skip to main content
10.1145/1806689.1806713acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
research-article

Near-optimal extractors against quantum storage

Published:05 June 2010Publication History

ABSTRACT

We show that Trevisan's extractor and its variants [22,19] are secure against bounded quantum storage adversaries. One instantiation gives the first such extractor to achieve an output length Θ(K-b), where K is the source's entropy and b the adversary's storage, together with a poly-logarithmic seed length. Another instantiation achieves a logarithmic key length, with a slightly smaller output length Θ((K-b)/Kγ) for any γ>0. In contrast, the previous best construction [21] could only extract (K/b)1/15 bits.

Some of our constructions have the additional advantage that every bit of the output is a function of only a polylogarithmic number of bits from the source, which is crucial for some cryptographic applications.

Our argument is based on bounds for a generalization of quantum random access codes, which we call quantum functional access codes. This is crucial as it lets us avoid the local list-decoding algorithm central to the approach in [21], which was the source of the multiplicative overhead.

References

  1. A. Ambainis, A. Nayak, A. Tashma, and U. V. Vazirani. Dense quantum coding and quantum finite automata. Journal of the ACM, 49(4):496--511, 2002. Preliminary version in phProc. of STOC 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Ben-Aroya, O. Regev, and R. de Wolf. A Hypercontractive Inequality for Matrix-Valued Functions with Applications to Quantum Computing and LDCs . In Proceedings of the 49th IEEE Symposium on Foundations of Computer Science, pages 477--486, 2008. Full version at arXiv:0705.3806. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. R. Cleve, W. v. Dam, M. Nielsen, and A. Tapp. Quantum entanglement and the communication complexity of the inner product function. In QCQC '98: Selected papers from the First NASA International Conference on Quantum Computing and Quantum Communications, pages 61--74, London, UK, 1998. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. De, C. Portmann, R. Renner, and T. Vidick. Trevisan's extractor in the presence of quantum side information. Technical report arXiv:0912.5514, 2009.Google ScholarGoogle Scholar
  5. A. De and L. Trevisan. Extractors using hardness amplification. In Proc. of APPROX-RANDOM, pages 462--475, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. Dziembowski and U. Maurer. Optimal randomizer efficiency in the bounded-storage model. Journal of Cryptology, 17(1):5--26, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. S. Fehr and C. Schaffner. Randomness extraction via delta-biased masking in the presence of a quantum attacker. In R. Canetti, editor, TCC, volume 4948 of Lecture Notes in Computer Science, pages 465--481. Springer, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. D. Gavinsky, J. Kempe, I. Kerenidis, R. Raz, and R. de Wolf. Exponential separation for one-way quantum communication complexity, with applications to cryptography. SIAM Journal of Computing, 38(5):1695--1708, 2008. Preliminary version in Proc. of STOC 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. V. Guruswami, J. Håstad, M. Sudan, and D. Zuckerman. Combinatorial bounds for list decoding. IEEE Transactions on Information Theory, 48(5):1021--1034, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. T. Hartman and R. Raz. On the distribution of the number of roots of polynomials and explicit weak designs. Random Structures and Algorithms, 23(3):235--263, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Holevo. Information-theoretic aspects of quantum measurement. Problems of Information Transmission, 9(2):31--42, 1973.Google ScholarGoogle Scholar
  12. R. Impagliazzo, R. Jaiswal, and V. Kabanets. Approximately List-Decoding Direct Product Codes and Uniform Hardness Amplification. In Proceedings of the 47th IEEE Symposium on Foundations of Computer Science, pages 187--196, 2006. Full version at http://www1.cs.columbia.edu/$\sim$rjaiswal/. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. R. König, U. Maurer, and R. Renner. On the power of quantum memory. IEEE Transactions on Information Theory, 51(7):2391--2401, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. R. König and B. Terhal. The bounded storage model in presence of a quantum adversary. IEEE Transactions on Information Theory, 54(2):749--762, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. C.-J. Lu. Encryption against storage-bounded adversaries from on-line strong extractors. Journal of Cryptology, 17(1):27--42, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. U. M. Maurer. Conditionally-perfect secrecy and a provably-secure randomized cipher. Journal of Cryptology, 5(1):53--66, 1992. Google ScholarGoogle ScholarCross RefCross Ref
  17. A. Nayak and J. Salzman. Limits on the ability of quantum states to convey classical messages. Journal of the ACM, 53(1):184--206, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. N. Nisan and A. Wigderson. Hardness vs randomness. Journal of Computer and System Sciences, 49:149--167, 1994. Preliminary version in Proc. of FOCS'88. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. R. Raz, O. Reingold, and S. P. Vadhan. Extracting all the randomness and reducing the error in trevisan's extractors. J. Comput. Syst. Sci., 65(1):97--128, 2002. Preliminary version in Proc. of STOC 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. M. Sudan, L. Trevisan, and S. Vadhan. Pseudorandom generators without the XOR lemma. Journal of Computer and System Sciences, 62(2):236--266, 2001. Preliminary version in STOC and CCC 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. A. Tashma. Short seed extractors against quantum storage. In Proceedings of the 41st ACM Symposium on Theory of Computing, pages 401--409, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. L. Trevisan. Extractors and pseudorandom generators. Journal of the ACM, 48(4):860--879, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. S. P. Vadhan. Constructing locally computable extractors and cryptosystems in the bounded-storage model. Journal of Cryptology, 17(1):43--77, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. E. Viola. The complexity of constructing pseudorandom generators from hard functions. Computational Complexity, 13(3-4):147--188, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Near-optimal extractors against quantum storage

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      STOC '10: Proceedings of the forty-second ACM symposium on Theory of computing
      June 2010
      812 pages
      ISBN:9781450300506
      DOI:10.1145/1806689

      Copyright © 2010 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 5 June 2010

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate1,469of4,586submissions,32%

      Upcoming Conference

      STOC '24
      56th Annual ACM Symposium on Theory of Computing (STOC 2024)
      June 24 - 28, 2024
      Vancouver , BC , Canada

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader