A reduction from efficient non-malleable extractors to low-error two-source extractors with arbitrary constant rate

We show a reduction from the existence of explicit t-non-malleable extractors with a small seed length, to the construction of explicit two-source extractors with small error for sources with arbitrarily small constant rate. Previously, such a reduction was known either when one source had entropy rate above half [Raz05] or for general entropy rates but only for large error [CZ16]. As in previous reductions we start with the Chattopadhyay and Zuckerman approach [CZ16], where an extractor is applied on one source to create a table, and the second source is used to sample a sub-table. In previous work, a resilient function was applied on the sub-table and the use of resilient functions immediately implied large error. In this work we replace the resilient function with the parity function (that is not resilient). We prove correctness by showing that doing the sampling properly, the sample size can be made so small that it is smaller then the non-malleability parameter t of the first extractor, which is enough for the correctness. The parameters we require from the non-malleable construction hold (quite comfortably) in a non-explicit construction, but currently it is not known how to explicitly construct such graphs. As a result we do not give an unconditional construction of an explicit low-error twosource extractor. However, the reduction shows a new connection between non-malleable and two-source extractors, and also shows resilient functions do not play a crucial role in the twosource construction framework suggested in [CZ16]. Furthermore, the reduction highlights a barrier in constructing non-malleable extractors, and reveals its importance. We hope this work would lead to further developments in explicit constructions of both non-malleable and two-source extractors. ∗The Blavatnik School of Computer Science, Tel-Aviv University, Tel Aviv 69978, Israel. Supported by the Israel science Foundation grant no. 994/14 and by the United States – Israel Binational Science Foundation grant no. 2010120. †Simons Institute for the Theory of Computing, UC Berkeley, Berkeley, CA 94720, USA. Email: eshanc@ias.edu. Part of this work was done when the author was a graduate student in UT Austin under NSF grant CCF-1526952 ‡The Blavatnik School of Computer Science, Tel-Aviv University, Tel Aviv 69978, Israel. Email: deandoron@mail.tau.ac.il. Supported by the Israel science Foundation grant no. 994/14 and by the United States – Israel Binational Science Foundation grant no. 2010120. This work was done in part while visiting the Simons Institute for the Theory of Computing at UC Berkeley. §Department of Computer Science, Johns Hopkins University, Baltimore, MD 21218, USA. Email: lixints@cs.jhu.edu. Supported by NSF Grant CCF-1617713. ¶The Blavatnik School of Computer Science, Tel-Aviv University, Tel Aviv 69978, Israel. Email: amnon@tau.ac.il. Supported by the Israel science Foundation grant no. 994/14 and by the United States – Israel Binational Science Foundation grant no. 2010120. This work was done in part while visiting the Simons Institute for the Theory of Computing at UC Berkeley. ISSN 1433-8092 Electronic Colloquium on Computational Complexity, Report No. 27 (2017)

[1]  Gil Cohen,et al.  Local Correlation Breakers and Applications to Three-Source Extractors and Mergers , 2015, 2015 IEEE 56th Annual Symposium on Foundations of Computer Science.

[2]  Yevgeniy Dodis,et al.  Non-malleable extractors and symmetric key cryptography from weak secrets , 2009, STOC '09.

[3]  Oded Goldreich,et al.  Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity , 1988, SIAM J. Comput..

[4]  Fan Chung Graham A note on constructive methods for ramsey numbers , 1981, J. Graph Theory.

[5]  Xin Li,et al.  Explicit Non-malleable Extractors, Multi-source Extractors, and Almost Optimal Privacy Amplification Protocols , 2016, 2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS).

[6]  Amnon Ta-Shma,et al.  Explicit two-source extractors for near-logarithmic min-entropy , 2016, Electron. Colloquium Comput. Complex..

[7]  Gil Cohen,et al.  Making the Most of Advice: New Correlation Breakers and Their Applications , 2016, 2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS).

[8]  David Zuckerman,et al.  Electronic Colloquium on Computational Complexity, Report No. 100 (2005) Linear Degree Extractors and the Inapproximability of MAX CLIQUE and CHROMATIC NUMBER , 2005 .

[9]  Raghu Meka,et al.  Explicit Resilient Functions Matching Ajtai-Linial , 2015, SODA.

[10]  J. Bourgain,et al.  MORE ON THE SUM-PRODUCT PHENOMENON IN PRIME FIELDS AND ITS APPLICATIONS , 2005 .

[11]  Ran Raz,et al.  Extractors with weak random seeds , 2005, STOC '05.

[12]  Vipul Goyal,et al.  Non-malleable extractors and codes, with their many tampered extensions , 2015, IACR Cryptol. ePrint Arch..

[13]  Noga Alon,et al.  The Shannon Capacity of a Union , 1998, Comb..

[14]  Xin Li,et al.  Three-Source Extractors for Polylogarithmic Min-Entropy , 2015, 2015 IEEE 56th Annual Symposium on Foundations of Computer Science.

[15]  David Zuckerman,et al.  Explicit two-source extractors and resilient functions , 2016, Electron. Colloquium Comput. Complex..

[16]  Xin Li,et al.  Improved non-malleable extractors, non-malleable codes and independent source extractors , 2016, Electron. Colloquium Comput. Complex..

[17]  Gil Cohen,et al.  Two-source dispersers for polylogarithmic entropy and improved ramsey graphs , 2015, Electron. Colloquium Comput. Complex..

[18]  Gil Cohen,et al.  Two-Source Extractors for Quasi-Logarithmic Min-Entropy and Improved Privacy Amplification Protocols , 2016, Electron. Colloquium Comput. Complex..

[19]  Victor Neumann-Lara,et al.  The dichromatic number of a digraph , 1982, J. Comb. Theory, Ser. B.

[20]  M. Naor Constructing Ramsey graphs from small probability spaces , 1992 .

[21]  H. L. Abbott,et al.  Lower Bounds for Some Ramsey Numbers , 1974, J. Comb. Theory, Ser. A.

[22]  Xin Li,et al.  Improved Constructions of Two-Source Extractors , 2015, Electron. Colloquium Comput. Complex..

[23]  Jaikumar Radhakrishnan,et al.  Bounds for Dispersers, Extractors, and Depth-Two Superconcentrators , 2000, SIAM J. Discret. Math..

[24]  Guy Kindler,et al.  Simulating independence: new constructions of condensers, ramsey graphs, dispersers, and extractors , 2005, STOC '05.

[25]  Gil Cohen,et al.  Non-Malleable Extractors - New Tools and Improved Constructions , 2016, Electron. Colloquium Comput. Complex..

[26]  Vince Grolmusz Low Rank Co-Diagonal Matrices and Ramsey Graphs , 2000, Electron. J. Comb..

[27]  Nathan Linial,et al.  The influence of variables on Boolean functions , 1988, [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science.

[28]  Avi Wigderson,et al.  2-source dispersers for $n^{o(1)}$ entropy, and Ramsey graphs beating the Frankl-Wilson construction , 2012 .

[29]  Peter Frankl,et al.  Intersection theorems with geometric consequences , 1981, Comb..