
CUUS063 main CUUS063 Goldreich 978 0 521 88473 0 March 31, 2008 18:49
C.2. COMPUTATIONAL DIFFICULTY
point for the definition of a trapdoor permutation.
3
Loosely speaking, the latter is a col-
lection of one-way permutations augmented with an efficient algorithm that allows for
inverting the permutation when given adequate auxiliary information (called a trapdoor).
Definition C.3 (trapdoor permutations): A collection of permutations as in Defi-
nition C.2 is called a
trapdoor permutation if there are two auxiliary probabilistic
polynomial-time algorithms I
and F
−1
such that (1) the distribution I
(1
n
) ranges
over pairs of strings so that the first string is distributed as in I (1
n
), and (2) for
every (i, t) in the range of I
(1
n
) and every x ∈ D
i
it holds that F
−1
(t, f
i
(x)) = x.
(That is, t is a trapdoor that allows for inverting f
i
.)
For example, in case of the RSA, the function f
N,e
can be inverted by raising the image
to the power d (modulo N = P · Q), where d is the multiplicative inverse of e modulo
(P −1) · (Q − 1). Indeed, in this case, the trapdoor information is (N, d).
Strong versus weak one-way functions (summary of Section 7.1.2). Recall that the
foregoing definitions require that any feasible algorithm succeeds in inverting the func-
tion with negligible probability. A weaker notion only requires that any feasible algorithm
fails to invert the function with noticeable probability. It turns out that the existence of
such weak one-way functions implies the existence of strong one-way functions (as in
Definition C.1). The constr uction itself is straightforward, but analyzing it transcends the
analogous information-theoretic setting. Instead, the security (i.e., hardness of inverting)
the resulting construction is proved via a so-called reducibility argument that transforms
the violation of the conclusion (i.e., the hypothetical insecurity of the resulting construc-
tion) into a violation of the hypothesis (i.e., insecurity of the given primitive). This strategy
(i.e., a “reducibility argument”) is used to prove all conditional results in the area.
C.2.2. Hard-Core Predicates
Recall that saying that a function f is one-way implies that, given a typical f -image y,
it is infeasible to find a preimage of y under f . This does not mean that it is infeasible
to find partial information about the preimage(s) of y under f . Specifically, it may be
easy to retrieve half of the bits of the preimage (e.g., given a one-way function f consider
the function g defined by g(x, r )
def
=( f (x), r), for every |x|=|r|). As will become clear in
subsequent sections, hiding partial information (about the function’s preimage) plays an
important role in many advanced cryptographic constructs (e.g., secure encryption). This
partial information can be considered as a “hard-core” of the difficulty of inver ting f .
Loosely speaking, a polynomial-time computable (Boolean) predicate b , is called a
hard-
core
of a function f if no feasible algorithm, given f (x), can guess b(x) with success
probability that is non-negligibly better than one half. The actual definition is presented
in Section 7.1.3 (i.e., Definition 7.6).
Note that if b is a hard-core of a 1-1 function f that is polynomial-time computable
then f is a one-way function. On the other hand, recall that Theorem 7.7 asserts that for
any one-way function f , the inner-product mod 2 of x and r is a hard-core of the function
f
, where f
(x, r ) = ( f (x), r).
3
Indeed, a more adequate term would be a collection of trapdoor permutations, but the shorter (and less precise)
term is the commonly used one.
489