๐ฎ
๐ฎ
The Ethereal
Improved Non-Malleable Extractors, Non-Malleable Codes and Independent Source Extractors
July 30, 2016 ยท The Ethereal ยท ๐ Electron. Colloquium Comput. Complex.
"No code URL or promise found in abstract"
Evidence collected by the PWNC Scanner
Authors
Xin Li
arXiv ID
1608.00127
Category
cs.CC: Computational Complexity
Cross-listed
cs.CR
Citations
117
Venue
Electron. Colloquium Comput. Complex.
Last Checked
1 month ago
Abstract
In this paper we give improved constructions of several central objects in the literature of randomness extraction and tamper-resilient cryptography. Our main results are: (1) An explicit seeded non-malleable extractor with error $ฮต$ and seed length $d=O(\log n)+O(\log(1/ฮต)\log \log (1/ฮต))$, that supports min-entropy $k=ฮฉ(d)$ and outputs $ฮฉ(k)$ bits. Combined with the protocol in \cite{DW09}, this gives a two round privacy amplification protocol with optimal entropy loss in the presence of an active adversary, for all security parameters up to $ฮฉ(k/\log k)$. (2) An explicit non-malleable two-source extractor for min-entropy $k \geq (1-ฮณ)n$, some constant $ฮณ>0$, that outputs $ฮฉ(k)$ bits with error $2^{-ฮฉ(n/\log n)}$. Combined with the connection in \cite{CG14b} this gives a non-malleable code in the two-split-state model with relative rate $ฮฉ(1/\log n)$. This exponentially improves previous constructions, all of which only achieve rate $n^{-ฮฉ(1)}$.\footnote{The work of Aggarwal et. al \cite{ADKO15} had a construction which "achieves" constant rate, but recently the author found an error in their proof.} (3)A two-source extractor for min-entropy $O(\log n \log \log n)$, which also implies a $K$-Ramsey graph on $N$ vertices with $K=(\log N)^{O(\log \log \log N)}$. We also obtain a seeded non-malleable $9$-source extractor with optimal seed length, which in turn gives a $10$-source extractor for min-entropy $O(\log n)$. Previously the best known extractor for such min-entropy requires $O(\log \log n)$ sources \cite{CohL16}. Independent of our work, Cohen \cite{Cohen16} obtained similar results to (1) and the two-source extractor, except the dependence on $ฮต$ is $\log(1/ฮต)(\log \log (1/ฮต))^{O(1)}$ and the two-source extractor requires min-entropy $\log n (\log \log n)^{O(1)}$.
Community Contributions
Found the code? Know the venue? Think something is wrong? Let us know!
๐ Similar Papers
In the same crypt โ Computational Complexity
๐ฎ
๐ฎ
The Ethereal
An Exponential Separation Between Randomized and Deterministic Complexity in the LOCAL Model
๐ฎ
๐ฎ
The Ethereal
The Parallelism Tradeoff: Limitations of Log-Precision Transformers
๐ฎ
๐ฎ
The Ethereal
The Hardness of Approximation of Euclidean k-means
๐ฎ
๐ฎ
The Ethereal
Slightly Superexponential Parameterized Problems
๐ฎ
๐ฎ
The Ethereal