Simple Affine Extractors using Dimension Expansion Matt DeVos∗Ariel Gabizon† March 25, 2010 Abstract Let Fq be the field of q elements. An (n, k)-affine extractor is a mapping D : Fnq → {0, 1} such that for any k-dimensional affine subspace X ⊆ Fnq , D(x) is an almost unbiased bit when x is chosen uniformly from X. Loosely speaking, the problem of explicitly constructing affine extractors gets harder as q gets smaller and easier as k gets larger. This is reflected in previous results: When q is ‘large enough’, specifically q = Ω(n2 ), Gabizon and Raz [12] construct affine extractors for any k ≥ 1. In the ‘hardest case’, i.e. when q = 2, Bourgain [7] constructs affine extractors for k ≥ δn for any constant (and even slightly sub-constant) δ > 0. Our main result is the following: Fix any k ≥ 2 and let d = 5n/k. Then whenever q > 2 · d2 and p = char(Fq ) > d, we give an explicit (n, k)-affine extractor. For example, when k = δn for ¡ ¢2 constant δ > 0, we get an extractor for a field of constant size Ω( 1δ ). We also get weaker results for fields of arbitrary characteristic (but can still work with a constant field size when k = δn for constant δ > 0). Thus our result may be viewed as a ‘field-size/dimension’ tradeoff for affine extractors. For a wide range of k this gives a new result, but even for large k where we do not improve (or even match) the previous result of [7], we believe that our construction and proof have the advantage of being very simple: Assume n is prime and d is odd, and fix any non-trivial linear map T : Fnq 7→ Fq . Define QR : Fq 7→ {0, 1} by QR(x) = 1 if and only if x is a quadratic residue. Then, the function D : Fnq 7→ {0, 1} defined by D(x) , QR(T (xd )) is an (n, k)-affine extractor. Our proof uses a result of Heur, Leung and Xiang [14] giving a lower bound on the dimension of products of subspaces. ∗

Department of Mathematics, Simon Fraser University, Vancouver, Canada. [email protected] Department of Computer Science, Colubmia University. Part of this research was done when the author was at Department of Computing Science, Simon Fraser University. [email protected]. †

1

1

Introduction

In this paper we consider the problem of explicitly constructing affine extractors: Color a vector space , say with 2 colors, such that every large enough affine subspace has roughly the same number of points of each color. Let us define this formally. First, we say that a distribution P on {0, 1} is ²-close uniform if | Pr(P = 1) − 1/2| ≤ ². Definition 1 (Affine extractor). Fix integers 1 ≤ k ≤ n and a field Fq . A function D : Fnq 7→ {0, 1} is an (n, k)-affine extractor with error ², if for any k-dimensional affine subspace X ⊆ Fnq D(X) is ²-close to the uniform 1

1.1 Background and Motivation The question studied in this paper belongs to the fields of randomness extraction and pseudorandomness on which there has been a lot of work. We give some relevant background below. Extractors Loosely speaking, a randomness extractor is a function that produces random bits given a sample from a ‘weak random source’ - a distribution that ‘contains some randomness’, but is far from being completely random. More formally, let C be a class of distributions on some finite set Ω. We say that a function D is a deterministic extractor (from here on, ‘extractor’)2 for the class C, if for every distribution X in C, the distribution of D(X) is close to uniform. In the context of extractors, the standard way to measure how much randomness a distribution contains is through the notion of minentropy introduced by Chor and Goldreich [8]: The min-entropy of a distribution X on a finite set Ω is the largest number k such that for every x ∈ Ω, Pr(X = x) ≤ 2−k . For example, the uniform distribution on Ω has min-entropy log2 |Ω|. In particular for a given k > 0, X has min-entropy at least k if for every x ∈ Ω, Pr(X = x) ≤ 2−k . A counting argument shows that for any ‘not too large’ class C of high min-entropy sources, a random function D : Ω 7→ {0, 1} is with high probability an extractor for C. An important goal of this field is to broaden the classes of distributions for which efficiently computable extractors are known. (Another important goal which is not the focus of this paper is to maximize the number of random bits extracted from a sample of the source.) Various classes C of distributions were studied in the literature: The first construction of extractors can be traced back to von Neumann [37] who showed how to use many independent tosses of a biassed coin (with unknown bias) to obtain an unbiased coin. Blum [6] considered sources that are generated by a finite Markov-chain. Santha and Vazirani [27], Vazirani [34, 35], Chor and Goldreich [8], Barak et al. [1], Barak et al. [2], Dodis et al. [11], Raz [25] and Barak et al.[3] studied sources that 1

Affine extractors are usually defined as outputting many bits, and indeed one important goal is constructing affine extractors with large output length. However, as in this paper our new results are not related to the number of output bits, for simplicity we define affine extractors as boolean functions (see also Remark 5.1). 2 There is another very well-studied notion of ‘seeded extractor’ described later in this section. In this paper the notion of extractor always refers to a deterministic extractor.

