F(x 1 )h h( x 1 ) 1 … n+|h|+ 1 bits of next-block pseudoentropy f(x 2 )h h( x 2 )f(x t )h h( x t ) g(x t,h t )= g(x 2,h 2 )= g(x 1,h 1 )= G(x 1,h 1 …,x.

Slides:



Advertisements
Similar presentations
Randomness Conductors (II) Expander Graphs Randomness Extractors Condensers Universal Hash Functions
Advertisements

Domain: 1) f(0) = 8 2) f(3) = 3) g(-2) = -2 4) g(2) = 0 5) f(g(0)) = f(2) =0 6) f(g(-2)) = f(-2) =undefined 7) f(g(2)) = f(0) =8 8) f(g(-1)) = f(1) =3.
The Many Entropies of One-Way Functions Thomas Holenstein Iftach Haitner Salil VadhanHoeteck Wee Joint With Omer Reingold.
Complexity Theory Lecture 11 Lecturer: Moni Naor.
Foundations of Cryptography Lecture 8: Application of GL, Next-bit unpredictability, Pseudo-Random Functions. Lecturer: Moni Naor Announce home )deadline.
1 1. Joint withA.Ta-shma & D.Zuckerman 2. Improved: R.Shaltiel and C. Umans Slides: Adi Akavia Extractors via Low- degree Polynomials.
ACT1 Slides by Vera Asodi & Tomer Naveh. Updated by : Avi Ben-Aroya & Alon Brook Adapted from Oded Goldreich’s course lecture notes by Sergey Benditkis,
CS151 Complexity Theory Lecture 8 April 22, 2015.
Cascading 1-Bit Comparators Lecture L6.5. A 1-Bit Comparator The variable Gout is 1 if x > y or if x = y and Gin = 1. The variable Eout is 1 if x = y.
GOING DOWN HILL: MORE EFFICIENT PSEUDORANDOM GENERATORS FROM ANY ONE-WAY FUNCTION Joint with Iftach Haitner and Salil Vadhan Omer Reingold&
Lecturer: Moni Naor Foundations of Cryptography Lecture 6: pseudo-random generators, hardcore predicate, Goldreich-Levin Theorem, Next-bit unpredictability.
The Many Entropies of One-Way Functions Thomas Holenstein Iftach Haitner Salil VadhanHoeteck Wee Joint With Omer Reingold.
Chapter 5 Integrals 5.2 The Definite Integral In this handout: Riemann sum Definition of a definite integral Properties of the definite integral.
1 On the Power of the Randomized Iterate Iftach Haitner, Danny Harnik, Omer Reingold.
7.1 Area of a Region Between Two Curves.
Computational Entropy Joint works with Iftach Haitner (Tel Aviv), Thomas Holenstein (ETH Zurich), Omer Reingold (MSR-SVC), Hoeteck Wee (George Washington.
Section 5.3: Finding the Total Area Shaded Area = ab y = f(x) x y y = g(x) ab y x Shaded Area =
GOING DOWN HILL : EFFICIENCY IMPROVEMENTS IN CONSTRUCTING PSEUDORANDOM GENERATORS FROM ONE-WAY FUNCTIONS Iftach Haitner Omer Reingold Salil Vadhan.
Simulating independence: new constructions of Condensers, Ramsey Graphs, Dispersers and Extractors Boaz Barak Guy Kindler Ronen Shaltiel Benny Sudakov.
LIMITS INVOLVING INFINITY Mrs. Erickson Limits Involving Infinity Definition: y = b is a horizontal asymptote if either lim f(x) = b or lim f(x) = b.
Extractors against classical and quantum adversaries AmnonTa-Shma Tel-Aviv University.
Unit 6 GA2 Test Review. Find the indicated real n th root ( s ) of a. a. n = 3, a = –216 b. n = 4, a = 81 SOLUTION b. Because n = 4 is even and a = 81.
Computational Entropy Joint works with Iftach Haitner (Tel Aviv), Thomas Holenstein (ETH Zurich), Omer Reingold (MSR-SVC), Hoeteck Wee (George Washington.
Инвестиционный паспорт Муниципального образования «Целинский район»
Chapter 7 7.6: Function Operations. Function Operations.
(x – 8) (x + 8) = 0 x – 8 = 0 x + 8 = x = 8 x = (x + 5) (x + 2) = 0 x + 5 = 0 x + 2 = x = - 5 x = - 2.
5.1 Composite Functions Goals 1.Form f(g(x)) = (f  g) (x) 2.Show that 2 Composites are Equal.
6-1: Operations on Functions (Composition of Functions)
1 Solve each: 1. 5x – 7 > 8x |x – 5| < 2 3. x 2 – 9 > 0 :
Example 1A Solve the equation. Check your answer. (x – 7)(x + 2) = 0
Math 4030 – 6a Joint Distributions (Discrete)
Algebra 2A 7.2: Multiplication and Division of Rational Expressions September 25, 2007.
Finding the distance between two points. (-4,4) (4,-6)
Jeopardy Factoring Functions Laws of Exponents Polynomial Equations Q $100 Q $200 Q $300 Q $400 Q $100 Q $200 Q $300 Q $400 Final Jeopardy Q $500.
Ch 9 – Properties and Attributes of Functions 9.4 – Operations with Functions.
Dan Boneh Stream ciphers PRG Security Defs Online Cryptography Course Dan Boneh.
Combining Functions MCC9-12.F.BF.1b Combine standard function types using arithmetic operations.
1.1 - Functions. Ex. 1 Describe the sets of numbers using set- builder notation. a. {8,9,10,11,…}
Umans Complexity Theory Lecturess Lecture 11: Randomness Extractors.
照片档案整理 一、照片档案的含义 二、照片档案的归档范围 三、 卷内照片的分类、组卷、排序与编号 四、填写照片档案说明 五、照片档案编目及封面、备考填写 六、数码照片整理方法 七、照片档案的保管与保护.
공무원연금관리공단 광주지부 공무원대부등 공적연금 연계제도 공무원연금관리공단 광주지부. 공적연금 연계제도 국민연금과 직역연금 ( 공무원 / 사학 / 군인 / 별정우체국 ) 간의 연계가 이루어지지 않고 있 어 공적연금의 사각지대가 발생해 노후생활안정 달성 미흡 연계제도 시행전.
Жюль Верн ( ). Я мальчиком мечтал, читая Жюля Верна, Что тени вымысла плоть обретут для нас; Что поплывет судно громадней «Грейт Истерна»; Что.

