67
Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification Gil Cohen Weizmann Institute Joint work with Ran Raz and Gil Segev

Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

  • Upload
    sal

  • View
    31

  • Download
    0

Embed Size (px)

DESCRIPTION

Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification. Gil Cohen Weizmann Institute Joint work with Ran Raz and Gil Segev. Randomness Seeded-Extractors. Randomness Seeded-Extractors. truly random bits (seed). bits from an imperfect source - PowerPoint PPT Presentation

Citation preview

Page 1: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Non-Malleable Extractors with Short Seeds and Applications to

Privacy Amplification

Gil CohenWeizmann Institute

Joint work withRan Raz and Gil Segev

Page 2: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Randomness Seeded-Extractors

Page 3: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Randomness Seeded-Extractors

Ext almost-trulyrandom bits

bits from animperfect sourceof randomness

truly random bits(seed)

Page 4: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Randomness Seeded-Extractors

Ext almost-trulyrandom bits

bits from animperfect source

of randomness

truly random bits(seed)

If all points has probability , the source is called an -source.

For simplicity, think of it as “uniform hidden bits”.

Page 5: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Randomness Seeded-Extractors

Ext almost-trulyrandom bits

bits from animperfect sourceof randomness

truly random bits(seed)

Measured in statistical distance.

Page 6: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Strong Seeded-Extractors

For any -source and independent

is called strong if

Page 7: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Parameters

Given • Maximize • Minimize

Ext almost-trulyrandom bits

bits from an-source

truly random bits(seed)

Non-Constructive and Optimal [Sips88], [RTS00]

Almost matching explicit constructions (…,[LRVW03],[GUV07] ,[DW08],[DKSS09]).

Page 8: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Non-MalleableExtractors

Defined by [DW09]

Page 9: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Non-Malleable Extractors

𝐸𝑥𝑡 (𝑊 ;𝑆 ) 𝜖𝑈𝑚

(𝐸𝑥𝑡 (𝑊 ;𝑆 ) ,𝑆 ) 𝜖 (𝑈𝑚 ,𝑆 )

with no fixed point.

Page 10: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

A Not Non-Malleable Extractor

Expanders are low-degree undirected graphs that “look random”.

Nodes Labeled neighbors (think of 1-16).

Are known to induce extractors.

Page 11: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

A Not Non-Malleable Extractor

Page 12: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

𝑤

A Not Non-Malleable Extractor

Page 13: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

𝑤

A Not Non-Malleable Extractor

4

Page 14: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

𝑤

A Not Non-Malleable Extractor

4

9

Page 15: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

𝑤

A Not Non-Malleable Extractor

4

9

1

Page 16: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

𝑤

A Not Non-Malleable Extractor

4

9

14

Page 17: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

𝑤

A Not Non-Malleable Extractor

4

9

14

7

Page 18: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

𝑤

A Not Non-Malleable Extractor

4

9

14

7

11

Page 19: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

𝑤

A Not Non-Malleable Extractor

𝐸𝑥𝑡 (𝑤 ;𝑠 )

4

9

14

7

11

Page 20: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

𝑤

A Not Non-Malleable Extractor

𝐸𝑥𝑡 (𝑤 ;𝑠 )

𝐸𝑥𝑡 (𝑤 ; 𝐴 (𝑠 ) )

4

9

14

7

11

10

Page 21: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Non-Constructive [DW09]

• Seed length • Output length

Compared with strong extractors• Seed length • Output length

Page 22: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Non-Constructive [DW09]

• Seed length • Output length

Compared with strong extractors• Seed length • Output length

Page 23: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Non-Constructive [DW09]

• Seed length • Output length

Compared with strong extractors• Seed length • Output length

Page 24: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

The Explicit Construction of [DLWZ11]

• Conditional efficiency

Page 25: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

The Explicit Construction of [DLWZ11]

• Conditional efficiency

Page 26: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

The Explicit Construction of [DLWZ11]

