Pseudorandom generators with long stretch and low locality from random local one-way functions

We continue the study of locally-computable pseudorandom generators (PRG) G:{0,1}n -> {0,1}m that each of their outputs depend on a small number of d input bits. While it is known that such generators are likely to exist for the case of small sub-linear stretch m=n+n1-δ, it is less clear whether achieving larger stretch such as m=n+Ω(n), or even m=n1+δ is possible. The existence of such PRGs, which was posed as an open question in previous works, has recently gained an additional motivation due to several interesting applications. We make progress towards resolving this question by obtaining several local constructions based on the one-wayness of "random" local functions -- a variant of an assumption made by Goldreich (ECCC 2000). Specifically, we construct collections of PRGs with the following parameters: 1. Linear stretch m=n+Ω(n) and constant locality d=O(1). 2. Polynomial stretch m=n1+δ and any (arbitrarily slowly growing) super-constant locality d=ω(1), e.g., log*n. 3. Polynomial stretch m=n1+δ, constant locality d=O(1), and inverse polynomial distinguishing advantage (as opposed to the standard case of n-ω(1)). As an additional contribution, we show that our constructions give rise to strong inapproximability results for the densest-subgraph problem in d-uniform hypergraphs for constant d. This allows us to improve the previous bounds of Feige (STOC 2002) and Khot (FOCS 2004) from constant inapproximability factor to nε-inapproximability, at the expense of relying on stronger assumptions.

[1]  Benny Applebaum,et al.  A Dichotomy for Local Small-Bias Generators , 2012, TCC.

[2]  Seyed Omid Etesami Pseudorandomness against Depth-2 Circuits and Analysis of Goldreich's Candidate One-Way Function , 2010 .

[3]  Yuval Ishai,et al.  Cryptography with Constant Input Locality , 2007, Journal of Cryptology.

[4]  Benny Applebaum,et al.  Cryptography in Constant Parallel Time , 2013, Information Security and Cryptography.

[5]  Bert den Boer Diffie-Hellman is as Strong as Discrete Log for Certain Primes , 1988, CRYPTO.

[6]  Rafail Ostrovsky,et al.  Cryptography with constant computational overhead , 2008, STOC.

[7]  Moni Naor,et al.  Number-theoretic constructions of efficient pseudo-random functions , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.

[8]  Dmitry Itsykson Lower Bound on Average-Case Complexity of Inversion of Goldreich's Function by Drunken Backtracking Algorithms , 2010, CSR.

[9]  Amir Herzberg,et al.  Pubic Randomness in Cryptography , 1992, CRYPTO.

[10]  Kumar Panjwani An Experimental Evaluation of Goldreich ' s One-Way FunctionSaurabh , 2001 .

[11]  Uriel Feige,et al.  The Dense k -Subgraph Problem , 2001, Algorithmica.

[12]  Michael Alekhnovich,et al.  Exponential Lower Bounds for the Running Time of DPLL Algorithms on Satisfiable Formulas , 2004, SODA '04.

[13]  B. Applebaum Cryptography in NC0 , 2014 .

[14]  Noam Nisan,et al.  Hardness vs Randomness , 1994, J. Comput. Syst. Sci..

[15]  Moti Yung,et al.  Space lower-bounds for pseudorandom-generators , 1994, Proceedings of IEEE 9th Annual Conference on Structure in Complexity Theory.

[16]  Alon Rosen,et al.  Input Locality and Hardness Amplification , 2011, Journal of Cryptology.

[17]  Peter Bro Miltersen,et al.  On Pseudorandom Generators in NC , 2001, MFCS.

[18]  Noam Nisan,et al.  Constant depth circuits, Fourier transform, and learnability , 1989, 30th Annual Symposium on Foundations of Computer Science.

[19]  Luca Trevisan,et al.  Pseudorandom generators without the XOR lemma , 1999, Proceedings. Fourteenth Annual IEEE Conference on Computational Complexity (Formerly: Structure in Complexity Theory Conference) (Cat.No.99CB36317).

[20]  Luca Trevisan,et al.  On e-Biased Generators in NC0 , 2003, FOCS.

[21]  Aditya Bhaskara,et al.  Detecting high log-densities: an O(n¼) approximation for densest k-subgraph , 2010, STOC '10.

[22]  Moni Naor,et al.  Efficient cryptographic schemes provably as secure as subset sum , 2004, Journal of Cryptology.

[23]  Emanuele Viola,et al.  On constructing parallel pseudorandom generators from one-way functions , 2005, 20th Annual IEEE Conference on Computational Complexity (CCC'05).

[24]  Amir Shpilka,et al.  On ε-Biased Generators in NC , 2003 .

[25]  A Omitted Proofs , .

