Skip to main content
Log in

Pseudorandom generators for combinatorial checkerboards

  • Published:
computational complexity Aims and scope Submit manuscript

Abstract

We define a combinatorial checkerboard to be a function f : {1, . . . , m}d → {1,−1} of the form \({f(u_1,\ldots,u_d)=\prod_{i=1}^df_i(u_i)}\) for some functions f i : {1, . . . , m} → {1,−1}. This is a variant of combinatorial rectangles, which can be defined in the same way but using {0, 1} instead of {1,−1}. We consider the problem of constructing explicit pseudorandom generators for combinatorial checkerboards. This is a generalization of small-bias generators, which correspond to the case m = 2. We construct a pseudorandom generator that \({\epsilon}\)-fools all combinatorial checkerboards with seed length \({O\bigl(\log m+\log d\cdot\log\log d+\log^{3/2} \frac{1}{\epsilon}\bigr)}\). Previous work by Impagliazzo, Nisan, and Wigderson implies a pseudorandom generator with seed length \({O\bigl(\log m+\log^2d+\log d\cdot\log\frac{1}{\epsilon}\bigr)}\). Our seed length is better except when \({\frac{1}{\epsilon}\geq d^{\omega(\log d)}}\).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Scott Aaronson, Dieter van Melkebeek (2011) On Circuit Lower Bounds from Derandomization. Theory of Computing 7(1): 177–184

    Article  MathSciNet  Google Scholar 

  • Miklós Ajtai, János Komlós, & Endre Szemerédi (1987). Deterministic Simulation in LOGSPACE. In Proceedings of the 19th ACM Symposium on Theory of Computing, 132–140.

  • Miklós Ajtai, Avi Wigderson (1989) Deterministic Simulation of Probabilistic Constant-Depth Circuits. Advances in Computing Research—Randomness and Computation 5: 199–223

    Google Scholar 

  • Noga Alon, Fan Chung (1988) Explicit Construction of Linear Sized Tolerant Networks. Discrete Mathematics 72(1-3): 15–19

    Article  MathSciNet  Google Scholar 

  • Noga Alon, Zvi Galil, Vitali Milman (1987) Better Expanders and Superconcentrators. Journal of Algorithms 8(3): 337–347

    Article  MathSciNet  Google Scholar 

  • Noga Alon, Oded Goldreich, Johan Håstad, René Peralta (1992) Simple Constructions of Almost k-wise Independent Random Variables. Random Structures and Algorithms 3(3): 289–304

    Article  MathSciNet  MATH  Google Scholar 

  • Noga Alon, Vitali Milman (1985) λ1, Isoperimetric Inequalities for Graphs, and Superconcentrators. Journal of Combinatorial Theory, Series B 38(1): 73–88

    Article  MathSciNet  Google Scholar 

  • Roy Armoni (1998). On the Derandomization of Space-Bounded Computations. In Proceedings of the 2nd International Workshop on Randomization and Computation, 47–59.

  • Roy Armoni, Michael Saks, Avi Wigderson & Shiyu Zhou (1996). Discrepancy Sets and Pseudorandom Generators for Combinatorial Rectangles. In Proceedings of the 37th IEEE Symposium on Foundations of Computer Science, 412–421.

  • Roy Armoni, Amnon Ta-Shma, Avi Wigderson, Shiyu Zhou (2000) An O(log4/3(n)) Space Algorithm for (s,t) Connectivity in Undirected Graphs. Journal of the ACM 47(2): 294–311

    Article  MathSciNet  MATH  Google Scholar 

  • László Babai, Lance Fortnow, NoamNisan& Avi Wigderson (1993) BPP Has Subexponential Time Simulations Unless EXPTIME Has Publishable Proofs. Computational Complexity 3: 307–318

    Article  MathSciNet  Google Scholar 

  • László Babai, Noam Nisan, Mario Szegedy (1992) Multiparty Protocols, Pseudorandom Generators for Logspace, and Time-Space Trade-Offs. Journal of Computer and System Sciences 45(2): 204–232

    Article  MathSciNet  MATH  Google Scholar 

  • Louay Bazzi (2009) Polylogarithmic Independence Can Fool DNF Formulas. SIAM Journal on Computing 38(6): 2220–2272

    Article  MathSciNet  MATH  Google Scholar 

  • Mihir Bellare & John Rompel (1994). Randomness-Efficient Oblivious Sampling. In Proceedings of the 35th IEEE Symposium on Foundations of Computer Science, 276–287.

  • Andrej Bogdanov (2005). Pseudorandom Generators for Low Degree Polynomials. In Proceedings of the 37th ACM Symposium on Theory of Computing, 21–30.

