Deterministic Randomness Extraction from Generalized and Distributed Santha-Vazirani Sources
نویسندگان
چکیده
A Santha-Vazirani (SV) source is a sequence of random bits where the conditional distribution of each bit, given the previous bits, can be partially controlled by an adversary. Santha and Vazirani show that deterministic randomness extraction from these sources is impossible. In this paper, we study the generalization of SV sources for non-binary sequences. We show that unlike the binary case, deterministic randomness extraction in the generalized case is sometimes possible. We present a necessary condition and a sufficient condition for the possibility of deterministic randomness extraction. These two conditions coincide in “non-degenerate” cases. Next, we turn to a distributed setting. In this setting the SV source consists of a random sequence of pairs (a1, b1), (a2, b2), . . . distributed between two parties, where the first party receives ai’s and the second one receives bi’s. The goal of the two parties is to extract common randomness without communication. Using the notion of maximal correlation, we prove a necessary condition and a sufficient condition for the possibility of common randomness extraction from these sources. Based on these two conditions, the problem of common randomness extraction essentially reduces to the problem of randomness extraction from (non-distributed) SV sources. This result generalizes results of Gács and Körner, and Witsenhausen about common randomness extraction from i.i.d. sources to adversarial sources.
منابع مشابه
Complete Classification of Generalized Santha-Vazirani Sources
Let F be a finite alphabet and D be a finite set of distributions over F . A Generalized Santha-Vazirani (GSV) source of type (F ,D), introduced by Beigi, Etesami and Gohari (ICALP 2015, SICOMP 2017), is a random sequence (F1, . . . , Fn) in Fn, where Fi is a sample from some distribution d ∈ D whose choice may depend on F1, . . . , Fi−1. We show that all GSV source types (F ,D) fall into one o...
متن کاملUnbiased Bits from Sources of Weak
? A new model for weak random physical sources is presented. The new model strictly generalizes previous models (e.g. the Santha and Vazirani model 24]). The sources considered output strings according to probability distributions in which no single string is too probable. The new model provides a fruitful viewpoint on problems studied previously as: Extracting almost perfect bits from sources ...
متن کاملPrivacy with Imperfect Randomness
We revisit the impossibility of a variety of cryptographic tasks including privacy and differential privacy with imperfect randomness. For traditional notions of privacy, such as security of encryption, commitment or secret sharing schemes, dramatic impossibility results are known [MP90,DOPS04] for several concrete sources R, including a (seemingly) very “nice and friendly” Santha-Vazirani (SV)...
متن کاملDifferential Privacy with Imperfect Randomness
In this work we revisit the question of basing cryptography on imperfect randomness. Bosley and Dodis (TCC’07) showed that if a source of randomness R is “good enough” to generate a secret key capable of encrypting k bits, then one can deterministically extract nearly k almost uniform bits from R, suggesting that traditional privacy notions (namely, indistinguishability of encryption) requires ...
متن کاملDevice-independent Randomness Amplification and Privatization
Randomness is an essential resource in computer science. In most applications perfect, and sometimes private, randomness is needed, while it is not even clear that such a resource exists. It is well known that the tools of classical computer science do not allow us to create perfect and secret randomness from a single weak public source. Quantum physics, on the other hand, allows for such a pro...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- SIAM J. Comput.
دوره 46 شماره
صفحات -
تاریخ انتشار 2014