Explicit two-source extractors and resilient functions
We explicitly construct an extractor for two independent sources on n bits, each with
polylogarithmic min-entropy. Our extractor outputs one bit and has polynomially small error …
polylogarithmic min-entropy. Our extractor outputs one bit and has polynomially small error …
Two source extractors for asymptotically optimal entropy, and (many) more
X Li - 2023 IEEE 64th Annual Symposium on Foundations of …, 2023 - ieeexplore.ieee.org
A long line of work in the past two decades or so established close connections between
several different pseudorandom objects and applications, including seeded or seedless non …
several different pseudorandom objects and applications, including seeded or seedless non …
Improved non-malleable extractors, non-malleable codes and independent source extractors
X Li - Proceedings of the 49th Annual ACM SIGACT …, 2017 - dl.acm.org
In this paper we give improved constructions of several central objects in the literature of
randomness extraction and tamper-resilient cryptography. Our main results are:(1) An …
randomness extraction and tamper-resilient cryptography. Our main results are:(1) An …
Non-malleable extractors and non-malleable codes: Partially optimal constructions
X Li - arxiv preprint arxiv:1804.04005, 2018 - arxiv.org
The recent line of study on randomness extractors has been a great success, resulting in
exciting new techniques, new connections, and breakthroughs to long standing open …
exciting new techniques, new connections, and breakthroughs to long standing open …
Affine extractors for almost logarithmic entropy
We give an explicit construction of an affine extractor (over F_2) that works for affine sources
on n bits with min-entropy k≧\logn⋅(\log\logn)^1+o(1). This improves prior work of Li …
on n bits with min-entropy k≧\logn⋅(\log\logn)^1+o(1). This improves prior work of Li …
Extractors for images of varieties
We construct explicit deterministic extractors for polynomial images of varieties, that is,
distributions sampled by applying a low-degree polynomial map f: F qr→ F qn to an element …
distributions sampled by applying a low-degree polynomial map f: F qr→ F qn to an element …
Non-malleable codes from average-case hardness:, decision trees, and streaming space-bounded tampering
We show a general framework for constructing non-malleable codes against tampering
families with average-case hardness bounds. Our framework adapts ideas from the Naor …
families with average-case hardness bounds. Our framework adapts ideas from the Naor …
Quantified derandomization: how to find water in the ocean
R Tell - Foundations and Trends® in Theoretical Computer …, 2022 - nowpublishers.com
The focus of this survey is the question of quantified derandomization, which was introduced
by Goldreich and Wigderson [44]: Does derandomization of probabilistic algorithms become …
by Goldreich and Wigderson [44]: Does derandomization of probabilistic algorithms become …
Sharp threshold results for computational complexity
We establish several “sharp threshold” results for computational complexity. For certain
tasks, we can prove a resource lower bound of nc for c≥ 1 (or obtain an efficient circuit …
tasks, we can prove a resource lower bound of nc for c≥ 1 (or obtain an efficient circuit …
Extractors for sum of two sources
We consider the problem of extracting randomness from sumset sources, a general class of
weak sources introduced by Chattopadhyay and Li (STOC, 2016). An (n, k, C)-sumset …
weak sources introduced by Chattopadhyay and Li (STOC, 2016). An (n, k, C)-sumset …