Skip to main content

2020 | OriginalPaper | Buchkapitel

On the Streaming Indistinguishability of a Random Permutation and a Random Function

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

An adversary with S bits of memory obtains a stream of Q elements that are uniformly drawn from the set \(\{1,2,\ldots ,N\}\), either with or without replacement. This corresponds to sampling Q elements using either a random function or a random permutation. The adversary’s goal is to distinguish between these two cases.
This problem was first considered by Jaeger and Tessaro (EUROCRYPT 2019), which proved that the adversary’s advantage is upper bounded by \(\sqrt{Q \cdot S/N}\). Jaeger and Tessaro used this bound as a streaming switching lemma which allowed proving that known time-memory tradeoff attacks on several modes of operation (such as counter-mode) are optimal up to a factor of \(O(\log N)\) if \(Q \cdot S \approx N\). However, the bound’s proof assumed an unproven combinatorial conjecture. Moreover, if \(Q \cdot S \ll N\) there is a gap between the upper bound of \(\sqrt{Q \cdot S/N}\) and the \(Q \cdot S/N\) advantage obtained by known attacks.
In this paper, we prove a tight upper bound (up to poly-logarithmic factors) of \(O(\log Q \cdot Q \cdot S/N)\) on the adversary’s advantage in the streaming distinguishing problem. The proof does not require a conjecture and is based on a hybrid argument that gives rise to a reduction from the unique-disjointness communication complexity problem to streaming.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
For the sake of brevity, in this paper we use the term “switching lemma” to refer to a particular type of lemma that allows to switch between a random permutation and a random function.
 
2
We note, however, that Jaeger and Tessaro’s result is superior to ours by a factor of up to \(O(\sqrt{\log Q})\) when \(S \cdot Q \approx N\).
 
3
In fact, the reduction is from the unique-disjointness problem which is a variant of set-disjointness with the promise that if the sets of the players intersect, the intersection size is 1.
 
4
A hybrid argument on a binary tree is also used to prove the security of the classical pseudo-random function construction by Goldreich et al. [11]. However, the resemblance is superficial, as in [11] the construction itself is a binary tree, whereas in our case, we build it artificially only in the proof.
 
5
For a (slightly outdated) survey on set-disjointness, refer to [8].
 
6
Our notation for disjointness is consistent with the rest of the paper, yet it differs from standard notation used in communication complexity.
 
