Pseudo Random Synthesizers Functions and Permutations

نویسنده

  • Omer Reingold
چکیده

The research re ected in this dissertation is a study of computational pseudo randomness More speci cally the main objective of this research is the e cient and simple construction of pseudo random functions and permutations where e ciency refers both to the sequential and parallel time complexity of the computation Pseudo random functions and permutations are fundamental cryptographic primitives with many applications in cryptog raphy and more generally in computational complexity Constructions of Pseudo Random Functions For our constructions of pseudo random functions we introduce and study a new crypto graphic primitive which we call a pseudo random synthesizer and a generalization of this primitive which we call a k dimensional pseudo random synthesizer These primitives are of independent interest as well In addition we consider various applications of our construc tions and study some of the underlying cryptographic assumptions used in these construc tions The main results obtained by this research are Introducing new cryptographic primitives called pseudo random synthesizer and k dimensional pseudo random synthesizer Using pseudo random synthesizers for a parallel construction of a pseudo random func tion the depth of the functions is larger by a logarithmic factor than the depth of the synthesizers Showing several NC implementations of synthesizers based on concrete intractability assumptions such as factoring and the computational Di e Hellman assumption Showing a very simple parallel construction of synthesizers based on what we call weak pseudo random functions which implies simple constructions of synthesizers based on trapdoor one way permutations and based on any hard to learn problem under the de nition of These results yield the rst parallel pseudo random functions based on computational in tractability assumptions and the rst alternative to the original construction of Goldre ich Goldwasser and Micali In addition we show two new constructions of pseudo random functions that are related to the construction based on synthesizers The pseudo randomness of one construction is proven under the assumption that factoring is hard while

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Pseudo-random Synthesizers, Functions and Permutations Doctor of Philosophy Constructions of Pseudo-random Functions Constructions of Pseudo-random Permutations a Study of Some Number-theoretical Assumptions

The research re ected in this dissertation is a study of (computational) pseudo-randomness. More speci cally, the main objective of this research is the e cient and simple construction of pseudo-random functions and permutations [62, 90], where e ciency refers both to the sequential and parallel time complexity of the computation. Pseudo-random functions and permutations are fundamental cryptog...

متن کامل

Synthesizers and Their Application to the Parallel Construction of Psuedo-Random Functions

A pseudo-random function is a fundamental cryptographic primitive that is essential for encryp-tion, identiication and authentication. We present a new cryptographic primitive called pseudo-random synthesizer and show how to use it in order to get a parallel construction of a pseudo-random function. We show several NC 1 implementations of synthesizers based on concrete intractability assumption...

متن کامل

Synthesizers and Their Application to the Parallel Construction of Pseudo-Random Functions

A pseudo-random function is a fundamental cryptographic primitive that is essential for encryption, identi cation and authentication. We present a new cryptographic primitive called pseudorandom synthesizer and show how to use it in order to get a parallel construction of a pseudo-random function. We show several NC 1 implementations of synthesizers based on concrete intractability assumptions ...

متن کامل

Design of near-optimal pseudorandom functions and pseudorandom permutations in the information-theoretic model

In this paper we will extend the Benes and Luby-Rackoff constructions to design various pseudo-random functions and pseudo-random permutations with near optimal information-theoretic properties. An example of application is when Alice wants to transmit to Bob some messages against Charlie, an adversary with unlimited computing power, when Charlie can receive only a percentage τ of the transmitt...

متن کامل

On the Construction of Pseudo-Random Permutations: Luby-Racko Revisited

Luby and Racko [27] showed a method for constructing a pseudo-random permutation from a pseudo-random function. The method is based on composing four (or three for weakened security) so called Feistel permutations, each of which requires the evaluation of a pseudo-random function. We reduce somewhat the complexity of the construction and simplify its proof of security by showing that two Feiste...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009