Finite fields, randomness and complexity. Swastik Kopparty Rutgers University
|
|
- Clara Craig
- 5 years ago
- Views:
Transcription
1 Finite fields, randomness and complexity Swastik Kopparty Rutgers University
2 This talk Three great problems: Polynomial factorization Epsilon-biased sets Function uncorrelated with low-degree polynomials
3 Polynomial factorization
4 Polynomial factorization Algorithmic problem: Given a polynomial, factorize it into irreducible factors Over F q, degree d, n variables n=1: [Berlekamp] randomized poly(d, log q) time short and sweet, one of the first nontrivial randomized algorithms General n: [Grigoriev, Chistov,, Lenstra, Kaltofen] randomized poly(d n, log q) Via reduction to 1-variable case Big open question: deterministic? Essentially optimal: d n is number of monomials Or is it?
5 Arithmetic circuit representation Arithmetic circuit representation Polynomial presented as an arithmetic circuit of size s, degree d Can we factorize this in time poly(s,d)? Before that Can we do anything with polynomial presented as an arithmetic circuit? Polynomial identity testing Test if C(X 1,, X n ) 0 (the identically 0 polynomial) Classical randomized algorithm: Pick a random point a F n, and check if C(a) = 0. No deterministic algorithm known. Central problem in complexity theory
6 Factorization in the circuit representation [Kaltofen, Kaltofen-Trager] Efficient factorization is possible in the circuit representation! Randomized poly(s) time algorithm. How are the factors represented? As arithmetic circuits of size poly(s)! Can this be made deterministic? 2 open problems stand in the way Deterministic univariate factorization Deterministic polynomial identity testing [K-Saraf-Shpilka 15]: these are the only obstacles
7 Berlekamp s randomized factorization Let us factor 1-variable quadratic polynomial H(X) over F p, for p prime (in time polylog(p) ) Algorithm: Pick u, v F p uniformly at random Set G(X) = H(uX+v) (random affine shift) Suffices to factor G(X) Compute GCD(X (p-1)/2 1, G(X) ) If degree of GCD = 1, we found a factor of G(X) Else repeat and try again Two facts for analysis: For fixed α, β F p, the random variables uα + v, uβ + v are uniform and independent Probability that a random element of F p is a root of X (p-1)/2 1 is about ½ Thus with probability ½, the following event happens: one of the roots of G(X) will be a root of X (p-1)/2 1, and the other root of G(X) will not be
8 Epsilon-biased sets
9 Epsilon-biased sets Setting: F 2 n Linear functions l a : F 2 n F 2 la x = a, x S F 2 n is called ε-biased if: For all nonzero linear functions l a : F 2 n F 2 l a is not too biased on S: Pr l a x = 0 1/2 ε, 1/2 + ε x S Many applications is pseurodandomness, coding theory
10 Basic questions: existence and construction How small can epsilon-biased sets be? How to construct small epsilon-biased sets explicitly? Compute i th bit of the j th element in time poly(log n)
11 Small epsilon-biased sets Randomized construction: probabilistic method Random set of size O( n ε2) is epsilon-biased with high probability Deterministic constructions: Known with size: O( n2 ε 2) O( n ε 3) O( n [Alon-Goldreich-Hastad-Peralta] [Naor-Naor, based on Reed-Solomon codes] ε ) [BenAroya-TaShma, based on Hermitian codes]
12 Lower bounds on epsilon-biased sets MRRW bound 77: epsilon biased sets must have size at least n Ω ε 2 log 1 ε Alon 04: very clever linear-algebra proof Next: less clever version of Alon s proof
13 Lower bounds on epsilon-biased sets Let S be epsilon biased Let f: F 2n R be given by: f(x) = 1/ S f(x) = 0 if x S otherwise Let F: F 2n R be the Fourier transform of f F(a) = x f x 1 a,x Key point of epsilon-bias: F(a) ε for all nonzero a F(0) = 1
14 Lower bounds on epsilon-biased sets Ingredient 1: Fourier transform is l 2 norm preserving: x f x 2 = 1 2 n a F a 2 LHS: x f x 2 = 1 S RHS: 1 2 n a F a n 1 ε n 2n + ε2 So S Ω min 1 ε 2, 2n Close!
15 Lower bounds for epsilon-biased sets Ingredient 2: Convolution and Fourier transform Let t be an integer Define g: F 2n R by: g(x) = f(x 1 ) f(x 2 ) f(x t ) where the sum is over all x 1,, x t s.t. x x t = x g is the convolution of f with itself t times g is the probability distribution of x 1 + x x t, where x i chosen from S uniformly Let G:F 2n R be the Fourier transform of g Then G(a) = F(a) t.
