首页> 外文期刊>Electronic Colloquium on Computational Complexity >Non-Malleable Extractors and Codes, with their Many Tampered Extensions
【24h】

Non-Malleable Extractors and Codes, with their Many Tampered Extensions

机译:带有大量篡改扩展名的非恶意提取器和代码

获取原文
           

摘要

Randomness extractors and error correcting codes are fundamental objects in computer science. Recently, there have been several natural generalizations of these objects, in the context and study of tamper resilient cryptography. These are emph{seeded non-malleable extractors}, introduced by Dodis and Wichs cite{DW09}; emph{seedless non-malleable extractors}, introduced by Cheraghchi and Guruswami cite{CG14b}; and emph{non-malleable codes}, introduced by Dziembowski, Pietrzak and Wichs cite{DPW10}. Besides being interesting on their own, they also have important applications in cryptography. For example, seeded non-malleable extractors are closely related to privacy amplification with an active adversary, non-malleable codes are related to non-malleable secret sharing, and seedless non-malleable extractors provide a universal way to construct explicit non-malleable codes.However, explicit constructions of non-malleable extractors appear to be hard, and the known constructions are far behind their non-tampered counterparts. Indeed, the best known seeded non-malleable extractor requires min-entropy rate at least 0 49 cite{Li12b}; while explicit constructions of non-malleable two-source extractors were not known even if both sources have full min-entropy, and was left as an open problem in cite{CG14b}. In addition, current constructions of non-malleable codes in the information theoretic setting only deal with the situation where the codeword is tampered once, and may not be enough for certain applications.In this paper we make progress towards solving the above problems. Our contributions are as follows.egin{itemize} item We construct an explicit seeded non-malleable extractor for min-entropy k log 2 n . This dramatically improves all previous results and gives a simpler 2-round privacy amplification protocol with optimal entropy loss, matching the best known result in cite{Li15b}.item We construct the first explicit non-malleable two-source extractor for min-entropy k n ? n (1) , with output size n (1) and error 2 ? n (1) .item We motivate and initiate the study of two natural generalizations of seedless non-malleable extractors and non-malleable codes, where the sources or the codeword may be tampered many times. For this, we construct the first explicit non-malleable two-source extractor with tampering degree t up to n (1) , which works for min-entropy k n ? n (1) , with output size n (1) and error 2 ? n (1) . We further show that we can efficiently sample uniformly from any pre-image. By the connection in cite{CG14b}, we also obtain the first explicit non-malleable codes with tampering degree t up to n (1) , relative rate n (1) n , and error 2 ? n (1) . end{itemize}
机译:随机性提取器和纠错码是计算机科学中的基本对象。近来,在篡改弹性密码学的背景下和研究中,已经有这些对象的几种自然概括。这些是 edmph {种子不可提取的种子},由Dodis和Wichs引入 cite {DW09}; emph {无籽非种子提取器},由Cheraghchi和Guruswami提出, cite {CG14b};和 emph {非恶意代码},由Dziembowski,Pietrzak和Wichs引用 cite {DPW10}。除了本身很有趣之外,它们在密码学中也有重要的应用。例如,播种的不可恶意提取器与活跃对手的隐私放大密切相关,不可恶意编码与不可恶意秘密共享相关,而无种子不可恶意提取器提供了构造显式不可恶意代码的通用方法。但是,不可恶意提取的显式构造似乎很困难,并且已知构造远远落后于其不可篡改的对应构造。确实,最著名的种子不可粉碎提取器要求最小熵率至少为0 49 cite {Li12b};尽管两个来源都具有完全的最小熵,但不可知的两个来源的提取器的显式构造是未知的,并且在 cite {CG14b}中被作为一个开放的问题。另外,当前在信息理论环境中的不可恶意代码的构造仅处理码字被篡改一次的情况,对于某些应用可能还不够。本文为解决上述问题取得了进展。我们的贡献如下。 begin {itemize} item我们为min-熵k log 2 n构造了一个显式的种子种子。这样可以显着改善以前的所有结果,并提供一种更简单的具有最佳熵损失的2轮隐私放大协议,与 cite {Li15b}中最知名的结果相匹配。 item我们为min-熵kn? n(1),输出大小为n(1),错误为2? n(1)。 item我们激发并启动了对无种子的不可恶意提取程序和不可恶意代码的两种自然概括的研究,其中,源或代码字可能遭到多次篡改。为此,我们构造了第一个显式不可篡改的两源提取器,其篡改度为t到n(1),适用于最小熵k n?。 n(1),输出大小为n(1),错误2? n(1)。我们进一步表明,我们可以从任何原像中高效地进行统一采样。通过 cite {CG14b}中的连接,我们还获得了第一个显式不可篡改代码,其篡改度t最高为n(1),相对比率为n(1)n,误差为2?。 n(1)。 end {itemize}

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号