On Seed-Incompressible Functions

نویسندگان

  • Shai Halevi
  • Steven Myers
  • Charles Rackoff
چکیده

We investigate a new notion of security for “cryptographic functions” that we term seed incompressibility (SI). We argue that this notion captures some of the intuition for the alleged security of constructions in the random-oracle model, and indeed we show that seed incompressibility suffices for some applications of the random oracle methodology. Very roughly, a function family fs(·) with |s| = n is seed incompressible if given (say) n/2 bits of advice (that can depend on the seed s) and an oracle access to fs(·), an adversary cannot “break fs(·)” any better than given only oracle access to fs(·) and no advice. The strength of this notion depends on what we mean by “breaking fs(·)”. We first show that for any family fs there exists an adversary that can distinguish fs(·) from a random function using n/2 bits of advice, so seed incompressible pseudo-random functions do not exist. Then we consider the weaker notion of seed-incompressible correlation intractability. We show that although the negative results can be partially extended also to this weaker notion, they cannot rule it out altogether. More importantly, the settings that we cannot rule out still suffice for many applications. In particular, we show that they suffice for constructing collision-resistant hash functions and for removing interaction from Σprotocols (3-round honest verifier zero-knowledge protocols).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Incompressible laminar flow computations by an upwind least-squares meshless method

In this paper, the laminar incompressible flow equations are solved by an upwind least-squares meshless method. Due to the difficulties in generating quality meshes, particularly in complex geometries, a meshless method is increasingly used as a new numerical tool. The meshless methods only use clouds of nodes to influence the domain of every node. Thus, they do not require the nodes to be conn...

متن کامل

Concerning the Effect of a Viscoelastic Foundation on the Dynamic Stability of a Pipeline System Conveying an Incompressible Fluid

In this paper, we present an analytical method for solving a well-posed boundary value problem of mathematical physics governing the vibration characteristics of an internal flow propelled fluid-structure interaction where the pipeline segment is idealized as an elastic hollow beam conveying an incompressible fluid on a viscoelastic foundation. The effect of Coriolis and damping forces on the o...

متن کامل

Morse Position of Knots and Closed Incompressible Surfaces

In this paper, we study on knots and closed incompressible surfaces in the 3-sphere via Morse functions. We show that both of knots and closed incompressible surfaces can be isotoped into a ”related Morse position” simultaneously. As an application, we have following results. • Smallness of Montesinos tangles with length two • Classification of closed incompressible and meridionally incompressi...

متن کامل

A Comparative Study of Velocity Statistics of Hydrodynamic and Magnetohydrodynamic Turbulence

Turbulence in an incompressible fluid with and without a magnetic field as well as moderately compressible MHD turbulence are compared. The results of three numerical simulation models in three dimensions of resolution up to 512 are used for this purpose. The compatibility of the spectra of all three models with the Kolmogorov spectrum is confirmed. For the magnetohydrodynamic (MHD) models the ...

متن کامل

Incompressible Functions, Relative-Error Extractors, and the Power of Nondeterminsitic Reductions

A circuit C compresses a function f : {0, 1} → {0, 1} if given an input x ∈ {0, 1} the circuit C can shrink x to a shorter `-bit string x′ such that later, a computationallyunbounded solver D will be able to compute f(x) based on x′. In this paper we study the existence of functions which are incompressible by circuits of some fixed polynomial size s = n. Motivated by cryptographic applications...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008