Goldreich’s One-Way Function Candidate and Drunken Backtracking Algorithms
نویسندگان
چکیده
One-way functions are easy to compute but hard to invert; their existence is the foundational assumption for modern cryptography. Oded Goldreich’s 2000 paper “Candidate One-Way Functions Based on Expander Graphs” [6] proposes a candidate one-way function construction based on any small fixed predicate over d variables and a bipartite expander graph of right-degree d. The function is calculated by taking an n-bit input as the values of the vertices on the left, and then calculating each of the n output bits on the right by applying the predicate to its neighbors. Inverting Goldreich’s one-way function can be expressed as constraints on input bits by the value of each output bit, and so can easily be reduced to a SAT instance. Most modern SAT solvers are based on backtracking algorithms. Results by Alekhnovich, Hirsch and Itsykson imply that Goldreich’s function is secure against “myopic” backtracking algorithms (an interesting subclass) if the 3-ary parity predicate P (x1, x2, x3) = x1 ⊕ x2 ⊕ x3 is used. Cook, Etesami, Miller and Trevisan extended their work to show the function is also secure against myopic backtracking algorithms of higher degree linear functions and against predicates of the form Pd(x1, . . . , xd) := x1 ⊕ x2 ⊕ · · · ⊕ xd−2 ⊕ (xd−1 ∧ xd) on random graphs. Alekhnovich et al. also show how to construct satisfiable SAT instances secure against “drunken” backtracking algorithms from unsatisfiable SAT instances. The contribution of this work is to show Goldreich’s function is secure against “drunken” backtracking algorithms for linear predicates and predicates of the form Pd(x1, . . . , xd) := x1⊕x2⊕· · ·⊕xd−2⊕(xd−1∧ xd) on random graphs.
منابع مشابه
Exponential Lower Bounds for a DPLL Attack against a One-Way Function Based on Expander Graphs
Oded Goldreich’s 2000 paper “Candidate One-Way Functions Based on Expander Graphs” [4] describes a function that employs a fixed random predicate and an expander graph. Goldreich conjectures that this function is difficult to invert, but this difficulty does not seem to stem from any standard assumption in Complexity Theory. The task of inverting Goldreich’s function reduces naturally to a SAT ...
متن کاملThe Complexity of Inversion of Explicit Goldreich's Function by DPLL Algorithms
The Goldreich’s function has n binary inputs and n binary outputs. Every output depends on d inputs and is computed from them by the fixed predicate of arity d. Every Goldreich’s function is defined by it’s dependency graph G and predicate P . In 2000 O. Goldreich formulated a conjecture that if G is an expander and P is a random predicate of arity d then the corresponding function is one way. ...
متن کاملGoldreich's One-Way Function Candidate and Myopic Backtracking Algorithms
Goldreich (ECCC 2000) proposed a candidate one-way function construction which is parameterized by the choice of a small predicate (over d = O(1) variables) and of a bipartite expanding graph of right-degree d. The function is computed by labeling the n vertices on the left with the bits of the input, labeling each of the n vertices on the right with the value of the predicate applied to the ne...
متن کاملPseudorandomness against Depth-2 Circuits and Analysis of Goldreich's Candidate One-Way Function
Pseudorandomness against Depth-2 Circuits and Analysis of Goldreich’s Candidate One-Way Function
متن کاملMinimizing the Complexity of Goldreich's Pseudorandom Generator
In the study of cryptography in NC, it was previously known that Goldreich’s candidate pseudorandom generator (PRG) is insecure when instantiated with a predicate P in 4 or fewer variables, if one wants to achieve polynomial stretch (that is, stretching n bits to n bits for some constant > 0). The current standard candidate predicate for this setting is the “tri-sumand” predicate TSA(x) = XOR3⊕...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010