Sampling Graphs without Forbidden Subgraphs and Unbalanced Expanders with Negligible Error

被引:11
作者
Applebaum, Benny [1 ]
Kachlon, Eliran [1 ]
机构
[1] Tel Aviv Univ, Sch Elect Engn, Tel Aviv, Israel
来源
2019 IEEE 60TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2019) | 2019年
关键词
Expander Graph; LDPC Codes; Local Cryptography; PARITY-CHECK CODES; PSEUDORANDOM GENERATORS; STRETCH;
D O I
10.1109/FOCS.2019.00020
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Suppose that you wish to sample a random graph G over n vertices and m edges conditioned on the event that G does not contain a "small" t-size graph H (e.g., clique) as a subgraph. Assuming that most such graphs are H-free, the problem can be solved by a simple rejected-sampling algorithm (that tests for t-cliques) with an expected running time of n(O(t)). Is it possible to solve the problem in running time that does not grow polynomially with n(t)? In this paper, we introduce the general problem of sampling a "random looking" graph G with a given edge density that avoids some arbitrary predefined t-size subgraph H. As our main result, we show that the problem is solvable with respect to some specially crafted k-wise independent distribution over graphs. That is, we design a sampling algorithm for k-wise independent graphs that supports efficient testing for subgraph-freeness in time f (t) . n(c) where f is a function of t and the constant c in the exponent is independent of t. Our solution extends to the case where both G and H are d-uniform hypergraphs. We use these algorithms to obtain the first probabilistic construction of constant-degree polynomially-unbalanced expander graphs whose failure probability is negligible in n (i.e., n(-omega(1))). In particular, given constants d > c, we output a bipartite graph that has n left nodes, n(c) right nodes with right-degree of d so that any right set of size at most n(Omega(1)) expands by factor of Omega (d). This result is extended to the setting of unique expansion as well. We observe that such a negligible-error construction can be employed in many useful settings, and present applications in coding theory (batch codes and LDPC codes), pseudo randomness (low-bias generators and randomness extractors) and cryptography. Notably, we show that our constructions yield a collection of polynomial-stretch locally-computable cryptographic pseudorandom generators based on Goldreich's one-wayness assumption resolving a central open problem in parallel-cryptography (cf., Applebaum-Ishai-Kushilevitz, FOCS 2004; and Ishai-Kushilevitz-Ostrovsky-Sahai, STOC 2008).
引用
收藏
页码:171 / 179
页数:9
相关论文
共 38 条
[1]  
Alon N., 1994, Electronic Journal of Combinatorics, V1, P12
[2]   k-Wise Independent Random Graphs [J].
Alon, Noga ;
Nussboim, Asaf .
PROCEEDINGS OF THE 49TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2008, :813-+
[3]   Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps [J].
Ananth, Prabhanjan ;
Sahai, Amit .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT I, 2017, 10210 :152-181
[4]  
Applebaum B., 2017, LIPICS, V67
[5]   On pseudorandom generators with linear stretch in NC0 [J].
Applebaum, Benny ;
Ishai, Yuval ;
Kushilevitz, Eyal .
COMPUTATIONAL COMPLEXITY, 2008, 17 (01) :38-69
[6]   Cryptography in NC0 [J].
Applebaum, Benny ;
Ishai, Yuval ;
Kushilevitz, Eyal .
SIAM JOURNAL ON COMPUTING, 2006, 36 (04) :845-888
[7]   ALGEBRAIC ATTACKS AGAINST RANDOM LOCAL FUNCTIONS AND THEIR COUNTERMEASURES [J].
Applebaum, Benny ;
Lovett, Shachar .
SIAM JOURNAL ON COMPUTING, 2018, 47 (01) :52-79
[8]   Secure Arithmetic Computation with Constant Computational Overhead [J].
Applebaum, Benny ;
Damgard, Ivan ;
Ishai, Yuval ;
Nielsen, Michael ;
Zichron, Lior .
ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I, 2017, 10401 :223-254
[9]   Exponentially-Hard gap-CSP and local PRG via Local Hardcore Functions [J].
Applebaum, Benny .
2017 IEEE 58TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2017, :836-847
[10]   Cryptographic Hardness of Random Local Functions [J].
Applebaum, Benny .
COMPUTATIONAL COMPLEXITY, 2016, 25 (03) :667-722