A Hardcore Lemma for Computational Indistinguishability: Security Amplification for Arbitrarily Weak PRGs with Optimal Stretch
نویسندگان
چکیده
It is well known that two random variables X and Y with the same range can be viewed as being equal (in a well-defined sense) with probability 1− d(X,Y ), where d(X,Y ) is their statistical distance, which in turn is equal to the best distinguishing advantage for X and Y . In other words, if the best distinguishing advantage for X and Y is , then with probability 1 − they are completely indistinguishable. This statement, which can be seen as an information-theoretic version of a hardcore lemma, is for example very useful for proving indistinguishability amplification results. In this paper we prove the computational version of such a hardcore lemma, thereby extending the concept of hardcore sets from the context of computational hardness to the context of computational indistinguishability. This paradigm promises to have many applications in cryptography and complexity theory. It is proven both in a non-uniform and a uniform setting. For example, for a weak pseudorandom generator (PRG) for which the (computational) distinguishing advantage is known to be bounded by (e.g. = 1 2 ), one can define an event on the seed of the PRG which has probability at least 1 − and such that, conditioned on the event, the output of the PRG is essentially indistinguishable from a string with almost maximal min-entropy, namely log(1/(1− )) less than its length. As an application, we show an optimally efficient construction for converting a weak PRG for any < 1 into a strong PRG by proving that the intuitive construction of applying an extractor to an appropriate number of independent weak PRG outputs yields a strong PRG. This improves strongly over the best previous construction for security amplification of PRGs which does not work for ≥ 1 2 and requires the seed of the constructed strong PRG to be very long.
منابع مشابه
Security Amplification for the Cascade of Arbitrarily Weak PRPs: Tight Bounds via the Interactive Hardcore Lemma
We consider the task of amplifying the security of a weak pseudorandom permutation (PRP), called an ε-PRP, for which the computational distinguishing advantage is only guaranteed to be bounded by some (possibly non-negligible) quantity ε < 1. We prove that the cascade (i.e., sequential composition) of m ε-PRPs (with independent keys) is an ((m − (m − 1)ε)ε + ν)-PRP, where ν is a negligible func...
متن کاملComputational Indistinguishability Amplification: Tight Product Theorems for System Composition
Computational indistinguishability amplification is the problem of strengthening cryptographic primitives whose security is defined by bounding the distinguishing advantage of an efficient distinguisher. Examples include pseudorandom generators (PRGs), pseudorandom functions (PRFs), and pseudorandom permutations (PRPs). The literature on computational indistinguishability amplification consists...
متن کاملInaccessible Entropy and its Applications
We summarize the constructions of PRGs from OWFs discussed so far and introduce the notion of inaccessible entropy [HILL99, HRVW09]. Remember that we are trying to construct objects that look random (PRGs) from an assumption about hardness of computation (OWFs). So far we have seen that it is possible to construct PRGs from OWFs if the OWF has some nice structural property. One-way Permutations...
متن کاملCOS598D Lecture 3 Pseudorandom generators from one-way functions
In this lecture we prove the existence of pseudorandom-generators assuming that one-way functions exist (Hastad, Impagliazzo, Levin and Luby '99). Our proof is with respect to non-uniform security. We also sketch the uniform case which requires a uniform version of Impagliazzo's hardcore set lemma that uses ideas from learning theory. We briefly recall some standard notions from cryptography. F...
متن کاملIndistinguishability and Unpredictability Hardcore Lemmas: New Proofs with Applications to Pseudoentropy
Hardcore lemmas are results in complexity theory which state that average-case hardness must have a very hard “kernel”, that is a subset of instances where the problem is extremely hard. Such results find important applications in hardness amplification. In this paper we revisit two classical results: (a) The hardcore lemma for unpredictability, proved first by Impagliazzo. It states that if a ...
متن کامل