On recycling the randomness of states in space bounded computation

被引:0
|
作者
Weizmann Inst, Rehovot, Israel [1 ]
机构
关键词
Computational complexity - Probability distributions - Random processes - State space methods - Theorem proving;
D O I
暂无
中图分类号
学科分类号
摘要
Let M be a logarithmic space Turing machine (or a polynomial width branching program) that uses up to k≈2√log n (read once) random bits. For a fixed input, let Pi(S) be the probability (over the random string) that at time i the machine M is in state S, and assume that some weak estimation of the probabilities Pi(S) is known or given or can be easily computed. We construct a logarithmic space pseudo-random generator that uses only logarithmic number of truly random bits and outputs a sequence of k bits that looks random to M. This means that a very weak estimation of the state probabilities of M is sufficient for a full derandomization of M and for constructing pseudo-random sequences for M. We have several applications of the main theorem, as stated within. To prove our theorem, we introduce the idea of recycling the state S of the machine M at time i as part of the random string for the same machine at later time. That is, we use the entropy of the random variable S in order to save truly random bits later on. Our techniques and results can both be generalized to larger size of space.
引用
收藏
相关论文
共 50 条
  • [21] On the Power of Correlated Randomness in Secure Computation
    Ishai, Yuval
    Kushilevitz, Eyal
    Meldgaard, Sigurd
    Orlandi, Claudio
    Paskin-Cherniavsky, Anat
    THEORY OF CRYPTOGRAPHY (TCC 2013), 2013, 7785 : 600 - 620
  • [22] Resource bounded randomness and weakly complete problems
    AmbosSpies, K
    Terwijn, SA
    Zheng, XZ
    THEORETICAL COMPUTER SCIENCE, 1997, 172 (1-2) : 195 - 207
  • [23] Bounded incremental computation
    Lect Notes Comput Sci,
  • [24] EFFICIENT SIMULATIONS OF SIMPLE-MODELS OF PARALLEL COMPUTATION BY TIME-BOUNDED ATMS AND SPACE-BOUNDED TMS
    CHANG, JH
    IBARRA, OH
    PALIS, MA
    THEORETICAL COMPUTER SCIENCE, 1989, 68 (01) : 19 - 36
  • [25] EFFICIENT SIMULATIONS OF SIMPLE-MODELS OF PARALLEL COMPUTATION BY TIME-BOUNDED ATMS AND SPACE-BOUNDED TMS
    CHANG, JH
    IBARRA, OH
    PALIS, MA
    LECTURE NOTES IN COMPUTER SCIENCE, 1988, 317 : 119 - 132
  • [26] HARDNESS-RANDOMNESS TRADEOFFS FOR ALGEBRAIC COMPUTATION
    Arvind, V.
    Kumar, Mrinal
    Saptharishi, Ramprasad
    BULLETIN OF THE EUROPEAN ASSOCIATION FOR THEORETICAL COMPUTER SCIENCE, 2019, (129): : 55 - 87
  • [27] A randomness-rounds tradeoff in private computation
    Kushilevitz, E
    Rosen, A
    SIAM JOURNAL ON DISCRETE MATHEMATICS, 1998, 11 (01) : 61 - 80
  • [28] Communication and Randomness Lower Bounds for Secure Computation
    Data, Deepesh
    Prabhakaran, Vinod M.
    Prabhakaran, Manoj M.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2016, 62 (07) : 3901 - 3929
  • [29] Secure Computation from Leaky Correlated Randomness
    Gupta, Divya
    Ishai, Yuval
    Maji, Hemanta K.
    Sahai, Amit
    ADVANCES IN CRYPTOLOGY, PT II, 2015, 9216 : 701 - 720
  • [30] Certified Randomness in Tight Space
    Fyrillas, Andreas
    Bourdoncle, Boris
    Mainos, Alexandre
    Start, Kayleigh
    Margaria, Nico
    Morassi, Martina
    Lemaitre, Aristide
    Sagnes, Isabelle
    Stepanov, Petr
    Au, Thi Huong
    Somaschi, Niccolo
    Maring, Nicolas
    Belabas, Nadia
    Mansfield, Shane
    PRX QUANTUM, 2024, 5 (02):