Candidate weak pseudorandom functions in AC0 · MOD2

Adi Akavia, Andrej Bogdanov, Siyao Guo, Akshay Kamath, Alon Rosen

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Pseudorandom functions (PRFs) play a fundamental role in symmetric-key cryptography. However, they are inherently complex and cannot be implemented in the class AC0(MOD2). Weak pseudorandom functions (weak PRFs) do not suffer from this complexity limitation, yet they suffice for many cryptographic applications. We study the minimal complexity requirements for constructing weak PRFs. To this end • We conjecture that the function family FA (x) = g (Ax), where A is a random square GF(2) matrix and g is a carefully chosen function of constant depth, is a weak PRF. In support of our conjecture, we show that functions in this family are inapproximable by GF(2) polynomials of low degree and do not correlate with any fixed Boolean function family of subexponential size. • We study the class AC0 · MOD2 that captures the complexity of our construction. We conjecture that all functions in this class have a Fourier coefficient of magnitude exp(-poly log n) and prove this conjecture in the case when the MOD2 function is typical. • We investigate the relation between the hardness of learning noisy parities and the existence of weak PRFs in AC0 · MOD2. We argue that such a complexity-driven approach can play a role in bridging the gap between the theory and practice of cryptography.

Original languageEnglish
Title of host publicationITCS 2014 - Proceedings of the 2014 Conference on Innovations in Theoretical Computer Science
PublisherAssociation for Computing Machinery
Pages251-259
Number of pages9
ISBN (Print)9781450322430
DOIs
StatePublished - 2014
Externally publishedYes
Event2014 5th Conference on Innovations in Theoretical Computer Science, ITCS 2014 - Princeton, NJ, United States
Duration: 12 Jan 201414 Jan 2014

Publication series

NameITCS 2014 - Proceedings of the 2014 Conference on Innovations in Theoretical Computer Science

Conference

Conference2014 5th Conference on Innovations in Theoretical Computer Science, ITCS 2014
Country/TerritoryUnited States
CityPrinceton, NJ
Period12/01/1414/01/14

Keywords

  • Learning Parity with Noise
  • Parallel Cryptography
  • Weak Pseudorandom Functions

ASJC Scopus subject areas

  • Computational Theory and Mathematics

Fingerprint

Dive into the research topics of 'Candidate weak pseudorandom functions in AC0 · MOD2'. Together they form a unique fingerprint.

Cite this