Security Amplification for the Cascade of Arbitrarily Weak PRPs: Tight Bounds via the Interactive Hardcore Lemma

被引:0
作者
Tessaro, Stefano [1 ]
机构
[1] Univ Calif San Diego, Dept Comp Sci & Engn, La Jolla, CA 92093 USA
来源
THEORY OF CRYPTOGRAPHY | 2011年 / 6597卷
关键词
INDISTINGUISHABILITY AMPLIFICATION; GENERATORS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider the task of amplifying the security of a weak pseudorandom permutation (PRP), called an epsilon-PR.P, for which the computational distinguishing advantage is only guaranteed to be bounded by some (possibly non-negligible) quantity epsilon < 1. We prove that the cascade (i.e., sequential composition) of in epsilon-PRPs (with independent keys) is an ((m - (m - 1)epsilon)epsilon(m) + nu)-PRP, where nu is a negligible function. In the asymptotic setting, this implies security amplification for all epsilon < 1 -1/poly, and the result extends to two-sided PRPs, where the inverse of the given permutation is also queried. Furthermore, we show that this result is essentially tight. This settles a long-standing open problem clue to Luby and Rackoff (STOC '86). Our approach relies on the first hardcore lemma for computational indistinguishability of interactive systems: Given two systems whose states do not depend on the interaction, and which no efficient adversary can distinguish with advantage better than epsilon, we show that there exist events on the choices of the respective states, occurring each with probability at least 1 - epsilon, such that the two systems are computationally indistinguishable conditioned on these events.
引用
收藏
页码:37 / 54
页数:18
相关论文
共 16 条
[1]  
[Anonymous], FOCS
[2]  
[Anonymous], FOCS
[3]  
[Anonymous], 2005, P 37 ANN ACM S THEOR
[4]  
[Anonymous], FOCS
[5]  
Dodis Y, 2009, LECT NOTES COMPUT SC, V5444, P128
[6]  
Holenstein T, 2006, LECT NOTES COMPUT SC, V3876, P443
[7]   HOW TO CONSTRUCT PSEUDORANDOM PERMUTATIONS FROM PSEUDORANDOM FUNCTIONS [J].
LUBY, M ;
RACKOFF, C .
SIAM JOURNAL ON COMPUTING, 1988, 17 (02) :373-386
[8]  
LUBY M, 1986, STOC 1986, P356
[9]  
Maurer U, 2002, LECT NOTES COMPUT SC, V2332, P110
[10]  
Maurer U, 2007, LECT NOTES COMPUT SC, V4622, P130