• Conditional efficiency

Page 27: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

The Explicit Construction of [DLWZ11]

• Conditional efficiency

Page 28: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Main Result

Page 29: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Main Result

• Unconditionally efficient

Page 30: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Main Result

• Unconditionally efficient

Page 31: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Main Result

• Unconditionally efficient

Page 32: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Main Result

• Unconditionally efficient

Page 33: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Main Result

• Unconditionally efficient

Page 34: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

PrivacyAmplification

- passive adversary -

[BBR88], [Mau92],[BBCM95]

Page 35: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

𝑤 𝑊

𝑅

Alice Bob

Eve

𝑅

?=

is an -source

Computationally unbounded!

Page 36: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Interesting Measures• Entropy loss• Communication complexity• Number of rounds

𝑤 𝑊

𝑅

Alice Bob

Eve

𝑅?=

Page 37: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Interesting Measures• Entropy loss• Communication complexity• Number of rounds

𝑤 𝑊

𝑅

Alice Bob

Eve

𝑅?=

from Eve’s point of view

Page 38: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Interesting Measures• Entropy loss• Communication complexity• Number of rounds

𝑤 𝑊

𝑅

Alice Bob

Eve

𝑅?=

Number of communicated bits

Page 39: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Interesting Measures• Entropy loss• Communication complexity• Number of rounds

𝑤 𝑊

𝑅

Alice Bob

Eve

𝑅?=

Page 40: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Strong Extractors to the Rescue

𝑤 𝑊

s 𝑈𝑑𝑠 𝑠

𝑅=𝐸𝑥𝑡 (𝑤 ,𝑠 ) 𝑅=𝐸𝑥𝑡 (𝑤 ,𝑠 )

Page 41: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Strong Extractors to the Rescue

• Entropy loss • Communication complexity • Number of rounds

𝑤 𝑊

s𝑠 𝑠

𝑅=𝐸𝑥𝑡 (𝑤 ,𝑠 ) 𝑅=𝐸𝑥𝑡 (𝑤 ,𝑠 )

Page 42: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

PrivacyAmplification

- active adversary -

[Mau97],[MM97],[Wol98],[MW03],[RW03], [DKRS06],[DW09],[KR09],[CKOR10]

Page 43: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Privacy Amplification Protocol Active Adversary

• Correctness• Privacy• Authenticity

Page 44: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

• Correctness• Privacy• Authenticity

If both parties are honest then they agree.

Privacy Amplification Protocol Active Adversary

Page 45: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

• Correctness• Privacy• Authenticity

For any Eve, from Eve’s view.

Privacy Amplification Protocol Active Adversary

Page 46: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

• Correctness• Privacy• Authenticity

For any Eve, .

Privacy Amplification Protocol Active Adversary

Page 47: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

𝑤 𝑊

𝑦 𝑈𝑑1

𝑘𝑒𝑦=𝑛𝑚𝐸𝑥𝑡 (𝑤 ;𝑦 )𝑠′ 𝑈 𝑑2

𝑦 ′𝑘𝑒𝑦 ′=𝑛𝑚𝐸𝑥𝑡 (𝑤 ; 𝑦 ′ )

𝜎 ′=𝑀𝐴𝐶𝑘𝑒𝑦 ′ (𝑠 ′ )𝑠′ ,𝜎 ′𝑠 ,𝜎

If

𝑅𝐵=𝐸𝑥𝑡 (𝑤 ,𝑠 ′ )𝑅𝐴=𝐸𝑥𝑡 (𝑤 ,𝑠 )

Page 48: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Privacy Amplification Protocols

[DW09] [DKRS06] [MW97]

Number of rounds

Entropy loss

Communication complexity

Assumed min-entropy

[DS02, DW09] 1 round requires

[RW03] gave rounds for

[CKOR10] gave rounds for

Page 49: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

2 Rounds Privacy Amplification Protocols ()

Our result 2

Our result 1

[DLWZ11] [DW09]Non-

constructive [DW09]

Entropy loss

Communication

complexity

Assumed min-entropy

Page 50: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

The Extractorof [Raz05]

Page 51: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

A sequence of r.v -fools linear tests of size if for every such that , it holds that

Fooling Linear Tests of Bounded Size

Good explicit constructions ([NN93], [AGHP92],…) and many applications.