2

are composed of several independent samples from various classes of distributions. Trevisan and Vadhan [32] and Kamp et al. [15] studied sources which are samplable using limited computational resources . Chor et al. [9], Kamp and Zuckerman [16] Gabizon et al. [13] and Rao [24] studied ‘bit-fixing sources’ in which a subset of the bits is fixed and the rest of the bits are chosen randomly and independently ([24] actually studies the more general class of ‘low weight affine sources’). A negative result was given by Santha and Vazirani [27] that exhibit a very natural class of high min-entropy sources3 that does not have deterministic extractors. This led to the development of a different notion of extractors called ‘seeded extractors’. Such extractors are allowed to use a short seed of few truly random bits when extracting randomness from a source. (The notion of seeded extractors emerged from attempts to simulate probabilistic algorithms using weak random sources [36, 8, 10, 41, 42] and was explicitly defined by Nisan and Zuckerman [22].) Unlike deterministic extractors, seeded extractors can extract randomness from the most general class of sources: Arbitrary sources with high min-entropy. The reader is referred to [23, 20, 30, 33] for various surveys on seeded randomness extractors. Derandomization and Pseudorandomness Research in computational complexity has created much interest in explicitly constructing ‘pseudorandom objects’. Informally speaking, a pseudorandom object is an object(e.g. graph/function) that has a certain useful property that a random object would have with high probability. The precise meaning of ‘explicit’ can change according to the need of a desired application, and generally means computable given certain limited resources. For example, for a function D : {0, 1}n 7→ {0, 1} explicit could mean computable in poly(n) time. One could argue that there is inherent interest in understanding how to construct objects that ‘behave like random’, but such understanding is also intimately connected with progress in computational complexity: This is well known in the case of explicit constructions of functions with the ‘ultimate’ pseudorandom property - having high circuit complexity. A long line of research initiated by [31, 5, 39, 21] shows that such explicit constructions would imply the strongest derandomization results : BPP = P and AM = N P. Such results are a central goal of computational complexity theory. Furthermore, taking the meaning of ‘explicit’ to be ‘computable in N P’, explicitly constructing a function with superpolynomial circuit complexity implies P 6= N P. The celebrated result of Reingold [26] showing that SL = L relies on an explicit construction of a pseudorandom graph called an expander. And indeed, the object of interest in this paper is also a pseudorandom object: A random function D : Fq 7→ {0, 1} is with high probability an (n, k)-affine extractor, for example when k = O(log n) for any q ≥ 2. It might be hoped that understanding how to explicitly construct functions with a ‘simple’ pseudorandom property - ‘being balanced on every large enough affine subspace’ - will aid in the long run in explicitly constructing functions with high circuit complexity . Besides that, pseudorandom objects tend to find more immediate and local applications, most notably in derandomization of algorithms. For example, a construction from a previous paper on affine extractors 3

Min-entropy is a measure of the amount of randomness in the source. A distribution has min-entropy k if it gives no particular element probability greater than 2−k .

3

[12] turned out to be useful for progress on derandomization of polynomial identity testing of depth 3-circuits. (This connection was made by Karnin and Shpilka [17] and later implicitly used in [18, 28].)

1.2 Previous Work and Our Result Intuitively, constructing affine extractors gets harder as the underlying field size q gets smaller and easier as the dimension k of the subspace gets larger. Gabizon and Raz [12] construct affine extractors for q = Ω(n2 ) for any k ≥ 1. When q = 2, Bourgain [7] constructs affine extractors for k ≥ δn for any constant (and even slightly sub-constant) δ > 0 (see also the simplification and improvement by Yehudayoff [40]). Ben-Sasson and Kopparty [4] recently managed to break the ‘linear-entropy barrier’ for q = 2, and construct weaker objects called affine dispersers for k = 6 · n4/5 over F2 . It seems that the results of [4] can easily be adapted using Weil’s theorem (see Section 2) to give affine extractors for k, q = O(n4/5 ). Our main result may be viewed as a ‘field-size/dimension’ tradeoff. The larger the dimension of the subspace, the smaller field size we can work with. Theorem 1. Fix a field Fq of characteristic p and integers 2 ≤ k ≤ n where n ≥ 25. Let s = 6n + 2. Assume that p > s and q > 2 · s2 . There is an explicit (n, k)-affine extractor D : Fnq 7→ 5·(k−1) √ {0, 1} with error ² = s/ q. In particular, when p > (5n/k) and q ≥ 2 · (5n/k)2 the theorem holds and we get an extractor with √ error ² = O((n/k)/ q). One interesting instantiation of Theorem 1 is when k = δn for constant δ > 0. In this case, we get an affine extractor for a field of constant size q = Ω((1/δ)2 ). Again, this does not match the result of Bourgain[7]. For the range ω(1) < k < n/ log n no other result to our knowledge4 gives explicit affine extractors for field size q = Ω((n/k)2 ). However, even for ranges of parameters where we do not improve previous or match previous results, we believe our construction and proof have the advantage of being very simple. An annoying drawback is the requirement for large characteristic. Basically, this is to due to the fact that many multinomial coefficients become zero in fields of small characteristic. We prove a weaker result for general characteristic. The following is an informal statement. For a precise one see Theorem 9. Theorem 2. Let Fq be a field of characteristic p. There is an explicit (n, k)-affine extractor whenever q > pO(n/kp) . For example when p is constant and k = δn for constant δ > 0, we get an extractor for constant field size. Finally, we mention that very recently Bourgain has obtained (still unpublished) results similar to ours for prime fields using different methods. 4

√ It seems that a yet unpublished result of the second author gives smaller field size for k = o( n).

4

1.3 Organization of the paper In Section 2 we sketch the proofs of our theorems. In Section 3 we give necessary preliminaries. In Sections 4 and 5 we give our results for large characteristic. Section 6 gives our weaker results for general characteristic.

2

Overview of the Proof

A central component in our proof is a theorem of Weil[38, 29] on the number of points on curves over finite fields and, more specifically, its applications to character sums. We roughly state the corollary of Weil’s theorem that we will use (see Subsection 3.1 for a precise formulation): Let f (t1 , . . . , tk ) be a non-constant polynomial of degree d over Fq where both d and q are odd. Then, when choosing (t1 , . . . , tk ) uniformly at random, the probability that f (t1 , . . . , tk ) is a quadratic residue in Fq is close to 1/2 provided q is a bit larger than d2 . For simplicity, we forget about the requirement of d being odd for the rest of this discussion. Thus, Weil’s theorem reduces the task of constructing an affine extractor to that of constructing a low-degree polynomial f : Fnq 7→ Fq that is non-constant on any k-dimensional subspace: Once we have such a polynomial, we simply output 0 or 1 according to whether f (x1 , . . . , xn ) is a quadratic residue in Fq , and we are guaranteed that this is an almost unbiased bit. More specifically, if we manage to construct a polynomial of degree d that is non-constant on affine subspaces of dimension k, we get an (n, k)-affine P extractor for field size roughly d2 . Gabizon and Raz [12] used the polynomial f (x1 , . . . , xn ) = ni=1 xii . It is not hard to show that this polynomial will be non-constant on any 1-dimensional affine subspace. Thus, they get an (n, 1)-affine extractor for q = Ω(n2 ). In this paper we show how to construct a polynomial f of degree roughly n/k that is non-constant on any k-dimensional affine subspace. Our construction is n . Let T : Fnq 7→ Fq be a non-trivial Fq -linear function. as follows. Let d be an integer larger than k−1 Given a vector x ∈ Fnq , we think of x as an element in the field Fqn . Define f (x) , T (xd ) (It is easy to see that when thinking of f as a multivariate polynomial over Fq it has degree d). We want to show that f is non-constant when restricted to k-dimensional subspaces. Fix an affine subspace X ⊆ Fnq whose linear component has basis a1 , . . . , ak ∈ Fnq , and translation b ∈ Fnq . That is, an element of X is of the form a1 · t1 + . . . ak · tk + b for some t1 , . . . , tk ∈ Fq . Let f |X (t1 , . . . , tk ) , f (a1 · t1 + . . . + ak · tk + b) be the restriction of f to X. It can be seen that the coefficient of a degree d monomial ti11 · · · tikk in f |X , is a non-zero5 multiple of T (ai11 · · · aikk ). If we could show that the monomials of total degree d in a1 , . . . , ak span Fnq over Fq , it would follow that one of them must have a non-zero image under T , and therefore f |X is non-constant of degree d. This will indeed follow from a theorem of Heur, Leung and Xiang [14] about the dimension of ‘products of subspaces’. From [14] we will deduce that when a1 , . . . , ak are linearly independent, the monomials of total degree d in them span6 a subspace of dimension at least (k −1)·d+1, or span the whole space. The theorem of [14] is actually more general, and we will give a self-contained 5 6

