Privacy Amplification and Non-Malleable Extractors Via Character Sums

Subscribers:
344,000
Published on ● Video Link: https://www.youtube.com/watch?v=6E2ne8Gmx44



Duration: 1:11:15
191 views
1


In studying how to communicate over a public channel with an active adversary, Dodis and Wichs introduced the notion of a non-malleable extractor. A non-malleable extractor dramatically strengthens the notion of a strong extractor in the sense that it requires the output to be close to uniform given the seed as well as the output of the extractor on an arbitrarily related different seed. We construct the first explicit non-malleable extractor. Our extractor works for sources with entropy rate above half. To achieve a polynomial running time when outputting many bits, we rely on a widely-believed conjecture about the distribution of prime numbers in arithmetic progressions. Using our non-malleable extractor, we obtain protocols for "privacy amplification": key agreement between two parties who share a weakly-random secret. Our protocols work in the presence of an active adversary with unlimited computational power, and have asymptotically optimal entropy loss. When the secret has entropy rate greater than 1/2, the protocol takes two rounds. When the secret has entropy rate delta for any constant delta0, our protocol takes a constant (polynomial in 1/delta) number of rounds. Our protocols run in polynomial time under the above well-known conjecture about primes. Joint work with Yevgeniy Dodis, Trevor D. Wooley and David Zuckerman.




Other Videos By Microsoft Research


2016-07-27Ten User Experience Best Practices for Windows Phone Application Development
2016-07-27Generalization Bounds and Consistency for Latent-Structural Probit and Ramp Loss
2016-07-27Structured Prediction in NLP: Dual Decomposition and Structured Sparsity
2016-07-27High Availability for Database Systems in Cloud Computing Environments
2016-07-27Batches: Unified and Efficient Access to RPC, WS, and SQL Services
2016-07-27Reliable Multithreading through Schedule Memoization
2016-07-27Generalized Oblivious Transfer (GOT)
2016-07-27From Contextual Search to Automatic Content Generation: Scaling Human Editorial Judgment
2016-07-27Bound Analysis of Imperative Programs with the Size-change Abstraction
2016-07-27A mobile context monitoring platform for dynamic mobile computing environments
2016-07-27Privacy Amplification and Non-Malleable Extractors Via Character Sums
2016-07-27Visualization Clusters: from Tiled Displays to Remote Visualization
2016-07-27The Median Hypothesis
2016-07-27Developing Natural Language-based Software Analyses & Tools to Expedite Software Maintenance
2016-07-27Semi-Supervised Learning for Acoustic and Prosodic Modeling in Speech Recognition
2016-07-27Code Bubbles: Making the Vision Real
2016-07-27A novel framework of effective resource management for multi-hop wireless networks
2016-07-27Trajectories and the Extended User Experience
2016-07-27Programming Devices and Services with P - Lecture 1
2016-07-27Local Combinatorics, and Some Words on Local-to-Global Phenomena
2016-07-27Hastings-Levitov aggregation in the small-particle limit



Tags:
microsoft research