  • Andrej Bogdanov, Zeev Dvir, Elad Verbin & Amir Yehudayoff (2009). Pseudorandomness for Width 2 Branching Programs. Technical Report TR09-070, Electronic Colloquium on Computational Complexity.

  • Andrej Bogdanov, Periklis Papakonstantinou & Andrew Wan (2011). Pseudorandomness for Read-Once Formulas. In Proceedings of the 52nd IEEE Symposium on Foundations of Computer Science (to appear).

  • Andrej Bogdanov, Emanuele Viola (2010) Pseudorandom Bits for Polynomials. SIAM Journal on Computing 39(6): 2464–2486

    Article  MathSciNet  MATH  Google Scholar 

  • Mark Braverman (2010). Polylogarithmic Independence Fools AC0 Circuits. Journal of the ACM 57(5).

  • Mark Braverman, Anup Rao, Ran Raz & Amir Yehudayoff (2010). Pseudorandom Generators for Regular Branching Programs. In Proceedings of the 51st IEEE Symposium on Foundations of Computer Science, 40–47.

  • Joshua Brody & Elad Verbin (2010). The Coin Problem, and Pseudorandomness for Branching Programs. In Proceedings of the 51st IEEE Symposium on Foundations of Computer Science, 30–39.

  • Jin-Yi Cai, Venkatesan Chakaravarthy, Dieter van Melkebeek (2006) Time-Space Tradeoff in Derandomizing Probabilistic Logspace. Theory of Computing Systems 39(1): 189–208

    Article  MathSciNet  MATH  Google Scholar 

  • Anindya De (2011). Pseudorandomness for Permutation and Regular Branching Programs. In Proceedings of the 26th IEEE Conference on Computational Complexity, 221–231.

  • Anindya De, Omid Etesami, Luca Trevisan & Madhur Tulsiani (2010). Improved Pseudorandom Generators for Depth 2 Circuits. In Proceedings of the 14th International Workshop on Randomization and Computation, 504–517.

  • Ilias Diakonikolas, Parikshit Gopalan, Ragesh Jaiswal, Rocco Servedio, Emanuele Viola (2010a) Bounded Independence Fools Halfspaces. SIAM Journal on Computing 39(8): 3441–3462

    Article  MathSciNet  MATH  Google Scholar 

  • Ilias Diakonikolas, Daniel Kane & Jelani Nelson (2010b). Bounded Independence Fools Degree-2 Threshold Functions. In Proceedings of the 51st IEEE Symposium on Foundations of Computer Science, 11–20.

  • Guy Even, Oded Goldreich, Michael Luby, Noam Nisan, Boban Velickovic (1998) Efficient Approximation of Product Distributions. Random Structures and Algorithms 13(1): 1–16

    Article  MathSciNet  MATH  Google Scholar 

  • Lance Fortnow, Adam Klivans (2006). Linear Advice for Randomized Logarithmic Space. In Proceedings of the 23rd International Symposium on Theoretical Aspects of Computer Science, 469–476.

  • Ofer Gabber, Zvi Galil (1981) Explicit Constructions of Linear-Sized Superconcentrators. Journal of Computer and System Sciences 22(3): 407–420

    Article  MathSciNet  MATH  Google Scholar 

  • Oded Goldreich (2011). In a World of P = BPP. Studies in Complexity and Cryptography 191–232.

  • Oded Goldreich, Avi Wigderson (1997) Tiny Families of Functions with Random Properties: A Quality-Size Trade-Off for Hashing. Random Structures and Algorithms 11(4): 315–343

    Article  MathSciNet  MATH  Google Scholar 

  • Parikshit Gopalan, Raghu Meka, Omer Reingold & David Zuckerman (2011). Pseudorandom Generators for Combinatorial Shapes. In Proceedings of the 43rd ACM Symposium on Theory of Computing, 253–262.

  • Parikshit Gopalan, Ryan O’Donnell, Yi Wu & David Zuckerman (2010). Fooling Functions of Halfspaces under Product Distributions. In Proceedings of the 25th IEEE Conference on Computational Complexity, 223–234.

  • Prahladh Harsha, Adam Klivans & Raghu Meka (2010). An Invariance Principle for Polytopes. In Proceedings of the 42nd ACM Symposium on Theory of Computing, 543–552.

  • Russell Impagliazzo, Valentine Kabanets (2004) Derandomizing Polynomial Identity Tests Means Proving Circuit Lower Bounds. Computational Complexity 13(1-2): 1–46

    Article  MathSciNet  MATH  Google Scholar 

  • Russell Impagliazzo, Valentine Kabanets, Avi Wigderson (2002) In Search of an Easy Witness: Exponential Time vs. Probabilistic Polynomial Time. Journal of Computer and System Sciences 65(4): 672–694

    Article  MathSciNet  MATH  Google Scholar 

  • Russell Impagliazzo, Noam Nisan & Avi Wigderson (1994). Pseudorandomness for Network Algorithms. In Proceedings of the 26th ACM Symposium on Theory of Computing, 356–364.

