TY - GEN
T1 - Correlation extractors and their applications(Invited Talk)
AU - Ishai, Yuval
N1 - Funding Information: ★ Based on a joint work with Eyal Kushilevitz, Rafail Ostrovsky, and Amit Sahai [16]. ★★Supported by ERC Starting Grant 259426, ISF grant 1361/10, and BSF grant 2008411.
PY - 2011
Y1 - 2011
N2 - Randomness extractors convert dirty sources of randomness into clean sources of randomness. Motivated by the usefulness of correlated randomness in cryptography, we introduce an extension of randomness extraction and the related notion of privacy amplification to the case of correlated sources. Our main result is an efficient interactive two-party protocol which extracts m clean independent instances of a given joint distribution (X,Y) from n=O(m) dirty (or "leaky") instances of the same distribution. The classical case corresponds to X and Y being identical random bits. We present several applications of correlation extractors to cryptography.
AB - Randomness extractors convert dirty sources of randomness into clean sources of randomness. Motivated by the usefulness of correlated randomness in cryptography, we introduce an extension of randomness extraction and the related notion of privacy amplification to the case of correlated sources. Our main result is an efficient interactive two-party protocol which extracts m clean independent instances of a given joint distribution (X,Y) from n=O(m) dirty (or "leaky") instances of the same distribution. The classical case corresponds to X and Y being identical random bits. We present several applications of correlation extractors to cryptography.
UR - http://www.scopus.com/inward/record.url?scp=79956331195&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-20728-0_1
DO - 10.1007/978-3-642-20728-0_1
M3 - منشور من مؤتمر
SN - 9783642207273
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 1
EP - 5
BT - Information Theoretic Security - 5th International Conference, ICITS 2011, Proceedings
T2 - 5th International Conference on Information Theoretic Security, ICITS 2011
Y2 - 21 May 2011 through 24 May 2011
ER -