Skip to main content

Abstract

Given two independent weak random sources X,Y, with the same length ℓ and min-entropies b X , b Y whose sum is greater than \(\ell+ \Omega(\mbox{\sf polylog}(\ell/\varepsilon))\), we construct a deterministic two-source extractor (aka “blender”) that extracts max (b X ,b Y ) + (b X  + b Y  − − ℓ − − 4log(1/ε)) bits which are ε-close to uniform. In contrast, best previously published construction [4] extracted at most \(\frac{1}{2}(b_X + b_Y -- \ell -- 2\log(1/\varepsilon))\) bits. Our main technical tool is a construction of a strong two-source extractor that extracts (b X + b Y – ℓ) – 2log(1/ε) bits which are ε-close to being uniform and independent of one of the sources (aka “strong blender”), so that they can later be reused as a seed to a seeded extractor. Our strong two-source extractor construction improves the best previously published construction of such strong blenders [7] by a factor of 2, applies to more sources X and Y, and is considerably simpler than the latter. Our methodology also unifies several of the previous two-source extractor constructions from the literature.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alon, N.: Tools from higher algebra. In: Graham, R.L., Grötschel, M., Lovàsz, L. (eds.) Handbook of Combinatorics, ch.32, pp. 1749–1783. North Holland, Amsterdam (1995)

    Google Scholar 

  2. Andreev, A.C., Rolim, J., Trevisan, L.: Trevisan. Dispersers, deterministic amplification, and weak random sources. SIAM J. on Comput. 28(6), 2103–2116 (1999)

    Article  MATH  MathSciNet  Google Scholar 

  3. Barak, B., Impagliazzo, R., Wigderson, A.: Extracting Randomness from Few Independent Sources (2004) (manuscript)

    Google Scholar 

  4. Chor, B., Goldreich, O.: Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM J. Comput. 17(2), 230–261 (1988)

    Article  MATH  MathSciNet  Google Scholar 

  5. Cohen, A., Wigderson, A.: Dispersers, deterministic amplification, and weak random sources. In: Proc. of FOCS, pp. 14–19 (1989)

    Google Scholar 

  6. Dodis, Y., Spencer, J.: On the (Non-)Universality of the One-Time Pad. In: Proc. of FOCS (2002)

    Google Scholar 

  7. Dodis, Y., Oliveira, R.: On Extracting Private Randomness over a Public Channel. In: RANDOM-APPROX, pp. 252–263 (2003)

    Google Scholar 

  8. Goldreich, O.: Three XOR-Lemmas - An Exposition. Electronic Colloquium on Computational Complexity, ECCC (1995)

    Google Scholar 

  9. Graham, R.L., Spencer, J.H.: A constructive solution to a tournament problem. Canad. Math. Bull. 14, 45–48

    Google Scholar 

  10. Lu, C., Reingold, O., Vadhan, S., Wigderson, A.: Extractors: Optimal Up to Constant Factors. In: Proc. of STOC (2003)

    Google Scholar 

  11. Maurer, U., Wolf, S.: Privacy Amplification Secure Against Active Adversaries. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 307–321. Springer, Heidelberg (1997)

    Google Scholar 

  12. McInnes, J., Pinkas, B.: On the Impossibility of Private Key Cryptography with Weakly Random Keys. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 421–435. Springer, Heidelberg (1991)

    Google Scholar 

  13. Meshulam, R.: Spaces of Hankel matrices over finite fields. Linear Algebra and its Applications 218 (1995)

    Google Scholar 

  14. E. Mossel, A. Shpilka, L. Trevisan. On ε − biased Generators in NC0. In Proc. of FOCS, 2003.

    Google Scholar 

  15. Nisan, N., Ta-Shma, A.: Extracting Randomness: a survey and new constructions. JCSS 58(1), 148–173 (1999)

    MATH  MathSciNet  Google Scholar 

  16. Nisan, N., Zuckerman, D.: Randomness is Linear in Space. JCSS 52(1), 43–52 (1996)

    MATH  MathSciNet  Google Scholar 

  17. Raz, R., Reingold, O., Vadhan, S.: Extracting all the randomness and reducing the error in Trevisan’s extractors. Journal of Computer and System Sciences (2002)

    Google Scholar 

  18. Rónyai, L., Babai, L., Ganapathy, M.: On the number of zero-patterns in a sequence of polynomials. Journal of the AMS (2002)

    Google Scholar 

  19. Roth, R.: Maximum rank array codes and their application to crisscross error correction. IEEE transactions on Information Theory 37 (1991)

    Google Scholar 

  20. Sántha, M., Vazirani, U.: Generating Quasi-Random Sequences from Semi-Random Sources. Journal of Computer and System Sciences 33(1), 75–87 (1986)

    Article  MATH  MathSciNet  Google Scholar 

  21. Shaltiel, R.: Recent developments in Explicit Constructions of Extractors. Bulletin of the EATCS 77, 67–95 (2002)

    MATH  MathSciNet  Google Scholar 

  22. Shaltiel, R., Umans, C.: Simple extractors for all min-entropies and a new pseudorandom generator. In: Proceedings of FOCS 2001, pp. 648–657. IEEE Computer Society, Los Alamitos (2001)

    Google Scholar 

  23. Trevisan, L.: Construction of Extractors Using PseudoRandom Generators. In: Proc. of STOC, pp. 141–148 (1999)

    Google Scholar 

  24. Vazirani, U.: Randomness, Adversaries and Computation. PhD Thesis, University of California, Berkeley (1986)

    Google Scholar 

  25. Vazirani, U.: Strong Communication Complexity or Generating Quasi-Random Sequences from Two Communicating Semi-Random Sources. Combinatorica 7(4), 375–392 (1987)

    Article  MATH  MathSciNet  Google Scholar 

  26. Vazirani, U., Vazirani, V.: Random polynomial time is equal to slightly-random polynomial time. In: Proc. of 26th FOCS, pp. 417–428 (1985)

    Google Scholar 

  27. Vazirani, U.: Efficiency Considerations in using semi-random sources. In: Proceedings of the nineteenth annual ACM conference on Theory of computing, pp. 160–168 (1987)

    Google Scholar 

  28. Wigderson, A.: Open problems. Notes from DIMACS Workshop on Pseudorandomness and Explicit Combinatorial Constructions (1999)

    Google Scholar 

  29. Zuckerman, D.: Simulating BPP Using a General Weak Random Source. Algorithmica 16(4/5), 367–391 (1996)

    MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dodis, Y., Elbaz, A., Oliveira, R., Raz, R. (2004). Improved Randomness Extraction from Two Independent Sources. In: Jansen, K., Khanna, S., Rolim, J.D.P., Ron, D. (eds) Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques. RANDOM APPROX 2004 2004. Lecture Notes in Computer Science, vol 3122. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-27821-4_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-27821-4_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22894-3

  • Online ISBN: 978-3-540-27821-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics