Zero-Fixing Extractors for Sub-Logarithmic Entropy
نویسندگان
چکیده
An (n, k)-bit-fixing source is a distribution on n bit strings, that is fixed on n − k of the coordinates, and jointly uniform on the remaining k bits. Explicit constructions of bit-fixing extractors by Gabizon, Raz and Shaltiel [SICOMP 2006] and Rao [CCC 2009], extract (1 − o(1)) · k bits for k = poly log n, almost matching the probabilistic argument. Intriguingly, unlike other well-studied sources of randomness, a result of Kamp and Zuckerman [SICOMP 2006] shows that, for any k, some small portion of the entropy in an (n, k)-bit-fixing source can be extracted. Although the extractor does not extract all the entropy, it does extract (1/2− o(1)) · log(k) bits. In this paper we prove that when the entropy k is small enough compared to n, this exponential entropy-loss is unavoidable. More precisely, one cannot extract more than log(k)/2 + O(1) bits from (n, k)-bit-fixing sources. The remaining entropy is inaccessible, information theoretically. By the Kamp-Zuckerman construction, this negative result is tight. Our impossibility result also holds for what we call zero-fixing sources. These are bit-fixing sources where the fixed bits are set to 0. We complement our negative result, by giving an explicit construction of an (n, k)-zero-fixing extractor, that outputs Ω(k) bits, even for k = poly log log n. Furthermore, we give a construction of an (n, k)-bitfixing extractor, that outputs k −O(1) bits, for entropy k = (1 + o(1)) · log logn, with running-time nO((log logn) 2). ∗Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot, Israel. Email: [email protected]. †Courant Institute of Mathematical Sciences, New York University. Email: [email protected] ISSN 1433-8092 Electronic Colloquium on Computational Complexity, Report No. 160 (2014)
منابع مشابه
Deterministic Extraction from Weak Random Sources - Preamble
Preface Roughly speaking, a deterministic extractor is a function that 'extracts' almost perfect random bits from a 'weak random source'-a distribution that contains some entropy but is far from being truly random. In this book we explicitly construct deterministic extractors and related objects for various types of sources. A basic theme in this book is a methodology of recycling randomness th...
متن کاملNon-Malleable Extractors with Logarithmic Seeds
We construct non-malleable extractors with seed length d = O(log n+log(1/ε)) for n-bit sources with min-entropy k = Ω(d), where ε is the error guarantee. In particular, the seed length is logarithmic in n for ε > 2−(logn) 1/3 . This improves upon existing constructions that either require super-logarithmic seed length even for constant error guarantee, or otherwise only support min-entropy n/po...
متن کاملBetter short-seed extractors against quantum knowledge
We construct a strong extractor against quantum storage that works for every min-entropy k, has logarithmic seed length, and outputs Ω(k) bits, provided that the quantum adversary has at most βk qubits of memory, for any β < 12 . Previous constructions required poly-logarithmic seed length to output such a fraction of the entropy and, in addition, required super-logarithmic seed length for smal...
متن کاملExtractors for Affine Sources with Polylogarithmic Entropy
We give the first explicit construction of deterministic extractors for affine sources over F2, with entropy k ≥ log n for some large enough constant C, where n is the length of the source. Previously the best known results are by Bourgain [Bou07], Yehudayoff [Yeh11] and Li [Li11b], which require the affine source to have entropy at least Ω(n/ √ log log n). Our extractor outputs one bit with er...
متن کاملOn Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model
We consider the problem of constructing randomness extractors that are locally computable; that is, read only a small number of bits from their input. As recently shown by Lu (CRYPTO ‘02 ), locally computable extractors directly yield secure private-key cryptosystems in Maurer’s bounded storage model (J. Cryptology, 1992). We suggest a general “sample-then-extract” approach to constructing loca...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Electronic Colloquium on Computational Complexity (ECCC)
دوره 21 شماره
صفحات -
تاریخ انتشار 2014