Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3357713.3384339acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
research-article

Extractors for adversarial sources via extremal hypergraphs

Published: 22 June 2020 Publication History

Abstract

Randomness extraction is a fundamental problem that has been studied for over three decades. A well-studied setting assumes that one has access to multiple independent weak random sources, each with some entropy. However, this assumption is often unrealistic in practice. In real life, natural sources of randomness can produce samples with no entropy at all or with unwanted dependence. Motivated by this and applications from cryptography, we initiate a systematic study of randomness extraction for the class of adversarial sources defined as follows.
A weak source X of the form X 1, …, X N , where each X i is on n bits, is an (N,K,n,k)-source of locality d if the following hold: (1) Somewhere good sources: at least K of the X i ’s are independent, and each contains min-entropy at least k. We call these X i ’s good sources, and their locations are unknown. (2) Bounded dependence: each remaining (bad) source can depend arbitrarily on at most d good sources.
We focus on constructing extractors with negligible error, in the regime where most of the entropy is contained within a few sources instead of across many (i.e., k is at least polynomial in K). In this setting, even for the case of 0-locality, very little is known prior to our work. For d=1, essentially no previous results are known. We present various new extractors for adversarial sources in a wide range of parameters, and some of our constructions work for locality d=K Ω(1). As an application, we also give improved extractors for small-space sources.
The class of adversarial sources generalizes several previously studied classes of sources, and our explicit extractor constructions exploit tools from recent advances in extractor machinery, such as two-source non-malleable extractors and low-error condensers. Thus, our constructions can be viewed as a new application of non-malleable extractors. In addition, our constructions combine the tools from extractor theory in a novel way through various sorts of explicit extremal hypergraphs. These connections leverage recent progress in combinatorics, such as improved bounds on cap sets and explicit constructions of Ramsey graphs, and may be of independent interest.

