Skip to main content

Zero-Fixing Extractors for Sub-Logarithmic Entropy

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9134))

Abstract

An (nk)-bit-fixing source is a distribution on n bit strings, that is fixed on \(n-k\) of the coordinates, and jointly uniform on the remaining k bits. Explicit constructions of bit-fixing extractors by Gabizon, Raz and Shaltiel [SICOMP 2006] and Rao [CCC 2009], extract \((1-o(1)) \cdot k\) bits for \(k = \mathrm{poly}\log {n}\), almost matching the probabilistic argument. Intriguingly, unlike other well-studied sources of randomness, a result of Kamp and Zuckerman [SICOMP 2006] shows that, for any k, some small portion of the entropy in an (nk)-bit-fixing source can be extracted. Although the extractor does not extract all the entropy, it does extract \(\log (k)/2\) bits.

In this paper we prove that when the entropy k is small enough compared to n, this exponential entropy-loss is unavoidable. More precisely, we show that for \(n > \mathsf {Tower}(k^2)\) one cannot extract more than \(\log (k)/2 + O(1)\) bits from (nk)-bit-fixing sources. The remaining entropy is inaccessible, information theoretically. By the Kamp-Zuckerman construction, this negative result is tight. For small enough k, this strengthens a result by Reshef and Vadhan [RSA 2013], who proved a similar bound for extractors computable by space-bounded streaming algorithms.

Our impossibility result also holds for what we call zero-fixing sources. These are bit-fixing sources where the fixed bits are set to 0. We complement our negative result, by giving an explicit construction of an (nk)-zero-fixing extractor that outputs \(\Omega (k)\) bits for \(k \ge \mathrm{poly}\log \log {n}\). Finally, we give a construction of an (nk)-bit-fixing extractor, that outputs \(k-O(1)\) bits, for entropy \(k = (1+o(1)) \cdot \log \log {n}\), with running-time \(n^{O(( \log {\log {n}})^2)}\). This answers an open problem by Reshef and Vadhan [RSA 2013].

G. Cohen—Supported by an ISF grant and by the I-CORE Program of the Planning and Budgeting Committee. I. Shinkar—Research supported by NSF grants CCF 1422159, 1061938, 0832795 and Simons Collaboration on Algorithms and Geometry grant.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bennett, C.H., Brassard,G., Robert, J.M.: How to reduce your enemys information. In: Advances in Cryptology (CRYPTO), vol. 218, pp. 468–476. Springer (1985)

    Google Scholar 

  2. Barak, B., Impagliazzo, R., Wigderson, A.: Extracting randomness using few independent sources. SIAM Journal on Computing 36(4), 1095–1118 (2006)

    Article  MATH  MathSciNet  Google Scholar 

  3. Barak, B., Kindler, G., Shaltiel, R., Sudakov, B., Wigderson, A.: Simulating independence: new constructions of condensers, ramsey graphs, dispersers, and extractors. In: Proceedings of the Thirty-Seventh Annual ACM Symposium on Theory of Computing, pp. 1–10. ACM (2005)

    Google Scholar 

  4. Bourgain, J.: More on the sum-product phenomenon in prime fields and its applications. International Journal of Number Theory 1(1), 1–32 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  5. Bourgain, J.: On the construction of affine extractors. GAFA Geometric And Functional Analysis 17(1), 33–57 (2007)

    Article  MATH  MathSciNet  Google Scholar 

  6. Chor, B., Goldreich, O.: Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM Journal on Computing 17(2), 230–261 (1988)

    Article  MATH  MathSciNet  Google Scholar 

  7. Chor, B., Goldreich, O., Håstad, J., Freidmann, J., Rudich, S., Smolensky, R.: The bit extraction problem or t-resilient functions. In: Proceedings of the 26th Annual Symposium on Foundations of Computer Science, pp. 396–407. IEEE (1985)

    Google Scholar 

  8. Chen, R., Kabanets, V., Kolokolova, A., Shaltiel, R., Zuckerman, D.: Mining circuit lower bound proofs for meta-algorithms. In: Electronic Colloquium on Computational Complexity (ECCC), vol. 20, pp. 57 (2013)

