Lecture 15: Simulating Bpp -high Min-entropy Sources 1 Simulating Bpp Using Sv-sources
نویسندگان
چکیده
It’s easy to check that any specific string of length n has probability at most (1 − δ), hence SV-sources are n log 1 1−δ -sources. Also recall that SV-sources are (k, l) block sources where k = l log 1 1−δ . Suppose δ = log 1 1−δ , then k = δl. Take a hash-based extractor E : {0, 1} × {0, 1} → {0, 1}. Here, our weak-source is a SVsource over the strings of length n and suppose k = n log 1 1−δ is the lower bound for min-entropy of the source. According to construction of hash-based extractors (Lecture 13) d = O(n), d+m = k + d − 2 log 1 ǫ , hence m = k − 2 log 1 ǫ . (ǫ is, as usual, statistical distance of output and uniform distribution).
منابع مشابه
Computing with Very Weak Random Sources
For any fixed 6 > 0, we show how to simulate RP algorithms in time n O ( ‘ O g n ) using the output of a 6-source wath min-entropy R‘. Such a weak random source is asked once for R bits; it outputs an Rbit string such that any string has probability at most 2 R c . I f 6 > 1 l/(k + l) , our BPP simulations take time no(‘og(k)n) (log(k) is the logarithm iterated k times). We also gave a polynomi...
متن کاملWeak Random Sources, Hitting Sets, and BPP Simulations
We show how to simulate any BPP algorithm in polynomial time by using a weak random source of r bits and min-entropy r for any γ > 0. This follows from a more general result about sampling with weak random sources. Our result matches an information-theoretic lower bound and solves a question that has been open for some years. The previous best results were a polynomial time simulation of RP [M....
متن کاملExtractors and Pseudorandom generators using the hard core lemma
We present a construction of an extractor based exclusively on hardness amplification which extracts from sources with (some) polynomially small min-entropy. This improves upon a similar construction of the author with Trevisan ([DT09]) both in terms of the entropy rate and seed length. The extractor in [DT09] could extract from N -bit sources with entropy γN (for γ > 0) using a seed of length ...
متن کاملDisperser Graphs, Deterministic Amplification and Imperfect Random Sources
We use a certain type of expanding bipartite graphs, called disperser graphs, to design procedures for sampling a finite number of elements from a finite set, with the property that the probability of hitting any sufficiently large subset is high. The advantages of these procedures are: 1. They require a relatively small number of random bits. 2. They are robust with respect to the quality of t...
متن کاملDeterministic Ampli cation , and Weak
We use a certain type of expanding bipartite graphs, called disperser graphs, to design procedures for picking highly correlated samples from a nite set, with the property that the probability of hitting any suuciently large subset is high. These procedures require a relatively small number of random bits and are robust with respect to the quality of the random bits. Using these sampling proced...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004