16 Putting everything together x g x 2 = 1 2 n a G a 2 RHS: 1 2 n a G a n 1 ε 2t 1 2 n 2n + ε2t LHS: x g x 2 =? Cauchy-Schwarz: (support(g) ) ( x g x 2 ) x g x 2 = 1 So ( x g x 2 ) 1/support(g) support(g) S t Summarizing: S min 2 n 1, t ε 2t Optimizing value of t gives S Ω n ε 2 log 1 ε
17 A nice deterministic construction with size O( n2 ε 2) [AGHP 90] Pick an irreducible polynomial h(t) of degree d = O(log n ε ) Pick a bit-sequence s of length d Consider linear recurrence starting with s, with characteristic polynomial h Generate n bit sequence x out of this recurrence Analysis: Based on: FACT: Let A(T) be a nonzero degree n polynomial Then Pr[ h(t) divides A(T) ] < ε, where h(t) is random irreducible polynomial of degree d Missing piece: How to pick irreducible polynomials? Let I d be the set of all irreducible polynomials of degree d Want a bijection from {1,2,.., I d } I d computable in time poly(d) [K-Kumar-Saks 15] Can be done: indexing irreducible polynomials over finite fields
18 Functions uncorrelated with polynomials
19 Functions uncorrelated with polynomials Let f : F 2 n F 2 Define correlation of f with degree d polynomials Maximum ε s.t. there exists h(x1,, xn) of degree d s.t. Pr x F 2 n f x = h x = ε Denoted Corr(f, P d ) How low can this correlation be? Probabilistic method: For d < n/3, a random function f has w.h.p. Corr(f, P d ) < 2 Ω n Open question: find an explicit example of such a function
20 Conection to circuit complexity Circuit Class AC 0 (mod 2) Bounded depth Boolean circuits Allowed gates: AND, OR, NOT, Parity (unbounded fan-in) [Razborov 87] Such circuits can be approximated by polynomials
21 Application to circuit complexity [Razborov 87] Circuits can be approximated by polynomials For every poly-size AC 0 (mod 2) circuit C h(x 1,, x n ) F 2 [x 1,, x n ] with deg(h) = n 0.1 s.t. Pr x F 2 n C x = h x = 1 n ω 1 Corollary: If Corr(f, P n 0.1 ) < n ω 1 then for all poly-size AC 0 (mod 2) circuits C, i.e., f is average case hard for these circuits. Pr C x = f x < 1 x Fn n ω 1 Corollary: (Via Nisan-Wigderson hardness vs randomness) Explicit such f implies efficient pseudorandom generators against AC 0 (mod 2)
22 Functions uncorrelated with polynomials For small d, exponentially small correlation known: f(x 1,, x n ) = x 1 x 2 x 3 + x 4 x 5 x 6 + (n/3 disjoint monomials) f(x) = Tr(x 7 ) (viewed as map from F 2 n F 2 ) has 2 Ω n correlation with degree 2. Proof by (repeatedly) squaring and Cauchy-Schwarz: E x F2 n 1 f x +h x Analogous results for all d << log n. For larger d, only much weaker correlation known. f(x) = Majority(x) [ Smolensky 94] f(x) = Tr(x 1/3 ) [K 11] Have 1/n 0.4 correlation with degree n 0.1.
23 Majority is uncorrelated with degree n 0.1 Key Lemma: Majority is versatile For all g: F 2n F 2, there exist polynomials g, g with deg(g ), deg(g ) n/2 s.t. for all x, g(x) = g (x) Maj(x) + g (x) Proof: Consider x s.t. Maj(x) = 0 Need g (x) = g(x) for such x This uniquely defines g of degree n/2 Consider x s.t. Maj(x) = 1 Need g (x) = g(x) g (x) for such x This uniquely defines g of degree n/2 Maj = 1 Maj = 0 {0,1} n
24 Majority is uncorrelated with degree n 0.1 Suppose deg(h) < n 0.1, and Pr[ h(x) = Majority(x)] = ½ + ε Let S = { x: h(x) = Majority(x) } By versatility: Every function g: S F 2 can be written as: g = g Maj + g = g h + g which is degree n/2 + n 0.1. Now counting: #(functions on S) = 2 S. #(polynomials of degree at most n/2 + n 0.1 ) < n n 1 So S < + 2 n n So ε < n 0.4
25 Wrap-up Open questions: Polynomial factorization: Deterministic univariate polynomial factorization? Deterministic polynomial identity testing? Epsilon biased sets: What is the optimal size? Efficient constructions matching this? Functions uncorrelated with polynomials: Explicit functions highly uncorrelated with polynomials?
