Transcript
Page 1: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Non-Malleable Extractors with Short Seeds and Applications to

Privacy Amplification

Gil CohenWeizmann Institute

Joint work withRan Raz and Gil Segev

Page 2: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Randomness Seeded-Extractors

Page 3: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Randomness Seeded-Extractors

Ext almost-trulyrandom bits

bits from animperfect sourceof randomness

truly random bits(seed)

Page 4: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Randomness Seeded-Extractors

Ext almost-trulyrandom bits

bits from animperfect source

of randomness

truly random bits(seed)

If all points has probability , the source is called an -source.

For simplicity, think of it as β€œuniform hidden bits”.

Page 5: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Randomness Seeded-Extractors

Ext almost-trulyrandom bits

bits from animperfect sourceof randomness

truly random bits(seed)

Measured in statistical distance.

Page 6: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Strong Seeded-Extractors

For any -source and independent

is called strong if

Page 7: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Parameters

Given β€’ Maximize β€’ Minimize

Ext almost-trulyrandom bits

bits from an-source

truly random bits(seed)

Non-Constructive and Optimal [Sips88], [RTS00]

Almost matching explicit constructions (…,[LRVW03],[GUV07] ,[DW08],[DKSS09]).

Page 8: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Non-MalleableExtractors

Defined by [DW09]

Page 9: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Non-Malleable Extractors

𝐸π‘₯𝑑 (π‘Š ;𝑆 ) πœ–π‘ˆπ‘š

(𝐸π‘₯𝑑 (π‘Š ;𝑆 ) ,𝑆 ) πœ– (π‘ˆπ‘š ,𝑆 )

with no fixed point.

Page 10: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

A Not Non-Malleable Extractor

Expanders are low-degree undirected graphs that β€œlook random”.

Nodes Labeled neighbors (think of 1-16).

Are known to induce extractors.

Page 11: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

A Not Non-Malleable Extractor

Page 12: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

𝑀

A Not Non-Malleable Extractor

Page 13: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

𝑀

A Not Non-Malleable Extractor

4

Page 14: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

𝑀

A Not Non-Malleable Extractor

4

9

Page 15: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

𝑀

A Not Non-Malleable Extractor

4

9

1

Page 16: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

𝑀

A Not Non-Malleable Extractor

4

9

14

Page 17: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

𝑀

A Not Non-Malleable Extractor

4

9

14

7

Page 18: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

𝑀

A Not Non-Malleable Extractor

4

9

14

7

11

Page 19: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

𝑀

A Not Non-Malleable Extractor

𝐸π‘₯𝑑 (𝑀 ;𝑠 )

4

9

14

7

11

Page 20: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

𝑀

A Not Non-Malleable Extractor

𝐸π‘₯𝑑 (𝑀 ;𝑠 )

𝐸π‘₯𝑑 (𝑀 ; 𝐴 (𝑠 ) )

4

9

14

7

11

10

Page 21: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Non-Constructive [DW09]

β€’ Seed length β€’ Output length

Compared with strong extractorsβ€’ Seed length β€’ Output length

Page 22: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Non-Constructive [DW09]

β€’ Seed length β€’ Output length

Compared with strong extractorsβ€’ Seed length β€’ Output length

Page 23: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Non-Constructive [DW09]

β€’ Seed length β€’ Output length

Compared with strong extractorsβ€’ Seed length β€’ Output length

Page 24: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

The Explicit Construction of [DLWZ11]

β€’ Conditional efficiency

Page 25: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

The Explicit Construction of [DLWZ11]

β€’ Conditional efficiency

Page 26: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

The Explicit Construction of [DLWZ11]

β€’ Conditional efficiency

Page 27: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

The Explicit Construction of [DLWZ11]

β€’ Conditional efficiency

Page 28: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Main Result

Page 29: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Main Result

β€’ Unconditionally efficient

Page 30: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Main Result

β€’ Unconditionally efficient

Page 31: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Main Result

β€’ Unconditionally efficient

Page 32: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Main Result

β€’ Unconditionally efficient

Page 33: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Main Result

β€’ Unconditionally efficient

Page 34: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

PrivacyAmplification

- passive adversary -

[BBR88], [Mau92],[BBCM95]

Page 35: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

𝑀 π‘Š

𝑅

Alice Bob

Eve

𝑅

?=

is an -source

Computationally unbounded!

