Paper 2021/1480
Extractors: Low Entropy Requirements Colliding With Non-Malleability
Abstract
Two-source extractors are deterministic functions that, given two independent weak sources of randomness, output a (close to) uniformly random string of bits. Cheraghchi and Guruswami (TCC 2015) introduced two-source non-malleable extractors that combine the properties of randomness extraction with tamper resilience. Two-source non-malleable extractors have since then attracted a lot of attention, and have very quickly become fundamental objects in cryptosystems involving communication channels that cannot be fully trusted. Various applications of two-source non-malleable extractors include in particular non-malleable codes, non-malleable commitments, non-malleable secret sharing, network extraction, and privacy amplification with tamperable memory.
The best known constructions of two-source non-malleable extractors are due to Chattopadhyay, Goyal, and Li (STOC 2016), Li (STOC 2017), and Li (CCC 2019). All of these constructions require both sources to have min-entropy at least
Metadata
- Available format(s)
-
PDF
- Category
- Foundations
- Publication info
- A major revision of an IACR publication in CRYPTO 2023
- Keywords
- non-malleable extractorsprivacy amplificationextractors
- Contact author(s)
-
divesh @ comp nus edu sg
echung math @ gmail com
cqtmlo @ nus edu sg - History
- 2023-08-16: revised
- 2021-11-08: received
- See all versions
- Short URL
- https://ia.cr/2021/1480
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2021/1480, author = {Divesh Aggarwal and Eldon Chung and Maciej Obremski}, title = {Extractors: Low Entropy Requirements Colliding With Non-Malleability}, howpublished = {Cryptology {ePrint} Archive, Paper 2021/1480}, year = {2021}, url = {https://eprint.iacr.org/2021/1480} }