Sums of products of polynomials of low-arity - lower bounds and PIT
Sums of products of polynomials of low-arity - lower bounds and PIT Mrinal Kumar Joint work with Shubhangi Saraf Plan for the talk Plan for the talk Model of computation Plan for the talk Model of computation
More informationCertifying polynomials for AC 0 [ ] circuits, with applications
Certifying polynomials for AC 0 [ ] circuits, with applications Swastik Kopparty Srikanth Srinivasan Abstract In this paper, we introduce and develop the method of certifying polynomials for proving AC
More informationDeterministic APSP, Orthogonal Vectors, and More:
Deterministic APSP, Orthogonal Vectors, and More: Quickly Derandomizing Razborov Smolensky Timothy Chan U of Waterloo Ryan Williams Stanford Problem 1: All-Pairs Shortest Paths (APSP) Given real-weighted
More informationEquivalence of Polynomial Identity Testing and Deterministic Multivariate Polynomial Factorization
Equivalence of Polynomial Identity Testing and Deterministic Multivariate Polynomial Factorization Swastik Kopparty Shubhangi Saraf Amir Shpilka Abstract In this paper we show that the problem of deterministically
More informationLecture 4: LMN Learning (Part 2)
CS 294-114 Fine-Grained Compleity and Algorithms Sept 8, 2015 Lecture 4: LMN Learning (Part 2) Instructor: Russell Impagliazzo Scribe: Preetum Nakkiran 1 Overview Continuing from last lecture, we will
More informationFourier Analysis. 1 Fourier basics. 1.1 Examples. 1.2 Characters form an orthonormal basis
Fourier Analysis Topics in Finite Fields (Fall 203) Rutgers University Swastik Kopparty Last modified: Friday 8 th October, 203 Fourier basics Let G be a finite abelian group. A character of G is simply
More informationNotes for Lecture 25
U.C. Berkeley CS278: Computational Complexity Handout N25 ofessor Luca Trevisan 12/1/2004 Notes for Lecture 25 Circuit Lower Bounds for Parity Using Polynomials In this lecture we prove a lower bound on
More informationCSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds
CSC 2429 Approaches to the P vs. NP Question and Related Complexity Questions Lecture 2: Switching Lemma, AC 0 Circuit Lower Bounds Lecturer: Toniann Pitassi Scribe: Robert Robere Winter 2014 1 Switching
More informationLecture 3: AC 0, the switching lemma
Lecture 3: AC 0, the switching lemma Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: Meng Li, Abdul Basit 1 Pseudorandom sets We start by proving
More informationLecture 3 Small bias with respect to linear tests
03683170: Expanders, Pseudorandomness and Derandomization 3/04/16 Lecture 3 Small bias with respect to linear tests Amnon Ta-Shma and Dean Doron 1 The Fourier expansion 1.1 Over general domains Let G be
More information1 Randomized Computation
CS 6743 Lecture 17 1 Fall 2007 1 Randomized Computation Why is randomness useful? Imagine you have a stack of bank notes, with very few counterfeit ones. You want to choose a genuine bank note to pay at
More informationSums of Products of Polynomials in Few Variables: Lower Bounds and Polynomial Identity Testing
Sums of Products of Polynomials in Few Variables: Lower Bounds and Polynomial Identity Testing Mrinal Kumar 1 and Shubhangi Saraf 2 1 Department of Computer Science, Rutgers University, New Brunswick,
More informationLecture 6: Deterministic Primality Testing
Lecture 6: Deterministic Primality Testing Topics in Pseudorandomness and Complexity (Spring 018) Rutgers University Swastik Kopparty Scribe: Justin Semonsen, Nikolas Melissaris 1 Introduction The AKS
More informationLinear-algebraic pseudorandomness: Subspace Designs & Dimension Expanders
Linear-algebraic pseudorandomness: Subspace Designs & Dimension Expanders Venkatesan Guruswami Carnegie Mellon University Simons workshop on Proving and Using Pseudorandomness March 8, 2017 Based on a
More informationArithmetic Circuits with Locally Low Algebraic Rank
Arithmetic Circuits with Locally Low Algebraic Rank Mrinal Kumar 1 and Shubhangi Saraf 2 1 Department of Computer Science, Rutgers University, New Brunswick, USA mrinal.kumar@rutgers.edu 2 Department of
More information: Error Correcting Codes. October 2017 Lecture 1
03683072: Error Correcting Codes. October 2017 Lecture 1 First Definitions and Basic Codes Amnon Ta-Shma and Dean Doron 1 Error Correcting Codes Basics Definition 1. An (n, K, d) q code is a subset of
