Aggregate pseudorandom functions and connections to learning

被引:0
|
作者
Cohen, Aloni [1 ]
Goldwasser, Shafi [1 ,2 ]
Vaikuntanathan, Vinod [1 ]
机构
[1] MIT, United States
[2] Weizmann Institute of Science, Israel
来源
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2015年 / 9015卷
关键词
Aggregates - Boolean algebra - Query processing - Cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
In the first part of this work, we introduce a new type of pseudo-random function for which aggregate queries over exponentialsized sets can be efficiently answered. We show how to use algebraic properties of underlying classical pseudo random functions, to construct such aggregate pseudo-random functions for a number of classes of aggregation queries under cryptographic hardness assumptions. For example, one aggregate query we achieve is the product of all function values accepted by a polynomial-sized read-once boolean formula. On the flip side, we show that certain aggregate queries are impossible to support. Aggregate pseudo-random functions fall within the framework of the work of Goldreich, Goldwasser, and Nussboim [GGN10] on the Implementation of Huge Random Objects, providing truthful implementations of pseudo-random functions for which aggregate queries can be answered. In the second part of this work, we show how various extensions of pseudo-random functions considered recently in the cryptographic literature, yield impossibility results for various extensions of machine learning models, continuing a line of investigation originated by Valiant and Kearns in the 1980s. The extended pseudo-random functions we address include constrained pseudo random functions, aggregatable pseudo random functions, and pseudo random functions secure under related-key attacks. © International Association for Cryptologic Research 2015.
引用
收藏
页码:61 / 89
相关论文
共 50 条
  • [1] Aggregate Pseudorandom Functions and Connections to Learning
    Cohen, Aloni
    Goldwasser, Shafi
    Vaikuntanathan, Vinod
    THEORY OF CRYPTOGRAPHY (TCC 2015), PT II, 2015, 9015 : 61 - 89
  • [2] Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security
    Abdalla, Michel
    Benhamouda, Fabrice
    Passelegue, Alain
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 103 - 120
  • [3] Multilinear Pseudorandom Functions
    Cohen, Aloni
    Holmgren, Justin
    AUTOMATA, LANGUAGES, AND PROGRAMMING, PT I, 2015, 9134 : 331 - 342
  • [4] Pseudorandom functions and factoring
    Naor, M
    Reingold, O
    Rosen, A
    SIAM JOURNAL ON COMPUTING, 2002, 31 (05) : 1383 - 1404
  • [5] Pseudorandom Functions and Lattices
    Banerjee, Abhishek
    Peikert, Chris
    Rosen, Alon
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2012, 2012, 7237 : 719 - 737
  • [6] HOW TO CONSTRUCT PSEUDORANDOM PERMUTATIONS FROM PSEUDORANDOM FUNCTIONS
    LUBY, M
    RACKOFF, C
    LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 : 447 - 447
  • [7] HOW TO CONSTRUCT PSEUDORANDOM PERMUTATIONS FROM PSEUDORANDOM FUNCTIONS
    LUBY, M
    RACKOFF, C
    SIAM JOURNAL ON COMPUTING, 1988, 17 (02) : 373 - 386
  • [8] HOW TO CONSTRUCT PSEUDORANDOM PERMUTATIONS FROM SINGLE PSEUDORANDOM FUNCTIONS
    PIEPRZYK, J
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 473 : 140 - 150
  • [9] Weak pseudorandom functions in Minicrypt
    Pietrzak, Krzysztof
    Sjoedin, Johan
    AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, PROCEEDINGS, 2008, 5126 : 423 - +
  • [10] Constrained Pseudorandom Functions and Their Applications
    Boneh, Dan
    Waters, Brent
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013, PT II, 2013, 8270 : 280 - 300