TY - GEN
T1 - Time-space tradeoffs for distinguishing distributions and applications to security of Goldreich's PRG
AU - Garg, Sumegha
AU - Kothari, Pravesh K.
AU - Raz, Ran
N1 - Publisher Copyright:
© 2020 Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing. All rights reserved.
PY - 2020/8/1
Y1 - 2020/8/1
N2 - In this work, we establish lower-bounds against memory bounded algorithms for distinguishing between natural pairs of related distributions from samples that arrive in a streaming setting. Our first result applies to the problem of distinguishing the uniform distribution on {0, 1}n from uniform distribution on some unknown linear subspace of {0, 1}n. As a specific corollary, we show that any algorithm that distinguishes between uniform distribution on {0, 1}n and uniform distribution on an n/2-dimensional linear subspace of {0, 1}n with non-negligible advantage needs 2Ω(n) samples or Ω(n2) memory (tight up to constants in the exponent). Our second result applies to distinguishing outputs of Goldreich's local pseudorandom generator from the uniform distribution on the output domain. Specifically, Goldreich's pseudorandom generator G fixes a predicate P: {0, 1}k → {0, 1} and a collection of subsets S1, S2,..., Sm ⊆ [n] of size k. For any seed x ∈ {0, 1}n, it outputs P(xS1), P(xS2),..., P(xSm) where xSi is the projection of x to the coordinates in Si. We prove that whenever P is t-resilient (all non-zero Fourier coefficients of (−1)P are of degree t or higher), then no algorithm, with < nε memory, can distinguish the output of G from the uniform distribution on {0, 1}m with a large inverse polynomial advantage, for stretch m ≤ (nt )(1-ε/36) ·t (barring some restrictions on k). The lower bound holds in the streaming model where at each time step i, Si ⊆ [n] is a randomly chosen (ordered) subset of size k and the distinguisher sees either P(xSi) or a uniformly random bit along with Si. An important implication of our second result is the security of Goldreich's generator with super linear stretch (in the streaming model), against memory-bounded adversaries, whenever the predicate P satisfies the necessary condition of t-resiliency identified in various prior works. Our proof builds on the recently developed machinery for proving time-space trade-offs (Raz 2016 and follow-ups). Our key technical contribution is to adapt this machinery to work for distinguishing problems in contrast to prior works on similar results for search/learning problems.
AB - In this work, we establish lower-bounds against memory bounded algorithms for distinguishing between natural pairs of related distributions from samples that arrive in a streaming setting. Our first result applies to the problem of distinguishing the uniform distribution on {0, 1}n from uniform distribution on some unknown linear subspace of {0, 1}n. As a specific corollary, we show that any algorithm that distinguishes between uniform distribution on {0, 1}n and uniform distribution on an n/2-dimensional linear subspace of {0, 1}n with non-negligible advantage needs 2Ω(n) samples or Ω(n2) memory (tight up to constants in the exponent). Our second result applies to distinguishing outputs of Goldreich's local pseudorandom generator from the uniform distribution on the output domain. Specifically, Goldreich's pseudorandom generator G fixes a predicate P: {0, 1}k → {0, 1} and a collection of subsets S1, S2,..., Sm ⊆ [n] of size k. For any seed x ∈ {0, 1}n, it outputs P(xS1), P(xS2),..., P(xSm) where xSi is the projection of x to the coordinates in Si. We prove that whenever P is t-resilient (all non-zero Fourier coefficients of (−1)P are of degree t or higher), then no algorithm, with < nε memory, can distinguish the output of G from the uniform distribution on {0, 1}m with a large inverse polynomial advantage, for stretch m ≤ (nt )(1-ε/36) ·t (barring some restrictions on k). The lower bound holds in the streaming model where at each time step i, Si ⊆ [n] is a randomly chosen (ordered) subset of size k and the distinguisher sees either P(xSi) or a uniformly random bit along with Si. An important implication of our second result is the security of Goldreich's generator with super linear stretch (in the streaming model), against memory-bounded adversaries, whenever the predicate P satisfies the necessary condition of t-resiliency identified in various prior works. Our proof builds on the recently developed machinery for proving time-space trade-offs (Raz 2016 and follow-ups). Our key technical contribution is to adapt this machinery to work for distinguishing problems in contrast to prior works on similar results for search/learning problems.
KW - Bounded storage cryptography
KW - Distinguishing problems
KW - Goldreich's local PRG
KW - Memory-sample tradeoffs
KW - Refuting CSPs
UR - http://www.scopus.com/inward/record.url?scp=85091275549&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85091275549&partnerID=8YFLogxK
U2 - 10.4230/LIPIcs.APPROX/RANDOM.2020.21
DO - 10.4230/LIPIcs.APPROX/RANDOM.2020.21
M3 - Conference contribution
AN - SCOPUS:85091275549
T3 - Leibniz International Proceedings in Informatics, LIPIcs
BT - Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, APPROX/RANDOM 2020
A2 - Byrka, Jaroslaw
A2 - Meka, Raghu
PB - Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing
T2 - 23rd International Conference on Approximation Algorithms for Combinatorial Optimization Problems and 24th International Conference on Randomization and Computation, APPROX/RANDOM 2020
Y2 - 17 August 2020 through 19 August 2020
ER -