International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Seedless Condensers for Efficiently Samplable Sources

Authors:
Cody Freitag , Northeastern University and Hebrew University of Jerusalem
Jad Silbak , MIT
Daniel Wichs , Northeastern University and NTT Research
Download:
Search ePrint
Search Google
Conference: TCC 2025
Abstract: Is it possible to efficiently convert any arbitrary source with sufficiently high (min-)entropy into nearly uniformly random bits? Information-theoretically, this is achievable using seeded extractors, provided the source is independent of the seed. However, in the absence of any such independence guarantee, no solution is possible for general computationally unbounded sources. Even for efficiently samplable sources, we cannot extract randomness that is statistically close to uniform, but can at best condense the randomness into an output that is only missing logarithmically many bits of entropy compared to the uniform distribution. Dodis, Ristenpart and Vadhan (TCC ’12) constructed such seeded condensers for efficiently samplable sources that can depend arbitrarily on the seed assuming near-optimal security of collision-resistant hash functions. In this work, we investigate whether such condensers can be made seedless. We present several new results: - We construct seedless condensers for all efficiently samplable sources assuming near-optimal security of keyless multi-collision resistant hash functions. We justify this assumption by showing it holds in the auxiliary-input random oracle model. - We show that such seedless condensers cannot be proven secure via a black-box reduc- tion from any standard game-based assumption, even if we assume optimal exact security. In fact, we give a general black-box separation that applies to a broad class of seedless primitives, with seedless condensers as a special case. - We consider the class of efficiently samplable distributed sources where two parties jointly sample randomness x = (x0, x1), with one party honestly choosing xb uniformly at ran- dom while the other party adversarially chooses x1−b depending on xb. We show how to construct seedless condensers for such sources assuming near-optimal security of game- based assumptions – either: (1) adaptive one-way functions, or (2) a certain from of (single-input) correlation-intractable hash functions that can be instantiated from key- dependent-message (KDM) secure encryption
BibTeX
@inproceedings{tcc-2025-36302,
  title={Seedless Condensers for Efficiently Samplable Sources},
  publisher={Springer-Verlag},
  author={Cody Freitag and Jad Silbak and Daniel Wichs},
  year=2025
}