Sparse extractor families for all the entropy

We consider the problem of extracting entropy by sparse transformations, namely functions with a small number of overall input-output dependencies. In contrast to previous works, we seek extractors for essentially all the entropy without any assumption on the underlying distribution beyond a min-entropy requirement. We give two simple constructions of sparse extractor families. These are collections of sparse functions such that for any distribution X on inputs of sufficiently high min-entropy, the output of most functions from the collection on input X is statistically close to uniform. For strong extractor families (i.e., functions in the family do not take additional randomness) we give upper and lower bounds on the sparsity that are tight up to a constant factor for a wide range of min-entropies. We then prove that for some min-entropies weak extractor families can achieve better sparsity. We show how this construction can be used towards more efficient parallel transformation of (non-uniform) one-way functions into pseudorandom generators. More generally, sparse extractor families can be used instead of pairwise independence in various randomized or nonuniform settings where sparsity or preserving locality (i.e., parallelism) is of interest.

[1]  Leslie G. Valiant,et al.  NP is as easy as detecting unique solutions , 1985, STOC '85.

[2]  L. Fortnow,et al.  Recent Developments in Explicit Constructions of Extractors , 2002, Bull. EATCS.

[3]  Salil P. Vadhan,et al.  Characterizing pseudoentropy and simplifying pseudorandom generator constructions , 2012, STOC '12.

[4]  Noam Nisan,et al.  Pseudorandom generators for space-bounded computation , 1992, Comb..

[5]  Yuval Ishai,et al.  Cryptography in NC0 , 2004, SIAM J. Comput..

[6]  Salil P. Vadhan,et al.  Constructing Locally Computable Extractors and Cryptosystems in the Bounded-Storage Model , 2003, Journal of Cryptology.

[7]  Gilles Brassard,et al.  Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..

[8]  Leonid A. Levin,et al.  A Pseudorandom Generator from any One-way Function , 1999, SIAM J. Comput..

[9]  Larry Carter,et al.  Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..

[10]  Ryan O'Donnell,et al.  Hardness amplification within NP , 2002, Proceedings 17th IEEE Annual Conference on Computational Complexity.

[11]  Daniel A. Spielman,et al.  Expander codes , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[12]  Jehoshua Bruck,et al.  Linear extractors for extracting randomness from noisy sources , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.

[13]  Omer Reingold,et al.  Efficiency improvements in constructing pseudorandom generators from one-way functions , 2010, STOC '10.

[14]  Noam Nisan,et al.  Randomness is Linear in Space , 1996, J. Comput. Syst. Sci..

[15]  Ran Raz,et al.  On recycling the randomness of states in space bounded computation , 1999, STOC '99.

[16]  Robert G. Gallager,et al.  Low-density parity-check codes , 1962, IRE Trans. Inf. Theory.

[17]  Ueli Maurer Conditionally-perfect secrecy and a provably-secure randomized cipher , 2004, Journal of Cryptology.

[18]  Salil P. Vadhan,et al.  On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model , 2003, CRYPTO.

[19]  Leonid A. Levin,et al.  Pseudo-random generation from one-way functions , 1989, STOC '89.

[20]  Jaikumar Radhakrishnan,et al.  Tight bounds for depth-two superconcentrators , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.

[21]  Yuval Ishai,et al.  On Pseudorandom Generators with Linear Stretch in NC0 , 2006, computational complexity.

[22]  Rafail Ostrovsky,et al.  Cryptography with constant computational overhead , 2008, STOC.

[23]  Shachar Lovett,et al.  A tail bound for read-k families of functions , 2015, Random Struct. Algorithms.

[24]  Emanuele Viola,et al.  The complexity of constructing pseudorandom generators from hard functions , 2005, computational complexity.

[25]  Avi Wigderson,et al.  Randomness conductors and constant-degree lossless expanders , 2002, STOC '02.

[26]  Luca Trevisan,et al.  Extractors Using Hardness Amplification , 2009, APPROX-RANDOM.

[27]  Alon Rosen,et al.  Input Locality and Hardness Amplification , 2011, Journal of Cryptology.

[28]  Noam Nisan,et al.  The computational complexity of universal hashing , 1990, STOC '90.

[29]  Yuval Ishai,et al.  Cryptography in NC0 , 2004, FOCS.

[30]  Chi-Jen Lu Encryption against Storage-Bounded Adversaries from On-Line Strong Extractors , 2003, Journal of Cryptology.