References

[1]
[Alo86] Noga Alon. Eigenvalues, geometric expanders, sorting in rounds, and ramsey theory. Combinatorica, 6 ( 3 ): 207-219, 1986.
[2]
[AOR+19] Divesh Aggarwal, Maciej Obremski, Joao Ribeiro, Luisa Siniscalchi, and Ivan Visconti. How to extract useful randomness from unreliable sources. Cryptology ePrint Archive: Report 2019 /1156, 2019.
[3]
[BACDTS19] Avraham Ben-Aroya, Gil Cohen, Dean Doron, and Amnon Ta-Shma.
[4]
Two-source condensers with low error and small entropy gap via entropy-resilient functions. In Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (APPROX/RANDOM 2019 ). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, 2019.
[5]
[BADTS17] Avraham Ben-Aroya, Dean Doron, and Amnon Ta-Shma. An eficient reduction from two-source to non-malleable extractors: achieving nearlogarithmic min-entropy. In Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, pages 1185-1194. ACM, 2017.
[6]
[BDT18] Avraham Ben-Aroya, Dean Doron, and Amnon Ta-Shma. Near-optimal strong dispersers, erasure list-decodable codes and friends. Electronic Colloquium on Computational Complexity (ECCC), 25 : 65, 2018.
[7]
[BGM20] Marshall Ball, Oded Goldreich, and Tal Malkin. Randomness extraction from somewhat dependent sources. 2020.
[8]
[BIW06] Boaz Barak, Russell Impagliazzo, and Avi Wigderson. Extracting randomness using few independent sources. SIAM Journal on Computing, 36 ( 4 ): 1095-1118, 2006.
[9]
[BKS+05] Boaz Barak, Guy Kindler, Ronen Shaltiel, Benny Sudakov, and Avi Wigderson. Simulating independence: New constructions of condensers, ramsey graphs, dispersers, and extractors. In Proceedings of the thirtyseventh annual ACM symposium on Theory of computing, pages 1-10.
[10]
ACM, 2005.
[11]
[Bou05] J. Bourgain. More on the sum-product phenomenon in prime fields and its applications. International Journal of Number Theory, 01 ( 01 ): 1-32, 2005.
[12]
[Bou07] Jean Bourgain. On the construction of afine extractors. GAFA Geometric And Functional Analysis, 17 ( 1 ): 33-57, 2007.
[13]
[CG88] Benny Chor and Oded Goldreich. Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM Journal on Computing, 17 ( 2 ): 230-261, 1988.
[14]
[CG14] Mahdi Cheraghchi and Venkatesan Guruswami. Non-malleable coding against bit-wise and split-state tampering. In Theory of Cryptography Conference, pages 440-464. Springer, 2014.
[15]
[CGH+85] Benny Chor, Oded Goldreich, Johan Hasted, Joel Freidmann, Steven Rudich, and Roman Smolensky. The bit extraction problem or t-resilient functions. In 26th Annual Symposium on Foundations of Computer Science (sfcs 1985 ), pages 396-407. IEEE, 1985.
[16]
[CGL16] Eshan Chattopadhyay, Vipul Goyal, and Xin Li. Non-malleable extractors and codes, with their many tampered extensions. In Proceedings of the forty-eighth annual ACM symposium on Theory of Computing, pages 285-298. ACM, 2016.
[17]
[CL16a] Eshan Chattopadhyay and Xin Li. Explicit non-malleable extractors, multi-source extractors, and almost optimal privacy amplification protocols. In 2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS), pages 158-167. IEEE, 2016.
[18]
[CL16b] Eshan Chattopadhyay and Xin Li. Extractors for sumset sources. In Proceedings of the forty-eighth annual ACM symposium on Theory of Computing, pages 299-311. ACM, 2016.
[19]
[CLP17] Ernie Croot, Vsevolod F Lev, and Péter Pál Pach. Progression-free sets in are exponentially small. Annals of Mathematics, pages 331-337, 2017.
[20]
[Coh16a] Gil Cohen. Local correlation breakers and applications to three-source extractors and mergers. SIAM Journal on Computing, 45 ( 4 ): 1297-1338, 2016.
[21]
[Coh16b] Gil Cohen. Making the most of advice: New correlation breakers and their applications. In 2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS), pages 188-196. IEEE, 2016.
[22]
[Coh17] Gil Cohen. Towards optimal two-source extractors and ramsey graphs.
[23]
In Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, pages 1157-1170. ACM, 2017.
[24]
[CPS07] Ran Canetti, Rafael Pass, and Abhi Shelat. Cryptography from sunspots: How to use an imperfect reference string. In 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07), pages 249-259.
[25]
IEEE, 2007.
[26]
[CZ19] Eshan Chattopadhyay and David Zuckerman. Explicit two-source extractors and resilient functions. Annals of Mathematics, 189 ( 3 ): 653-705, 2019.
[27]
[DGW09] Zeev Dvir, Ariel Gabizon, and Avi Wigderson. Extractors and rank extractors for polynomial sources. Computational Complexity, 18 ( 1 ): 1-58, 2009.
[28]
[DKSS13] Zeev Dvir, Swastik Kopparty, Shubhangi Saraf, and Madhu Sudan. Extensions to the method of multiplicities, with applications to kakeya sets and mergers. SIAM Journal on Computing, 42 ( 6 ): 2305-2328, 2013.
[29]
[DOPS04] Yevgeniy Dodis, Shien Jin Ong, Manoj Prabhakaran, and Amit Sahai.
[30]
On the (im) possibility of cryptography with imperfect randomness. In 45th Annual IEEE Symposium on Foundations of Computer Science, pages 196-205. IEEE, 2004.
[31]
[Dvi12] Zeev Dvir. Extractors for varieties. Computational complexity, 21 ( 4 ): 515-572, 2012.
[32]
[Ede04] Yves Edel. Extensions of generalized product caps. Designs, Codes and Cryptography, 31 ( 1 ): 5-14, 2004.
[33]
[EG17] Jordan S Ellenberg and Dion Gijswijt. On large subsets of with no threeterm arithmetic progression. Annals of Mathematics, pages 339-343, 2017.
[34]
[GGJS11] Sanjam Garg, Vipul Goyal, Abhishek Jain, and Amit Sahai. Bringing people of diferent beliefs together to do uc. In Theory of Cryptography Conference, pages 311-328. Springer, 2011.
[35]
[GK08] Vipul Goyal and Jonathan Katz. Universally composable multi-party computation with an unreliable common reference string. In Theory of Cryptography Conference, pages 142-154. Springer, 2008.
