Randomness in Cryptography May 2 , 2013 Lecture 16 : Special Purpose Extractors

نویسنده

  • Zahra Jafargholi
چکیده

In previous lectures we defined a randomness extractor as follow, Definition 1 Function Ext : {0, 1}n × {0, 1}d → {0, 1}m is (k, ε)extractor if for any distribution W ∈ {0, 1}n, with H∞(W ) ≥ k SD(Ext(W ; I), Um) ≤ ε. ♦ If (I,Ext(W ; I) ≈ε (I, Um) we say Ext is a strong extractor. We saw that if H = {hi : {0, 1}n → {0, 1}m|∀i ∈ {0, 1}d} is a universal hash family and m ≤ k − 2 log(1/ε) then Ext(X; I) = hI(X) is (k, ε)-strong extractor (LHL). We also saw the LHL is pretty robust. If I has entropy deficiency c then we can extract m = k − c− 2 log(1/ε) bits.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Randomness in Cryptography April 6 , 2013 Lecture 12 : Computational Key Derivation

In the previous lecture, we discussed methods of key derivation, in particular, how to beat the RT bound for square-friendly applications and defined the notion of unpredictability extractors. In this question, we’ll ask if we can do any better by allowing computational assumptions. Such notions may be helpful for beating information-theoretic bounds for applications that consider only computat...

متن کامل

Lecture 17: Randomness Extractors

This lecture is about randomness extractors. Extractors are functions that map samples from a non-uniform distribution to samples that are close to being uniformly distributed. The length of the output will in general be smaller than the length of the input of the extractor. The input distribution of the extractor is called the source. A source is a random variable which maps text values to bit...

متن کامل

Lecture 12: Weak Sources of Randomness and Extractors

Probabilistic algorithms play a major role in computer science; for some problems, for example Identity Testing, there is no efficient deterministic algorithm, but instead there are quite efficient probabilistic ones. For some other problems like Primality, although we know the problem is in P, yet randomized algorithms are more efficient. Randomization is also a major ingredient in Cryptograph...

متن کامل

Deterministic Extractors - Lecture Notes

Randomness is used in many places in our daily lives. Some examples are gambling, statistics, algorithms, cryptography etc. For such applications one typically assumes a supply of completely unbiased and independent randim bits. This raises the problem of where to get these assumed random bits from. We could try and use natural sources of randomness such as sun spots, the stock market or the we...

متن کامل

Randomness Extractors – An Exposition

Randomness is crucial to computer science, both in theory and applications. In complexity theory, randomness augments computers to offer more powerful models. In cryptography, randomness is essential for seed generation, where the computational model used is generally probabilistic. However, ideal randomness, which is usually assumed to be available in computer science theory and applications, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013