Proceedings of the Forty-Fifth Annual ACM Symposium on Theory of Computing 2013
DOI: 10.1145/2488608.2488708
|View full text |Cite
|
Sign up to set email alerts
|

New independent source extractors with exponential improvement

Abstract: We study the problem of constructing explicit extractors for independent general weak random sources. For weak sources on n bits with min-entropy k, perviously the best known extractor needs to use at least log n log k independent sources [22,3]. In this paper we give a new extractor that only uses O(log( log n log k )) + O(1) independent sources. Thus, our result improves the previous best result exponentially. We then use our new extractor to give improved network extractor protocols, as defined in [14]. The… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 25 publications
(16 citation statements)
references
References 30 publications
0
16
0
Order By: Relevance
“…If the min-entropy k is very close to log 2 n, then we also have improved results over [Li13b]. In particular, we have the following theorem.…”
Section: Our Resultsmentioning
confidence: 67%
See 1 more Smart Citation
“…If the min-entropy k is very close to log 2 n, then we also have improved results over [Li13b]. In particular, we have the following theorem.…”
Section: Our Resultsmentioning
confidence: 67%
“…In a recent breakthrough [Li13b,Li13a], the author further exploited the properties of somewhere random sources and established a connection between extraction from such sources and the problem of leader election in distributed computing. Based on this connection, the author managed to construct the first explicit extractor that uses only a constant number of sources even if the entropy is as small as polylog(n) [Li13a].…”
Section: Introductionmentioning
confidence: 99%
“…The flurry of work on non-malleable codes has yielded many surprising connections to other areas of theoretical computer science, including additive combinatorics [ADKO15], two-source extractors [Li12,Li13,CZ16], and non-malleable encryption/commitment [CMTV15, CDTV16, GPR16]. As we discuss in Section 1.2, our work establishes yet another connection-to techniques in unconditional derandomization.…”
Section: This Work: Efficient Non-malleable Codes For Small-depth Cirmentioning
confidence: 69%
“…The above two kinds of extractors are closely related, and in many cases techniques used for one can also be used to improve the constructions of the other. These connections have been demonstrated in a number of works (e.g., [Li12b,Li13b,Li13a,Li15d,CZ16]).…”
Section: Introductionmentioning
confidence: 84%