This is actually only true for large enough characteristic. Subsection 2.1 gives more precise details on this point. Actually, this will be true when n is prime

5

proof of the specific result we need (see Subsection 3.2).

2.1

Working with arbitrary characteristic

We now explain the problem that arises in the sketch above for fields of small characteristic, and how to (partially) resolve it. Let f |X be as above. The coefficient of a degree d monomial ti11 · · · tikk in f |X is precisely d! · T (ai11 · · · aikk ) i1 ! · · · ik ! for some i1 + . . . + ik = d. When the characteristic p is smaller than d this coefficient could be zero even if T (ai11 · · · aikk ) 6= 0. Thus it is not enough any more to prove the degree d monomials in a1 , . . . , ak span Fnq over Fq . However, it turns out that we can take advantage of the small characterd! istic to prove that even the subset of monomials whose corresponding multinomial coefficient i1 !···i k! is non-zero ‘expand in dimension’. Then main property we use is that when a1 , . . . , ak are linearly independent so are ap1 , . . . , apk . Very roughly speaking, we will gain dimension only from powers of the form c · pl for c < p , rather than from every power, which is why our results for general characteristic are weaker. See Section 6 for details.

3

Preliminaries

Notation: Let f : Fnq 7→ Fq be a function. For an affine subspace X ⊆ Fnq defined by basis vectors a1 , . . . , ak ⊆ Fnq and translation vector b ∈ Fnq , we denote f restricted to X by f |X . That is, for t1 , . . . , tk ∈ Fq , f |X (t1 , . . . , tk ) , f (a1 · t1 + . . . + ak · tk + b). For a set Ω, we denote by UΩ the uniform distribution on Ω. For a function f : Ω 7→ Γ and a distribution P on Ω, we denote by f (P ) the distribution induced on Γ by sampling from P and applying f . We keep in mind a fixed Fq -vector space isomorphism of Fnq with the field Fqn . Using this, we often implictly identify vectors in Fnq with the corresponding elements in Fqn and use multiplication in this field.

3.1 Characters of Finite Fields and Weil’s Theorem Loosely speaking, given an abelian group G, a character on G is a map from G to complex roots of unity that preserves the group action. The characters of a finite field are the characters of the additive and multiplicative7 groups of the field. We will mostly use multiplicative characters. Definition 2 (Multiplicative character). A function χ : Fq → C is a multiplicative character of Fq if |χ(a)| = 1 for every a ∈ F∗q and χ(0) = 0 and χ(ab) = χ(a)χ(b) for every a, b ∈ Fq . The order of χ is the smallest integer m such that (χ(a))m = 1 for every a ∈ F∗q . 7

A character χ of F∗q is extended to 0 by χ(0) = 0.

6

For our extractor we will use the ‘quadratic residue’ character (that exists whenever the field has odd characteristic). Definition 3 (Quadratic residue character). Let q = pl for some integer l and odd prime p. We define the multiplicative character χ1 : Fq → {−1, 0, 1} to be 1 for a non-zero quadratic residue, −1 for a quadratic non-residue, and 0 on 0. More concisely, χ1 (a) = a

q−1 2

.

We define the function QR : Fq → {0, 1} by QR(a) = 1 if χ1 (a) = −1, and QR(a) = 0 otherwise. That is, QR(a) = 1 for quadratic non-residues and 0 otherwise. Very useful theorems of Weil [38] state that for any low degree polynomial f that is not of a certain restricted form, the values of a field character ‘cancel out’ over the range of f (when viewed as a multi-set). We state this theorem for multiplicative characters. Theorem 3. [29][Theorem 2C 0 , page 43] Let χ be a multiplicative character of Fq of order m > 1. Let f (t) be a non-constant polynomial in Fq [t] of degree d. Suppose that f (t) is not of the form c · g(t)m for any c ∈ Fq and g(t) ∈ Fq [t]. Then ¯ ¯ ¯ ¯ ¯X ¯ ¯ ¯ ≤ d · q 1/2 . χ(f (t)) ¯ ¯ ¯t∈Fq ¯ For the case of a field character of order 2, Weil’s theorem actually shows that the character is an extractor for distributions of the form f (UFq ) for a low odd degree polynomial f . We formalize this in the following Corollary. Corollary 4. Let q = pl for some integer l and odd prime p. Let f (t) ∈ Fq [t] be a non-constant polynomial of odd degree m. Then QR(f (UFq )) is ²-close to uniform for ² = √dq . Proof. We include the proof for completeness although it is straightforward and identical to the one in [12]. We have   X X X 1 χ1 (f (t)) =  1− t∈Fq

