Expander-based cryptography meets natural proofs

We introduce new forms of attack on expander-based cryptography, and in particular on Goldreich's pseudorandom generator and one-way function. Our attacks exploit low circuit complexity of the underlying expander's neighbor function and/or of the local predicate. Our two key conceptual con...

全面介紹

書目詳細資料
Main Authors: Oliveira, I, Santhanam, R, Tell, R
格式: Conference item
出版: Dagstuhl Publishing 2018
_version_ 1826257733355044864
author Oliveira, I
Santhanam, R
Tell, R
author_facet Oliveira, I
Santhanam, R
Tell, R
author_sort Oliveira, I
collection OXFORD
description We introduce new forms of attack on expander-based cryptography, and in particular on Goldreich's pseudorandom generator and one-way function. Our attacks exploit low circuit complexity of the underlying expander's neighbor function and/or of the local predicate. Our two key conceptual contributions are: 1) We put forward the possibility that the choice of expander matters in expander-based cryptography. In particular, using expanders whose neighbour function has low circuit complexity might compromise the security of Goldreich's PRG and OWF in certain settings. 2) We show that the security of Goldreich's PRG and OWF is closely related to two other long-standing problems: Specifically, to the existence of unbalanced lossless expanders with low-complexity neighbor function, and to limitations on circuit lower bounds (i.e., natural proofs). In particular, our results further motivate the investigation of affine/local unbalanced lossless expanders and of average-case lower bounds against DNF-XOR circuits. We prove two types of technical results that support the above conceptual messages. First, we unconditionally break Goldreich's PRG when instantiated with a specific expander (whose existence we prove), for a class of predicates that match the parameters of the currently-best "hard" candidates, in the regime of quasi-polynomial stretch. Secondly, conditioned on the existence of expanders whose neighbor functions have extremely low circuit complexity, we present attacks on Goldreich's generator in the regime of polynomial stretch. As one corollary, conditioned on the existence of the foregoing expanders, we show that either the parameters of natural properties for several constant-depth circuit classes cannot be improved, even mildly; or Goldreich's generator is insecure in the regime of a large polynomial stretch, regardless of the predicate used.
first_indexed 2024-03-06T18:22:50Z
format Conference item
id oxford-uuid:06e7e7d9-67f3-4d81-9aba-44e0870a6ed9
institution University of Oxford
last_indexed 2024-03-06T18:22:50Z
publishDate 2018
publisher Dagstuhl Publishing
record_format dspace
spelling oxford-uuid:06e7e7d9-67f3-4d81-9aba-44e0870a6ed92022-03-26T09:04:47ZExpander-based cryptography meets natural proofsConference itemhttp://purl.org/coar/resource_type/c_5794uuid:06e7e7d9-67f3-4d81-9aba-44e0870a6ed9Symplectic Elements at OxfordDagstuhl Publishing2018Oliveira, ISanthanam, RTell, RWe introduce new forms of attack on expander-based cryptography, and in particular on Goldreich's pseudorandom generator and one-way function. Our attacks exploit low circuit complexity of the underlying expander's neighbor function and/or of the local predicate. Our two key conceptual contributions are: 1) We put forward the possibility that the choice of expander matters in expander-based cryptography. In particular, using expanders whose neighbour function has low circuit complexity might compromise the security of Goldreich's PRG and OWF in certain settings. 2) We show that the security of Goldreich's PRG and OWF is closely related to two other long-standing problems: Specifically, to the existence of unbalanced lossless expanders with low-complexity neighbor function, and to limitations on circuit lower bounds (i.e., natural proofs). In particular, our results further motivate the investigation of affine/local unbalanced lossless expanders and of average-case lower bounds against DNF-XOR circuits. We prove two types of technical results that support the above conceptual messages. First, we unconditionally break Goldreich's PRG when instantiated with a specific expander (whose existence we prove), for a class of predicates that match the parameters of the currently-best "hard" candidates, in the regime of quasi-polynomial stretch. Secondly, conditioned on the existence of expanders whose neighbor functions have extremely low circuit complexity, we present attacks on Goldreich's generator in the regime of polynomial stretch. As one corollary, conditioned on the existence of the foregoing expanders, we show that either the parameters of natural properties for several constant-depth circuit classes cannot be improved, even mildly; or Goldreich's generator is insecure in the regime of a large polynomial stretch, regardless of the predicate used.
spellingShingle Oliveira, I
Santhanam, R
Tell, R
Expander-based cryptography meets natural proofs
title Expander-based cryptography meets natural proofs
title_full Expander-based cryptography meets natural proofs
title_fullStr Expander-based cryptography meets natural proofs
title_full_unstemmed Expander-based cryptography meets natural proofs
title_short Expander-based cryptography meets natural proofs
title_sort expander based cryptography meets natural proofs
work_keys_str_mv AT oliveirai expanderbasedcryptographymeetsnaturalproofs
AT santhanamr expanderbasedcryptographymeetsnaturalproofs
AT tellr expanderbasedcryptographymeetsnaturalproofs