Non-malleable Extractors with Shorter Seeds and Their Applications

被引:0
作者
Yao, Yanqing [1 ,2 ]
Li, Zhoujun [1 ,2 ]
机构
[1] Beihang Univ, Sch Comp Sci & Engn, Beijing 100191, Peoples R China
[2] Beihang Univ, Beijing Key Lab Network Technol, Beijing 100191, Peoples R China
来源
PROGRESS IN CRYPTOLOGY - INDOCRYPT 2015 | 2015年 / 9462卷
关键词
Extractors; Non-malleable extractors; Seed length; Privacy amplification protocol; KEY AGREEMENT; PRIVACY AMPLIFICATION; RANDOMNESS; CONSTRUCTIONS;
D O I
10.1007/978-3-319-26617-6_16
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Motivated by the problem of how to communicate over a public channel with an active adversary, Dodis and Wichs (STOC' 09) introduced the notion of a non-malleable extractor. A non-malleable extractor nmExt : {0, 1}(n) x{0, 1}(d) -> {0, 1}(m) takes two inputs, a weakly-random W and a uniformly random seed S, and outputs a string which is nearly uniform, given S as well as nmExt(W, A(S)), for an arbitrary function A with A(S) not equal S. In this paper, by developing the combination and permutation techniques, we improve the error estimation of the extractor of Raz (STOC' 05), which plays an extremely important role in the constraints of the non-malleable extractor parameters including seed length. Then we present improved explicit construction of non-malleable extractors. Though our construction is the same as that given by Cohen, Raz and Segev (CCC' 12), the parameters are improved. More precisely, we construct an explicit (1016, 1/2)-non-malleable extractor nmExt : {0, 1}(n) x {0, 1}(d) -> {0, 1} with n = 2(10) and seed length d = 19, while Cohen et al. showed that the seed length is no less than 46/63 + 66. Therefore, our method beats the condition "2.01 . log n <= d <= n" proposed by Cohen et al., since d is just 1.9 . log n in our construction. We also improve the parameters of the general explicit construction given by Cohen et al. Finally, we give their applications to privacy amplification.
引用
收藏
页码:293 / 311
页数:19
相关论文
共 24 条
[1]   SIMPLE CONSTRUCTIONS OF ALMOST K-WISE INDEPENDENT RANDOM-VARIABLES [J].
ALON, N ;
GOLDREICH, O ;
HASTAD, J ;
PERALTA, R .
RANDOM STRUCTURES & ALGORITHMS, 1992, 3 (03) :289-304
[2]  
[Anonymous], 2010, J ACM
[3]   MORE ON THE SUM-PRODUCT PHENOMENON IN PRIME FIELDS AND ITS APPLICATIONS [J].
Bourgain, J. .
INTERNATIONAL JOURNAL OF NUMBER THEORY, 2005, 1 (01) :1-32
[4]  
Chandran N, 2010, ACM S THEORY COMPUT, P785
[5]  
Cheraghchi M, 2014, LECT NOTES COMPUT SC, V8349, P440, DOI 10.1007/978-3-642-54242-8_19
[6]   UNBIASED BITS FROM SOURCES OF WEAK RANDOMNESS AND PROBABILISTIC COMMUNICATION COMPLEXITY [J].
CHOR, B ;
GOLDREICH, O .
SIAM JOURNAL ON COMPUTING, 1988, 17 (02) :230-261
[7]   Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification [J].
Cohen, Gil ;
Raz, Ran ;
Segev, Gil .
2012 IEEE 27TH ANNUAL CONFERENCE ON COMPUTATIONAL COMPLEXITY (CCC), 2012, :298-308
[8]  
Dodis Y, 2006, LECT NOTES COMPUT SC, V4117, P232
[9]  
Dodis Y, 2013, LECT NOTES COMPUT SC, V7785, P1, DOI 10.1007/978-3-642-36594-2_1
[10]   Privacy Amplification and Non-Malleable Extractors Via Character Sums [J].
Dodis, Yevgeniy ;
Li, Xin ;
Wooley, Trevor D. ;
Zuckerman, David .
2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011, :668-677