Sciweavers

STOC
2010
ACM

Near-optimal extractors against quantum storage

14 years 9 months ago
Near-optimal extractors against quantum storage
We give near-optimal constructions of extractors secure against quantum bounded-storage adversaries. One instantiation gives the first such extractor to achieve an output length (K - b), where K is the source's entropy and b the adversary's storage, depending linearly on the adversary's amount of storage, together with a poly-logarithmic seed length. Another instantiation achieves a logarithmic key length, with a slightly smaller output length ((K - b)/K ) for any > 0. In contrast, the previous best construction [Ts09] could only extract (K/b)1/15 bits. Our construction follows Trevisan's general reconstruction paradigm [Tre01], and in fact our proof of security shows that essentially all extractors constructed using this paradigm are secure against quantum storage, with optimal parameters. Our argument is based on bounds for a generalization of quantum random access codes, which we call quantum functional access codes. This is crucial as it lets us avoid the lo...
Anindya De and Thomas Vidick
Added 01 Mar 2010
Updated 02 Mar 2010
Type Conference
Year 2010
Where STOC
Authors Anindya De and Thomas Vidick
Comments (0)