Simple Constructions from (Almost) Regular One-Way Functions

被引:0
作者
Mazor, Noam [1 ]
Zhang, Jiapeng [2 ]
机构
[1] Tel Aviv Univ, Sch Comp Sci, Tel Aviv, Israel
[2] Univ Southern Calif, Dept Comp Sci, Los Angeles, CA USA
关键词
Pseudorandom generator; Universal one-way hash function; One-way function; Unknown-regular function; Non-adaptive; PSEUDORANDOM GENERATORS; EFFICIENCY;
D O I
10.1007/s00145-024-09507-4
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Two of the most useful cryptographic primitives that can be constructed from one-way functions are pseudorandom generators (PRGs) and universal one-way hash functions (UOWHFs). In order to implement them in practice, the efficiency of such constructions must be considered. The three major efficiency measures are: the seed length, the call complexity to the one-way function, and the adaptivity of these calls. Still, the optimal efficiency of these constructions is not yet fully understood: there exist gaps between the known upper bound and the known lower bound for black-box constructions. A special class of one-way functions called unknown-regular one-way functions is much better understood. Haitner, Harnik and Reingold (CRYPTO 2006) presented a PRG construction with semi-linear seed length and linear number of calls based on a method called randomized iterate. Ames, Gennaro and Venkitasubramaniam (ASIACRYPT 2012) then gave a construction of UOWHF with similar parameters and using similar ideas. On the other hand, Holenstein and Sinha (FOCS 2012) and Barhum and Holenstein (TCC 2013) showed an almost linear call-complexity lower bound for black-box constructions of PRGs and UOWHFs from one-way functions. Hence, Haitner et al. and Ames et al. reached tight constructions (in terms of seed length and the number of calls) of PRGs and UOWHFs from regular one-way functions. These constructions, however, are adaptive. In this work, we present non-adaptive constructions for both primitives which match the optimal call complexity given by Holenstein and Sinha and Barhum and Holenstein. Our constructions, besides being simple and non-adaptive, are robust also for almost-regular one-way functions.
引用
收藏
页数:30
相关论文
共 25 条
[1]   Unifying Computational Entropies via Kullback-Leibler Divergence [J].
Agrawal, Rohit ;
Chen, Yi-Hsiu ;
Horel, Thibaut ;
Vadhan, Salil .
ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II, 2019, 11693 :831-858
[2]  
Ames S, 2012, LECT NOTES COMPUT SC, V7658, P154, DOI 10.1007/978-3-642-34961-4_11
[3]  
Barhum Kfir, 2012, Progress in Cryptology - LATINCRYPT 2012. Proceedings of the 2nd International Conference on Cryptology and Information Security in Latin America, P234, DOI 10.1007/978-3-642-33481-8_13
[4]  
Barhum K, 2013, LECT NOTES COMPUT SC, V7785, P662, DOI 10.1007/978-3-642-36594-2_37
[5]   HOW TO GENERATE CRYPTOGRAPHICALLY STRONG SEQUENCES OF PSEUDO-RANDOM BITS [J].
BLUM, M ;
MICALI, S .
SIAM JOURNAL ON COMPUTING, 1984, 13 (04) :850-864
[6]   Bounds on the efficiency of generic cryptographic constructions [J].
Gennaro, R ;
Gertner, Y ;
Katz, J ;
Trevisan, L .
SIAM JOURNAL ON COMPUTING, 2005, 35 (01) :217-246
[7]  
Goldreich O., 1989, Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing, P25, DOI 10.1145/73007.73010
[8]   ON THE EXISTENCE OF PSEUDORANDOM GENERATORS [J].
GOLDREICH, O ;
KRAWCZYK, H ;
LUBY, M .
SIAM JOURNAL ON COMPUTING, 1993, 22 (06) :1163-1175
[9]  
GOLDREICH O, 1990, ANN IEEE SYMP FOUND, P318
[10]  
Haitner I, 2006, LECT NOTES COMPUT SC, V4117, P22