Skip to main content

Abstract

We consider the following problem: for given n,M, produce a sequence X 1,X 2,…,X n of bits that fools every linear test modulo M. We present two constructions of generators for such sequences. For every constant prime power M, the first construction has seed length O M (log(n/ε)), which is optimal up to the hidden constant. (A similar construction was independently discovered by Meka and Zuckerman [MZ]). The second construction works for every M,n, and has seed length O(logn + log(M/ε)log(Mlog(1/ε))).

The problem we study is a generalization of the problem of constructing small bias distributions [NN], which are solutions to the M = 2 case. We note that even for the case M = 3 the best previously known constructions were generators fooling general bounded-space computations, and required O(log2 n) seed length.

For our first construction, we show how to employ recently constructed generators for sequences of elements of ℤ M that fool small-degree polynomials (modulo M). The most interesting technical component of our second construction is a variant of the derandomized graph squaring operation of [RV]. Our generalization handles a product of two distinct graphs with distinct bounds on their expansion. This is then used to produce pseudorandom-walks where each step is taken on a different regular directed graph (rather than pseudorandom walks on a single regular directed graph as in [RTV, RV]).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ajtai, M., Iwaniec, H., Komlós, J., Pintz, J., Szemerédi, E.: Construction of a thin set with small Fourier coefficients. Bull. London Math. Soc. 22(6), 583–590 (1990)

    Google Scholar 

  2. Ajtai, M., Komlós, J., Szemerédi, E.: Deterministic Simulation in LOGSPACE. In: Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, New York City, pp. 132–140 (1987)

    Google Scholar 

  3. Alon, N., Goldreich, O., Håstad, J., Peralta, R.: Simple constructions of almost k-wise independent random variables. Random Structures & Algorithms 3(3), 289–304 (1992)

    Google Scholar 

  4. Alon, N., Mansour, Y.: ε-discrepancy sets and their application for interpolation of sparse polynomials. Information Processing Letters 54(6), 337–342 (1995)

    Google Scholar 

  5. Alon, N., Roichman, Y.: Random Cayley graphs and expanders. Random Structures Algorithms 5(2), 271–284 (1994)

    Google Scholar 

  6. Babai, L., Nisan, N., Szegedy, M.: Multiparty protocols, pseudorandom generators for logspace, and time-space trade-offs. Journal of Computer and System Sciences, 204–232 (1989)

    Google Scholar 

  7. Bellare, M., Rompel, J.: Randomness-Efficient Oblivious Sampling. In: 35th Annual Symposium on Foundations of Computer Science, Santa Fe, New Mexico, pp. 276–287. IEEE, Los Alamitos (1994)

    Google Scholar 

  8. Ben-Sasson, E., Sudan, M., Vadhan, S., Wigderson, A.: Randomness-efficient low degree tests and short PCPs via epsilon-biased sets. In: Proceedings of the Thirty-Fifth Annual ACM Symposium on Theory of Computing, pp. 612–621. ACM, New York (2003) (electronic)

    Google Scholar 

  9. Bogdanov, A., Viola, E.: Pseudorandom Bits for Polynomials. In: FOCS, pp. 41–51. IEEE Computer Society Press, Los Alamitos (2007)

    Google Scholar 

  10. Diakonikolas, I., Gopalan, P., Jaiswal, R., Servedio, R.A., Viola, E.: Bounded Independence Fools Halfspaces. CoRR abs/0902.3757 (2009)

    Google Scholar 

  11. Even, G., Goldreich, O., Luby, M., Nisan, N., Veličković, B.: Efficient approximation of product distributions. Random Structures Algorithms 13(1), 1–16 (1998)

    Google Scholar 

  12. Håstad, J., Phillips, S., Safra, S.: A well-characterized approximation problem. Information Processing Letters 47(6), 301–305 (1993)

    Google Scholar 

  13. Impagliazzo, R., Nisan, N., Wigderson, A.: Pseudorandomness for Network Algorithms. In: Proceedings of the Twenty-Sixth Annual ACM Symposium on the Theory of Computing, Montréal, Québec, Canada, pp. 356–364 (1994)

    Google Scholar 

  14. Katz, N.M.: An estimate for character sums. Journal of the American Mathematical Society 2(2), 197–200 (1989)

    Google Scholar 

  15. Lovett, S.: Unconditional pseudorandom generators for low degree polynomials. In: Ladner, R.E., Dwork, C. (eds.) STOC, pp. 557–562. ACM, New York (2008)

    Google Scholar 

  16. Meka, R., Zuckerman, D.: Small-Bias Spaces for Group Products. In: Dinur, I., et al. (eds.) APPROX and RANDOM 2009. LNCS, vol. 5687, Springer, Heidelberg (2009)

    Google Scholar 

  17. Mossel, E., Shpilka, A., Trevisan, L.: On ε-biased generators in \({\rm NC}\sp 0\). Random Structures Algorithms 29(1), 56–81 (2006)

    Google Scholar 

  18. Motwani, R., Naor, J., Naor, M.: The probabilistic method yields deterministic parallel algorithms. Journal of Computer and System Sciences 49(3), 478–516 (1994)

    Google Scholar 

  19. Naor, J., Naor, M.: Small-Bias Probability Spaces: Efficient Constructions and Applications. SIAM Journal on Computing 22(4), 838–856 (1993)

    Google Scholar 

  20. Naor, M.: Constructing Ramsey graphs from small probability spaces. Technical Report RJ 8810, IBM Research Report (1992)

    Google Scholar 

  21. Nisan, N.: Pseudorandom generators for space-bounded computation. Combinatorica 12(4), 449–461 (1992)

    Google Scholar 

  22. Rabani, Y., Shpilka, A.: Explicit construction of a small epsilon-net for linear threshold functions. In: Mitzenmacher, M. (ed.) STOC, pp. 649–658. ACM, New York (2009)

    Google Scholar 

  23. Razborov, A., Szemerédi, E., Wigderson, A.: Constructing small sets that are uniform in arithmetic progressions. Combinatorics, Probability and Computing 2(4), 513–518 (1993)

    Google Scholar 

  24. Reingold, O., Trevisan, L., Vadhan, S.: Pseudorandom Walks In Regular Digraphs and the RL vs. L problem. In: Proceedings of the 38th Annual ACM Symposium on Theory of Computing, STOC 2006, May 21-23 (2006); Preliminary version on ECCC (February 2005)

    Google Scholar 

  25. Rozenman, E., Vadhan, S.: Derandomized Squaring of Graphs. In: Chekuri, C., Jansen, K., Rolim, J.D.P., Trevisan, L. (eds.) APPROX and RANDOM 2005. LNCS, vol. 3624, pp. 436–447. Springer, Heidelberg (2005)

    Google Scholar 

  26. Saks, M., Zhou, S.: BPHSPACE(S) ⊆ DSPACE(3/2) Journal of Computer and System Sciences 58, 376–403 (1999)

    Google Scholar 

  27. Viola, E.: The Sum of d Small-Bias Generators Fools Polynomials of Degree d. In: IEEE Conference on Computational Complexity, pp. 124–127. IEEE Computer Society, Los Alamitos (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lovett, S., Reingold, O., Trevisan, L., Vadhan, S. (2009). Pseudorandom Bit Generators That Fool Modular Sums. In: Dinur, I., Jansen, K., Naor, J., Rolim, J. (eds) Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques. APPROX RANDOM 2009 2009. Lecture Notes in Computer Science, vol 5687. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03685-9_46

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03685-9_46

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03684-2

  • Online ISBN: 978-3-642-03685-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics