GOING DOWN HILL: MORE EFFICIENT PSEUDORANDOM GENERATORS FROM ANY ONE-WAY FUNCTION Joint with Iftach Haitner and Salil Vadhan Omer Reingold&

Slides:



Advertisements
Similar presentations
Impagliazzos Worlds in Arithmetic Complexity: A Progress Report Scott Aaronson and Andrew Drucker MIT 100% QUANTUM-FREE TALK (FROM COWS NOT TREATED WITH.
Advertisements

The Equivalence of Sampling and Searching Scott Aaronson MIT.
Linear-Degree Extractors and the Inapproximability of Max Clique and Chromatic Number David Zuckerman University of Texas at Austin.
Randomness Extractors & their Cryptographic Applications Salil Vadhan Harvard University
Extracting Randomness From Few Independent Sources Boaz Barak, IAS Russell Impagliazzo, UCSD Avi Wigderson, IAS.
Derandomization & Cryptography Boaz Barak, Weizmann Shien Jin Ong, MIT Salil Vadhan, Harvard.
Approximate List- Decoding and Hardness Amplification Valentine Kabanets (SFU) joint work with Russell Impagliazzo and Ragesh Jaiswal (UCSD)
Many-to-one Trapdoor Functions and their Relations to Public-key Cryptosystems M. Bellare S. Halevi A. Saha S. Vadhan.
Inaccessible Entropy Iftach Haitner Microsoft Research Omer Reingold Weizmann & Microsoft Hoeteck Wee Queens College, CUNY Salil Vadhan Harvard University.
1 Efficient Pseudorandom Generators from Exponentially Hard One-Way Functions Iftach Haitner, Danny Harnik, Omer Reingold.
Inaccessible Entropy Iftach Haitner Microsoft Research Omer Reingold Weizmann Institute Hoeteck Wee Queens College, CUNY Salil Vadhan Harvard University.
1 Reducing Complexity Assumptions for Statistically-Hiding Commitment Iftach Haitner Omer Horviz Jonathan Katz Chiu-Yuen Koo Ruggero Morselli Ronen Shaltiel.
Foundations of Cryptography Lecture 10 Lecturer: Moni Naor.
Foundations of Cryptography Lecture 11 Lecturer: Moni Naor.
1 Adam O’Neill Leonid Reyzin Boston University A Unified Approach to Deterministic Encryption and a Connection to Computational Entropy Benjamin Fuller.
CS151 Complexity Theory Lecture 8 April 22, 2004.
F(x 1 )h h( x 1 ) 1 … n+|h|+ 1 bits of next-block pseudoentropy f(x 2 )h h( x 2 )f(x t )h h( x t ) g(x t,h t )= g(x 2,h 2 )= g(x 1,h 1 )= G(x 1,h 1 …,x.
CIS 5371 Cryptography 3b. Pseudorandomness.
Inaccessible Entropy Iftach Haitner Microsoft Research Omer Reingold Weizmann & Microsoft Hoeteck Wee Queens College, CUNY Salil Vadhan Harvard University.
The Many Entropies of One-Way Functions Thomas Holenstein Iftach Haitner Salil VadhanHoeteck Wee Joint With Omer Reingold.
Foundations of Cryptography Lecture 12 Lecturer: Moni Naor.
Foundations of Cryptography Lecture 8: Application of GL, Next-bit unpredictability, Pseudo-Random Functions. Lecturer: Moni Naor Announce home )deadline.
The Bright Side of Hardness Relating Computational Complexity and Cryptography Oded Goldreich Weizmann Institute of Science.
ACT1 Slides by Vera Asodi & Tomer Naveh. Updated by : Avi Ben-Aroya & Alon Brook Adapted from Oded Goldreich’s course lecture notes by Sergey Benditkis,
CS151 Complexity Theory Lecture 8 April 22, 2015.
1 Constructing Pseudo-Random Permutations with a Prescribed Structure Moni Naor Weizmann Institute Omer Reingold AT&T Research.
The Many Entropies of One-Way Functions Thomas Holenstein Iftach Haitner Salil VadhanHoeteck Wee Joint With Omer Reingold.
