Efficient Pseudorandom Generators from Exponentially Hard One-Way Functions
نویسندگان
چکیده
In their seminal paper [HILL99], H̊astad, Impagliazzo, Levin and Luby show that a pseudorandom generator can be constructed from any one-way function. This plausibility result is one of the most fundamental theorems in cryptography and helps shape our understanding of hardness and randomness in the field. Unfortunately, the reduction of [HILL99] is not nearly as efficient nor as security preserving as one may desire. The main reason for the security deterioration is the blowup to the size of the input. In particular, given one-way functions on n bits one obtains by [HILL99] pseudorandom generators with seed length O(n). Alternative constructions that are far more efficient exist when assuming the one-way function is of a certain restricted structure (e.g. a permutations or a regular function). Recently, Holenstein [Hol06] addressed a different type of restriction. It is demonstrated in [Hol06] that the blowup in the construction may be reduced when considering one-way functions that have exponential hardness. This result generalizes the original construction of [HILL99] and obtains a generator from any exponentially hard one-way function with a blowup of O(n), and even O(n log n) if the security of the resulting pseudorandom generator is allowed to have weaker (yet super-polynomial) security. In this work we show a construction of a pseudorandom generator from any exponentially hard one-way function with a blowup of only O(n) and respectively, only O(n log n) if the security of the resulting pseudorandom generator is allowed to have only super-polynomial security. Our technique does not take the path of the original [HILL99] methodology, but rather follows by using the tools recently presented in [HHR05] (for the setting of regular one-way functions) and further developing them.
منابع مشابه
Pseudorandom Generators from One-Way Functions: A Simple Construction for Any Hardness
In a seminal paper, H̊astad, Impagliazzo, Levin, and Luby showed that pseudorandom generators exist if and only if one-way functions exist. The construction they propose to obtain a pseudorandom generator from an n-bit one-way function uses O(n) random bits in the input (which is the most important complexity measure of such a construction). In this work we study how much this can be reduced if ...
متن کاملOn the Power of the Randomized Iterate∗ Draft
We consider two of the most fundamental theorems in Cryptography. The first, due to H̊astad, Impagliazzo, Levin and Luby (STOC ’89, STOC ’90, SIAM J. on Computing ’99), is that pseudorandom generators can be constructed from any one-way function. The second, due to Yao (FOCS ’82), states that the existence of weak one-way functions (i.e. functions on which every efficient algorithm fails to inve...
متن کاملHard Instances for Satisfiability and Quasi-one-way Functions
We give an efficient algorithm that takes as input any (probabilistic) polynomial time algorithm A which purports to solve SAT and finds, for infinitely many input lengths, SAT formulas φ and witnesses w such that A claims φ is unsatisfiable, but w is a satisfying assignment for φ (assuming NP ⊆ BPP). This solves an open problem posed in the work of Gutfreund, Shaltiel, and Ta-Shma (CCC 2005). ...
متن کاملOn the Existence of Pseudorandom Generators
Pseudorandom generators [BM, Y] are efficient deterministic programs that expand a randomly selected k-bit seed into a much longer pseudorandom bit sequence which is indistinguishable in polynomial-time from a sequence of unbiased coin tosses. Thus, pseudorandom sequences can replace truly random sequences in all practical (i.e. polynomial-time) applications. Pseudorandom generators are known t...
متن کاملPrivate Key Encryption Instructor : Rafael Pass Scribe : Ashwin Machanavajjhala
Till this point in the course we have learnt how to define secrecy and how to construct tools like one way functions, pseudorandom generators and pseudorandom functions. We will now use the concepts we learnt to construct a secure encryption scheme. In this class we propose a few intuitive definitions for the security of an encryption scheme, show their equivalence and then show a simple constr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006