DocumentCode :
2574273
Title :
On extractors, error-correction and hiding all partial information
Author :
Dodis, Yevgeniy
Author_Institution :
Dept. of Comput. Sci., New York Univ., NY
fYear :
2005
fDate :
19-19 Oct. 2005
Firstpage :
74
Lastpage :
79
Abstract :
Randomness extractors (Nisan and Zuckerman, 1996) allow one to obtain nearly perfect randomness from highly imperfect sources randomness, which are only known to contain "scattered" entropy. Not surprisingly, such extractors have found numerous applications in many areas of computer science including cryptography. Aside from extracting randomness, a less known usage of extractors comes from the fact that they hide all deterministic functions of their (high-entropy) input (Dodis and Smith, 2005): in other words, extractors provide certain level of privacy for the imperfect source that they use. In the latter kind of applications, one typically needs extra properties of extractors, such as invertibility, collision-resistance or error-correction. In this abstract we survey some of such usages of extractors, concentrating on several recent results by the author (Dodis et al., 2004 and Dodis and Smith, 2005). The primitives we survey include several flavors of randomness extractors, entropically secure encryption and perfect one-way hash functions. The main technical tools include several variants of the leftover hash lemma, error correcting codes, and the connection between randomness extraction and hiding all partial information. Due to space constraints, many important references and results are not mentioned here; interested reader can find those in the works of Dodis et al. (2004) and Dodis and Smith (2005)
Keywords :
cryptography; error correction codes; random codes; random functions; cryptography; deterministic function; entropically secure encryption; error correcting code; hash function; hash lemma; imperfect source randomness; partial information hiding; randomness extraction; randomness extractor; scattered entropy; Application software; Computer errors; Computer science; Cryptography; Data mining; Entropy; Error correction codes; Information security; Privacy; Random variables;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Theory and Practice in Information-Theoretic Security, 2005. IEEE Information Theory Workshop on
Conference_Location :
Awaji Island
Print_ISBN :
0-7803-9491-7
Type :
conf
DOI :
10.1109/ITWTPI.2005.1543961
Filename :
1543961
Link To Document :
بازگشت