Page 36: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Interesting Measuresβ€’ Entropy lossβ€’ Communication complexityβ€’ Number of rounds

𝑀 π‘Š

𝑅

Alice Bob

Eve

𝑅?=

Page 37: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Interesting Measuresβ€’ Entropy lossβ€’ Communication complexityβ€’ Number of rounds

𝑀 π‘Š

𝑅

Alice Bob

Eve

𝑅?=

from Eve’s point of view

Page 38: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Interesting Measuresβ€’ Entropy lossβ€’ Communication complexityβ€’ Number of rounds

𝑀 π‘Š

𝑅

Alice Bob

Eve

𝑅?=

Number of communicated bits

Page 39: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Interesting Measuresβ€’ Entropy lossβ€’ Communication complexityβ€’ Number of rounds

𝑀 π‘Š

𝑅

Alice Bob

Eve

𝑅?=

Page 40: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Strong Extractors to the Rescue

𝑀 π‘Š

s π‘ˆπ‘‘π‘  𝑠

𝑅=𝐸π‘₯𝑑 (𝑀 ,𝑠 ) 𝑅=𝐸π‘₯𝑑 (𝑀 ,𝑠 )

Page 41: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Strong Extractors to the Rescue

β€’ Entropy loss β€’ Communication complexity β€’ Number of rounds

𝑀 π‘Š

s𝑠 𝑠

𝑅=𝐸π‘₯𝑑 (𝑀 ,𝑠 ) 𝑅=𝐸π‘₯𝑑 (𝑀 ,𝑠 )

Page 42: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

PrivacyAmplification

- active adversary -

[Mau97],[MM97],[Wol98],[MW03],[RW03], [DKRS06],[DW09],[KR09],[CKOR10]

Page 43: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Privacy Amplification Protocol Active Adversary

β€’ Correctnessβ€’ Privacyβ€’ Authenticity

Page 44: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

β€’ Correctnessβ€’ Privacyβ€’ Authenticity

If both parties are honest then they agree.

Privacy Amplification Protocol Active Adversary

Page 45: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

β€’ Correctnessβ€’ Privacyβ€’ Authenticity

For any Eve, from Eve’s view.

Privacy Amplification Protocol Active Adversary

Page 46: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

β€’ Correctnessβ€’ Privacyβ€’ Authenticity

For any Eve, .

Privacy Amplification Protocol Active Adversary

Page 47: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

𝑀 π‘Š

𝑦 π‘ˆπ‘‘1

π‘˜π‘’π‘¦=π‘›π‘šπΈπ‘₯𝑑 (𝑀 ;𝑦 )𝑠′ π‘ˆ 𝑑2

𝑦 β€²π‘˜π‘’π‘¦ β€²=π‘›π‘šπΈπ‘₯𝑑 (𝑀 ; 𝑦 β€² )

𝜎 β€²=π‘€π΄πΆπ‘˜π‘’π‘¦ β€² (𝑠 β€² )𝑠′ ,𝜎 ′𝑠 ,𝜎

If

𝑅𝐡=𝐸π‘₯𝑑 (𝑀 ,𝑠 β€² )𝑅𝐴=𝐸π‘₯𝑑 (𝑀 ,𝑠 )

Page 48: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Privacy Amplification Protocols

[DW09] [DKRS06] [MW97]

Number of rounds

Entropy loss

Communication complexity

Assumed min-entropy

[DS02, DW09] 1 round requires

[RW03] gave rounds for

[CKOR10] gave rounds for

Page 49: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

2 Rounds Privacy Amplification Protocols ()

Our result 2

Our result 1

[DLWZ11] [DW09]Non-

constructive [DW09]

Entropy loss

Communication

complexity

Assumed min-entropy

Page 50: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

The Extractorof [Raz05]

Page 51: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

A sequence of r.v -fools linear tests of size if for every such that , it holds that

Fooling Linear Tests of Bounded Size

Good explicit constructions ([NN93], [AGHP92],…) and many applications.

