2014 IEEE 29th Conference on Computational Complexity (CCC) 2014
DOI: 10.1109/ccc.2014.9
|View full text |Cite
|
Sign up to set email alerts
|

Goldreich's PRG: Evidence for Near-Optimal Polynomial Stretch

Abstract: Abstract-Furthering the study of cryptography in NC 0 , we give new evidence for the security of Goldreich's candidate pseudorandom generator with near-optimal, polynomial stretch. Our evidence consists both of security against subexponential-time F2-linear attacks as well as subexponential-time attacks using SDP hierarchies such as Sherali-Adams + and Lasserre/Parrilo. More specifically, instantiating Goldreich's generator with the predicate P (x1, . . . , x5) = x1+x2+x3+x4x5 (mod 2) we get a candidate 5-loca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

3
32
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 41 publications
(35 citation statements)
references
References 33 publications
3
32
0
Order By: Relevance
“…Similar bounds were proven by Feldman, Perkins and Vempala [30] for a wide family of statistical algorithms [29,36]. Interestingly, the results of [39] and [30] are tight since algorithms from the corresponding classes can break pseudorandomness when the resiliency is smaller than 2s − 1.…”
Section: How To Choose a Hard Predicate?supporting
confidence: 69%
See 4 more Smart Citations
“…Similar bounds were proven by Feldman, Perkins and Vempala [30] for a wide family of statistical algorithms [29,36]. Interestingly, the results of [39] and [30] are tight since algorithms from the corresponding classes can break pseudorandomness when the resiliency is smaller than 2s − 1.…”
Section: How To Choose a Hard Predicate?supporting
confidence: 69%
“…In light of this, it is natural to conjecture that high resiliency defeats all attacks except for Gaussian elimination. Indeed, such views were taken by several researchers [30,39] (see also [11] for a similar conjecture in a related context). In particular, it was suggested that s-pseudorandomness is achieved by any predicate with sufficiently large resiliency k = k(s) and sufficiently large algebraic degree = (s).…”
Section: How To Choose a Hard Predicate?mentioning
confidence: 80%
See 3 more Smart Citations