Skip to main content

On Obtaining Pseudorandomness from Error-Correcting Codes

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4337))

Abstract

A number of recent results have constructed randomness extractors and pseudorandom generators (PRGs) directly from certain error-correcting codes. The underlying construction in these results amounts to picking a random index into the codeword and outputting m consecutive symbols (the codeword is obtained from the weak random source in the case of extractors, and from a hard function in the case of PRGs).

We study this construction applied to general cyclic error-correcting codes, with the goal of understanding what pseudorandom objects it can produce. We show that every cyclic code with sufficient distance yields extractors that fool all linear tests. Further, we show that every polynomial code with sufficient distance yields extractors that fool all low-degree prediction tests. These are the first results that apply to univariate (rather than multivariate) polynomial codes, hinting that Reed-Solomon codes may yield good randomness extractors.

Our proof technique gives rise to a systematic way of producing unconditional PRGs against restricted classes of tests. In particular, we obtain PRGs fooling all linear tests (which amounts to a construction of ε-biased spaces), and we obtain PRGs fooling all low-degree prediction tests.

This research was supported by NSF grant CCF-0346991 and by BSF grant 2004329.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Andreev, A.E., Baskakov, J.L., Clementi, A.E.F., Rolim, J.D.P.: Small random sets for affine spaces and better explicit lower bounds for branching programs. Technical Report TR04-053, ECCC (1997)

    Google Scholar 

  2. Alon, N., Goldreich, O., Hastad, J., Peralta, R.: Simple constructions of almost k-wise independent random variables. Random Struct. Algorithms (3), 289–304 (1992)

    Article  MATH  MathSciNet  Google Scholar 

  3. Bogdanov, A.: Pseudorandom generators for low degree polynomials. In: Proceedings of STOC, pp. 21–30 (2005)

    Google Scholar 

  4. Dvir, Z., Shpilka, A.: Locally decodable codes with 2 queries and polynomial identity testing for depth 3 circuits. In: Proceedings of STOC, pp. 592–601 (2005)

    Google Scholar 

  5. Goldreich, O., Zuckerman, D.: Another proof that BPP subseteq PH (and more). Technical Report TR97-045, ECCC (1997)

    Google Scholar 

  6. Impagliazzo, R., Nisan, N., Wigderson, A.: Pseudorandomness for network algorithms. In: Proceedings of STOC, pp. 356–364 (1994)

    Google Scholar 

  7. Kabanets, V., Impagliazzo, R.: Derandomizing polynomial identity tests means proving circuit lower bounds 13, 1–46 (2004)

    Google Scholar 

  8. Klivans, A., Spielman, D.: Randomness efficient identity testing of multivariate polynomials. In: Proceedings of STOC, pp. 216–223 (2001)

    Google Scholar 

  9. Lu, C.-J., Reingold, O., Vadhan, S., Wigderson, A.: Extractors: optimal up to constant factors. In: Proceedings of STOC, pp. 602–611 (2003)

    Google Scholar 

  10. Lewin, D., Vadhan, S.: Checking polynomial identities over any field: Towards a derandomization? In: Proceedings of STOC, pp. 438–447 (1998)

    Google Scholar 

  11. Mossel, E., Umans, C.: On the complexity of approximating the VC dimension. J. Comput. Syst. Sci. 65(4), 660–671 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  12. Nisan, N.: Pseudorandom generators for space-bounded computation. Combinatorica 12, 249–461 (1992)

    Article  MathSciNet  Google Scholar 

  13. Nisan, N.: RL ⊆ SC. Computational Complexity 4(1), 1–11 (1994)

    Article  MATH  MathSciNet  Google Scholar 

  14. Naor, J., Naor, M.: Small-bias probability spaces: Efficient constructions and applications. SICOMP 22(4), 838–856 (1993)

