . O(`) I G is supposed to be computable in 2 time. Computational Complexity, by Fu Yuxi Derandomization 8 / 72 Derandomization Using Pseudorandom Generator Theorem. Suppose an S(`)-pseudorandom generator exists. Then BPTIME(S(`(n))) ⊆ TIME(2O(`(n))): Let L 2 BPTIME(S(`(n))) be accepted by PTM A. For each n, Pr S(`(n)) [ (x; r) = L(x)] ≥ 2=3: r2Rf0;1g A `(n) B(x) simulates A(x) using pseudorandom strings in G(f0; 1g ). 2 1 Suppose Pr[A(x; G(r)) = L(x)] ≤ 3 − 10 for infinitely many x's. Use Cook-Levin reduction to construct a distinguisher circuit computing r 7! A(x; r) with x hard-wired. [nonuniformity here] The size of the circuit is bounded by O(S(`(n))2). Contradiction. Computational Complexity, by Fu Yuxi Derandomization 9 / 72 An algorithm is superpolynomial if it runs in O(n!(1)) time. An algorithm is subpolynomial if it runs in O(no(1)) time. polylog(n) I QuasiP = TIME(2 ). T nc I SUBEXP = c>0 TIME(2 ). Computational Complexity, by Fu Yuxi Derandomization 10 / 72 Derandomization Using Pseudorandom Generator Corollary. 1. If there is a 2c`-pseudorandom generator for some c > 0, then BPP = P. 2. If there is a 2`c -pseudorandom generator for some c > 0, then BPP ⊆ QuasiP. 3. If for every c > 1 there is an `c -pseudorandom generator, then BPP ⊆ SUBEXP. Suppose the PTM we want to derandomize runs in nd time. c` d I S(`) = 2 and `(n) = c log(n). `c 1=c I S(`) = 2 and `(n) = (d log(n)) .[ c can be very close to 0] c d=c I S(`) = ` and `(n) = n for every c > 1. Computational Complexity, by Fu Yuxi Derandomization 11 / 72 Hardness-Randomness Tradeoff Computational Complexity, by Fu Yuxi Derandomization 12 / 72 Hardness-Randomness Tradeoffs, that computational hardness can be used as a source of computational randomness, are evidence that BPP can be derandomized. 1. N. Nisan and A. Wigderson. Hardness vs Randomness. FOCS 1988. JCSS 1994. 2. N. Nisan. Pseudorandom Bits for Constant Depth Circuits. Comninatorica, 1991. 3. L. Babai, L. Fortnow, N. Nisan and A. Wigderson. BPP has Subexponential Time Simulations Unless EXPTIME has Publishable Proofs. Complexity Theory, 1993. 4. R. Impagliazzo and A. Wigderson. BPP=P Unless E has Subexponential Circuits, Derandomizing the XOR Lemma. STOC 1997. Computational Complexity, by Fu Yuxi Derandomization 13 / 72 \Informally speaking, a pseudorandom generator is an easy to compute function which converts a few random bits to many pseudorandom bits that look random to any small circuit." Nisan and Wigderson, 1994 A pseudorandom generator G : f0; 1g` ! f0; 1gS(`) produces an S(`)-bit string from an `-bit string such that no S(`)-size circuit C 1 can distinguish the distributions G(U`), US(`) with probability S(`) . O(`) I The function G is computable in2 . I We want ` to be as small as possible. Ideally ` = O(log S). We will derive a pseudorandom generator G : f0; 1g` ! f0; 1gS(`) from a Boolean function f whose average case hardness is S(`). Computational Complexity, by Fu Yuxi Derandomization 14 / 72 Nisan-Wigderson Theorem Theorem. If some f 2 E exists such that 8n:Havg(f )(n) ≥ S(n), then there is an S0(`)-pseudorandom generator, where S0(`) = S(n)δ for some δ > 0 and n satisfies n ≥ δp` log S(n). N. Nisan and A. Wigderson. I Hardness