How to generate cryptographically strong sequences of pseudo-random bits
SIAM Journal on Computing
One-way functions and Pseudorandom generators
Combinatorica - Theory of Computing
Conditionally-perfect secrecy and a provably-secure randomized cipher
Journal of Cryptology - Eurocrypt '90
More deterministic simulation in logspace
STOC '93 Proceedings of the twenty-fifth annual ACM symposium on Theory of computing
Journal of Computer and System Sciences
Journal of Computer and System Sciences
On extracting randomness from weak random sources (extended abstract)
STOC '96 Proceedings of the twenty-eighth annual ACM symposium on Theory of computing
P = BPP if E requires exponential circuits: derandomizing the XOR lemma
STOC '97 Proceedings of the twenty-ninth annual ACM symposium on Theory of computing
Extracting randomness: a survey and new constructions
Journal of Computer and System Sciences
Extractors and pseudorandom generators
Journal of the ACM (JACM)
Extracting Randomness: How and Why - A survey
CCC '96 Proceedings of the 11th Annual IEEE Conference on Computational Complexity
Streaming Computation of Combinatorial Objects
CCC '02 Proceedings of the 17th IEEE Annual Conference on Computational Complexity
Encryption against Storage-Bounded Adversaries from On-Line Strong Extractors
Journal of Cryptology
Optimal Randomizer Efficiency in the Bounded-Storage Model
Journal of Cryptology
Simple extractors for all min-entropies and a new pseudorandom generator
Journal of the ACM (JACM)
The complexity of constructing pseudorandom generators from hard functions
Computational Complexity
Uniform direct product theorems: simplified, optimized, and derandomized
STOC '08 Proceedings of the fortieth annual ACM symposium on Theory of computing
Theory and application of trapdoor functions
SFCS '82 Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
SFCS '90 Proceedings of the 31st Annual Symposium on Foundations of Computer Science
Simple extractors via constructions of cryptographic pseudo-random generators
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
Everlasting security in the bounded storage model
IEEE Transactions on Information Theory
Extractors and Lower Bounds for Locally Samplable Sources
ACM Transactions on Computation Theory (TOCT)
Sparse extractor families for all the entropy
Proceedings of the 4th conference on Innovations in Theoretical Computer Science
Hi-index | 0.00 |
Zimand [24] presented simple constructions of locally computable strong extractors whose analysis relies on the direct product theorem for one-way functions and on the Blum-Micali-Yao generator. For N -bit sources of entropy ***N , his extractor has seed O (log2 N ) and extracts N *** /3 random bits. We show that his construction can be analyzed based solely on the direct product theorem for general functions. Using the direct product theorem of Impagliazzo et al. [6], we show that Zimand's construction can extract $\tilde \Omega_\gamma (N^{1/3}) $ random bits. (As in Zimand's construction, the seed length is O (log2 N ) bits.) We also show that a simplified construction can be analyzed based solely on the XOR lemma. Using Levin's proof of the XOR lemma [8], we provide an alternative simpler construction of a locally computable extractor with seed length O (log2 N ) and output length $\tilde \Omega_\gamma (N^{1/3})$. Finally, we show that the derandomized direct product theorem of Impagliazzo and Wigderson [7] can be used to derive a locally computable extractor construction with O (logN ) seed length and $\tilde \Omega (N^{1/5})$ output length. Zimand describes a construction with O (logN ) seed length and $O(2^{\sqrt{\log N}})$ output length.