Complete Classification of Generalized Santha-Vazirani Sources
نویسندگان
چکیده
Let F be a finite alphabet and D be a finite set of distributions over F . A Generalized Santha-Vazirani (GSV) source of type (F ,D), introduced by Beigi, Etesami and Gohari (ICALP 2015, SICOMP 2017), is a random sequence (F1, . . . , Fn) in Fn, where Fi is a sample from some distribution d ∈ D whose choice may depend on F1, . . . , Fi−1. We show that all GSV source types (F ,D) fall into one of three categories: (1) non-extractable; (2) extractable with error n−Θ(1); (3) extractable with error 2−Ω(n). This rules out other error rates like 1/ logn or 2− √ . We provide essentially randomness-optimal extraction algorithms for extractable sources. Our algorithm for category (2) sources extracts with error ε from n = poly(1/ε) samples in time linear in n. Our algorithm for category (3) sources extracts m bits with error ε from n = O(m+log 1/ε) samples in time min{O(nm2m), nO(|F|)}. We also give algorithms for classifying a GSV source type (F ,D): Membership in category (1) can be decided in NP, while membership in category (3) is polynomialtime decidable.
منابع مشابه
Deterministic Randomness Extraction from Generalized and Distributed Santha-Vazirani Sources
A Santha-Vazirani (SV) source is a sequence of random bits where the conditional distribution of each bit, given the previous bits, can be partially controlled by an adversary. Santha and Vazirani show that deterministic randomness extraction from these sources is impossible. In this paper, we study the generalization of SV sources for non-binary sequences. We show that unlike the binary case, ...
متن کاملUnbiased Bits from Sources of Weak
? A new model for weak random physical sources is presented. The new model strictly generalizes previous models (e.g. the Santha and Vazirani model 24]). The sources considered output strings according to probability distributions in which no single string is too probable. The new model provides a fruitful viewpoint on problems studied previously as: Extracting almost perfect bits from sources ...
متن کاملDifferential Privacy with Imperfect Randomness
In this work we revisit the question of basing cryptography on imperfect randomness. Bosley and Dodis (TCC’07) showed that if a source of randomness R is “good enough” to generate a secret key capable of encrypting k bits, then one can deterministically extract nearly k almost uniform bits from R, suggesting that traditional privacy notions (namely, indistinguishability of encryption) requires ...
متن کاملPrivacy with Imperfect Randomness
We revisit the impossibility of a variety of cryptographic tasks including privacy and differential privacy with imperfect randomness. For traditional notions of privacy, such as security of encryption, commitment or secret sharing schemes, dramatic impossibility results are known [MP90,DOPS04] for several concrete sources R, including a (seemingly) very “nice and friendly” Santha-Vazirani (SV)...
متن کاملSecrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources
Cryptographic protocols are commonly designed and their security proven under the assumption that the protocol parties have access to perfect (uniform) randomness. Physical randomness sources deployed in practical implementations of these protocols often fall short in meeting this assumption, but instead provide only a steady stream of bits with certain high entropy. Trying to ground cryptograp...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Electronic Colloquium on Computational Complexity (ECCC)
دوره 24 شماره
صفحات -
تاریخ انتشار 2017