Abstract

Pseudorandom generators (suggested and developed by Blum and Micali and Yao) are efficient deterministic programs that expand a randomly selected k-bit seed into a much longer pseudorandom bit sequence that is indistinguishable in polynomial time from an (equally long) sequence of unbiased coin tosses. A fundamental question is to find simple conditions, as the existence of one-way functions, which suffice for constructing pseudorandom generators. This paper considers regular functions, in which every image of a k-bit string has the same number of preimages of length k. This paper shows how to construct pseudorandom generators from any regular one-way function.

MSC codes

  1. 11K45
  2. 11T71
  3. 68Q99
  4. 94A60

Keywords

  1. pseudorandom generators
  2. one-way functions
  3. cryptography
  4. randomness
  5. complexity theory

Get full access to this article

View all available purchase options and get full access to this article.

References

1.
W. Alexi, B. Chor, O. Goldreich, C. P. Schnorr, RSA and Rabin functions: certain parts are as hard as the whole, SIAM J. Comput., 17 (1988), 194–209
2.
L. Blum, M. Blum, M. Shub, A simple unpredictable pseudorandom number generator, SIAM J. Comput., 15 (1986), 364–383
3.
Manuel Blum, Silvio Micali, How to generate cryptographically strong sequences of pseudorandom bits, SIAM J. Comput., 13 (1984), 850–864
4.
J. Carter, M. Wegman, Universal classes of hash functions, J. Comput. System Sci., 18 (1979), 143–154
5.
Benny Chor, Oded Goldreich, On the power of two-point based sampling, J. Complexity, 5 (1989), 96–106
6.
Benny Chor, Oded Goldreich, Shafi Goldwasser, H. C. Williams, The bit security of modular squaring given partial factorization of the modulosAdvances in cryptology—CRYPTO '85 (Santa Barbara, Calif., 1985), Lecture Notes in Comput. Sci., Vol. 218, Springer, Berlin, 1986, 448–457
7.
Whitfield Diffie, Martin E. Hellman, New directions in cryptography, IEEE Trans. Information Theory, IT-22 (1976), 644–654, Nov.
8.
Shimon Even, Graph algorithms, Computer Science Press Inc., Woodland Hills, Calif., 1979ix+249
9.
Oded Goldreich, Shafi Goldwasser, Silvio Micali, How to construct random functions, J. Assoc. Comput. Mach., 33 (1986), 792–807
10.
O. Goldreich, H. Kawczyk, M. Luby, On the existence of pseudorandom generators, Proc. 29th IEEE Symposium on Foundations of Computer Science, 1988, 12–24
11.
O. Goldreich, L. A. Levin, A hard-core predicate for any one-way function, Proc. 21st Symposium on Theory of Computing, 1989, 25–32
12.
O. Goldreich, S. Micali, The Weakest Pseudorandom Bit Generator Implies the Strongest One, 1984, manuscript
13.
Shafi Goldwasser, Silvio Micali, Probabilistic encryption, J. Comput. System Sci., 28 (1984), 270–299
14.
J. Hastad, Pseudo-random generators under uniform assumptions, Proc. 22nd Symposium on Theory of Computing, 1990, 395–404
15.
R. Impagliazzo, L. A. Levin, M. G. Luby, Pseudo-random generation from one-way functions, Proc. 21st Symposium on Theory of Computing, 1989, 12–24
16.
A. Joffe, On a set of almost deterministic k-independent random variables, Ann. Probability, 2 (1974), 161–162
17.
L. A. Levin, One way functions and pseudorandom generators, Combinatorica, 7 (1987), 357–363, a preliminary version appeared in Proc. 17th Symposium on Theory of Computing, 1985, pp. 363–365
18.
L. A. Levin, Homogeneous measures and polynomial time invariants, Proc. 29th IEEE Symposium on Foundations of Computer Science, 1988, 36–41
19.
Michael Luby, A simple parallel algorithm for the maximal independent set problem, SIAM J. Comput., 15 (1986), 1036–1053
20.
Michael Luby, Charles Rackoff, How to construct pseudorandom permutations from pseudorandom functions, SIAM J. Comput., 17 (1988), 373–386
21.
F J. McWilliams, N. J. A. Sloane, The Theory of Error Correcting Codes, North-Holland Publishing Company, Amsterdam, 1977
22.
M. O. Rabin, Digitalized Signatures and Public Key Functions as Intractable as Factoring, 1979, MIT/LCS/TR-212
23.
R. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Comm. ACM, 21 (1978), 120–126
24.
A. Shamir, On the generation of cryptrographically strong pseudorandom sequences, ACM Trans. Cormput. Systems, 1 (1983), 38–44
25.
Andrew C. Yao, Theory and applications of trapdoor functions23rd annual symposium on foundations of computer science (Chicago, Ill., 1982), IEEE, New York, 1982, 80–91

Information & Authors

Information

Published In

cover image SIAM Journal on Computing
SIAM Journal on Computing
Pages: 1163 - 1175
ISSN (online): 1095-7111

History

Submitted: 20 April 1989
Accepted: 1 July 1992
Published online: 31 July 2006

MSC codes

  1. 11K45
  2. 11T71
  3. 68Q99
  4. 94A60

Keywords

  1. pseudorandom generators
  2. one-way functions
  3. cryptography
  4. randomness
  5. complexity theory

Authors

Affiliations

Metrics & Citations

Metrics

Citations

If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.

Cited By

View Options

View options

PDF

View PDF

Media

Figures

Other

Tables

Share

Share

Copy the content Link

Share with email

Email a colleague

Share on social media