Part of the book series:Lecture Notes in Computer Science ((LNCS,volume 2951))
Included in the following conference series:
1613Accesses
Abstract
A new technique for proving theadaptive indistinguishability of two systems, each composed of some component systems, is presented, using only the fact that corresponding component systems arenon-adaptively indistinguishable. The main tool is the definition of a special monotone condition for a random systemF, relative to another random systemG, whose probability of occurring for a given distinguisherD is closely related to the distinguishing advantageε ofD forF andG, namely it is lower and upper bounded byε and\(\epsilon(1 + {\rm ln}\frac{1}{\epsilon})\), respectively.
A concrete instantiation of this result shows that the cascade of two random permutations (with the second one inverted) is indistinguishable from a uniform random permutation by adaptive distinguishers which may query the system from both sides, assuming the components’ security only against non-adaptive one-sided distinguishers.
As applications we provide some results in various fields as almostk-wise independent probability spaces, decorrelation theory and computational indistinguishability (i.e., pseudo-randomness).
Chapter PDF
Similar content being viewed by others
References
Alon, N., Goldreich, O., Hastad, J., Peralta, R.: Simple construction of almost k-wise independent random variables. Random Structures and Algorithms 3(3), 289–304 (1992)
Luby, M., Rackoff, C.: How to construct pseudo-random permutations from pseudo-random functions. SIAM J. on Computing 17(2), 373–386 (1988)
Maurer, U.: Indistinguishability of random systems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 110–132. Springer, Heidelberg (2002)
Maurer, U., Pietrzak, K.: The security of many-round Luby-Rackoff pseudorandom permutations. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 544–561. Springer, Heidelberg (2003)
Naor, J., Naor, M.: Small-bias probability spaces: Efficient constructions and applications. SIAM Journal on Computing 22(4), 838–356 (1993)
Renner, R.: The Statistical Distance of Independently Repeated Experiments (manuscript), available at:http://www.crypto.ethz.ch/~renner/publications.html
Vaudenay, S.: Provable security for block ciphers by decorrelation. In: Meinel, C., Morvan, M. (eds.) STACS 1998. LNCS, vol. 1373, pp. 249–275. Springer, Heidelberg (1998)
Vaudenay, S.: Adaptive-attack norm for decorrelation and super-pseudorandomness. In: Heys, H.M., Adams, C.M. (eds.) SAC 1999. LNCS, vol. 1758, pp. 49–61. Springer, Heidelberg (2000)
Author information
Authors and Affiliations
Department of Computer Science, ETH Zürich,
Ueli Maurer & Krzysztof Pietrzak
- Ueli Maurer
You can also search for this author inPubMed Google Scholar
- Krzysztof Pietrzak
You can also search for this author inPubMed Google Scholar
Editor information
Editors and Affiliations
Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, 76100, Rehovot, Israel
Moni Naor
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Maurer, U., Pietrzak, K. (2004). Composition of Random Systems: When Two Weak Make One Strong. In: Naor, M. (eds) Theory of Cryptography. TCC 2004. Lecture Notes in Computer Science, vol 2951. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24638-1_23
Download citation
Publisher Name:Springer, Berlin, Heidelberg
Print ISBN:978-3-540-21000-9
Online ISBN:978-3-540-24638-1
eBook Packages:Springer Book Archive
Share this paper
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative