Skip to main content

Abstract

Goldreich (ECCC 2000) suggested a simple construction of a candidate one-way function f: {0,1}n → {0,1}m where each bit of output is a fixed predicate P of a constant number d of (random) input bits. We investigate the security of this construction in the regime m = Dn, where D(d) is a sufficiently large constant. We prove that for any predicate P that correlates with either one or two of its variables, f can be inverted with high probability.

We also prove an amplification claim regarding Goldreich’s construction. Suppose we are given an assignment x′ ∈ {0,1}n that has correlation ε > 0 with the hidden assignment x ∈ {0,1}n. Then, given access to x′, it is possible to invert f on x with high probability, provided D = D(d, ε) is sufficiently large.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Applebaum, B., Ishai, Y., Kushilevitz, E.: Cryptography in NC0. In: Proceedings of the 45th Annual Symposium on Foundations of Computer Science, pp. 166–175 (2004)

    Google Scholar 

  2. Applebaum, B., Ishai, Y., Kushilevitz, E.: On pseudorandom generators with linear stretch in NC0. In: Díaz, J., Jansen, K., Rolim, J.D.P., Zwick, U. (eds.) APPROX 2006 and RANDOM 2006. LNCS, vol. 4110, pp. 260–271. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  3. Braverman, M.: Polylogarithmic independence fools AC0. Technical Report TR09-011, Electronic Colloquium on Computational Complexity (ECCC) (2009)

    Google Scholar 

  4. Cook, J., Etesami, O., Miller, R., Trevisan, L.: Goldreich’s one-way function candidate and myopic backtracking algorithms. In: Proceedings of the 6th Theory of Cryptography Conference (TCC), pp. 521–538 (2009)

    Google Scholar 

  5. Coja-Oghlan, A.: An adaptive spectral heuristic for partitioning random graphs. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4051, pp. 691–702. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  6. Flaxman, A.: A spectral technique for random satisfiable 3CNF formulas. In: SODA 2003: Proceedings of the fourteenth annual ACM-SIAM symposium on Discrete algorithms, Baltimore, Maryland, pp. 357–363 (2003)

    Google Scholar 

  7. Goldreich, O.: Candidate one-way functions based on expander graphs. Technical Report TR00-090, Electronic Colloquium on Computational Complexity (ECCC) (2000)

    Google Scholar 

  8. Krivelevich, M., Vilenchik, D.: Solving random satisfiable 3CNF formulas in expected polynomial time. In: SODA 2006: Proceedings of the seventeenth annual ACM-SIAM symposium on discrete algorithms, pp. 454–463. ACM Press, New York (2006)

    Chapter  Google Scholar 

  9. Linial, N., Nisan, N.: Approximate inclusion-exclusion. Combinatorica 10(4), 349–365 (1990)

    Article  MathSciNet  MATH  Google Scholar 

  10. Mossel, E., Shpilka, A., Trevisan, L.: On ε-biased generators in NC0. In: Proceedings of the 44th Annual Symposium on Foundations of Computer Science, pp. 136–145 (2003)

    Google Scholar 

  11. Schmidt, J.P., Shamir, E.: Component structure in the evolution of random hypergraphs. Combinatorica 5(1), 81–94 (1985)

    Article  MathSciNet  MATH  Google Scholar 

  12. Vilenchik, D.: It’s all about the support: a new perspective on the satisfiability problem. Journal on Satisfiability, Boolean Modeling, and Computation 3, 125–139 (2007)

    MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bogdanov, A., Qiao, Y. (2009). On the Security of Goldreich’s One-Way Function. In: Dinur, I., Jansen, K., Naor, J., Rolim, J. (eds) Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques. APPROX RANDOM 2009 2009. Lecture Notes in Computer Science, vol 5687. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03685-9_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03685-9_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03684-2

  • Online ISBN: 978-3-642-03685-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics