Pseudorandom Correlation Functions from Variable-Density LPN, Revisited
نویسندگان
چکیده
Pseudorandom correlation functions (PCF), introduced in the work of (Boyle et al., FOCS 2020), allow two parties to locally generate, from short correlated keys, a near-unbounded amount pseudorandom samples target correlation. PCF is an extremely appealing primitive secure computation, where they confine all preprocessing phases future computations could want execute single interaction with low communication and followed solely by offline computations. Beyond introducing notion, Boyle al. gave candidate construction, using new variable-density variant learning parity noise (LPN) assumption. Then, provide support for this assumption, authors showed that it provably resists large class linear attacks, which captures particular known attacks on LPN. In work, we revisit analysis VDLPN We make key contributions: Our parameters set leads PCFs keys around 3 MB allowing $$\sim 500$$ evaluations per second one core standard laptop 110 bits security; these numbers can be improved 350 kB 3950$$ evaluations/s more aggressive all-prefix variant. All are quite tight: only within factor best bounds heuristically hope for.
منابع مشابه
Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN
Pseudorandom functions (PRFs) play a central role in symmetric cryptography. While in principle they can be built from any one-way functions by going through the generic HILL (SICOMP 1999) and GGM (JACM 1986) transforms, some of these steps are inherently sequential and far from practical. Naor, Reingold (FOCS 1997) and Rosen (SICOMP 2002) gave parallelizable constructions of PRFs in NC and TC ...
متن کاملHardness Preserving Constructions of Pseudorandom Functions, Revisited
We revisit hardness-preserving constructions of a PRF from any length doubling PRG when there is a non-trivial upper bound q on the number of queries that the adversary can make to the PRF. Very recently, Jain, Pietrzak, and Tentes (TCC 2012) gave a hardness-preserving construction of a PRF that makes only O(log q) calls to the underlying PRG when q = 2 and ≥ 12 . This dramatically improves upo...
متن کاملPseudorandom Functions Revisited: The Cascade Construction and Its Concrete Security
Pseudorandom function families are a powerful cryptographic primitive, yielding, in particular, simple solutions for the main problems in private key cryptography. Their existence based on general assumptions (namely, the existence of one-way functions) has been established. In this work we investigate new ways of designing pseudorandom function families. The goal is to find constructions that ...
متن کاملHow to Construct Pseudorandom Permutations from Single Pseudorandom Functions
The paper examines permutation generators which are designed using four rounds of the Data Encryption Standard and a single pseudorandom function. We have proved that such generators are pseudorandom only if the pseudorandom function is used internally at least five times. The proof is given using two different approaches: deterministic and probabilistic. Some cryptographic implications are als...
متن کاملOn the Correlation Intractability of Obfuscated Pseudorandom Functions
A family of hash functions is called “correlation intractable” if it is hard to find, given a random function in the family, an input-output pair that satisfies any “sparse” relation, namely any relation that is hard to satisfy for truly random functions. Indeed, correlation intractability is a strong and natural random-oracle-like property. However, it was widely considered unobtainable. In fa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Computer Science
سال: 2023
ISSN: ['1611-3349', '0302-9743']
DOI: https://doi.org/10.1007/978-3-031-31371-4_8