skip to main content
10.1145/73007.73009acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free Access

Pseudo-random generation from one-way functions

Authors Info & Claims
Published:01 February 1989Publication History

ABSTRACT

We show that the existence of one-way functions is necessary and sufficient for the existence of pseudo-random generators in the following sense. Let ƒ be an easily computable function such that when x is chosen randomly: (1) from ƒ(x) it is hard to recover an x1 with ƒ(x1) = ƒ(x) by a small circuit, or; (2) ƒ has small degeneracy and from ƒ(x) it is hard to recover x by a fast algorithm. From one-way functions of type (1) or (2) we show how to construct pseudo-random generators secure against small circuits or fast algorithms, respectively, and vice-versa. Previous results show how to construct pseudo-random generators from one-way functions that have special properties ([Blum, Micali 82], [Yao 82], [Levin 85], [Goldreich, Krawczyk, Luby 88]).

We use the results of [Goldreich, Levin 89] in an essential way.

References

  1. 1.Blum, M., "Independent Unbiased Coin Flips From a Correlated Biased Source: A Finite State Markov Chain", 25tn FOCS, 1984, pp. 425-433.Google ScholarGoogle Scholar
  2. 2.Blum, M., and Mica li, S., "How to Generate Cryptographically Strong Sequences of Pseudo- Random Bits", SIAM J. or~ Computing, Vol. 13, 1084, pp. 850-864, FOCS 1082. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3.Carter, J., and M. Wegman, "Universal Classes of Hash Functions"~ JCSS, 1979, Vol. 18, pp. 143-154.Google ScholarGoogle ScholarCross RefCross Ref
  4. 4.Chor, B., and O. Goldreich, "Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity", SIAM J. on Computin#, Vol. 17, t988, FOCS 1985. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.Goldreich, O., S. Goldwasser, and S. Micali, "How to Construct Random Functions", J. of ACM, Vol. 33, No. 4, 1986, pp. 792-807, FOCS 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.Goldreich, O., Krawczyk, H. and Luby, M., "On tile Existence of Pseudorandom Generators'', 29th FOES, 1988, pp. 12-24.Google ScholarGoogle Scholar
  7. 7.Goldreich, O., and L.A. Lev}n, "A Hard-Core Predicate for any One-Way Function", these proceedings. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.Goldreich, O., Micali, M. and Wigderson, A., "Proofs that. Yield Nothing but Their Validity and a Methodology of Cryptographic Protocol Design", 27th FOCS, 1986, pp. 174-187, Tech. Report TRd93, Comp. Sci. Dept., Technion, submitted to JA CM.Google ScholarGoogle Scholar
  9. 9.Goldwasser, S. and Micali, S., "Probabilistic Encryption," JCSS, Vol. 28, No. 2, April 1984, pp. 270-299, STOC 1982.Google ScholarGoogle ScholarCross RefCross Ref
  10. 10.Goldwasser, S., Micali, S. and Rackoff, C., "The Knowledge Complexity of Interactive Proof Systems,'' SIAM J. on Computing, Vol. 18, No. 1, 1989, pp. 186-208, STOC i985. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11.Impagliazzo, R. and Luby, M., "One-way functions are essential for information based cryptography,'' submitted to CRYPTO 1989.Google ScholarGoogle Scholar
  12. 12.Impagliazzo, R. and Rud{ch, S., "Limits on the Provable Consequences of One-way Functions", these proceedings Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13.Karp, R., Lipton, R., "Turing Machines that Take Advice," L ~Enseignement Mathematique, Vol. 28, pp. 191-209 (1982), STOC 1980Google ScholarGoogle Scholar
  14. 14.Levin, L.A., "One-Way Function and Pseudorandom Generators": Combinatorica, Vol. 7, No. 4, 1987, pp. 357-363, STOC 1985. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. 15.Luby M., and Rackoff, C., "How to Construct Pseudorandom Permutations From Pseudorandora Functions", SiAM J. on Computing, Vol. 17, 1988, pp. 37;}-386, STOC 1986 Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. 16.Mclnnes, J., "Cryptography Using Weak Sources of Randomness,'; Tech. Report 19~/87, U. of Toronto, 1987.Google ScholarGoogle Scholar
  17. 17.Naor, M., personal communication, 1988.Google ScholarGoogle Scholar
  18. 18.Naor, M. and Yung, M., "Universal One-way Hash Functions and Their Applications", these proceedings. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. 19.Renyi, A., Probability Theory, North- Itolland, Amsterdam, 1970.Google ScholarGoogle Scholar
  20. 20.Shannon, C., "A Mathematical Theory of Communication'', Bell Systems Technical Journal, 27, 1948, pp. 379-423 and pp. 623-656.Google ScholarGoogle ScholarCross RefCross Ref
  21. 21.Santha, M. and Vazirani, U., "Generating Quasi-random Sequences from Slightly-random Sources", 25ta FOCS, 1984, pp. 434-440, JCSS, Vol. 33, No. 1, 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. 22.Vazirani, U., "Towards a Strong Communication Complexity Theory or Generating Quasirandom Sequences from Two Communicating Slightly-random Sources'", 17ta STOC, 1985, pp. 366-378, Combinatorica, Vol. 7, No.4, 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. 23.Vazirani, U. and Vazirani, V., "Random Polynomial Time is Equal to Slightly-random Polynomial Time", 26th FOGS, 1985, pp. 417-428, submitted to JA Cllf.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. 24.Yao, A.C., "Theory and Applications of Trapdoor Functions", 23ra FOGS, 1982, pp. 80-91.Google ScholarGoogle Scholar

Index Terms

  1. Pseudo-random generation from one-way functions

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                STOC '89: Proceedings of the twenty-first annual ACM symposium on Theory of computing
                February 1989
                600 pages
                ISBN:0897913078
                DOI:10.1145/73007

                Copyright © 1989 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 1 February 1989

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • Article

                Acceptance Rates

                STOC '89 Paper Acceptance Rate56of196submissions,29%Overall Acceptance Rate1,469of4,586submissions,32%

                Upcoming Conference

                STOC '24
                56th Annual ACM Symposium on Theory of Computing (STOC 2024)
                June 24 - 28, 2024
                Vancouver , BC , Canada

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader