7 research outputs found

    Derandomizing Arthur-Merlin Games using Hitting Sets

    Get PDF
    We prove that AM (and hence Graph Nonisomorphism) is in NPif for some epsilon > 0, some language in NE intersection coNE requires nondeterministiccircuits of size 2^(epsilon n). This improves recent results of Arvindand K¨obler and of Klivans and Van Melkebeek who proved the sameconclusion, but under stronger hardness assumptions, namely, eitherthe existence of a language in NE intersection coNE which cannot be approximatedby nondeterministic circuits of size less than 2^(epsilon n) or the existenceof a language in NE intersection coNE which requires oracle circuits of size 2^(epsilon n)with oracle gates for SAT (satisfiability).The previous results on derandomizing AM were based on pseudorandomgenerators. In contrast, our approach is based on a strengtheningof Andreev, Clementi and Rolim's hitting set approach to derandomization.As a spin-off, we show that this approach is strong enoughto give an easy (if the existence of explicit dispersers can be assumedknown) proof of the following implication: For some epsilon > 0, if there isa language in E which requires nondeterministic circuits of size 2^(epsilon n),then P=BPP. This differs from Impagliazzo and Wigderson's theorem"only" by replacing deterministic circuits with nondeterministicones

    Certified Hardness vs. Randomness for Log-Space

    Full text link
    Let L\mathcal{L} be a language that can be decided in linear space and let ϵ>0\epsilon >0 be any constant. Let A\mathcal{A} be the exponential hardness assumption that for every nn, membership in L\mathcal{L} for inputs of length~nn cannot be decided by circuits of size smaller than 2ϵn2^{\epsilon n}. We prove that for every function f:{0,1}{0,1}f :\{0,1\}^* \rightarrow \{0,1\}, computable by a randomized logspace algorithm RR, there exists a deterministic logspace algorithm DD (attempting to compute ff), such that on every input xx of length nn, the algorithm DD outputs one of the following: 1: The correct value f(x)f(x). 2: The string: ``I am unable to compute f(x)f(x) because the hardness assumption A\mathcal{A} is false'', followed by a (provenly correct) circuit of size smaller than 2ϵn2^{\epsilon n'} for membership in L\mathcal{L} for inputs of length~nn', for some n=Θ(logn)n' = \Theta (\log n); that is, a circuit that refutes A\mathcal{A}. Our next result is a universal derandomizer for BPLBPL: We give a deterministic algorithm UU that takes as an input a randomized logspace algorithm RR and an input xx and simulates the computation of RR on xx, deteriministically. Under the widely believed assumption BPL=LBPL=L, the space used by UU is at most CRlognC_R \cdot \log n (where CRC_R is a constant depending on~RR). Moreover, for every constant c1c \geq 1, if BPLSPACE[(log(n))c]BPL\subseteq SPACE[(\log(n))^{c}] then the space used by UU is at most CR(log(n))cC_R \cdot (\log(n))^{c}. Finally, we prove that if optimal hitting sets for ordered branching programs exist then there is a deterministic logspace algorithm that, given a black-box access to an ordered branching program BB of size nn, estimates the probability that BB accepts on a uniformly random input. This extends the result of (Cheng and Hoza CCC 2020), who proved that an optimal hitting set implies a white-box two-sided derandomization.Comment: Abstract shortened to fit arXiv requirement

    Pseudorandomness and Average-Case Complexity Via Uniform Reductions

    Full text link

    Weak Random Sources, Hitting Sets, and BPP Simulations

    No full text

    Weak Random Sources, Hitting Sets, and BPP Simulations

    No full text
    We show how to simulate any BPP algorithm in polynomial time using a weak random source of r bits and min-entropy r fl for any fl ? 0. This follows from a more general result about sampling with weak random sources. Our result matches an information-theoretic lower bound and solves a question that has been open for some years. The previous best results were a polynomial time simulation of RP [Saks, Srinivasan and Zhou 1995] and a quasi-polynomial time simulation of BPP [Ta-Shma 1996]. Departing significantly from previous related works, we do not use extractors; instead, we use the OR-disperser of [Saks, Srinivasan, and Zhou 1995] in combination with a tricky use of hitting sets borrowed from [Andreev, Clementi, and Rolim 1996]. AMS Subject Classification: 68Q10, 11K45. Key Words and Phrases: Derandomization, Imperfect Sources of Randomness, Hitting Sets, Randomized Computations, Expander Graphs. Abbreviated Title: BPP Simulations using Weak Random Sources. 1 Introduction Randomi..
    corecore