2014
DOI: 10.1137/120868414
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Amplification and Nonmalleable Extractors Via Character Sums

Abstract: Abstract. In studying how to communicate over a public channel with an active adversary, Dodis and Wichs introduced the notion of a non-malleable extractor. A non-malleable extractor dramatically strengthens the notion of a strong extractor. A strong extractor takes two inputs, a weakly-random x and a uniformly random seed y, and outputs a string which appears uniform, even given y. For a non-malleable extractor nmExt, the output nmExt(x, y) should appear uniform given y as well as nmExt(x, A(y)), where A is a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
18
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 28 publications
(18 citation statements)
references
References 28 publications
0
18
0
Order By: Relevance
“…Recently, Dodis, Li, Wooley, and Zuckerman [7] presented the first explicit construction of a non-malleable extractor. They showed that an extractor introduced by Chor and Goldriech in the context of two-source extractors [5] is non-malleable as long as the weak source has min-entropy rate 1/2 + δ for an arbitrarily small constant δ > 0.…”
Section: A Constructions Of Non-malleable Extractorsmentioning
confidence: 99%
See 4 more Smart Citations
“…Recently, Dodis, Li, Wooley, and Zuckerman [7] presented the first explicit construction of a non-malleable extractor. They showed that an extractor introduced by Chor and Goldriech in the context of two-source extractors [5] is non-malleable as long as the weak source has min-entropy rate 1/2 + δ for an arbitrarily small constant δ > 0.…”
Section: A Constructions Of Non-malleable Extractorsmentioning
confidence: 99%
“…Using their look-ahead extractor, Dodis and Wichs constructed an explicit 2-round privacy amplification protocol with entropy loss βk + O(log 2 n + log 2 (1/ )), for an arbitrarily small constant β > 0, and communication complexity O(log 2 n+log 2 (1/ )), both of which are somewhat far from optimal 2 . Dodis, Li, Wooley, and Zuckerman [7] showed that when instantiating the protocol of Dodis and Wichs with their explicit non-malleable extractor one obtains a 2-round privacy amplification protocol for weak sources of min-entropy rate 1/2 + δ, for an arbitrarily small constant δ > 0, with entropy loss O(log n + log(1/ )). However, since the seed of the extractor is of length Ω(n) bits, the resulting privacy amplification protocol suffers from communication complexity of Ω(n) bits.…”
Section: B Privacy Amplification Via Non-malleable Extractorsmentioning
confidence: 99%
See 3 more Smart Citations