Non-Malleable Extractors - New Tools and Improved Constructions

نویسنده

  • Gil Cohen
چکیده

A non-malleable extractor is a seeded extractor with a very strong guarantee – the output of a non-malleable extractor obtained using a typical seed is close to uniform even conditioned on the output obtained using any other seed. The first contribution of this paper consists of two new and improved constructions of non-malleable extractors: We construct a non-malleable extractor with seed-length O(logn · log logn) that works for entropy Ω(logn). This improves upon a recent exciting construction by Chattopadhyay, Goyal, and Li (STOC’16) that has seed length O(log2 n) and requires entropy Ω(log2 n). Secondly, we construct a non-malleable extractor with optimal seed length O(logn) for entropy n/polylogn. Prior to this construction, non-malleable extractors with a logarithmic seed length, due to Li (FOCS’12), required entropy 0.49n. Even non-malleable condensers with seed length O(logn), by Li (STOC’12), could only support linear entropy. We further devise several tools for enhancing a given non-malleable extractor in a black-box manner. One such tool is an algorithm that reduces the entropy requirement of a non-malleable extractor at the expense of a slightly longer seed. A second algorithm increases the output length of a non-malleable extractor from constant to linear in the entropy of the source. We also devise an algorithm that transforms a non-malleable extractor to the so-called t-non-malleable extractor for any desired t. Besides being useful building blocks for our constructions, we consider these modular tools to be of independent interest. 1998 ACM Subject Classification F.0 Theory of Computation] General, G.3 Probability and Statistics

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Pseudorandom Correlation Breakers, Independence Preserving Mergers and their Applications

The recent line of study on randomness extractors has been a great success, resulting in exciting new techniques, new connections, and breakthroughs to long standing open problems in the following five seemingly different topics: seeded non-malleable extractors, privacy amplification protocols with an active adversary, independent source extractors (and explicit Ramsey graphs), non-malleable in...

متن کامل

Non-Malleable Extractors with Logarithmic Seeds

We construct non-malleable extractors with seed length d = O(log n+log(1/ε)) for n-bit sources with min-entropy k = Ω(d), where ε is the error guarantee. In particular, the seed length is logarithmic in n for ε > 2−(logn) 1/3 . This improves upon existing constructions that either require super-logarithmic seed length even for constant error guarantee, or otherwise only support min-entropy n/po...

متن کامل

Non-Malleable Extractors for Entropy Rate <1/2

Dodis and Wichs [DW09] introduced the notion of a non-malleable extractor to study the problem of privacy amplification with an active adversary. A non-malleable extractor is a much stronger version of a strong extractor. Given a weakly-random string x and a uniformly random seed y as the inputs, the non-malleable extractor nmExt has the property that nmExt(x, y) appears uniform even given y as...

متن کامل

A new security proof for FMNV continuous non-malleable encoding scheme

A non-malleable code is a variant of an encoding scheme which is resilient to tampering attacks. The main idea behind non-malleable coding is that the adversary should not be able to obtain any valuable information about the message. Non-malleable codes are used in tamper-resilient cryptography and protecting memories against tampering attacks. Many different types of non-malleability have alre...

متن کامل

Low-error, two-source extractors assuming efficient non-malleable extractors

We show a reduction from explicit two-source extractors with small error and arbitrarily small constant entropy rate to the existence of explicit t-non-malleable extractors with a small seed length. Previously, such a reduction was known either when one source had entropy rate above half [Raz05] or for general entropy rates but only for large error [CZ16]. As in previous reductions we start wit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Electronic Colloquium on Computational Complexity (ECCC)

دوره 22  شماره 

صفحات  -

تاریخ انتشار 2015