More informationDiscrete Math, Fourteenth Problem Set (July 18)
Discrete Math, Fourteenth Problem Set (July 18) REU 2003 Instructor: László Babai Scribe: Ivona Bezakova 0.1 Repeated Squaring For the primality test we need to compute a X 1 (mod X). There are two problems
More informationLecture 10: Learning DNF, AC 0, Juntas. 1 Learning DNF in Almost Polynomial Time
Analysis of Boolean Functions (CMU 8-859S, Spring 2007) Lecture 0: Learning DNF, AC 0, Juntas Feb 5, 2007 Lecturer: Ryan O Donnell Scribe: Elaine Shi Learning DNF in Almost Polynomial Time From previous
More informationLecture 7: ɛ-biased and almost k-wise independent spaces
Lecture 7: ɛ-biased and almost k-wise independent spaces Topics in Complexity Theory and Pseudorandomness (pring 203) Rutgers University wastik Kopparty cribes: Ben Lund, Tim Naumovitz Today we will see
More informationDefinition 1. NP is a class of language L such that there exists a poly time verifier V with
Lecture 9: MIP=NEXP Topics in Pseudorandomness and Complexity Theory (Spring 2017) Rutgers University Swastik Kopparty Scribe: Jinyoung Park 1 Introduction Definition 1. NP is a class of language L such
More informationFactoring univariate polynomials over the rationals
Factoring univariate polynomials over the rationals Tommy Hofmann TU Kaiserslautern November 21, 2017 Tommy Hofmann Factoring polynomials over the rationals November 21, 2017 1 / 31 Factoring univariate
More informationConstant-Depth Circuits for Arithmetic in Finite Fields of Characteristic Two
Constant-Depth Circuits for Arithmetic in Finite Fields of Characteristic Two Alexander Healy Emanuele Viola August 8, 2005 Abstract We study the complexity of arithmetic in finite fields of characteristic
More informationMajority is incompressible by AC 0 [p] circuits
Majority is incompressible by AC 0 [p] circuits Igor Carboni Oliveira Columbia University Joint work with Rahul Santhanam (Univ. Edinburgh) 1 Part 1 Background, Examples, and Motivation 2 Basic Definitions
More informationOn the Fourier spectrum of symmetric Boolean functions
On the Fourier spectrum of symmetric Boolean functions Amir Shpilka Technion and MSR NE Based on joint work with Avishay Tal 1 Theme: Analysis of Boolean functions Pick favorite representation: Fourier
More informationNovember 17, Recent Results on. Amir Shpilka Technion. PIT Survey Oberwolfach
1 Recent Results on Polynomial Identity Testing Amir Shpilka Technion Goal of talk Survey known results Explain proof techniques Give an interesting set of `accessible open questions 2 Talk outline Definition
More informationError Correcting Codes Questions Pool
Error Correcting Codes Questions Pool Amnon Ta-Shma and Dean Doron January 3, 018 General guidelines The questions fall into several categories: (Know). (Mandatory). (Bonus). Make sure you know how to
More informationLecture 10: Deterministic Factorization Over Finite Fields
Lecture 10: Deterministic Factorization Over Finite Fields Algorithmic Number Theory (Fall 2014) Rutgers University Swastik Kopparty Scribe: Ross Berkowitz 1 Deterministic Factoring of 1-Variable Polynomials
More informationHomework 8 Solutions to Selected Problems
Homework 8 Solutions to Selected Problems June 7, 01 1 Chapter 17, Problem Let f(x D[x] and suppose f(x is reducible in D[x]. That is, there exist polynomials g(x and h(x in D[x] such that g(x and h(x
More informationCS294: Pseudorandomness and Combinatorial Constructions September 13, Notes for Lecture 5
UC Berkeley Handout N5 CS94: Pseudorandomness and Combinatorial Constructions September 3, 005 Professor Luca Trevisan Scribe: Gatis Midrijanis Notes for Lecture 5 In the few lectures we are going to look
More informationHardness amplification proofs require majority
Hardness amplification proofs require majority Emanuele Viola Columbia University Work done at Harvard, IAS, and Columbia Joint work with Ronen Shaltiel University of Haifa January 2008 Circuit lower bounds
More informationNotes for Lecture 11
Stanford University CS254: Computational Complexity Notes 11 Luca Trevisan 2/11/2014 Notes for Lecture 11 Circuit Lower Bounds for Parity Using Polynomials In this lecture we prove a lower bound on the
More informationLecture 11 - Basic Number Theory.
