Advertisement

Post-Quantum Pseudorandom Functions from Mersenne Primes

  • Jiehui NanEmail author
  • Mengce Zheng
  • Honggang HuEmail author
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1105)

Abstract

Pseudorandom functions (PRFs) serve as a fundamental cryptographic primitive that is essential for encryption, identification and authentication. The concept of PRFs first formalized by Goldreich, Goldwasser, and Micali (JACM 1986), and their construction is based on length-doubling pseudorandom generators (PRGs) by using the tree-extention technique. Subsequently, Naor and Reingold proposed a construction based on synthesizers (JACM 2004) which can be instantiated from factoring and the Diffie-Hellman assumption. Recently, some efficient constructions were proposed in the post-quantum background. Banerjee, Peikert, and Rosen (Eurocrypt 2012) constructed relatively more efficient PRFs based on “learning with error” (LWE). Soon afterwards, Yu and Steinberger (Eurocrypt 2016) proposed two efficient constructions of randomized PRFs (with public coin as a parameter) from “learning parity with noise” (LPN). In this paper, we construct standard and randomized PRFs via Mersenne prime assumptions which were proposed by Aggarwal et al. (Crypto 2018) as new post-quantum candidate hardness assumptions. In contrast with Yu and Steinberger’s constructions, our first construction could have the same parameters to their second construction but not needs extra public coin and our second construction has a smaller public coin and key size comparing with their first construction.

Keywords

Mersenne prime problem Pseudorandom functions Pseudorandom generators 

Notes

Acknowledgment

The authors would like to thank the anonymous reviewers for their valuable comments and suggestions. This work was partially supported by the National Natural Science Foundation of China (Grant No. 61632013).

References

  1. 1.
    Aggarwal, D., Joux, A., Prakash, A., Santha, M.: A new public-key cryptosystem via mersenne numbers. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO 2018. LNCS, vol. 10993, pp. 459–482. Springer, Cham (2018).  https://doi.org/10.1007/978-3-319-96878-0_16CrossRefGoogle Scholar
  2. 2.
    Bellare, M., Goldreich, O., Krawczyk, H.: Stateless evaluation of pseudorandom functions: security beyond the birthday barrier. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 270–287. Springer, Heidelberg (1999).  https://doi.org/10.1007/3-540-48405-1_17CrossRefGoogle Scholar
  3. 3.
    Banerjee, A., Peikert, C., Rosen, A.: Pseudorandom functions and lattices. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 719–737. Springer, Heidelberg (2012).  https://doi.org/10.1007/978-3-642-29011-4_42CrossRefGoogle Scholar
  4. 4.
    Beunardeau, M., Connolly, A., Géraud, R., Naccache, D.: On the Hardness of the Mersenne Low Hamming Ratio Assumption. Cryptology ePrint Archive: Report 2017/522 (2017)Google Scholar
  5. 5.
    de Boer, K., Ducas, L., Jeffery, S., de Wolf, R.: Attacks on the AJPS mersenne-based cryptosystem. In: Lange, T., Steinwandt, R. (eds.) PQCrypto 2018. LNCS, vol. 10786, pp. 101–120. Springer, Cham (2018).  https://doi.org/10.1007/978-3-319-79063-3_5CrossRefGoogle Scholar
  6. 6.
    Carter, J., Wegman, N.: Universal classes of hash functions. J. Comput. Syst. Sci. 18(2), 143–154 (1979)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Döttling, N., Schröder, D.: Efficient pseudorandom functions via on-the-fly adaptation. In: Gennaro, R., Robshaw, M. (eds.) CRYPTO 2015. LNCS, vol. 9215, pp. 329–350. Springer, Heidelberg (2015).  https://doi.org/10.1007/978-3-662-47989-6_16CrossRefGoogle Scholar
  8. 8.
    Ferradi, H., Xagawa, K.: Post-Quantum Provably-Secure Authentication and MAC from Mersenne Primes. Cryptology ePrint Archive: Report 2019/409 (2019)Google Scholar
  9. 9.
    Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. J. ACM 33(4), 792–807 (1986)MathSciNetCrossRefGoogle Scholar
  10. 10.
    Hoeffding, W.: Probability inequalities for sums of bounded random variables. J. Am. Stat. Assoc. 58(301), 13–30 (1963)MathSciNetCrossRefGoogle Scholar
  11. 11.
    Håstad, J., Impagliazzo, R., Levin, L., Luby, M.: Construction of pseudorandom generator from any one-way function. SIAM J. Comput. 28(4), 1364–1396 (1999)MathSciNetCrossRefGoogle Scholar
  12. 12.
    Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: a ring-based public key cryptosystem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 267–288. Springer, Heidelberg (1998).  https://doi.org/10.1007/BFb0054868CrossRefGoogle Scholar
  13. 13.
    Impagliazzo, R., Zuckerman, D.: To recycle random bits. In: 30th Annual Symposium on Foundations of Computer Science (FOCS 1989), pp. 12–24. IEEE, Research Triangle Park (1989)Google Scholar
  14. 14.
    Impagliazzo, R., Levin, L. A., Luby, M.: Pseudo-random generation from one-way functions. In: 21th Annual ACM Symposium on Theory of Computing (STOC 1989), pp. 12–24. ACM, Seattle (1989)Google Scholar
  15. 15.
    Levin, L.A.: One way functions and pseudorandom generators. Combinatorica 7(4), 357–363 (1987)MathSciNetCrossRefGoogle Scholar
  16. 16.
    Maurer, U.: Indistinguishability of random systems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 110–132. Springer, Heidelberg (2002).  https://doi.org/10.1007/3-540-46035-7_8CrossRefGoogle Scholar
  17. 17.
    Naor, M., Reingold, O.: Synthesizers and their application to the parallel construction of pseudo-random functions. J. Comput. Syst. Sci. 58(2), 336–375 (1999)MathSciNetCrossRefGoogle Scholar
  18. 18.
    Naor, M., Reingold, O., Rosen, A.: Pseudorandom Functions and Factoring. SIAM J. Comput. 31(5), 1383–1404 (2002)MathSciNetCrossRefGoogle Scholar
  19. 19.
    Naor, M., Reingold, O.: Number-theoretic constructions of efficient pseudo-random functions. J. ACM 51(2), 231–262 (2004)MathSciNetCrossRefGoogle Scholar
  20. 20.
    Yu, Y., Steinberger, J.: Pseudorandom functions in almost constant depth from low-noise LPN. In: Fischlin, M., Coron, J.-S. (eds.) EUROCRYPT 2016. LNCS, vol. 9666, pp. 154–183. Springer, Heidelberg (2016).  https://doi.org/10.1007/978-3-662-49896-5_6CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Key Laboratory of Electromagnetic Space Information, Chinese Academy of Sciences, School of Information Science and TechnologyUniversity of Science and Technology of ChinaHefeiChina

Personalised recommendations