Award Abstract # 1849899
CRII: AF: Pseudorandomness: New Frontiers and Techniques

NSF Org: CCF
Division of Computing and Communication Foundations
Recipient: CORNELL UNIVERSITY
Initial Amendment Date: January 30, 2019
Latest Amendment Date: January 30, 2019
Award Number: 1849899
Award Instrument: Standard Grant
Program Manager: Tracy Kimbrel
CCF
 Division of Computing and Communication Foundations
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: March 1, 2019
End Date: February 28, 2021 (Estimated)
Total Intended Award Amount: $175,000.00
Total Awarded Amount to Date: $175,000.00
Funds Obligated to Date: FY 2019 = $175,000.00
History of Investigator:
  • Eshan Chattopadhyay (Principal Investigator)
    ec583@cornell.edu
Recipient Sponsored Research Office: Cornell University
341 PINE TREE RD
ITHACA
NY  US  14850-2820
(607)255-5014
Sponsor Congressional District: 19
Primary Place of Performance: Cornell University
107 Hoy Road
Ithaca
NY  US  14853-7501
Primary Place of Performance
Congressional District:
19
Unique Entity Identifier (UEI): G56PUALJ3KT5
Parent UEI:
NSF Program(s): Algorithmic Foundations
Primary Program Source: 01001920DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 7796, 7927, 8228, 9102
Program Element Code(s): 779600
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

The role of randomness in computation is extremely important with crucial applications to various branches of computer science including design of fast algorithms for practical problems, distributed computing, cryptography, and security. Scientists and economists use randomness extensively in simulations of physical and biological systems and other complex environments. However, a major problem in practice is that physical sources of randomness are defective and only produce correlated bits that contain some entropy. This leads to the following fundamental question: To what extent is the use of randomness inherent in applications? Can we reduce the amount or quality of randomness required to perform these tasks? Most applications of randomness in cryptography are inherent. Indeed, we require the secret keys for various cryptographic applications, such as credit card transactions, to be uniformly random. On the other hand, it is not known if the use of randomness is fundamental in designing efficient algorithms. This project intends to study these fundamental questions, and in particular, provide theoretical guarantees on the quality of randomness used in cryptography and security, and reduce the amount of randomness used in design of efficient algorithms.

The area of Pseudorandomness provides a unified approach to the above problems and a major goal in this area is to efficiently construct deterministic objects that are random-like. The idea is to replace a random object used in an application, with an explicit construction of a random-like object, thus removing the need for random bits. Important notions in this area are randomness extractors and pseudorandom generators. A randomness extractor is an algorithm that produces purely random bits from defective sources of randomness. Such extractors can be used in purifying defective sources before carrying out important cryptographic protocols. A pseudorandom generator is a deterministic algorithm that takes a short uniformly random string and stretches it into a much longer string that still "looks random" to the appropriate application (e.g., algorithms that use limited memory). This project intends to study several concrete directions to extend the state-of-art on efficient constructions of randomness extractors and pseudorandom generators that will lead to resolving important open problems in computational complexity theory and derandomization.

This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

Ball, Marshall and Chattopadhyay, Eshan and Liao, Jyun-Jie and Malkin, Tal and Tan, Li-Yang. "Non-malleability Against Polynomial Tampering" CRYPTO , v.12172 , 2020 Citation Details
Chattopadhyay, Eshan and De, Anindya and Servedio, Rocco "Simple and efficient pseudorandom genera- tors from Gaussian processes." Leibniz international proceedings in informatics , v.137 , 2019 Citation Details
Chattopadhyay, Eshan and Goodman, Jesse and Goyal, Vipul and Kumar, Ashutosh and Li, Xin and Meka, Raghu and Zuckerman, David "Extractors and Secret Sharing Against Bounded Collusion Protocols" 2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS) , 2020 https://doi.org/10.1109/FOCS46700.2020.00117 Citation Details
Chattopadhyay, Eshan and Goodman, Jesse and Goyal, Vipul and Li, Xin "Extractors for adversarial sources via extremal hypergraphs" STOC '20: 52nd Annual ACM SIGACT Symposium on Theory of Computing , 2020 https://doi.org/10.1145/3357713.3384339 Citation Details
Chattopadhyay, Eshan and Hatami, Pooya and Hosseini, Kaave and Lovett, Shachar and Zuckerman, David "XOR lemmas for resilient functions against polynomials" 52nd Annual ACM Symposium on Theory of Computing (STOC) , 2020 https://doi.org/10.1145/3357713.3384242 Citation Details
Chattopadhyay, Eshan and Kanukurthi, Bhavana and Obbattu, Sai Lakshmi and Sekar, Sruthi "Privacy Amplification from Non-Malleable Codes" Lecture notes in computer science , 2019 Citation Details
Chattopadhyay, Eshan and Li, Xin "Non-malleable Codes, Extractors and Secret Sharing for Interleaved Tampering and Composition of Tampering" Pass R., Pietrzak K. (eds) Theory of Cryptography. TCC 2020. Lecture Notes in Computer Science, vol 12552. Springer, Cham , 2020 https://doi.org/10.1007/978-3-030-64381-2_21 Citation Details
Chattopadhyay, Eshan and Zuckerman, David "Explicit two-source extractors and resilient functions" Annals of mathematics , v.189 , 2020 10.4007/annals.2019.189.3.1 Citation Details

PROJECT OUTCOMES REPORT

Disclaimer

This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.

The essential goals of the project were to investigate the requirement of randomness in efficient computation, and further develop techniques for producing high-quality random bits for applications in cryptography. We summarize the progress we made on these directions:

(1) Derandomizing efficient randomized computation: A major goal in theoretical computer science is to prove that efficient computation does not require random bits. Towards this goal, we made progress on reducing randomness requirements for algorithms that have limited memory. In particular, our construction is optimal in certain important parameter regimes. This result was published in the Computational Complexity Conference in 2020.

In another research investigation in this theme,  we made interesting progress on the problem of constructing pseudorandom generators  (that provide a black-box way of reducing randomness) for classes of Boolean circuits that have remained elusive for decades. This result was published in the Symposium on Theory of Computing, 2020 (STOC 2020).

(2) Producing high-quality randomness and applications: A randomness extractor is an algorithm that purifies correlated randomness to produce independent, unbiased bits (i.e. high-quality randomness). A rich line of work investigates constructing such extractors in various settings, with motivations coming from a variety of applications in cryptography, distributed computing, complexity theory, etc. In this project, we make a number of advances in constructing extractors and finding applications in cryptography. In a paper published in STOC 2020, we study a new model of correlated sources that we call ?adversarial sources?, motivated by various settings in cryptography and show how to produce random bits from such sources. In a result published in the Symposium on Foundations of Computer Science 2020, we construct extractors that work even when an adversary learns non-trivial leakage of the randomness used by the extractor. Such extractors have natural applications in computational complexity theory and cryptography. Our other results include new randomness extractors that have applications in the theory of error-correcting codes. These results have been published in the International Cryptorgaphy Conference 2020 and Theory of Cryptography Conference 2020.


Last Modified: 06/26/2021
Modified by: Eshan Chattopadhyay

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page