Abstract
Randomness extractors [12] allow one to obtain nearly perfect randomness from highly imperfect sources randomness, which are only known to contain "scattered" entropy. Not surprisingly, such extractors have found numerous applications in many areas of computer science including cryptography. Aside from extracting randomness, a less known usage of extractors comes from the fact that they hide all deterministic functions of their (high-entropy) input [6]: in other words, extractors provide certain level of privacy for the imperfect source that they use. In the latter kind of applications, one typically needs extra properties of extractors, such as invertibility, collision-resistance or error-correction. In this abstract we survey some of such usages of extractors, concentrating on several recent results by the author [5], [6], [7]. The primitives we will survey include several flavors of randomness extractors, entropically secure encryption and perfect one-way hash functions. The main technical tools will include several variants of the leftover hash lemma, error correcting codes, and the connection between randomness extraction and hiding all partial information. Due to space constraints, many important references and results are not mentioned here; interested reader can find those in [5], [6], [7].
Original language | English (US) |
---|---|
Title of host publication | 2005 IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security |
Pages | 74-79 |
Number of pages | 6 |
Volume | 2005 |
DOIs | |
State | Published - 2005 |
Event | 2005 IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security - Awaiji Island, Japan Duration: Oct 16 2005 → Oct 19 2005 |
Other
Other | 2005 IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security |
---|---|
Country/Territory | Japan |
City | Awaiji Island |
Period | 10/16/05 → 10/19/05 |
ASJC Scopus subject areas
- General Engineering