Correlation extractors and their applications(Invited Talk)

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Randomness extractors convert dirty sources of randomness into clean sources of randomness. Motivated by the usefulness of correlated randomness in cryptography, we introduce an extension of randomness extraction and the related notion of privacy amplification to the case of correlated sources. Our main result is an efficient interactive two-party protocol which extracts m clean independent instances of a given joint distribution (X,Y) from n=O(m) dirty (or "leaky") instances of the same distribution. The classical case corresponds to X and Y being identical random bits. We present several applications of correlation extractors to cryptography.

Original languageEnglish
Title of host publicationInformation Theoretic Security - 5th International Conference, ICITS 2011, Proceedings
Pages1-5
Number of pages5
DOIs
StatePublished - 2011
Event5th International Conference on Information Theoretic Security, ICITS 2011 - Amsterdam, Netherlands
Duration: 21 May 201124 May 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6673 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference5th International Conference on Information Theoretic Security, ICITS 2011
Country/TerritoryNetherlands
CityAmsterdam
Period21/05/1124/05/11

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Correlation extractors and their applications(Invited Talk)'. Together they form a unique fingerprint.

Cite this