Correlation extractors and their applications(Invited Talk)

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review


Randomness extractors convert dirty sources of randomness into clean sources of randomness. Motivated by the usefulness of correlated randomness in cryptography, we introduce an extension of randomness extraction and the related notion of privacy amplification to the case of correlated sources. Our main result is an efficient interactive two-party protocol which extracts m clean independent instances of a given joint distribution (X,Y) from n=O(m) dirty (or "leaky") instances of the same distribution. The classical case corresponds to X and Y being identical random bits. We present several applications of correlation extractors to cryptography.

Original languageEnglish
Title of host publicationInformation Theoretic Security - 5th International Conference, ICITS 2011, Proceedings
Number of pages5
StatePublished - 2011
Event5th International Conference on Information Theoretic Security, ICITS 2011 - Amsterdam, Netherlands
Duration: 21 May 201124 May 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6673 LNCS


Conference5th International Conference on Information Theoretic Security, ICITS 2011

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science


Dive into the research topics of 'Correlation extractors and their applications(Invited Talk)'. Together they form a unique fingerprint.

Cite this