Abstract
An (n, k)-bit-fixing source is a distribution on n bit strings, that is fixed on \(n-k\) of the coordinates, and jointly uniform on the remaining k bits. Explicit constructions of bit-fixing extractors by Gabizon, Raz and Shaltiel [SICOMP 2006] and Rao [CCC 2009], extract \((1-o(1)) \cdot k\) bits for \(k = \mathrm{poly}\log {n}\), almost matching the probabilistic argument. Intriguingly, unlike other well-studied sources of randomness, a result of Kamp and Zuckerman [SICOMP 2006] shows that, for any k, some small portion of the entropy in an (n, k)-bit-fixing source can be extracted. Although the extractor does not extract all the entropy, it does extract \(\log (k)/2\) bits.
In this paper we prove that when the entropy k is small enough compared to n, this exponential entropy-loss is unavoidable. More precisely, we show that for \(n > \mathsf {Tower}(k^2)\) one cannot extract more than \(\log (k)/2 + O(1)\) bits from (n, k)-bit-fixing sources. The remaining entropy is inaccessible, information theoretically. By the Kamp-Zuckerman construction, this negative result is tight. For small enough k, this strengthens a result by Reshef and Vadhan [RSA 2013], who proved a similar bound for extractors computable by space-bounded streaming algorithms.
Our impossibility result also holds for what we call zero-fixing sources. These are bit-fixing sources where the fixed bits are set to 0. We complement our negative result, by giving an explicit construction of an (n, k)-zero-fixing extractor that outputs \(\Omega (k)\) bits for \(k \ge \mathrm{poly}\log \log {n}\). Finally, we give a construction of an (n, k)-bit-fixing extractor, that outputs \(k-O(1)\) bits, for entropy \(k = (1+o(1)) \cdot \log \log {n}\), with running-time \(n^{O(( \log {\log {n}})^2)}\). This answers an open problem by Reshef and Vadhan [RSA 2013].
G. Cohen—Supported by an ISF grant and by the I-CORE Program of the Planning and Budgeting Committee. I. Shinkar—Research supported by NSF grants CCF 1422159, 1061938, 0832795 and Simons Collaboration on Algorithms and Geometry grant.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Bennett, C.H., Brassard,G., Robert, J.M.: How to reduce your enemys information. In: Advances in Cryptology (CRYPTO), vol. 218, pp. 468–476. Springer (1985)
Barak, B., Impagliazzo, R., Wigderson, A.: Extracting randomness using few independent sources. SIAM Journal on Computing 36(4), 1095–1118 (2006)
Barak, B., Kindler, G., Shaltiel, R., Sudakov, B., Wigderson, A.: Simulating independence: new constructions of condensers, ramsey graphs, dispersers, and extractors. In: Proceedings of the Thirty-Seventh Annual ACM Symposium on Theory of Computing, pp. 1–10. ACM (2005)
Bourgain, J.: More on the sum-product phenomenon in prime fields and its applications. International Journal of Number Theory 1(1), 1–32 (2005)
Bourgain, J.: On the construction of affine extractors. GAFA Geometric And Functional Analysis 17(1), 33–57 (2007)
Chor, B., Goldreich, O.: Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM Journal on Computing 17(2), 230–261 (1988)
Chor, B., Goldreich, O., Håstad, J., Freidmann, J., Rudich, S., Smolensky, R.: The bit extraction problem or t-resilient functions. In: Proceedings of the 26th Annual Symposium on Foundations of Computer Science, pp. 396–407. IEEE (1985)
Chen, R., Kabanets, V., Kolokolova, A., Shaltiel, R., Zuckerman, D.: Mining circuit lower bound proofs for meta-algorithms. In: Electronic Colloquium on Computational Complexity (ECCC), vol. 20, pp. 57 (2013)
Dvir, Z., Kopparty, S., Saraf, S., Sudan, M.: Extensions to the method of multiplicities, with applications to Kakeya sets and mergers. In: Proceedings of the 50th Annual IEEE Symposium on Foundations of Computer Science, pp. 181–190. IEEE (2009)
Friedman, J.: On the bit extraction problem. In: Proceedings of the 33rd Annual Symposium on Foundations of Computer Science, pp. 314–319. IEEE (1992)
Gabizon, A., Raz, R., Shaltiel, R.: Deterministic extractors for bit-fixing sources by obtaining an independent seed. SIAM Journal on Computing 36(4), 1072–1094 (2006)
Guruswami, V., Umans, C., Vadhan, S.: Unbalanced expanders and randomness extractors from Parvaresh-Vardy codes. Journal of the ACM 56(4), 20 (2009)
Komargodski, I., Raz, R., Tal, A.: Improved average-case lower bounds for DeMorgan formula size. In: Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science (FOCS), pp. 588–597. IEEE (2013)
Kamp, J., Zuckerman, D.: Deterministic extractors for bit-fixing sources and exposure-resilient cryptography. SIAM Journal on Computing 36(5), 1231–1247 (2006)
Li, X.: Improved constructions of three source extractors. In: Proceedings of the 26th IEEE Annual Conference on Computational Complexity (CCC), pp. 126–136. IEEE (2011)
Li, X.: A new approach to affine extractors and dispersers. In: Proceedings of the 26th IEEE Annual Conference on Computational Complexity (CCC), pp. 137–147. IEEE (2011)
Li, X.: Extractors for a constant number of independent sources with polylogarithmic min-entropy. In: Proceedings of the 54th IEEE Annual Symposium on Foundations of Computer Science (FOCS), pp. 100–109. IEEE (2013)
Nisan, N., Zuckerman, D.: Randomness is linear in space. Journal of Computer and System Sciences 52(1), 43–52 (1996)
Rao, A.: Extractors for a constant number of polynomially small min-entropy independent sources. SIAM Journal on Computing 39(1), 168–194 (2009)
Rao, A.: Extractors for low-weight affine sources. In: Proceedings of 24th Annual IEEE Conference on Computational Complexity, (CCC 2009), pp. 95–101. IEEE (2009)
Raz, R.: Extractors with weak random seeds. In: Proceedings of the Thirty-Seventh Annual ACM Symposium on Theory of Computing, pp. 11–20. ACM (2005)
Reshef, Y., Vadhan, S.: On extractors and exposure-resilient functions for sublogarithmic entropy. Random Structures & Algorithms 42(3), 386–401 (2013)
Shaltiel, R.: An introduction to randomness extractors. In: Aceto, L., Henzinger, M., Sgall, J. (eds.) ICALP 2011, Part II. LNCS, vol. 6756, pp. 21–41. Springer, Heidelberg (2011)
Vazirani, V.U.: Towards a strong communication complexity theory or generating quasi-random sequences from two communicating slightly-random sources. In: Proceedings of the Seventeenth Annual ACM Symposium on Theory of Computing, pp. 366–378. ACM (1985)
Yehudayoff, A.: Affine extractors over prime fields. Combinatorica 31(2), 245–256 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cohen, G., Shinkar, I. (2015). Zero-Fixing Extractors for Sub-Logarithmic Entropy. In: Halldórsson, M., Iwama, K., Kobayashi, N., Speckmann, B. (eds) Automata, Languages, and Programming. ICALP 2015. Lecture Notes in Computer Science(), vol 9134. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-47672-7_28
Download citation
DOI: https://doi.org/10.1007/978-3-662-47672-7_28
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-47671-0
Online ISBN: 978-3-662-47672-7
eBook Packages: Computer ScienceComputer Science (R0)