Skip to main content

2009 | OriginalPaper | Buchkapitel

Computational Indistinguishability Amplification: Tight Product Theorems for System Composition

verfasst von : Ueli Maurer, Stefano Tessaro

Erschienen in: Advances in Cryptology - CRYPTO 2009

Verlag: Springer Berlin Heidelberg

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Computational indistinguishability amplification is the problem of strengthening cryptographic primitives whose security is defined by bounding the distinguishing advantage of an efficient distinguisher. Examples include pseudorandom generators (PRGs), pseudorandom functions (PRFs), and pseudorandom permutations (PRPs).

The literature on computational indistinguishability amplification consists only of few isolated results. Yao’s XOR-lemma implies, by a hybrid argument, that no efficient distinguisher has advantage better than (roughly)

n

2

m

 − 1

δ

m

in distinguishing the XOR of

m

independent

n

-bit PRG outputs

S

1

,...,

S

m

from uniform randomness if no efficient distinguisher has advantage more than

δ

in distinguishing

S

i

from a uniform

n

-bit string. The factor 2

m

 − 1

allows for security amplification only if

$\delta<\frac{1}{2}$

: For the case of PRFs, a random-offset XOR-construction of Myers was the first result to achieve

strong

security amplification, i.e., also for

$\frac{1}{2} \le \delta < 1$

.

This paper proposes a systematic treatment of computational indistinguishability amplification. We generalize and improve the above product theorem for the XOR of PRGs along five axes. First, we prove the

tight

information-theoretic bound 2

m

 − 1

δ

m

(without factor

n

) also for the computational setting. Second, we prove results for

interactive

systems (e.g. PRFs or PRPs). Third, we consider the general class of

neutralizing combination constructions

, not just XOR. As an application, this yields the first indistinguishability amplification results for the cascade of PRPs (i.e., block ciphers) converting a weak PRP into an arbitrarily strong PRP, both for single-sided and two-sided queries. Fourth,

strong

security amplification is achieved for a subclass of neutralizing constructions which includes as a special case the construction of Myers. As an application we obtain highly practical optimal security amplification for block ciphers, simply by adding random offsets at the input and output of the cascade. Fifth, we show strong security amplification also for

weakened assumptions

like security against random-input (as opposed to chosen-input) attacks.

A key technique is a generalization of Yao’s XOR-lemma to (interactive) systems which is of independent interest.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Metadaten
Titel
Computational Indistinguishability Amplification: Tight Product Theorems for System Composition
verfasst von
Ueli Maurer
Stefano Tessaro
Copyright-Jahr
2009
Verlag
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-642-03356-8_21