메뉴 건너뛰기




Volumn , Issue , 2011, Pages 668-677

Privacy amplification and non-malleable extractors via character sums

Author keywords

[No Author keywords available]

Indexed keywords

ACTIVE ADVERSARY; ARBITRARY FUNCTIONS; ARITHMETIC PROGRESSIONS; ASYMPTOTICALLY OPTIMAL; CHARACTER SUMS; COMPUTATIONAL POWER; ENTROPY RATES; KEY AGREEMENT; NEW PROTOCOL; NON-MALLEABLE; POLYNOMIAL-TIME; PRIME NUMBER; PRIVACY AMPLIFICATION; RANDOM SEEDS; RUNNING TIME;

EID: 84863321325     PISSN: 02725428     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/FOCS.2011.67     Document Type: Conference Paper
Times cited : (22)

References (23)
  • 3
    • 21244480384 scopus 로고    scopus 로고
    • Privacy amplification secure against active adversaries
    • U. M. Maurer and S. Wolf, "Privacy amplification secure against active adversaries," in CRYPTO '97, 1997.
    • CRYPTO '97, 1997
    • Maurer, U.M.1    Wolf, S.2
  • 4
    • 33749541274 scopus 로고    scopus 로고
    • Robust fuzzy extractors and authenticated key agreement from close secrets
    • Y. Dodis, J. Katz, L. Reyzin, and A. Smith, "Robust fuzzy extractors and authenticated key agreement from close secrets," in CRYPTO, 2006, pp. 232-250.
    • (2006) CRYPTO , pp. 232-250
    • Dodis, Y.1    Katz, J.2    Reyzin, L.3    Smith, A.4
  • 5
    • 70350700885 scopus 로고    scopus 로고
    • Non-malleable extractors and symmetric key cryptography from weak secrets
    • Y. Dodis and D. Wichs, "Non-malleable extractors and symmetric key cryptography from weak secrets," in STOC09, 2009.
    • STOC09, 2009
    • Dodis, Y.1    Wichs, D.2
  • 6
    • 35048874991 scopus 로고    scopus 로고
    • Unconditional authenticity and privacy from an arbitrarily weak secret
    • R. Renner and S. Wolf, "Unconditional authenticity and privacy from an arbitrarily weak secret," in CRYPTO, 2003, pp. 78-95.
    • (2003) CRYPTO , pp. 78-95
    • Renner, R.1    Wolf, S.2
  • 7
    • 67650671123 scopus 로고    scopus 로고
    • Key agreement from close secrets over unsecured channels
    • B. Kanukurthi and L. Reyzin, "Key agreement from close secrets over unsecured channels," in EUROCRYPT, 2009, pp. 206-223.
    • (2009) EUROCRYPT , pp. 206-223
    • Kanukurthi, B.1    Reyzin, L.2
  • 8
  • 9
    • 0023985259 scopus 로고
    • Unbiased bits from sources of weak randomness and probabilistic communication complexity
    • B. Chor and O. Goldreich, "Unbiased bits from sources of weak randomness and probabilistic communication complexity," SIAM Journal on Computing, vol. 17, no. 2, pp. 230-261, 1988.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 230-261
    • Chor, B.1    Goldreich, O.2
  • 10
    • 52149090133 scopus 로고    scopus 로고
    • An improved robust fuzzy extractor
    • B. Kanukurthi and L. Reyzin, "An improved robust fuzzy extractor," in SCN, 2008, pp. 156-171.
    • (2008) SCN , pp. 156-171
    • Kanukurthi, B.1    Reyzin, L.2
  • 11
    • 84863321730 scopus 로고    scopus 로고
    • Non-malleable extractors with short seeds and applications to privacy amplification
    • G. Cohen, R. Raz, and G. Segev, "Non-malleable extractors with short seeds and applications to privacy amplification," ECCC Report TR11-096, 2011.
    • (2011) ECCC Report TR11-096
    • Cohen, G.1    Raz, R.2    Segev, G.3
  • 13
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," SIAM Journal on Computing, vol. 38, pp. 97-139, 2008.
    • (2008) SIAM Journal on Computing , vol.38 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 16
    • 30744451262 scopus 로고    scopus 로고
    • On extracting private randomness over a public channel
    • Y. Dodis and R. Oliveira, "On extracting private randomness over a public channel," in RANDOM 2003, 2003, pp. 252-263.
    • (2003) RANDOM 2003 , pp. 252-263
    • Dodis, Y.1    Oliveira, R.2
  • 18
    • 0003215121 scopus 로고
    • Equations over Finite Fields. An Elementary Approach
    • ser. Springer-Verlag
    • W. Schmidt, Equations over Finite Fields. An Elementary Approach, ser. Lecture Notes in Mathematics. Springer-Verlag, 1976, vol. 536.
    • (1976) Lecture Notes in Mathematics , vol.536
    • Schmidt, W.1
  • 19
    • 34848820045 scopus 로고    scopus 로고
    • Simulating independence: New constructions of condensers, Ramsey graphs, dispersers, and extractors
    • B. Barak, G. Kindler, R. Shaltiel, B. Sudakov, and A. Wigderson, "Simulating independence: New constructions of condensers, Ramsey graphs, dispersers, and extractors," in STOC05, 2005, pp. 1-10.
    • STOC05, 2005 , pp. 1-10
    • Barak, B.1    Kindler, G.2    Shaltiel, R.3    Sudakov, B.4    Wigderson, A.5
  • 20
    • 34848882226 scopus 로고    scopus 로고
    • Extractors with weak random seeds
    • R. Raz, "Extractors with weak random seeds," in STOC05, 2005, pp. 11-20.
    • STOC05, 2005 , pp. 11-20
    • Raz, R.1
  • 21
    • 43849088675 scopus 로고    scopus 로고
    • Linear degree extractors and the inapproximability of Max Clique and Chromatic Number
    • D. Zuckerman, "Linear degree extractors and the inapproximability of Max Clique and Chromatic Number,"Theory of Computing, vol. 3, pp. 103-128, 2007.
    • (2007) Theory of Computing , vol.3 , pp. 103-128
    • Zuckerman, D.1
  • 22
    • 68549120859 scopus 로고    scopus 로고
    • Unbalanced expanders and randomness extractors from Parvaresh-Vardy codes
    • V. Guruswami, C. Umans, and S. Vadhan, "Unbalanced expanders and randomness extractors from Parvaresh-Vardy codes," Journal of the ACM, vol. 56, no. 4, 2009.
    • (2009) Journal of the ACM , vol.56 , Issue.4
    • Guruswami, V.1    Umans, C.2    Vadhan, S.3
  • 23
    • 77952402919 scopus 로고    scopus 로고
    • Extensions to the method of multiplicities, with applications to kakeya sets and mergers
    • Z. Dvir, S. Kopparty, S. Saraf, and M. Sudan, "Extensions to the method of multiplicities, with applications to kakeya sets and mergers," in FOCS09, 2009.
    • FOCS09, 2009
    • Dvir, Z.1    Kopparty, S.2    Saraf, S.3    Sudan, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.