Proving hard-core predicates using list decoding

被引:66
作者
Akavia, A [1 ]
Goldwasser, S [1 ]
Safra, S [1 ]
机构
[1] Weizmann Inst Sci, Rehovot, Israel
来源
44TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS | 2003年
关键词
D O I
10.1109/SFCS.2003.1238189
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We introduce a unifying framework for proving that predicate P is hard-core for a one-way function f, and apply it to a broad family of functions and predicates, reproving old results in an entirely different way as well as showing new hard-core predicates for well known one-way function candidates. Our framework extends the list-decoding method of Goldreich and Levin for showing hard-core predicates. Namely, a predicate will correspond to some error correcting code, predicting a predicate will correspond to access to a corrupted codeword, and the task of inverting one-way functions will correspond to the task of list decoding a corrupted codeword. A characteristic of the error correcting codes which emerge and are addressed by our framework, is that codewords can be approximated by a small number of heavy coefficients in their Fourier representation. Moreover, as long as corrupted words are close enough to legal codewords, they will share a heavy Fourier coefficient. We list decode such codes, by devising a learning algorithm applied to corrupted codewords for learning heavy Fourier coefficients. For codes defined over {0, 1}(n) domain, a learning algorithm by Kushilevitz and Mansour already exists. For codes defined over Z(N), which are the codes which emerge for predicates based on number theoretic one-way functions such as the RSA and Exponentiation modulo primes, we develop a new learning algorithm. This latter algorithm may be of independent interest outside the realm of hard-core predicates.
引用
收藏
页码:146 / 157
页数:12
相关论文
共 22 条
[1]   RSA AND RABIN FUNCTIONS - CERTAIN PARTS ARE AS HARD AS THE WHOLE [J].
ALEXI, W ;
CHOR, B ;
GOLDREICH, O ;
SCHNORR, CP .
SIAM JOURNAL ON COMPUTING, 1988, 17 (02) :194-209
[2]  
[Anonymous], 1982, 23 ANN S FDN COMPUTE, DOI DOI 10.1109/SFCS.1982.45
[3]  
BENOR M, 1983, P 15 ACM S THEOR COM, P421
[4]   A SIMPLE UNPREDICTABLE PSEUDORANDOM NUMBER GENERATOR [J].
BLUM, L ;
BLUM, M ;
SHUB, M .
SIAM JOURNAL ON COMPUTING, 1986, 15 (02) :364-383
[5]   HOW TO GENERATE CRYPTOGRAPHICALLY STRONG SEQUENCES OF PSEUDO-RANDOM BITS [J].
BLUM, M ;
MICALI, S .
SIAM JOURNAL ON COMPUTING, 1984, 13 (04) :850-864
[6]   Stronger security proofs for RSA and Rabin bits [J].
Fischlin, R ;
Schnorr, CP .
JOURNAL OF CRYPTOLOGY, 2000, 13 (02) :221-244
[7]  
GOLDMANN M, 2000, P STACS, P614
[8]  
Goldreich O., 2001, FDN CRYPTOGRAPHY BAS
[9]  
GOLDREICH O, 1989, STOC
[10]   PROBABILISTIC ENCRYPTION [J].
GOLDWASSER, S ;
MICALI, S .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1984, 28 (02) :270-299