skip to main content
10.1145/301250.301397acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free Access

Pseudorandom generators without the XOR Lemma (extended abstract)

Authors Info & Claims
Published:01 May 1999Publication History
First page image

References

  1. ACR97.Alexander Andreev, Andrea Clementi, and Jos6 Rolim. Worstcase hardness suffices for derandomization: a new method for hardness-randomness trade-offs. In Proceedings oflCALP'97, pages 177-187. LNC 1256S, Springer-Vertag, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. AK97.V. Arvind and J. KObler. On resource-bounded measure and pseudorandomness. In Proceedings of the 17th Conference on Foundations of Software Technology and Theoretical Computer Science, pages 235-249. LNCS 1346, Springer-Verlag, 1997, Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. ALRS92.Sigal At, Richard J. Lipton, Ronitt Rubinfeld, and Madhu Sudan. Reconstructing algebraic functions from mixed data. In 33rd Annual Symposium on Foundations of Computer Science, pages 503-512, Pittsburgh, Pennsylvania, 24-27 October 1992. IEEE.Google ScholarGoogle Scholar
  4. AS97.Sanjeev Arora and Madhu Sudan. Improved low degree testing and its applications. In Proceedings of the TWenty-Ninth Annual ACM Symposiumon Theory of Computing, pages 485- 495, El Paso, Texas, 4-6 May t 997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. BBR85.Charles H. Bennett, Gilles Brassard, and Jean-Marc Robert. How to reduce your enemy's information (extended abstract). In Hugh C. Williams, editor, Advances in Cryptology-- CRYPTO '85, volume 218 of Lecture Notes in Computer Science, pages 468--476. Springer-Verlag, 1986, 18-22 August 1985, Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. BF90.Donald Beaver and Joan Feigenbaum. Hiding instances in multioracle queries. In 7th Annual Symposium on Theoretical Aspects of Computer Science, volume 415 of Lecture Notes in Computer Science, pages 37-48, Rouen, France, 22-24 February 1990. Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. BFNW93.LAszl6 Bahai, Lance Fortnow, Noam Nisan, and Avi Wigderson. BPP has subexponentiat time simulations unless EX- PTIME has publishable proofs. Computational Complexity, 3(4):307-318,1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. BM84.Manuel Blum and Silvio Micali, How to generate cryptographically strong sequences of pseudo-random bits. SIAM Journal on Computing, 13(4):850-864, November 1984, Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. CG89.Benny Chor and Oded Goldreich. On the power of two-point based sampling. Journal of Complexity, 5(1):96-106, March 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. CGH+85.Benny Chor, Oded Goldreich, Johan Hastad, Joel Friedman, Steven Rudieh, and Roman Smolensky. The bit extraction problem or t-resilient functions (preliminary version). In 26th Annual Symposium on Foundations of Computer Science, pages 396-407, Porfiand, Oregon, 21-23 October 1985. IEEE.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. CPS99.Jin-Yi Cai, A. Pavan, and D. Sivakumar. On the hardness of the permanent. In 16th International Symposium on Theoretical Aspects of Computer Science, Lecture Notes in Computer Science, Trier, Germany, March 4-6 1999. Springer-Verlag. To appear. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. CT91.Thomas M. Cover and Joy A. Thomas. Elements oflnformalion Theory. Wiley Series in Telecommunications. John Wiley & Sons, Inc., 2nd edition, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. CW89.Aviad Cohen and Avi Wigderson. Dispersers, determinislic amplification, and weak random sources (extended abstrac0. In 30th Annual Symposium on Foundations of Computer Science, pages 14-19, Research Triangle Park, North Carolina, 30 October-I November t989. IEEE.Google ScholarGoogle Scholar
  14. FF93.Joan Feigenbaum and Lance Formow. Random-selfreducibility of complete sets. SIAM Journal on Computing, 22(5):994-1005, October t 993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. FL96.Uriel Feige and Carsten Lund. On the hardness of computing the permanent of random matrices. Computational Complexity, 6(2):t01-132, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Fri92.loet Friedman. On the bit extraction problem, In 33rdAnnual Symposium on Foundations of Computer Science, pages 314- 319, Pittsburgh, Pennsylvania, 24--27 October 1992. IEEE.Google ScholarGoogle Scholar
  17. GL89.Oded Goldreich and Leonid A. Levin. A hard.core predicate for all one-way functions. In Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing, pages 25- 32, Seattle, Washington, 15-17 May 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. GLR+91.Peter Gemme!t, Richard Lipton, Ronitt Rubinfeld, Madhu Sudan, and Avi Wigderson. Self-testing/correcting for polynomia/s and for approximate functions. In Proceedings qf the Twenty Third Annual ACM Symposium on Theory of Computing, pages 32-42, New Orleans, Louisiana, 6--8 May 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. GM84.Shaft Goldwasser and Silvio Micali. Probabilistic encryplion. Journal of Computer and System Sciences, 28(2):270- 299, April t 984.Google ScholarGoogle ScholarCross RefCross Ref
  20. GNW95.Oded Goldreich, Noam Nisan, and Avi Wigderson. On Yao's XOR lemma. Technical Report TR95--050, Electronic Colloquium on Computational Complexity, March 1995. http: / / www. eccc. uni- trier, de / eccc.Google ScholarGoogle Scholar
  21. Gol95.Oded Goldreich. Foundations of Cryptography (Fragments of a Book). Weizmann Institute of Science, 1995. Available, along with revised version 1/98, from http:// www. wisdom, weizmann, ac. 51 / ~oded. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Gol97a.Oded Goldreich. A computational perspective on sampling (survey). Available from http: / / www. wis dora. wel zmann, ac. i 1 / ~odor/, May 1997.Google ScholarGoogle Scholar
