Algebraic Attacks against Random Local Functions and Their Countermeasures

被引:31
作者
Applebaum, Benny [1 ]
Lovett, Shachar [2 ]
机构
[1] Tel Aviv Univ, Tel Aviv, Israel
[2] Univ Calif San Diego, San Diego, CA 92103 USA
来源
STOC'16: PROCEEDINGS OF THE 48TH ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING | 2016年
基金
欧盟地平线“2020”;
关键词
Cryptography; NCO; Pseusorandomness; Algebraic attacks; Low-bias generators; PSEUDORANDOM GENERATORS; POLYNOMIAL CALCULUS; LOWER BOUNDS; STRETCH;
D O I
10.1145/2897518.2897554
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Suppose that you haven truly random bits x = (x(1), ... , x(n)) and you wish to use them to generate m >> n pseudorandom bits y =(y(1), ... , y(m)) using a local mapping, i.e., each y(i) should depend on at most d = O(1) bits of x. In the polynomial regime of m = n(s), s > 1, the only known solution, originates from (Goldreich, ECCC 2000), is based on Random Local Functions: Compute y(i) by applying some fixed (public) d-ary predicate P to a random (public) tuple of distinct inputs (x(i1), ... , x(id)). Our goal in this paper is to understand, for any value of s, how the pseudorandomness of the resulting sequence depends on the choice of the underlying predicate. We derive the following results: (1) We show that pseudorandomness against F-2-linear adversaries (i.e., the distribution y has low-bias) is achieved if the predicate is (a) k = Omega(s)-resilience, i.e., uncorrelated with any k-subset of its inputs, and (b) has algebraic degree of Omega(s) even after fixing Omega(s) of its inputs. We also show that these requirements are necessary, and so they form a tight characterization (up to constants) of security against linear attacks. Our positive result shows that a d-local low-bias generator can have output length of n(Omega(d)), answering an open question of Mossel, Shpilka and Trevisan (FOCS, 2003). Our negative result shows that a candidate for pseudorandom generator proposed by the first author (computational complexity, 2015) and by O'Donnell and Witmer (CCC 2014) is insecure. We use similar techniques to refute a conjecture of Feldman, Perkins and Vempala (STOC 2015) regarding the hardness of planted constraint satisfaction problems. (2) Motivated by the cryptanalysis literature, we consider security against algebraic attacks. We provide the first theoretical treatment of such attacks by formalizing a general notion of algebraic inversion and distinguishing attacks based on the Polynomial Calculus proof system. We show that algebraic attacks succeed if and only if there exist a degree e = O(s) non-zero polynomial Q whose roots cover the roots of P or cover the roots of P's complement. As a corollary, we obtain the first example of a predicate P for which the generated sequence y passes all linear tests but fails to pass some polynomial-time computable test, answering an open question posed by the first author (Question 4.9, computational complexity 2015).
引用
收藏
页码:1087 / 1100
页数:14
相关论文
共 42 条
[1]   More on average case vs approximation complexity [J].
Alekhnovich, M .
44TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2003, :298-307
[2]   Lower bounds for Polynomial Calculus: Non-binomial case [J].
Alekhnovich, M ;
Razborov, AA .
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, :190-199
[3]  
[Anonymous], ECCC
[4]  
[Anonymous], 2002, P 34 ACM S THEOR COM
[5]   On pseudorandom generators with linear stretch in NC0 [J].
Applebaum, Benny ;
Ishai, Yuval ;
Kushilevitz, Eyal .
COMPUTATIONAL COMPLEXITY, 2008, 17 (01) :38-69
[6]   Cryptography in NC0 [J].
Applebaum, Benny ;
Ishai, Yuval ;
Kushilevitz, Eyal .
SIAM JOURNAL ON COMPUTING, 2006, 36 (04) :845-888
[7]   Cryptographic Hardness of Random Local Functions [J].
Applebaum, Benny .
COMPUTATIONAL COMPLEXITY, 2016, 25 (03) :667-722
[8]   PSEUDORANDOM GENERATORS WITH LONG STRETCH AND LOW LOCALITY FROM RANDOM LOCAL ONE-WAY FUNCTIONS [J].
Applebaum, Benny .
SIAM JOURNAL ON COMPUTING, 2013, 42 (05) :2008-2037
[9]  
Applebaum B, 2012, LECT NOTES COMPUT SC, V7194, P600, DOI 10.1007/978-3-642-28914-9_34
[10]  
Applebaum B, 2010, ACM S THEORY COMPUT, P171