How to generate cryptographically strong sequences of pseudo-random bits
SIAM Journal on Computing
Constructing a perfect matching is in random NC
STOC '85 Proceedings of the seventeenth annual ACM symposium on Theory of computing
A parallel algorithm for the maximal path problem
STOC '85 Proceedings of the seventeenth annual ACM symposium on Theory of computing
On the generation of cryptographically strong pseudorandom sequences
ACM Transactions on Computer Systems (TOCS)
A fast parallel algorithm for the maximal independent set problem
STOC '84 Proceedings of the sixteenth annual ACM symposium on Theory of computing
Two theorems on random polynomial time
SFCS '78 Proceedings of the 19th Annual Symposium on Foundations of Computer Science
Why and how to establish a private code on a public network
SFCS '82 Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
Theory and application of trapdoor functions
SFCS '82 Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
Trapdoor pseudo-random number generators, with applications to protocol design
SFCS '83 Proceedings of the 24th Annual Symposium on Foundations of Computer Science
Logarithmic depth circuits for algebraic functions
SFCS '83 Proceedings of the 24th Annual Symposium on Foundations of Computer Science
Log Depth Circuits For Division And Related Problems
SFCS '84 Proceedings of the 25th Annual Symposium onFoundations of Computer Science, 1984
Sublinear Parallel Algorithm For Computing The Greatest Common Divisor Of Two Integers
SFCS '84 Proceedings of the 25th Annual Symposium onFoundations of Computer Science, 1984
RSA/Rabin Bits are 1/2 + 1 Poly (Log N) Secure
SFCS '84 Proceedings of the 25th Annual Symposium onFoundations of Computer Science, 1984
How To Construct Randolli Functions
SFCS '84 Proceedings of the 25th Annual Symposium onFoundations of Computer Science, 1984
How to Make Replicated Data Secure
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Hi-index | 0.00 |
We present a parallel algorithm for pseudo-random number generation. Given a seed of n驴 truly random bits for any 驴 0, our algorithm generates n驴 pseuderandom bits for any c 1. This takes poly-log time using n驴驴 processors where 驴驴 = k驴 for some fixed small constant k 1. We show that the pseuds-random bits output by our algorithm can not be distinguished from truly random bits in parallel poly-log time using a polynomial number of processors with probability 1/2 + 1/nO(1) if the multiplicative inverse problem almost always can not be solved in RNC. The proof is interesting and is quite different from previous proofs for sequential pseudo-random number generators.Our generator is fast and its output is provably as effective for RNC algorithms as truly random bits. Our generator passes all the statistical tests in KNUTH[14].Moreover, the existence of our generator has a number of central consequences for complexity theory. Given a randomized parallel algorithm A (over a wide class of machine models such as parallel RAMS and fixed connection networks) with time bound T(n) and processor bound P(n), we show A can be simulated by a parallel algorithm with time bound T(n) + O((log n)(log log n)), processor bound P(n)n驴驴, and only using n驴 truly random bits for any 驴 0.Also, we show that if the multiplicative inverse problem is almost always not in RNC, then RNC is within the class of languages accepted by uniform poly-log depth circuits with unbounded fan-in and strictly sub-exponential size 驴驴 0 2n驴.