  23. Gol97b.Oded Goldreich. Three XOR lemmas- an exposition. Available from http://www.wisdom.weizmann.ac, il/ -oded/, November 1997.Google ScholarGoogle Scholar
  24. Gol98.Oded Goldreich. Modern Cryptography, Probabifistic Proofs and Pseudorandomness, June 1998. To be published by Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. GRS98.Oded Goldreich, Ronitt Rubinfeld, and Madhu Sudan. Learning polynomials with queries- the highly noisy case. Technical Report TR98~060, Electronic Colloquium on Computational Complexity, 1998. Preliminary version in FOC$ '95. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. GS92.Peter Gemmell and Madhu Sudan. Highly resilient correctors for polynomials. Information Processing Letters, 43(4): 169- 174, 28 September 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. GS98.Venkatesan Guruswami and Madhu Sudan. Improved decoding of Reed-Solomon and algebraic-geometric codes. Technical Report 98--043, Electronic Colloquium on Computalional Complexity, 1998. Preliminary version in FOCS '98. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. HILL98.J. H,Sstad, R. Impagliazzo, L. Levin, and M. Luby. A pseudorandom generator from any one-way function. To appear in SIAM J. on Computing, 1998.Google ScholarGoogle Scholar
  29. Imp95.Russell Impagliazzo. Hard-core distributions for somewhat hard problems. In 36th Annual Symposium on Foundations of Computer Science, pages 538-545, Milwaukee, Wisconsin, 23-25 October 1995. IEEE. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. IW97.Russell Impagliazzo and Avi Wigderson. P = BPP if E requires exponential circuits: Derandomizing the XOR !emma. In Proceedings of the Twenty-Ninth Annual ACM Symposium on Theory of Computing, pages 220---229, E1 Paso, Texas, 4-6 May 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. IW98.Russell Impagtiazzo and Avi Wigderson. Randomness vs. time: De-randorrdzation under a uniform assumption. In 36th Annual Symposium on Foundations of Computer Science, Polo Alto, CA, November 8-11 1998. IEEE. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. KS98.S. Ravi Kumar and D. Sivakumar. Personal communication, October 1998.Google ScholarGoogle Scholar
  33. KvM98.Adam Klivans and Dieter van Melkebeek. Graph nonisomorphism has subexponenfial size proofs unless the polynomiallime hierarchy collapses. Technical Report TR-98-12, University of Chicago, Department of Computer Science, December 1998. Extended abstract in these proceedings. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Lip89.Richard Lipton. New directions in testing. In Proceedings of DIMACS Workshop on Distributed Computing and Cryptography, 1989.Google ScholarGoogle Scholar
  35. NW94.Noam Nisan and Avi Wigderson. Hardness vs randomness. Journal of Compute r and System Sciences, 49(2): 149-167, October 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. NZ96.Noam Nisan and David Zuckerman. Randomness is linear in apace. Journal of Computer and System Sciences, 52(1):43- 52, February 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. STV98.Madhu Sudan, Luca Trevisan, and Salil Vadhan. Pseudorandom generators without the XOR temma. Technical Report TR98-074, Electronic Colloquium on Computational Complexity, December 1998. http://www.eccc.uni-trier, de/eccc. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Sud97.Madhu Sudan. Decoding of Reed SoIomon codes beyond the error-correction bound. Journal of Complexity, 13(1):I 80- 193, March 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Tre98.Luca Trevisan. Constructions of near-optimal extractors using pseudo-random generators. Technical Report TR98-055, Electronic Colloquium on Computational Complexity, 1998. Extended abstract in these proceedings.Google ScholarGoogle Scholar
  40. Vaz85.Umesh V. Vazirani. Towards a strong communication complexity theory or generat/ng quasi-random sequences from two communicating slightly-random sources (extended abstract). In Proceedings of the SeventeenthAnnual ACM Symposium on Theory of Computing, pages 366-378, Providence, Rhode Island, 6-8 May 1985. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Wig98.Avi Wigderson. Personal communication, October 1998.Google ScholarGoogle Scholar
  42. Yao82.Andrew C. Yao. Theory and applications of trapdoor functions (extended abstracl). In 23rd Annual Symposium on Foundations of Computer Science, pages 80--.91, Chicago, Illinois, 3-5 November 1982. IEEE.Google ScholarGoogle Scholar
  43. Zuc96.David Zuckerman. Simulating BPP using a general weak random source. Algorithmica, 16(415):367-391, October/November 1996.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Pseudorandom generators without the XOR Lemma (extended abstract)

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in
                • Published in

                  cover image ACM Conferences
                  STOC '99: Proceedings of the thirty-first annual ACM symposium on Theory of Computing
                  May 1999
                  790 pages
                  ISBN:1581130678
                  DOI:10.1145/301250

                  Copyright © 1999 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 1 May 1999

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • Article

                  Acceptance Rates

                  Overall Acceptance Rate1,469of4,586submissions,32%

                  Upcoming Conference

                  STOC '24
                  56th Annual ACM Symposium on Theory of Computing (STOC 2024)
                  June 24 - 28, 2024
                  Vancouver , BC , Canada

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader