On Extracting Private Randomness over a Public Channel
نویسندگان
چکیده
We introduce the notion of a super-strong extractor. Given two independent weak random sources X,Y , such extractor EXT(·, ·) has the property that EXT(X,Y ) is statistically random even if one is given Y . Namely, 〈Y, EXT(X,Y )〉 ≈ 〈Y,R〉. Super-strong extractors generalize the notion of strong extractors [16], which assume that Y is truly random, and extractors from two weak random sources [26, 7] which only assure that EXT(X,Y ) ≈ R. We show that super-extractors have many natural applications to design of cryptographic systems in a setting when different parties have independent weak sources of randomness, but have to communicate over an insecure channel. For example, they allow one party to “help” other party extract private randomness: the “helper” simply sends Y , and the “client” gets private randomness EXT(X,Y ). In particular, it allows two parties to derive a nearly random key after initial agreement on only a weak shared key, without using ideal local randomness. We show that optimal super-strong extractors exist, which are capable of extracting all the randomness from X , as long as Y has a logarithmic amount of min-entropy. This generalizes a similar result from strong extractors, and improves upon previously known bounds [7] for a weaker problem of randomness extraction from two independent random sources. We also give explicit super-strong extractors which work provided the sum of the min-entropies of X and Y is at least their block length. Finally, we consider the setting of our problem where the public communication channels are not authenticated. Using the results of [13], we show that non-trivial authentication is possible when the min-entropy rate of the shared secret key is at least a half. Combining this with our explicit super-extractor construction, we get the first privacy amplification protocol over an adversarially controlled channel, where player do not have ideal local randomness. Department of Computer Science, New York University, 251 Mercer Street, New York, NY 10012, USA. Email: [email protected]. Parially supported by the NSF CAREER Award. Department of Mathematics, New York University, 251 Mercer Street, New York, NY 10012, USA. Email: [email protected]. The work of this author was funded by a doctoral fellowship from CNPq, Brazil.
منابع مشابه
The capacity of a quantum channel for simultaneous transmission of classical and quantum information
An expression is derived characterizing the set of admissible rate pairs for simultaneous transmission of classical and quantum information over a given quantum channel, generalizing both the classical and quantum capacities of the channel. Although our formula involves regularization, i.e. taking a limit over many copies of the channel, it reduces to a single-letter expression in the case of g...
متن کاملPerfect Secrecy under Deep Random assumption
We present a new idea to design perfectly secure information exchangeprotocol, based on a new form of randomness, called « Deep Randomness »,generated in such a way that probability distribution of the output signal ismade unknowledgeable for an observer. By limiting, thanks to DeepRandomness, the capacity of the opponent observer to perform bayesianinference over public...
متن کاملThe relative contributions of private information sharing and public information releases to information aggregation
We calculate learning rates when agents are informed through both public and private observation of other agents’ actions. We provide an explicit solution for the evolution of the distribution of posterior beliefs. When the private learning channel is present, we show that convergence of the distribution of beliefs to the perfect-information limit is exponential at a rate equal to the sum of th...
متن کاملRandomness Efficient Steganography
Steganographic protocols enables one to “embed” covert messages into inconspicuous data over a public communication channel in such a way that no one, aside from the sender and the intended receiver can even detect the presence of the secret message. In this paper, we provide a new provably-secure, private-key steganographic encryption protocol. We prove the security of our protocol in the comp...
متن کاملThe Randomness Complexity
We consider the classic problem of n honest but curious players with private inputs x 1 ; : : : ; x n who wish to compute the value of a xed function F(x 1 ; ; x n) in such way that at the end of the protocol every player knows the value F(x 1 ; ; x n). Each pair of players is connected by a secure point-to-point communication channel. The players have unbounded computational resources and they...
متن کامل