Hard-core Predicate
   HOME

TheInfoList



OR:

In
cryptography Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adver ...
, a hard-core predicate of a
one-way function In computer science, a one-way function is a function that is easy to compute on every input, but hard to invert given the image of a random input. Here, "easy" and "hard" are to be understood in the sense of computational complexity theory, spe ...
''f'' is a
predicate Predicate or predication may refer to: * Predicate (grammar), in linguistics * Predication (philosophy) * several closely related uses in mathematics and formal logic: **Predicate (mathematical logic) **Propositional function **Finitary relation, o ...
''b'' (i.e., a function whose output is a single bit) which is easy to compute (as a function of ''x'') but is hard to compute given ''f(x)''. In formal terms, there is no probabilistic polynomial-time (PPT) algorithm that computes ''b(x)'' from ''f(x)'' with probability significantly greater than one half over random choice of ''x''. Goldwasser, S. and Bellare, M.br>"Lecture Notes on Cryptography"
. Summer course on cryptography, MIT, 1996-2001
In other words, if ''x'' is drawn uniformly at random, then given ''f(x)'', any PPT adversary can only distinguish the hard-core bit ''b(x)'' and a uniformly random bit with negligible advantage over the length of ''x''. A hard-core function can be defined similarly. That is, if ''x'' is chosen uniformly at random, then given ''f(x)'', any PPT algorithm can only distinguish the hard-core function value ''h(x)'' and uniformly random bits of length '', h(x), '' with negligible advantage over the length of ''x''. A hard-core predicate captures "in a concentrated sense" the hardness of inverting ''f''. While a one-way function is hard to invert, there are no guarantees about the feasibility of computing partial information about the
preimage In mathematics, the image of a function is the set of all output values it may produce. More generally, evaluating a given function f at each element of a given subset A of its domain produces a set, called the "image of A under (or through) ...
''c'' from the image ''f(x)''. For instance, while RSA is conjectured to be a one-way function, the
Jacobi symbol Jacobi symbol for various ''k'' (along top) and ''n'' (along left side). Only are shown, since due to rule (2) below any other ''k'' can be reduced modulo ''n''. Quadratic residues are highlighted in yellow — note that no entry with a ...
of the preimage can be easily computed from that of the image. It is clear that if a
one-to-one function In mathematics, an injective function (also known as injection, or one-to-one function) is a function that maps distinct elements of its domain to distinct elements; that is, implies . (Equivalently, implies in the equivalent contrapositiv ...
has a hard-core predicate, then it must be one way.
Oded Goldreich Oded Goldreich ( he, עודד גולדרייך; b. 1957) is a professor of Computer Science at the Faculty of Mathematics and Computer Science of Weizmann Institute of Science, Israel. His research interests lie within the theory of computation ...
and
Leonid Levin Leonid Anatolievich Levin ( ; russian: Леони́д Анато́льевич Ле́вин; uk, Леоні́д Анато́лійович Ле́він; born November 2, 1948) is a Soviet-American mathematician and computer scientist. He is kn ...
(1989) showed how every one-way function can be trivially modified to obtain a one-way function that has a specific hard-core predicate.O. Goldreich and L.A. Levin
A Hard-Core Predicate for all One-Way Functions
STOC 1989, pp25–32.
Let ''f'' be a one-way function. Define ''g(x,r) = (f(x), r)'' where the length of ''r'' is the same as that of ''x''. Let ''xj'' denote the ''j''th bit of ''x'' and ''rj'' the ''j''th bit of ''r''. Then b(x,r) := \langle x, r\rangle = \bigoplus_j x_j r_j is a hard core predicate of ''g''. Note that ''b(x, r)'' = <''x, r''> where <·, ·> denotes the standard
inner product In mathematics, an inner product space (or, rarely, a Hausdorff space, Hausdorff pre-Hilbert space) is a real vector space or a complex vector space with an operation (mathematics), operation called an inner product. The inner product of two ve ...
on the
vector space In mathematics and physics, a vector space (also called a linear space) is a set whose elements, often called ''vectors'', may be added together and multiplied ("scaled") by numbers called '' scalars''. Scalars are often real numbers, but can ...
(Z2)''n''. This predicate is hard-core due to computational issues; that is, it is not hard to compute because ''g(x, r)'' is information theoretically lossy. Rather, if there exists an algorithm that computes this predicate efficiently, then there is another algorithm that can invert ''f'' efficiently. A similar construction yields a hard-core function with ''O(log , x, )'' output bits. Suppose ''f'' is a strong one-way function. Define ''g(x, r)'' = ''(f(x), r)'' where , ''r'', = 2, ''x'', . Choose a length function ''l(n)'' = ''O(log n)'' s.t. ''l(n)'' ≤ ''n''. Let b_i(x, r) = \bigoplus_j x_j r_. Then ''h(x, r)'' := ''b1(x, r) b2(x, r) ... bl(, x, )(x, r)'' is a hard-core function with output length ''l(, x, )''.Goldreich's FoC, vol 1, Theorem 2.5.6. It is sometimes the case that an actual bit of the input ''x'' is hard-core. For example, every single bit of inputs to the RSA function is a hard-core predicate of RSA and blocks of ''O(log , x, )'' bits of ''x'' are indistinguishable from random bit strings in polynomial time (under the assumption that the RSA function is hard to invert). J. Håstad, M. Naslund
The Security of all RSA and Discrete Log Bits (2004)
Journal of the ACM, 2004.
Hard-core predicates give a way to construct a
pseudorandom generator In theoretical computer science and cryptography, a pseudorandom generator (PRG) for a class of statistical tests is a deterministic procedure that maps a random seed to a longer pseudorandom string such that no statistical test in the class ca ...
from any
one-way permutation In computer science, a one-way function is a function that is easy to compute on every input, but hard to invert given the image of a random input. Here, "easy" and "hard" are to be understood in the sense of computational complexity theory, spe ...
. If ''b'' is a hard-core predicate of a one-way permutation ''f'', and ''s'' is a random seed, then \_n is a pseudorandom bit sequence, where ''fn'' means the n-th iteration of applying ''f'' on ''s'', and ''b'' is the generated hard-core bit by each round ''n''. Hard-core predicates of trapdoor one-way permutations (known as trapdoor predicates) can be used to construct
semantically secure In cryptography, a semantically secure cryptosystem is one where only negligible information about the plaintext can be feasibly extracted from the ciphertext. Specifically, any probabilistic, polynomial-time algorithm (PPTA) that is given the cip ...
public-key encryption schemes.


See also

*
List-decoding In coding theory, list decoding is an alternative to unique decoding of error-correcting codes for large error rates. The notion was proposed by Elias in the 1950s. The main idea behind list decoding is that the decoding algorithm instead of outpu ...
(describes list decoding; the core of the Goldreich-Levin construction of hard-core predicates from one-way functions can be viewed as an algorithm for list-decoding the
Hadamard code The Hadamard code is an error-correcting code named after Jacques Hadamard that is used for error detection and correction when transmitting messages over very noisy or unreliable channels. In 1971, the code was used to transmit photos of Mar ...
).


References

* Oded Goldreich, ''Foundations of Cryptography vol 1: Basic Tools'', Cambridge University Press, 2001. {{DEFAULTSORT:Hard-Core Predicate Pseudorandomness Theory of cryptography