TY - GEN
T1 - The randomized iterate, revisited - Almost linear seed length PRGs from a broader class of one-way functions
AU - Yu, Yu
AU - Gu, Dawu
AU - Li, Xiangxue
AU - Weng, Jian
N1 - Publisher Copyright:
© International Association for Cryptologic Research 2015.
PY - 2015
Y1 - 2015
N2 - We revisit “the randomized iterate” technique that was originally used by Goldreich, Krawczyk, and Luby (SICOMP 1993) and refined by Haitner, Harnik and Reingold (CRYPTO 2006) in constructing pseudorandom generators (PRGs) from regular one-way functions (OWFs). We abstract out a technical lemma (which is folklore in leakage resilient cryptography), and use it to provide a simpler and more modular proof for the Haitner-Harnik-Reingold PRGs from regular OWFs. We introduce a more general class of OWFs called “weakly-regular one-way functions” from which we construct a PRG of seed length O(n·logn). More specifically, consider an arbitrary one-way function f with range divided into sets Y1, Y2, . . ., Yn where each Yi def = {y : 2i−1 ≤ |f−1(y)| < 2i}. We say that f is weakly-regular if there exists a (not necessarily efficient computable) cut-off point max such that Ymax is of some noticeable portion (say n−c for constant c), and Ymax+1, . . ., Yn only sum to a negligible fraction. We construct a PRG by making Õ(n2c+1) calls to f and achieve seed length O(n· logn) using bounded space generators. This generalizes the approach of Haitner et al., where regular OWFs fall into a special case for c = 0. We use a proof technique that is similar to and extended from the method by Haitner, Harnik and Reingold for hardness amplification of regular weakly-one-way functions. Our work further explores the feasibility and limits of the “randomized iterate” type of black-box constructions. In particular, the underlying f can have an arbitrary structure as long as the set of images with maximal preimage size has a noticeable fraction. In addition, our construction is much more seed-length efficient and security-preserving (albeit less general) than the HILL-style generators where the best known construction by Vadhan and Zheng (STOC 2012) requires seed length Õ(n3).
AB - We revisit “the randomized iterate” technique that was originally used by Goldreich, Krawczyk, and Luby (SICOMP 1993) and refined by Haitner, Harnik and Reingold (CRYPTO 2006) in constructing pseudorandom generators (PRGs) from regular one-way functions (OWFs). We abstract out a technical lemma (which is folklore in leakage resilient cryptography), and use it to provide a simpler and more modular proof for the Haitner-Harnik-Reingold PRGs from regular OWFs. We introduce a more general class of OWFs called “weakly-regular one-way functions” from which we construct a PRG of seed length O(n·logn). More specifically, consider an arbitrary one-way function f with range divided into sets Y1, Y2, . . ., Yn where each Yi def = {y : 2i−1 ≤ |f−1(y)| < 2i}. We say that f is weakly-regular if there exists a (not necessarily efficient computable) cut-off point max such that Ymax is of some noticeable portion (say n−c for constant c), and Ymax+1, . . ., Yn only sum to a negligible fraction. We construct a PRG by making Õ(n2c+1) calls to f and achieve seed length O(n· logn) using bounded space generators. This generalizes the approach of Haitner et al., where regular OWFs fall into a special case for c = 0. We use a proof technique that is similar to and extended from the method by Haitner, Harnik and Reingold for hardness amplification of regular weakly-one-way functions. Our work further explores the feasibility and limits of the “randomized iterate” type of black-box constructions. In particular, the underlying f can have an arbitrary structure as long as the set of images with maximal preimage size has a noticeable fraction. In addition, our construction is much more seed-length efficient and security-preserving (albeit less general) than the HILL-style generators where the best known construction by Vadhan and Zheng (STOC 2012) requires seed length Õ(n3).
UR - https://www.scopus.com/pages/publications/84924731348
U2 - 10.1007/978-3-662-46494-6_2
DO - 10.1007/978-3-662-46494-6_2
M3 - 会议稿件
AN - SCOPUS:84924731348
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 7
EP - 35
BT - Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Proceedings
A2 - Dodis, Yevgeniy
A2 - Nielsen, Jesper Buus
PB - Springer Verlag
T2 - 12th Theory of Cryptography Conference, TCC 2015
Y2 - 23 March 2015 through 25 March 2015
ER -