[26]  Stefan Lucks,et al.  On the Minimal Hardware Complexity of Pseudorandom Function Generators , 2001, STACS.

[27]  Benny Applebaum Pseudorandom Generators with Long Stretch and Low Locality from Random Local One-Way Functions , 2013, SIAM J. Comput..

[28]  Michael Alekhnovich More on Average Case vs Approximation Complexity , 2011, computational complexity.

[29]  Oded Goldreich,et al.  Foundations of Cryptography: Basic Tools , 2000 .

[30]  Yuval Ishai,et al.  On Pseudorandom Generators with Linear Stretch in NC0 , 2006, computational complexity.

[31]  Sanjeev Arora,et al.  Computational complexity and information asymmetry in financial products , 2011, Commun. ACM.

[32]  Yuval Ishai,et al.  Cryptography by Cellular Automata or How Fast Can Complexity Emerge in Nature? , 2010, ICS.

[33]  Johan Håstad One-Way Permutations in NC0 , 1987, Inf. Process. Lett..

[34]  Luca Trevisan,et al.  Goldreich's One-Way Function Candidate and Myopic Backtracking Algorithms , 2009, TCC.

[35]  Dimitris Achlioptas,et al.  Random Satisfiability , 2009, Handbook of Satisfiability.

[36]  Moni Naor,et al.  Small-bias probability spaces: efficient constructions and applications , 1990, STOC '90.

[37]  Uriel Feige,et al.  Resolution lower bounds for the weak pigeon hole principle , 2002, Proceedings 17th IEEE Annual Conference on Computational Complexity.

[38]  Abraham D. Flaxman Random Planted 3-SAT , 2008, Encyclopedia of Algorithms.

[39]  Noam Nisan,et al.  On Yao's XOR-Lemma , 1995, Electron. Colloquium Comput. Complex..

[40]  Youming Qiao,et al.  On the security of Goldreich’s one-way function , 2011, computational complexity.

[41]  Yuval Ishai,et al.  Cryptography in NC0 , 2004, SIAM J. Comput..

[42]  Rachel Miller,et al.  Goldreich ’ s One-Way Function Candidate and Drunken Backtracking Algorithms , 2010 .

[43]  Ueli Maurer,et al.  The Relationship Between Breaking the Diffie-Hellman Protocol and Computing Discrete Logarithms , 1999, SIAM J. Comput..

[44]  Amin Coja-Oghlan,et al.  Random Constraint Satisfaction Problems , 2009, DCM.

[45]  Leonid A. Levin,et al.  A Pseudorandom Generator from any One-way Function , 1999, SIAM J. Comput..

[46]  Oded Goldreich,et al.  Candidate One-Way Functions Based on Expander Graphs , 2011, Studies in Complexity and Cryptography.

[47]  Peter Bro Miltersen,et al.  On pseudorandom generators in NC 0 ⋆ , 2001 .

[48]  ApplebaumBenny,et al.  Cryptography in $NC^0$ , 2006 .

[49]  Nathan Linial,et al.  The influence of variables on Boolean functions , 1988, [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science.

[50]  Avi Wigderson,et al.  Public-key cryptography from different assumptions , 2010, STOC '10.

[51]  Oded Goldreich,et al.  On the Security of Modular Exponentiation with Application to the Construction of Pseudorandom Generators , 2003, Journal of Cryptology.

[52]  Leonid A. Levin,et al.  One-way functions and pseudorandom generators , 1985, STOC '85.

[53]  Andrew Chi-Chih Yao,et al.  Theory and application of trapdoor functions , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).

[54]  Leonid Reyzin,et al.  An Improved Pseudorandom Generator Based on Hardness of Factoring , 2002, IACR Cryptol. ePrint Arch..

[55]  Elchanan Mossel,et al.  On ε‐biased generators in NC0 , 2006, Random Struct. Algorithms.

[56]  Yuval Ishai,et al.  COMPUTATIONALLY PRIVATE RANDOMIZING POLYNOMIALS AND THEIR APPLICATIONS , 2005, 20th Annual IEEE Conference on Computational Complexity (CCC'05).

[57]  Toby Walsh,et al.  Handbook of satisfiability , 2009 .

[58]  Subhash Khot Ruling Out PTAS for Graph Min-Bisection, Densest Subgraph and Bipartite Clique , 2004, FOCS.

[59]  Cesare Tinelli,et al.  Handbook of Satisfiability , 2021, Handbook of Satisfiability.

[60]  Omer Reingold,et al.  Efficiency improvements in constructing pseudorandom generators from one-way functions , 2010, STOC '10.

[61]  Hugo Krawczyk,et al.  On the Existence of Pseudorandom Generators , 1988, CRYPTO.