메뉴 건너뛰기




Volumn 28, Issue 4, 1999, Pages 1364-1396

Pseudorandom generator from any one-way function

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COMPUTATIONAL METHODS; CRYPTOGRAPHY; FUNCTIONS; STATISTICAL METHODS;

EID: 0345253860     PISSN: 00975397     EISSN: None     Source Type: Journal    
DOI: 10.1137/S0097539793244708     Document Type: Article
Times cited : (1168)

References (47)
  • 1
    • 0023985196 scopus 로고
    • RSA and Rabin functions: Certain parts are as hard as the whole
    • W. ALEXI, B. CHOR, O. GOLDREICH, AND C. P. SCHNORR, RSA and Rabin functions: Certain parts are as hard as the whole, SIAM J. Comput., 17 (1988), pp. 194-209.
    • (1988) SIAM J. Comput. , vol.17 , pp. 194-209
    • Alexi, W.1    Chor, B.2    Goldreich, O.3    Schnorr, C.P.4
  • 2
    • 0001338853 scopus 로고
    • BPP has subexponential time simulations unless EXPTIME has publishable proofs
    • L. BABAI, L. FORTNOW, N. NISAN, AND A. WIGDERSON, BPP has subexponential time simulations unless EXPTIME has publishable proofs, Comput. Complexity, 3 (1993), pp. 307-318.
    • (1993) Comput. Complexity , vol.3 , pp. 307-318
    • Babai, L.1    Fortnow, L.2    Nisan, N.3    Wigderson, A.4
  • 3
    • 0023985539 scopus 로고
    • Privacy amplification by public discussion
    • C. H. BENNETT, G. BRASSARD, AND J.-M. ROBERT, Privacy amplification by public discussion, SIAM J. Comput., 17 (1988), pp. 210-229.
    • (1988) SIAM J. Comput. , vol.17 , pp. 210-229
    • Bennett, C.H.1    Brassard, G.2    Robert, J.-M.3
  • 4
    • 51249178917 scopus 로고
    • Independent unbiased coin flips from a correlated biased source - A finite state Markov chain
    • M. BLUM, Independent unbiased coin flips from a correlated biased source - a finite state Markov chain, Combinatoria, 6 (1986), pp. 97-108.
    • (1986) Combinatoria , vol.6 , pp. 97-108
    • Blum, M.1
  • 5
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudo-random bits
    • M. BLUM AND S. MICALI, How to generate cryptographically strong sequences of pseudo-random bits, SIAM J. Comput., 13 (1984), pp. 850-864.
    • (1984) SIAM J. Comput. , vol.13 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 6
    • 0037708071 scopus 로고
    • Pseudo-random generators and complexity classes
    • S. Micali, ed., JAI Press, Greenwich, CT
    • R. BOPPANA AND R. HIRSCHFELD, Pseudo-random generators and complexity classes, in Advances in Comp. Research 5, S. Micali, ed., JAI Press, Greenwich, CT, 1989, pp. 1-26.
    • (1989) Advances in Comp. Research , vol.5 , pp. 1-26
    • Boppana, R.1    Hirschfeld, R.2
  • 7
    • 0024303956 scopus 로고
    • Inferring sequences produced by pseudo-random number generators
    • J. BOYAR, Inferring sequences produced by pseudo-random number generators, J. Assoc. Comput. Mach., 36 (1989), pp. 129-141.
    • (1989) J. Assoc. Comput. Mach. , vol.36 , pp. 129-141
    • Boyar, J.1
  • 8
    • 0018456171 scopus 로고
    • Universal classes of hash functions
    • L. CARTER AND M. WEGMAN, Universal classes of hash functions, J. Comput. System Sci., 18 (1979), pp. 143-154.
    • (1979) J. Comput. System Sci. , vol.18 , pp. 143-154
    • Carter, L.1    Wegman, M.2
  • 9
    • 0023985259 scopus 로고
    • Unbiased bits from sources of weak randomness and probabilistic communication complex
    • B. CHOR AND O. GOLDREICH, Unbiased bits from sources of weak randomness and probabilistic communication complex, SIAM J. Comput., 17 (1988), pp. 230-261.
    • (1988) SIAM J. Comput. , vol.17 , pp. 230-261
    • Chor, B.1    Goldreich, O.2
  • 11
    • 0025430107 scopus 로고
    • A note on computational indistinguishability
    • O. GOLDREICH, A note on computational indistinguishability, Inform. Process. Lett., 34 (1990), pp. 277-281.
    • (1990) Inform. Process. Lett. , vol.34 , pp. 277-281
    • Goldreich, O.1
  • 13
    • 0027797493 scopus 로고
    • On the existence of pseudorandom generators
    • O. GOLDREICH, H. KRAWCZYK, AND M. LUBY, On the existence of pseudorandom generators, SIAM J. Comput., 22 (1993), pp. 1163-1175.
    • (1993) SIAM J. Comput. , vol.22 , pp. 1163-1175
    • Goldreich, O.1    Krawczyk, H.2    Luby, M.3
  • 15
    • 71149116146 scopus 로고
    • Proofs that yield nothing but their validity, or all languages in NP have zero-knowledge proofs
