On extracting private randomness over a public channel

23Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We introduce strong blenders. A strong blender BLE(· ·) uses weak sources X, Y to produce BLE(X, Y) that is statistically random even if one is given Y. Strong blenders generalize strong extractors [15] and extractors from two weak random sources [25, 6]. We show that non-constructive strong blenders can extract all the randomness from X, as long as Y has logarithmic min-entropy. We also give explicit strong blenders which work provided the sum of the min-entropies of X and Y is at least their block length. Finally, we show that strong blenders have applications to cryptographic systems for parties that have independent weak sources of randomness. In particular, we extend the results of Maurer and Wolf [12] and show that parties that are not able to sample even a single truly random bit can still perform privacy amplification over an adversarially controlled channel. © Springer-Verlag Berlin Heidelberg 2003.

Cite

CITATION STYLE

APA

Dodis, Y., & Oliveira, R. (2003). On extracting private randomness over a public channel. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2764, 252–263. https://doi.org/10.1007/978-3-540-45198-3_22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free