120,974 research outputs found
A Quantum-Proof Non-Malleable Extractor, With Application to Privacy Amplification against Active Quantum Adversaries
In privacy amplification, two mutually trusted parties aim to amplify the
secrecy of an initial shared secret in order to establish a shared private
key by exchanging messages over an insecure communication channel. If the
channel is authenticated the task can be solved in a single round of
communication using a strong randomness extractor; choosing a quantum-proof
extractor allows one to establish security against quantum adversaries.
In the case that the channel is not authenticated, Dodis and Wichs (STOC'09)
showed that the problem can be solved in two rounds of communication using a
non-malleable extractor, a stronger pseudo-random construction than a strong
extractor.
We give the first construction of a non-malleable extractor that is secure
against quantum adversaries. The extractor is based on a construction by Li
(FOCS'12), and is able to extract from source of min-entropy rates larger than
. Combining this construction with a quantum-proof variant of the
reduction of Dodis and Wichs, shown by Cohen and Vidick (unpublished), we
obtain the first privacy amplification protocol secure against active quantum
adversaries
Three-Source Extractors for Polylogarithmic Min-Entropy
We continue the study of constructing explicit extractors for independent
general weak random sources. The ultimate goal is to give a construction that
matches what is given by the probabilistic method --- an extractor for two
independent -bit weak random sources with min-entropy as small as . Previously, the best known result in the two-source case is an
extractor by Bourgain \cite{Bourgain05}, which works for min-entropy ;
and the best known result in the general case is an earlier work of the author
\cite{Li13b}, which gives an extractor for a constant number of independent
sources with min-entropy . However, the constant in the
construction of \cite{Li13b} depends on the hidden constant in the best known
seeded extractor, and can be large; moreover the error in that construction is
only .
In this paper, we make two important improvements over the result in
\cite{Li13b}. First, we construct an explicit extractor for \emph{three}
independent sources on bits with min-entropy .
In fact, our extractor works for one independent source with poly-logarithmic
min-entropy and another independent block source with two blocks each having
poly-logarithmic min-entropy. Thus, our result is nearly optimal, and the next
step would be to break the barrier in two-source extractors. Second, we
improve the error of the extractor from to
, which is almost optimal and crucial for cryptographic
applications. Some of the techniques developed here may be of independent
interests
Constructing practical Fuzzy Extractors using QIM
Fuzzy extractors are a powerful tool to extract randomness from noisy data. A fuzzy extractor can extract randomness only if the source data is discrete while in practice source data is continuous. Using quantizers to transform continuous data into discrete data is a commonly used solution. However, as far as we know no study has been made of the effect of the quantization strategy on the performance of fuzzy extractors. We construct the encoding and the decoding function of a fuzzy extractor using quantization index modulation (QIM) and we express properties of this fuzzy extractor in terms of parameters of the used QIM. We present and analyze an optimal (in the sense of embedding rate) two dimensional construction. Our 6-hexagonal tiling construction offers ( log2 6 / 2-1) approx. 3 extra bits per dimension of the space compared to the known square quantization based fuzzy extractor
Infusion extractor
This invention relates to an apparatus and method of removing desirable constituents from an infusible material by infusion extraction. A piston operating in a first chamber draws a solvent into the first chamber where it may be heated, and then moves the heated solvent into a second chamber containing the infusible material, where infusion extraction takes place. The piston then moves the solvent containing the extract through a filter into the first chamber, leaving the extraction residue in the second chamber. The method is applicable to operation in low or micro-gravity environments
A Robust BAO Extractor
We define a procedure to extract the oscillating part of a given nonlinear
Power Spectrum, and derive an equation describing its evolution including the
leading effects at all scales. The intermediate scales are taken into account
by standard perturbation theory, the long range (IR) displacements are included
by using consistency relations, and the effect of small (UV) scales is included
via effective coefficients computed in simulations. We show that the UV effects
are irrelevant in the evolution of the oscillating part, while they play a
crucial role in reproducing the smooth component. Our "extractor" operator can
be applied to simulations and real data in order to extract the Baryonic
Acoustic Oscillations (BAO) without any fitting function and nuisance
parameter. We conclude that the nonlinear evolution of BAO can be accurately
reproduced at all scales down to by our fast analytical method, without
any need of extra parameters fitted from simulations.Comment: Published version, 20 pages, 8 figure
From Graphs to Keyed Quantum Hash Functions
We present two new constructions of quantum hash functions: the first based
on expander graphs and the second based on extractor functions and estimate the
amount of randomness that is needed to construct them. We also propose a keyed
quantum hash function based on extractor function that can be used in quantum
message authentication codes and assess its security in a limited attacker
model
- …
