Proceedings of the Forty-Eighth Annual ACM Symposium on Theory of Computing 2016
DOI: 10.1145/2897518.2897547
|View full text |Cite
|
Sign up to set email alerts
|

Non-malleable extractors and codes, with their many tampered extensions

Abstract: Randomness extractors and error correcting codes are fundamental objects in computer science. Recently, there have been several natural generalizations of these objects, in the context and study of tamper resilient cryptography. These are seeded non-malleable extractors, introduced by Dodis and Wichs [DW09]; seedless non-malleable extractors, introduced by Cheraghchi and Guruswami [CG14b]; and non-malleable codes, introduced by Dziembowski, Pietrzak and Wichs [DPW10]. Besides being interesting on their own, th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
84
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 72 publications
(85 citation statements)
references
References 64 publications
1
84
0
Order By: Relevance
“…Since our new non-malleable extractor is better than the construction in [CGL16], which has seed length d = O(log 2 (n/ǫ ′ )), we can first assume that d = O(log 2 (n/ǫ)) and we will use the inequality d ≥ C ′ log a log(da/ǫ ′ ) to compute the minimum d and verify the condition that d = O(log 2 (n/ǫ ′ )) does hold. In this case, we see that log(da/ǫ ′ ) = log(O(log 3 (n/ǫ ′ )/ǫ ′ )) = O(log log(n/ǫ ′ ) + log(1/ǫ ′ )), and log a = O(log log(n/ǫ ′ )).…”
Section: The Seeded Non-malleable Extractormentioning
confidence: 99%
See 3 more Smart Citations
“…Since our new non-malleable extractor is better than the construction in [CGL16], which has seed length d = O(log 2 (n/ǫ ′ )), we can first assume that d = O(log 2 (n/ǫ)) and we will use the inequality d ≥ C ′ log a log(da/ǫ ′ ) to compute the minimum d and verify the condition that d = O(log 2 (n/ǫ ′ )) does hold. In this case, we see that log(da/ǫ ′ ) = log(O(log 3 (n/ǫ ′ )/ǫ ′ )) = O(log log(n/ǫ ′ ) + log(1/ǫ ′ )), and log a = O(log log(n/ǫ ′ )).…”
Section: The Seeded Non-malleable Extractormentioning
confidence: 99%
“…Since the construction of the non-malleable two-source extractor is complicated and involves multi steps of alternating extraction etc., it appears that the sampling procedure may also be complicated. Indeed, in [CGL16] the sampling procedure consists of a series of carefully designed steps to "invert" each intermediate extraction step. Here, we show that in fact we can significantly simplify the sampling procedure.…”
Section: Overview Of the Constructions And Techniquesmentioning
confidence: 99%
See 2 more Smart Citations
“…The following flip-flop function was constructed by Cohen [Coh15] using alternating extraction. Subsequently, Chattopadhyay, Goyal and Li [CGL16], used this in constructing non-malleable extractors. Informally, the flip-flop function uses an independent source X to break the correlation between two r.v's Y and Y ′ , given an advice bit.…”
Section: Explicit Almost-optimal Non-malleable Extractormentioning
confidence: 99%