Non-Malleable Extractors and Non-Malleable Codes: Partially Optimal Constructions

by   Xin Li, et al.

The recent line of study on randomness extractors has been a great success, resulting in exciting new techniques, new connections, and breakthroughs to long standing open problems in several seemingly different topics. These include seeded non-malleable extractors, privacy amplification protocols with an active adversary, independent source extractors (and explicit Ramsey graphs), and non-malleable codes in the split state model. However, in all cases there is still a gap to optimum and the motivation to close this gap remains strong. In this paper, we introduce a set of new techniques to further push the frontier in the above questions. Our techniques lead to improvements in all of the above questions, and in several cases partially optimal constructions. Specifically, we obtain: 1. A seeded non-malleable extractor with seed length O(log n)+log^1+o(1)(1/ϵ) and entropy requirement O(log log n+log(1/ϵ)), where the entropy requirement is asymptotically optimal by a recent result of Gur and Shinkar GurS17; 2. A two-round privacy amplification protocol with optimal entropy loss for security parameter up to Ω(k), which solves the privacy amplification problem completely; 3. A two-source extractor for entropy O(log n log log n/log log log n), which also gives an explicit Ramsey graph on N vertices with no clique or independent set of size (log N)^O(log log log N/log log log log N); and 4. The first explicit non-malleable code in the 2-split state model with constant rate, which has been a major goal in the study of non-malleable codes for quite some time. One small caveat is that the error of this code is only (an arbitrarily small) constant, but we can also achieve negligible error with rate Ω(log log log n/log log n), which already improves the rate in Li17 exponentially.


page 1

page 2

page 3

page 4


Two Source Extractors for Asymptotically Optimal Entropy, and (Many) More

A long line of work in the past two decades or so established close conn...

Extractors: Low Entropy Requirements Colliding With Non-Malleability

The known constructions of negligible error (non-malleable) two-source e...

Quantum secure non-malleable-extractors

We construct several explicit quantum secure non-malleable-extractors. A...

Non-Malleable Extractors and Codes in the Interleaved Split-State Model and More

We present explicit constructions of non-malleable codes with respect to...

An Entropy Lower Bound for Non-Malleable Extractors

A (k,ε)-non-malleable extractor is a function nmExt : {0,1}^n ×{0,1}^d ...

Optimal Codes Correcting a Burst of Deletions of Variable Length

In this paper, we present an efficiently encodable and decodable code co...

Optimal Codes Correcting Localized Deletions

We consider the problem of constructing codes that can correct deletions...

Please sign up or login with your details

Forgot password? Click here to reset