Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/CCC.2014.9guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Goldreich's PRG: Evidence for Near-Optimal Polynomial Stretch

Published: 11 June 2014 Publication History

Abstract

Furthering the study of cryptography in constant parallel time, we give new evidence for the security of Gold Reich's candidate pseudorandom generator with near-optimal, polynomial stretch. Our evidence consists both of security against sub exponential-time linear attacks as well as sub exponential-time attacks using SDP hierarchies such as Sherali-Adams+ and Lasserre/Parrilo. More specifically, instantiating Gold Reich's generator with the 5-ary "Tri-Sum-And" predicate, we get a candidate 5-local PRG which is secure against both linear attacks and attacks based on the Lasserre/Parrilo SDP hierarchy. Previous works with such small locality gave polynomially less stretch and were only shown to be secure against linear attacks. Our result is essentially optimal, as known SDP/spectral techniques show the generator would not be secure if its stretch was higher by any polynomial factor. More generally, we show that (a slight variant of) Gold Reich's generator can have stretch increasing with the degree of the smallest nonzero Fourier coefficient of the predicate while resisting sub exponential-time attacks based on the Sherali-Adams+ SDP hierarchy. Again, the dependence on the degree is (potentially) optimal due to known SDP/spectral methods which succeed at any polynomially higher stretch. Finally, for a large family of predicates we also extend this result to security against the much stronger Lasserre/Parrilo SDP hierarchy.

Cited By

View all
  • (2024)Lossy Cryptography from Code-Based AssumptionsAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68382-4_2(34-75)Online publication date: 18-Aug-2024
  • (2021)Strongly refuting all semi-random boolean CSPsProceedings of the Thirty-Second Annual ACM-SIAM Symposium on Discrete Algorithms10.5555/3458064.3458092(454-472)Online publication date: 10-Jan-2021
  • (2021)Indistinguishability obfuscation from well-founded assumptionsProceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing10.1145/3406325.3451093(60-73)Online publication date: 15-Jun-2021
  • Show More Cited By
  1. Goldreich's PRG: Evidence for Near-Optimal Polynomial Stretch

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    CCC '14: Proceedings of the 2014 IEEE 29th Conference on Computational Complexity
    June 2014
    332 pages
    ISBN:9781479936267

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 11 June 2014

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 17 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Lossy Cryptography from Code-Based AssumptionsAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68382-4_2(34-75)Online publication date: 18-Aug-2024
    • (2021)Strongly refuting all semi-random boolean CSPsProceedings of the Thirty-Second Annual ACM-SIAM Symposium on Discrete Algorithms10.5555/3458064.3458092(454-472)Online publication date: 10-Jan-2021
    • (2021)Indistinguishability obfuscation from well-founded assumptionsProceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing10.1145/3406325.3451093(60-73)Online publication date: 15-Jun-2021
    • (2017)Sum of squares lower bounds for refuting any CSPProceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing10.1145/3055399.3055485(132-145)Online publication date: 19-Jun-2017
    • (2016)Indistinguishability Obfuscation from Constant-Degree Graded Encoding SchemesProceedings, Part I, of the 35th Annual International Conference on Advances in Cryptology --- EUROCRYPT 2016 - Volume 966510.5555/3081770.3081772(28-57)Online publication date: 8-May-2016
    • (2016)Algebraic attacks against random local functions and their countermeasuresProceedings of the forty-eighth annual ACM symposium on Theory of Computing10.1145/2897518.2897554(1087-1100)Online publication date: 19-Jun-2016
    • (2016)Fast Pseudorandom Functions Based on Expander GraphsProceedings, Part I, of the 14th International Conference on Theory of Cryptography - Volume 998510.1007/978-3-662-53641-4_2(27-56)Online publication date: 31-Oct-2016
    • (2015)Subsampled power iterationProceedings of the 29th International Conference on Neural Information Processing Systems - Volume 210.5555/2969442.2969557(2836-2844)Online publication date: 7-Dec-2015
    • (2015)Approximate resilience, monotonicity, and the complexity of agnostic learningProceedings of the twenty-sixth annual ACM-SIAM symposium on Discrete algorithms10.5555/2722129.2722163(498-511)Online publication date: 4-Jan-2015
    • (2015)Sum of Squares Lower Bounds from Pairwise IndependenceProceedings of the forty-seventh annual ACM symposium on Theory of Computing10.1145/2746539.2746625(97-106)Online publication date: 14-Jun-2015
    • Show More Cited By

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media