Lecture 11 - Basic Number Theory. Boaz Barak October 20, 2005 Divisibility and primes Unless mentioned otherwise throughout this lecture all numbers are non-negative integers. We say that a divides b,
More information1 Nisan-Wigderson pseudorandom generator
CSG399: Gems of Theoretical Computer Science. Lecture 3. Jan. 6, 2009. Instructor: Emanuele Viola Scribe: Dimitrios Kanoulas Nisan-Wigderson pseudorandom generator and design constuction Nisan-Wigderson
More informationLecture Examples of problems which have randomized algorithms
6.841 Advanced Complexity Theory March 9, 2009 Lecture 10 Lecturer: Madhu Sudan Scribe: Asilata Bapat Meeting to talk about final projects on Wednesday, 11 March 2009, from 5pm to 7pm. Location: TBA. Includes
More informationArithmetic Circuits: A Chasm at Depth Four
Arithmetic Circuits: A Chasm at Depth Four Manindra Agrawal Indian Institute of Technology, Kanpur V Vinay Geodesic Information Systems Ltd, Bangalore, and Chennai Mathematical Institute, Chennai August
More informationThe sum of d small-bias generators fools polynomials of degree d
The sum of d small-bias generators fools polynomials of degree d Emanuele Viola April 9, 2008 Abstract We prove that the sum of d small-bias generators L : F s F n fools degree-d polynomials in n variables
More informationCPSC 536N: Randomized Algorithms Term 2. Lecture 9
CPSC 536N: Randomized Algorithms 2011-12 Term 2 Prof. Nick Harvey Lecture 9 University of British Columbia 1 Polynomial Identity Testing In the first lecture we discussed the problem of testing equality
More informationPolynomial Identity Testing
Polynomial Identity Testing Amir Shpilka Technion and MSR NE Based on joint works with: Zeev Dvir, Zohar Karnin, Partha Mukhopadhyay, Ran Raz, Ilya Volkovich and Amir Yehudayoff 1 PIT Survey Oberwolfach
More informationFaster Satisfiability Algorithms for Systems of Polynomial Equations over Finite Fields and ACC^0[p]
Faster Satisfiability Algorithms for Systems of Polynomial Equations over Finite Fields and ACC^0[p] Suguru TAMAKI Kyoto University Joint work with: Daniel Lokshtanov, Ramamohan Paturi, Ryan Williams Satisfiability
More informationQuestions Pool. Amnon Ta-Shma and Dean Doron. January 2, Make sure you know how to solve. Do not submit.
Questions Pool Amnon Ta-Shma and Dean Doron January 2, 2017 General guidelines The questions fall into several categories: (Know). (Mandatory). (Bonus). Make sure you know how to solve. Do not submit.
More informationLow-discrepancy sets for high-dimensional rectangles: a survey
The Computational Complexity Column Eric Allender Rutgers University, Department of Computer Science Piscataway, NJ 08855 USA allender@cs.rutgers.edu With this issue of the Bulletin, my tenure as editor
More informationThe Weil bounds. 1 The Statement
The Weil bounds Topics in Finite Fields Fall 013) Rutgers University Swastik Kopparty Last modified: Thursday 16 th February, 017 1 The Statement As we suggested earlier, the original form of the Weil
More informationClassifying polynomials and identity testing
Classifying polynomials and identity testing MANINDRA AGRAWAL 1, and RAMPRASAD SAPTHARISHI 2 1 Indian Institute of Technology, Kanpur, India. 2 Chennai Mathematical Institute, and Indian Institute of Technology,
More informationLecture 4: Codes based on Concatenation
Lecture 4: Codes based on Concatenation Error-Correcting Codes (Spring 206) Rutgers University Swastik Kopparty Scribe: Aditya Potukuchi and Meng-Tsung Tsai Overview In the last lecture, we studied codes
More informationProblem Set 2. Assigned: Mon. November. 23, 2015
Pseudorandomness Prof. Salil Vadhan Problem Set 2 Assigned: Mon. November. 23, 2015 Chi-Ning Chou Index Problem Progress 1 SchwartzZippel lemma 1/1 2 Robustness of the model 1/1 3 Zero error versus 1-sided
More informationEXPONENTIAL LOWER BOUNDS FOR DEPTH THREE BOOLEAN CIRCUITS
comput. complex. 9 (2000), 1 15 1016-3328/00/010001-15 $ 1.50+0.20/0 c Birkhäuser Verlag, Basel 2000 computational complexity EXPONENTIAL LOWER BOUNDS FOR DEPTH THREE BOOLEAN CIRCUITS Ramamohan Paturi,
More informationPseudorandom generators for low degree polynomials
Pseudorandom generators for low degree polynomials Andrej Bogdanov March 3, 2005 Abstract We investigate constructions of pseudorandom generators that fool polynomial tests of degree d in m variables over
More informationPolynomial Identity Testing and Circuit Lower Bounds
Polynomial Identity Testing and Circuit Lower Bounds Robert Špalek, CWI based on papers by Nisan & Wigderson, 1994 Kabanets & Impagliazzo, 2003 1 Randomised algorithms For some problems (polynomial identity
More informationRandom Graphs and the Parity Quantifier
Random Graphs and the Parity Quantifier Phokion G. Kolaitis Swastik Kopparty October 19, 2010 Abstract The classical zero-one law for first-order logic on random graphs says that for every first-order
More informationDeterministically Testing Sparse Polynomial Identities of Unbounded Degree
Deterministically Testing Sparse Polynomial Identities of Unbounded Degree Markus Bläser a Moritz Hardt b,,1 Richard J. Lipton c Nisheeth K. Vishnoi d a Saarland University, Saarbrücken, Germany. b Princeton
More informationNondeterminism LECTURE Nondeterminism as a proof system. University of California, Los Angeles CS 289A Communication Complexity
University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Matt Brown Date: January 25, 2012 LECTURE 5 Nondeterminism In this lecture, we introduce nondeterministic
More informationThe zeta function, L-functions, and irreducible polynomials
The zeta function, L-functions, and irreducible polynomials Topics in Finite Fields Fall 203) Rutgers University Swastik Kopparty Last modified: Sunday 3 th October, 203 The zeta function and irreducible
More informationReconstruction of full rank algebraic branching programs
Reconstruction of full rank algebraic branching programs Vineet Nair Joint work with: Neeraj Kayal, Chandan Saha, Sebastien Tavenas 1 Arithmetic circuits 2 Reconstruction problem f(x) Q[X] is an m-variate
More informationTutorial: Locally decodable codes. UT Austin
Tutorial: Locally decodable codes Anna Gál UT Austin Locally decodable codes Error correcting codes with extra property: Recover (any) one message bit, by reading only a small number of codeword bits.
