This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
41st Annual Symposium on Foundations of Computer Science
Lower bounds on the efficiency of generic cryptographic constructions
Redondo Beach, California
November 12-November 14
ISBN: 0-7695-0850-2
R. Gennaro, IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA
L. Trevisan, IBM Thomas J. Watson Res. Center, Yorktown Heights, NY, USA
We present lower bounds on the efficiency of constructions for Pseudo-Random Generators (PRGs) and Universal One-Way Hash Functions (UOWHFs) based on black-box access to one-way permutations. Our lower bounds are tight as they match the efficiency of known constructions. A PRG (resp. UOWHF) construction based on black-box access is a machine that is given oracle access to a permutation. Whenever the permutation is hard to invert, the construction is hard to break. In this paper we give lower bounds on the number of invocations to the oracle by the construction. If S is the assumed security of the oracle permutation /spl pi/ (i.e. no adversary of size S can invert /spl pi/ on a fraction larger than 1/S of its inputs) then a PRG (resp. UOWHF) construction that stretches (resp. compresses) its input by k bits must query /spl pi/ in q=/spl Omega/(k/log S) points. This matches known constructions. Our results are given in an extension of the Impagliazzo-Rudich model. That is, we prove that a proof of the existence of PRG (resp. UOWHF) black-box constructions that beat our lower bound would imply a proof of the unconditional existence of such construction (which would also imply P/spl ne/NP).
Index Terms:
cryptography; random number generation; file organisation; lower bounds; generic cryptographic constructions; pseudo-random generators; universal one-way hash functions; black-box access; one-way permutations; Impagliazzo-Rudich model
Citation:
R. Gennaro, L. Trevisan, "Lower bounds on the efficiency of generic cryptographic constructions," focs, pp.305, 41st Annual Symposium on Foundations of Computer Science, 2000
Usage of this product signifies your acceptance of the Terms of Use.