· =q· · =q·

t∈Fq ,χ1 (f (t))=1

t∈Fq ,χ1 (f (t))=−1

¸ Pr (χ1 (f (t)) = 1) − Pr (χ1 (f (t)) = −1)

t←Uq

t←Uq

¸

Pr (QR(f (t)) = 0) − Pr (f (t) = 0) − Pr (QR(f (t)) = 1)

t←Uq

t←Uq

·

t←Uq

¸ = q · 2 · Pr (QR(f (t)) = 0) − 1 − q · Pr (f (t) = 0) t←Uq

·

t←Uq

¸ = 2q· Pr (QR(f (t)) = 0) − 1/2 −q· Pr (f (t) = 0) = 2q·|QR(f (Uq ))−U1 |−q· Pr (f (t) = 0) t←Uq

t←Uq

t←Uq

7

, where in the last equality we assumed without loss of generality that Pr (QR(f (t)) = 0) ≥ 1/2.

t←Uq

Since χ1 is of order 2 and f (t) is not of the form c · g(t)2 for any c ∈ Fq and g(t) ∈ Fq [t] (as f has odd degree), using Theorem 3 we have |QR(f (Uq )) − U1 | =

1 X · χ1 (f (t)) + (1/2) · Pr (f (t) = 0) t←Uq 2q t∈F q



m m m m 1 · mq 1/2 + ≤ √ + √ =√ . 2q 2q 2 q 2 q q

A similar statement can now be shown for multivariate low degree polynomials. Lemma 3.1. Let q = pl for some integer l and odd prime p. Let f (t1 , . . . , tk ) ∈ Fq [t1 , . . . , tk ] be a non-constant polynomial of total degree d for odd d < q. Then QR(f (UFkq )) is ²-close to uniform for ² = √dq . Proof. We note first that there must be an a = (a1 , . . . , ak ) ∈ Fkq such that the univariate ‘line restriction’ polynomial fa (t) , f (a · t) = f (a1 · t, . . . , ak · t) has degree exactly d: The coefficient of td in fa is f d (a) where f d is the d-homogeneous part of f , i.e., the sum of monomials of degree exactly d in f . By the Schwartz-Zippel lemma as d < q, there is an a ∈ Fkq such that f d (a) 6= 0 and therefore fa (t) has degree d. Furthermore, for such a ∈ Fkq , for all b = (b1 , . . . , bk ) ∈ Fkq , fa,b (t) , f (a · t + b) = f (a1 · t + b1 , . . . , ak · t + bk ) has degree exactly d - as the coefficient of td in fa,b is the same as the coefficient of td in fa . As the distribution f (UFkq ) is a convex combination of the distributions fa,b (UFq ) for the different ‘shifts’ b ∈ Fkq , the claim now follows from Corollary 4. (Note that in order to use Corollary 4 it was crucial that all the polynomials fa,b have odd degree and that is why we wanted them to have degree exactly rather than at most d).

3.2 Dimension Expansion of Products of Subspaces Let A, B ⊆ Fnq be Fq -linear subspaces. We define the ‘product subspace’ A · B , span(a · b|a ∈ A, b ∈ B), where the multiplication a · b is carried out in the field Fqn . Similarly, for an element a ∈ Fnq and linear subspace B ⊆ Fnq we denote by a · B the set {a · b|b ∈ B} (which is also a linear subspace of the same dimension as multiplication by a is a non-singular Fq -linear transformation). We observe that if a1 , . . . , al and b1 , . . . , bk are bases for A and B respectively, then 8

A · B = span(ai · bj |1 ≤ i ≤ l, 1 ≤ j ≤ k), i.e., ‘it is enough to take products of basis elements’. The following theorem of Hou, Leung and Xiang[14] generalizes a famous Theorem of Kneser (see [14] for background). It gives a lower bound on the dimension of a product of subspaces. We state the theorem for completeness but will only use the corollary below. Theorem 5 ([14] Theorem 2.4). Let E ⊂ K be fields and let A and B be finite-dimensional E-linear subspaces of positive dimension. Suppose that every algebraic element in K is separable over E. Then dimE (A · B) ≥ dimE (A) + dimE (B) − dimE (H(A · B)) where H(A · B) = {x ∈ K|x · A · B ⊆ A · B} is the stabilizer of A · B in K. Corollary 6. Let Fq be any field, and let n be prime. Let A and B be Fq -linear subspaces of Fnq having positive dimension. Then dim(A · B) ≥ min{n, dim(A) + dim(B) − 1} We give a self-contained proof of the corollary. Proof. We proceed by induction on dim(A). As a base, observe that the result holds trivially when dim(A) = 1. For the inductive step, we may then assume that dim(A) > 1. We may also assume that B 6= Fnq as the theorem is immediate in this case. Note that we may freely replace A by g · A (or B by g · B) for some g ∈ Fnq as this has no effect on dim(A) (dim(B)) or dim(A · B). By this operation, we may assume that 1 ∈ A ∩ B. Since dim(A) > 1, we may choose a ∈ A \ Fq . Let ` be the smallest nonnegative integer so that a` 6∈ B (this must exist since Fnq = span(1, a, a2 , . . . , an−1 ) for any a ∈ Fnq \ Fq when n is prime, and B 6= Fnq ) and note that ` > 0 by the assumption that 1 ∈ B. Next, replace B by the set a−(`−1) · B. It now follows that 1 ∈ B and a 6∈ B, so A ∩ B is a proper nonempty subset of A. Consider the Fq -linear subspaces A ∩ B and A + B and observe that (A ∩ B) · (A + B) ⊆ A · B. The next equation follows from this and the induction hypothesis applied to A ∩ B and A + B. dim(A · B) ≥ dim((A ∩ B) · (A + B)) ≥ min{n, dim(A ∩ B) + dim(A + B) − 1} = min{n, dim(A) + dim(B) − 1}. This completes the proof. Remark 3.2. We note that • The above proof is an analogue of the proof of the Cauchy-Davenport theorem, stating that for subsets A, B ⊆ Zp , |A + B| ≥ min{p, |A| + |B| − 1}. • Corollary 6 is not true when n is not prime. This can be seen by taking A = B = Fqm to be a proper subfield Fq ( Fqm ( Fqn . 9

