skip to main content
10.1007/11830924_25guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

On pseudorandom generators with linear stretch in NC<Superscript>0</Superscript>

Published: 28 August 2006 Publication History

Abstract

We consider the question of constructing cryptographic pseudorandom generators (PRGs) in NC0, namely ones in which each bit of the output depends on just a constant number of input bits. Previous constructions of such PRGs were limited to stretching a seed of n bits to n + o(n) bits. This leaves open the existence of a PRG with a linear (let alone superlinear) stretch in NC0. In this work we study this question and obtain the following main results:
1. We show that the existence of a linear-stretch PRG in NC0 implies non-trivial hardness of approximation results without relying on PCP machinery. In particular, that Max 3SAT is hard to approximate to within some constant.
2. We construct a linear-stretch PRG in NC0 under a specific intractability assumption related to the hardness of decoding “sparsely generated” linear codes. Such an assumption was previously conjectured by Alekhnovich [1].
We note that Alekhnovich directly obtains hardness of approximation results from the latter assumption. Thus, we do not prove hardness of approximation under new concrete assumptions. However, our first result is motivated by the hope to prove hardness of approximation under more general or standard cryptographic assumptions, and the second result is independently motivated by cryptographic applications.

References

[1]
M. Alekhnovich. More on average case vs approximation complexity. In Proc. 44th FOCS, pages 298-307, 2003.
[2]
N. Alon and Y. Roichman. Random cayley graphs and expanders. Random Struct. Algorithms, 5(2):271-285, 1994.
[3]
B. Applebaum, Y. Ishai, and E. Kushilevitz. Cryptography in NC0. SIAM J. Comput. To appear. Preliminary version in FOCS 04.
[4]
S. Arora, C. Lund, R. Motwani, M. Sudan, and M. Szegedy. Proof verification and hardness of approximation problems. J. of the ACM, 45(3):501-555, 1998.
[5]
S. Arora and S. Safra. Probabilistic checking of proofs: A new characterization of np. J. of the ACM, 45(1):70-122, 1998.
[6]
E. Ben-Sasson, M. Sudan, S. Vadhan, and A. Wigderson. Randomness-efficient low-degree tests and short pcps via epsilon-biased sets. In Proc. 35th STOC, pages 612-621, 2003.
[7]
A. Blum, M. Furst, M. Kearns, and R. J. Lipton. Cryptographic primitives based on hard learning problems. In Advances in Cryptology: Proc. of CRYPTO '93, volume 773 of LNCS, pages 278-291, 1994.
[8]
M. Blum and S. Micali. How to generate cryptographically strong sequences of pseudorandom bits. SIAM J. Comput., 13:850-864, 1984.
[9]
M. Capalbo, O. Reingold, S. Vadhan, and A. Wigderson. Randomness conductors and constant-degree lossless expanders. In Proc. 34th STOC, pages 659-668, 2002.
[10]
M. Cryan and P. B. Miltersen. On pseudorandom generators in NC0. In Proc. 26th MFCS, 2001.
[11]
Y. Dodis and A. Smith. Correcting errors without leaking partial information. In Proc. 37th STOC, pages 654-663, 2005.
[12]
U. Feige. Relations between average case complexity and approximation complexity. In Proc. of 34th STOC, pages 534-543, 2002.
[13]
O. Goldreich. Candidate one-way functions based on expander graphs. ECCC, 7(090), 2000.
[14]
O. Goldreich. Foundations of Cryptography: Basic Tools. Cambridge University Press, 2001.
[15]
O. Goldreich, H. Krawczyk, and M. Luby. On the existence of pseudorandom generators. SIAM J. Comput., 22(6):1163-1175, 1993.
[16]
O. Goldreich and A. Wigderson. Tiny families of functions with random properties: A quality-size trade-off for hashing. Random Struct. Algorithms, 11(4):315-343, 1997.
[17]
E. Mossel, A. Shpilka, and L. Trevisan. On ε-biased generators in NC0 In Proc. 44th FOCS, pages 136-145, 2003.
[18]
J. Naor and M. Naor. Small-bias probability spaces: Efficient constructions and applications. SIAM J. Comput., 22(4):838-856, 1993.
[19]
M. Naor. Bit commitment using pseudorandomness. J. of Cryptology, 4:151-158, 1991.
[20]
C. Papadimitriou and M. Yannakakis. Optimization, approximation, and complexity classes. J. of Computer and Systems Sciences, 43:425-440, 1991.
[21]
J. Radhakrishnan and A. Ta-Shma. Tight bounds for depth-two superconcentrators. SIAM J. Discrete Math., 13(1):2-24, 2000.
[22]
U. Vazirani. Randomness, Adversaries and Computation. Ph.d. thesis, UC Berkeley, 1986.
[23]
E. Viola. On constructing parallel pseudorandom generators from one-way functions. In Proc. 20th CCC, pages 183-197, 2005.
[24]
A. C. Yao. Theory and application of trapdoor functions. In Proc. 23rd FOCS, pages 80-91, 1982.

Cited By

View all
  1. On pseudorandom generators with linear stretch in NC0

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    APPROX'06/RANDOM'06: Proceedings of the 9th international conference on Approximation Algorithms for Combinatorial Optimization Problems, and 10th international conference on Randomization and Computation
    August 2006
    521 pages
    ISBN:3540380442
    • Editors:
    • Josep Díaz,
    • Klaus Jansen,
    • José P. Rolim,
    • Uri Zwick

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 28 August 2006

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 03 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media