Extracting Randomness from Extractor-Dependent Sources

被引:9
|
作者
Dodis, Yevgeniy [1 ]
Vaikuntanathan, Vinod [2 ]
Wichs, Daniel [3 ,4 ]
机构
[1] NYU, New York, NY USA
[2] MIT, Cambridge, MA 02139 USA
[3] Northeastern Univ, Boston, MA 02115 USA
[4] NTT Res Inc, East Palo Altos, CA 94303 USA
基金
美国国家科学基金会;
关键词
D O I
10.1007/978-3-030-45721-1_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We revisit the well-studied problem of extracting nearly uniform randomness from an arbitrary source of sufficient min-entropy. Strong seeded extractors solve this problem by relying on a public random seed, which is unknown to the source. Here, we consider a setting where the seed is reused over time and the source may depend on prior calls to the extractor with the same seed. Can we still extract nearly uniform randomness? In more detail, we assume the seed is chosen randomly, but the source can make arbitrary oracle queries to the extractor with the given seed before outputting a sample. We require that the sample has entropy and differs from any of the previously queried values. The extracted output should look uniform even to a distinguisher that gets the seed. We consider two variants of the problem, depending on whether the source only outputs the sample, or whether it can also output some correlated public auxiliary information that preserves the sample's entropy. Our results are: Without Auxiliary Information: We show that every pseudo-random function (PRF) with a sufficiently high security level is a good extractor in this setting, even if the distinguisher is computationally unbounded. We further show that the source necessarily needs to be computationally bounded and that such extractors imply one-way functions. With Auxiliary Information: We construct secure extractors in this setting, as long as both the source and the distinguisher are computationally bounded. We give several constructions based on different intermediate primitives, yielding instantiations based on the DDH, DLIN, LWE or DCR assumptions. On the negative side, we show that one cannot prove security against computationally unbounded distinguishers in this setting under any standard assumption via a black-box reduction. Furthermore, even when restricting to computationally bounded distinguishers, we show that there exist PRFs that are insecure as extractors in this setting and that a large class of constructions cannot be proven secure via a black-box reduction from standard assumptions.
引用
收藏
页码:313 / 342
页数:30
相关论文
共 50 条
  • [1] Extracting randomness from multiple independent sources
    Lee, CJ
    Lu, CJ
    Tsai, SC
    Tzeng, WG
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (06) : 2224 - 2227
  • [2] Linear Extractors for Extracting Randomness from Noisy Sources
    Zhou, Hongchao
    Bruck, Jehoshua
    2011 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2011,
  • [3] Extracting randomness using few independent sources
    Barak, Boaz
    Impagliazzo, Russell
    Wigderson, Avi
    SIAM JOURNAL ON COMPUTING, 2006, 36 (04) : 1095 - 1118
  • [4] Extracting randomness using few independent sources
    Barak, B
    Impagliazzo, R
    Wigderson, A
    45TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2004, : 384 - 393
  • [5] Extracting randomness from generalized symbol-fixing and Markov sources
    König, R
    Maurer, U
    2004 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2004, : 232 - 232
  • [6] Extracting Randomness from Nucleotide Sequencers for use in a Decentralised Randomness Beacon
    Hurley-Smith, Darren
    Droop, Alastair
    Lyon, Remy
    Teodor, Roxana I.
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [7] Extracting Randomness from Samplable Distributions, Revisited
    Ball, Marshall
    Goldin, Eli
    Dachman-Soled, Dana
    Mutreja, Saachi
    2023 IEEE 64TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, FOCS, 2023, : 1505 - 1514
  • [8] Knowledge extractor: A tool for extracting knowledge from text
    Cyre, WR
    CONCEPTUAL STRUCTURES: FULFILLING PEIRCE'S DREAM, 1997, 1257 : 607 - 610
  • [9] Extractor: Extracting Attack Behavior from Threat Reports
    Satvat, Kiavash
    Gjomemo, Rigel
    Venkatakrishnan, V. N.
    2021 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2021), 2021, : 598 - 615
  • [10] EXTRACTING INFORMATION FROM APPARENT RANDOMNESS IN CARDIOVASCULAR DATA
    HUANG, NK
    HALBERG, F
    PROCEEDINGS OF THE ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY, PTS 1-4, 1988, : 1824 - 1824