Page 52: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

𝑍1𝑍 2𝑍𝐷

Points of the

sample space(seed)

Random variables

A Central Lemma from [Raz05]Seed

Weak source

-fools linear tests of size .

Ext

is a (strong) seeded-extractor for .

Page 53: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Proof IdeaFor

Page 54: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Proof Idea

𝑍1𝑍 2 β‹― 𝑍𝐷

Page 55: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Proof Idea

π‘Š

𝑍1𝑍 2 β‹― 𝑍𝐷

Page 56: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Proof Idea

π‘Š

𝑠 𝐴 (𝑠 )

𝐸π‘₯𝑑 (π‘Š ;𝑠 )𝐸π‘₯𝑑 (π‘Š ; 𝐴 (𝑠 ) )

is typically biased (say towards 0)

Page 57: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Proof Idea

π‘Š

𝑠 𝐴 (𝑠 )

𝐸π‘₯𝑑 (π‘Š ;𝑠 )𝐸π‘₯𝑑 (π‘Š ; 𝐴 (𝑠 ) )

is typically biased (say towards 0)

Page 58: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Proof Idea

𝑠 𝐴 (𝑠 )

𝑠𝐴 (𝑠 )

π‘π‘–π‘Žπ‘  (π‘Œ 𝑠 )

Page 59: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Proof Idea

𝑠 𝐴 (𝑠 )

𝑠𝐴 (𝑠 )

π‘π‘–π‘Žπ‘  (π‘Œ 𝑠 )Acyclic

Many vertices

Average edge weight is large

Page 60: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Proof Idea

𝑠 𝐴 (𝑠 )

𝑠𝐴 (𝑠 )

π‘π‘–π‘Žπ‘  (π‘Œ 𝑠 )Acyclic

Many vertices

Average edge weight is large

Page 61: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Proof Idea

β‹― 𝑍 π‘ βŠ•π‘π΄ (𝑠 )β‹―

-fools linear tests of size

[Raz05] implies that this is also an

extractor

π‘Š

stands in contradiction!

π‘Œ 𝑠=E π‘₯𝑑 (π‘Š ; 𝑠)βŠ•πΈπ‘₯𝑑 (π‘Š ; 𝐴 (𝑠) )

Page 62: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

A Few Words on the

Proof Ideafor Arbitrary

Page 63: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Arbitrary : Less-trivial lemma about graphs. Constructing the acyclic graph using a greedy algorithm.

Arbitrary : A generalization of the Parity Lemma - Conditional Parity Lemma (a similar lemma appears in [DLWZ11]).

Proof Idea for Arbitrary

Page 64: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Proof Idea for Arbitrary

‖𝑋 βˆ’π‘ˆπ‘šβ€–12≀ βˆ‘

βˆ… β‰ πœŽβŠ† [π‘š ]π‘π‘–π‘Žπ‘ 2 (π‘‹πœŽ )

β€–(𝑋 ,π‘Œ )βˆ’ (π‘ˆπ‘š ,π‘Œ )β€–12≀ βˆ‘

βˆ… β‰ πœŽ βŠ† [π‘š ]πœβŠ† [𝑛 ]

π‘π‘–π‘Žπ‘ 2 (π‘‹πœŽβŠ•π‘Œπœ )❑

for

π‘Œ=π‘Œ 1β€¦π‘Œ 𝑛

(Classic) Parity Lemma

Conditional Parity Lemma

Page 65: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Open Questions

Page 66: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

1. Construct a non-malleable extractor for small min-entropies.

2. Devise a constant-round (hopefully 2) protocol with optimal entropy loss and communication complexity.

Open Questions

Page 67: Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification

Thank You!