4

The Main Construction

Theorem 7. Fix a field Fq of characteristic p and integers 2 ≤ k ≤ n such that n is prime. Fix n any integer d with k−1 ≤ d < p. Let T : Fnq 7→ Fq be a non-trivial Fq -linear mapping. Then the polynomial f : Fnq 7→ Fq defined by f (x) = T (xd ) is non-constant on all affine subspaces of dimension k. Furthermore, for any k-dimensional affine subspace X, f |X has total degree exactly d. Proof. Fix any k-dimensional affine subspace X. Then f |X (t1 , . . . , tk ) = T ((a1 · t1 + . . . + ak · tk + b)d ). Fix non-negative integers i1 , . . . , ik with i1 + . . . + ik = d. Note that the coefficient of ti11 · · · tikk in f |X is µ ¶ d! d! ik i1 T · a1 · · · ak = · T (ai11 · · · aikk ), i1 ! · · · ik ! i1 ! · · · ik ! where the equality follows as T is Fq -linear. We would like to prove that one of these coefficients is non-zero. As p > d, the above coefficient is non-zero if and only if T (ai11 · · · aikk ) 6= 0. We will prove that the set of monomials in the ai ’s of total degree d span Fnq over Fq . Thus, one of these monomials must be mapped by T to a non-zero value in Fq , and therefore f |X is non-constant of total degree d. For this purpose, for 1 ≤ j ≤ d define Aj ⊆ Fnq to be the subspace spanned by the set of monomials in the ai ’s of total degree exactly j. That is Aj , span(ai11 · · · aikk |i1 + . . . + ik = j). We will prove by induction that dim(Aj ) ≥ min{n, (k − 1) · j + 1} (from which the theorem will follow): For j = 1, A1 = span(a1 , . . . , ak ) and as the ai ’s are linearly independent the claim follows. Now assume the claim for j − 1. Note that Aj = Aj−1 · A1 . Thus, using Corollary 6, dim(Aj ) ≥ min{n, (k − 1) · (j − 1) + 1 + k − 1} = min{n, (k − 1) · j + 1}.

Remark 4.1. After writing the paper it was pointed to us that the dimension argument in the above proof could be deduced directly from Theorem 4.1 of [14] (who were also interested in ‘the dimension of powers of subspaces’). However, for the sake of simplicity and being self-contained we kept the proof as is.

10

5

Affine Extractors for Large Characteristic

We restate and prove our main theorem. Theorem 1. Fix a field Fq of characteristic p and integers 2 ≤ k ≤ n where n ≥ 25. Let 6n s = 5·(k−1) + 2. Assume that p > s and q ≥ 2 · s2 . There is an explicit (n, k)-affine extractor √ D : Fnq 7→ {0, 1} with error ² = s/ q. Proof. Choose a prime n ≤ n0 ≤ (6/5) · n (which always exists for n ≥ 25 according to Nagura’s improvement of the Bertrand-Chebychev Theorem [19]) and pad x ∈ Fnq with zeros to get a vector 0 0 in Fnq . Let f : Fnq 7→ Fq be the polynomial in Theorem 7 where we take d to be the smallest odd n0 integer that is at least k−1 . Let D : Fnq 7→ {0, 1} be defined as D(x) , QR(f (x)). From Theorem 0 7 we know that for any k-dimensional affine subspace X ⊆ Fnq , f |X is non-constant of degree exactly d. Therefore, for any such X from Lemma 3.1 we know that D(X) is ²-close to uniform for √ √ ² = (d/ q) ≤ (s/ q) and the theorem follows. Remark 5.1. Using the methods of Gabizon and Raz [12] we could extend our extractor to extract (1 − δ) · log q bits for any constant δ > 0 at the expense of requiring a field of size q ≥ (n/k)O(1/δ) .

6

Working with Arbitrary Characteristic

Our results in the previous sections required a field of characteristic at least roughly n/k. In this section we present weaker results for fields of arbitrarily small characteristic. Throughout this section p will denote the characteristic of the field Fq . The following will be very useful. Claim 6.1. Let a1 , . . . , ak ∈ Fnq be linearly independent vectors over Fq . Then for any integer l ≥ 0, l

l

ap1 , . . . , apk are linearly independent over Fq (where powering is done in the field Fqn ). Proof. Assume for contradiction that for some c1 , . . . , ck ∈ Fq , not all zero,

0=

k X

pl

cj · a j =

à k X

j=1

Pk

pl j=1 cj · aj

= 0. Then,

!pl 1/pl

cj

· aj

,

j=1

where we used the fact that raising to the power pl is one-to-one over Fq , so there is always a pl ’th P 1/pl root. Therefore kj=1 cj · aj = 0, a contradiction. The following definition will be used to characterize when a multinomial coefficient is non-zero mod p.

11

Definition 4. Let d = ps − 1 = (p − 1) · (1 + p + . . . + ps−1 ) for some positive integer s. Let i1 , . . . , ik be non-negative integers such that i1 + . . . + ik = d. For 1 ≤ j ≤ k, write ij in base p, i.e., ij = ij,0 + ij,1 · p + . . . + ij,s−1 · ps−1 , where 0 ≤ ij,l ≤ p − 1. We say that i1 , . . . , ik p-cover d if for every 0 ≤ l ≤ s − 1, k X ij, l = p − 1. j=1

The following claim is a very special case of Lucas’s Theorem ?? and can be verified easily. Claim 6.2. Let d¡ = ps¢ − 1 for some positive integer s. Let i1 , . . . , ik be non-negative integers that d d! is non-zero mod p. p-cover d. Then i1 ...i = i1 !···i k! k We show that the set of monomials corresponding to p-covering sequences expand in dimension. Lemma 6.1. Let a1 , . . . , ak ∈ Fnq be linearly independent. For l ≥ 1 denote Al , span(ai11 · · · aikk | i1 , . . . , ik p-cover pl − 1). Then dim(Al ) ≥ min{n, l · (p − 1) · (k − 1)}. Proof. We prove the claim by induction on l. For l = 1, note that A1 is simply the span of monomials in a1 , . . . , ak of total degree p − 1. As the aj ’s are independent, using Corollary 6 as in the proof of Theorem 7, we get that dim(A1 ) ≥ min{n, (k − 1) · (p − 1) + 1}. Assume the claim for l − 1. Note that Al = Al−1 · B where l−1

B , span(a1c1 ·p

· · · ackk ·p

l−1

l−1

| c1 + . . . + ck = p − 1). l−1

l−1

l−1

Note that B is the span of monomials in ap1 , . . . , apk of total degree p − 1 . As a1p , . . . , apk are linearly independent (by Claim 6.1), dim(B) ≥ min{n, (k − 1) · (p − 1) + 1}. Therefore using Corollary 6, dim(Al ) ≥ min{n, (l − 1) · (p − 1) · (k − 1) + (p − 1) · (k − 1) + 1 − 1} = min{n, l · (p − 1) · (k − 1)}.

