680 likes | 826 Views
Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification. Gil Cohen Weizmann Institute Joint work with Ran Raz and Gil Segev. Randomness Seeded-Extractors. Randomness Seeded-Extractors. truly random bits (seed). bits from an imperfect source
E N D
Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification Gil Cohen Weizmann Institute Joint work with Ran Razand Gil Segev
Randomness Seeded-Extractors
Randomness Seeded-Extractors truly random bits (seed) bits from an imperfect source of randomness Ext almost-truly random bits
Randomness Seeded-Extractors If all points has probability , the source is called an-source. truly random bits (seed) bits from an imperfect source of randomness Ext almost-truly random bits For simplicity, think of it as “uniform hidden bits”.
Randomness Seeded-Extractors Measured in statistical distance. truly random bits (seed) bits from an imperfect source of randomness Ext almost-truly random bits
Strong Seeded-Extractors For any -source and independent is called strongif
Parameters Given • Maximize • Minimize Non-Constructive and Optimal [Sips88], [RTS00] truly random bits (seed) bits from an -source Ext almost-truly random bits Almost matching explicit constructions (…,[LRVW03],[GUV07] ,[DW08],[DKSS09]).
Defined by[DW09] Non-Malleable Extractors
Non-Malleable Extractors with no fixed point.
ANotNon-Malleable Extractor Expanders are low-degree undirected graphs that “look random”. Are known to induce extractors. Nodes Labeled neighbors (think of 1-16).
Non-Constructive[DW09] • Seed length • Output length Compared with strong extractors • Seed length • Output length
Non-Constructive[DW09] • Seed length • Output length Compared with strong extractors • Seed length • Output length
Non-Constructive[DW09] • Seed length • Output length Compared with strong extractors • Seed length • Output length
The Explicit Construction of [DLWZ11] • Conditional efficiency
The Explicit Construction of[DLWZ11] • Conditional efficiency
The Explicit Construction of[DLWZ11] • Conditional efficiency
The Explicit Construction of[DLWZ11] • Conditional efficiency
Main Result • Unconditionally efficient
Main Result • Unconditionally efficient
Main Result • Unconditionally efficient
Main Result • Unconditionally efficient
Main Result • Unconditionally efficient
Privacy Amplification - passive adversary - [BBR88], [Mau92],[BBCM95]
is an -source Alice Bob =? Computationally unbounded! Eve
Interesting Measures • Entropy loss • Communication complexity • Number of rounds Alice Bob =? Eve
Interesting Measures • Entropy loss • Communication complexity • Number of rounds Alice Bob from Eve’s point of view =? Eve
Interesting Measures • Entropy loss • Communication complexity • Number of rounds Alice Bob Number of communicated bits =? Eve
Interesting Measures • Entropy loss • Communication complexity • Number of rounds Alice Bob =? Eve
Strong Extractors to the Rescue • Entropy loss • Communication complexity • Number of rounds s
Privacy Amplification -active adversary - [Mau97],[MM97],[Wol98],[MW03],[RW03],[DKRS06],[DW09],[KR09],[CKOR10]
Privacy Amplification Protocol Active Adversary • Correctness • Privacy • Authenticity
Privacy Amplification Protocol Active Adversary • Correctness • Privacy • Authenticity If both parties are honest then they agree.
Privacy Amplification Protocol Active Adversary • Correctness • Privacy • Authenticity For any Eve, from Eve’s view.
Privacy Amplification Protocol Active Adversary • Correctness • Privacy • Authenticity For any Eve, .
Privacy Amplification Protocols [DS02, DW09] 1 round requires [RW03] gave rounds for [CKOR10] gave rounds for
The Extractor of [Raz05]