TY - GEN
T1 - Derandomization with Minimal Memory Footprint
AU - Doron, Dean
AU - Tell, Roei
N1 - Publisher Copyright:
© Dean Doron and Roei Tell; licensed under Creative Commons License CC-BY 4.0.
PY - 2023/7/1
Y1 - 2023/7/1
N2 - Existing proofs that deduce BPL = L from circuit lower bounds convert randomized algorithms into deterministic algorithms with large constant overhead in space. We study space-bounded derandomization with minimal footprint, and ask what is the minimal possible space overhead for derandomization. We show that BPSPACE[S] ⊆ DSPACE[c·S] for c ≈ 2, assuming space-efficient cryptographic PRGs, and, either: (1) lower bounds against bounded-space algorithms with advice, or: (2) lower bounds against certain uniform compression algorithms. Under additional assumptions regarding the power of catalytic computation, in a new setting of parameters that was not studied before, we are even able to get c ≈ 1. Our results are constructive: Given a candidate hard function (and a candidate cryptographic PRG) we show how to transform the randomized algorithm into an efficient deterministic one. This follows from new PRGs and targeted PRGs for space-bounded algorithms, which we combine with novel space-efficient evaluation methods. A central ingredient in all our constructions is hardness amplification reductions in logspace-uniform TC0, that were not known before.
AB - Existing proofs that deduce BPL = L from circuit lower bounds convert randomized algorithms into deterministic algorithms with large constant overhead in space. We study space-bounded derandomization with minimal footprint, and ask what is the minimal possible space overhead for derandomization. We show that BPSPACE[S] ⊆ DSPACE[c·S] for c ≈ 2, assuming space-efficient cryptographic PRGs, and, either: (1) lower bounds against bounded-space algorithms with advice, or: (2) lower bounds against certain uniform compression algorithms. Under additional assumptions regarding the power of catalytic computation, in a new setting of parameters that was not studied before, we are even able to get c ≈ 1. Our results are constructive: Given a candidate hard function (and a candidate cryptographic PRG) we show how to transform the randomized algorithm into an efficient deterministic one. This follows from new PRGs and targeted PRGs for space-bounded algorithms, which we combine with novel space-efficient evaluation methods. A central ingredient in all our constructions is hardness amplification reductions in logspace-uniform TC0, that were not known before.
KW - catalytic space
KW - derandomization
KW - space-bounded computation
UR - http://www.scopus.com/inward/record.url?scp=85168422077&partnerID=8YFLogxK
U2 - 10.4230/LIPIcs.CCC.2023.11
DO - 10.4230/LIPIcs.CCC.2023.11
M3 - Conference contribution
AN - SCOPUS:85168422077
T3 - Leibniz International Proceedings in Informatics, LIPIcs
BT - 38th Computational Complexity Conference, CCC 2023
A2 - Ta-Shma, Amnon
PB - Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing
T2 - 38th Computational Complexity Conference, CCC 2023
Y2 - 17 July 2023 through 20 July 2023
ER -