Cryptography Reference
In-Depth Information
where the i th term in the sum is an upper bound on the fraction of the h 's that are
( T · 2 i 3
3
3 ck , we conclude
k · 2 i + 1 )-overweighting. For c = 1536, setting T =
ck
δ
2 and = δ
,
3
3 ck )-expanding.
Having established an upper bound on suitably expanding functions, we now turn to
the actual claim. Specifically, we call h honest if it is not ( 1536 k
δ
128 k
/ 3 ck ) = 4 fraction of the h 's are ( ck
, δ
that at most a
( ck
2 ) 2
· ( δ
3
δ
2
3
4608 k )-expanding. There
δ
,
2
are two important facts about honest functions:
Fact 1 : All but at most a 4 fraction of the h 's are honest.
Fact 2 :If h is honest and Pr [ h ( X n ) R ] 2 , then Pr [ U k R ]
3
4608 k . (Suppose that h
δ
3
4608 k
δ
( 1536 k
δ
3
4608 k =
δ
Pr
Pr
is honest and
[ U k
R ]
holds. Then
[ h ( X n )
R ]
<
+
1)
·
2
3
4608 k < 2 .)
Concentrating on the honest h 's, we now evaluate the probability that (
3 +
δ
α,
h ) hits B when
2 . Using the Markov
α
is uniformly chosen. We call h good if
Pr
[( h ( X n )
, h )
B ]
inequality (and the definition of
), we get the following:
Fact 3: The probability that H n is good is at least 2 .
Denote by P (for “perfect”) the set of h 's that are both good and honest. Combining
Facts 1 and 3, we have the following:
δ
[ H n
2 4 = 4 .
Fact 4:
Pr
P ]
def
={ α
2
Let B h
:(
α,
h )
B
}
. Clearly, for every h
P we have
Pr
[ h ( X n )
B h ]
(since h
3
4608 k
δ
is good), and
Pr
[ U k
B h ]
(since h is honest and the hypothesis of Fact 2 applies
to B h ). Thus:
3
4608 k .
δ
Fact 5 : For every h P , it holds that Pr [( U k , h ) B ]
Combining Facts 4 and 5, we have
Pr U k , H n B Pr U k , H n B H n P · Pr H n P
3
4608 k · 4
δ
and the claim follows.
Applying Proposition 3.5.9
It is possible to apply Construction 3.5.2 to the function resulting from Construc-
tion 3.5.8 and have the statement of Proposition 3.5.3 still hold, with minor modifica-
tions. Specifically, the modified bound (analogous to Proposition 3.5.3) is 2 ( l ( n ))
+
l ( n )
3
1
p ( n )
1
p ( n ) ) for every positive polynomial p . The argument leading
to Theorem 3.5.6 remains valid as well. Furthermore, we can even waive the require-
ment that m ( n ) can be computed (since we can construct functions F m for every possible
value of m ( n )). Finally, we note that the entire argument holds even if the definition of
regular functions is relaxed as follows.
(instead of 2
·
2
+
Definition 3.5.10 (Regular Functions, Revised Definition): A function f :
{ 0 , 1 } →{ 0 , 1 } is called regular if there exists an integer function m :
146
Search WWH ::




Custom Search