Simple extractors via constructions of cryptographic pseudo-random generators

4Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Trevisan has shown that constructions of pseudo-random generators from hard functions (the Nisan-Wigderson approach) also produce extractors. We show that constructions of pseudo-random generators from one-way permutations (the Blum-Micali-Yao approach) can be used for building extractors as well. Using this new technique we build extractors that do not use designs and polynomial-based error-correcting codes and that are very simple and efficient. For example, one extractor produces each output bit separately in O(log 2 n) time. These extractors work for weak sources with min entropy λn, for arbitrary constant λ > 0, have seed length O(log 2 n), and their output length is ≈ nλ/3. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Zimand, M. (2005). Simple extractors via constructions of cryptographic pseudo-random generators. In Lecture Notes in Computer Science (Vol. 3580, pp. 115–127). Springer Verlag. https://doi.org/10.1007/11523468_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free