# Pseudorandom functions in $ \textit{TC}^{0} $ and cryptographic limitations to proving lower bounds

@article{Krause2001PseudorandomFI, title={Pseudorandom functions in \$ \textit\{TC\}^\{0\} \$ and cryptographic limitations to proving lower bounds}, author={Matthias Krause and Stefan Lucks}, journal={computational complexity}, year={2001}, volume={10}, pages={297-313} }

Abstract.This paper investigates which complexity classes inside NCcan contain pseudorandom function generators (PRFGs). Under the Decisional
Diffie-Hellman assumption (a common cryptographic assumption) $ \textit{TC}^{0} $4 contains PRFGs. No lower complexity classes with this property
are currently known. On the other hand, we use effective lower
bound arguments to show that some complexity classes cannot contain
PRFGs. This provides evidence for the following conjecture: Any effective
lower…

## 14 Citations

### Succinct hitting sets and barriers to proving algebraic circuits lower bounds

- Mathematics, Computer ScienceSTOC
- 2017

Following a similar result of Williams in the boolean setting, it is shown that the existence of an algebraic natural proofs barrier is equivalent to the existenceof succinct derandomization of the polynomial identity testing problem.

### Natural proofs versus derandomization

- Computer Science, MathematicsSTOC '13
- 2013

This work proves that NEXP ∩ coNEXP does not have nlog n size ACC circuits, and a mild derandomization result for RP, and applies characterizations from these results to yield several new results.

### Algorithms versus Circuit Lower Bounds

- Computer ScienceElectron. Colloquium Comput. Complex.
- 2013

This survey revisits many of the transference theorems of the form "nontrivial algorithms for a circuit class C yield circuit lower bounds against C" and discusses how circuitLower bounds can be obtained from derandomization, compression, learning, and satisfiability algorithms.

### Constructions of Low-Degree and Error-Correcting in-Biased Generators

- Computer Science, MathematicsComputational Complexity Conference
- 2006

This work constructs two new constructions of /spl epsi/-biased generators and separates degree k generators from generators in NC/sub k//sup 0/, showing that the stretch of the former can be much larger than the Stretch of the latter.

### Unconditional Lower Bounds in Complexity Theory

- Computer Science, Mathematics
- 2015

This work investigates the hardness of solving natural computational problems according to different complexity measures, and gives near-optimal lower bounds for pseudorandom functions, error-correcting codes, hardcore predicates, randomness extractors, and small-bias generators.

### A Satisfiability Algorithm for Depth Two Circuits with a Sub-Quadratic Number of Symmetric and Threshold Gates

- Computer ScienceElectron. Colloquium Comput. Complex.
- 2016

A deterministic algorithm that, given a circuit with n variables andm gates, counts the number of satisfying assignments in time 2 n−Ω, which runs in time super-polynomially faster than 2 n if m= O(n2/ logbn) for some constant b> 0.

### Interpolation of depth-3 arithmetic circuits with two multiplication gates

- Computer Science, MathematicsSTOC '07
- 2007

The proof technique is new and relies on the factorization algorithm for multivariate black-box polynomials, on lower bounds on the length of linear locally decodable codes with 2 queries, and on a theorem regarding the structure of identically zero depth-3 circuits with four multiplication gates.

### Hardness of Noise-Free Learning for Two-Hidden-Layer Neural Networks

- Computer ScienceArXiv
- 2022

Superpolynomial statistical query lower bounds for learning two-hidden-layer ReLU networks with respect to Gaussian inputs in the standard (noise-free) model are given and a lifting procedure due to Daniely and Vardi is shown that reduces Boolean PAC learning problems toGaussian ones.

### Size and Depth Separation in Approximating Benign Functions with Neural Networks

- Computer ScienceCOLT
- 2021

It is shown that beyond depth 4 there is a barrier to showing depth-separation for benign functions, even between networks of constant depth and networks of nonconstant depth, and superpolynomial size lower bounds and barriers to such lower bounds are shown, depending on the assumptions on the function.

### Neural Networks with Small Weights and Depth-Separation Barriers

- Computer ScienceElectron. Colloquium Comput. Complex.
- 2020

This paper provides a negative and constructive answer to whether there are polynomially-bounded functions which require super-polynomial weights in order to approximate with constant-depth neural networks, and proves fundamental barriers to proving such results beyond depth $4$ by reduction to open problems and natural-proof barriers in circuit complexity.

## References

SHOWING 1-10 OF 25 REFERENCES

### Number-theoretic constructions of efficient pseudo-random functions

- Computer Science, MathematicsProceedings 38th Annual Symposium on Foundations of Computer Science
- 1997

A new construction of pseudo-random functions such that computing their value at any given point involves two multiple products, much more efficient than previous proposals.

### Cryptographic limitations on learning Boolean formulae and finite automata

- Computer Science, MathematicsJACM
- 1994

It is proved that a polynomial-time learning algorithm for Boolean formulae, deterministic finite automata or constant-depth threshold circuits would have dramatic consequences for cryptography and number theory and is applied to obtain strong intractability results for approximating a generalization of graph coloring.

### Algebraic methods in the theory of lower bounds for Boolean circuit complexity

- Computer Science, MathematicsSTOC
- 1987

It is proved that depth k circuits with gates NOT, OR and MODp where p is a prime require Exp(&Ogr;(n1/2k)) gates to calculate MODr functions for any r ≠ pm.

### On the Cryptographic Applications of Random Functions

- Computer Science, MathematicsCRYPTO
- 1984

Now that "random functions" can be efficiently constructed ([GGM]), we discuss some of their possible applications to cryptography: 1) Distributing unforgable ID numbers which can be locally verified…

### Synthesizers and their application to the parallel construction of pseudo-random functions

- Computer Science, MathematicsProceedings of IEEE 36th Annual Foundations of Computer Science
- 1995

An NC/sup 1/ implementation of pseudo-random synthesizers based on the RSA or the Diffie-Hellman assumptions is shown, which yields the first parallel pseudo- random function and the only alternative to the original construction of Goldreich, Gold-wasser and Micali (GGM).

### Cryptographic Primitives Based on Hard Learning Problems

- Computer Science, MathematicsCRYPTO
- 1993

This paper shows how to construct several cryptographic primitives based on certain assumptions on the difficulty of learning by developing further a line of thought introduced by Impagliazzo and Levin.

### Natural proofs

- Mathematics, Computer ScienceSTOC '94
- 1994

It is shown that the weaker class ofAC0-natural proofs which is sufficient to prove the parity lower bounds of Furst, Saxe, and Sipser, Yao, and Hastad is inherently incapable of proving the bounds of Razborov and Smolensky.

### How to Construct Pseudorandom Permutations from Pseudorandom Functions

- Computer Science, MathematicsSIAM J. Comput.
- 1988

Any pseudorandom bit generator can be used to construct a block private key cryptos system which is secure against chosen plaintext attack, which is one of the strongest known attacks against a cryptosystem.

### Simulating threshold circuits by majority circuits

- Computer Science, MathematicsSIAM J. Comput.
- 1998

It is proved that a single threshold gate with arbitrary weights can be simulated by an explicit polynomial-size, depth-2 majority circuit and it is shown that such a simulation is possible even if the depth d grows with the number of variables n.

### How to construct random functions

- Computer Science, MathematicsJACM
- 1986

A constructive theory of randomness for functions, based on computational complexity, is developed, and a pseudorandom function generator is presented that has applications in cryptography, random constructions, and complexity theory.