Abstract
Given two independent weak random sources X,Y, with the same length ℓ and min-entropies b X , b Y whose sum is greater than \(\ell+ \Omega(\mbox{\sf polylog}(\ell/\varepsilon))\), we construct a deterministic two-source extractor (aka “blender”) that extracts max (b X ,b Y ) + (b X + b Y − − ℓ − − 4log(1/ε)) bits which are ε-close to uniform. In contrast, best previously published construction [4] extracted at most \(\frac{1}{2}(b_X + b_Y -- \ell -- 2\log(1/\varepsilon))\) bits. Our main technical tool is a construction of a strong two-source extractor that extracts (b X + b Y – ℓ) – 2log(1/ε) bits which are ε-close to being uniform and independent of one of the sources (aka “strong blender”), so that they can later be reused as a seed to a seeded extractor. Our strong two-source extractor construction improves the best previously published construction of such strong blenders [7] by a factor of 2, applies to more sources X and Y, and is considerably simpler than the latter. Our methodology also unifies several of the previous two-source extractor constructions from the literature.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Alon, N.: Tools from higher algebra. In: Graham, R.L., Grötschel, M., Lovàsz, L. (eds.) Handbook of Combinatorics, ch.32, pp. 1749–1783. North Holland, Amsterdam (1995)
Andreev, A.C., Rolim, J., Trevisan, L.: Trevisan. Dispersers, deterministic amplification, and weak random sources. SIAM J. on Comput. 28(6), 2103–2116 (1999)
Barak, B., Impagliazzo, R., Wigderson, A.: Extracting Randomness from Few Independent Sources (2004) (manuscript)
Chor, B., Goldreich, O.: Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM J. Comput. 17(2), 230–261 (1988)
Cohen, A., Wigderson, A.: Dispersers, deterministic amplification, and weak random sources. In: Proc. of FOCS, pp. 14–19 (1989)
Dodis, Y., Spencer, J.: On the (Non-)Universality of the One-Time Pad. In: Proc. of FOCS (2002)
Dodis, Y., Oliveira, R.: On Extracting Private Randomness over a Public Channel. In: RANDOM-APPROX, pp. 252–263 (2003)
Goldreich, O.: Three XOR-Lemmas - An Exposition. Electronic Colloquium on Computational Complexity, ECCC (1995)
Graham, R.L., Spencer, J.H.: A constructive solution to a tournament problem. Canad. Math. Bull. 14, 45–48
Lu, C., Reingold, O., Vadhan, S., Wigderson, A.: Extractors: Optimal Up to Constant Factors. In: Proc. of STOC (2003)
Maurer, U., Wolf, S.: Privacy Amplification Secure Against Active Adversaries. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 307–321. Springer, Heidelberg (1997)
McInnes, J., Pinkas, B.: On the Impossibility of Private Key Cryptography with Weakly Random Keys. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 421–435. Springer, Heidelberg (1991)
Meshulam, R.: Spaces of Hankel matrices over finite fields. Linear Algebra and its Applications 218 (1995)
E. Mossel, A. Shpilka, L. Trevisan. On ε − biased Generators in NC0. In Proc. of FOCS, 2003.
Nisan, N., Ta-Shma, A.: Extracting Randomness: a survey and new constructions. JCSS 58(1), 148–173 (1999)
Nisan, N., Zuckerman, D.: Randomness is Linear in Space. JCSS 52(1), 43–52 (1996)
Raz, R., Reingold, O., Vadhan, S.: Extracting all the randomness and reducing the error in Trevisan’s extractors. Journal of Computer and System Sciences (2002)
Rónyai, L., Babai, L., Ganapathy, M.: On the number of zero-patterns in a sequence of polynomials. Journal of the AMS (2002)
Roth, R.: Maximum rank array codes and their application to crisscross error correction. IEEE transactions on Information Theory 37 (1991)
Sántha, M., Vazirani, U.: Generating Quasi-Random Sequences from Semi-Random Sources. Journal of Computer and System Sciences 33(1), 75–87 (1986)
Shaltiel, R.: Recent developments in Explicit Constructions of Extractors. Bulletin of the EATCS 77, 67–95 (2002)
Shaltiel, R., Umans, C.: Simple extractors for all min-entropies and a new pseudorandom generator. In: Proceedings of FOCS 2001, pp. 648–657. IEEE Computer Society, Los Alamitos (2001)
Trevisan, L.: Construction of Extractors Using PseudoRandom Generators. In: Proc. of STOC, pp. 141–148 (1999)
Vazirani, U.: Randomness, Adversaries and Computation. PhD Thesis, University of California, Berkeley (1986)
Vazirani, U.: Strong Communication Complexity or Generating Quasi-Random Sequences from Two Communicating Semi-Random Sources. Combinatorica 7(4), 375–392 (1987)
Vazirani, U., Vazirani, V.: Random polynomial time is equal to slightly-random polynomial time. In: Proc. of 26th FOCS, pp. 417–428 (1985)
Vazirani, U.: Efficiency Considerations in using semi-random sources. In: Proceedings of the nineteenth annual ACM conference on Theory of computing, pp. 160–168 (1987)
Wigderson, A.: Open problems. Notes from DIMACS Workshop on Pseudorandomness and Explicit Combinatorial Constructions (1999)
Zuckerman, D.: Simulating BPP Using a General Weak Random Source. Algorithmica 16(4/5), 367–391 (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dodis, Y., Elbaz, A., Oliveira, R., Raz, R. (2004). Improved Randomness Extraction from Two Independent Sources. In: Jansen, K., Khanna, S., Rolim, J.D.P., Ron, D. (eds) Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques. RANDOM APPROX 2004 2004. Lecture Notes in Computer Science, vol 3122. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-27821-4_30
Download citation
DOI: https://doi.org/10.1007/978-3-540-27821-4_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22894-3
Online ISBN: 978-3-540-27821-4
eBook Packages: Springer Book Archive