5-Minute Check Lesson 1-2A
Solving Quadratic Equations by Factoring
Conditional Computational Entropy
Perform Function Operations and Composition
Non-Malleable Extractors New tools and improved constructions
Combinations of Functions:
Inequalities Involving Quadratic Functions
Activity 2.8 Study Time.
You can find the roots of some quadratic equations by factoring and applying the Zero Product Property. Functions have zeros or x-intercepts. Equations.
2-6: Combinations of Functions
2.6 Operations on Functions
1.2 Analyzing Graphs of Functions and Relations
Algebraic and Graphical Evaluation

Finding the Total Area y= 2x +1 y= x Area = Area =
3.5 Operations on Functions
6-1: Operations on Functions (+ – x ÷)
Cryptographic Applications of Randomness Extractors
Section 5.3: Finding the Total Area
Finding the Total Area y= 2x +1 y= x Area = Area =
Review 6.1, 6.2, 6.4.
Use Inverse Functions Notes 7.5 (Day 2).
Replace inside with “x” of other function
2-6: Combinations of Functions
Operations with Functions
Composition of Functions
Objectives Add, subtract, multiply, and divide functions.
Presentation transcript:

f(x 1 )h h( x 1 ) 1 … n+|h|+ 1 bits of next-block pseudoentropy f(x 2 )h h( x 2 )f(x t )h h( x t ) g(x t,h t )= g(x 2,h 2 )= g(x 1,h 1 )= G(x 1,h 1 …,x t,h t ) extractors … Next-Block Pseudoentropy ! PRG

2 Distinguisher for G ) next-bit predictor for G ) (hybrid) next-bit predictor for g ) g does not have high next-bit pseudoentropy Seed length O(n 3 ), but construction is (highly) non-uniform  “Entropy equalization” ) uniform construction with seed length O(n 4 )

Entropy Equalization Task: Given X=(X 1 …X n ) with next-block-entropy k, construct X’ =(X’ 1 …X’ n’ ) for which  Y’=(Y’ 1 …Y’ n’ ) with 1. 8 i (X’ 1 …X’ i-1,X’ i ) ≈ C (X’ 1 …X’ i-1,Y’ i ) 2. 8 i H(Y’ i |X’ 1 …X’ i-1 ) = k/n - ± X’ = ( X (1) I, X (1) I+1 … X (1) n, X (2) 1, … X (t) I-n ) and Y’ = ( Y (1) I, Y (1) j+1 … Y (1) n, Y (2) 1, … Y (t) I-n ) 8 i H(Y’ i |X’ 1 …X’ i-1 ) = k/n - k/(t-1)n X (1) 1 X (1) 2 …X (1) n X (1) 1 X (2) 2 …X (2) n … X (t) 1 X (t) n … jn-j