Abstract

We give a set of conditions that allow one to generate 50–50 unpredictable bits.Based on those conditions, we present a general algorithmic scheme for constructing polynomial-time deterministic algorithms that stretch a short secret random input into a long sequence of unpredictable pseudo-random bits.
We give an implementation of our scheme and exhibit a pseudo-random bit generator for which any efficient strategy for predicting the next output bit with better than 50–50 chance is easily transformable to an “equally efficient” algorithm for solving the discrete logarithm problem. In particular: if the discrete logarithm problem cannot be solved in probabilistic polynomial time, no probabilistic polynomial-time algorithm can guess the next output bit better than by flipping a coin: if “head” guess “0”, if “tail” guess “1”

Keywords

  1. randomness
  2. pseudo-random number generation
  3. unpredictability
  4. random self-reducibility

Get full access to this article

View all available purchase options and get full access to this article.

References

1.
L. Adleman, A subexponential algorithm for the discrete logarithm problem with applications to cryptography, Proc. 20th IEEE Symposium on Foundations of Computer Science, 1979, 55–60
2.
Leonard Adleman, Kenneth Manders, Gary Miller, On taking roots in finite fields, 18th Annual Symposium on Foundations of Computer Science (Providence, R.I., 1977), IEEE Comput. Sci., Long Beach, Calif., 1977, 175–178
3.
E. Bach, How to generate random integers with known factorization, Proc. 15th ACM Symposium on Theory of Computing, 1983
4.
H. Beker, F. Piper, Cipher Systems, Northwood, 1982
5.
E. Berlekamp, Factoring polynomials over large finite fields, Math. Comp., 24 (1970), 713–735
6.
Piotr Berman, Relationship between density and deterministic complexity of NP-complete languagesAutomata, languages and programming (Fifth Internat. Colloq., Udine, 1978), Lecture Notes in Comput. Sci., Vol. 62, Springer, Berlin, 1978, 63–71
7.
M. Blum, How to exchange (secret) keys, Proc.15th ACM Symposium on Theory of Computing, 1983
8.
M. Blum, Three applications of the oblivious transfer, 1981, unpublished manuscript
9.
L. Blum, M. Blum, M. Shub, A simple secure pseudo-random number generator, Proc. CRYPTO-82, Allen Gersho, ed.; this Journal, to appear
10.
Manuel Blum, Silvio Micali, How to generate cryptographically strong sequences of pseudorandom bits23rd annual symposium on foundations of computer science (Chicago, Ill., 1982), IEEE, New York, 1982, 112–117
11.
S. Cook, The complexity of theorem proving procedures, Proc. 3rd ACM Symposium on Theory of Computing, 1971, 151–158
12.
Steven Fortune, A note on sparse complete sets, SIAM J. Comput., 8 (1979), 431–433
13.
Shafi Goldwasser, Silvio Micali, Probabilistic encryption, J. Comput. System Sci., 28 (1984), 270–299
14.
Shafi Goldwasser, Silvio Micali, Po Tong, Why and how to establish a private code on a public network23rd annual symposium on foundations of computer science (Chicago, Ill., 1982), IEEE, New York, 1982, 134–144
15.
S. Goldwasser, S. Micali, A. Yao, Strong signature schemes and authentication, Proc. 15th ACM Symposium on Theory of Computing, 1983
16.
R. Karp, R. Miller, J. Thatcher, Reducibility among combinatorial problemsComplexity of computer computations (Proc. Sympos., IBM Thomas J. Watson Res. Center, Yorktown Heights, N.Y., 1972), Plenum, New York, 1972, 85–103
17.
D. Knuth, The art of computer programming. Vol. 2, Addison-Wesley Publishing Co., Reading, Mass., 1981xiii+688, Seminumerical Algorithms
18.
A. Kolmogorov, Three approaches to the definition of the concept “quantity of information”, Problemy Peredači Informacii, 1 (1965), 3–11
19.
L. A. Levin, Universal sequential search problems, Probl. of Inf. Transm., 9 (1973), 265–266
20.
M. Luby, S. Micali, C. Rackoff, The MiRackoLus exchange of a secret bit, Proc. 24th IEEE Symposium on Foundations of Computer Science, 1983
21.
S. Mahaney, Sparse complete sets for NP: solution of a conjecture of Berman and Hartmanis21st Annual Symposium on Foundations of Computer Science (Syracuse, N.Y., 1980), IEEE, New York, 1980, 54–60
22.
A. Meyer, M. Peterson, With what frequency are apparently intractable problems difficult?, Tech. Report, Massachusetts Institute of Technology, Cambridge, MA, 1979, Feb.
23.
G. Miller, Riemann's hypothesis and tests for primality, J. Comput. System Sci., 13 (1976), 300–317
24.
G. Peterson, Succint representations, random strings and complexity classes, Proc. 21st IEEE Symposium on Foundations of Computer Science, 1980, 86–95
25.
J. Plumstead, Inferring a sequence generated by a linear congruence23rd annual symposium on foundations of computer science (Chicago, Ill., 1982), IEEE, New York, 1982, 153–159
26.
S. Pohlig, M. Hellman, An improved algorithm for computing logarithms over ${\rm GF}(p)$ and its cryptographic significance, IEEE Trans. Information Theory, IT-24 (1978), 106–110
27.
R. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Comm. ACM, 21 (1978), 120–126
28.
J. Rosser, Lowell Schoenfeld, Approximate formulas for some functions of prime numbers, Illinois J. Math., 6 (1962), 64–94
29.
Adi Shamir, On the generation of cryptographically strong pseudorandom sequencesAutomata, languages and programming (Akko, 1981), Lecture Notes in Comput. Sci., Vol. 115, Springer, Berlin, 1981, 544–550
30.
Daniel Shanks, Solved and unsolved problems in number theory, Chelsea Publishing Co., New York, 1978xiii+258
31.
M. Sipser, Three approaches to a definition of finite state randomness, 1979, unpublished manuscript
32.
R. Solovay, V. Strassen, A fast Monte-Carlo test for primality, SIAM J. Comput., 6 (1977), 84–85
33.
A. Yao, Theory and applications of trapdoor functions23rd annual symposium on foundations of computer science (Chicago, Ill., 1982), IEEE, New York, 1982, 80–91
34.
Andrew Odlizko, 1984, private communication

Information & Authors

Information

Published In

cover image SIAM Journal on Computing
SIAM Journal on Computing
Pages: 850 - 864
ISSN (online): 1095-7111

History

Submitted: 11 April 1983
Accepted: 15 January 1984
Published online: 13 July 2006

Keywords

  1. randomness
  2. pseudo-random number generation
  3. unpredictability
  4. random self-reducibility

Authors

Affiliations

Metrics & Citations

Metrics

Citations

If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.

Cited By

View Options

View options

PDF

View PDF

Media

Figures

Other

Tables

Share

Share

Copy the content Link

Share with email

Email a colleague

Share on social media