TY - GEN
T1 - Pseudorandom generators from regular one-way functions
T2 - 19th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2013
AU - Yu, Yu
AU - Li, Xiangxue
AU - Weng, Jian
PY - 2013
Y1 - 2013
N2 - We revisit the problem of basing pseudorandom generators on regular one-way functions, and present the following constructions: - For any known-regular one-way function (on n-bit inputs) that is known to be ε-hard to invert, we give a neat (and tighter) proof for the folklore construction of pseudorandom generator of seed length Θ(n) by making a single call to the underlying one-way function. - For any unknown-regular one-way function with known ε-hardness, we give a new construction with seed length Θ(n) and O(n/log(1/ε)) calls. Here the number of calls is also optimal by matching the lower bounds of Holenstein and Sinha (FOCS 2012). Both constructions require the knowledge about ε, but the dependency can be removed while keeping nearly the same parameters. In the latter case, we get a construction of pseudo-random generator from any unknown-regular one-way function using seed length Õ(n) and Õ(n/log n) calls, where Õ omits a factor that can be made arbitrarily close to constant (e.g. log log log n or even less). This improves the randomized iterate approach by Haitner, Harnik and Reingold (CRYPTO 2006) which requires seed length O(n·log n) and O(n/log n) calls.
AB - We revisit the problem of basing pseudorandom generators on regular one-way functions, and present the following constructions: - For any known-regular one-way function (on n-bit inputs) that is known to be ε-hard to invert, we give a neat (and tighter) proof for the folklore construction of pseudorandom generator of seed length Θ(n) by making a single call to the underlying one-way function. - For any unknown-regular one-way function with known ε-hardness, we give a new construction with seed length Θ(n) and O(n/log(1/ε)) calls. Here the number of calls is also optimal by matching the lower bounds of Holenstein and Sinha (FOCS 2012). Both constructions require the knowledge about ε, but the dependency can be removed while keeping nearly the same parameters. In the latter case, we get a construction of pseudo-random generator from any unknown-regular one-way function using seed length Õ(n) and Õ(n/log n) calls, where Õ omits a factor that can be made arbitrarily close to constant (e.g. log log log n or even less). This improves the randomized iterate approach by Haitner, Harnik and Reingold (CRYPTO 2006) which requires seed length O(n·log n) and O(n/log n) calls.
UR - https://www.scopus.com/pages/publications/84892403166
U2 - 10.1007/978-3-642-42045-0_14
DO - 10.1007/978-3-642-42045-0_14
M3 - 会议稿件
AN - SCOPUS:84892403166
SN - 9783642420443
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 261
EP - 279
BT - Advances in Cryptology, ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
Y2 - 1 December 2013 through 5 December 2013
ER -