    • O. GOLDREICH, S. MICALI, AND A. WIGDERSON, Proofs that yield nothing but their validity, or all languages in NP have zero-knowledge proofs, J. Assoc. Comput. Mach., 38 (1991), pp. 691-729.
    • (1991) J. Assoc. Comput. Mach. , vol.38 , pp. 691-729
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 17
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof systems
    • S. GOLDWASSER, S. MICALI, AND C. RACKOFF, The knowledge complexity of interactive proof systems, SIAM J. Comput., 18 (1989), pp. 186-208.
    • (1989) SIAM J. Comput. , vol.18 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 19
    • 0025115363 scopus 로고
    • Pseudo-random generators under uniform assumptions
    • ACM, New York
    • J. HÅSTAD, Pseudo-random generators under uniform assumptions, in Proc. 22nd ACM Sympos. on Theory of Computing, ACM, New York, 1990, pp. 395-404.
    • (1990) Proc. 22nd ACM Sympos. on Theory of Computing , pp. 395-404
    • Håstad, J.1
  • 20
    • 0345352219 scopus 로고
    • Public randomness in cryptography
    • Advances in Cryptology, Proc. 12th Annual Cryptology Conf. (CRYPTO '92), Santa Barbara, CA, 1992, Springer-Verlag, Berlin
    • A. HERZBERG AND M. LUBY, Public randomness in cryptography, in Advances in Cryptology, Proc. 12th Annual Cryptology Conf. (CRYPTO '92), Santa Barbara, CA, 1992, Lecture Notes in Comput. Sci. 740, Springer-Verlag, Berlin, 1993, pp. 421-432.
    • (1993) Lecture Notes in Comput. Sci. , vol.740 , pp. 421-432
    • Herzberg, A.1    Luby, M.2
  • 21
    • 0024770898 scopus 로고
    • One-way functions are essential for information based cryptography
    • IEEE, New York
    • R. IMPAGLIAZZO AND M. LUBY, One-way functions are essential for information based cryptography, in Proc. 30th IEEE Sympos. on Found. of Comput. Sci., IEEE, New York, 1989, pp. 230-235.
    • (1989) Proc. 30th IEEE Sympos. on Found. of Comput. Sci. , pp. 230-235
    • Impagliazzo, R.1    Luby, M.2
  • 23
    • 0001143795 scopus 로고    scopus 로고
    • Efficient cryptographic schemes provably as secure as subset sum
    • R. IMPAGLIAZZO AND M. NAOR, Efficient cryptographic schemes provably as secure as subset sum, J. Cryptology, 9 (1996), pp. 192-216.
    • (1996) J. Cryptology , vol.9 , pp. 192-216
    • Impagliazzo, R.1    Naor, M.2
  • 24
    • 0024866742 scopus 로고
    • Limits on the provable consequences of one-way functions
    • ACM, New York
    • R. IMPAGLIAZZO AND S. RUDICH, Limits on the provable consequences of one-way functions, in 21st ACM Sympos. on Theory of Computing, ACM, New York, 1989, pp. 44-56.
    • (1989) 21st ACM Sympos. on Theory of Computing , pp. 44-56
    • Impagliazzo, R.1    Rudich, S.2
  • 27
    • 0001902056 scopus 로고
    • Three approaches to the concept of the amount of information
    • A. N. KOLMOGOROV, Three approaches to the concept of the amount of information, Problems Inform Transmission, 1 (1965), pp. 1-7.
    • (1965) Problems Inform Transmission , vol.1 , pp. 1-7
    • Kolmogorov, A.N.1
  • 28
    • 0012168966 scopus 로고
    • How to predict congruential generators
    • H. KRAWCZYK, How to predict congruential generators, J. Algorithms, 13 (1992), pp. 527-545.
    • (1992) J. Algorithms , vol.13 , pp. 527-545
    • Krawczyk, H.1
  • 29
    • 51249173191 scopus 로고
    • One-way function and pseudorandom generators
    • L. A. LEVIN, One-way function and pseudorandom generators, Combinatorica, 7 (1987), pp. 357-363.
    • (1987) Combinatorica , vol.7 , pp. 357-363
    • Levin, L.A.1
  • 30
    • 0042496106 scopus 로고
    • Randomness and non-determinism
    • L. A. LEVIN, Randomness and non-determinism, J. Symbolic Logic, 58 (1993), pp.1102-1103.
    • (1993) J. Symbolic Logic , vol.58 , pp. 1102-1103
    • Levin, L.A.1
  • 31
    • 0344920896 scopus 로고    scopus 로고
    • Pseudorandomness and Cryptographic Applications
    • Princeton University Press, Princeton, NJ
    • M. LUBY, Pseudorandomness and Cryptographic Applications, Princeton Computer Science Notes, Princeton University Press, Princeton, NJ, 1996.
    • (1996) Princeton Computer Science Notes
    • Luby, M.1
  • 32
    • 0023984964 scopus 로고
    • How to construct pseudorandom permutations from pseudorandom functions
    • M. LUBY AND C. RACKOFF, How to construct pseudorandom permutations from pseudorandom functions, SIAM J. Comput., 17 (1988), pp. 373-386.
    • (1988) SIAM J. Comput. , vol.17 , pp. 373-386
    • Luby, M.1    Rackoff, C.2
  • 33
