Extracting Correlations

被引:32
作者
Ishai, Yuval [1 ,2 ]
Kushilevitz, Eyal [1 ,2 ]
Ostrovsky, Rafail [2 ,3 ]
Sahai, Amit [2 ]
机构
[1] Technion Israel Inst Technol, Dept Comp Sci, IL-32000 Haifa, Israel
[2] Univ Calif Los Angeles, Dept Comp Sci, Los Angeles, CA 90024 USA
[3] Univ Calif Los Angeles, Dept Math, Los Angeles, CA USA
来源
2009 50TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE: FOCS 2009, PROCEEDINGS | 2009年
基金
美国国家科学基金会;
关键词
randomness extractors; secure computation; oblivious transfer; noisy channels; leakage-resilient cryptography; PRIVACY AMPLIFICATION;
D O I
10.1109/FOCS.2009.56
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Motivated by applications in cryptography, we consider a generalization of randomness extraction and the related notion of privacy amplification to the case of two correlated sources. We introduce the notion of correlation extractors, which extract nearly perfect independent instances of a given joint distribution from imperfect, or "leaky," instances of the same distribution. More concretely, suppose that Alice holds a and Bob holds b, where (a, b) are obtained by taking n independent samples from a joint distribution (X, Y) and letting a include all X instances and b include all Y instances. An adversary Eve obtains partial information about (a, b) by choosing a function L with output length t and learning L(a, b). The goal is to design a protocol between Alice and Bob which may use additional fresh randomness, such that for every L as above the following holds. In the end of the interaction, Alice outputs a' and Bob outputs b' such that (a', b') are statistically indistinguishable from m independent instances of (X, Y) even when conditioned on Eve's view, and even when conditioned on the joint view of Eve together with either Alice or Bob. The standard questions of privacy amplification and randomness extraction correspond to the case where X and Y are identical random bits. In this work we address this question for other types of correlations. A central special case is that of OT extractors, which are correlation extractors for the correlation (X, Y) corresponding to the cryptographic primitive of oblivious transfer. Our main result is that for any finite joint distribution (X, Y) there is an explicit correlation extractor which extracts m = Omega(n) instances using O(n) bits of communication, even when t = Omega(n) bits of information can be leaked to Eve. We present several applications which motivate the concept of correlation extractors and our main result. These include: Protecting certain cryptographic protocols against side-channel attacks. A protocol which realizes m instances of oblivious transfer by communicating only O(m) bits. The security of the protocol relies on a number-theoretic intractability assumption. A constant-rate unconditionally secure construction of oblivious transfer (for semi-honest parties) from any nontrivial channel. This establishes constant-rate equivalence of any two nontrivial finite channels.
引用
收藏
页码:261 / 270
页数:10
相关论文
共 55 条
[1]  
AKAVIA A, TCC 2009, P474
[2]   RANDOM CAYLEY-GRAPHS AND EXPANDERS [J].
ALON, N ;
ROICHMAN, Y .
RANDOM STRUCTURES & ALGORITHMS, 1994, 5 (02) :271-284
[3]  
[Anonymous], TR81
[4]   Cryptography in NC0 [J].
Applebaum, Benny ;
Ishai, Yuval ;
Kushilevitz, Eyal .
SIAM JOURNAL ON COMPUTING, 2006, 36 (04) :845-888
[5]  
BEAVER D, FOCS 1989, P468
[6]  
BEAVER D, TCC 2009, P474
[7]  
Ben-Or M., STOC 88, P1
[8]   Generalized privacy amplification [J].
Bennett, CH ;
Brassard, G ;
Crepeau, C ;
Maurer, UM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (06) :1915-1923
[9]   PRIVACY AMPLIFICATION BY PUBLIC DISCUSSION [J].
BENNETT, CH ;
BRASSARD, G ;
ROBERT, JM .
SIAM JOURNAL ON COMPUTING, 1988, 17 (02) :210-229
[10]  
CACHIN C, FOCS 98, P493