Two-Source and Affine Non-Malleable Extractors for Small Entropy (2404.17013v1)
Abstract: Non-malleable extractors are generalizations and strengthening of standard randomness extractors, that are resilient to adversarial tampering. Such extractors have wide applications in cryptography and explicit construction of extractors. In the well-studied models of two-source and affine non-malleable extractors, the previous best constructions only work for entropy rate $>2/3$ and $1-\gamma$ respectively by Li (FOCS' 23). We present explicit constructions of two-source and affine non-malleable extractors that match the state-of-the-art constructions of standard ones for small entropy. Our main results include two-source and affine non-malleable extractors (over $\mathsf{F}_2$) for sources on $n$ bits with min-entropy $k \ge \logC n$ and polynomially small error, matching the parameters of standard extractors by Chattopadhyay and Zuckerman (STOC' 16, Annals of Mathematics' 19) and Li (FOCS' 16), as well as those with min-entropy $k = O(\log n)$ and constant error, matching the parameters of standard extractors by Li (FOCS' 23). Our constructions significantly improve previous results, and the parameters (entropy requirement and error) are the best possible without first improving the constructions of standard extractors. In addition, our improved affine non-malleable extractors give strong lower bounds for a certain kind of read-once linear branching programs, recently introduced by Gryaznov, Pudl\'{a}k, and Talebanfard (CCC' 22) as a generalization of several well-studied computational models. These bounds match the previously best-known average-case hardness results given by Chattopadhyay and Liao (CCC' 23) and Li (FOCS' 23), where the branching program size lower bounds are close to optimal, but the explicit functions we use here are different.\ Our results also suggest a possible deeper connection between non-malleable extractors and standard ones.
- Extractors: Low entropy requirements colliding with non-malleability. In Advances in Cryptology – CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part II, page 580–610, Berlin, Heidelberg, 2023. Springer-Verlag.
- Almost k-wise independence versus k-wise independence. Information Processing Letters, 88(3):107–110, 2003.
- An efficient reduction from two-source to non-malleable extractors: Achieving near-logarithmic min-entropy. In Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2017, page 1185–1194, New York, NY, USA, 2017. Association for Computing Machinery.
- Extracting randomness using few independent sources. In Proceedings of the 45th Annual IEEE Symposium on Foundations of Computer Science, pages 384–393, 2004.
- Affine dispersers from subspace polynomials. SIAM J. Comput., 41(4):880–914, 2012.
- Simulating independence: New constructions of condensers, Ramsey graphs, dispersers, and extractors. In Proceedings of the 37th Annual ACM Symposium on Theory of Computing, pages 1–10, 2005.
- Jean Bourgain. More on the sum-product phenomenon in prime fields and its applications. International Journal of Number Theory, 1:1–32, 2005.
- Jean Bourgain. On the construction of affine extractors. GAFA Geometric And Functional Analysis, 17:33–57, 01 2007.
- Mark Braverman. Polylogarithmic independence fools ac0 circuits. Journal of the ACM, 57(5), 2010.
- 2 source dispersers for no(1)superscript𝑛𝑜1n^{o(1)}italic_n start_POSTSUPERSCRIPT italic_o ( 1 ) end_POSTSUPERSCRIPT entropy and Ramsey graphs beating the Frankl-Wilson construction. In Proceedings of the 38th Annual ACM Symposium on Theory of Computing, 2006.
- Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM Journal on Computing, 17(2):230–261, 1988.
- Non-malleable coding against bit-wise and split-state tampering. In TCC, pages 440–464, 2014.
- The bit extraction problem of t-resilient functions (preliminary version). In 26th Annual Symposium on Foundations of Computer Science, Portland, Oregon, USA, 21-23 October 1985, pages 396–407, 1985.
- Non-malleable extractors and codes, with their many tampered extensions. In Proceedings of the Forty-Eighth Annual ACM Symposium on Theory of Computing, STOC ’16, page 285–298, New York, NY, USA, 2016. Association for Computing Machinery.
- Affine extractors for almost logarithmic entropy. In 62nd IEEE Annual Symposium on Foundations of Computer Science, FOCS 2021, Denver, CO, USA, February 7-10, 2022, pages 622–633. IEEE, 2021.
- Explicit non-malleable extractors, multi-source extractors and almost optimal privacy amplification protocols. In Proceedings of the 57th Annual IEEE Symposium on Foundations of Computer Science, 2016.
- Explicit non-malleable extractors, multi-source extractors, and almost optimal privacy amplification protocols. In 2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS), pages 158–167, 2016.
- Extractors for sumset sources. In Daniel Wichs and Yishay Mansour, editors, Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing, STOC, Cambridge, MA, USA, June 18-21, 2016, pages 299–311. ACM, 2016.
- Non-malleable codes and extractors for small-depth circuits, and affine functions. In Hamed Hatami, Pierre McKenzie, and Valerie King, editors, Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2017, Montreal, QC, Canada, June 19-23, 2017, pages 1171–1184. ACM, 2017.