vs Randomness. FOCS 1988. JCSS 1994. Computational Complexity, by Fu Yuxi Derandomization 15 / 72 Yao's Theorem. Let Y be a distribution over f0; 1gm. Suppose S > 10n and > 0 and the following holds: For every circuit C of size at most 2S and every i 2 [m], 1 Pr[C(r1;:::; ri−1) = ri ] − < : 2 m Then Y is (S; )-pseudorandom. I Theory and Applications of Trapdoor Functions. FOCS 1982. Computational Complexity, by Fu Yuxi Derandomization 16 / 72 Proof of Yao's Theorem Suppose Y is not (S; )-pseudorandom. Wlog, we may assume that there is circuit C of size S such that Pr[C(Y ) = 1] − Pr[C(Um) = 1] ≥ . (1) For i 2 [m], the hybrid distribution Yi is defined in terms of Y and Um in the standard way. Notice that Y0 = Um and Ym = Y . def Pm I pi = Pr[C(Yi ) = 1]. By (1), i=1 pi − pi−1 = pm − p0 ≥ . I pi − pi−1 ≥ /m for some i 2 [m] by averaging argument. Now design a random circuit D as follows: 1. Input y1;:::; yi−1; 2. Generate independent ri ;:::; rm 2R f0; 1g; 3. If C(y1;:::; yi−1; ri ;:::; rm) = 1 then ri else 1 − ri . Computational Complexity, by Fu Yuxi Derandomization 17 / 72 Proof of Yao's Theorem The probability that D(y1;:::; yi−1) = yi is 1 1 · Pr[C = 1jy = r ] + · Pr[C = 0jy = 1 − r ]; 2 i i 2 i i where C abbreviates C(y1;:::; yi−1; ri ;:::; rm). Pr[C = 1jyi = ri ] = pi . On the other hand, pi−1 = Pr[C = 1] = Pr[C = 1jyi = ri ]=2 + Pr[C = 1jyi = 1 − ri ]=2 = pi =2 + (1 − Pr[C = 0jyi = 1 − ri ])=2: Conclude that Pr[D(y1;:::; yi−1) = yi ] ≥ 1=2 + /m. By averaging argument, we get a deterministic circuit D0 by fixing 0 some ri ;:::; rm while preserving the bias. Clearly jD j ≤ 2S. Computational Complexity, by Fu Yuxi Derandomization 18 / 72 Nisan-Wigderson Construction: Extending One Bit 4 Lemma. Suppose that there exists f 2 E with Havg(f ) ≥ n . Then there exists an S(`)-pseudorandom generator G for S(`) = ` + 1. For z 2 f0; 1g` set the (` + 1)-generator G by G(z) = z ◦ f (z). Clearly S(jzj) = ` + 1 = jG(z)j. By Yao's Theorem we only have to prove that there do not exist any circuit C of size ≤ 2(` + 1)3 < `4 and any i 2 [` + 1] such that 1 1 1 Pr [C(r ;:::; r ) = r ] > + · : (2) r=G(U`) 1 i−1 i 2 ` + 1 10 The inequality (2) fails for i 2 [`]. If i = ` + 1, the inequality (2) 4 4 contradicts to the assumption Havg(f ) ≥ n since 10(` + 1) < ` . Computational Complexity, by Fu Yuxi Derandomization 19 / 72 Nisan-Wigderson Construction: Extending Two Bit 4 Lemma. Suppose that there exists f 2 E with Havg(f ) ≥ n . Then there exists an S(`)-pseudorandom generator G for S(`) = ` + 2. G(z) = z1 ··· z`=2 ◦ f (z1;:::; z`=2) ◦ z`=2+1 ··· z` ◦ f (z`=2+1;:::; z`). 1. The inequality (2) cannot hold for i 2 [` + 1]. 2. In the case i = ` + 2, the inequality (2) becomes 0 0 1 1 1 Pr 0 `=2 [C(r ◦ f (r) ◦ r ) = f (r )] > + · : r;r 2Rf0;1g 2 ` + 2 10 By averaging principle, there is some r such that the above 0 `=2 inequality holds for probability over r 2R f0; 1g . Now hardwire the bits r ◦ f (r) to C. We obtain a circuit of size ≤ 2(` + 2)3 < (`=2)4 that would lead to contradiction. Computational Complexity, by Fu Yuxi Derandomization 20 / 72 Nisan-Wigderson Construction: NW Generator Let f : f0; 1gn ! f0; 1g. Let I = fI1;:::; Img be a family of subsets of [`] with 8j:jIj j = n.