Pseudo-Random Function Generators With Unbounded Inputs

ثبت نشده
چکیده

Definition: (See Goldreich, section 3.6.4.2 .) A function generator F with unbounded inputs associates with each n bit key k ∈ {0, 1} a function Fk : {0, 1}∗ → {0, 1}. We insist that Fk(x) be computable in time polynomial in the lengths of k and x. By pseudo-random for such a generator, we mean the obvious thing: the Distinguisher adversary D is given a function f : {0, 1}∗ → {0, 1} and can query f on inputs of any length (although since the adversary runs in polynomial time, the queries must be of polynomial length). We define pD(n) as the probability that D accepts Fk for randomly chosen k ∈ {0, 1}. It is a bit trickier to define rD(n) because it doesn’t make sense to say, “choose a random function f : {0, 1}∗ → {0, 1}” since there are infinitely many such functions. So let us assume that D (for key length n) never makes queries longer than n, and let {0, 1}≤ne be the set of strings of length at most n. We can now define rD(n) as the probability that D accepts a randomly chosen f : {0, 1}≤n e → {0, 1}.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Pseudo-Random Function Generators With Unbounded Inputs

Definition: (See Goldreich, section 3.6.4.2 .) A function generator F with unbounded inputs associates with each n bit key k ∈ {0, 1} a function Fk : {0, 1}∗ → {0, 1}. We insist that Fk(x) be computable in time polynomial in the lengths of k and x. By pseudo-random for such a generator, we mean the obvious thing: the Distinguisher adversary D is given a function f : {0, 1}∗ → {0, 1} and can que...

متن کامل

Sponge-Based Pseudo-Random Number Generators

This paper proposes a new construction for the generation of pseudo-random numbers. The construction is based on sponge functions and is suitable for embedded security devices as it requires few resources. We propose a model for such generators and explain how to define one on top of a sponge function. The construction is a novel way to use a sponge function, and inputs and outputs blocks in a ...

متن کامل

Constrained Pseudorandom Functions for Unconstrained Inputs

A constrained pseudo random function (PRF) behaves like a standard PRF, but with the added feature that the (master) secret key holder, having secret key K, can produce a constrained key, K{f}, that allows for the evaluation of the PRF on all inputs satisfied by the constraint f . Most existing constrained PRF constructions can handle only bounded length inputs. In a recent work, Abusalah et al...

متن کامل

Simple Extractors via Constructions of Cryptographic Pseudo-random Generators

Trevisan has shown that constructions of pseudo-random generators from hard functions (the Nisan-Wigderson approach) also produce extractors. We show that constructions of pseudo-random generators from one-way permutations (the Blum-Micali-Yao approach) can be used for building extractors as well. Using this new technique we build extractors that do not use designs and polynomial-based error-co...

متن کامل

Towards Efficient Private Distributed Computation on Unbounded Input Streams - (Extended Abstract)

In the problem of private “swarm” computing, n agents wish to securely and distributively perform a computation on common inputs, in such a way that even if the entire memory contents of some of them are exposed, no information is revealed about the state of the computation. Recently, Dolev, Garay, Gilboa and Kolesnikov [ICS 2011] considered this problem in the setting of informationtheoretic s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016