DocumentCode :
1963738
Title :
2-Source Extractors under Computational Assumptions and Cryptography with Defective Randomness
Author :
Kalai, Yael Tauman ; Li, Xin ; Rao, Anup
Author_Institution :
Microsoft Res. New England, USA
fYear :
2009
fDate :
25-27 Oct. 2009
Firstpage :
617
Lastpage :
626
Abstract :
We show how to efficiently extract truly random bits from two independent sources of linear min-entropy, under a computational assumption. The assumption we rely on is the existence of an efficiently computable permutation f1, such that for any source X ¿ {0, 1}n with linear min-entropy, any circuit of size poly(n) cannot invert f(X) with non-negligible probability. Under the stronger assumption that f(X) cannot be inverted even by circuits of size poly(n log n) with nonnegligible probability, we design a lossless computational network extractor protocol. Namely, we design a protocol for a set of players, each with access to an independent source of linear min-entropy, with the guarantee that at the end of the protocol, each honest player is left with bits that are computationally indistinguishable from being uniform and private. Our protocol succeeds as long as there are at least two honest players. Our results imply that if such one-way permutations exist, and enhanced trapdoor permutations exist, then secure multiparty computation with imperfect randomness is possible for any number of players, as long as at least two of them are honest. We also construct a network extractor protocol for the case where each source has only polynomially-small min-entropy (n¿ for some constant ¿ > 0). For this we need at least a constant u(¿) (which depends on ¿) number of honest players, and we need that the one-way permutation is hard to invert even on polynomially small min-entropy sources.
Keywords :
cryptographic protocols; entropy; probability; 2-source extractors; computable permutation; computational assumptions; cryptography; defective randomness; imperfect randomness; linear min-entropy; lossless computational network extractor protocol; nonnegligible probability; Access protocols; Algorithm design and analysis; Circuits; Computer networks; Computer science; Cryptographic protocols; Cryptography; Distributed computing; Entropy; Polynomials; cryptography; extractor; network; weak random source;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Foundations of Computer Science, 2009. FOCS '09. 50th Annual IEEE Symposium on
Conference_Location :
Atlanta, GA
ISSN :
0272-5428
Print_ISBN :
978-1-4244-5116-6
Type :
conf
DOI :
10.1109/FOCS.2009.61
Filename :
5438593
Link To Document :
بازگشت