On Extractors and Exposure-Resilient Functions for Sublogarithmic Entropy
نویسندگان
چکیده
We study deterministic extractors for bit-fixing sources (a.k.a. resilient functions) and exposure-resilient functions for small min-entropy. That is, of the n bits given as input to the function, k n bits are uniformly random and unknown to the adversary. We show that a random function is a resilient function with high probability if and only if k is at least roughly logn. In contrast, we show that a random function is a static (resp. adaptive) exposure-resilient function with high probability even if k is as small as a constant (resp. log logn). Next we simplify and improve an explicit construction of resilient functions for sublogarithmic k due to Kamp and Zuckerman (SICOMP 2006), achieving error exponentially small in k rather than polynomially small in k. Finally, we show that the short output length (O(log k)) of this construction must hold for any resilient function computed by a restricted type of space-bounded streaming algorithm (as is the case for our construction).
منابع مشابه
On the Performance of Resilient Functions with Imperfect Inputs
We analyze the performance of resilient functions for imperfect input bits. Specifically, we allow more input bits than the resiliency degree of the resilient function to be biased and analyze the output behavior under this new assumption. We develop bounds on the output distribution of resilient functions build from a number of families of linear codes. We develop an explicit formula for the p...
متن کاملOn Resilient and Exposure-Resilient Functions
Resilient and exposure-resilient functions are functions whose output appears random even if some portion of their input is either revealed or fixed. We explore an alternative way of characterizing these objects that ties them explicitly to the theory of randomness extractors and simplifies current proofs of basic results. We also describe the inclusions and separations governing the various cl...
متن کاملLow-error, two-source extractors assuming efficient non-malleable extractors
We show a reduction from explicit two-source extractors with small error and arbitrarily small constant entropy rate to the existence of explicit t-non-malleable extractors with a small seed length. Previously, such a reduction was known either when one source had entropy rate above half [Raz05] or for general entropy rates but only for large error [CZ16]. As in previous reductions we start wit...
متن کاملA reduction from efficient non-malleable extractors to low-error two-source extractors with arbitrary constant rate
We show a reduction from the existence of explicit t-non-malleable extractors with a small seed length, to the construction of explicit two-source extractors with small error for sources with arbitrarily small constant rate. Previously, such a reduction was known either when one source had entropy rate above half [Raz05] or for general entropy rates but only for large error [CZ16]. As in previo...
متن کاملDeterministic Extractors for Bit-Fixing Sources and Exposure-Resilient Cryptography
We give an efficient deterministic algorithm that extracts Ω(n2γ) almost-random bits from sources where n 1 2 +γ of the n bits are uniformly random and the rest are fixed in advance. This improves upon previous constructions, which required that at least n/2 of the bits be random in order to extract many bits. Our construction also has applications in exposure-resilient cryptography, giving exp...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Random Struct. Algorithms
دوره 42 شماره
صفحات -
تاریخ انتشار 2013