Number-theoretic constructions of efficient pseudo-random functions
- 23 November 2002
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- No. 02725428,p. 458-467
- https://doi.org/10.1109/sfcs.1997.646134
Abstract
We describe efficient constructions for various cryptographic primitives (both in private-key and in public-key cryptography). We show these constructions to be at least as secure as the decisional version of the Diffie-Hellman assumption or as the assumption that factoring is hard. Our major result is a new construction of pseudo-random functions such that computing their value at any given point involves two multiple products. This is much more efficient than previous proposals. Furthermore, these functions have the advantage of being in TC/sup 0/ (the class of functions computable by constant depth circuits consisting of a polynomial number of threshold gates) which has several interesting applications. The simple algebraic structure of the functions implies additional features. In particular, we show a zero-knowledge proof for statements of the form "y=f/sub s/(x)" and "y/spl ne/f(x)" given a commitment to a key s of a pseudo-random function f/sub s/.Keywords
This publication has 36 references indexed in Scilit:
- Towards the Equivalence of Breaking the Diffie-Hellman Protocol and Computing Discrete LogarithmsPublished by Springer Nature ,2001
- On the Cryptographic Applications of Random Functions (Extended Abstract)Published by Springer Nature ,2000
- Efficient Cryptographic Schemes Provably as Secure as Subset SumJournal of Cryptology, 1996
- Cryptographic limitations on learning Boolean formulae and finite automataJournal of the ACM, 1994
- Constant depth circuits, Fourier transform, and learnabilityJournal of the ACM, 1993
- Cryptographic hardness of distribution-specific learningPublished by Association for Computing Machinery (ACM) ,1993
- How to recycle random bitsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1989
- How to Construct Pseudorandom Permutations from Pseudorandom FunctionsSIAM Journal on Computing, 1988
- How to construct random functionsJournal of the ACM, 1986
- Probabilistic encryptionJournal of Computer and System Sciences, 1984