Lecture 15: Simulating Bpp -high Min-entropy Sources 1 Simulating Bpp Using Sv-sources

نویسندگان

  • Valentine Kabanets
  • Ehsan Amiri
چکیده

It’s easy to check that any specific string of length n has probability at most (1 − δ), hence SV-sources are n log 1 1−δ -sources. Also recall that SV-sources are (k, l) block sources where k = l log 1 1−δ . Suppose δ = log 1 1−δ , then k = δl. Take a hash-based extractor E : {0, 1} × {0, 1} → {0, 1}. Here, our weak-source is a SVsource over the strings of length n and suppose k = n log 1 1−δ is the lower bound for min-entropy of the source. According to construction of hash-based extractors (Lecture 13) d = O(n), d+m = k + d − 2 log 1 ǫ , hence m = k − 2 log 1 ǫ . (ǫ is, as usual, statistical distance of output and uniform distribution).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Computing with Very Weak Random Sources

For any fixed 6 > 0, we show how to simulate RP algorithms in time n O ( ‘ O g n ) using the output of a 6-source wath min-entropy R‘. Such a weak random source is asked once for R bits; it outputs an Rbit string such that any string has probability at most 2 R c . I f 6 > 1 l/(k + l) , our BPP simulations take time no(‘og(k)n) (log(k) is the logarithm iterated k times). We also gave a polynomi...

متن کامل

Weak Random Sources, Hitting Sets, and BPP Simulations

We show how to simulate any BPP algorithm in polynomial time by using a weak random source of r bits and min-entropy r for any γ > 0. This follows from a more general result about sampling with weak random sources. Our result matches an information-theoretic lower bound and solves a question that has been open for some years. The previous best results were a polynomial time simulation of RP [M....

متن کامل

Extractors and Pseudorandom generators using the hard core lemma

We present a construction of an extractor based exclusively on hardness amplification which extracts from sources with (some) polynomially small min-entropy. This improves upon a similar construction of the author with Trevisan ([DT09]) both in terms of the entropy rate and seed length. The extractor in [DT09] could extract from N -bit sources with entropy γN (for γ > 0) using a seed of length ...

متن کامل

Disperser Graphs, Deterministic Amplification and Imperfect Random Sources

We use a certain type of expanding bipartite graphs, called disperser graphs, to design procedures for sampling a finite number of elements from a finite set, with the property that the probability of hitting any sufficiently large subset is high. The advantages of these procedures are: 1. They require a relatively small number of random bits. 2. They are robust with respect to the quality of t...

متن کامل

Deterministic Ampli cation , and Weak

We use a certain type of expanding bipartite graphs, called disperser graphs, to design procedures for picking highly correlated samples from a nite set, with the property that the probability of hitting any suuciently large subset is high. These procedures require a relatively small number of random bits and are robust with respect to the quality of the random bits. Using these sampling proced...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004