• DocumentCode
    2183757
  • Title

    The bit extraction problem or t-resilient functions

  • Author

    Chor, Benny ; Goldreich, Oded ; Hasted, Johan ; Freidmann, Joel ; Rudich, Steven ; Smolensky, Roman

  • fYear
    1985
  • fDate
    21-23 Oct. 1985
  • Firstpage
    396
  • Lastpage
    407
  • Abstract
    We consider the following adversarial situation. Let n, m and t be arbitrary integers, and let f : {0, 1}n → {0, 1}m be a function. An adversary, knowing the function f, sets t of the n input bits, while the rest (n-t input, bits) are chosen at random (independently and with uniform probability distribution) The adversary tries to prevent the outcome of f from being uniformly distributed in {0, 1}m. The question addressed is for what values of n, m and t does the adversary necessarily fail in biasing the outcome of f : {0,1}n → {0, 1}m, when being restricted to set t of the input bits of f. We present various lower and upper bounds on m´s allowing an affirmative answer. These bounds are relatively close for t ≤ n/3 and for t ≥ 2n/3. Our results have applications in the fields of faulttolerance and cryptography.
  • Keywords
    Cryptography; Fault tolerance; Upper bound;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Foundations of Computer Science, 1985., 26th Annual Symposium on
  • Conference_Location
    Portland, OR, USA
  • ISSN
    0272-5428
  • Print_ISBN
    0-8186-0644-4
  • Type

    conf

  • DOI
    10.1109/SFCS.1985.55
  • Filename
    4568165