Weizmann Logo
ECCC
Electronic Colloquium on Computational Complexity

Under the auspices of the Computational Complexity Foundation (CCF)

Login | Register | Classic Style



REPORTS > KEYWORD > ADVERSARIAL SOURCES:
Reports tagged with adversarial sources:
TR25-075 | 14th June 2025
Eshan Chattopadhyay, Jesse Goodman

Leakage-Resilient Extractors against Number-on-Forehead Protocols

Given a sequence of $N$ independent sources $\mathbf{X}_1,\mathbf{X}_2,\dots,\mathbf{X}_N\sim\{0,1\}^n$, how many of them must be good (i.e., contain some min-entropy) in order to extract a uniformly random string? This question was first raised by Chattopadhyay, Goodman, Goyal and Li (STOC '20), motivated by applications in cryptography, distributed computing, and the unreliable ... more >>>




ISSN 1433-8092 | Imprint