Proving hard-core predicates using list decoding

被引:66
作者
Akavia, A [1 ]
Goldwasser, S [1 ]
Safra, S [1 ]
机构
[1] Weizmann Inst Sci, Rehovot, Israel
来源
44TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS | 2003年
关键词
D O I
10.1109/SFCS.2003.1238189
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We introduce a unifying framework for proving that predicate P is hard-core for a one-way function f, and apply it to a broad family of functions and predicates, reproving old results in an entirely different way as well as showing new hard-core predicates for well known one-way function candidates. Our framework extends the list-decoding method of Goldreich and Levin for showing hard-core predicates. Namely, a predicate will correspond to some error correcting code, predicting a predicate will correspond to access to a corrupted codeword, and the task of inverting one-way functions will correspond to the task of list decoding a corrupted codeword. A characteristic of the error correcting codes which emerge and are addressed by our framework, is that codewords can be approximated by a small number of heavy coefficients in their Fourier representation. Moreover, as long as corrupted words are close enough to legal codewords, they will share a heavy Fourier coefficient. We list decode such codes, by devising a learning algorithm applied to corrupted codewords for learning heavy Fourier coefficients. For codes defined over {0, 1}(n) domain, a learning algorithm by Kushilevitz and Mansour already exists. For codes defined over Z(N), which are the codes which emerge for predicates based on number theoretic one-way functions such as the RSA and Exponentiation modulo primes, we develop a new learning algorithm. This latter algorithm may be of independent interest outside the realm of hard-core predicates.
引用
收藏
页码:146 / 157
页数:12
相关论文
共 22 条
  • [1] RSA AND RABIN FUNCTIONS - CERTAIN PARTS ARE AS HARD AS THE WHOLE
    ALEXI, W
    CHOR, B
    GOLDREICH, O
    SCHNORR, CP
    [J]. SIAM JOURNAL ON COMPUTING, 1988, 17 (02) : 194 - 209
  • [2] [Anonymous], 1982, 23 ANN S FDN COMPUTE, DOI DOI 10.1109/SFCS.1982.45
  • [3] BENOR M, 1983, P 15 ACM S THEOR COM, P421
  • [4] A SIMPLE UNPREDICTABLE PSEUDORANDOM NUMBER GENERATOR
    BLUM, L
    BLUM, M
    SHUB, M
    [J]. SIAM JOURNAL ON COMPUTING, 1986, 15 (02) : 364 - 383
  • [5] HOW TO GENERATE CRYPTOGRAPHICALLY STRONG SEQUENCES OF PSEUDO-RANDOM BITS
    BLUM, M
    MICALI, S
    [J]. SIAM JOURNAL ON COMPUTING, 1984, 13 (04) : 850 - 864
  • [6] Stronger security proofs for RSA and Rabin bits
    Fischlin, R
    Schnorr, CP
    [J]. JOURNAL OF CRYPTOLOGY, 2000, 13 (02) : 221 - 244
  • [7] GOLDMANN M, 2000, P STACS, P614
  • [8] Goldreich O., 2001, FDN CRYPTOGRAPHY BAS
  • [9] GOLDREICH O, 1989, STOC
  • [10] PROBABILISTIC ENCRYPTION
    GOLDWASSER, S
    MICALI, S
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1984, 28 (02) : 270 - 299