23
1

Nearly-Linear Time Seeded Extractors with Short Seeds

Abstract

(abstract shortened due to space constraints) Existing constructions of seeded extractors with short seed length and large output length run in time Ω(nlog(1/ε))\Omega(n \log(1/\varepsilon)) and often slower, where nn is the input source length and ε\varepsilon is the error of the extractor. Since cryptographic applications of extractors require ε\varepsilon to be small, the resulting runtime makes these extractors unusable in practice. Motivated by this, we explore constructions of strong seeded extractors with short seeds computable in nearly-linear time O(nlogcn)O(n \log^c n), for any error ε\varepsilon. We show that an appropriate combination of modern condensers and classical approaches for constructing seeded extractors for high min-entropy sources yields strong extractors for nn-bit sources with any min-entropy kk and any target error ε\varepsilon with seed length d=O(log(n/ε))d=O(\log(n/\varepsilon)) and output length m=(1η)km=(1-\eta)k for an arbitrarily small constant η>0\eta>0, running in nearly-linear time, after a reasonable one-time preprocessing step (finding a primitive element of Fq\mathbb{F}_q with q=poly(n/ε)q=poly(n/\varepsilon) a power of 22) that is only required when k<2Clognlog2(n/ε)k<2^{C\log^* n}\cdot\log^2(n/\varepsilon), for a constant C>0C>0 and log\log^* the iterated logarithm, and which can be implemented in time polylog(n/ε)polylog(n/\varepsilon) under mild conditions on qq. As a second contribution, we give an instantiation of Trevisan's extractor that can be evaluated in truly linear time in the RAM model, as long as the number of output bits is at most nlog(1/ε)polylog(n)\frac{n}{\log(1/\varepsilon)polylog(n)}. Previous fast implementations of Trevisan's extractor ran in O~(n)\widetilde{O}(n) time in this setting. In particular, these extractors directly yield privacy amplification protocols with the same time complexity and output length, and communication complexity equal to their seed length.

View on arXiv
Comments on this paper