Pseudorandom Generators from One-Way Functions: A Simple Construction for Any Hardness
نویسنده
چکیده
In a seminal paper, H̊astad, Impagliazzo, Levin, and Luby showed that pseudorandom generators exist if and only if one-way functions exist. The construction they propose to obtain a pseudorandom generator from an n-bit one-way function uses O(n) random bits in the input (which is the most important complexity measure of such a construction). In this work we study how much this can be reduced if the one-way function satisfies a stronger security requirement. For example, we show how to obtain a pseudorandom generator which satisfies a standard notion of security using only O(n log(n)) bits of randomness if a one-way function with exponential security is given, i.e., a one-way function for which no polynomial time algorithm has probability higher than 2−cn in inverting for some constant c. Using the uniform variant of Impagliazzo’s hard-core lemma given in [7] our constructions and proofs are self-contained within this paper, and as a special case of our main theorem, we give the first explicit description of the most efficient construction from [6].
منابع مشابه
Efficient Pseudorandom Generators from Exponentially Hard One-Way Functions
In their seminal paper [HILL99], H̊astad, Impagliazzo, Levin and Luby show that a pseudorandom generator can be constructed from any one-way function. This plausibility result is one of the most fundamental theorems in cryptography and helps shape our understanding of hardness and randomness in the field. Unfortunately, the reduction of [HILL99] is not nearly as efficient nor as security preserv...
متن کاملPseudorandom Generators from Regular One-Way Functions: New Constructions with Improved Parameters
We revisit the problem of basing pseudorandom generators on regular one-way functions, and present the following constructions: – For any known-regular one-way function (on n-bit inputs) that is known to be ε-hard to invert, we give a neat (and tighter) proof for the folklore construction of pseudorandom generator of seed length Θ(n) by making a single call to the underlying one-way function. –...
متن کاملOn the Power of the Randomized Iterate
We consider two of the most fundamental theorems in Cryptography. The first, due to H̊astad et al. [HILL99], is that pseudorandom generators can be constructed from any one-way function. The second due to Yao [Yao82] states that the existence of weak one-way functions (i.e. functions on which every efficient algorithm fails to invert with some noticeable probability) implies the existence of ful...
متن کاملExtractors and Pseudorandom generators using the hard core lemma
We present a construction of an extractor based exclusively on hardness amplification which extracts from sources with (some) polynomially small min-entropy. This improves upon a similar construction of the author with Trevisan ([DT09]) both in terms of the entropy rate and seed length. The extractor in [DT09] could extract from N -bit sources with entropy γN (for γ > 0) using a seed of length ...
متن کاملPrivate Key Encryption Instructor : Rafael Pass Scribe : Ashwin Machanavajjhala
Till this point in the course we have learnt how to define secrecy and how to construct tools like one way functions, pseudorandom generators and pseudorandom functions. We will now use the concepts we learnt to construct a secure encryption scheme. In this class we propose a few intuitive definitions for the security of an encryption scheme, show their equivalence and then show a simple constr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006