On Pseudorandom Generators with Linear Stretch in NC
نویسندگان
چکیده
We consider the question of constructing cryptographic pseudorandom generators (PRGs) in NC, namely ones in which each bit of the output depends on just a constant number of input bits. Previous constructions of such PRGs were limited to stretching a seed of n bits to n + o(n) bits. This leaves open the existence of a PRG with a linear (let alone superlinear) stretch in NC. In this work we study this question and obtain the following main results: 1. We show that the existence of a linear-stretch PRG in NC implies nontrivial hardness of approximation results without relying on PCP machinery. In particular, that Max 3SAT is hard to approximate to within some constant. 2. We construct a linear-stretch PRG in NC under a specific intractability assumption related to the hardness of decoding “sparsely generated” linear codes. Such an assumption was previously conjectured by Alekhnovich [1]. We note that Alekhnovich directly obtains hardness of approximation results from the latter assumption. Thus, we do not prove hardness of approximation under new concrete assumptions. However, our first result is motivated by the hope to prove hardness of approximation under more general or standard cryptographic assumptions, and the second result is independently motivated by cryptographic applications.
منابع مشابه
On Pseudorandom Generators in NC
In this paper we consider the question of whether NC circuits can generate pseudorandom distributions. While we leave the general question unanswered, we show • Generators computed by NC circuits where each output bit depends on at most 3 input bits (i.e, NC03 circuits) and with stretch factor greater than 4 are not pseudorandom. • A large class of “non-problematic” NC generators with superline...
متن کاملCryptography with Streaming Algorithms
We put forth the question of whether cryptography is feasible using streaming devices. We give constructions and prove lower bounds. In streaming cryptography (not to be confused with streamciphers) everything—the keys, the messages, and the seeds—are huge compared to the internal memory of the device. These streaming algorithms have small internal memory size and make a constant number of pass...
متن کاملCryptography in Nc
We study the parallel time-complexity of basic cryptographic primitives such as one-way functions (OWFs) and pseudorandom generators (PRGs). Specifically, we study the possibility of implementing instances of these primitives by NC functions, namely by functions in which each output bit depends on a constant number of input bits. Despite previous efforts in this direction, there has been no con...
متن کاملCryptanalysis of Pseudorandom Generators
As a motivating application for the study of lattice in cryptography we consider the construction of pseudorandom generators. We recall that a pseudorandom generator is a program G(x) (computable in deterministic polynomial time) that maps bitstrings x ∈ {0, 1} to longer strings G(x) ∈ {0, 1} such that, if x is chosen uniformly at random and kept secret, then the output G(x) will “look” random ...
متن کاملLimits on the Stretch of Non-adaptive Constructions of Pseudo-Random Generators
The standard approach for constructing a large-stretch pseudorandom generator given a one-way permutation or given a smaller-stretch pseudo-random generator involves repeatedly composing the given primitive with itself. In this paper, we consider whether this approach is necessary, that is, whether there are constructions that do not involve composition. More formally, we consider black-box con...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006