  • Russell Impagliazzo, Ronen Shaltiel, Avi Wigderson (2006) Reducing the Seed Length in the Nisan-Wigderson Generator.. Combinatorica 26(6): 647–681

    Article  MathSciNet  MATH  Google Scholar 

  • Russell Impagliazzo & Avi Wigderson (1997). P = BPP if E Requires Exponential Circuits: Derandomizing the XOR Lemma. In Proceedings of the 29th ACM Symposium on Theory of Computing, 220–229.

  • Shuji Jimbo, Akira Maruoka (1987) Expanders Obtained from Affine Transformations. Combinatorica 7(4): 343–355

    Article  MathSciNet  Google Scholar 

  • Adam Klivans (2001). On the Derandomization of Constant Depth Circuits. In Proceedings of the 5th International Workshop on Randomization and Computation, 249–260.

  • Michal Koucký, Prajakta Nimbhorkar & Pavel Pudlák (2011). Pseudorandom Generators for Group Products. In Proceedings of the 43rd ACM Symposium on Theory of Computing, 263–272.

  • Nathan Linial, Michael Luby, Michael Saks, David Zuckerman (1997) Efficient Construction of a Small Hitting Set for Combinatorial Rectangles in High Dimension. Combinatorica 17(2): 215–234

    Article  MathSciNet  Google Scholar 

  • Shachar Lovett (2009) Unconditional Pseudorandom Generators for Low Degree Polynomials. Theory of Computing 5(1): 69–82

    Article  MathSciNet  Google Scholar 

  • Shachar Lovett, Partha Mukhopadhyay & Amir Shpilka (2010). Pseudorandom Generators for CC0[p] and the Fourier Spectrum of Low-Degree Polynomials over Finite Fields. In Proceedings of the 51st IEEE Symposium on Foundations of Computer Science, 695–704.

  • Shachar Lovett, Omer Reingold, Luca Trevisan & Salil Vadhan (2009). Pseudorandom Bit Generators That Fool Modular Sums. In Proceedings of the 13th International Workshop on Randomization and Computation, 615–630.

  • Chi-Jen Lu (2002) Improved Pseudorandom Generators for Combinatorial Rectangles. Combinatorica 22(3): 417–434

    Article  MathSciNet  MATH  Google Scholar 

  • Alexander Lubotzky, Ralph Phillips, Peter Sarnak (1988) Ramanujan Graphs. Combinatorica 8(3): 261–277

    Article  MathSciNet  Google Scholar 

  • Michael Luby, Boban Velickovic (1996) On Deterministic Approximation of DNF. Algorithmica 16(4-5): 415–433

    MathSciNet  Google Scholar 

  • Michael Luby, Boban Velickovic & Avi Wigderson (1993). Deterministic Approximate Counting of Depth-2 Circuits. In Proceedings of the 2nd Israel Symposium on Theory of Computing Systems, 18–24.

  • Gregory Margulis (1973) Explicit Constructions of Expanders. Problemy Peredaci Informacii 9(4): 71–80

    MathSciNet  Google Scholar 

  • Gregory Margulis (1988) Explicit Group-Theoretic Constructions of Combinatorial Schemes and Their Applications in the Construction of Expanders and Concentrators. Problems of Information Transmission 24(1): 39–46

    MathSciNet  Google Scholar 

  • Raghu Meka & David Zuckerman (2009). Small-Bias Spaces for Group Products. In Proceedings of the 13th International Workshop on Randomization and Computation, 658–672.

  • Raghu Meka & David Zuckerman (2010). Pseudorandom Generators for Polynomial Threshold Functions. In Proceedings of the 42nd ACM Symposium on Theory of Computing, 427–436.

  • Moshe Morgenstern (1994) Existence and Explicit Constructions of q + 1 Regular Ramanujan Graphs for Every Prime Power q. Journal of Combinatorial Theory, Series B 62(1): 44–62

    Article  MathSciNet  MATH  Google Scholar 

  • Elchanan Mossel, Amir Shpilka, Luca Trevisan (2006) On Epsilon-Biased Generators in NC0. Random Structures and Algorithms 29(1): 56–81

    Article  MathSciNet  MATH  Google Scholar 

  • Joseph Naor, Moni Naor (1993) Small-Bias Probability Spaces: Efficient Constructions and Applications. SIAM Journal on Computing 22(4): 838–856

    Article  MathSciNet  MATH  Google Scholar 

  • Noam Nisan (1991) Pseudorandom Bits for Constant Depth Circuits. Combinatorica 11(1): 63–70

