首页> 外文期刊>Electronic Colloquium on Computational Complexity >Expander-Based Cryptography Meets Natural Proofs
【24h】

Expander-Based Cryptography Meets Natural Proofs

机译:基于扩展器的密码学符合自然证明

获取原文
           

摘要

We introduce new forms of attack on expander-based cryptography, and in particular on Goldreich's pseudorandom generator and one-way function. Our attacks exploit low circuit complexity of the underlying expander's neighbor function and/or of the local predicate. Our two key conceptual contributions are:1. We put forward the possibility that the choice of expander matters in expander-based cryptography. In particular, using expanders whose neighbour function has low circuit complexity might compromise the security of Goldreich's PRG and OWF in certain settings.2. We show that the security of Goldreich's PRG and OWF is closely related to two other long-standing problems: Specifically, to the existence of unbalanced lossless expanders with low-complexity neighbor function, and to limitations on circuit lower bounds (i.e., natural proofs). In particular, our results further motivate the investigation of affine/local unbalanced lossless expanders and of average-case lower bounds against DNF-XOR circuits.We prove two types of technical results that support the above conceptual messages. First, we unconditionally break Goldreich's PRG when instantiated with a specific expander (whose existence we prove), for a class of predicates that match the parameters of the currently-best ``hard'' candidates, in the regime of quasi-polynomial stretch. Secondly, conditioned on the existence of expanders whose neighbor functions have extremely low circuit complexity, we present attacks on Goldreich's generator in the regime of polynomial stretch. As one corollary, conditioned on the existence of the foregoing expanders, we show that either the parameters of natural properties for several constant-depth circuit classes cannot be improved, even mildly; or Goldreich's generator is insecure in the regime of a large polynomial stretch, regardless of the predicate used.
机译:我们针对基于扩展器的加密技术,特别是针对Goldreich的伪随机生成器和单向函数,介绍了新的攻击形式。我们的攻击利用了底层扩展器的邻居功能和/或本地谓词的低电路复杂性。我们的两个主要概念贡献是:1.。我们提出了在基于扩展器的密码学中扩展器的选择很重要的可能性。特别是,使用邻居功能电路复杂度较低的扩展器可能会在某些情况下损害Goldreich的PRG和OWF的安全性。2。我们表明,Goldreich的PRG和OWF的安全性与其他两个长期存在的问题密切相关:具体地说,与具有低复杂度邻居函数的不平衡无损扩展器的存在以及电路下限的限制(即自然证明)有关。特别是,我们的结果进一步激发了仿射/局部不平衡无损扩展器以及针对DNF-XOR电路的平均情况下界的研究。我们证明了两种支持上述概念性信息的技术结果。首先,在准多项式拉伸方式中,对于一类与当前最佳``硬''候选参数匹配的谓词,我们使用特定的扩展器(我们证明其存在)实例化时无条件破坏Goldreich的PRG。其次,以存在邻居函数的电路复杂度极低的扩展器为条件,我们以多项式拉伸形式对Goldreich的生成器进行攻击。作为一个推论,以上述扩展器的存在为条件,我们表明,对于几个恒定深度的电路类,其自然属性的参数都无法改善,即使是温和的;也不能改善。无论使用哪种谓词,Goldreich的生成器在大多项式拉伸范围内都是不安全的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号