Goldreich’s One-Way Function Candidate and Drunken Backtracking Algorithms

نویسندگان

  • Rachel Miller
  • Christian Gromoll
چکیده

One-way functions are easy to compute but hard to invert; their existence is the foundational assumption for modern cryptography. Oded Goldreich’s 2000 paper “Candidate One-Way Functions Based on Expander Graphs” [6] proposes a candidate one-way function construction based on any small fixed predicate over d variables and a bipartite expander graph of right-degree d. The function is calculated by taking an n-bit input as the values of the vertices on the left, and then calculating each of the n output bits on the right by applying the predicate to its neighbors. Inverting Goldreich’s one-way function can be expressed as constraints on input bits by the value of each output bit, and so can easily be reduced to a SAT instance. Most modern SAT solvers are based on backtracking algorithms. Results by Alekhnovich, Hirsch and Itsykson imply that Goldreich’s function is secure against “myopic” backtracking algorithms (an interesting subclass) if the 3-ary parity predicate P (x1, x2, x3) = x1 ⊕ x2 ⊕ x3 is used. Cook, Etesami, Miller and Trevisan extended their work to show the function is also secure against myopic backtracking algorithms of higher degree linear functions and against predicates of the form Pd(x1, . . . , xd) := x1 ⊕ x2 ⊕ · · · ⊕ xd−2 ⊕ (xd−1 ∧ xd) on random graphs. Alekhnovich et al. also show how to construct satisfiable SAT instances secure against “drunken” backtracking algorithms from unsatisfiable SAT instances. The contribution of this work is to show Goldreich’s function is secure against “drunken” backtracking algorithms for linear predicates and predicates of the form Pd(x1, . . . , xd) := x1⊕x2⊕· · ·⊕xd−2⊕(xd−1∧ xd) on random graphs.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Exponential Lower Bounds for a DPLL Attack against a One-Way Function Based on Expander Graphs

Oded Goldreich’s 2000 paper “Candidate One-Way Functions Based on Expander Graphs” [4] describes a function that employs a fixed random predicate and an expander graph. Goldreich conjectures that this function is difficult to invert, but this difficulty does not seem to stem from any standard assumption in Complexity Theory. The task of inverting Goldreich’s function reduces naturally to a SAT ...

متن کامل

The Complexity of Inversion of Explicit Goldreich's Function by DPLL Algorithms

The Goldreich’s function has n binary inputs and n binary outputs. Every output depends on d inputs and is computed from them by the fixed predicate of arity d. Every Goldreich’s function is defined by it’s dependency graph G and predicate P . In 2000 O. Goldreich formulated a conjecture that if G is an expander and P is a random predicate of arity d then the corresponding function is one way. ...

متن کامل

Goldreich's One-Way Function Candidate and Myopic Backtracking Algorithms

Goldreich (ECCC 2000) proposed a candidate one-way function construction which is parameterized by the choice of a small predicate (over d = O(1) variables) and of a bipartite expanding graph of right-degree d. The function is computed by labeling the n vertices on the left with the bits of the input, labeling each of the n vertices on the right with the value of the predicate applied to the ne...

متن کامل

Pseudorandomness against Depth-2 Circuits and Analysis of Goldreich's Candidate One-Way Function

Pseudorandomness against Depth-2 Circuits and Analysis of Goldreich’s Candidate One-Way Function

متن کامل

Minimizing the Complexity of Goldreich's Pseudorandom Generator

In the study of cryptography in NC, it was previously known that Goldreich’s candidate pseudorandom generator (PRG) is insecure when instantiated with a predicate P in 4 or fewer variables, if one wants to achieve polynomial stretch (that is, stretching n bits to n bits for some constant > 0). The current standard candidate predicate for this setting is the “tri-sumand” predicate TSA(x) = XOR3⊕...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010