- Extractors for sum of two sources. In Stefano Leonardi and Anupam Gupta, editors, STOC ’22: 54th Annual ACM SIGACT Symposium on Theory of Computing, Rome, Italy, June 20 - 24, 2022, pages 1584–1597. ACM, 2022.
- Hardness against linear branching programs and more. In Proceedings of the Conference on Proceedings of the 38th Computational Complexity Conference, CCC ’23, Dagstuhl, DEU, 2023. Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik.
- Gil Cohen. Local correlation breakers and applications to three-source extractors and mergers. In Proceedings of the 56th Annual IEEE Symposium on Foundations of Computer Science, 2015.
- Gil Cohen. Making the most of advice: New correlation breakers and their applications. In Proceedings of the 57th Annual IEEE Symposium on Foundations of Computer Science, 2016.
- Gil Cohen. Non-malleable extractors - new tools and improved constructions. In Proceedings of the 31st Annual IEEE Conference on Computational Complexity, 2016.
- Gil Cohen. Non-malleable extractors with logarithmic seeds. Technical Report TR16-030, ECCC, 2016.
- Gil Cohen. Two-source dispersers for polylogarithmic entropy and improved ramsey graphs. In Daniel Wichs and Yishay Mansour, editors, Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2016, Cambridge, MA, USA, June 18-21, 2016, pages 278–284. ACM, 2016.
- Gil Cohen. Two-source extractors for quasi-logarithmic min-entropy and improved privacy amplification protocols. Technical Report TR16-114, ECCC: Electronic Colloquium on Computational Complexity, 2016.
- Gil Cohen. Towards optimal two-source extractors and ramsey graphs. In Hamed Hatami, Pierre McKenzie, and Valerie King, editors, Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2017, Montreal, QC, Canada, June 19-23, 2017, pages 1157–1170. ACM, 2017.
- Non-malleable extractors with short seeds and applications to privacy amplification. SIAM Journal on Computing, 43(2):450–476, 2014.
- Extractors for near logarithmic min-entropy. In Proceedings of the 57th Annual IEEE Symposium on Foundations of Computer Science, 2016.
- Explicit two-source extractors and resilient functions. Annals of Mathematics, 189(3):653 – 705, 2019.
- An elementary proof of 3n-o(n) lower bound on the circuit complexity of affine dispersers. In Proceedings of the 36th international conference on Mathematical foundations of computer science, pages 256–265, 2011.
- Extensions to the method of multiplicities, with applications to kakeya sets and mergers. In Proceedings of the 50th Annual IEEE Symposium on Foundations of Computer Science, 2009.
- Privacy amplification and nonmalleable extractors via character sums. SIAM Journal on Computing, 43(2):800–830, 2014.
- Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM Journal on Computing, 38(1):97–139, 2008.
- Non-malleable codes. In ICS, pages 434–452, 2010.
- Kakeya sets, new mergers and old extractors. In Proceedings of the 49th Annual IEEE Symposium on Foundations of Computer Science, 2008.
- Non-malleable extractors and symmetric key cryptography from weak secrets. In Proceedings of the 41st Annual ACM Symposium on Theory of Computing, pages 601–610, 2009.
- A better-than-3n lower bound for the circuit complexity of an explicit function. In 2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS), pages 89–98, 2016.
- Fooling functions of halfspaces under product distributions. In 2010 IEEE 25th Annual Conference on Computational Complexity, pages 223–234, 2010.
- Linear Branching Programs and Directional Affine Extractors. In 37th Computational Complexity Conference (CCC 2022), volume 234, pages 4:1–4:16, 2022.
- Deterministic extractors for affine sources over large fields. Combinatorica, 28(4):415–440, 2008.
- Deterministic extractors for bit-fixing sources by obtaining an independent seed. SIAM J. Comput., 36(4):1072–1094, 2006.
- Unbalanced expanders and randomness extractors from Parvaresh-Vardy codes. Journal of the ACM, 56:1–34, 2009.
- Unbalanced expanders and randomness extractors from parvaresh–vardy codes. J. ACM, 56(4), jul 2009.
- 2-source extractors under computational assumptions and cryptography with defective randomness. In Proceedings of the 50th Annual IEEE Symposium on Foundations of Computer Science, pages 617–628, 2009.
- Network extractor protocols. In Proceedings of the 49th Annual IEEE Symposium on Foundations of Computer Science, pages 654–663, 2008.
- Deterministic extractors for small-space sources. Journal of Computer and System Sciences, 77:191–220, 2011.
- Deterministic Extractors for Bit-Fixing Sources and Exposure-Resilient Cryptography. Siam Journal on Computing, 36:1231–1247, 2007.
- Mark Lewko. An explicit two-source extractor with min-entropy rate near 4/9494/94 / 9. Mathematika, 65(4):950–957, 2019.
- Xin Li. Improved constructions of three source extractors. In Proceedings of the 26th Annual IEEE Conference on Computational Complexity, pages 126–136, 2011.
