Notes for Lecture 7 1 Increasing the Stretch of Pseudorandom Generators
نویسندگان
چکیده
In the previous lecture, we proved that if f is a permutation and B is an (S,)-hardcore predicate for f then G : x → f (x), B(x), which maps n bits to n + 1 bits, is (S,) pseudorandom. We then started investigating the performance of the iterative application of G, namely G (k) defined as in figure 1. B(x)) B(f(x))) B(f ((2)) (x))) B(f ((k-1)) (x))) f ((k)) (x)) xx GG GG GG GG Figure 1: Definition of G (k) G (k) maps n bits to n + k bits and its pseudorandom properties are determined by theorem 1 which was stated in the end of the previous lecture. Today we will finish the proof. We will go quickly through the steps of the proof that were given in the previous lecture. Theorem 1 If f is a permutation and B an (S,) hardcore predicate for f and, moreover, f, B are computable by circuits of size ≤ t, then G (k) , where G : x → f (x), B(x), is (S − O(tk), k)-pseudorandom. Proof: We will prove the contra-positive of the statement. Indeed, we will suppose that G (k) is not (S ,)-pseudorandom and we will try to derive a distinguishing circuit for G. By definition it follows that there exists a circuit D of size ≤ S such that Pr Un∼{0,1} n [D(G (k) (U n)) = 1] − Pr U n+k ∼{0,1} n+k [D(U n+k) = 1] ≥ Without loss of generality, we can assume that circuit D satisfies the above inequality after removing the absolute value and by virtue of a hybrid argument we can argue that there exists an integer (k−1) (x)), f (k) (x)) = 1] ≥ k (1)
منابع مشابه
Lecture Notes on Pseudorandomness { Part I
A fresh view at the question of randomness was taken in the theory of computing: It has been postulated that a distribution is pseudorandom if it cannot be told apart from the uniform distribution by any e cient procedure. This paradigm, originally associating e cient procedures with polynomial-time algorithms, has been applied also with respect to a variety of other classes of distinguishing p...
متن کاملCOS598D Lecture 3 Pseudorandom generators from one-way functions
In this lecture we prove the existence of pseudorandom-generators assuming that one-way functions exist (Hastad, Impagliazzo, Levin and Luby '99). Our proof is with respect to non-uniform security. We also sketch the uniform case which requires a uniform version of Impagliazzo's hardcore set lemma that uses ideas from learning theory. We briefly recall some standard notions from cryptography. F...
متن کاملLecture 2 : Pseudorandom Generators and Extractors
Intuitively, a pseudorandom generator (PRG) is a procedure that generates a pseudorandom distribution. A PRG shares the parameters of the underlying pseudorandom distribution: the class A of algorithms to which the generated distribution looks random, and a bound on how different the pseudorandom distribution can look from the uniform one for algorithms from A. Definition 1 (Pseudorandom genera...
متن کاملOn Pseudorandom Generators in NC
In this paper we consider the question of whether NC circuits can generate pseudorandom distributions. While we leave the general question unanswered, we show • Generators computed by NC circuits where each output bit depends on at most 3 input bits (i.e, NC03 circuits) and with stretch factor greater than 4 are not pseudorandom. • A large class of “non-problematic” NC generators with superline...
متن کاملOn the Complexity of Non-adaptively Increasing the Stretch of Pseudorandom Generators
We study the complexity of black-box constructions of linearstretch pseudorandom generators starting from a 1-bit stretch oracle generator G. We show that there is no construction which makes nonadaptive queries to G and then just outputs bits of the answers. The result extends to constructions that both work in the non-uniform setting and are only black-box in the primitive G (not the proof of...
متن کامل