Lossy Functions Do Not Amplify Well

نویسندگان

  • Krzysztof Pietrzak
  • Alon Rosen
  • Gil Segev
چکیده

We consider the problem of amplifying the “lossiness” of functions. We say that an oracle circuit C∗ : {0, 1} → {0, 1}∗ amplifies relative lossiness from `/n to L/m if for every function f : {0, 1} → {0, 1} it holds that 1. If f is injective then so is C . 2. If f has image size of at most 2n−`, then C has image size at most 2m−L. The question is whether such C∗ exists for L/m `/n. This problem arises naturally in the context of cryptographic “lossy functions,” where the relative lossiness is the key parameter. We show that for every circuit C∗ that makes at most t queries to f , the relative lossiness of C is at most L/m ≤ `/n+O(log t)/n. In particular, no black-box method making a polynomial t = poly(n) number of queries can amplify relative lossiness by more than an O(logn)/n additive term. We show that this is tight by giving a simple construction (cascading with some randomization) that achieves such amplification.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Higher Order B-Splines 1-D Finite Element Analysis of Lossy Dispersive Inhomogeneous Planar Layers

In this paper we propose an accurate and fast numerical method to obtain scattering fields from lossy dispersive inhomogeneous planar layers for both TE and TM polarizations. A new method is introduced to analyze lossy Inhomogeneous Planar Layers. In this method by applying spline based Galerkin’s method of moment to scalar wave equation and imposing boundary conditions we obtain reflection and...

متن کامل

Closed-Form Solutions for Broad-Band Equivalent Circuit of Vertical Rod Buried in Lossy Grounds Subjected to Lightning Strokes

Abstract— In this paper, input impedance of a vertical rod under lightning stroke is first computed by applying the method of moments (MoM) on the Maxwell’s equations. The circuit model is then achieved through applying modified vector fitting (MVF) on the computed input impedance. After then the equivalent circuit is again extracted for a few values of soil conductivity and rod radius. Finally...

متن کامل

Building Injective Trapdoor Functions From Oblivious Transfer

Injective one-way trapdoor functions are one of the most fundamental cryptographic primitives. In this work we give a novel construction of injective trapdoor functions based on oblivious transfer for long strings. Our main result is to show that any 2-message statistically sender-private semihonest oblivious transfer (OT) for strings longer than the sender randomness implies the existence of i...

متن کامل

Continuous Leakage Resilient Lossy Trapdoor Functions

Lossy trapdoor functions (LTFs) were first introduced by Peikert and Waters (STOC’08). Since their introduction, lossy trapdoor functions have found numerous applications. They can be used as tools to construct important cryptographic primitives such as injective one-way trapdoor functions, chosen-ciphertext-secure public key encryptions, deterministic encryptions, et al. In this paper, we focu...

متن کامل

All-But-Many Lossy Trapdoor Functions

We put forward a generalization of lossy trapdoor functions (LTFs). Namely, all-but-many lossy trapdoor functions (ABM-LTFs) are LTFs that are parametrized with tags. Each tag can either be injective or lossy, which leads to an invertible or a lossy function. The interesting property of ABM-LTFs is that it is possible to generate an arbitrary number of lossy tags by means of a special trapdoor,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012