Cryptography Reference
In-Depth Information
t j .
3. Uniformly select
β ∈{
0
,
1
}
4. Invoke A on input (1 t
,αβ
) and record the following values:
read by A ,
(a) in variable
, the length of the prefix of
αβ
, the output of A .
(b) in variable
τ
5. If
=
j , then halt with output
τ
.
6. Otherwise (i.e.,
=
j ), output a uniformly selected bit.
Clearly, A is implementable in probabilistic polynomial time. We now ana-
lyze the success probability of A in predicting b ( U n ) when given f ( U n ). A
key observation is that on input f ( U n ), for each possible value assigned to j in
Step 1 the value of α (as determined in Step 2 of A ) is distributed identically
to the j -bit-long prefix of the distribution G ( U n ). This is due to the fact that f
induces a permutation over { 0 , 1 }
n , and so b ( f
j 1 ( U n )) ··· b ( U n ) is distributed
identically to b ( f t 1 ( U n ))
b ( f t j ( U n )). We use the following notations and
···
observations:
j 1 ( y ))
Let R j be a randomized process that, given y , outputs b ( f
···
b ( y )
·
r ,
t j .
Note that on input y , after selecting j in Step 1, algorithm A invokes A on
input (1 t
where r is uniformly distributed in
{
0
,
1
}
R j ( y )). By the foregoing (“key”) observation, the j -bit-long prefix of
R j ( f ( U n )) is distributed identically to the j -bit-long prefix of G ( U n ). Also note
that b ( f
,
j
1 ( f ( U n )))
1)-
bit-long prefix of G ( U n ) and that the former is obtained by concatenating the
j -bit-long prefix of R j ( f ( U n )) with b ( U n ).
···
b ( f ( U n ))
·
b ( U n ) is distributed identically to the ( j
+
γ
γ ∈{
,
}
t
Let L A (
) be a random variable representing the length of the prefix of
0
1
read by A on input (1 t
).
Note that the behavior of A on input (1 t
) depends only on the L A (
γ
) first
bits of
γ
(and is independent of the t
L A (
γ
) last bits of
γ
). On the other hand,
next A (
γ
) equals the L A (
γ
)
+
1 bit of
γ
.
Let J be a random variable representing the random choice made in Step 1, and
let U 1 represent the random choice made in Step 6. Recall that U 1 is uniformly
distributed in
{
0
,
1
}
, independently of anything else.
J , then A outputs the value A (1 t
), and otherwise A
Note that if L A (
γ
)
=
outputs U 1 .
Using all the foregoing, we get
[ A ( f ( U n )) = b ( U n )]
= Pr
Pr
[ A (1 t
, R J ( f ( U n ))) = b ( U n )& L A ( R J ( f ( U n ))) = J ]
+ Pr
[ U 1 =
b ( U n )& L A ( R J ( f ( U n )))
=
J ]
[ A (1 t
G ( U n ))
next A ( G ( U n )) & J
L A ( G ( U n ))]
= Pr
,
=
=
1
2
where we use the fact that when L A ( R J ( f ( U n ))) = J , the behavior of A
depends only on the J -bit-long prefix of R J ( f ( U n )), which in turn is distributed
130
+ Pr
[ J = L A ( G ( U n ))] ·
Search WWH ::




Custom Search