We now prove an analogue of Theorem 7. To construct extractors for both even and odd-sized fields, we need to state the theorem about two very similar polynomials. n Theorem 8. Fix integers 2 ≤ k ≤ n such that n is prime. Let s = d (p−1)·(k−1) e, and let d = ps − 1 and d0 = 2 · ps − 1. Let T : Fnq 7→ Fq be a non-trivial Fq -linear mapping. Then, • The polynomial f : Fnq 7→ Fq defined by f (x) = T (xd ) is non-constant on all affine subspaces of dimension k. Furthermore, for any k-dimensional affine subspace X, f |X has total degree exactly d. 0

• The polynomial f 0 : Fnq 7→ Fq defined by f 0 (x) = T (xd ) is non-constant on all affine subspaces of dimension k. Furthermore, for any k-dimensional affine subspace X, f 0 |X has total degree exactly d0 . 12

Proof. Fix any k-dimensional affine subspace X. Then, f |X (t1 , . . . , tk ) = T ((a1 · t1 + . . . + ak · tk + b)d ). Fix i1 , . . . , ik with i1 + . . . + ik = d. Note that the coefficient of ti11 · · · tikk in f |X is µ ¶ d! d! ik i1 T · a1 · · · ak = · T (ai11 · · · aikk ). i1 ! · · · ik ! i1 ! · · · ik ! We would like to prove that one of these coefficients is non-zero. By Claim 6.2, when i1 , . . . , ik p-cover d the above coefficient is non-zero if and only if T (ai11 · · · aikk ) 6= 0. By Lemma 6.1, the monomials of the form ai11 · · · aikk where i1 , . . . , ik p-cover d span a subspace of dimension at least min{n, s · (p − 1)(k − 1)} = n, and thus span all of Fnq . Therefore, one of the monomials ti11 · · · tikk of total degree d will have a non-zero coefficient in f |X . For the statement about f 0 , note that 0

f 0 |X (t1 , . . . , tk ) = T ((a1 · t1 + . . . + ak · tk + b)d ) s

= T ((a1 · t1 + . . . + ak · tk + b)d · (a1 · t1 + . . . ak · tk + b)p ) s

s

s

s

s

= T ((a1 · t1 + . . . + ak · tk + b)d · (ap1 · tp1 + . . . apk · tpk + bp )). In particular, we can see that for any i1 , . . . , ik that p-cover d the coefficient of the degree d0 monops ik i1 mial t1 · · · tk · t1 is s d! · T (ai11 · · · aikk · ap1 ), i1 ! · · · ik ! s

which is non-zero if and only if T (ai11 · · · aikk · ap1 ) 6= 0. As multiplying a set of monomials by the s fixed element ap1 cannot reduce the dimension of their span, f 0 |X must have a monomial of degree d0 with non-zero coefficient.

To construct an extractor for all field sizes we need a version of Weil’s theorem regarding additive characters of fields of even size (which are simply linear mappings from the field to F2 ). The following Lemma follows from Theorem 2E in [29] (see also [12] for a statement) in the same way Lemma 3.1 followed from Theorem 3 and Corollary 4. Lemma 6.2. Let q = 2l for some integer l. Let f (t1 , . . . , tk ) ∈ Fq [t1 , . . . , tk ] be a non-constant polynomial of total degree d for odd d < q. Let T r : Fq 7→ F2 be a non-trivial F2 -linear mapping. Then T r(f (UFkq )) is ²-close to uniform for ² = √dq . Finally, we prove our main theorem for arbitrary characteristic.

13

Theorem 9. Fix a field Fq of characteristic p and integers 2 ≤ k ≤ n where n ≥ 25. Let8 11n t = 2 · p k·p . Assume that q ≥ 2 · t2 . There is an explicit (n, k)-affine extractor D : Fnq 7→ {0, 1} with √ error ² = t/ q. Proof. Choose a prime n ≤ n0 ≤ (6/5) · n (which always exists for n ≥ 25 according to [19]) and 0 0 pad x ∈ Fnq with zeros to get a vector in Fnq . Let f, f 0 : Fnq 7→ Fq be the polynomials in Theorem 8 0 . From Theorem 8 we know that for any k-dimensional affine subspace X ⊆ Fnq , f |X and f 0 |X are non-constant of degree at most9 n0

11n

2 · pd (p−1)·(k−1) e − 1 ≤ 2 · p p·k = t. Furthermore, when q (and therefore p) is even f |X has odd degree, and when q is odd f 0 |X has odd degree. When q is even define D(x) , T r(f (x)), for some non-trivial F2 -linear mapping T r : Fq 7→ F2 . When q is odd define D(x) , QR(f 0 (x)). It now follows from Lemma 6.2 and Lemma 3.1 that √ D(X) is ²-close to uniform for ² = (t/ q). Remark 6.3. In the case of characteristic 2 our extractor has a particularly simple presentation: It is simply of the form D(x) = T (xd ) for any non-trivial F2 -linear transformation Fnq 7→ F2 .

Acknowledgements We thank Zeev Dvir and the anonymous referees for valuable corrections and comments. We thank Luis Goddyn for a very helpful conversation.

References [1] B. Barak, R. Impagliazzo, and A. Wigderson. Extracting randomness from few independent sources. In Proceedings of the 45th Annual IEEE Symposium on Foundations of Computer Science, 2004. [2] B. Barak, G. Kindler, R. Shaltiel, B. Sudakov, and A. Wigderson. Simulating independence: New consturctions of condenesers, ramsey graphs, dispersers, and extractors. In Submitted, 2004. [3] B. Barak, A. Rao, R. Shaltiel, and A. Wigderson. 2-source dispersers for sub-polynomial entropy and ramsey graphs beating the frankl-wilson construction. In Proceedings of the 38th Annual ACM Symposium on Theory of Computing, 2006. 8 9

The constant 11 in the exponent could have been made close to 1 with a few restrictions on k and p. The inequality below requires p ≤ 1.2·n k−1 + 2. When this is not the case we can apply Theorem 1.

