Lecture Notes on Pseudorandomness { Part I

نویسنده

  • Oded Goldreich
چکیده

A fresh view at the question of randomness was taken in the theory of computing: It has been postulated that a distribution is pseudorandom if it cannot be told apart from the uniform distribution by any e cient procedure. This paradigm, originally associating e cient procedures with polynomial-time algorithms, has been applied also with respect to a variety of other classes of distinguishing procedures. We focus on pseudorandom generators; that is, deterministic programs that stretch short (random) seeds into much longer pseudorandom sequences. The current lecture series focuses on the case where the pseudorandom generator runs in polynomial-time and withstands any polynomial-time distinguisher. In particular, the distinguisher may be more complex (i.e., have a higher polynomial running time) than the generator. This framework is natural in the context of designing general-purpose pseudorandom generators that can be used in any e cient (i.e., polynomial-time) application. Furthermore, this framework is almost mandatory in cryptographic applications, where the adversary is typically willing to invest more e ort than the legitimate users. A companion lecture series (i.e., \Pseudorandomness { Part 2" by Luca Trevisan) focuses on the case where the pseudorandom generator runs in exponential-time (w.r.t the seed length) and withstands distinguisher of running time bounded by a speci c polynomial (in the length of the generator's output). In particular, the generator may be more complex than the distinguisher. As explained in the companion lecture series, this framework is natural in the context of derandomization (i.e., converting randomized algorithms to deterministic ones).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cos 594d: a Theorist’s Toolkit

These are edited lecture notes from a graduate course at the Computer Science department of Princeton University in Fall 2002. The course was my attempt to teach first year graduate students students many mathematical tools useful in theoretical computer science. Of course, the goal was too ambitious for a course with 12 three hour lectures. I had to relegate some topics to homework; these incl...

متن کامل

Lecture Notes: Distributed Algorithms

This booklet includes lecture notes from parallel and distributed computing course I taught in Fall 07, Spring 08, and Fall 08 at the Kent State University, USA. I wrote a good part of these notes in Fall 2007; I revise them every time I teach the course. The problems in the notes have been used in class lectures, homework assignments, or exams. You can nd a collection of homework assignments a...

متن کامل

How to Use My 1989 Lecture Notes on Encryption, Signatures and Crypto-protocols

This document is written to complement my 1989 lecture notes on Encryption, Signatures and Cryptographic Protocols. In it I sketch what I believe should be done when trying to use these notes as part of a course on Foundations of Cryptography. In addition, I also indicate what I believe should be done in order to augment the material so that it can t into a comprehensive book on Foundations of ...

متن کامل

Factors affecting students tendency of Univercity students to Lecture Notes

Introduction: Many studies detected factors contributing to the students’ tendency to lecture notes. This study aimed at evaluating the factors affecting students tendency to lecture notes in Hormozgan University of Medical Sciences. Methods: In this descriptive study, 179 students from medicine, nursing & midwifery, health, and Paramedicine schools were selected through stratified random...

متن کامل

Lecture 8 : Pseudorandomness and Sketching

Thus far we have been considered linear sketching algorithms for data streams where the sketch is given by an S ×M random matrix A where S is small and at most the space bound and M is huge. So far, as in the Count-Min, Count, and Tug-of-War sketches, the matrix A has been defined implicitly using pairwise or 4-wise independence using a very small number of random bits that contribute only a sm...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014