    • 0002448405 scopus 로고
    • A Public Key Cryptosystem Based on Algebraic Coding Theory
    • Jet Propulsion Laboratory, California Institute of Technology, Pasadena, CA
    • R. J. MCELIECE, A Public Key Cryptosystem Based on Algebraic Coding Theory, DSN Progress report, Jet Propulsion Laboratory, California Institute of Technology, Pasadena, CA, 1978.
    • (1978) DSN Progress Report
    • Mceliece, R.J.1
  • 34
    • 0344920890 scopus 로고
    • Cryptography Using Weak Sources of Randomness
    • University of Toronto
    • J. MCINNES, Cryptography Using Weak Sources of Randomness, Tech. report 194/87, University of Toronto, 1987.
    • (1987) Tech. Report 194/87
    • Mcinnes, J.1
  • 36
    • 0001448484 scopus 로고
    • Bit commitment using pseudorandom generators
    • M. NAOR, Bit commitment using pseudorandom generators, J. Cryptology, 4 (1991), pp. 151-158.
    • (1991) J. Cryptology , vol.4 , pp. 151-158
    • Naor, M.1
  • 37
    • 0024867751 scopus 로고
    • Universal one-way hash functions and their applications
    • ACM, New York
    • M. NAOR AND M. YUNG, Universal one-way hash functions and their applications, in Proc. 21st ACM Sympos. on Theory of Computing, ACM, New York, 1989, pp. 33-43.
    • (1989) Proc. 21st ACM Sympos. on Theory of Computing , pp. 33-43
    • Naor, M.1    Yung, M.2
  • 38
    • 0008519096 scopus 로고
    • One-way functions are essential for non-trivial zero-knowledge
    • IEEE Computer Society Press, Los Alamitos, CA
    • R. OSTROVSKY AND A. WIGDERSON, One-way functions are essential for non-trivial zero-knowledge, in Proc. 2nd Israel Sympos. on the Theory of Computing and Systems, IEEE Computer Society Press, Los Alamitos, CA, 1993, pp. 3-17.
    • (1993) Proc. 2nd Israel Sympos. on the Theory of Computing and Systems , pp. 3-17
    • Ostrovsky, R.1    Wigderson, A.2
  • 40
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. RIVEST, A. SHAMIR, AND L. ADLEMAN, A method for obtaining digital signatures and public-key cryptosystems, Comm. ACM, 21 (1978), pp. 120-126.
    • (1978) Comm. ACM , vol.21 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 41
    • 0025152622 scopus 로고
    • One-way functions are necessary and sufficient for secure signatures
    • ACM, New York
    • J. ROMPEL, One-way functions are necessary and sufficient for secure signatures, in Proc. 22nd ACM Sympos. on Theory of Computing, ACM, New York, 1990, pp. 387-394.
    • (1990) Proc. 22nd ACM Sympos. on Theory of Computing , pp. 387-394
    • Rompel, J.1
  • 42
    • 0021469810 scopus 로고
    • Generating quasi-random sequences from slightly-random sources
    • M. SANTHA AND U. VAZIRANI, Generating quasi-random sequences from slightly-random sources, J. Comput. System Sci., 33 (1986), pp. 75-87.
    • (1986) J. Comput. System Sci. , vol.33 , pp. 75-87
    • Santha, M.1    Vazirani, U.2
  • 43
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • C. SHANNON, A mathematical theory of communication, Bell System Tech. J., 27 (1948), pp. 379-423; 623-656.
    • (1948) Bell System Tech. J. , vol.27 , pp. 379-423
    • Shannon, C.1
  • 44
    • 0020931594 scopus 로고
    • A complexity theoretic approach to randomness
    • ACM New York
    • M. SIPSER, A complexity theoretic approach to randomness, in Proc. 15th ACM Sympos. on Theory of Computing, ACM New York, 1983, pp. 330-335.
    • (1983) Proc. 15th ACM Sympos. on Theory of Computing , pp. 330-335
    • Sipser, M.1
  • 45
    • 51249175241 scopus 로고
    • Towards a strong communication complexity theory or generating quasi-random sequences from two communicating slightly-random sources
    • U. VAZIRANI, Towards a strong communication complexity theory or generating quasi-random sequences from two communicating slightly-random sources, Combinatorica, 7 (1987), pp. 375-392.
    • (1987) Combinatorica , vol.7 , pp. 375-392
    • Vazirani, U.1
  • 46
    • 0022252339 scopus 로고
    • Random polynomial time is equal to slightly-random polynomial time
    • IEEE, New York
    • U. VAZIRANI AND V. VAZIRANI, Random polynomial time is equal to slightly-random polynomial time, in Proc. 26th IEEE Sympos. on Found. of Comput. Sci., IEEE, New York, 1985, pp. 417-428.
    • (1985) Proc. 26th IEEE Sympos. on Found. of Comput. Sci. , pp. 417-428
    • Vazirani, U.1    Vazirani, V.2
  • 47


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.