    Article  MathSciNet  MATH  Google Scholar 

  • Noam Nisan (1992) Pseudorandom Generators for Space-Bounded Computation. Combinatorica 12(4): 449–461

    Article  MathSciNet  MATH  Google Scholar 

  • Noam Nisan (1993) On Read-Once vs. Multiple Access to Randomness in Logspace. Theoretical Computer Science 107(1): 135–144

    MATH  Google Scholar 

  • Noam Nisan (1994) \({{\rm RL} \subseteq {\rm SC}}\) . Computational Complexity 4: 1–11

    Article  MathSciNet  MATH  Google Scholar 

  • Noam Nisan, Endre Szemerédi & Avi Wigderson (1992). Undirected Connectivity in O(log1.5(n)) Space. In Proceedings of the 33rd IEEE Symposium on Foundations of Computer Science, 24–29.

  • Noam Nisan, Avi Wigderson (1994) Hardness vs. Randomness. Journal of Computer and System Sciences 49(2): 149–167

    Article  MathSciNet  MATH  Google Scholar 

  • Noam Nisan, David Zuckerman (1996) Randomness is Linear in Space. Journal of Computer and System Sciences 52(1): 43–52

    Article  MathSciNet  MATH  Google Scholar 

  • Ran Raz & Omer Reingold (1999). On Recycling the Randomness of States in Space Bounded Computation. In Proceedings of the 31st ACM Symposium on Theory of Computing, 159–168.

  • Alexander Razborov (2009). A Simple Proof of Bazzi’s Theorem. ACM Transactions on Computation Theory 1(1).

  • Omer Reingold (2008). Undirected Connectivity in Log-Space. Journal of the ACM 55(4).

  • Omer Reingold, Luca Trevisan & Salil Vadhan (2006). Pseudorandom Walks on Regular Digraphs and the RL vs. L Problem. In Proceedings of the 38th ACM Symposium on Theory of Computing, 457–466.

  • Omer Reingold, Salil Vadhan, Avi Wigderson (2002) Entropy Waves, the Zig-Zag Graph Product, and New Constant-Degree Expanders. Annals of Mathematics 155(1): 157–187

    Article  MathSciNet  MATH  Google Scholar 

  • Eyal Rozenman & Salil Vadhan (2005). Derandomized Squaring of Graphs. In Proceedings of the 9th International Workshop on Randomization and Computation, 436–447.

  • Michael Saks, Shiyu Zhou (1999) \({{\rm BP_HSPACE}(S)\subseteq{\rm DSPACE}(S^{3/2})}\). Journal of Computer and System Sciences 58(2): 376–403

    Article  MathSciNet  MATH  Google Scholar 

  • Ronen Shaltiel, Christopher Umans (2005) Simple Extractors for All Min-Entropies and a New Pseudorandom Generator. Journal of the ACM 52(2): 172–216

    Article  MathSciNet  Google Scholar 

  • Jiri Sima & Stanislav Zak (2010). A Polynomial Time Construction of a Hitting Set for Read-Once Branching Programs of Width 3. Technical Report TR10-088, Electronic Colloquium on Computational Complexity.

  • Madhu Sudan, Luca Trevisan, Salil Vadhan (2001) Pseudorandom Generators without the XOR Lemma. Journal of Computer and System Sciences 62(2): 236–266

    Article  MathSciNet  MATH  Google Scholar 

  • Luca Trevisan (2004). A Note on Approximate Counting for k-DNF. In Proceedings of the 8th International Workshop on Randomization and Computation, 417–426.

  • Christopher Umans (2003) Pseudo-random Generators for All Hardnesses. Journal of Computer and System Sciences 67(2): 419–440

    Article  MathSciNet  MATH  Google Scholar 

  • Salil Vadhan (2011). Pseudorandomness. Manuscript in preparation for Foundations and Trends in Theoretical Computer Science.

  • Emanuele Viola (2007) Pseudorandom Bits for Constant-Depth Circuits with Few Arbitrary Symmetric Gates. SIAM Journal on Computing 36(5): 1387–1403

    Article  MATH  Google Scholar 

  • Emanuele Viola (2009) The Sum of d Small-Bias Generators Fools Polynomials of Degree d. Computational Complexity 18(2): 209–217

    Article  MathSciNet  MATH  Google Scholar 

  • Thomas Watson (2011). Pseudorandom Generators for Combinatorial Checkerboards. In Proceedings of the 26th IEEE Conference on Computational Complexity, 232–242.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Thomas Watson.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Watson, T. Pseudorandom generators for combinatorial checkerboards. comput. complex. 22, 727–769 (2013). https://doi.org/10.1007/s00037-012-0036-6

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00037-012-0036-6

Keywords

Subject classification

Navigation