X Li - 2023 IEEE 64th Annual Symposium on Foundations of …, 2023 - ieeexplore.ieee.org
A long line of work in the past two decades or so established close connections between several different pseudorandom objects and applications, including seeded or seedless non …
Consider two parties holding correlated random variables W and W′, respectively, that are within distance t of each other in some metric space. These parties wish to agree on a …
X Li - Proceedings of the 49th Annual ACM SIGACT …, 2017 - dl.acm.org
In this paper we give improved constructions of several central objects in the literature of randomness extraction and tamper-resilient cryptography. Our main results are:(1) An …
Randomness extractors and error correcting codes are fundamental objects in computer science. Recently, there have been several natural generalizations of these objects, in the …
Fuzzy extractors derive strong keys from noisy sources. Their security is usually defined information-theoretically, with gaps between known negative results, existential …
X Li - arXiv preprint arXiv:1804.04005, 2018 - arxiv.org
The recent line of study on randomness extractors has been a great success, resulting in exciting new techniques, new connections, and breakthroughs to long standing open …
Consider two parties holding samples from correlated distributions W and W^′, respectively, where these samples are within distance t of each other in some metric space …
The wiretap channel is a setting where one aims to provide information-theoretic privacy of communicated data based solely on the assumption that the channel from sender to …
In studying how to communicate over a public channel with an active adversary, Dodis and Wichs introduced the notion of a nonmalleable extractor. A nonmalleable extractor …