14

[4] E. Ben-Sasson and S. Kopparty. Affine dispersers from subspace polynomials. In Proceedings of the 41st Annual ACM Symposium on Theory of Computing, pages 65–74, 2009. [5] M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudo-random bits. SIAM Journal on Computing, 13(4):850–864, November 1984. [6] Manuel Blum. Independent unbiased coin flips from a correlated biased source: a finite state Markov chain. In Proceedings of the 25th Annual IEEE Symposium on Foundations of Computer Science, pages 425–433, 1984. [7] J. Bourgain. On the construction of affine extractors. Geometric & Functional Analysis, 17 Number 1:33–57, 2007. [8] B. Chor and O. Goldreich. Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM Journal on Computing, 17(2):230–261, April 1988. Special issue on cryptography. [9] B. Chor, O. Goldreich, J. Hastad, J. Friedman, S. Rudich, and R. Smolensky. The bit extraction problem or t-resilient functions. In Proceedings of the 26th Annual IEEE Symposium on Foundations of Computer Science, 1985. [10] A. Cohen and A. Wigderson. Dispersers, deterministic amplification, and weak random sources. In Proceedings of the 30th Annual IEEE Symposium on Foundations of Computer Science, 1989. [11] Y. Dodis, A. Elbaz, R. Oliveira, and R. Raz. Improved randomness extraction from two independent sources. In RANDOM: International Workshop on Randomization and Approximation Techniques in Computer Science. LNCS, 2004. [12] A. Gabizon and R. Raz. Deterministic extractors for affine sources over large fields. In Proceedings of the 45th Annual IEEE Symposium on Foundations of Computer Science, pages 407–418. IEEE Computer Society, 2005. [13] A. Gabizon, R. Raz, and R. Shaltiel. Determinsitic extractors for bit-fixing sources by obtaining an independent seed. In FOCS 2004, 2004. [14] X. Hour, K.H. Leung, and Q. Xiang. A generalization of an addition theorem of kneser. Journal of Number Theory, 97:1–9, 2002. [15] J. Kamp, A. Rao, S. Vadhan, and D. Zuckerman. Deterministic extractors for small-space sources. In STOC: ACM Symposium on Theory of Computing (STOC), 2006. [16] J. Kamp and D. Zuckerman. Deterministic extractors for bit-fixing sources and exposureresilient cryptography. In Proceedings of the 44th Annual IEEE Symposium on Foundations of Computer Science, 2003.

15

[17] Z. Karnin and A. Shpilka. Black box polynomial identity testing of generalized depth-3 arithmetic circuits with bounded top fan-in. In IEEE Conference on Computational Complexity, pages 280–291. IEEE Computer Society, 2008. [18] N. Kayal and S. Saraf. Blackbox polynomial identity testing for depth 3 circuits. In FOCS, pages 198–207. IEEE Computer Society, 2009. [19] J. Nagura. On the interval containing at least one prime number. Proceedings of the Japan Academy, 28:177–181, 1952. [20] N. Nisan and A. Ta-Shma. Extracting randomness: A survey and new constructions. Journal of Computer and System Sciences, 58, 1999. [21] N. Nisan and A. Wigderson. Hardness vs randomness. Journal of Computer and System Sciences, 49(2):149–167, October 1994. [22] N. Nisan and D. Zuckerman. Randomness is linear in space. Journal of Computer and System Sciences, 52(1):43–52, 1996. [23] Noam Nisan. Extracting randomness: How and why: A survey. In Proceedings of the 11th Annual IEEE Conference on Computational Complexity, pages 44–58, 1996. [24] Anup Rao. Extractors for low-weight affine sources. In IEEE Conference on Computational Complexity, pages 95–101. IEEE Computer Society, 2009. [25] R. Raz. Extractors with weak random seeds. In Proceedings of the 37th Annual ACM Symposium on Theory of Computing, 2005. [26] O. Reingold. Undirected st-connectivity in log-space. In STOC, pages 376–385, 2005. [27] M. Santha and U. V. Vazirani. Generating quasi-random sequences from semi-random sources. Journal of Computer and System Sciences, 33:75–87, 1986. [28] N. Saxena and C. Seshadhri. From sylvester-gallai configurations to rank bounds: Improved black-box identity test for depth-3 circuits. CoRR, abs/1002.0145, 2010. informal publication. [29] W. M. Schmidt. Equations over Finite Fields: An Elementary Approach, volume 536. SpringerVerlag, Lecture Notes in Mathematics, 1976. [30] R. Shaltiel. Recent developments in explicit constructions of extractors. Bulletin of the EATCS, 77:67–95, 2002. [31] A. Shamir. On the generation of cryptographically strong pseudorandom sequences. ACM Trans. on Computer Sys., 1(1):38, February 1983. [32] L. Trevisan and S. Vadhan. Extracting randomness from samplable distributions. In Proceedings of the 41st Annual IEEE Symposium on Foundations of Computer Science, 2000. 16

[33] S. Vadhan. Randomness extractors and their many guises. In Proceedings of the 43rd Annual IEEE Symposium on Foundations of Computer Science, pages 9–12, 2002. [34] U. Vazirani. Efficient considerations in using semi-random sources. In Proceedings of the 19th Annual ACM Symposium on the Theory of Computing, 1987. [35] U. Vazirani. Strong communication complexity or generating quasi-random sequences from two communicating semi-random sources. Combinatorica, 7:375–392, 1987. [36] U. Vazirani and V. Vazirani. Random polynomial time is equal to semi-random polynomial time. Technical Report TR88-959, Cornell University, Computer Science Department, December 1988. [37] John von Neumann. Various techniques used in connection with random digits. Applied Math Series, 12:36–38, 1951. [38] A. Weil. On some exponential sums. In Proc. Nat. Acad. Sci. USA, volume 34, pages 204–207, 1948. [39] Andrew C. Yao. Theory and applications of trapdoor functions (extended abstract). In 23rd Annual Symposium on Foundations of Computer Science, pages 80–91, Chicago, Illinois, 3–5 November 1982. IEEE. [40] A. Yehudayoff. Affine extractors over prime fields. Manuscript, 2009. [41] D. Zuckerman. General weak random sources. In Proceedings of the 31st Annual IEEE Symposium on Foundations of Computer Science, pages 534–543, 1990. [42] D. Zuckerman. Simulating BPP using a general weak random source. 16(4/5):367–391, October/November 1996.