- Xin Li. A new approach to affine extractors and dispersers. In Proceedings of the 26th Annual IEEE Conference on Computational Complexity, CCC, 2011.
- Xin Li. Design extractors, non-malleable condensers and privacy amplification. In Proceedings of the 44th Annual ACM Symposium on Theory of Computing, pages 837–854, 2012.
- Xin Li. Non-malleable extractors, two-source extractors and privacy amplification. In 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science, 2012.
- Xin Li. Extractors for a constant number of independent sources with polylogarithmic min-entropy. In Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science, pages 100–109, 2013.
- Xin Li. New independent source extractors with exponential improvement. In Proceedings of the 45th Annual ACM Symposium on Theory of Computing, pages 783–792, 2013.
- Xin Li. Three-source extractors for polylogarithmic min-entropy. In 2015 IEEE 56th Annual Symposium on Foundations of Computer Science (FOCS), pages 863–882, Los Alamitos, CA, USA, oct 2015. IEEE Computer Society.
- Xin Li. Improved two-source extractors, and affine extractors for polylogarithmic entropy. In 2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS), pages 168–177. IEEE Computer Society, 2016.
- Xin Li. Improved non-malleable extractors, non-malleable codes and independent source extractors. In Proceedings of the 49th Annual ACM Symposium on Theory of Computing, 2017.
- Xin Li. Improved non-malleable extractors, non-malleable codes and independent source extractors. In Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2017, page 1144–1156, New York, NY, USA, 2017. Association for Computing Machinery.
- Xin Li. Non-malleable extractors and non-malleable codes: Partially optimal constructions. In Amir Shpilka, editor, 34th Computational Complexity Conference, CCC 2019, July 18-20, 2019, New Brunswick, NJ, USA, volume 137 of LIPIcs, pages 28:1–28:49. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2019.
- Xin Li. Two source extractors for asymptotically optimal entropy, and (many) more. In 2023 IEEE 64th Annual Symposium on Foundations of Computer Science (FOCS), 2023.
- Extractors: Optimal up to constant factors. In Proceedings of the 35th Annual ACM Symposium on Theory of Computing, pages 602–611, 2003.
- 3.1n - o(n) circuit lower bounds for explicit functions. In Proceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2022, page 1180–1193, New York, NY, USA, 2022. Association for Computing Machinery.
- Explicit directional affine extractors and improved hardness for linear branching programs. Technical report, Arxiv, 2023. https://arxiv.org/abs/2304.11495.
- Raghu Meka. Explicit resilient functions matching ajtai-linial. In Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA ’17, page 1132–1148, USA, 2017. Society for Industrial and Applied Mathematics.
- Randomness is linear in space. Journal of Computer and System Sciences, 52(1):43–52, 1996.
- Anup Rao. Extractors for a constant number of polynomially small min-entropy independent sources. In Proceedings of the 38th Annual ACM Symposium on Theory of Computing, 2006.
- Anup Rao. Extractors for low-weight affine sources. In Proc. of the 24th CCC, 2009.
- Anup Rao. Extractors for low-weight affine sources. In 2009 24th Annual IEEE Conference on Computational Complexity, pages 95–101, 2009.
- Ran Raz. Extractors with weak random seeds. In Proceedings of the 37th Annual ACM Symposium on Theory of Computing, pages 11–20, 2005.
- Extracting all the randomness and reducing the error in trevisan’s extractors. JCSS, 65(1):97–128, 2002.
- Multilinear formulas, maximal-partition discrepancy and mixed-sources extractors. Journal of Computer and System Sciences, 77:167–190, 2011.
- Ronen Shaltiel. Dispersers for affine sources with sub-polynomial entropy. In Proceedings of the 52nd Annual IEEE Symposium on Foundations of Computer Science, 2011.
- Avishay Tal. Tight Bounds on the Fourier Spectrum of AC0. In Ryan O’Donnell, editor, 32nd Computational Complexity Conference (CCC 2017), volume 79 of Leibniz International Proceedings in Informatics (LIPIcs), pages 15:1–15:31, Dagstuhl, Germany, 2017. Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik.
- Luca Trevisan. Extractors and pseudorandom generators. Journal of the ACM, pages 860–879, 2001.
- Extracting Randomness from Samplable Distributions. In IEEE Symposium on Foundations of Computer Science, pages 32–42, 2000.
- Salil P Vadhan. Constructing locally computable extractors and cryptosystems in the bounded-storage model. Journal of Cryptology, 17:43–77, 2004.
- Emanuele Viola. Extractors for circuit sources. SIAM Journal on Computing, 43(2):655–672, 2014.
- Amir Yehudayoff. Affine extractors over prime fields. Combinatorica, 31(2):245–256, 2011.
- David Zuckerman. Randomness-optimal oblivious sampling. In Random Struct. Algorithms, 1997.
- David Zuckerman. Linear degree extractors and the inapproximability of max clique and chromatic number. In Theory of Computing, 2007.