Computational Indistinguishability Amplification: Tight Product Theorems for System Composition

نویسندگان

  • Ueli Maurer
  • Stefano Tessaro
چکیده

Computational indistinguishability amplification is the problem of strengthening cryptographic primitives whose security is defined by bounding the distinguishing advantage of an efficient distinguisher. Examples include pseudorandom generators (PRGs), pseudorandom functions (PRFs), and pseudorandom permutations (PRPs). The literature on computational indistinguishability amplification consists only of few isolated results. Yao’s XOR-lemma implies, by a hybrid argument, that no efficient distinguisher has advantage better than (roughly) n2m−1δm in distinguishing the XOR of m independent n-bit PRG outputs S1, . . . , Sm from uniform randomness if no efficient distinguisher has advantage more than δ in distinguishing Si from a uniform n-bit string. The factor 2m−1 allows for security amplification only if δ < 12 : For the case of PRFs, a random-offset XOR-construction of Myers was the first result to achieve strong security amplification, i.e., also for 12 ≤ δ < 1. This paper proposes a systematic treatment of computational indistinguishability amplification. We generalize and improve the above product theorem for the XOR of PRGs along five axes. First, we prove the tight information-theoretic bound 2m−1δm (without factor n) also for the computational setting. Second, we prove results for interactive systems (e.g. PRFs or PRPs). Third, we consider the general class of neutralizing combination constructions, not just XOR. As an application, this yields the first indistinguishability amplification results for the cascade of PRPs (i.e., block ciphers) converting a weak PRP into an arbitrarily strong PRP, both for single-sided and two-sided queries. Fourth, strong security amplification is achieved for a subclass of neutralizing constructions which includes as a special case the construction of Myers. As an application we obtain highly practical optimal security amplification for block ciphers, simply by adding random offsets at the input and output of the cascade. Fifth, we show strong security amplification also for weakened assumptions like security against random-input (as opposed to chosen-input) attacks. A key technique is a generalization of Yao’s XOR-lemma to (interactive) systems, which is of independent interest. ∗An extended abstract of this paper appears in the proceedings of CRYPTO 2009. This is the full version.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Indistinguishability Amplification

A random system is the abstraction of the input-output behavior of any kind of discrete system, in particular cryptographic systems. Many aspects of cryptographic security analyses and proofs can be seen as the proof that a certain random system (e.g. a block cipher) is indistinguishable from an ideal system (e.g. a random permutation), for different types of distinguishers. This paper presents...

متن کامل

Security Amplification for the Cascade of Arbitrarily Weak PRPs: Tight Bounds via the Interactive Hardcore Lemma

We consider the task of amplifying the security of a weak pseudorandom permutation (PRP), called an ε-PRP, for which the computational distinguishing advantage is only guaranteed to be bounded by some (possibly non-negligible) quantity ε < 1. We prove that the cascade (i.e., sequential composition) of m ε-PRPs (with independent keys) is an ((m − (m − 1)ε)ε + ν)-PRP, where ν is a negligible func...

متن کامل

Free-Start Distinguishing: Combining Two Types of Indistinguishability Amplification

The term indistinguishability amplification refers to a setting where a certain construction combines two (or more) cryptographic primitives of the same type to improve their indistinguishability from an ideal primitive. Various constructions achieving this property have been studied, both in the information-theoretic and computational setting. In the former, a result due to Maurer, Pietrzak an...

متن کامل

Efficient Parallel Repetition Theorems with Applications to Security Amplification

This thesis focuses on establishing efficient parallel repetition theorems for computationally sound protocols, which assert that under parallel repetition, the computational soundness error of interactive protocols decreases at an exponential rate, and ideally, behaves as if the repetitions are completely independent. For example, suppose a protocol 〈P,V〉 has soundness error δ, then its n-fold...

متن کامل

Tight Parallel Repetition Theorems for Public-coin Arguments

Following Hastad et al. [HPPW08], we study parallel repetition theorems for public-coin interactive arguments and their generalizations. We obtain the following results: 1. We show that the reduction of Hastad et al. [HPPW08] actually gives a tight direct product theorem for public-coin interactive arguments. That is, n-fold parallel repetition reduces the soundness error from δ to δ. The crux ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2009  شماره 

صفحات  -

تاریخ انتشار 2009