On Everlasting Security in the Hybrid Bounded Storage Model Danny Harnik Moni Naor.
Lecturer: Moni Naor Foundations of Cryptography Lecture 9: Pseudo-Random Functions and Permutations.
Foundations of Cryptography Lecture 10: Pseudo-Random Permutations and the Security of Encryption Schemes Lecturer: Moni Naor Announce home )deadline.
1 A New Interactive Hashing Theorem Iftach Haitner and Omer Reingold WEIZMANN INSTITUTE OF SCIENCE.
1 On the Power of the Randomized Iterate Iftach Haitner, Danny Harnik, Omer Reingold.
Foundations of Cryptography Lecture 9 Lecturer: Moni Naor.
Foundations of Cryptography Lecture 8 Lecturer: Moni Naor.
Foundations of Cryptography Lecture 2 Lecturer: Moni Naor.
Computational Entropy Joint works with Iftach Haitner (Tel Aviv), Thomas Holenstein (ETH Zurich), Omer Reingold (MSR-SVC), Hoeteck Wee (George Washington.
Foundations of Cryptography Rahul Jain CS6209, Jan – April 2011
GOING DOWN HILL : EFFICIENCY IMPROVEMENTS IN CONSTRUCTING PSEUDORANDOM GENERATORS FROM ONE-WAY FUNCTIONS Iftach Haitner Omer Reingold Salil Vadhan.
Simulating independence: new constructions of Condensers, Ramsey Graphs, Dispersers and Extractors Boaz Barak Guy Kindler Ronen Shaltiel Benny Sudakov.
Completeness in Two-Party Secure Computation Revisited Danny Harnik Moni Naor Omer Reingold Alon Rosen Weizmann Institute of Science AT&T IAS.
CS555Spring 2012/Topic 51 Cryptography CS 555 Topic 5: Pseudorandomness and Stream Ciphers.
Computational Entropy Joint works with Iftach Haitner (Tel Aviv), Thomas Holenstein (ETH Zurich), Omer Reingold (MSR-SVC), Hoeteck Wee (George Washington.
On Constructing Parallel Pseudorandom Generators from One-Way Functions Emanuele Viola Harvard University June 2005.
Modeling and Simulation Random Number Generators
On Constructing Parallel Pseudorandom Generators from One-Way Functions Emanuele Viola Harvard University June 2005.
Polynomials Emanuele Viola Columbia University work partially done at IAS and Harvard University December 2007.
Cryptography and Privacy Preserving Operations Lecture 2: Pseudo-randomness Lecturer: Moni Naor Weizmann Institute of Science.
Umans Complexity Theory Lectures Lecture 17: Natural Proofs.
Dan Boneh Stream ciphers PRG Security Defs Online Cryptography Course Dan Boneh.
R ANDOM N UMBER G ENERATORS Modeling and Simulation CS
Derandomized Constructions of k -Wise (Almost) Independent Permutations Eyal Kaplan Moni Naor Omer Reingold Weizmann Institute of ScienceTel-Aviv University.
Pseudo-random generators Talk for Amnon ’ s seminar.
The Power of Negations in Cryptography
Pseudorandomness: New Results and Applications Emanuele Viola IAS April 2007.
Umans Complexity Theory Lectures Lecture 9b: Pseudo-Random Generators (PRGs) for BPP: - Hardness vs. randomness - Nisan-Wigderson (NW) Pseudo- Random Generator.
Randomness.
Computational Fuzzy Extractors
FOC-2 Cryptography with Low Complexity: 3
Random Number Generators
General Strong Polarization
Background: Lattices and the Learning-with-Errors problem
Cryptography Lecture 19.
B504/I538: Introduction to Cryptography
The Curve Merger (Dvir & Widgerson, 2008)
Conditional Computational Entropy
On the Efficiency of 2 Generic Cryptographic Constructions
Cryptography Lecture 8.
Emanuele Viola Harvard University June 2005
Pseudorandomness: New Results and Applications
Presentation transcript:

