A Hardcore Lemma for Computational Indistinguishability: Security Amplification for Arbitrarily Weak PRGs with Optimal Stretch

被引:0
|
作者
Maurer, Ueli [1 ]
Tessaro, Stefano [1 ]
机构
[1] ETH, Dept Comp Sci, CH-8092 Zurich, Switzerland
来源
THEORY OF CRYPTOGRAPHY, PROCEEDINGS | 2010年 / 5978卷
关键词
GENERATORS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
It is well known that two random variables X and Y with the same range can be viewed as being equal (in a well-defined sense) with probability 1 - d(X, Y), where d(X, Y) is their statistical distance, which in turn is equal to the best distinguishing advantage for X and Y. In other words, if the best distinguishing advantage for X and Y is epsilon, then with probability 1 - epsilon they are completely indistinguishable. This statement, which can be seen as an information-theoretic version of a hardcore lemma, is for example very useful for proving indistinguishability amplification results. In this paper we prove the computational version of such a hardcore lemma, thereby extending the concept of hardcore sets from the context of computational hardness to the context of computational indistinguishability. This paradigm promises to have many applications in cryptography and complexity theory. It is proven both in a non-uniform and a uniform setting. For example, for a weak pseudorandom generator (PRG) for which the (computational) distinguishing advantage is known to be bounded by e (e.g. epsilon = 1/2), one can define an event on the seed of the PRG which has probability at least 1 - epsilon and such that, conditioned on the event, the output of the PRG is essentially indistinguishable from a string with almost maximal min-entropy, namely log(1/(1 - epsilon)) less than its length. As an application, we show an optimally efficient construction for converting a weak PRO for any epsilon < 1. into a strong PRO by proving that the intuitive construction of applying an extractor to an appropriate number of independent weak PRG outputs yields a strong PRO. This improves strongly over the best previous construction for security amplification of PRGs which does not work for epsilon >= 1/2 and requires the seed of the constructed strong PRO to be very long.
引用
收藏
页码:237 / 254
页数:18
相关论文
共 2 条
  • [1] Security Amplification for the Cascade of Arbitrarily Weak PRPs: Tight Bounds via the Interactive Hardcore Lemma
    Tessaro, Stefano
    THEORY OF CRYPTOGRAPHY, 2011, 6597 : 37 - 54
  • [2] Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification
    Ananth, Prabhanjan
    Jain, Aayush
    Lin, Huijia
    Matt, Christian
    Sahai, Amit
    ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III, 2019, 11694 : 284 - 332