The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions.

作者: Dawu Gu , Xiangxue Li , Yu Yu

DOI:

关键词:

摘要: We revisit “the randomized iterate” technique that was originally used by Goldreich, Krawczyk, and Luby (SICOMP 1993) refined Haitner, Harnik Reingold (CRYPTO 2006) in constructing pseudorandom generators (PRGs) from regular one-way functions (OWFs). abstract out a technical lemma (which is folklore leakage resilient cryptography), use it to provide simpler more modular proof for the Haitner-Harnik-Reingold PRGs OWFs. introduce general class of OWFs called “weakly-regular functions” which we construct PRG with seed length O(n·logn). More specifically, consider an arbitrary function f range divided into sets Y1, Y2, . ., Yn where each Yi def = {y : 2i−1 ≤ |f−1(y)| < 2}. say weakly-regular if there exists (not necessarily efficient computable) cut-off point max such Ymax some noticeable portion (say n−c constant c), Ymax+1, only sum negligible fraction. making O(n) calls achieve O(n · logn) using bounded space generators. This generalizes approach Haitner et al., fall special case c 0. similar extended method hardness amplification weakly-one-way functions. Our work further explores feasibility limits “randomized type black-box constructions. In particular, underlying can have structure as long set images maximal preimage size has addition, our construction much seed-length security-preserving (albeit less general) than HILL-style best known Vadhan Zheng (STOC 2012) requires O(n).

参考文章(18)
Yevgeniy Dodis, Krzysztof Pietrzak, Daniel Wichs, Key Derivation without Entropy Waste theory and application of cryptographic techniques. pp. 93- 110 ,(2014) , 10.1007/978-3-642-55220-5_6
Yu Yu, Xiangxue Li, Jian Weng, Pseudorandom Generators from Regular One-Way Functions: New Constructions with Improved Parameters international conference on the theory and application of cryptology and information security. pp. 261- 279 ,(2013) , 10.1007/978-3-642-42045-0_14
Oded Goldreich, Foundations of Cryptography: Basic Tools Cambridge University Press. ,(2000)
Nenad Dedić, Danny Harnik, Leonid Reyzin, Saving private randomness in one-way functions and pseudorandom generators theory of cryptography conference. pp. 607- 625 ,(2008) , 10.1007/978-3-540-78524-8_33
Russell Impagliazzo, Noam Nisan, Avi Wigderson, Pseudorandomness for network algorithms Proceedings of the twenty-sixth annual ACM symposium on Theory of computing - STOC '94. pp. 356- 364 ,(1994) , 10.1145/195058.195190
O. Goldreich, L. A. Levin, A hard-core predicate for all one-way functions Proceedings of the twenty-first annual ACM symposium on Theory of computing - STOC '89. pp. 25- 32 ,(1989) , 10.1145/73007.73010
Yevgeniy Dodis, Yu Yu, Overcoming Weak Expectations Theory of Cryptography. pp. 1- 22 ,(2013) , 10.1007/978-3-642-36594-2_1
Oded Goldreich, Hugo Krawczyk, Michael Luby, On the Existence of Pseudorandom Generators SIAM Journal on Computing. ,vol. 22, pp. 1163- 1175 ,(1993) , 10.1137/0222069
Thomas Holenstein, Makrand Sinha, Constructing a Pseudorandom Generator Requires an Almost Linear Number of Calls 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science. pp. 698- 707 ,(2012) , 10.1109/FOCS.2012.51