    Google Scholar 

  9. Dvir, Z., Kopparty, S., Saraf, S., Sudan, M.: Extensions to the method of multiplicities, with applications to Kakeya sets and mergers. In: Proceedings of the 50th Annual IEEE Symposium on Foundations of Computer Science, pp. 181–190. IEEE (2009)

    Google Scholar 

  10. Friedman, J.: On the bit extraction problem. In: Proceedings of the 33rd Annual Symposium on Foundations of Computer Science, pp. 314–319. IEEE (1992)

    Google Scholar 

  11. Gabizon, A., Raz, R., Shaltiel, R.: Deterministic extractors for bit-fixing sources by obtaining an independent seed. SIAM Journal on Computing 36(4), 1072–1094 (2006)

    Article  MATH  MathSciNet  Google Scholar 

  12. Guruswami, V., Umans, C., Vadhan, S.: Unbalanced expanders and randomness extractors from Parvaresh-Vardy codes. Journal of the ACM 56(4), 20 (2009)

    Article  MathSciNet  Google Scholar 

  13. Komargodski, I., Raz, R., Tal, A.: Improved average-case lower bounds for DeMorgan formula size. In: Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science (FOCS), pp. 588–597. IEEE (2013)

    Google Scholar 

  14. Kamp, J., Zuckerman, D.: Deterministic extractors for bit-fixing sources and exposure-resilient cryptography. SIAM Journal on Computing 36(5), 1231–1247 (2006)

    Article  MATH  MathSciNet  Google Scholar 

  15. Li, X.: Improved constructions of three source extractors. In: Proceedings of the 26th IEEE Annual Conference on Computational Complexity (CCC), pp. 126–136. IEEE (2011)

    Google Scholar 

  16. Li, X.: A new approach to affine extractors and dispersers. In: Proceedings of the 26th IEEE Annual Conference on Computational Complexity (CCC), pp. 137–147. IEEE (2011)

    Google Scholar 

  17. Li, X.: Extractors for a constant number of independent sources with polylogarithmic min-entropy. In: Proceedings of the 54th IEEE Annual Symposium on Foundations of Computer Science (FOCS), pp. 100–109. IEEE (2013)

    Google Scholar 

  18. Nisan, N., Zuckerman, D.: Randomness is linear in space. Journal of Computer and System Sciences 52(1), 43–52 (1996)

    Article  MATH  MathSciNet  Google Scholar 

  19. Rao, A.: Extractors for a constant number of polynomially small min-entropy independent sources. SIAM Journal on Computing 39(1), 168–194 (2009)

    Article  MATH  MathSciNet  Google Scholar 

  20. Rao, A.: Extractors for low-weight affine sources. In: Proceedings of 24th Annual IEEE Conference on Computational Complexity, (CCC 2009), pp. 95–101. IEEE (2009)

    Google Scholar 

  21. Raz, R.: Extractors with weak random seeds. In: Proceedings of the Thirty-Seventh Annual ACM Symposium on Theory of Computing, pp. 11–20. ACM (2005)

    Google Scholar 

  22. Reshef, Y., Vadhan, S.: On extractors and exposure-resilient functions for sublogarithmic entropy. Random Structures & Algorithms 42(3), 386–401 (2013)

    Article  MATH  MathSciNet  Google Scholar 

  23. Shaltiel, R.: An introduction to randomness extractors. In: Aceto, L., Henzinger, M., Sgall, J. (eds.) ICALP 2011, Part II. LNCS, vol. 6756, pp. 21–41. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  24. Vazirani, V.U.: Towards a strong communication complexity theory or generating quasi-random sequences from two communicating slightly-random sources. In: Proceedings of the Seventeenth Annual ACM Symposium on Theory of Computing, pp. 366–378. ACM (1985)

    Google Scholar 

  25. Yehudayoff, A.: Affine extractors over prime fields. Combinatorica 31(2), 245–256 (2011)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Igor Shinkar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cohen, G., Shinkar, I. (2015). Zero-Fixing Extractors for Sub-Logarithmic Entropy. In: Halldórsson, M., Iwama, K., Kobayashi, N., Speckmann, B. (eds) Automata, Languages, and Programming. ICALP 2015. Lecture Notes in Computer Science(), vol 9134. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-47672-7_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-47672-7_28

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-47671-0

  • Online ISBN: 978-3-662-47672-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics