Abstract
Every pseudorandom generator is in particular a one-way function. If we only consider part of the output of the pseudorandom generator is this still one-way? Here is a general setting formalizing this question. Suppose G:{0,1}n → {0,1}ℓ(n) is a pseudorandom generator with stretch ℓ(n). Let M R ∈ {0,1}m(n)×ℓ(n) be a linear operator computable in polynomial time given randomness R. Consider the function
We obtain the following results.
-
There exists a pseudorandom generator s.t. for every positive constant μ < 1 and for an arbitrary polynomial time computable M R ∈ {0,1}(1 − μ)n×ℓ(n), F is not one-way.
Furthermore, our construction yields a tradeoff between the hardness of the pseudorandom generator and the output length m(n). For example, given α = α(n) and a 2cn-hard pseudorandom generator we construct a 2αcn-hard pseudorandom generator such that F is not one-way, where m(n) ≤ βn and α + β = 1 − o(1).
-
We show this tradeoff to be tight for 1-1 pseudorandom generators. That is, for any G which is a 2αn-hard 1-1 pseudorandom generator, if α + β = 1 + ε then there is M R ∈ {0,1}βn×ℓ(n) such that F is a Ω(2εn)-hard one-way function.
This work was supported in part by the National Basic Research Program of China Grant 2011CBA00300, 2011CBA00301, the National Natural Science Foundation of China Grant 61033001, 61061130540, 61073174, 61150110582.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Alon, N., Babai, L., Itai, A.: A fast and simple randomized parallel algorithm for the maximal independent set problem. Journal of Algorithms 7, 567–583 (1986)
Applebaum, B., Ishai, Y., Kushilevitz, E.: Computationally private randomizing polynomials and their applications. Computational Complexity 15(2), 115–162 (2006); also CCC 2005
Applebaum, B., Ishai, Y., Kushilevitz, E.: Cryptography in NC0. SIAM Journal on Computing (SICOMP) 36(4), 845–888 (2006); also FOCS 2004 (2004)
Bronson, J., Juma, A., Papakonstantinou, P.A.: Limits on the Stretch of Non-adaptive Constructions of Pseudo-Random Generators. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 504–521. Springer, Heidelberg (2011)
Blömer, J., Karp, R., Welzl, E.: The rank of sparse random matrices over finite fields. Random Structures Algorithms 10(4), 407–419 (1997)
Borodin, A., von zur Gathen, J., Hopcroft, J.: Fast parallel matrix and GCD computations. Information and Control 52(3), 241–256 (1982)
Goldreich, O., Levin, L.A.: A hard-core predicate for all one-way functions. In: Symposium on Theory of Computing (STOC), pp. 25–32 (1989)
Goldreich, O.: Foundations of cryptography. Cambridge University Press, Cambridge (2001); Basic tools (vol. I)
Haitner, I., Harnik, D., Reingold, O.: Efficient Pseudorandom Generators from Exponentially Hard One-Way Functions. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 228–239. Springer, Heidelberg (2006)
Haitner, I., Harnik, D., Reingold, O.: On the Power of the Randomized Iterate. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 22–40. Springer, Heidelberg (2006)
Hastad, J., Impagliazzo, R., Levin, L.A., Luby, M.: A pseudorandom generator from any one-way function. SIAM Journal on Computing (SICOMP) 28(4), 1364–1396 (1999); also STOC 1989
Haitner, I., Reingold, O., Vadhan, S.: Efficiency improvements in constructing pseudorandom generators from one-way functions. In: Symposium on Theory of Computing (STOC), pp. 437–446 (2010)
Kharitonov, M., Goldberg, A.V., Yung, M.: Lower bounds for pseudorandom number generators. In: Foundations of Computer Science (FOCS), pp. 242–247 (1989)
Luby, M., Rackoff, C.: A study of password security. Journal on Cryptology 1(3), 151–158 (1989); Luby, M., Rackoff, C.: A Study of Password Security. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 392–397. Springer, Heidelberg (1988)
MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-Correcting Codes. North-Holland (1977)
Mukhopadhyay, A.: On the probability that the determinant of an n×n matrix over a finite field vanishes. Discrete Math. 51(3), 311–315 (1984)
Mulmuley, K.: A fast parallel algorithm to compute the rank of a matrix over an arbitrary field. Combinatorica 7(1), 101–104 (1987)
Sipser, M.: A complexity theoretic approach to randomness. In: Symposium on Theory of Computing (STOC), pp. 330–335 (1983)
Vadhan, S.: Pseudorandomness (April 2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Papakonstantinou, P.A., Yang, G. (2012). A Remark on One-Wayness versus Pseudorandomness. In: Gudmundsson, J., Mestre, J., Viglas, T. (eds) Computing and Combinatorics. COCOON 2012. Lecture Notes in Computer Science, vol 7434. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32241-9_41
Download citation
DOI: https://doi.org/10.1007/978-3-642-32241-9_41
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32240-2
Online ISBN: 978-3-642-32241-9
eBook Packages: Computer ScienceComputer Science (R0)