[36]
[GO14] Jens Groth and Rafail Ostrovsky. Cryptography in the multi-string model. Journal of Cryptology, 27 ( 3 ): 506-543, 2014.
[37]
[GRS06] Ariel Gabizon, Ran Raz, and Ronen Shaltiel. Deterministic extractors for bit-fixing sources by obtaining an independent seed. SIAM Journal on Computing, 36 ( 4 ): 1072-1094, 2006.
[38]
[GSZ19] Vipul Goyal, Akshayaram Srinivasan, and Chenzhi Zhu. Multi-source non-malleable extractors and applications. manuscript, 2019.
[39]
[GUV09] Venkatesan Guruswami, Christopher Umans, and Salil Vadhan. Unbalanced expanders and randomness extractors from parvaresh-vardy codes. Journal of the ACM (JACM), 56 ( 4 ): 20, 2009.
[40]
[KKL88] Jef Kahn, Gil Kalai, and Nathan Linial. The influence of variables on boolean functions. In [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science, pages 68-80. IEEE, 1988.
[41]
[KM05] Robert Koenig and Ueli Maurer. Generalized strong extractors and deterministic privacy amplification. In IMA International Conference on Cryptography and Coding, pages 322-339. Springer, 2005.
[42]
[KRVZ06] Jesse Kamp, Anup Rao, Salil Vadhan, and David Zuckerman. Deterministic extractors for small-space sources. In Proceedings of the thirty-eighth annual ACM symposium on Theory of computing, pages 691-700. ACM, 2006.
[43]
[KZ06] Jesse Kamp and David Zuckerman. Deterministic extractors for bitifxing sources and exposure-resilient cryptography. SIAM Journal on Computing, 36 ( 5 ): 1231-1247, 2006.
[44]
[Lew19] Mark Lewko. An explicit two-source extractor with min-entropy rate near 4/9. Mathematika, 65 ( 4 ): 950-957, 2019.
[45]
[Li11a] Xin Li. Improved constructions of three source extractors. In 2011 IEEE 26th Annual Conference on Computational Complexity, pages 126-136.
[46]
IEEE, 2011.
[47]
[Li11b] Xin Li. A new approach to afine extractors and dispersers. In Proceedings of the 26th Annual IEEE Conference on Computational Complexity, pages 137-147, 2011.
[48]
[Li13a] Xin Li. Extractors for a constant number of independent sources with polylogarithmic min-entropy. In 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, pages 100-109. IEEE, 2013.
[49]
[Li13b] Xin Li. New independent source extractors with exponential improvement. In Proceedings of the forty-fifth annual ACM Symposium on Theory of Computing, pages 783-792. ACM, 2013.
[50]
[Li15a] Xin Li. Non-malleable condensers for arbitrary min-entropy, and almost optimal protocols for privacy amplification. In Theory of Cryptography Conference, pages 502-531. Springer, 2015.
[51]
[Li15b] Xin Li. Three-source extractors for polylogarithmic min-entropy. In 2015 IEEE 56th Annual Symposium on Foundations of Computer Science, pages 863-882. IEEE, 2015.
[52]
[Li15c] Xin Li. Three-source extractors for polylogarithmic min-entropy. In 2015 IEEE 56th Annual Symposium on Foundations of Computer Science, pages 863-882. IEEE, 2015.
[53]
[Li16] Xin Li. Improved two-source extractors, and afine extractors for polylogarithmic entropy. In 2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS), pages 168-177. IEEE, 2016.
[54]
[Li17] Xin Li. Improved non-malleable extractors, non-malleable codes and independent source extractors. In Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, pages 1144-1156. ACM, 2017.
[55]
[Li19] Xin Li. Non-malleable extractors and non-malleable codes: Partially optimal constructions. In 34th Computational Complexity Conference, CCC 2019, July 18-20, 2019, New Brunswick, NJ, USA., pages 28 : 1-28 : 49, 2019.
[56]
[LPV09] Huijia Lin, Rafael Pass, and Muthuramakrishnan Venkitasubramaniam.
[57]
A unified framework for concurrent security: universal composability from stand-alone non-malleability. In Proceedings of the forty-first annual ACM symposium on Theory of computing, pages 179-188. ACM, 2009.
[58]
[LRVW03] Chi-Jen Lu, Omer Reingold, Salil Vadhan, and Avi Wigderson. Extractors: Optimal up to constant factors. In Proceedings of the thirty-fifth annual ACM symposium on Theory of computing, pages 602-611. ACM, 2003.
[59]
[Mek17] Raghu Meka. Explicit resilient functions matching ajtai-linial. In Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, pages 1132-1148. SIAM, 2017.
[60]
[MW97] Ueli Maurer and Stefan Wolf. Privacy amplification secure against active adversaries. In Annual International Cryptology Conference, pages 307-321. Springer, 1997.
[61]
[Rao09a] Anup Rao. Extractors for a constant number of polynomially small minentropy independent sources. SIAM Journal on Computing, 39 ( 1 ): 168-194, 2009.
[62]
[Rao09b] Anup Rao. Extractors for low-weight afine sources. In 2009 24th Annual IEEE Conference on Computational Complexity, pages 95-101. IEEE, 2009.
[63]
[Raz05] Ran Raz. Extractors with weak random seeds. In Proceedings of the thirty-seventh annual ACM symposium on Theory of computing, pages 11-20. ACM, 2005.
[64]
[RŠ94] Vojtěch Rödl and Edita Šinajová. Note on independent sets in steiner systems. Random Structures & Algorithms, 5 ( 1 ): 183-190, 1994.
[65]
[TV00] Luca Trevisan and Salil Vadhan. Extracting randomness from samplable distributions. In Proceedings 41st Annual Symposium on Foundations of Computer Science, pages 32-42. IEEE, 2000.
[66]
[Vaz85] Umesh V Vazirani. Towards a strong communication complexity theory or generating quasi-random sequences from two communicating slightly-random sources. In Proceedings of the seventeenth annual ACM symposium on Theory of computing, pages 366-378. ACM, 1985.
[67]
[Vio14] Emanuele Viola. Extractors for circuit sources. SIAM Journal on Computing, 43 ( 2 ): 655-672, 2014.
[68]
[Yeh11] Amir Yehudayof. Afine extractors over prime fields. Combinatorica, 31 ( 2 ): 245-256, 2011.

