Improved Randomness Extraction from Two Independent Sources
نویسندگان
چکیده
Given two independent weak random sources X,Y , with the same length l and min-entropies bX , bY whose sum is greater than l + Ω(polylog(l/ε)), we construct a deterministic two-source extractor (aka “blender”) that extracts max(bX , bY ) + (bX + bY − l − 4 log(1/ε)) bits which are ε-close to uniform. In contrast, best previously published construction [4] extracted at most 1 2 (bX + bY − l− 2 log(1/ε)) bits. Our main technical tool is a construction of a strong two-source extractor that extracts (bX + bY − l) − 2 log(1/ε) bits which are ε-close to being uniform and independent of one of the sources (aka “strong blender”), so that they can later be reused as a seed to a seeded extractor. Our strong two-source extractor construction improves the best previously published construction of such strong blenders [7] by a factor of 2, applies to more sources X and Y , and is considerably simpler than the latter. Our methodology also unifies several of the previous two-source extractor constructions from the literature.
منابع مشابه
Deterministic Randomness Extraction from Generalized and Distributed Santha-Vazirani Sources
A Santha-Vazirani (SV) source is a sequence of random bits where the conditional distribution of each bit, given the previous bits, can be partially controlled by an adversary. Santha and Vazirani show that deterministic randomness extraction from these sources is impossible. In this paper, we study the generalization of SV sources for non-binary sequences. We show that unlike the binary case, ...
متن کاملLinear Transformations for Randomness Extraction
Information-efficient approaches for extracting randomness from imperfect sources have been extensively studied, but simpler and faster ones are required in the high-speed applications of random number generation. In this paper, we focus on linear constructions, namely, applying linear transformation for randomness extraction. We show that linear transformations based on sparse random matrices ...
متن کاملOn Extracting Private Randomness over a Public Channel
We introduce the notion of a super-strong extractor. Given two independent weak random sources X,Y , such extractor EXT(·, ·) has the property that EXT(X,Y ) is statistically random even if one is given Y . Namely, 〈Y, EXT(X,Y )〉 ≈ 〈Y,R〉. Super-strong extractors generalize the notion of strong extractors [16], which assume that Y is truly random, and extractors from two weak random sources [26,...
متن کاملSharp lower bounds on the extractable randomness from non-uniform sources
Extraction of uniform randomness from (noisy) non-uniform sources is an important primitive in many security applications, e.g. (pseudo-)random number generators, privacypreserving biometrics, and key storage based on Physical Unclonable Functions. Generic extraction methods exist, using universal hash functions. There is a trade-off between the length of the extracted bit string and the unifor...
متن کاملRandomness Extraction Beyond the Classical World
Randomness is an extremely useful resource in diverse fields in computer science, such as randomized algorithms, distributed algorithms, and cryptography. In these fields, we often assume that perfect randomness are available. However, the assumption may not be realistic, since random sources available in our physical world tend to be correlated and biased. Furthermore, there is no way to ensur...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004