Explicit two-source extractors and resilient functions

E Chattopadhyay, D Zuckerman - Proceedings of the forty-eighth annual …, 2016 - dl.acm.org
We explicitly construct an extractor for two independent sources on n bits, each with
polylogarithmic min-entropy. Our extractor outputs one bit and has polynomially small error …

Two source extractors for asymptotically optimal entropy, and (many) more

X Li - 2023 IEEE 64th Annual Symposium on Foundations of …, 2023 - ieeexplore.ieee.org
A long line of work in the past two decades or so established close connections between
several different pseudorandom objects and applications, including seeded or seedless non …

Improved non-malleable extractors, non-malleable codes and independent source extractors

X Li - Proceedings of the 49th Annual ACM SIGACT …, 2017 - dl.acm.org
In this paper we give improved constructions of several central objects in the literature of
randomness extraction and tamper-resilient cryptography. Our main results are:(1) An …

Non-malleable extractors and non-malleable codes: Partially optimal constructions

X Li - arxiv preprint arxiv:1804.04005, 2018 - arxiv.org
The recent line of study on randomness extractors has been a great success, resulting in
exciting new techniques, new connections, and breakthroughs to long standing open …

Affine extractors for almost logarithmic entropy

E Chattopadhyay, J Goodman… - 2021 IEEE 62nd Annual …, 2022 - ieeexplore.ieee.org
We give an explicit construction of an affine extractor (over F_2) that works for affine sources
on n bits with min-entropy k≧\logn⋅(\log\logn)^1+o(1). This improves prior work of Li …

Extractors for images of varieties

Z Guo, BL Volk, A Jalan, D Zuckerman - Proceedings of the 55th Annual …, 2023 - dl.acm.org
We construct explicit deterministic extractors for polynomial images of varieties, that is,
distributions sampled by applying a low-degree polynomial map f: F qr→ F qn to an element …

Non-malleable codes from average-case hardness:, decision trees, and streaming space-bounded tampering

M Ball, D Dachman-Soled, M Kulkarni… - … Conference on the Theory …, 2018 - Springer
We show a general framework for constructing non-malleable codes against tampering
families with average-case hardness bounds. Our framework adapts ideas from the Naor …

Quantified derandomization: how to find water in the ocean

R Tell - Foundations and Trends® in Theoretical Computer …, 2022 - nowpublishers.com
The focus of this survey is the question of quantified derandomization, which was introduced
by Goldreich and Wigderson [44]: Does derandomization of probabilistic algorithms become …

Sharp threshold results for computational complexity

L Chen, C **, RR Williams - Proceedings of the 52nd Annual ACM …, 2020 - dl.acm.org
We establish several “sharp threshold” results for computational complexity. For certain
tasks, we can prove a resource lower bound of nc for c≥ 1 (or obtain an efficient circuit …

Extractors for sum of two sources

E Chattopadhyay, JJ Liao - Proceedings of the 54th Annual ACM …, 2022 - dl.acm.org
We consider the problem of extracting randomness from sumset sources, a general class of
weak sources introduced by Chattopadhyay and Li (STOC, 2016). An (n, k, C)-sumset …