Better short-seed quantum-proof extractors

被引:5
作者
Ben-Aroya, Avraham [1 ]
Ta-Shma, Amnon [1 ]
机构
[1] Tel Aviv Univ, Blavatnik Sch Comp Sci, IL-69978 Tel Aviv, Israel
基金
欧洲研究理事会; 以色列科学基金会;
关键词
Extractors; Quantum information; Privacy amplification; The bounded storage model; PRIVACY AMPLIFICATION; UNBALANCED EXPANDERS; KAKEYA SETS; RANDOMNESS; MERGERS;
D O I
10.1016/j.tcs.2011.11.036
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We construct a strong extractor against quantum storage that works for every min-entropy k, has logarithmic seed length, and outputs Omega(k) bits, provided that the quantum adversary has at most beta k qubits of memory, for any beta < 1/2. The construction works by first condensing the source (with minimal entropy-loss) and then applying an extractor that works well against quantum adversaries when the source is close to uniform. We also obtain an improved construction of a strong quantum-proof extractor in the high min-entropy regime. Specifically, we construct an extractor that uses a logarithmic seed length and extracts Omega(n) bits from any source over {0, 1}(n), provided that the min-entropy of the source conditioned on the quantum adversary's state is at least (1 - beta)n, for any beta < 1/2. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:17 / 25
页数:9
相关论文
共 27 条
[1]   Generalized privacy amplification [J].
Bennett, CH ;
Brassard, G ;
Crepeau, C ;
Maurer, UM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (06) :1915-1923
[2]   PRIVACY AMPLIFICATION BY PUBLIC DISCUSSION [J].
BENNETT, CH ;
BRASSARD, G ;
ROBERT, JM .
SIAM JOURNAL ON COMPUTING, 1988, 17 (02) :210-229
[3]  
Capalbo M., 2002, P 34 ANN ACM S THEOR, P659, DOI [10.1145/509907, DOI 10.1145/509907, DOI 10.1145/509907.510003]
[4]  
Christandl M., 2004, ARXIVQUANTPH0402131
[5]  
De A., 2010, P 42 ACM S THEOR COM
[6]  
De A., 2009, ARXIV09125514
[7]  
Dodis Y., 2005, P 37 ANN ACM S THEOR, P654, DOI DOI 10.1145/1060590.1060688
[8]   Extensions to the Method of Multiplicities, with applications to Kakeya Sets and Mergers [J].
Dvir, Zeev ;
Kopparty, Swastik ;
Saraf, Shubhangi ;
Sudan, Madhu .
2009 50TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE: FOCS 2009, PROCEEDINGS, 2009, :181-190
[9]   Kakeya sets, new mergers and old extractors [J].
Dvir, Zeev ;
Wigderson, Avi .
PROCEEDINGS OF THE 49TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2008, :625-+
[10]  
Fehr S., 2008, P 5 THEOR CRYPT C TC, P465