2018
DOI: 10.1007/978-3-030-03329-3_4
|View full text |Cite
|
Sign up to set email alerts
|

On the Concrete Security of Goldreich’s Pseudorandom Generator

Abstract: Local pseudorandom generators allow to expand a short random string into a long pseudorandom string, such that each output bit depends on a constant number d of input bits. Due to its extreme efficiency features, this intriguing primitive enjoys a wide variety of applications in cryptography and complexity. In the polynomial regime, where the seed is of size n and the output of size n s for s > 1, the only known solution, commonly known as Goldreich's PRG, proceeds by applying a simple d-ary predicate to publi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
55
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 20 publications
(55 citation statements)
references
References 38 publications
0
55
0
Order By: Relevance
“…-Our first result is a novel guess-and-determine-style attack with much lower complexity than the results presented in [18]. We develop theoretical and also numerical analysis about how many guesses that are needed for various (n, s) parameters, where n and s denote the seed size and stretch, respectively, and experimentally verify the analysis for some small parameters.…”
Section: B Contributionsmentioning
confidence: 86%
See 2 more Smart Citations
“…-Our first result is a novel guess-and-determine-style attack with much lower complexity than the results presented in [18]. We develop theoretical and also numerical analysis about how many guesses that are needed for various (n, s) parameters, where n and s denote the seed size and stretch, respectively, and experimentally verify the analysis for some small parameters.…”
Section: B Contributionsmentioning
confidence: 86%
“…In [22], Applebaum and Lovett analyzed how the underlying predicate affects pseudorandomness using algebraic attacks and gave some advice on the choices of predicates in terms of resiliency, algebraic degree and bit fixing degree. Algebraic attacks based on linearization and Gröbner base algorithms were further considered in [18], and some results on concrete choices of parameters were given.…”
Section: A Related Work In Cryptanalysismentioning
confidence: 99%
See 1 more Smart Citation
“…PRGs in NC 0 are tightly connected to the fundamental topic of Constraint Satisfaction Problems (CSPs) in complexity theory, and were first proposed for cryptographic use by Goldreich [62,75,87] 20 years ago. The complexity theory and cryptography communities have jointly developed a rich body of literature on the cryptanalysis and theory of constant-locality Boolean PRGs [9,10,12,13,15,16,28,29,59,61,62,75,101,107,108].…”
Section: Assumptions In More Detailmentioning
confidence: 99%
“…The security of Goldreich's PRG is a well-established and widely studied assumption, which provably resists large classes of attacks[2,3,13,40,42].…”
mentioning
confidence: 99%