7
The fact that “smoothing” is not required is also mentioned in [24, Footnote 7].
 
Literatur
1.
Zurück zum Zitat Alon, N., Matias, Y., Szegedy, M.: The space complexity of approximating the frequency moments. J. Comput. Syst. Sci. 58(1), 137–147 (1999)MathSciNetCrossRef Alon, N., Matias, Y., Szegedy, M.: The space complexity of approximating the frequency moments. J. Comput. Syst. Sci. 58(1), 137–147 (1999)MathSciNetCrossRef
2.
Zurück zum Zitat Bar-Yossef, Z., Jayram, T.S., Kumar, R., Sivakumar, D.: An information statistics approach to data stream and communication complexity. J. Comput. Syst. Sci. 68(4), 702–732 (2004)MathSciNetCrossRef Bar-Yossef, Z., Jayram, T.S., Kumar, R., Sivakumar, D.: An information statistics approach to data stream and communication complexity. J. Comput. Syst. Sci. 68(4), 702–732 (2004)MathSciNetCrossRef
4.
Zurück zum Zitat Bhargavan, K., Leurent, G.: On the practical (in-)security of 64-bit block ciphers: collision attacks on HTTP over TLS and OpenVPN. In: Weippl, E.R., Katzenbeisser, S., Kruegel, C., Myers, A.C., Halevi, S. (eds.) Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016, pp. 456–467. ACM (2016) Bhargavan, K., Leurent, G.: On the practical (in-)security of 64-bit block ciphers: collision attacks on HTTP over TLS and OpenVPN. In: Weippl, E.R., Katzenbeisser, S., Kruegel, C., Myers, A.C., Halevi, S. (eds.) Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016, pp. 456–467. ACM (2016)
5.
Zurück zum Zitat Braverman, M., Moitra, A.: An information complexity approach to extended formulations. In: Boneh, D., Roughgarden, T., Feigenbaum, J. (eds.) Symposium on Theory of Computing Conference, STOC 2013, Palo Alto, CA, USA, 1–4 June 2013, pp. 161–170. ACM (2013) Braverman, M., Moitra, A.: An information complexity approach to extended formulations. In: Boneh, D., Roughgarden, T., Feigenbaum, J. (eds.) Symposium on Theory of Computing Conference, STOC 2013, Palo Alto, CA, USA, 1–4 June 2013, pp. 161–170. ACM (2013)
8.
Zurück zum Zitat Chattopadhyay, A., Pitassi, T.: The story of set disjointness. SIGACT News 41(3), 59–85 (2010)CrossRef Chattopadhyay, A., Pitassi, T.: The story of set disjointness. SIGACT News 41(3), 59–85 (2010)CrossRef
9.
Zurück zum Zitat Cover, T.M., Thomas, J.A.: Elements of Information Theory, 2nd edn. Wiley, Hoboken (2006)MATH Cover, T.M., Thomas, J.A.: Elements of Information Theory, 2nd edn. Wiley, Hoboken (2006)MATH
11.
12.
Zurück zum Zitat Göös, M., Watson, T.: Communication complexity of set-disjointness for all probabilities. Theory Comput. 12(1), 1–23 (2016)MathSciNetMATH Göös, M., Watson, T.: Communication complexity of set-disjointness for all probabilities. Theory Comput. 12(1), 1–23 (2016)MathSciNetMATH
14.
Zurück zum Zitat Impagliazzo, R., Rudich, S.: Limits on the provable consequences of one-way permutations. In: Johnson, D.S. (ed.) Proceedings of the 21st Annual ACM Symposium on Theory of Computing, 14–17 May 1989, Seattle, Washigton, USA, pp. 44–61. ACM (1989) Impagliazzo, R., Rudich, S.: Limits on the provable consequences of one-way permutations. In: Johnson, D.S. (ed.) Proceedings of the 21st Annual ACM Symposium on Theory of Computing, 14–17 May 1989, Seattle, Washigton, USA, pp. 44–61. ACM (1989)
16.
Zurück zum Zitat Kalyanasundaram, B., Schnitger, G.: The probabilistic communication complexity of set intersection. SIAM J. Discrete Math. 5(4), 545–557 (1992)MathSciNetCrossRef Kalyanasundaram, B., Schnitger, G.: The probabilistic communication complexity of set intersection. SIAM J. Discrete Math. 5(4), 545–557 (1992)MathSciNetCrossRef
17.
Zurück zum Zitat Knuth, D.E.: The Art of Computer Programming, Volume II: Seminumerical Algorithms. Addison-Wesley, Reading (1969)MATH Knuth, D.E.: The Art of Computer Programming, Volume II: Seminumerical Algorithms. Addison-Wesley, Reading (1969)MATH
18.
Zurück zum Zitat Kushilevitz, E., Nisan, N.: Communication Complexity. Cambridge University Press, New York (1997)MATH Kushilevitz, E., Nisan, N.: Communication Complexity. Cambridge University Press, New York (1997)MATH
19.
Zurück zum Zitat Newman, I.: Private vs. common random bits in communication complexity. Inf. Process. Lett. 39(2), 67–71 (1991)MathSciNetCrossRef Newman, I.: Private vs. common random bits in communication complexity. Inf. Process. Lett. 39(2), 67–71 (1991)MathSciNetCrossRef
20.
22.
Zurück zum Zitat Razborov, A.A.: On the distributional complexity of disjointness. Theor. Comput. Sci. 106(2), 385–390 (1992)MathSciNetCrossRef Razborov, A.A.: On the distributional complexity of disjointness. Theor. Comput. Sci. 106(2), 385–390 (1992)MathSciNetCrossRef
24.
Zurück zum Zitat Watson, T.: Communication complexity with small advantage. In: Servedio, R.A. (ed.) 33rd Computational Complexity Conference, CCC 2018, 22–24 June 2018, San Diego, CA, USA, volume 102 of LIPIcs, pp. 9:1–9:17. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik (2018) Watson, T.: Communication complexity with small advantage. In: Servedio, R.A. (ed.) 33rd Computational Complexity Conference, CCC 2018, 22–24 June 2018, San Diego, CA, USA, volume 102 of LIPIcs, pp. 9:1–9:17. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik (2018)
Metadaten
Titel
On the Streaming Indistinguishability of a Random Permutation and a Random Function
verfasst von
Itai Dinur
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-45724-2_15