More informationPRGs for space-bounded computation: INW, Nisan
0368-4283: Space-Bounded Computation 15/5/2018 Lecture 9 PRGs for space-bounded computation: INW, Nisan Amnon Ta-Shma and Dean Doron 1 PRGs Definition 1. Let C be a collection of functions C : Σ n {0,
More informationBen Lee Volk. Joint with. Michael A. Forbes Amir Shpilka
Ben Lee Volk Joint with Michael A. Forbes Amir Shpilka Ben Lee Volk Joint with Michael A. Forbes Amir Shpilka (One) Answer: natural proofs barrier [Razborov-Rudich]: (One) Answer: natural proofs barrier
More information6.842 Randomness and Computation April 2, Lecture 14
6.84 Randomness and Computation April, 0 Lecture 4 Lecturer: Ronitt Rubinfeld Scribe: Aaron Sidford Review In the last class we saw an algorithm to learn a function where very little of the Fourier coeffecient
More informationFinite Fields. Mike Reiter
1 Finite Fields Mike Reiter reiter@cs.unc.edu Based on Chapter 4 of: W. Stallings. Cryptography and Network Security, Principles and Practices. 3 rd Edition, 2003. Groups 2 A group G, is a set G of elements
More information2-4 Zeros of Polynomial Functions
Write a polynomial function of least degree with real coefficients in standard form that has the given zeros. 33. 2, 4, 3, 5 Using the Linear Factorization Theorem and the zeros 2, 4, 3, and 5, write f
More informationSome Depth Two (and Three) Threshold Circuit Lower Bounds. Ryan Williams Stanford Joint work with Daniel Kane (UCSD)
Some Depth Two (and Three) Threshold Circuit Lower Bounds Ryan Williams Stanford Joint wor with Daniel Kane (UCSD) Introduction Def. f n : 0,1 n 0,1 is a linear threshold function (LTF) if there are w
More informationPseudorandom Generators for Low Degree Polynomials from Algebraic Geometry Codes
Electronic Colloquium on Computational Complexity, Revision 2 of Report No. 155 (2013) Pseudorandom Generators for Low Degree Polynomials from Algebraic Geometry Codes Gil Cohen Amnon Ta-Shma March 12,
More informationThe idea is that if we restrict our attention to any k positions in x, no matter how many times we
k-wise Independence and -biased k-wise Indepedence February 0, 999 Scribe: Felix Wu Denitions Consider a distribution D on n bits x x x n. D is k-wise independent i for all sets of k indices S fi ;:::;i
More informationThree Query Locally Decodable Codes with Higher Correctness Require Exponential Length
Three Query Locally Decodable Codes with Higher Correctness Require Exponential Length Anna Gál UT Austin panni@cs.utexas.edu Andrew Mills UT Austin amills@cs.utexas.edu March 8, 20 Abstract Locally decodable
More informationComplexity Theory of Polynomial-Time Problems
Complexity Theory of Polynomial-Time Problems Lecture 3: The polynomial method Part I: Orthogonal Vectors Sebastian Krinninger Organization of lecture No lecture on 26.05. (State holiday) 2 nd exercise
More information3 Finish learning monotone Boolean functions
COMS 6998-3: Sub-Linear Algorithms in Learning and Testing Lecturer: Rocco Servedio Lecture 5: 02/19/2014 Spring 2014 Scribes: Dimitris Paidarakis 1 Last time Finished KM algorithm; Applications of KM
More information18.5 Crossings and incidences
18.5 Crossings and incidences 257 The celebrated theorem due to P. Turán (1941) states: if a graph G has n vertices and has no k-clique then it has at most (1 1/(k 1)) n 2 /2 edges (see Theorem 4.8). Its
More informationRECONSTRUCTING ALGEBRAIC FUNCTIONS FROM MIXED DATA
RECONSTRUCTING ALGEBRAIC FUNCTIONS FROM MIXED DATA SIGAL AR, RICHARD J. LIPTON, RONITT RUBINFELD, AND MADHU SUDAN Abstract. We consider a variant of the traditional task of explicitly reconstructing algebraic
More informationMeta-Algorithms vs. Circuit Lower Bounds Valentine Kabanets
Meta-Algorithms vs. Circuit Lower Bounds Valentine Kabanets Tokyo Institute of Technology & Simon Fraser University Understanding Efficiency Better understanding of Efficient Computation Good Algorithms
More informationLast time, we described a pseudorandom generator that stretched its truly random input by one. If f is ( 1 2
CMPT 881: Pseudorandomness Prof. Valentine Kabanets Lecture 20: N W Pseudorandom Generator November 25, 2004 Scribe: Ladan A. Mahabadi 1 Introduction In this last lecture of the course, we ll discuss the
More informationA Lower Bound for the Size of Syntactically Multilinear Arithmetic Circuits
