Pseudorandom generators against advised context-free languages

نویسنده

  • Tomoyuki Yamakami
چکیده

Pseudorandomness has played a central role in modern cryptography, finding theoretical and practical applications to various fields of computer science. A function that generates pseudorandom strings from shorter but truly random seeds is known as a pseudorandom generator. Our generators are designed to fool languages (or equivalently, Boolean-valued functions). In particular, our generator fools advised context-free languages, namely, context-free languages assisted by external information known as advice, and moreover our generator is made almost one-to-one, stretching n-bit seeds to n + 1 bits. We explicitly construct such a pseudorandom generator, which is computed by a deterministic Turing machine using logarithmic space and also belongs to CFLMV(2)/n—a functional extension of the 2-conjunctive closure of CFL with the help of appropriate deterministic advice. In contrast, we show that there is no almost one-to-one pseudorandom generator against context-free languages if we demand that it should be computed by a nondeterministic pushdown automaton equipped with a write-only output tape. Our generator naturally extends known pseudorandom generators against advised regular languages. Our proof of the CFL/n-pseudorandomness of the generator is quite elementary, and in particular, one part of the proof utilizes a special feature of the behaviors of nondeterministic pushdown automata, called a swapping property, which is interesting in its own right, generalizing the swapping lemma for context-free languages.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Immunity and pseudorandomness of context-free languages

We examine the computational complexity of context-free languages, mainly concentrating on two well-known structural properties—immunity and pseudorandomness. An infinite language is REG-immune (resp., CFL-immune) if it contains no infinite subset that is a regular (resp., context-free) language. We prove that (i) there is a context-free REG-immune language outside REG/n and (ii) there is a REG...

متن کامل

Pseudorandom Generators, Measure Theory, and Natural Proofs - Foundations of Computer Science, 1995. Proceedings., 36th Annual Symposium on

We prove that i f strong pseudorandom number generators exist, then the class of languages that have polynomialsized circuits (Plpoly) is not measurable within exponential time, in terms of the resource-bounded measure theory of Lutz. We prove our result by showing that i f P/poly has measure zero in exponential time, then there is a natural proof against Plpoly, in the terminology of Razborov ...

متن کامل

Pseudorandom Generators, Measure Theory, and Natural Proofs

We prove that if strong pseudorandom number generators exist, then the class of languages that have polynomialsized circuits (P/poly) is not measurable within exponential time, in terms of the resource-bounded measure theory of Lutz. We prove our result by showing that if P/poly has measure zero in exponential time, then there is a natural proof against P/poly, in the terminology of Razborov an...

متن کامل

State Recovery Attacks on Pseudorandom Generators

State recovery attacks comprise an important class of attacks on pseudorandom generators. In this paper we analyze resistance of pseudorandom generators against these attacks in terms of concrete security. We show that security of the BlumMicali pseudorandom generator against state recovery attacks is tightly related to the security of the corresponding one-way function. C. Wolf, S. Lucks, P.-W...

متن کامل

Pseudorandom bit Generators for Secure Broadcasting Systems

Pseudorandom bit generators play an essential role in high-security audio/video scrambling and addressing systems which allow pay-TV programs to be viewed only by authorized subscribers. This paper evaluated cryptographic strength of the bit generators proposed by the European Broadcast Unit and the Japan's Ministry of Posts and Telecommunications and some security weakness was found on the gen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Theor. Comput. Sci.

دوره 613  شماره 

صفحات  -

تاریخ انتشار 2016