Page 52: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

𝑍1𝑍 2𝑍𝐷

Points of the

sample space(seed)

Random variables

A Central Lemma from [Raz05]Seed

Weak source

-fools linear tests of size .

Ext

is a (strong) seeded-extractor for .

Page 53: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Proof IdeaFor

Page 54: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Proof Idea

𝑍1𝑍 2 ⋯ 𝑍𝐷

Page 55: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Proof Idea

𝑊

𝑍1𝑍 2 ⋯ 𝑍𝐷

Page 56: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Proof Idea

𝑊

𝑠 𝐴 (𝑠 )

𝐸𝑥𝑡 (𝑊 ;𝑠 )𝐸𝑥𝑡 (𝑊 ; 𝐴 (𝑠 ) )

is typically biased (say towards 0)

Page 57: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Proof Idea

𝑊

𝑠 𝐴 (𝑠 )

𝐸𝑥𝑡 (𝑊 ;𝑠 )𝐸𝑥𝑡 (𝑊 ; 𝐴 (𝑠 ) )

is typically biased (say towards 0)

Page 58: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Proof Idea

𝑠 𝐴 (𝑠 )

𝑠𝐴 (𝑠 )

𝑏𝑖𝑎𝑠 (𝑌 𝑠 )

Page 59: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Proof Idea

𝑠 𝐴 (𝑠 )

𝑠𝐴 (𝑠 )

𝑏𝑖𝑎𝑠 (𝑌 𝑠 )Acyclic

Many vertices

Average edge weight is large

Page 60: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Proof Idea

𝑠 𝐴 (𝑠 )

𝑠𝐴 (𝑠 )

𝑏𝑖𝑎𝑠 (𝑌 𝑠 )Acyclic

Many vertices

Average edge weight is large

Page 61: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Proof Idea

⋯ 𝑍 𝑠⊕𝑍𝐴 (𝑠 )⋯

-fools linear tests of size

[Raz05] implies that this is also an

extractor

𝑊

stands in contradiction!

𝑌 𝑠=E 𝑥𝑡 (𝑊 ; 𝑠)⊕𝐸𝑥𝑡 (𝑊 ; 𝐴 (𝑠) )

Page 62: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

A Few Words on the

Proof Ideafor Arbitrary

Page 63: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Arbitrary : Less-trivial lemma about graphs. Constructing the acyclic graph using a greedy algorithm.

Arbitrary : A generalization of the Parity Lemma - Conditional Parity Lemma (a similar lemma appears in [DLWZ11]).

Proof Idea for Arbitrary

Page 64: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Proof Idea for Arbitrary

‖𝑋 −𝑈𝑚‖12≤ ∑

∅ ≠𝜎⊆ [𝑚 ]𝑏𝑖𝑎𝑠2 (𝑋𝜎 )

‖(𝑋 ,𝑌 )− (𝑈𝑚 ,𝑌 )‖12≤ ∑

∅ ≠𝜎 ⊆ [𝑚 ]𝜏⊆ [𝑛 ]

𝑏𝑖𝑎𝑠2 (𝑋𝜎⊕𝑌𝜏 )❑

for

𝑌=𝑌 1…𝑌 𝑛

(Classic) Parity Lemma

Conditional Parity Lemma

Page 65: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Open Questions

Page 66: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

1. Construct a non-malleable extractor for small min-entropies.

2. Devise a constant-round (hopefully 2) protocol with optimal entropy loss and communication complexity.

Open Questions

Page 67: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Thank You!