On the existence of pseudorandom generators
- 1 January 1988
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
Pseudorandom generators are known to exist, assuming the existence of functions that cannot be efficiently inverted on the distributions induced by applying the function iteratively polynomially many times. This sufficient condition is also necessary, but it is difficult to check whether particular functions, assumed to be one-way, are also one-way on their iterates. This raises the fundamental question of whether the mere existence of one-way functions suffices for the construction of pseudorandom generators. Progress toward resolving this question is presented. Regular functions in which every image of a k-bit string has the same number of preimages of length k are considered. It is shown that if a regular function is one-way, then pseudorandom generators do exist. In particular, assuming the intractability of general factoring, it can be proved that the pseudorandom generators do exist. Another application is the construction of a pseudorandom generator based on the assumed intractability of decoding random linear codes.Keywords
This publication has 17 references indexed in Scilit:
- The Bit Security of Modular Squaring given Partial Factorization of the ModulosPublished by Springer Nature ,2000
- On the power of two-point based samplingJournal of Complexity, 1989
- How to Construct Pseudorandom Permutations from Pseudorandom FunctionsSIAM Journal on Computing, 1988
- Homogeneous measures and polynomial time invariantsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1988
- A Simple Parallel Algorithm for the Maximal Independent Set ProblemSIAM Journal on Computing, 1986
- How to Generate Cryptographically Strong Sequences of Pseudorandom BitsSIAM Journal on Computing, 1984
- Probabilistic encryptionJournal of Computer and System Sciences, 1984
- Universal classes of hash functionsJournal of Computer and System Sciences, 1979
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- On a Set of Almost Deterministic $k$-Independent Random VariablesThe Annals of Probability, 1974