A Lower Bound for the Size of Syntactically Multilinear Arithmetic Circuits Ran Raz Amir Shpilka Amir Yehudayoff Abstract We construct an explicit polynomial f(x 1,..., x n ), with coefficients in {0,
More informationLecture 3: Randomness in Computation
Great Ideas in Theoretical Computer Science Summer 2013 Lecture 3: Randomness in Computation Lecturer: Kurt Mehlhorn & He Sun Randomness is one of basic resources and appears everywhere. In computer science,
More informationArthur-Merlin Streaming Complexity
Weizmann Institute of Science Joint work with Ran Raz Data Streams The data stream model is an abstraction commonly used for algorithms that process network traffic using sublinear space. A data stream
More informationDirect product theorem for discrepancy
Direct product theorem for discrepancy Troy Lee Rutgers University Joint work with: Robert Špalek Direct product theorems Knowing how to compute f, how can you compute f f f? Obvious upper bounds: If can
More informationPseudorandom Sequences II: Exponential Sums and Uniform Distribution
Pseudorandom Sequences II: Exponential Sums and Uniform Distribution Arne Winterhof Austrian Academy of Sciences Johann Radon Institute for Computational and Applied Mathematics Linz Carleton University
More information1 Lecture 6-7, Scribe: Willy Quach
Special Topics in Complexity Theory, Fall 2017. Instructor: Emanuele Viola 1 Lecture 6-7, Scribe: Willy Quach In these lectures, we introduce k-wise indistinguishability and link this notion to the approximate
More informationChapter 4 Finite Fields
Chapter 4 Finite Fields Introduction will now introduce finite fields of increasing importance in cryptography AES, Elliptic Curve, IDEA, Public Key concern operations on numbers what constitutes a number
More informationPoly-logarithmic independence fools AC 0 circuits
Poly-logarithmic independence fools AC 0 circuits Mark Braverman Microsoft Research New England January 30, 2009 Abstract We prove that poly-sized AC 0 circuits cannot distinguish a poly-logarithmically
More informationAddition is exponentially harder than counting for shallow monotone circuits
Addition is exponentially harder than counting for shallow monotone circuits Igor Carboni Oliveira Columbia University / Charles University in Prague Joint work with Xi Chen (Columbia) and Rocco Servedio
More informationDetecting Rational Points on Hypersurfaces over Finite Fields
Detecting Rational Points on Hypersurfaces over Finite Fields Swastik Kopparty CSAIL, MIT swastik@mit.edu Sergey Yekhanin IAS yekhanin@ias.edu Abstract We study the complexity of deciding whether a given
More informationHadamard Tensors and Lower Bounds on Multiparty Communication Complexity
Hadamard Tensors and Lower Bounds on Multiparty Communication Complexity Jeff Ford and Anna Gál Dept. of Computer Science, University of Texas at Austin, Austin, TX 78712-1188, USA {jeffford, panni}@cs.utexas.edu
More informationDepth-3 Arithmetic Formulae over Fields of Characteristic Zero
Electronic olloquium on omputational omplexity, Report No 2 (1 Depth Arithmetic Formulae over Fields of haracteristic Zero Amir Shpilka Avi Wigderson Institute of omputer Science, ebrew University, Jerusalem,
More informationHigher-order Fourier analysis of F n p and the complexity of systems of linear forms
Higher-order Fourier analysis of F n p and the complexity of systems of linear forms Hamed Hatami School of Computer Science, McGill University, Montréal, Canada hatami@cs.mcgill.ca Shachar Lovett School
More informationcomplexity distributions
The of complexity distributions Emanuele Viola Northeastern University March 2012 Local functions (a.k.a. Junta, NC 0 ) f : {0,1}n {0,1} d-local : output depends on d input bits Input x d f Fact: Parity(x)
More information1 The Low-Degree Testing Assumption
Advanced Complexity Theory Spring 2016 Lecture 17: PCP with Polylogarithmic Queries and Sum Check Prof. Dana Moshkovitz Scribes: Dana Moshkovitz & Michael Forbes Scribe Date: Fall 2010 In this lecture
More informationCSC 5170: Theory of Computational Complexity Lecture 9 The Chinese University of Hong Kong 15 March 2010
CSC 5170: Theory of Computational Complexity Lecture 9 The Chinese University of Hong Kong 15 March 2010 We now embark on a study of computational classes that are more general than NP. As these classes
More information[06.1] Given a 3-by-3 matrix M with integer entries, find A, B integer 3-by-3 matrices with determinant ±1 such that AMB is diagonal.
