Explicit Resilient Functions Matching Ajtai-Linial
نویسنده
چکیده
A Boolean function on n variables is q-resilient if for any subset of at most q variables, the function is very likely to be determined by a uniformly random assignment to the remaining n − q variables; in other words, no coalition of at most q variables has significant influence on the function. Resilient functions have been extensively studied with a variety of applications in cryptography, distributed computing, and pseudorandomness. The best known resilient function on n variables due to Ajtai and Linial [AL93] has the property that only sets of size Ω(n/(log n)) can have influence bounded away from zero. However, the construction of Ajtai and Linial is by the probabilistic method and does not give an efficiently computable function. We construct an explicit monotone depth three almost-balanced Boolean function on n bits that is Ω(n/(log n))-resilient matching the bounds of Ajtai and Linial. The best previous explicit constructions of Meka [Mek09] (which only gives a logarithmic depth function), and Chattopadhyay and Zuckerman [CZ15] were only (n)-resilient for any constant 0 < β < 1. Our construction and analysis are motivated by (and simplifies parts of) the recent breakthrough of [CZ15] giving explicit two-sources extractors for polylogarithmic min-entropy; a key ingredient in their result was the construction of explicit constant-depth resilient functions. An important ingredient in our construction is a new randomness-optimal oblivious sampler that preserves moment generating functions of sums of variables and could be useful elsewhere.
منابع مشابه
Super-linear time-space tradeoff lower bounds for randomized computation
We prove the first time-space lower bound tradeoffs for randomized computation of decision problems. The bounds hold even in the case that the computation is allowed to have arbitrary probability of error on a small fraction of inputs. Our techniques are an extension of those used by Ajtai 14, 51 in his time-space tradeoffs for deterministic RAM algorithms computing element distinctness and for...
متن کاملMatching Theorems and Empirical Discrepancy Computations Using Majorizing Measures
We give explicit constructions of certain majorizing measures.These constructions allow us to give a unified proof of deep matching theo-rems of Ajtai, Komlbs, and Tusnady, of Leighton and Shor, and of Shor, aswell as of more precise and more general results in a similar spirit. EQUJPE O'ANALYSE, TOUR 46, U.A. No754 AU C.N.R.S., UNIVERSITE PARIS VI, 75230 PARISCEOEX 05, FRANCE<l...
متن کاملOn the Performance of Resilient Functions with Imperfect Inputs
We analyze the performance of resilient functions for imperfect input bits. Specifically, we allow more input bits than the resiliency degree of the resilient function to be biased and analyze the output behavior under this new assumption. We develop bounds on the output distribution of resilient functions build from a number of families of linear codes. We develop an explicit formula for the p...
متن کاملHilbert's Thirteenth Problem and Circuit Complexity
We study the following question, communicated to us by Miklós Ajtai: Can all explicit (e.g., polynomial time computable) functions f : ({0, 1}) → {0, 1} be computed by word circuits of constant size? Here, a word circuit is an acyclic circuit where each wire holds a word (i.e., an element of {0, 1}) and each gate G computes some binary operation gG : ({0, 1}) → {0, 1}, defined for all word leng...
متن کاملOn Extractors and Exposure-Resilient Functions for Sublogarithmic Entropy
We study deterministic extractors for bit-fixing sources (a.k.a. resilient functions) and exposure-resilient functions for small min-entropy. That is, of the n bits given as input to the function, k n bits are uniformly random and unknown to the adversary. We show that a random function is a resilient function with high probability if and only if k is at least roughly logn. In contrast, we show...
متن کامل