Position-based quantum cryptography: Impossibility and constructions

H Buhrman, N Chandran, S Fehr, R Gelles… - SIAM Journal on …, 2014 - SIAM
In this work, we study position-based cryptography in the quantum setting. The aim is to use
the geographical position of a party as its only credential. On the negative side, we show that …

Two source extractors for asymptotically optimal entropy, and (many) more

X Li - 2023 IEEE 64th Annual Symposium on Foundations of …, 2023 - ieeexplore.ieee.org
A long line of work in the past two decades or so established close connections between
several different pseudorandom objects and applications, including seeded or seedless non …

Robust fuzzy extractors and authenticated key agreement from close secrets

Y Dodis, J Katz, L Reyzin, A Smith - … , California, USA, August 20-24, 2006 …, 2006 - Springer
Consider two parties holding correlated random variables W and W′, respectively, that are
within distance t of each other in some metric space. These parties wish to agree on a …

Improved non-malleable extractors, non-malleable codes and independent source extractors

X Li - Proceedings of the 49th Annual ACM SIGACT …, 2017 - dl.acm.org
In this paper we give improved constructions of several central objects in the literature of
randomness extraction and tamper-resilient cryptography. Our main results are:(1) An …

Non-malleable extractors and codes, with their many tampered extensions

E Chattopadhyay, V Goyal, X Li - Proceedings of the forty-eighth annual …, 2016 - dl.acm.org
Randomness extractors and error correcting codes are fundamental objects in computer
science. Recently, there have been several natural generalizations of these objects, in the …

Computational fuzzy extractors

B Fuller, X Meng, L Reyzin - Information and Computation, 2020 - Elsevier
Fuzzy extractors derive strong keys from noisy sources. Their security is usually defined
information-theoretically, with gaps between known negative results, existential …

Non-malleable extractors and non-malleable codes: Partially optimal constructions

X Li - arXiv preprint arXiv:1804.04005, 2018 - arxiv.org
The recent line of study on randomness extractors has been a great success, resulting in
exciting new techniques, new connections, and breakthroughs to long standing open …

Robust fuzzy extractors and authenticated key agreement from close secrets

Y Dodis, B Kanukurthi, J Katz… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Consider two parties holding samples from correlated distributions W and W^′,
respectively, where these samples are within distance t of each other in some metric space …

A cryptographic treatment of the wiretap channel

M Bellare, S Tessaro, A Vardy - arXiv preprint arXiv:1201.2205, 2012 - arxiv.org
The wiretap channel is a setting where one aims to provide information-theoretic privacy of
communicated data based solely on the assumption that the channel from sender to …

Privacy amplification and nonmalleable extractors via character sums

Y Dodis, X Li, TD Wooley, D Zuckerman - SIAM Journal on Computing, 2014 - SIAM
In studying how to communicate over a public channel with an active adversary, Dodis and
Wichs introduced the notion of a nonmalleable extractor. A nonmalleable extractor …