(January 14, 2009) [06.1] Given a 3-by-3 matrix M with integer entries, find A, B integer 3-by-3 matrices with determinant ±1 such that AMB is diagonal. Let s give an algorithmic, rather than existential,
More informationExplicit bounds on the entangled value of multiplayer XOR games. Joint work with Thomas Vidick (MIT)
Explicit bounds on the entangled value of multiplayer XOR games Jop Briët Joint work with Thomas Vidick (MIT) Waterloo, 2012 Entanglement and nonlocal correlations [Bell64] Measurements on entangled quantum
More informationHARDNESS AMPLIFICATION VIA SPACE-EFFICIENT DIRECT PRODUCTS
HARDNESS AMPLIFICATION VIA SPACE-EFFICIENT DIRECT PRODUCTS Venkatesan Guruswami and Valentine Kabanets Abstract. We prove a version of the derandomized Direct Product lemma for deterministic space-bounded
More informationComplexity of Finding a Duplicate in a Stream: Simple Open Problems
Complexity of Finding a Duplicate in a Stream: Simple Open Problems Jun Tarui Univ of Electro-Comm, Tokyo Shonan, Jan 2012 1 Duplicate Finding Problem Given: Stream a 1,,a m a i {1,,n} Assuming m > n,
More informationSimple Constructions of Almost k-wise Independent Random Variables
Simple Constructions of Almost k-wise Independent Random Variables Noga Alon Oded Goldreich Johan Håstad René Peralta February 22, 2002 Abstract We present three alternative simple constructions of small
More informationAlgebra Review 2. 1 Fields. A field is an extension of the concept of a group.
Algebra Review 2 1 Fields A field is an extension of the concept of a group. Definition 1. A field (F, +,, 0 F, 1 F ) is a set F together with two binary operations (+, ) on F such that the following conditions
More informationLecture 5: Derandomization (Part II)
CS369E: Expanders May 1, 005 Lecture 5: Derandomization (Part II) Lecturer: Prahladh Harsha Scribe: Adam Barth Today we will use expanders to derandomize the algorithm for linearity test. Before presenting
More informationCS 6815: Lecture 4. September 4, 2018
XS = X s... X st CS 685: Lecture 4 Instructor: Eshan Chattopadhyay Scribe: Makis Arsenis and Ayush Sekhari September 4, 208 In this lecture, we will first see an algorithm to construct ɛ-biased spaces.
More informationCS151 Complexity Theory. Lecture 9 May 1, 2017
CS151 Complexity Theory Lecture 9 Hardness vs. randomness We have shown: If one-way permutations exist then BPP δ>0 TIME(2 nδ ) ( EXP simulation is better than brute force, but just barely stronger assumptions
More informationPrimality Testing. 1 Introduction. 2 Brief Chronology of Primality Testing. CS265/CME309, Fall Instructor: Gregory Valiant
CS265/CME309, Fall 2018. Instructor: Gregory Valiant Primality Testing [These notes may not be distributed outside this class without the permission of Gregory Valiant.] 1 Introduction Prime numbers are
More informationCounting points on hyperelliptic curves
University of New South Wales 9th November 202, CARMA, University of Newcastle Elliptic curves Let p be a prime. Let X be an elliptic curve over F p. Want to compute #X (F p ), the number of F p -rational
More informationSymmetric Functions Capture General Functions
Symmetric Functions Capture General Functions Richard J. Lipton College of Computing Georgia Tech, Atlanta, GA, USA Atri Rudra Department of CSE University at Buffalo (SUNY) August 20, 2011 Kenneth W.
More information20.1 2SAT. CS125 Lecture 20 Fall 2016
CS125 Lecture 20 Fall 2016 20.1 2SAT We show yet another possible way to solve the 2SAT problem. Recall that the input to 2SAT is a logical expression that is the conunction (AND) of a set of clauses,
More informationFinite Fields. SOLUTIONS Network Coding - Prof. Frank H.P. Fitzek
Finite Fields In practice most finite field applications e.g. cryptography and error correcting codes utilizes a specific type of finite fields, namely the binary extension fields. The following exercises
More information