## Abstract

In studying how to communicate over a public channel with an active adversary, Dodis and Wichs introduced the notion of a nonmalleable extractor. A nonmalleable extractor dramatically strengthens the notion of a strong extractor. A strong extractor takes two inputs, a weakly random x and a uniformly random seed y, and outputs a string which appears uniform, even given y. For a nonmalleable extractor nmExt, the output nmExt(x, y) should appear uniform given y as well as nmExt(x, A(y)), where A is an arbitrary function with A(y) = y. We show that an extractor introduced by Chor and Goldreich is nonmalleable when the entropy rate (the ratio between the entropy and the length of the weakly random string) is above half. It outputs a linear number of bits when the entropy rate is 1/'2+ a for any a > 0. Previously, no explicit construction was known for any entropy rate less than 1. To achieve a polynomial running time when outputting more than one bit, we rely on a widely believed conjecture about the distribution of prime numbers in arithmetic progressions. Our analysis involves character sum estimates, which may be of independent interest. Using our nonmalleable extractor, we obtain protocols for " privacy amplification": key agreement between two parties who share a weakly random secret. Our protocols work in the presence of an active adversary with unlimited computational power and have asymptotically optimal entropy loss. When the secret has entropy rate greater than 1/'2, the protocol follows from a result of Dodis and Wichs and takes two (or three, for strongest security guarantees) rounds. When the secret has entropy rate d for any constant d > 0, our new protocol takes a constant (polynomial in 1/'d) number of rounds. Our protocols run in polynomial time under the above well- known conjecture about primes.

Original language | English |
---|---|

Pages (from-to) | 800-830 |

Number of pages | 31 |

Journal | SIAM Journal on Computing |

Volume | 43 |

Issue number | 2 |

DOIs | |

Publication status | Published - 2014 |

## Keywords

- randomness
- extractors
- nonmalleable
- privacy amplification
- cryptography
- NON-MALLEABLE EXTRACTORS
- AUTHENTICATED KEY AGREEMENT
- ROBUST FUZZY EXTRACTORS
- DIRICHLET L-FUNCTIONS
- CLOSE SECRETS
- ARITHMETIC-PROGRESSION
- LEAST PRIME
- RANDOMNESS