Pseudo-Random Function Generators With Unbounded Inputs
ثبت نشده
چکیده
Definition: (See Goldreich, section 3.6.4.2 .) A function generator F with unbounded inputs associates with each n bit key k ∈ {0, 1} a function Fk : {0, 1}∗ → {0, 1}. We insist that Fk(x) be computable in time polynomial in the lengths of k and x. By pseudo-random for such a generator, we mean the obvious thing: the Distinguisher adversary D is given a function f : {0, 1}∗ → {0, 1} and can query f on inputs of any length (although since the adversary runs in polynomial time, the queries must be of polynomial length). We define pD(n) as the probability that D accepts Fk for randomly chosen k ∈ {0, 1}. It is a bit trickier to define rD(n) because it doesn’t make sense to say, “choose a random function f : {0, 1}∗ → {0, 1}” since there are infinitely many such functions. So let us assume that D (for key length n) never makes queries longer than n, and let {0, 1}≤ne be the set of strings of length at most n. We can now define rD(n) as the probability that D accepts a randomly chosen f : {0, 1}≤n e → {0, 1}.
منابع مشابه
Pseudo-Random Function Generators With Unbounded Inputs
Definition: (See Goldreich, section 3.6.4.2 .) A function generator F with unbounded inputs associates with each n bit key k ∈ {0, 1} a function Fk : {0, 1}∗ → {0, 1}. We insist that Fk(x) be computable in time polynomial in the lengths of k and x. By pseudo-random for such a generator, we mean the obvious thing: the Distinguisher adversary D is given a function f : {0, 1}∗ → {0, 1} and can que...
متن کاملSponge-Based Pseudo-Random Number Generators
This paper proposes a new construction for the generation of pseudo-random numbers. The construction is based on sponge functions and is suitable for embedded security devices as it requires few resources. We propose a model for such generators and explain how to define one on top of a sponge function. The construction is a novel way to use a sponge function, and inputs and outputs blocks in a ...
متن کاملConstrained Pseudorandom Functions for Unconstrained Inputs
A constrained pseudo random function (PRF) behaves like a standard PRF, but with the added feature that the (master) secret key holder, having secret key K, can produce a constrained key, K{f}, that allows for the evaluation of the PRF on all inputs satisfied by the constraint f . Most existing constrained PRF constructions can handle only bounded length inputs. In a recent work, Abusalah et al...
متن کاملSimple Extractors via Constructions of Cryptographic Pseudo-random Generators
Trevisan has shown that constructions of pseudo-random generators from hard functions (the Nisan-Wigderson approach) also produce extractors. We show that constructions of pseudo-random generators from one-way permutations (the Blum-Micali-Yao approach) can be used for building extractors as well. Using this new technique we build extractors that do not use designs and polynomial-based error-co...
متن کاملTowards Efficient Private Distributed Computation on Unbounded Input Streams - (Extended Abstract)
In the problem of private “swarm” computing, n agents wish to securely and distributively perform a computation on common inputs, in such a way that even if the entire memory contents of some of them are exposed, no information is revealed about the state of the computation. Recently, Dolev, Garay, Gilboa and Kolesnikov [ICS 2011] considered this problem in the setting of informationtheoretic s...
متن کامل