Limits on the Stretch of Non-adaptive Constructions of Pseudo-Random Generators

نویسندگان

  • Josh Bronson
  • Ali Juma
  • Periklis A. Papakonstantinou
چکیده

The standard approach for constructing a large-stretch pseudorandom generator given a one-way permutation or given a smaller-stretch pseudo-random generator involves repeatedly composing the given primitive with itself. In this paper, we consider whether this approach is necessary, that is, whether there are constructions that do not involve composition. More formally, we consider black-box constructions of pseudorandom generators from pseudo-random generators of smaller stretch or from one-way permutations, where the constructions make only nonadaptive queries to the given object. We consider three classes of such constructions, and for each class, we give a black-box impossibility result that demonstrates a contrast between the stretch that can be achieved by adaptive and non-adaptive black-box constructions. We first consider constructions that make constantly-many non-adaptive queries to a given pseudo-random generator, where the seed length of the construction is at most O(logn) bits longer than the length n of each oracle query. We show that such constructions cannot achieve stretch that is even a single bit greater than the stretch of the given pseudo-

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fine-Grained Cryptography

Fine-grained cryptographic primitives are ones that are secure against adversaries with an apriori bounded polynomial amount of resources (time, space or parallel-time), where the honest algorithms use less resources than the adversaries they are designed to fool. Such primitives were previously studied in the context of time-bounded adversaries (Merkle, CACM 1978), space-bounded adversaries (C...

متن کامل

Simple Extractors via Constructions of Cryptographic Pseudo-random Generators

Trevisan has shown that constructions of pseudo-random generators from hard functions (the Nisan-Wigderson approach) also produce extractors. We show that constructions of pseudo-random generators from one-way permutations (the Blum-Micali-Yao approach) can be used for building extractors as well. Using this new technique we build extractors that do not use designs and polynomial-based error-co...

متن کامل

Behavioral Optimization of Pseudo-Neutral Hole in Hyperelastic Membranes Using Functionally graded Cables

Structures consisting of cables and membranes have been of interest to engineers due to their higher ratio of strength to weight and lower cost compared to other structures. One of the challenges in such structures is presence of holes in membranes, which leads to non-uniform stress and strain distributions, even under uniform far-field deformations. One of the approaches suggested for controll...

متن کامل

On the Complexity of Non-adaptively Increasing the Stretch of Pseudorandom Generators

We study the complexity of black-box constructions of linearstretch pseudorandom generators starting from a 1-bit stretch oracle generator G. We show that there is no construction which makes nonadaptive queries to G and then just outputs bits of the answers. The result extends to constructions that both work in the non-uniform setting and are only black-box in the primitive G (not the proof of...

متن کامل

SoK: Security Models for Pseudo-Random Number Generators

Randomness plays an important role in multiple applications in cryptography. It is required in fundamental tasks such as key generation, masking and hiding values, nonces and initialization vectors generation. Pseudo-random number generators have been studied by numerous authors, either to propose clear security notions and associated constructions or to point out potential vulnerabilities. In ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011