GOING DOWN HILL: MORE EFFICIENT PSEUDORANDOM GENERATORS FROM ANY ONE-WAY FUNCTION Joint with Iftach Haitner and Salil Vadhan Omer Reingold&

One Way Functions One Way Functions (OWF): f:{0,1} n  {0,1} n  Easy to compute hard to invert (even on average).  The most basic, unstructured form of cryptographic hardness [IL89 …]

Pseudorandom Generators Eff. computable function G:{0,1} s  {0,1} m  Stretching ( m > s )  Output is computationally indistinguishable from uniform. Central in cryptography, implies pseudorandom functions [GGM86], pseudorandom permutations [LR88], bit-commitments [Naor91], … x G(x)

Håstad, Imagliazzo, Levin and Luby 89 Theorem Existence of OWFs Existence of PRGs  Hardness vs. Randomness in purest cryptographic form  Centerpiece in basing Cryptography on OWFs  Introduced key concepts and techniques (Pseudoentropy, Leftover Hash Lemma, …). inefficient and quite complex

Efficiency For this talk efficiency (and security) of construction is measured by PRG’s seed length s (as function of n )  [HILL89] O(n 10 ), [HILL89,Holens06] O(n 8 ), [HHR06a] O(n 7 ), Here O(n 4 )  From exponentially hard OWFs: [Holens06] O(n 5 ), [HHR06b] O(n 2 ), Here reprove O(n 2 )

Simplicity With years, [HILL] became simpler  But mainly because we got used to it (tools and techniques became “standard”).  [HILL99,Holens06] additional abstractions and more modularity (+ Holenstein's Uniform Hard-Core Lemma)  Here simpler.  Construction non-adaptive thus derive “OWFs in NC 1  PRGs in NC 0 ” (via [AIK06])

False Entropy Generator  Loosely, the most basic object in HILL is: G fe (x,g,i)=f(x),g,g(x) 1..i (think of g as matrix multiplication). Lemma Let k=log|f -1 (f(x))|, then when i=k+log n then g,g(x) 1..i is pseudorandom (even conditioned on f(x)).  Intuition: first k-clog n bits are statistically close to uniform (Leftover Hash Lemma) and next (c+1)log n bits are pseudorandom (GL Hard-Core Function).

False Entropy Generator (II) G fe (x,g,i)=f(x),g,g(x) 1..i Lemma: For the variable G fe (x,g,i) (with random inputs)  = pseudoentropy – real entropy > (log n)/n Reason: w.p 1/n over choice of i (when i=k+log n) the output G fe (x,g,i) is indistinguishable from distribution with entropy |x|+|g|+log n (whereas real entropy  |x|+|g|)  Disadvantages:  rather small, value of real entropy unknown, pseudoentropy < entropy of input

Our Building Block  Simply do not truncate: G nb (x,g)=f(x),g,g(x)  Nonsense: G nb (x,g) is invertible and therefore has no pseudoentropy!  Well yes but: G nb (x,g) does have psudoentropy from the point of view of an online distinguisher (getting one bit at a time).

Next-Bit Pseudoentropy  X has pseudoentropy  k if  Y with H(Y)  k such that X and Y are indistinguishable  X=X 1 …X n has next-bit pseudoentropy  k if  Y with   i H(Y i |X 1 …X i )  k such that  X_i and Y_i are indistinguishable conditioned on X 1 …X i-1  Remarks:  X and Y are jointly distributed  The two notions are identical for k=n [BM, Yao]  Generalizes to blocks (rather than bits)

Our Next-Block Pseudoentropy Generator  G nb (x,g)=f(x),g,g(x)  Next-block pseudoentropy > |x|+|g|+logn  X=G(x,g) and Y obtained from X by replacing first k+logn bits of g(x) with uniform  Advantages:   = next-block pseudoentropy –real entropy> logn  Entropy bounds known (on total entropy)  “No bit left behind”  Relates to work on inaccessible entropy [HRVW09]

HILL Revisited - Overview G nb x,g … … … n 2 repetitions: amplifies entropy gap and turns next-block pseudo Shannon entropy to next-block pseudo min entropy Extract next-block pseudoentropy

Uniform Construction and Uniform Security  Seed length so far O(n 3 ), but construction non uniform (need to know how much to extract from each block).  Using an idea from [HRVW09] get uniform construction with seed length O(n 4 ).  To carry out the hybrid (for the n 2 repetitions), need X and Y to be next-block indistinguishable even given an oracle that samples X and Y.  Just as in HILL, most elegant solution is via Holenstein's Uniform Hardcore Lemma [Holens06].

Final Comment  Assume f is OW-Permutation. Given f(x) hard to find x.  Intuitively, given f(x) we have that x has some computational entropy in it, (thus we can extract this entropy).  Nevertheless, given f(x), we have that x does not have any pseudoentropy in it.  However, G’ nb (x)=f(x),x is a next-block pseudoentropy generator  Does it also hold for OWFs?

Widescreen Test Pattern (16:9) Aspect Ratio Test (Should appear circular) 16x9 4x3