Generalized Strong Extractors and Deterministic Privacy Amplification

作者: Robert König , Ueli Maurer

DOI: 10.1007/11586821_22

关键词:

摘要: Extracting essentially uniform randomness from a somewhat random source X is crucial operation in various applications, particular cryptography where an adversary usually possesses some partial information about X. In this paper we formalize and study the most general form of extracting such cryptographic setting. Our notion strong extractors captures case catalyst neither nor independent actual extractor input. This for example important privacy amplification, key generated by Alice Bob sharing partially secret exchanging R over insecure channel accessible to Eve. Here authentication creates, Eve's viewpoint, dependence between R. We provide explicit constructions setting based on blenders. addition, give deterministic lists variables, only unknown subset variables required have amount min-entropy.

参考文章(38)
Madhu Sudan, Yevgeniy Dodis, Exposure-resilient cryptography Massachusetts Institute of Technology. ,(2000)
Yevgeniy Dodis, Roberto Oliveira, On Extracting Private Randomness over a Public Channel randomization and approximation techniques in computer science. pp. 252- 263 ,(2003) , 10.1007/978-3-540-45198-3_22
Yevgeniy Dodis, Amit Sahai, Adam Smith, On Perfect and Adaptive Security in Exposure-Resilient Cryptography theory and application of cryptographic techniques. pp. 301- 324 ,(2001) , 10.1007/3-540-44987-6_19
Yevgeniy Dodis, Ariel Elbaz, Roberto Oliveira, Ran Raz, Improved Randomness Extraction from Two Independent Sources Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques. ,vol. 3122, pp. 334- 344 ,(2004) , 10.1007/978-3-540-27821-4_30
Ronen Shaltiel, Recent Developments in Explicit Constructions of Extractors. Bulletin of The European Association for Theoretical Computer Science. ,vol. 77, pp. 67- 95 ,(2002)
M. Santha, U.V. Vazirani, Generating Quasi-Random Sequences From Slightly-Random Sources 25th Annual Symposium onFoundations of Computer Science, 1984.. pp. 434- 440 ,(1984) , 10.1109/SFCS.1984.715945
Ran Raz, Extractors with weak random seeds Proceedings of the thirty-seventh annual ACM symposium on Theory of computing - STOC '05. pp. 11- 20 ,(2005) , 10.1145/1060590.1060593
Miklos Santha, Umesh V. Vazirani, Generating quasi-random sequences from semi-random sources Journal of Computer and System Sciences. ,vol. 33, pp. 75- 87 ,(1986) , 10.1016/0022-0000(86)90044-9
Charles H. Bennett, Gilles Brassard, Jean-Marc Robert, Privacy amplification by public discussion SIAM Journal on Computing. ,vol. 17, pp. 210- 229 ,(1988) , 10.1137/0217014
A. Cohen, A. Wigderson, Dispersers, deterministic amplification, and weak random sources foundations of computer science. pp. 14- 19 ,(1989) , 10.1109/SFCS.1989.63449