270 likes | 399 Vues
This work presents explicit constructions of non-malleable seeded extractors, building on a joint effort by Gil Cohen, Ran Raz, and Gil Segev from the Weizmann Institute. We explore the efficiency and limitations of these extractors, with foundational results attributed to key studies like [DodisWichs09] and [DodisLiWooleyZuckerman11]. Our main results demonstrate unconditionally efficient methods, addressing both strong and small-bias conditions. Additionally, we outline open questions regarding non-malleable extractors with smaller min-entropies and seek applications beyond traditional cryptography.
E N D
Non-Malleable Extractors Gil Cohen Weizmann Institute Joint work with Ran Razand Gil Segev
Seeded Extractors 0 1 Seeded Extractor
Seeded Extractors 11 00 10 01 01 00 10 11 Seeded Extractor Strong Seeded Extractor
Seeded Extractors 11 10 101 100 000 111 01 No limitation … … 00 Seeded Extractor Small-Bias Set
Non-Malleable Extractors [DodisWichs09] 0 0 1 1 Seeded Extractor Strong Seeded Extractor 0 Non-Malleable Extractor
The Explicit Construction of [DodisLiWooleyZuckerman11] • Conditional efficiency
The Explicit Construction of [DodisLiWooleyZuckerman11] • Conditional efficiency
The Explicit Construction of [DodisLiWooleyZuckerman11] • Conditional efficiency
The Explicit Construction of [DodisLiWooleyZuckerman11] • Conditional efficiency
Main Result • Unconditionally efficient
Main Result • Unconditionally efficient
Main Result • Unconditionally efficient
Main Result • Unconditionally efficient
Explicit Constructions [Li12] Moreover, Bourgain’s extractor is non-malleable.
Proof Idea is typically biased (say towards 0).
Proof Idea is typically biased (say towards 0).
Proof Idea Acyclic Many vertices Average edge weight is large
Proof Idea Acyclic Many vertices Average edge weight is large is typically biased
Proof Idea Small-Bias Set [Raz05] implies that this is also an extractor stands in contradiction!
Open Questions ? Construct a non-malleable extractor for smaller min-entropies, or prove this is hard. ? Waiting for applications to complexity (as apposed to cryptography).