Storing information with extractors

نویسنده

  • Amnon Ta-Shma
چکیده

We deal with the problem of storing a set of K elements that are taken from a large universe of size N , such that membership in the set can be determined with high probability by looking at just one bit of the representation. Buhrman et al. show an explicit construction with about K2 logN storing bits. We show an explicit construction with about K1+o(1) storing bits, that gets closer to the optimal K logN bound. Our technique is of independent interest. Buhrman et al. show a non-explicit optimal (up to constant factors) construction that is based on the existence of certain good unbalanced expanders. To make the construction explicit one needs to be able to explicitly ‘encode’ and ‘decode’ such expanding graphs. We generalize the notion of loss-less condensers of Ta-Shma et al. [Proc. 33rd Annual ACM Symposium on Theory of Computing, 2001, pp. 143–152] and build such graphs. We further show how to efficiently decode such graphs using an observation from Ta-Shma and Zuckerman [Manuscript, 2001] about Trevisan’s extractor.  2002 Elsevier Science B.V. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Flexible Two-Source Extractors and their Applications

We introduce a new notion flexible extractor. It is a generalization of the standard concept of a two-source-extractor which require each of a sources to have some entropy, flexible extractor requires the sum of sources entropy to exceed fixed value. We distinguish between a strong and a weak flexible extractors and (similarly to two-source-extractors case) prove that every weak flexible extrac...

متن کامل

Fuzzy Extractors and Cryptography, or How to Use Your Fingerprints

We provide formal definitions and efficient secure techniques for • turning biometric information into keys usable for any cryptographic application, and • reliably and securely authenticating biometric data. Our techniques apply not just to biometric information, but to any keying material that, unlike traditional cryptographic keys, is (1) not reproducible precisely and (2) not distributed un...

متن کامل

Methods of Generating Key Sequences Based on Parameters of Handwritten Passwords and Signatures

The modern encryption methods are reliable if strong keys (passwords) are used, but the human factor issue cannot be solved by cryptographic methods. The best variant is binding all authenticators (passwords, encryption keys, and others) to the identities. When a user is authenticated by biometrical characteristics, the problem of protecting a biometrical template stored on a remote server beco...

متن کامل

On the Possibilities and Limitations of Computational Fuzzy Extractors

We present positive and negative results of fuzzy extractors with computational security. As a negative result, we show that, under a certain computational condition, the existence of a computational fuzzy extractor implies the existence of an information-theoretic fuzzy extractor with slightly weaker parameters. The condition is that the generation procedure of the fuzzy extractor is efficient...

متن کامل

On the Limitations of Computational Fuzzy Extractors

We present a negative result of fuzzy extractors with computational security. Specifically, we show that, under a certain computational condition, the existence of a computational fuzzy extractor implies the existence of an information-theoretic fuzzy extractor with slightly weaker parameters. The condition is that the generation procedure of the fuzzy extractor is efficiently invertible by an ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Inf. Process. Lett.

دوره 83  شماره 

صفحات  -

تاریخ انتشار 2002