Pseudorandom Functions: Three Decades Later
نویسندگان
چکیده
In 1984, Goldreich, Goldwasser and Micali formalized the concept of pseudorandom functions and proposed a construction based on any length-doubling pseudorandom generator. Since then, pseudorandom functions have turned out to be an extremely influential abstraction, with applications ranging from message authentication to barriers in proving computational complexity lower bounds. In this tutorial we survey various incarnations of pseudorandom functions, giving self-contained proofs of key results from the literature. Our main focus is on feasibility results and constructions, as well as on limitations of (and induced by) pseudorandom functions. Along the way we point out some open questions that we believe to be within reach of current techniques. I have set up on a Manchester computer a small programme using only 1000 units of storage, whereby the machine supplied with one sixteen figure number replies with another within two seconds. I would defy anyone to learn from these replies sufficient about the programme to be able to predict any replies to untried values. A. TURING (from [GGM84]) ∗This survey appeared in the book Tutorials on the Foundations of Cryptography, published in honor of Oded Goldreichs 60th birthday. †Dept. of Computer Science and Engineering and Institute of Theoretical Computer Science and Communications, Chinese University of Hong Kong. [email protected] ‡Efi Arazi School of Computer Science, IDC Herzliya. [email protected]
منابع مشابه
On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes
It is well known that three and four rounds of balanced Feistel cipher or Luby-Rackoff (LR) encryption for two blocks messages are pseudorandom permutation (PRP) and strong pseudorandom permutation (SPRP) respectively. A block is n-bit long for some positive integer n and a (possibly keyed) block-function is a nonlinear function mapping all blocks to themselves, e.g. blockcipher. XLS (eXtended ...
متن کاملPublications in Communication Complexity Theory
This pair of papers contains lower bounds in the “number-on-forehead” (NOF) model of multi-party communication complexity that remain the strongest even to date, after 24 years, in spite of considerable effort. The paper includes applications to a variety of models of computation: time-space tradeoff for multi-head Turing machines, lower bounds for branching programs, pseudorandom generators fo...
متن کاملA Survey of Pseudorandom Functions
We survey three pseudorandom function constructions – specifically the Goldreich-Goldwasser-Micali construction [3], the Naor-Reingold construction from pseudorandom synthesizers [4], and the canonical NaorReingold number-theoretic constructions from the DDH assumption and the assumption that factoring Blum integers is hard [5].
متن کاملThe Pseudorandomness of Elastic Block Ciphers
We investigate elastic block ciphers, a method for constructing variable length block ciphers, from a theoretical perspective. We view the underlying structure of an elastic block cipher as a network, which we refer to as an elastic network, and analyze the network in a manner similar to the analysis performed by Luby and Rackoff on Feistel networks. We prove that a three round elastic network ...
متن کاملAdaptive Multiparty Non-interactive Key Exchange Without Setup In The Standard Model
Non-interactive key exchange (NIKE) is a fundamental notion in Cryptography. This notion was introduced by Diffie and Hellman in 1976. They proposed the celebrated 2-party NIKE protocol and left open as a fascinating question, whether NIKE could be realized in the multiparty setting. NIKE has since then been an active area of research with an ultimate goal of obtaining best possible security in...
متن کامل