Lecture 4 : Leftover Hash Lemma and One Way Functions

نویسندگان

  • Daniel Wichs
  • Biswaroop Maiti
چکیده

We recall some definitions and a claim proved in our previous lecture. These will be required to finish the proof for the Leftover Hash Lemma. Definition 1 H∞(X) = − log (maxx Pr [X = x]) ♦ Definition 2 A function Ext : U × S → V is a (k, ε) extractor if for all random variables X with H∞(X) ≥ k, we have: SD [(S,Ext(X,S)) , (S, V )] ≤ ε where S is uniformly distributed over S and V is uniformly distributed over V. ♦ Definition 3 A function H : U × S → V is a universal hash function if ∀x 6= x′ ∈ U :

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Inaccessible Entropy and its Applications

We summarize the constructions of PRGs from OWFs discussed so far and introduce the notion of inaccessible entropy [HILL99, HRVW09]. Remember that we are trying to construct objects that look random (PRGs) from an assumption about hardness of computation (OWFs). So far we have seen that it is possible to construct PRGs from OWFs if the OWF has some nice structural property. One-way Permutations...

متن کامل

Universal hash families and the leftover hash lemma, and applications to cryptography and computing

This paper is an expository treatment of the leftover hash lemma and some of its applications in cryptography and complexity theory.

متن کامل

Metric Pseudoentropy: Characterizations and Applications

Metric entropy is a computational variant of entropy, often used as a convenient substitute of HILL Entropy, slightly stronger and standard notion for entropy in cryptographic applications. In this paper we develop a general method to characterize metric-type computational variants of entropy, in a way depending only on properties of a chosen class of test functions (adversaries). As a conseque...

متن کامل

An efficient fuzzy extractor for limited noise

A fuzzy extractor is a security primitive that allows for reproducible extraction of an almost uniform key from a non-uniform noisy source. We analyze a fuzzy extractor scheme that uses universal hash functions for both information reconciliation and privacy amplification. This is a useful scheme when the number of error patterns likely to occur is limited, regardless of the error probabilities...

متن کامل

Inverted Leftover Hash Lemma

Universal hashing found a lot of applications in computer science. In cryptography the most important fact about universal families is the so called Leftover Hash Lemma, proved by Impagliazzo, Levin and Luby. In the language of modern cryptography it states that almost universal families are good extractors. In this work we provide a somewhat surprising characterization in the opposite directio...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015