Pseudorandom Correlation Breakers, Independence Preserving Mergers and their Applications

نویسنده

  • Xin Li
چکیده

The recent line of study on randomness extractors has been a great success, resulting in exciting new techniques, new connections, and breakthroughs to long standing open problems in the following five seemingly different topics: seeded non-malleable extractors, privacy amplification protocols with an active adversary, independent source extractors (and explicit Ramsey graphs), non-malleable independent source extractors, and non-malleable codes in the split state model. Two key ingredients used in these works are correlation breakers and independence preserving mergers. By giving very efficient constructions of these two objects, we now have close to optimal solutions to the above five problems [Li17]: seeded non-malleable extractors with seed length and entropy requirement O(log n+ log(1/ ) log log(1/ )) for error ; two-round privacy amplification protocols with optimal entropy loss for security parameter up to Ω(k/ log k), where k is the entropy of the shared weak source; two-source extractors for entropy O(log n log log n); nonmalleable two-source extractors for entropy (1− γ)n with error 2−Ω(n/ log ; and non-malleable codes in the 2-split state model with rate Ω(1/ log n). However, in all cases there is still a small gap to optimum and the motivation to close this gap remains strong. On the other hand, previous techniques seem to have reached their limit and insufficient for this purpose. In this paper we introduce new techniques to recycle the entropy used in correlation breakers and independence preserving mergers. This allows us to break the barriers of previous techniques and give further improvements to the above problems. Specifically, we obtain the following results: (1) a seeded non-malleable extractor with seed length O(log n) + log(1/ ) and entropy requirement O(log log n + log(1/ )), where the entropy requirement is asymptotically optimal by a recent result of Gur and Shinkar [GS18]; (2) a two-round privacy amplification protocol with optimal entropy loss for security parameter up to Ω(k), which solves the privacy amplification problem completely; (3) a two-source extractor for entropy O( log n log log n log log log n ), which also gives an explicit Ramsey graph on N vertices with no clique or independent set of size (logN) log log log N log log log log N ; (4) a non-malleable two-source extractor for entropy (1 − γ)n with error 2−Ω(n log log n/ log ; and (5) non-malleable codes in the 2-split state model with rate Ω(log log n/ log n). Some of our techniques are similar in spirit to what has been done in previous constructions of pseudorandom generators for small space computation [Nis92, NZ96], and we believe they can be a promising way to eventually obtain optimal constructions to the five problems mentioned above. ∗Supported by NSF award CCF-1617713. Except for the communication complexity, which is of secondary concern to this problem. ISSN 1433-8092 Electronic Colloquium on Computational Complexity, Report No. 28 (2018)

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptographically Secure Bloom-Filters

In this paper, we propose a privacy-preserving variant of Bloom-filters. The Bloom-filter has many applications such as hash-based IP-traceback systems and Web cache sharing. In some of those applications, equipping the Bloom-filter with the privacy-preserving mechanism is crucial for the deployment. In this paper, we propose a cryptographically secure privacy-preserving Bloom-filter protocol. ...

متن کامل

Construction of Large Families of Pseudorandom Subsets of the Set {1, 2, ..., N} Using Elliptic Curves

Pseudo-random subsets of the set {1, 2, . . . , N} have many applications in the fields of network security, cryptography and other security issues. Recently, Dartyge and Sárközy investigated the measures–the well distribution measure and the correlation measure of order k–of pseudorandomness of subsets of the set {1, 2, . . . , N}, and they presented several constructive examples for subsets w...

متن کامل

Some applications of pairwise independence Research Seminar in Cryptography

This report provides a brief review of lectures given by Michael Luby and Avi Wigderson in 1995 on the topic of pairwise independence and derandomization. We show that BPP ⊂ ∆2 with a proof given by Sipser in 1983 and then exhibit different ways of recycling random bits given by Chor and Goldreich (1989), Nisan (1992), Impagliazzo and Zuckerman (1990), Karp, Pippenger and Sipser (1986) and by A...

متن کامل

Pseudorandom vector generation by the compound inversive method

Pseudorandom vectors are of importance for parallelized simulation methods. In this paper a detailed analysis of the compound inversive method for the generation of k-dimensional uniform pseudorandom vectors, a vector analog of the compound inversive method for pseudorandom number generation, is carried out. In particular, periodicity properties and statistical independence properties of the ge...

متن کامل

Keyword Search and Oblivious Pseudorandom Functions

We study the problem of privacy-preserving access to a database. Particularly, we consider the problem of privacy-preserving keyword search (KS), where records in the database are accessed according to their associated keywords and where we care for the privacy of both the client and the server. We provide efficient solutions for various settings of KS, based either on specific assumptions or o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Electronic Colloquium on Computational Complexity (ECCC)

دوره 25  شماره 

صفحات  -

تاریخ انتشار 2018