Skip to main content

Simple Extractors via Constructions of Cryptographic Pseudo-random Generators

  • Conference paper
Automata, Languages and Programming (ICALP 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3580))

Included in the following conference series:

Abstract

Trevisan has shown that constructions of pseudo-random generators from hard functions (the Nisan-Wigderson approach) also produce extractors. We show that constructions of pseudo-random generators from one-way permutations (the Blum-Micali-Yao approach) can be used for building extractors as well. Using this new technique we build extractors that do not use designs and polynomial-based error-correcting codes and that are very simple and efficient. For example, one extractor produces each output bit separately in O(log2 n) time. These extractors work for weak sources with min entropy λ n, for arbitrary constant λ> 0, have seed length O(log2 n), and their output length is ≈ n λ/3.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Blum, M., Micali, S.: How to generate cryptographically strong sequences of pseudo-random bits. SIAM Journal on Computing 13(4), 850–864 (1984)

    Article  MATH  MathSciNet  Google Scholar 

  2. Dziembowski, S., Maurer, U.: Optimal randomizer efficiency in the bounded-storage model. Journal of Cryptology 17(1), 5–26 (2004); Conference version appeared in Proc. of STOC 2002 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  3. Gennaro, R., Trevisan, L.: Lower bounds on the efficiency of generic cryptographic constructions. In: Proceedings of the 41st IEEE Symposium on Foundations of Computer Science (2000)

    Google Scholar 

  4. Håstad, J., Impagliazzo, R., Levin, L., Luby, M.: Construction of a pseudo-random generator from any one-way function. SIAM Journal on Computing 28(4) (1999)

    Google Scholar 

  5. Hartman, T., Raz, R.: On the distribution of the number of roots of polynomials and explicit logspace extractors. Random Structures & Algorithms 23(3), 235–263 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  6. Impagliazzo, R.: Very strong one-way functions and pseudo-random generators exist relative to a random oracle (January 1996) (manuscript)

    Google Scholar 

  7. Impagliazzo, R., Wigderson, A.: P = BPP if E requires exponential circuits: Derandomizing the XOR lemma. In: Proceedings of the 29th Annual ACM Symposium on the Theory of Computing (STOC 1997), May 1997, pp. 220–229. Association for Computing Machinery, New York (1997)

    Google Scholar 

  8. Lu, C.J.: Encryption against storage-bounded adversaries from on-line strong extractors. Journal of Cryptology 17(1), 27–42 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  9. Nisan, N., Wigderson, A.: Hardness vs. randomness. Journal of Computer and System Sciences 49, 149–167 (1994)

    Article  MATH  MathSciNet  Google Scholar 

  10. Raz, R., Reingold, O., Vadhan, S.: Extracting all the randomness and reducing the error in trevisan’s extractor. In: Proceedings of the 30th ACM Symposium on Theory of Computing, May 1999, pp. 149–158. ACM Press, New York (1999)

    Google Scholar 

  11. Shaltiel, R.: Recent developments in explicit constructions of extractors. Bulletin EATCS 77, 67–95 (2002)

    MATH  MathSciNet  Google Scholar 

  12. Shaltiel, R., Umans, C.: Simple extractors for all min-entropies and a new pseudo-random generator. In: Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science (2001)

    Google Scholar 

  13. Trevisan, L.: Constructions of near-optimal extractors using pseudo-random generators. In: Proceedings of the 30th ACM Symposium on Theory of Computing, May 1999, pp. 141–148. ACM Press, New York (1999)

    Google Scholar 

  14. Trevisan, L.: Extractors and pseudorandom generators. Journal of the ACM 48(4), 860–879 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  15. Ta-Shma, A., Zuckerman, D.: Extractor codes. In: Proceedings of the 33rd ACM Symposium on Theory of Computing, pp. 193–199 (2001)

    Google Scholar 

  16. Ta-Shma, A., Zuckerman, D., Safra, S.: Extractors from Reed-Muller codes. In: Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science (2001)

    Google Scholar 

  17. Vadhan, S.: On constructing locally computable extractors and cryptosystems in the bounded-storage model. J. of Cryptology 17(1), 43–77 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  18. Yao, A.: Theory and application of trapdoor functions. In: Proceedings of the 23rd IEEE Symposium on Foundations of Computer Science, pp. 80–91 (1982)

    Google Scholar 

  19. Zimand, M.: Computational Complexity: A Quantitative Perspective. North-Holland Mathematics Studies, vol. 196. Elsevier, Amsterdam (2004)

    Book  MATH  Google Scholar 

  20. Zimand, M.: Simple extractors via constructions of cryptographic pseudo-random generators. Technical Report 0501075, Computing Research Repository (January 2005), Available at http://arxiv.org/abs/cs.CC/0501075

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zimand, M. (2005). Simple Extractors via Constructions of Cryptographic Pseudo-random Generators. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds) Automata, Languages and Programming. ICALP 2005. Lecture Notes in Computer Science, vol 3580. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11523468_10

Download citation

  • DOI: https://doi.org/10.1007/11523468_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-27580-0

  • Online ISBN: 978-3-540-31691-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics