Pseudorandom Generators from Regular One-Way Functions: New Constructions with Improved Parameters
نویسندگان
چکیده
We revisit the problem of basing pseudorandom generators on regular one-way functions, and present the following constructions: – For any known-regular one-way function (on n-bit inputs) that is known to be ε-hard to invert, we give a neat (and tighter) proof for the folklore construction of pseudorandom generator of seed length Θ(n) by making a single call to the underlying one-way function. – For any unknown-regular one-way function with known ε-hardness, we give a new construction with seed lengthΘ(n) andO(n/ log (1/ε)) calls. Here the number of calls is also optimal by matching the lower bounds of Holenstein and Sinha (FOCS 2012). Both constructions require the knowledge about ε, but the dependency can be removed while keeping nearly the same parameters. In the latter case, we get a construction of pseudo-random generator from any unknown-regular one-way function using seed length Õ(n) and Õ(n/ logn) calls, where Õ omits a factor that can be made arbitrarily close to constant (e.g. log log logn or even less). This improves the randomized iterate approach by Haitner, Harnik and Reingold (CRYPTO 2006) which requires seed length O(n·logn) and O(n/ logn) calls.
منابع مشابه
On the Power of the Randomized Iterate
We consider two of the most fundamental theorems in Cryptography. The first, due to H̊astad et al. [HILL99], is that pseudorandom generators can be constructed from any one-way function. The second due to Yao [Yao82] states that the existence of weak one-way functions (i.e. functions on which every efficient algorithm fails to invert with some noticeable probability) implies the existence of ful...
متن کاملEfficient Pseudorandom Generators from Exponentially Hard One-Way Functions
In their seminal paper [HILL99], H̊astad, Impagliazzo, Levin and Luby show that a pseudorandom generator can be constructed from any one-way function. This plausibility result is one of the most fundamental theorems in cryptography and helps shape our understanding of hardness and randomness in the field. Unfortunately, the reduction of [HILL99] is not nearly as efficient nor as security preserv...
متن کاملOn the Power of the Randomized Iterate∗ Draft
We consider two of the most fundamental theorems in Cryptography. The first, due to H̊astad, Impagliazzo, Levin and Luby (STOC ’89, STOC ’90, SIAM J. on Computing ’99), is that pseudorandom generators can be constructed from any one-way function. The second, due to Yao (FOCS ’82), states that the existence of weak one-way functions (i.e. functions on which every efficient algorithm fails to inve...
متن کاملOn the Existence of Pseudorandom Generators
Pseudorandom generators [BM, Y] are efficient deterministic programs that expand a randomly selected k-bit seed into a much longer pseudorandom bit sequence which is indistinguishable in polynomial-time from a sequence of unbiased coin tosses. Thus, pseudorandom sequences can replace truly random sequences in all practical (i.e. polynomial-time) applications. Pseudorandom generators are known t...
متن کاملPseudorandom Generators from One-Way Functions: A Simple Construction for Any Hardness
In a seminal paper, H̊astad, Impagliazzo, Levin, and Luby showed that pseudorandom generators exist if and only if one-way functions exist. The construction they propose to obtain a pseudorandom generator from an n-bit one-way function uses O(n) random bits in the input (which is the most important complexity measure of such a construction). In this work we study how much this can be reduced if ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Theor. Comput. Sci.
دوره 569 شماره
صفحات -
تاریخ انتشار 2013