    MATH  MathSciNet  Google Scholar 

  15. Nisan, N., Zuckerman, D.: Randomness is linear in space. J. Comput. Syst. Sci. 52(1), 43–52 (1996)

    Article  MATH  MathSciNet  Google Scholar 

  16. Raz, R., Shpilka, A.: Deterministic polynomial identity testing in non-commutative models. In: CCC

    Google Scholar 

  17. Reingold, O., Shaltiel, R., Wigderson, A.: Extracting randomness via repeated condensing. In: IEEE (ed.) FOCS, pp. 22–31 (2000)

    Google Scholar 

  18. Russell, A., Zuckerman, D.: Perfect information leader election in log* n + O(1) rounds. J. Comput. Syst. Sci. 63(4), 612–626 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  19. Shaltiel, R.: Recent developments in explicit constructions of extractors. Bulletin of EATCS 77, 67–95 (2002); Columns: Computational Complexity

    MATH  MathSciNet  Google Scholar 

  20. Sipser, M.: Expanders, randomness, or time versus space. J. Comput. Syst. Sci. 36(3), 379–383 (1988)

    Article  MATH  MathSciNet  Google Scholar 

  21. Srinivasan, A.: Low-discrepancy sets for high-dimensional rectangles: a survey. Bulletin of the EATCS 70, 67–76 (2000)

    MATH  Google Scholar 

  22. Sudan, M., Trevisan, L., Vadhan, S.: Pseudorandom generators without the XOR lemma. J. Comput. Syst. Sci. 62(2), 236–266 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  23. Shaltiel, R., Umans, C.: Simple extractors for all min-entropies and a new pseudorandom generator. J. ACM 52(2), 172–216 (2005)

    Article  MathSciNet  Google Scholar 

  24. Saks, M., Zhou, S.: BPSPACE(S) ⊆ DSPACE(S 3/2). J. Comput. Syst. Sci. 58(2), 376–403 (1999)

    Article  MATH  MathSciNet  Google Scholar 

  25. Trevisan, L.: Extractors and pseudorandom generators. J. ACM 48(4), 860–879 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  26. Ta-Shma, A., Zuckerman, D.: Extractor codes. In: ACM (ed.) Proceedings of STOC, pp. 193–199 (2001)

    Google Scholar 

  27. Ta-Shma, A., Zuckerman, D., Safra, S.: Extractors from Reed-Muller codes. In: Proceedings of FOCS, pp. 638–647 (2001)

    Google Scholar 

  28. Umans, C.: Hardness of approximating \(\Sigma_{2}^{p}\) minimization problems. In: Proceedings of FOCS, pp. 465–474 (1999)

    Google Scholar 

  29. Umans, C.: Pseudo-random generators for all hardnesses. J. Comput. Syst. Sci. 67(2), 419–440 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  30. Wigderson, A., Zuckerman, D.: Expanders that beat the eigenvalue bound: Explicit construction and applications. In: Proceedings of STOC, pp. 245–251 (1993)

    Google Scholar 

  31. Yao, A.C.: Theory and applications of trapdoor functions. In: Proceedings of the 23rd Symposium on Foundations of Computer Science (FOCS), pp. 80–91. IEEE Computer Society Press, Los Alamitos (1982)

    Google Scholar 

  32. Zuckerman, D.: On unapproximable versions of NP -complete problems. SICOMP 25(6), 1293–1304 (1996)

    MATH  MathSciNet  Google Scholar 

  33. Zuckerman, D.: Randomness-optimal oblivious sampling. Random Struct. Algorithms 11, 345–367 (1997)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kalyanaraman, S., Umans, C. (2006). On Obtaining Pseudorandomness from Error-Correcting Codes. In: Arun-Kumar, S., Garg, N. (eds) FSTTCS 2006: Foundations of Software Technology and Theoretical Computer Science. FSTTCS 2006. Lecture Notes in Computer Science, vol 4337. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11944836_12

Download citation

  • DOI: https://doi.org/10.1007/11944836_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-49994-7

  • Online ISBN: 978-3-540-49995-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics