Candidate weak pseudorandom functions in AC0 ○ MOD2

Adi Akavia, Andrej Bogdanov, Siyao Guo, Akshay Kamath, Alon Rosen
{"title":"Candidate weak pseudorandom functions in AC0 ○ MOD2","authors":"Adi Akavia, Andrej Bogdanov, Siyao Guo, Akshay Kamath, Alon Rosen","doi":"10.1145/2554797.2554821","DOIUrl":null,"url":null,"abstract":"Pseudorandom functions (PRFs) play a fundamental role in symmetric-key cryptography. However, they are inherently complex and cannot be implemented in the class AC0 (MOD2). Weak pseudorandom functions (weak PRFs) do not suffer from this complexity limitation, yet they suffice for many cryptographic applications. We study the minimal complexity requirements for constructing weak PRFs. To this end We conjecture that the function family FA(x) = g(Ax), where A is a random square GF(2) matrix and g is a carefully chosen function of constant depth, is a weak PRF. In support of our conjecture, we show that functions in this family are inapproximable by GF(2) polynomials of low degree and do not correlate with any fixed Boolean function family of subexponential size. We study the class AC0 ○ MOD2 that captures the complexity of our construction. We conjecture that all functions in this class have a Fourier coefficient of magnitude exp(- poly log n) and prove this conjecture in the case when the MOD2 function is typical. We investigate the relation between the hardness of learning noisy parities and the existence of weak PRFs in AC0 ○ MOD2. We argue that such a complexity-driven approach can play a role in bridging the gap between the theory and practice of cryptography.","PeriodicalId":382856,"journal":{"name":"Proceedings of the 5th conference on Innovations in theoretical computer science","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"48","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 5th conference on Innovations in theoretical computer science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2554797.2554821","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 48

Abstract

Pseudorandom functions (PRFs) play a fundamental role in symmetric-key cryptography. However, they are inherently complex and cannot be implemented in the class AC0 (MOD2). Weak pseudorandom functions (weak PRFs) do not suffer from this complexity limitation, yet they suffice for many cryptographic applications. We study the minimal complexity requirements for constructing weak PRFs. To this end We conjecture that the function family FA(x) = g(Ax), where A is a random square GF(2) matrix and g is a carefully chosen function of constant depth, is a weak PRF. In support of our conjecture, we show that functions in this family are inapproximable by GF(2) polynomials of low degree and do not correlate with any fixed Boolean function family of subexponential size. We study the class AC0 ○ MOD2 that captures the complexity of our construction. We conjecture that all functions in this class have a Fourier coefficient of magnitude exp(- poly log n) and prove this conjecture in the case when the MOD2 function is typical. We investigate the relation between the hardness of learning noisy parities and the existence of weak PRFs in AC0 ○ MOD2. We argue that such a complexity-driven approach can play a role in bridging the gap between the theory and practice of cryptography.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
AC0〇MOD2中的候选弱伪随机函数
伪随机函数在对称密钥密码学中起着重要的作用。然而,它们本质上是复杂的,不能在类AC0 (MOD2)中实现。弱伪随机函数(弱prf)不受这种复杂性限制,但它们足以满足许多加密应用程序。研究了构造弱PRFs的最小复杂度要求。为此,我们推测函数族FA(x) = g(Ax)是一个弱PRF,其中A是一个随机平方GF(2)矩阵,g是一个精心选择的等深度函数。为了支持我们的猜想,我们证明了这个族中的函数是不能被低次的GF(2)多项式近似的,并且不与任何固定的亚指数大小的布尔函数族相关。我们研究类AC0〇MOD2捕获我们的结构的复杂性。我们推测这类函数的傅里叶系数为exp(- poly log n),并在MOD2函数为典型的情况下证明了这一推测。研究了AC0〇MOD2中学习噪声对的难易程度与弱PRFs的存在性之间的关系。我们认为,这种复杂性驱动的方法可以在弥合密码学理论和实践之间的差距方面发挥作用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
On the automorphism groups of strongly regular graphs I Coordination mechanisms from (almost) all scheduling policies Session details: Session 10: 10:30--10:40 Cryptogenography Rational arguments: single round delegation with sublinear verification
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1