Low error efficient computational extractors in the CRS model
From MaRDI portal
Publication:2055616
DOI10.1007/978-3-030-45721-1_14zbMath1479.94175OpenAlexW3021307400MaRDI QIDQ2055616
Dakshita Khurana, Ankit Garg, Yael Tauman Kalai
Publication date: 1 December 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-45721-1_14
Related Items (5)
Improved computational extractors and their applications ⋮ Targeted lossy functions and applications ⋮ Cumulatively all-lossy-but-one trapdoor functions from standard assumptions ⋮ Computational robust (fuzzy) extractors for CRS-dependent sources with minimal min-entropy ⋮ Multi-source non-malleable extractors and applications
Cites Work
- Biased nonce sense: lattice attacks against weak ECDSA signatures in cryptocurrencies
- Factoring RSA Keys from Certified Smart Cards: Coppersmith in the Wild
- Local Correlation Breakers and Applications to Three-Source Extractors and Mergers
- Unbalanced expanders and randomness extractors from Parvaresh--Vardy codes
- Lossy trapdoor functions and their applications
- Extractors with weak random seeds
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Improved non-malleable extractors, non-malleable codes and independent source extractors
- An efficient reduction from two-source to non-malleable extractors: achieving near-logarithmic min-entropy
- 2-Source Extractors under Computational Assumptions and Cryptography with Defective Randomness
- Non-malleable extractors and symmetric key cryptography from weak secrets
- From Weak to Strong Zero-Knowledge and Applications
- MORE ON THE SUM-PRODUCT PHENOMENON IN PRIME FIELDS AND ITS APPLICATIONS
- Non-malleable extractors and codes, with their many tampered extensions
- Explicit two-source extractors and resilient functions
- Non-malleable extractors: new tools and improved constructions
- Separating succinct non-interactive arguments from all falsifiable assumptions
- How to Fake Auxiliary Input
This page was built for publication: Low error efficient computational extractors in the CRS model