Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
More precisely, each input is connected to an output with probability d/n and so the expected degree is d.
- 2.
Sample a matrix from ℳ a,b,p conditioned on the event that none of the columns is an all-zero column (a task which can be achieved efficiently by rejecting and resampling zero columns), and fail it if the resulting matrix has a row of weight larger than logn. To see that rejection happens with negligible probability, observe that for a fixed row, each column contributes 1 with probability p/(1−p)a=Θ(1/n), independently of the other columns, and therefore, by a Chernoff bound, the weight exceeds logn with negligible probability.
- 3.
Another line of work studied the pseudorandomness of the collection. See Sect. 7.6.
References
Alekhnovich, M., Hirsch, E.A., Itsykson, D.: Exponential lower bounds for the running time of DPLL algorithms on satisfiable formulas. J. Autom. Reason. 35(1–3), 51–72 (2005)
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: Proc. of 20th STOC, pp. 1–10 (1988)
Bogdanov, A., Qiao, Y.: On the security of Goldreich’s one-way function. In: Proc. of 13th RANDOM, pp. 392–405 (2009)
Bogdanov, A., Rosen, A.: Input locality and hardness amplification. In: Proc. of 8th TCC, pp. 1–18 (2011)
Cook, J., Etesami, O., Miller, R., Trevisan, L.: Goldreich’s one-way function candidate and myopic backtracking algorithms. In: Proc. of 6th TCC, pp. 521–538 (2009). Full version in ECCC TR12-175
Dinur, I., Finucane, H.: Cryptography with locality two. Unpublished manuscript (2011)
Goldreich, O.: Candidate one-way functions based on expander graphs. Electron. Colloq. Comput. Complex. 7, 090 (2000)
Goldreich, O.: Foundations of Cryptography: Basic Tools. Cambridge University Press, Cambridge (2001)
Impagliazzo, R., Luby, M.: One-way functions are essential for complexity based cryptography. In: Proc. of 30th FOCS, pp. 230–235 (1989)
Ishai, Y., Kushilevitz, E.: Randomizing polynomials: a new representation with applications to round-efficient secure computation. In: Proc. of 41st FOCS, pp. 294–304 (2000)
Panjwani, S.K.: An experimental evaluation of Goldreich’s one-way function. Technical report, IIT, Bombay (2001). http://www.wisdom.weizmann.ac.il/~oded/PS/ow-report.ps
Yao, A.C.: Theory and application of trapdoor functions. In: Proc. of 23rd FOCS, pp. 80–91 (1982)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Applebaum, B. (2014). One-Way Functions with Optimal Output Locality. In: Cryptography in Constant Parallel Time. Information Security and Cryptography. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17367-7_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-17367-7_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17366-0
Online ISBN: 978-3-642-17367-7
eBook Packages: Computer ScienceComputer Science (R0)