2014 IEEE 55th Annual Symposium on Foundations of Computer Science 2014
DOI: 10.1109/focs.2014.29
|View full text |Cite
|
Sign up to set email alerts
|

Generating k-Independent Variables in Constant Time

Abstract: The generation of pseudorandom elements over finite fields is fundamental to the time, space and randomness complexity of randomized algorithms and data structures. We consider the problem of generating k-independent random values over a finite field F in a word RAM model equipped with constant time addition and multiplication in F, and present the first nontrivial construction of a generator that outputs each value in constant time, not dependent on k. Our generator has period length |F| poly log k and uses k… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(20 citation statements)
references
References 33 publications
0
20
0
Order By: Relevance
“…The construction combines results of Christiani and Pagh [CP14] and Siegel [Sie04]. Note that the parameter regime we are interested in here differs from that in [CP14].…”
Section: A2 Proofs For Sectionmentioning
confidence: 99%
See 1 more Smart Citation
“…The construction combines results of Christiani and Pagh [CP14] and Siegel [Sie04]. Note that the parameter regime we are interested in here differs from that in [CP14].…”
Section: A2 Proofs For Sectionmentioning
confidence: 99%
“…In order to be able to use this lemma iteratively, as we will do shortly, an explicit finite family {Γ i } i is required such that n i = m i+1 and e i = de i+1 for all indices i. Christiani and Pagh [CP14] These results give immediate rise to the t-wise independence generator, which will be used in Lemma 5 to construct the secret-sharing scheme we require to implement our Construction 2. Note that the generator we construct here is F-linear.…”
Section: A2 Proofs For Sectionmentioning
confidence: 99%
“…i.e., the random selection of a memory segment 12 . If the random sequential evaluation protocol terminates incorrectly or the termination is untimely, or both, the verifier rejects.…”
Section: Handling Clock Jitter and Inter-processor Interferencementioning
confidence: 99%
“…Theorem 1 studies the number of balls landing a bin b which may be a function of the bin h ′ (q) of a query ball q ∈ [u] \ S. Thanks to the last statement of Theorem 5, we can condition on any value a of h(q), which determines h ′ (q) and hence b. Now, for x ∈ S, define Theorem 1,and (5) and (6) follow from (10) and (11), but with the improved error u −γ . This is important when m is small, e.g., if m = 2 corresponding to unbiased coin tosses.…”
Section: Theorem 5 ([42]) Choose a Random C-character Twisted Tabulatmentioning
confidence: 99%