Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1007/11586821_22guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Generalized strong extractors and deterministic privacy amplification

Published: 19 December 2005 Publication History

Abstract

Extracting essentially uniform randomness from a somewhat random source X is a crucial operation in various applications, in particular in cryptography where an adversary usually possesses some partial information about X. In this paper we formalize and study the most general form of extracting randomness in such a cryptographic setting. Our notion of strong extractors captures in particular the case where the catalyst randomness is neither uniform nor independent of the actual extractor input. This is for example important for privacy amplification, where a uniform cryptographic key is generated by Alice and Bob sharing some partially secret information X by exchanging a catalyst R over an insecure channel accessible to an adversary Eve. Here the authentication information for R creates, from Eve's viewpoint, a dependence between X and R. We provide explicit constructions for this setting based on strong blenders. In addition, we give strong deterministic randomness extractors for lists of random variables, where only an unknown subset of the variables is required to have some amount of min-entropy.

References

[1]
M. Ajtai, L Babai, P. Hajnal, J. Komlos, P. Pudlak, V. Rodl, E. Szemeredi, and G. Turan. Two lower bounds for branching programs. In ACM Symposium on Theory of Computing, pages 30-38, 1986.
[2]
C. Bennett, G. Brassard, C. Crépeau, and U. Maurer. Generalized privacy amplification. IEEE Transaction on Information Theory, 41(6):1915-1923, November 1995.
[3]
C. Bennett, G. Brassard, and J. Robert. Privacy amplification by public discussion. SIAM Journal on Computing, 17(2):210-229, 1988.
[4]
B. Barak, R. Impagliazzo, and A. Wigderson. Extracting randomness from few independent sources. In IEEE Symposium on Foundations of Computer Science (FOCS), 2004.
[5]
B. Barak, G. Kindler, R. Shaltiel, B. Sudakov, and A. Wigderson. Simulating independence: New constructions of condensers, ramsey graphs, dispersers, and extractors. In STOC '05: Proceedings of the thirty-seventh annual ACM symposium on Theory of computing, pages 1-10, 2005.
[6]
M. Blum. Independent unbiased coin flips from a correlated biased source: a finite state markov chain. IEEE Symposium on the Foundations of Computer Science, 1984.
[7]
B. Chor and O. Goldreich. Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM Journal On Computing, 17(2):230-261, April 1988.
[8]
B. Chor, O. Goldreich, J. Håstad, J. Freidmann, S. Rudich, and R. Smolensky. The bit extraction problem or t-resilient functions. In IEEE Symposium on Foundations of Computer Science (FOCS), 1985.
[9]
A. Cohen and A. Wigderson. Dispersers, deterministic amplification, and weak random sources (extended abstract). In IEEE Symposium on Foundations of Computer Science (FOCS), pages 14-19, 1989.
[10]
Y. Dodis, A. Elbaz, R. Oliveira, and R. Raz. Improved randomness extraction from two independent sources. International Workshop on Randomization and Approximation Techniques in Computer Science (RANDOM), August 2004.
[11]
Y. Dodis and R. Oliveira. On extracting private randomness over a public channel. International Workshop on Randomization and Approximation Techniques in Computer Science (RANDOM), pages 143-154, August 2003.
[12]
Y. Dodis. Exposure-Resilient Cryptography. PhD thesis, Massachussetts Institute of Technology, August 2000.
[13]
Y. Dodis, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Advances in Cryptology -- EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 523-539, May 2004.
[14]
Y. Dodis, A. Sahai, and A. Smith. On perfect and adaptive security in exposure-resilient cryptography. Lecture Notes in Computer Science, EUROCRYPT '01, 2045:301-324, 2001.
[15]
P. Elias. The efficient construction of an unbiased random sequence. Annals of Mathematics Statistics, 43(3):865-870, 1972.
[16]
A. Gabizon, R. Raz, and R. Shaltiel. Deterministic extractors for bitfixing sources by obtaining an independent seed. In IEEE Symposium on Foundations of Computer Science (FOCS), 2004.
[17]
J. Kamp and D. Zuckerman. Deterministic extractors for bit-fixing sources and exposure-resilient cryptography. In IEEE Symposium on Foundations of Computer Science, 2003.
[18]
C.J. Lee, C.J. Lu, S.C. Tsai, and W.G. Tzeng. Extracting randomness from multiple independent sources. IEEE Transaction on Information Theory, 51(6):2224-2227, June 2005.
[19]
U. Maurer and S. Wolf. Privacy amplification secure against active adversaries. In Advances in Cryptology -- CRYPTO '97, volume 1294 of Lecture Notes in Computer Science, pages 307-321, August 1997.
[20]
N. Nisan and D. Zuckerman. Randomness is linear in space. Journal of Computer and System Sciences, 52(1):43-52, 1996.
[21]
R. Raz. Extractors with weak random seeds. In STOC '05: Proceedings of the thirty-seventh annual ACM symposium on Theory of computing, pages 11-20, 2005.
[22]
O. Reingold, R. Shaltiel, and A. Wigderson. Extracting randomness via repeated condensing. In IEEE Symposium on Foundations of Computer Science (FOCS), pages 22-31, 2000.
[23]
R. Renner and S. Wolf. Unconditional authenticity and privacy from an arbitrarily weak secret. In Advances in Cryptology -- CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, pages 78-95, August 2003.
[24]
M. Saks. Randomization and derandomization in space-bounded computation. In SCT: Annual Conference on Structure in Complexity Theory, 1996.
[25]
R. Shaltiel. Recent developments in explicit constructions of extractors. Bulletin of the European Association for Theoretical Computer Science, 77:67-95, June 2002.
[26]
M. Santha and U.V. Vazirani. Generating quasi-random sequences from slightly random sources. Journal of Computer and System Sciences, 33:75- 87, 1986.
[27]
L. Trevisan and S. P. Vadhan. Extracting randomness from samplable distributions. In IEEE Symposium on Foundations of Computer Science (FOCS), pages 32-42, 2000.
[28]
U. Vazirani. Strong communcation complexity or generating quasi-random sequences from two communicating semi-random sources. Combinatorica, 7(4):375-392, 1987.
[29]
U. V. Vazirani. Efficiency considerations in using semi-random sources. In Proceedings of the nineteenth annual ACM conference on Theory of computing, pages 160-168, 1987.
[30]
U. V. Vazirani. Strong communication complexity or generating quasirandom sequences from two communicating semirandom sources. Combinatorica, 7(4):375-392, 1987.
[31]
J. von Neumann. Various techniques used in connection with random digits. Applied Math Series, 12:36-38, 1951.
[32]
D. Zuckerman. General weak random sources. In IEEE Symposium on Foundations of Computer Science (FOCS), pages 534-543, 1990.
[33]
D. Zuckerman. Simulating BPP using a general weak random source. In IEEE Symposium on Foundations of Computer Science (FOCS), pages 79-89, 1991.

