Sustainable Pseudo-random Number Generator

作者: Huafei Zhu , Wee-Siong Ng , See-Kiong Ng

DOI: 10.1007/978-3-642-39218-4_11

关键词: Pseudorandom generatorEntropy (information theory)Stateless protocolProvable securityTheoretical computer sciencePseudorandom number generatorComputer scienceCryptographyComputer security modelRandomness extractor

摘要: Barak and Halevi (BH) have proposed an efficient architecture for robust pseudorandom generators that ensure resilience in the presence of attackers with partial knowledge or controls generators’ entropy resources. The BH scheme is constructed from Barak, Shaltiel Tromer’s randomness extractor its security formalized simulation-based framework. model however, does not address scenario where attacker completely resources no internal state. Namely, consider bad-refresh conditioned on compromised = false. such a case interesting since if output protocol false looks random to attacker, then secure even (recall model). called sustainable above mentioned requirement guaranteed. This paper studies sustainability generator makes following two contributions: first fold, new notion which we call extends definition BH’s introduced simulation paradigm; second show achieves under joint assumptions underlying stateless function G cryptographic number extract() statistically close uniform distribution.

参考文章(16)
Alexandra Boldyreva, Virendra Kumar, A New Pseudorandom Generator from Collision-Resistant Hash Functions Lecture Notes in Computer Science. pp. 187- 202 ,(2012) , 10.1007/978-3-642-27954-6_12
Boaz Barak, Ronen Shaltiel, Eran Tromer, True Random Number Generators Secure in a Changing Environment cryptographic hardware and embedded systems. pp. 166- 180 ,(2003) , 10.1007/978-3-540-45238-6_14
Oded Goldreich, Foundations of Cryptography Cambridge University Press. ,(2001) , 10.1017/CBO9780511546891
Billy B. Brumley, Manuel Barbosa, Dan Page, Frederik Vercauteren, Practical Realisation and Elimination of an ECC-Related Software Bug Attack Lecture Notes in Computer Science. ,vol. 7178, pp. 171- 186 ,(2012) , 10.1007/978-3-642-27954-6_11
Cryptographic Hardware and Embedded Systems - CHES 2003 Lecture Notes in Computer Science. ,vol. 2779, ,(2003) , 10.1007/978-3-540-45238-6
Boaz Barak, Shai Halevi, A model and architecture for pseudo-random generation with applications to /dev/random Proceedings of the 12th ACM conference on Computer and communications security - CCS '05. pp. 203- 212 ,(2005) , 10.1145/1102120.1102148
Anindya De, Thomas Watson, Extractors and Lower Bounds for Locally Samplable Sources ACM Transactions on Computation Theory. ,vol. 4, pp. 1- 21 ,(2012) , 10.1145/2141938.2141941
Andrew Chi-Chih Yao, Theory and Applications of Trapdoor Functions (Extended Abstract) foundations of computer science. pp. 80- 91 ,(1982)
Manuel Blum, Silvio Micali, How to generate cryptographically strong sequences of pseudo random bits 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982). pp. 112- 117 ,(1982) , 10.1109/SFCS.1982.72
Leo Dorrendorf, Zvi Gutterman, Benny Pinkas, None, Cryptanalysis of the windows random number generator computer and communications security. pp. 476- 485 ,(2007) , 10.1145/1315245.1315304