-- Apr 26 In-Class Exercise
We want to implement this BPP algorithm in hardware. As we know that BPP is contained in P/poly, this is possible. As long as we can find a 'good' seed for our probabilistic TM, we can implement this compression algorithm in a circuit. To find this 'good' seed, we know that half of all strings of length m are good. We can implement a circuit with a hardcoded string of length m a handful of times and run the input on each circuit, taking the majority rule. We can use Chernoff bounds to find a suitable amount of random strings to hardcode and tune our margin of error to be exponentially small.
We want to implement this BPP algorithm in hardware. As we know that BPP is contained in P/poly, this is possible. As long as we can find a 'good' seed for our probabilistic TM, we can implement this compression algorithm in a circuit. To find this 'good' seed, we know that half of all strings of length m are good. We can implement a circuit with a hardcoded string of length m a handful of times and run the input on each circuit, taking the majority rule. We can use Chernoff bounds to find a suitable amount of random strings to hardcode and tune our margin of error to be exponentially small.