Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

In this section, we will examine the GGM (Goldreich, Goldwasser, Micali) construction of a PRF assuming we have a|PRG G:{0,1}n{0,1}2n which is length doubling. For

image text in transcribed

In this section, we will examine the GGM (Goldreich, Goldwasser, Micali) construction of a PRF assuming we have a|PRG G:{0,1}n{0,1}2n which is "length doubling". For a length doubling PRG G, and x{0,1}n, we parse the output G(x){0,1}2n as G(x)=(G(x)0,G(x)1), so G(x)0 denotes the first n bits of G(x), and G(x)1 denotes the second n bits. Recall that a PRF is a pair of algorithms (Sel, Eval). Given a length doubling PRG G, (Sel, Eval) work as follows: - Sel (): Choose and output a random "seed" s{0,1}n, which defines the function fs:{0,1}n {0,1}n - Eval(fs,x) : Parse x=x1xn{0,1}n, and set y0=s{0,1}n. For i=1,,n, do the following: - let yi=G(yi1)xi{0,1}n\ the bit xi selects the first or last half of G(yi1)\. Output yn{0,1}n Problem 9. Prove that (Sel, Eval) is a secure PRF family assuming that G is a secure PRG

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Administration The Complete Guide To Dba Practices And Procedures

Authors: Craig S. Mullins

2nd Edition

0321822943, 978-0321822949

More Books

Students also viewed these Databases questions