17

Algorithmica,

Simple Affine Extractors using Dimension Expansion - Semantic Scholar

Mar 25, 2010 - †Department of Computer Science, Colubmia University. Part of this research was done when the author was at. Department of Computing Science, Simon Fraser University. ...... metic circuits with bounded top fan-in. In IEEE ...

239KB Sizes 0 Downloads 300 Views

Recommend Documents

Simple Affine Extractors using Dimension Expansion
Aug 9, 2011 - †Department of Computer Science, Colubmia University. ..... degree roughly n/k that is non-constant on any k-dimensional affine subspace.

Versatile microrobotics using simple modular ... - Semantic Scholar
Jul 28, 2016 - In addition, the model determines how far off-center the approach can be: the range of allowable ... which we call Δx. We varied the frequency of rotation in our model to investigate the ..... ACS Nano 4, 1799–1804. (2010). 32.

Versatile microrobotics using simple modular ... - Semantic Scholar
Jul 28, 2016 - by allowing a single system to navigate diverse environments and perform ... and requests for materials should be addressed to H.C.F. (email: Henry. ..... Automatic navigation of an untethered device in the artery of a living ...

Learnability and the Doubling Dimension - Semantic Scholar
sample complexity of PAC learning in terms of the doubling dimension of this metric. .... that correctly classifies all of the training data whenever it is possible to do so. 2.2 Metrics. Suppose ..... Journal of Machine Learning Research,. 4:759–7

using rapd markers - Semantic Scholar
based on this, cluster analysis was done using minimum variance algorithm. Cluster analysis showed two major groups. Each sub-group was characterized ...

using rapd markers - Semantic Scholar
RAPD data were used to calculate a Squared Euclidean Distance matrix, and based on this, cluster ... Africa, South-East, Asia, U.S.A, Brazil, Australia and. Turkey. In some ... homogenate was cooled to room temperature and extracted with 5 ...

Simple Competitive Internet Pricing - Semantic Scholar
Dec 2, 1999 - an unlimited demand for networking service” (JISC Circular 3/98, ... Odlyzko (1997) has proposed to apply the same scheme to the Internet.

Simple Competitive Internet Pricing - Semantic Scholar
Dec 2, 1999 - the number of users, and the amount of traffic have been doubling approximately every ... minute Internet telephone call uses 500 times the capacity of a comparable paragraph of e-mail; one ..... Business, 72(2), 215–28. Odlyzko, A.,

Deterministic Extractors for Affine Sources over Large ...
May 16, 2007 - We denote by Fq the finite field of q elements. We denote by Fq the algebraic closure of Fq and by Fq[t] the ring of formal polynomials over Fq. We denote by F ...... Tools from higher algebra. In R. L. Graham & M. Grotschel & L. Lovas

Using lexico-semantic information for query expansion ...
Using lexico-semantic information for query expansion in passage retrieval for question answering. Lonneke van der Plas. LATL ... Information retrieval (IR) is used in most QA sys- tems to filter out relevant passages from large doc- ..... hoofdstad

Using lexico-semantic information for query expansion ...
retrieval engine using Apache Lucene (Jakarta,. 2004). Documents have been .... method (1.2K vs 1.4K, as can be seen in 1). The proximity-based method ...

Using lexico-semantic information for query expansion ...
back loop that feeds lexico-semantic alternations .... in the top-k passages returned by the system. The ..... http://lucene.apache.org/java/docs/index.html. Kaisser ...

Customized Cognitive State Recognition Using ... - Semantic Scholar
training examples that allow the algorithms to be tailored for each user. We propose a ..... to the user-specific training example database. The TL module is used ...

Quantifying Organismal Complexity using a ... - Semantic Scholar
Feb 14, 2007 - stomatitis virus, and to illustrate the consistency of our approach and its applicability. Conclusions/Significance. Because. Darwinian evolution ...

Lightpath Protection using Genetic Algorithm ... - Semantic Scholar
connectivity between two nodes in the network following a failure by mapping ... applications and high speed computer networks because of huge bandwidth of ...

Acoustic Modeling Using Exponential Families - Semantic Scholar
For general exponential models, there is no analytic solution for maximizing L(θ) and we use gradient based numerical op- timization methods. This requires us ...

Efficient parallel inversion using the ... - Semantic Scholar
Nov 1, 2006 - Centre for Advanced Data Inference, Research School of Earth Sciences, Australian National University, Canberra, ACT. 0200 ... in other ensemble-based inversion or global optimization algorithms. ... based, which means that they involve

Customer Targeting Models Using Actively ... - Semantic Scholar
Aug 27, 2008 - porate software offerings like Rational, to high-end services in IT and business ... propensity for companies that do not have a prior re- lationship with .... approach is Naıve Bayes using a multinomial text model[10]. We also ran ..

Nonrigid Image Deformation Using Moving ... - Semantic Scholar
500×500). We compare our method to a state-of-the-art method which is modeled by rigid ... Schematic illustration of image deformation. Left: the original image.

Learning from weak representations using ... - Semantic Scholar
how to define a good optimization argument, and the problem, like clustering, is an ... function space F · G. This search is often intractable, leading to high .... Linear projections- Learning a linear projection A is equivalent to learning a low r

Scalable Video Summarization Using Skeleton ... - Semantic Scholar
the Internet. .... discrete Laplacian matrix in this connection is defined as: Lij = ⎧. ⎨. ⎩ di .... video stream Space Work 5 at a scale of 5 and a speed up factor of 5 ...

Query Rewriting using Monolingual Statistical ... - Semantic Scholar
expansion terms are extracted and added as alternative terms to the query, leaving the ranking function ... sources of the translation model and the language model to expand query terms in context. ..... dominion power va. - dominion - virginia.