Cited By

View all
  • (2022)Recent Advances in Randomness ExtractionEntropy10.3390/e2407088024:7(880)Online publication date: 26-Jun-2022
  • (2022)Privacy Amplification With Tamperable Memory via Non-Malleable Two-Source ExtractorsIEEE Transactions on Information Theory10.1109/TIT.2022.316740468:8(5475-5495)Online publication date: Aug-2022
  • (2022)Improved Extractors for Small-Space Sources2021 IEEE 62nd Annual Symposium on Foundations of Computer Science (FOCS)10.1109/FOCS52979.2021.00066(610-621)Online publication date: Feb-2022
  • Show More Cited By

Index Terms

  1. Extractors for adversarial sources via extremal hypergraphs

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    STOC 2020: Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing
    June 2020
    1429 pages
    ISBN:9781450369794
    DOI:10.1145/3357713
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 22 June 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Ramsey graphs
    2. cap sets
    3. explicit constructions
    4. extremal hypergraphs
    5. non-malleable extractors
    6. randomness extractors

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    STOC '20
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)6
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 03 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Recent Advances in Randomness ExtractionEntropy10.3390/e2407088024:7(880)Online publication date: 26-Jun-2022
    • (2022)Privacy Amplification With Tamperable Memory via Non-Malleable Two-Source ExtractorsIEEE Transactions on Information Theory10.1109/TIT.2022.316740468:8(5475-5495)Online publication date: Aug-2022
    • (2022)Improved Extractors for Small-Space Sources2021 IEEE 62nd Annual Symposium on Foundations of Computer Science (FOCS)10.1109/FOCS52979.2021.00066(610-621)Online publication date: Feb-2022
    • (2021)Improved Computational Extractors and Their ApplicationsAdvances in Cryptology – CRYPTO 202110.1007/978-3-030-84252-9_19(566-594)Online publication date: 16-Aug-2021
    • (2021)Multi-source Non-malleable Extractors and ApplicationsAdvances in Cryptology – EUROCRYPT 202110.1007/978-3-030-77886-6_16(468-497)Online publication date: 16-Jun-2021
    • (2020)Extractors and Secret Sharing Against Bounded Collusion Protocols2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS)10.1109/FOCS46700.2020.00117(1226-1242)Online publication date: Nov-2020

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media