Cited By

View all
  • (2020)Extractors for adversarial sources via extremal hypergraphsProceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing10.1145/3357713.3384339(1184-1197)Online publication date: 22-Jun-2020
  • (2012)Randomness condensers for efficiently samplable, seed-dependent sourcesProceedings of the 9th international conference on Theory of Cryptography10.1007/978-3-642-28914-9_35(618-635)Online publication date: 19-Mar-2012
  • (2011)An introduction to randomness extractorsProceedings of the 38th international conference on Automata, languages and programming - Volume Part II10.5555/2027223.2027226(21-41)Online publication date: 4-Jul-2011
  • Show More Cited By

Index Terms

  1. Generalized strong extractors and deterministic privacy amplification
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    IMA'05: Proceedings of the 10th international conference on Cryptography and Coding
    December 2005
    459 pages
    ISBN:354030276X
    • Editor:
    • Nigel P. Smart

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 19 December 2005

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 03 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2020)Extractors for adversarial sources via extremal hypergraphsProceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing10.1145/3357713.3384339(1184-1197)Online publication date: 22-Jun-2020
    • (2012)Randomness condensers for efficiently samplable, seed-dependent sourcesProceedings of the 9th international conference on Theory of Cryptography10.1007/978-3-642-28914-9_35(618-635)Online publication date: 19-Mar-2012
    • (2011)An introduction to randomness extractorsProceedings of the 38th international conference on Automata, languages and programming - Volume Part II10.5555/2027223.2027226(21-41)Online publication date: 4-Jul-2011
    • (2010)Deterministic extractors for independent-symbol sourcesIEEE Transactions on Information Theory10.1109/TIT.2010.207901256:12(6501-6512)Online publication date: 1-Dec-2010
    • (2006)Deterministic extractors for small-space sourcesProceedings of the thirty-eighth annual ACM symposium on Theory of Computing10.1145/1132516.1132613(691-700)Online publication date: 21-May-2006
    • (2006)Deterministic extractors for independent-symbol sourcesProceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part I10.1007/11786986_9(84-95)Online publication date: 10-Jul-2006

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media