How to construct random functions

Type: Article
Publication Date: 1986-08-10
Citations: 2091
DOI: https://doi.org/10.1145/6490.6503

Abstract

A constructive theory of randomness for functions, based on computational complexity, is developed, and a pseudorandom function generator is presented. This generator is a deterministic polynomial-time algorithm that transforms pairs ( g , r ), where g is any one-way function and r is a random k -bit string, to polynomial-time computable functions ƒ r : {1, … , 2 k } → {1, … , 2 k }. These ƒ r 's cannot be distinguished from random functions by any probabilistic polynomial-time algorithm that asks and receives the value of a function at arguments of its choice. The result has applications in cryptography, random constructions, and complexity theory.

Locations

Ask a Question About This Paper

Summary

Login to see paper summary

Similar Works

Action Title Date Authors
How to construct random functions 2019-10-09 Oded Goldreich Shafi Goldwasser Silvio Micali
+
Pseudorandomness 2012-01-01 Salil Vadhan
+
Theory and application of trapdoor functions 1982-11-01 Andrew Chi-Chih Yao
+
Theory and application of trapdoor functions 1982-11-03 Andrew Chi-Chih Yao
+
Lower Bounds on Constructions of Pseudorandom Generators from One-way Functions 2011-01-01 Makrand Sinha
+
On the Existence of Pseudorandom Generators 1993-12-01 Oded Goldreich Hugo Krawczyk Michael Luby
+
One-way functions and pseudo-random generators 2004-01-01
+
On the different notions of pseudorandomness 2008-08-20 Markus Maucher Uwe Schöning Hans A. Kestler
+
How to Generate Cryptographically Strong Sequences of Pseudorandom Bits 1984-11-01 Manuel Blum Silvio Micali
Randomness in algorithm design 2013-12-16 Shuji Kijima
Pseudorandomness and Combinatorial Constructions 2006-01-01 Luca Trevisan
+
Pseudorandomness and combinatorial constructions 2007-05-15 Luca Trevisan
Special issue from RANDOM’09: Editors’ Foreword 2012-02-03 Oded Goldreich Salil Vadhan
+
A Suvey of Randomness and Randomness Extractors 2009-01-01 Chuanjun Zhang
Pseudorandom Strings from Pseudorandom Quantum States 2023-01-01 Prabhanjan Ananth Yao-Ting Lin Henry Yuen
Pseudo-Deterministic One-Way Functions from Pseudorandom States 2023-01-01 Mohammed Barhoush Louis Salvail
Pseudorandom Generators 1999-01-01 Oded Goldreich
+
Cryptology and number sequences: Pseudorandom, random, and perfectly random 1984-02-01 Sig Porter
None 2022-01-01 Maya Leshkowitz
Uses of randomness in computation 2010-01-01 Richard P. Brent

Cited by (40)

Action Title Date Authors
How to construct random functions 2019-10-09 Oded Goldreich Shafi Goldwasser Silvio Micali
+
A Framework for Unique Ring Signatures. 2012-01-01 Matthew Franklin Haibin Zhang
+
Random Walks and Rapid Mixing 2011-08-11 Cristopher Moore Stephan Mertens
+
On the Existence of Pseudorandom Generators 1993-12-01 Oded Goldreich Hugo Krawczyk Michael Luby
An Average Case NP-complete Graph Problem 2001-12-02 Leonid A. Levin Ramarathnam Venkatesan
+
Random instances of a graph coloring problem are hard 1988-01-01 Ramarathnam Venkatesan Leonid A. Levin
+
Deja Q: Using Dual Systems to Revisit q-Type Assumptions. 2014-01-01 Melissa Chase Sarah Meiklejohn
+
How to Construct Pseudorandom Permutations from Single Pseudorandom Functions 1991-01-01 Josef Pieprzyk
Déjà Q: Using Dual Systems to Revisit q-Type Assumptions 2014-01-01 Melissa Chase Sarah Meiklejohn
Efficiently Constructible Huge Graphs That Preserve First Order Properties of Random Graphs 2005-01-01 Moni Naor Asaf Nussboim Eran Tromer
+
The Grand Unified Theory of Computation 2011-08-11 Moore Cristopher
+
A Uniform Min-Max Theorem and Characterizations of Computational Randomness 2014-02-25 Jia Zheng
Distributed Random Beacon for Blockchain Based on Share Recovery Threshold Signature 2022-08-11 Yan Bo Zhu Bingyu Li Yang Yang Zhenyang Ding Haibing Zheng Guangyu He Shengjie Hou
+
Optimization and Approximation 2011-08-11 Cristopher Moore Stephan Mertens
+
Simulatable VRFs with Applications to Multi-theorem NIZK 2007-08-09 Melissa Chase Anna Lysyanskaya
+
Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity 2021-06-05 Atsushi Takayasu
+
Prologue 2011-08-11 Cristopher Moore Stephan Mertens
+
Pseudorandom sources for BPP 1988-01-01 Jack H. Lutz
+
Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation 2017-01-01 Elette Boyle Niv Gilboa Yuval Ishai
+
None 2006-06-12
Local Access to Sparse Connected Subgraphs Via Edge Sampling. 2020-07-10 Rogers Epstein
+
Bounded-concurrent secure two-party computation without setup assumptions 2003-06-09 Yehuda Lindell
+
Preface 2011-08-11
+
Dedication 2011-08-11
+
Copyright Page 2011-08-11
Hidden Cosets and Applications to Unclonable Cryptography 2021-07-12 Andrea Coladangelo Jiahui Liu Qipeng Liu Mark Zhandry
+
A low-time-consumption image encryption combining 2D parametric Pascal matrix chaotic system and elementary operation 2024-08-28 Jun Lu Jiaxin Zhang Dezhi An Dawei Hao X. Ren Ruoyu Zhao
+
Almost everywhere high nonuniform complexity 1992-04-01 Jack H. Lutz
+
Counting, Sampling, and Statistical Physics 2011-08-11 Cristopher Moore Stephan Mertens
Role of Information and its Processing in Statistical Analysis 2017-01-01 Bryce Kim
+
Mathematical Tools 2011-08-11
+
Figure Credits 2011-08-11
Pairwise Independence and Derandomization 2005-01-01 Michael Luby Avi Wigderson
+
Super-bits, demi-bits, and NP/qpoly-natural proofs 1997-01-01 Steven Rudich
+
One-Round Secure Computation and Secure Autonomous Mobile Agents 2000-01-01 Christian Cachin Jan Camenisch Joe Kilian Joy MĂĽller
+
Proxy and Threshold One-Time Signatures 2003-01-01 Mohamed Al-Ibrahim Anton ÄŚernĂ˝
+
Impossibility and Optimality Results on Constructing Pseudorandom Permutations 2007-11-15 Yuliang Zheng Tsutomu Matsumoto Hideki Imai
+
The GGM Construction does NOT yield Correlation Intractable Function Ensembles. 2002-01-01 Oded Goldreich
+
On Function Description. 2020-02-19 Rade Vuckovac
Why Philosophers Should Care about Computational Complexity 2013-06-07 Scott Aaronson